text
stringlengths 2.85k
2.55M
| label
class label 11
classes |
---|---|
arXiv:1708.00331v1 [cs.DS] 1 Aug 2017
Exact Approaches for the Travelling Thief
Problem
Junhua Wu
Markus Wagner
Sergey Polyakovskiy
Frank Neumann
Optimisation and Logistics
School of Computer Science
The University of Adelaide, Adelaide SA, Australia
Abstract
Many evolutionary and constructive heuristic approaches have been
introduced in order to solve the Traveling Thief Problem (TTP). However, the accuracy of such approaches is unknown due to their inability
to find global optima. In this paper, we propose three exact algorithms
and a hybrid approach to the TTP. We compare these with state-of-theart approaches to gather a comprehensive overview on the accuracy of
heuristic methods for solving small TTP instances.
1
Introduction
The travelling thief problem (TTP) [3] is a recent academic problem in which
two well-known combinatorial optimisation problems interact, namely the travelling salesperson problem (TSP) and the 0-1 knapsack problem (KP). It reflects
the complexity in real-world applications that contain more than one N P-hard
problem, which can be commonly observed in the areas of planning, scheduling
and routing. For example, delivery problems usually consist of a routing part
for the vehicle(s) and a packing part of the goods onto the vehicle(s).
Thus far, many approximate approaches have been introduced for addressing the TTP and most of them are evolutionary or heuristic [16]. Initially,
Polyakovskiy, Bonyadi, Wagner, Michalewicz, and Neumann [17] proposed two
iterative heuristics, namely the Random Local Search (RLS) and (1+1)-EA,
based on a general approach that solves the problem in two steps, one for
the TSP and one for the KP. Bonyadi et al. [4] introduced a similar twophased algorithm named Density-based Heuristic (DH) and a method inspired
by coevolution-based approaches named CoSolver. Mei et al. [11–13] also investigated the interdependency and proposed a cooperative coevolution based
approach similar to CoSolver, and a memetic algorithm called MATLS that
1
attempts to solve the problem as a whole. In 2015, Faulkner et al. [7] outperformed the existing approaches by their new operators and corresponding series
of heuristics (named S1–S5 and C1–C6). Recently, Wagner [21] investigated the
Max-Min Ant System (MMAS) [20] on the TTP, and El Yafrani and Ahiod [6]
proposed a memetic algorithm (MA2B) and a simulated annealing algorithm
(CS2SA). The results show that the new algorithms were competitive to the
state-of-the-art on a different range of TTP instances. Wagner et al. [22] found
in a study involving 21 approximate TTP algorithms that only a small subset
of them is actually necessary to form a well-performing algorithm portfolio.
However, due to the lack of exact methods, all of the above-mentioned approximate approaches cannot be evaluated with respect to their accuracy even
on small TTP instances. To address this issue, we propose three exact techniques and additional benchmark instances, which help to build a more comprehensive review of the approximate approaches.
In the remainder, we revisit the definition of the TTP in Section 2 and
introduce our exact approaches in Section 3. In Section 4, we elaborate on the
setup of our experiments and compare our exact and hybrid approaches with
the best approximate ones. The conclusions are drawn in Section 5.
2
Problem Statement
In this section, we outline the problem formulation. For a comprehensive description, we refer the interested reader to [17].
Given is a set of cities N = {1, . . . , n} and a set of items M = {1, . . . , m}.
City i, i = 2, . . . , n, contains a set of items Mi = {1, . . . , mi }, M = ∪ Mi .
i∈N
Item k positioned in the city i is characterised by its profit pik and weight
wik . The thief must visit each of the cities exactly once starting from the first
city and return back to it in the end. The distance dij between any pair of
cities i, j ∈ N is known. Any item may be selected as long as the total weight
of collected items does not exceed the capacity C. A renting rate R is to be
paid per each time unit taken to complete the tour. υmax and υmin denote
the maximal and minimum speeds of the thief. Assume that there is a binary
variable yik ∈ {0, 1} such that yik = 1 iff item k is chosen in city i. The
goal is to find a tour Π = (x1 , . . . , xn ), xi ∈ N , along with a packing plan
P = (y21 , . . . , ynmn ) such that their combination [Π, P ] maximises the reward
given in the form the following objective function.
!
mi
n−1
n X
X
X
dxi xi+1
dxn x1
+
(1)
Z([Π, P ]) =
pik yik − R
υmax − νWxn
υ
− νWxi
i=1 max
i=1
k=1
where ν = (υmax − υmin ) /C is a constant value defined by input parameters.
The minuend is the sum of all packed items’ profits and the subtrahend is the
amount that the thief pays for the knapsack’s rent equal to the total traveling
time along Π multiplied by R. In fact, the actual travel
the distance
Pspeed
Palong
mj
i
dxi xi+1 depends on the accumulated weight Wxi = j=1 k=1
wjk yjk of the
2
items collected in the preceding cities 1, . . . , i. This then slows down the thief
and has an impact on the overall benefit Z.
3
Exact Approaches to the TTP
In this section, we propose three exact approaches to the TTP.
As a simplified version of the TTP, Polyakovskiy and Neumann [16] have
recently introduced the packing while travelling problem (PWT), in which the
tour Π is predefined and only the packing plan P is variable. Furthermore,
Neumann et al. [14] prove that the PWT can be solved in pseudo-polynomial
time by dynamic programming taking into account the fact that the weights are
integer. The dynamic programming algorithm maps every possible weight w to
a packing plan P , i.e. f : w 7→ P , which guarantees a certain profit. Then the
optimal packing plan P ∗ is to be selected among all the plans that have been
obtained.
Here, we adopt these findings to derive two exact algorithms for the TTP.
Let · denote all possible weights for a given TTP instance. Let [Π, f (·)] designate the best solutions for the instance with tour Π obtained via the dynamic
programming for the PWT. As Π is to be variable, the optimum objective value
of the TTP is Z ∗ = arg max∀Π,w∈· Z([Π, f (w)]),. This yields the basis for two
of our approaches: dynamic programming (DP) and branch and bound search
(BnB). The following sections describe the two approaches as well as a constraint
programming (CP) technique adopted for the TTP.
3.1
Dynamic Programming
Our DP approach is based on the Held-Karp algorithm for the TSP [8] and
on the dynamic programming to the PWT [14]. Algorithm 1 depicts the pseudocode for our approach. Let Ṡ = N \ {1} be a subset of the cities and k ∈ N
refer to a particular city. Then [S, k] is a tour starting in city 1, visiting all
the cities in S ⊆ Ṡ exactly once, and ending in city k. The optimal solution of the TTP therefore can be described by [Ṡ, 1, fxn (Wxn )]∗ , where Wxn is
the total weight of the knapsack when leaving the last city xn and fxn results
from the dynamic programming algorithm for the PWT considering the tour
Π = (1, . . . , xn ). The following statement is valid with respect to the TTP’s
statement:
Z([Ṡ, 1, fxn (Wxn )]∗ ) = Z([Ṡ \ {xn }, xn , fxn−1 (Wxn − W xn )])
dxn x1
+ P xn + R
.
vmax − νWxn
Here, W xn and P xn are the total weight and the total profit of the items picked
in city xn . Clearly, Z([Ṡ \ {xn }, xn , fxn−1 (Wxn − W xn )]) is optimal for the
tour [Ṡ \ {xn }, xn ]. Furthermore, such a relationship exists for every pair of
[S, i, fj (Wj )] and [S \ {j}, j, fj−1 (Wj − W j )], where i ∈ Ṡ \ S and j ∈ S. In
3
Algorithm 1 Dynamic programming to the TTP
1: procedure Dynamic programming
2:
Ṡ = {2, ..., n}, S = ∅, w = 0
3:
for i = 2 to n do
4:
store [S, i, w] = Z([S, i, fi (w)]) in a mapping M
5:
for i = 3 to n do
6:
M0 = M
7:
for all [S, k, w] in M 0 do
8:
for all ṡ ∈ Ṡ \ S do
9:
for all s ∈ S do
10:
calculate Z([S ∪ {ṡ}, ṡ, fṡ (·)]) from Z([S, s, fs (·)])
11:
and store [S ∪ {ṡ}, ṡ, ·] = max Z([S ∪ {ṡ}, ṡ, fṡ (·)]) in M 0
12:
M = M0
13:
calculate Z([Ṡ, 1, f1 (Wxn )]∗ ) from Z([Ṡ \ {i}, i, fi (·)]∗ ), i ∈ {2, ..., n} in
M
fact, having an optimal solution for a given TTP instance, one can compute the
optimal solution for the instance that excludes the last city from the solution of
the original problem. Following this idea, we build our DP for the TTP.
The DP is costly in terms of the memory consumption, which reaches O(2n nC).
To reduce these cost, let EU define an upper bound on the value of a feasible
solution built on the partial solution [S, k, fk (·)] as follows:
EU ([S, k, fk (·)]) = max Z([S, k, fk (·)]) +
mi
X X
i∈Ṡ\S j=1
pij − R
dk1
vmax
It estimates the maximal profit that the thief may obtain by passing the remaining part of the tour with the maximal speed, that is generating the minimal
possible cost. Obviously, this guarantees that the complete optimal solution
can not exceed the bound. Therefore, if any incumbent solution is known, it is
valid to eliminate a partial solution [S, k, fk (w)], w ∈ · if EU ([S, k, fk (w)]) < ZL ,
where ZL is the objective value of the incumbent. In practice, one can obtain
an incumbent solution (and compute ZL ) in two stages. First, a feasible solution Π for the TSP part of the problem can be computed by solvers such
as Concorde [1] or by the Lin-Kernighan algorithm [10]. Second, the dynamic
programming applied for Π contributes the packing plan.
3.2
Branch and Bound Search
Now, we introduce a branch and bound search for the TTP employing the upper
bound EU defined in Section 3.1. Algorithm 2 depicts the pseudocode, where
Πi , i ∈ {1, ..., n} denotes a sub-permutation of Π with the cities 1 to i visited,
and fi is the mapping f : w 7→ P calculated for Π by the dynamic programming
for the PWT.
4
Algorithm 2 Branch and Bound Search for the TTP
1: procedure BnB Search
2:
Create an initial solution to gain the benefit best and an tour permutation Π
3:
Create an empty mapping M
4:
Set l = 0
5:
Search(Π, l, M, best)
6: function Search(Π, l, M, best)
7:
if l == n then
8:
calculate Z([Π, fn (·)]) from Z([Πn−1 , fn−1 (·)]) in M
9:
return max{max Z([Π, fn (·)]), best}
10:
else
11:
for i = l + 1 to n do
12:
Swap cities l + 1 and i in Π
13:
Set M’ = Calculate Z([Πl+1 , fl+1 (·)]) from Z([Πl , fl (·)]) in M
14:
if max EU ([Πl+1 , fl+1 (·)]) > best then
15:
best = max{best, Search(Π, l + 1, M 0 , best) }
16:
Swap cities l + 1 and i in Π
17:
return best
A way to tighten the upper bound EU is by providing a better estimation
of the remaining distance from the current city k to the last city of the tour.
Currently, the shortest distance from k to 1, i.e. dk1 , is used. The following two
ways can improve the estimation: (i) the use of distance df 1 from city f to city
1, where f is the farthest unvisited city from 1; (ii) the use of distance d∗ − dt ,
where d∗ is the shortest path that can be pre-calculated and dt is the distance
passed so far to achieve city k in the tour Π. These two ideas can be joined
together by using the max{df , (d∗ − dt )} to enhance the result.
3.3
Constraint Programming
Now, we present our third exact approach adopting the existing state-of-theart constraint programming (CP) paradigm [9]. Our model employs a simple permutation based representation of the tour that allows the use of the
AllDifferent filtering algorithm [2]. Similarly to the Section 2, a vector
W = (W1 , . . . , Wn ) is used to refer to the total weights accumulated in the
cities of tour Π. Specifically, Wi is the weight of the knapsack when the thief
departs from city i. The model bases the search on two types of decision variables:
• x denotes the particular positions of the cities in tour Π. Variable xi takes
the value of j ∈ N to indicate that j is the ith city to be visited. The
initial variable domain of x1 is D (x1 ) = {1} and it is D (xi ) = N \ {i} for
any subsequently visited city i = 2, . . . , n.
5
• y signals on the selection of an item in the packing plan P . Variable yik ,
i ∈ N , k ∈ Mi , is binary, therefore D (yik ) = {0, 1}.
Furthermore, an integer-valued vector d is used to express the distance matrix so
that its element n (xi − 1)+xi+1 equals the distance dxi xi+1 between two consecutive cities xi and xi+1 in Π. The model relies on the AllDifferent[x1 , . . . , xn ]
constraint, which ensures that the values of x1 , . . . , xn are distinct. It also involves the Element(g, h) expression, which returns the hth variable in the list
of variables g. In total, the model (CPTTP) consists of the following objective
function and constraints:
max
mi
n X
X
pij yij
i=1 j=1
−R
n−1
X
i=1
Element(d, n (xn − 1) + 1)
Element(d, n (xi − 1) + xi+1 )
+
vmax − νElement(W, xi )
vmax − νElement(W, xn )
AllDifferent[x1 , . . . , xn ]
X
Wi = Wi−1 +
wij yij , i ∈ {2, . . . , n}
!
(2)
(3)
(4)
j∈Mi
Wn ≤ C
(5)
Expression (2) calculates the objective value according to function (1). Constraint (3) verifies that all the cities are assigned to different positions, and thus
are visited exactly once. This is a sub-tour elimination constraint. Equation (4)
calculates the weight Wi of all the items collected in the cities 1, . . . , i. Equation (5) is a capacity constraint.
The performance of a CP model depends on its solver; specifically, on the
filtering algorithms and on the search strategies it applies. Here, we use IBM
ILOG CP Optimizer 12.6.2 with its searching algorithm set to the restart
mode. This mode adopts a general purpose search strategy [18] inspired from
integer programming techniques and is based on the concept of the impact of
a variable. The impact measures the importance of a variable in reducing the
search space. The impacts, which are learned from the observation of the domains’ reduction during the search, help the restart mode dramatically improve
the performance of the search. Within the search, the cities are assigned to the
positions first and then the items are decided on. Therefore, the solver instantiates x1 , . . . , xn prior to y21 , . . . , ynmn variables applying its default selection
strategy. Our extensive study shows that such an order gives the best results
fast.
4
Computational Experiments
In this section, we first compare the performance of the exact approaches to
TTP in order to find the best one for setting the baseline for the subsequent
comparison of the approximate approaches. Our experiments run on the CPU
6
cluster of the Phoenix HPC at the University of Adelaide, which contains 3072
Intel(R) Xeon(R) 2.30GHz CPU cores and 12TB of memory. We allocate one
CPU core and 32GB of memory to each individual experiment.
4.1
Computational Set Up
Instance
eil51 n05
eil51 n06
eil51 n07
eil51 n08
eil51 n09
eil51 n10
eil51 n11
eil51 n12
eil51 n13
eil51 n14
eil51 n15
eil51 n16
eil51 n17
eil51 n18
eil51 n19
eil51 n20
m4 uncorr 01
m5 uncorr 01
m6 uncorr 01
m7 uncorr 01
m8 uncorr 01
m9 uncorr 01
m10 uncorr 01
m11 uncorr 01
m12 uncorr 01
m13 uncorr 01
m14 uncorr 01
m15 uncorr 01
m16 uncorr 01
m17 uncorr 01
m18 uncorr 01
m19 uncorr 01
n
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Running time (in seconds)
DP
BnB
CP
0.018
0.023
0.222
0.07
0.079
0.24
0.143
0.195
0.497
0.343
0.505
4.594
0.633
1.492
63.838
0.933
5.188
776.55
2.414
23.106
12861.181
3.938
204.786
14.217
2007.074
13.408
36944.146
89.461
59.526
134.905
366.082
830.18
2456.873
-
m
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
Table 1: Columns ‘n’ and ‘m’ denote the number of cities and the number of
items, respectively. Running times are given in seconds for DP, BnB and CP
for different numbers of cities and items. ‘-’ denotes the case when an approach
failed to achieve an optimal solution in the given time limit.
To run our experiments, we generate an additional set of small-sized instances following the way proposed in [17]1 . We use only a single instance of
the original TSP library [19] as the starting point for our new subset. It is
entitled as eil51 and contains 51 cities. Out of these cities, we select uniformly
at random cities that we removed in order to obtain smaller test problems with
n = 5, . . . , 20 cities. To set up the knapsack component of the problem, we
adopt the approach given in [15] and use the corresponding problem generator
available in [? ]. As one of the input parameters, the generator asks for the
range of coefficients, which we set to 1000. In total, we create knapsack test
problems containing k(n−1), k ∈ {1, 5, 10} items and which are characterised by
a knapsack capacity category Q ∈ {1, 6, 10}. Our experiments focus on uncorrelated (uncorr), uncorrelated with similar weights (uncorr-s-w), and multiple
1 All
instances are available online: http://cs.adelaide.edu.au/~optlog/research/ttp.
php
7
strongly correlated (m-s-corr) types of instances. At the stage of assigning the
items of a knapsack instance to the particular cities of a given TSP tour, we
sort the items in descending order of their profits and the second city obtains
k, k ∈ {1, 5, 10}, items of the largest profits, the third city then has the next k
items, and so on. All the instances use the “CEIL 2D” for intra-city distances,
which means that the Euclidean distances are rounded up to the nearest integer.
We set υmin and υmax to 0.1 and 1.
Tables 1 and 3 illustrate the results of the experiments. The test instances’
names should be read as follows. First, eil51 stays for the name of the original
TSP problem. The values succeeding n and m denote the actual number of
cities and the total number of items, respectively, which are further followed by
the generation type of a knapsack problem. Finally, the postfixes 1, 6 and, 10
in the instances’ names describe the knapsack’s capacity C.
4.2
Comparison of the exact approaches
We compare the three exact algorithms by allocating each instance a generous
24-hour time limit. Our aim is to analyse the running time of the approaches
influenced by the increasing number of cities. Table 1 shows the running time
of the approaches.
4.3
Comparison between DP and Approximate Approaches
With the exact approaches being introduced, approximate approaches can be
evaluated with respect to their accuracy to the optima. In the case of the TTP,
most state-of-the-art approximate approaches are evolutionary algorithms and
local searches, such as Memetic Algorithm with 2-OPT and Bit-flip (MA2B),
CoSolver-based with 2-OPT, and Simulated Annealing (CS2SA) in [6], CoSolverbased with 2-OPT and Bit-flip (CS2B) in [5], and S1, S5, and C5 in [7].
4.3.1
Hybrid Approaches.
In addition to existing heuristics, we introduce enhanced approaches of S1 and
S5, which are hybrids of the two and that one of dynamic programming for
the PWT [14]. The original S1 and S5 work as follows. First, a single TSP
tour is computed using the Chained Lin-Kernighan-Heuristic [10], then a fast
packing heuristic is applied. S1 performs these two steps only once and only in
this order, while S5 repeats S1 until the time budget is exhausted. Our hybrids
DP-S1 and DP-S5 are equivalent to these two algorithms, however, they use the
exact dynamic programming to the PWT as a packing solver. This provides
better results as we can now compute the optimal packing for the sampled TSP
tours.
4.3.2
Results.
We start by showing a performance summary of 10 algorithms on 432 instances
in Table 2. In addition, Table 3 shows detailed results for a subset of the best
8
gap
avg
stdev
#opt
#1%
#10%
MA2B
0.3%
2.2%
312
265
324
CS2B
15.3%
17.8%
70
100
161
CS2SA
11.5%
16.7%
117
132
206
S1
38.9%
29.4%
3
10
27
S5
15.7%
24.6%
42
160
203
C5
09.9%
18.8%
193
193
240
DP-S1
30.1%
20.1%
5
9
33
DP-S5
3.3%
8.5%
85
245
288
Table 2: Performance summary of heuristic TTP solvers across all instances for
which the optimal result has been obtained. #opt is the number of times when
the average of 10 independent repetitions is equal to the optimum. #1% and
#10% show the number of times the averages are within 1% and 10%.
approaches on a subset of instances. Figure 1 shows the results of the entire
comparison. We include trend lines2 for two selected approaches, which we will
explain in the following.
We would like to highlight the following observations:
1. S1 performs badly across a wide range of instances. Its restart variant
S5 performs better, however, its lack of a local search becomes apart in
its relatively bad performance (compared to other approaches) on small
instances.
2. C5 performs better than both S1 and S5, which is most likely due to its
local searches that differentiate it from S1 and S5. Still, we can see a
“hump” in its trend line for smaller instances, which flattens out quickly
for larger instances.
3. The dynamic programming variants DP-S1 and DP-S5 perform slightly
better than S1 and S5, which shows the difference in quality of the packing
strategy; however, this is at times balanced out by the faster packing which
allows more TSP tours to be sampled. For small instances, DP-S5 lacks a
local search on the tours, which is why its gap to the optimum is relatively
large, as shown by the respective trend lines.
4. MA2B dominates the field with outstanding performance across all instances, independent of number of cities and number of items. Remarkable
is the high reliability with which it reaches a global optimum.
Interestingly, all approaches seem to have difficulties solving instances with
the knapsack configuration multiple-strongly-corr 01 (see Table 3). Compared
to the other two knapsack types, TTP-DP takes the longest to solve the strongly
correlated ones. Also, these tend to be the only instances for which the heuristics
rarely find optimal solutions, if at all.
2 They
are fitted polynomials of degree six used only for visualisation purposes.
9
Instance
eil51 n05
eil51 n05
eil51 n05
eil51 n05
eil51 n05
eil51 n05
eil51 n10
eil51 n10
eil51 n10
eil51 n10
eil51 n10
eil51 n10
eil51 n12
eil51 n12
eil51 n12
eil51 n12
eil51 n12
eil51 n12
eil51 n15
eil51 n15
eil51 n15
eil51 n15
eil51 n15
eil51 n15
eil51 n16
eil51 n16
eil51 n16
eil51 n16
eil51 n16
eil51 n16
eil51 n17
eil51 n17
eil51 n17
eil51 n17
eil51 n17
eil51 n17
eil51 n18
eil51 n18
eil51 n18
eil51 n18
eil51 n18
eil51 n18
eil51 n19
eil51 n19
eil51 n19
eil51 n19
eil51 n19
eil51 n19
eil51 n20
eil51 n20
eil51 n20
eil51 n20
eil51 n20
eil51 n20
m4 multiple-strongly-corr 01
m4 uncorr 01
m4 uncorr-similar-weights 01
m20 multiple-strongly-corr 01
m20 uncorr 01
m20 uncorr-similar-weights 01
m9 multiple-strongly-corr 01
m9 uncorr 01
m9 uncorr-similar-weights 01
m45 multiple-strongly-corr 01
m45 uncorr 01
m45 uncorr-similar-weights 01
m11 multiple-strongly-corr 01
m11 uncorr 01
m11 uncorr-similar-weights 01
m55 multiple-strongly-corr 01
m55 uncorr 01
m55 uncorr-similar-weights 01
m14 multiple-strongly-corr 01
m14 uncorr 01
m14 uncorr-similar-weights 01
m70 multiple-strongly-corr 01
m70 uncorr 01
m70 uncorr-similar-weights 01
m15 multiple-strongly-corr 01
m15 multiple-strongly-corr 10
m15 uncorr 01
m15 uncorr 10
m15 uncorr-similar-weights 01
m15 uncorr-similar-weights 10
m16 multiple-strongly-corr 01
m16 multiple-strongly-corr 10
m16 uncorr 01
m16 uncorr 10
m16 uncorr-similar-weights 01
m16 uncorr-similar-weights 10
m17 multiple-strongly-corr 01
m17 multiple-strongly-corr 10
m17 uncorr 01
m17 uncorr 10
m17 uncorr-similar-weights 01
m17 uncorr-similar-weights 10
m18 multiple-strongly-corr 01
m18 multiple-strongly-corr 10
m18 uncorr 01
m18 uncorr 10
m18 uncorr-similar-weights 01
m18 uncorr-similar-weights 10
m19 multiple-strongly-corr 01
m19 multiple-strongly-corr 10
m19 uncorr 01
m19 uncorr 10
m19 uncorr-similar-weights 01
m19 uncorr-similar-weights 10
TTP-DP
OPT
RT
619.227
0.02
466.929
0.02
299.281
0.02
773.573
0.08
2144.796
0.07
269.015
0.04
573.897
1.21
1125.715
0.93
753.230
0.86
1091.127 14.89
6009.431
6.39
3009.553
8.87
648.546
4.58
1717.699
3.94
774.107
3.36
1251.780 117.99
8838.012 35.79
3734.895 38.36
547.419 39.82
2392.996 89.46
637.419 16.35
920.372 3984.29
9922.137 740.22
4659.623 867.78
794.745 105.5
4498.848 623.4
2490.889
59.5
3601.077 211.5
540.897
36.4
3948.211 245.4
685.565 248.6
3826.098 2190.4
2342.664 134.9
2275.279 554.5
556.851
70.8
2935.961 787.7
834.031 715.7
5531.373 6252.4
2644.491 366.1
3222.603 1462.7
532.906 148.3
4420.438 1929.3
910.229 1771.6
2604.844 830.2
4048.408 3884.3
472.186 412.3
5573.695 5878.8
518.189 4533.7
2092.673 2456.9
3044.391 12776.0
451.052 1007.7
4169.799 15075.7
MA2B
Gap Std RT
29.1 12.1 2.71
0.0 0.0 3.22
0.0 0.0 3.21
13.4 0.0 1.44
0.0 0.0 3.35
0.0 0.0 3.51
0.0 0.0 6.07
0.0 0.0 6.06
0.0 0.0 5.87
0.0 0.0 7.99
0.0 0.0 8.6
0.0 0.0 6.78
0.0 0.0 6.08
0.0 0.0 7.21
0.0 0.0 7.03
0.0 0.0 9.19
0.0 0.0 9.76
12.3 0.0 8.34
0.0 0.0 7.87
0.0 0.0 7.28
0.0 0.0 6.86
2.1 1.1 12.11
0.0 0.0 9.67
0.0 0.0 7.98
0.0 0.0 7.7
0.0 0.0 9.1
1.0 0.7 8.4
0.0 0.0 9.0
0.0 0.0 8.5
0.0 0.0 8.7
0.0 0.0 8.4
0.0 0.0 9.8
0.0 0.0 8.3
0.0 0.0 9.6
0.0 0.0 8.1
0.0 0.0 9.7
7.9 0.8 10.2
0.0 0.0 10.5
0.0 0.0 9.7
0.0 0.0 10.3
0.0 0.0 8.5
0.0 0.0 9.9
0.0 0.0 9.3
- 10.4
0.0 0.0 9.7
0.0 0.0 10.9
0.0 0.0 9.2
0.0 0.0 10.5
0.6 0.6 11.1
- 12.1
0.0 0.0 8.7
0.0 0.0 9.8
0.0 0.0 7.9
0.0 0.0 9.4
C5
Gap
35.5
0.0
7.8
14.3
7.4
0.0
0.0
0.0
0.0
0.0
6.6
0.0
4.6
0.0
0.0
0.0
0.0
12.3
14.1
3.8
0.0
0.0
7
0.0
18.9
12.9
1.6
7.1
0.0
5.8
0.2
0.0
0.0
0.0
0.0
0.0
9.2
0.4
0.2
0.0
0.0
0.0
20.1
0.0
0.0
0.0
0.0
14.1
0.0
0.0
0.0
0.0
Std
1.20e-6
2.20e-6
2.40e-6
0.0
0.0
2.30e-6
0.0
1.30e-6
0.0
0.0
2.30e-6
2.30e-6
2.20e-6
1.20e-6
2.30e-6
0.0
0.0
0.0
1.30e-6
0.0
1.60e-6
2.70e-6
1.20e-6
0.0
1.6e-6
0.0
2.3e-6
1.6e-6
3.0e-6
1.5e-6
1.5e-6
1.5e-6
0.0
0.0
0.0
0.0
0.0
1.5e-6
0.0
1.3e-6
1.3e-6
2.9e-6
1.6e-6
0.0
1.4e-6
1.5e-6
0.0
1.4e-6
0.0
0.0
0.0
0.0
DP-S5
Gap
Std
41.3
0.0
0.0 2.20e-6
7.8 1.20e-6
12.8
0.0
6.6 2.30e-6
0.0
0.0
0.0
0.0
0.0 1.30e-6
0.0
0.0
0.0
0.0
0.0
0.0
0.0 2.30e-6
4.6 2.20e-6
0.0 1.20e-6
0.0 2.30e-6
0.0
0.0
0.0
0.0
0.2
0.0
13.3 1.30e-6
3.8
0.0
0.0 1.60e-6
0.0 2.70e-6
1.9
0.0
0.0
0.0
18.9 1.6e-6
16.6 1.3e-6
1.6 2.3e-6
7.1 1.6e-6
0.0 3.0e-6
13.6
0.0
0.0 1.5e-6
0.0 1.5e-6
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
12.9 1.7e-6
0.4 1.5e-6
1.8
0.0
0.2
0.0
0.0 1.3e-6
0.3 1.8e-6
20.1 1.6e-6
0.0
0.0
0.0 1.4e-6
0.0 1.5e-6
0.0
0.0
12.3
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
Table 3: Comparison between DP and the approximate approaches running in
10 minutes limits. Each approximate algorithm runs 10 times for each instance
T −Obj
and use the average as the objective Obj. Gap is measured by OPOP
% and
T
runtime (RT) is in second. The results of C5 and DP-S5 are obtained when
they reach the time limit of 10 minutes per instance. Highlighted in blue are
the best approximate results. DP runs out of memory for the instances without
results.
10
Figure 1: Showing a gap to an optimal solution when one has been obtained
by an exact approach. From left to right: the 432 instances first sorted by the
number of cities, then by the total number of items.
5
Conclusion
The traveling thief problem (TTP) has attracted significant attention in recent
years within the evolutionary computation community. In this paper, we have
presented and evaluated exact approaches for the TTP based on dynamic programming, branch and bound, and constraint programming. We have used the
exact solutions provided by our DP approach to evaluate the performance of
current state-of-the-art TTP solvers. Our investigations show that they are obtaining in most cases (close to) optimal solutions. However, for a small fraction
of tested instances we obverse a gap to the optimal solution of more than 10%.
Acknowledgements
This work was supported by the Australian Research councils through grants
DP130104395 and DE160100850, and by the supercomputing resources provided
by the Phoenix HPC service at the University of Adelaide.
References
[1] D. Applegate, R. Bixby, V. Chvatal, and W. Cook. Concorde tsp solver.
http://www.math.uwaterloo.ca/tsp/concorde.html, 2006.
[2] P. Benchimol, W.-J. v. Hoeve, J.-C. Régin, L.-M. Rousseau, and M. Rueher.
11
Improved filtering for weighted circuit constraints. Constraints, 17(3):205–
233, Jul 2012. ISSN 1572-9354. doi: 10.1007/s10601-012-9119-x.
[3] M. Bonyadi, Z. Michalewicz, and L. Barone. The travelling thief problem:
The first step in the transition from theoretical problems to realistic problems. In Evolutionary Computation (CEC), 2013 IEEE Congress on, pages
1037–1044, 2013.
[4] M. R. Bonyadi, Z. Michalewicz, M. R. Przybylek, and A. Wierzbicki. Socially inspired algorithms for the travelling thief problem. In Proceedings
of the 2014 Annual Conference on Genetic and Evolutionary Computation,
GECCO ’14, pages 421–428. ACM, 2014.
[5] M. El Yafrani and B. Ahiod. Cosolver2b: An efficient local search heuristic
for the travelling thief problem. In Computer Systems and Applications
(AICCSA), 2015 IEEE/ACS 12th International Conference of, pages 1–5.
IEEE, 2015.
[6] M. El Yafrani and B. Ahiod. Population-based vs. single-solution heuristics
for the travelling thief problem. In Proceedings of the Genetic and Evolutionary Computation Conference 2016, GECCO ’16, pages 317–324. ACM,
2016.
[7] H. Faulkner, S. Polyakovskiy, T. Schultz, and M. Wagner. Approximate
approaches to the traveling thief problem. In Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, GECCO ’15,
pages 385–392. ACM, 2015.
[8] M. Held and R. M. Karp. A dynamic programming approach to sequencing
problems. In Proceedings of the 1961 16th ACM National Meeting, ACM
’61, pages 71.201–71.204. ACM, 1961.
[9] J. N. Hooker. Logic, optimization, and constraint programming. INFORMS
Journal on Computing, 14(4):295 – 321, 2002.
[10] S. Lin and B. W. Kernighan. An effective heuristic algorithm for the
traveling-salesman problem. Operations research, 21(2):498–516, 1973.
[11] Y. Mei, X. Li, and X. Yao. Improving Efficiency of Heuristics for the
Large Scale Traveling Thief Problem, pages 631–643. Springer International Publishing, Cham, 2014. ISBN 978-3-319-13563-2. doi: 10.1007/
978-3-319-13563-2 53.
[12] Y. Mei, X. Li, F. Salim, and X. Yao. Heuristic evolution with genetic programming for traveling thief problem. In 2015 IEEE Congress
on Evolutionary Computation (CEC), pages 2753–2760, May 2015. doi:
10.1109/CEC.2015.7257230.
12
[13] Y. Mei, X. Li, and X. Yao. On investigation of interdependence between
sub-problems of the travelling thief problem. Soft Computing, 20(1):157–
172, 2016.
[14] F. Neumann, S. Polyakovskiy, M. Skutella, L. Stougie, and J. Wu. A
Fully Polynomial Time Approximation Scheme for Packing While Traveling. ArXiv e-prints, 2017.
[15] D. Pisinger. Where are the hard knapsack problems? Comput. Oper. Res.,
32(9):2271–2284, Sept. 2005. ISSN 0305-0548. doi: 10.1016/j.cor.2004.03.
002.
[16] S. Polyakovskiy and F. Neumann. The packing while traveling problem.
European Journal of Operational Research, 258(2):424 – 439, 2017.
[17] S. Polyakovskiy, M. R. Bonyadi, M. Wagner, Z. Michalewicz, and F. Neumann. A comprehensive benchmark set and heuristics for the traveling
thief problem. In Proceedings of the 2014 Annual Conference on Genetic
and Evolutionary Computation, GECCO ’14, pages 477–484. ACM, 2014.
[18] P. Refalo. Principles and Practice of Constraint Programming – CP
2004, chapter Impact-Based Search Strategies for Constraint Programming,
pages 557–571. Springer, 2004.
[19] G. Reinelt. TSPLIB- a traveling salesman problem library. ORSA Journal
of Computing, 3(4):376–384, 1991.
[20] T. Stützle and H. H. Hoos. MAX MIN Ant System. Future Generation
Computer Systems, 16(8):889 – 914, 2000.
[21] M. Wagner. Stealing items more efficiently with ants: A swarm intelligence approach to the travelling thief problem. In M. Dorigo, M. Birattari,
X. Li, M. López-Ibáñez, K. Ohkura, C. Pinciroli, and T. Stützle, editors,
Swarm Intelligence: 10th International Conference, ANTS 2016, Brussels,
Belgium, September 7-9, 2016, Proceedings, pages 273–281. Springer, 2016.
[22] M. Wagner, M. Lindauer, M. Mısır, S. Nallaperuma, and F. Hutter. A
case study of algorithm selection for the traveling thief problem. Journal
of Heuristics, pages 1–26, 2017.
13
| 8cs.DS
|
arXiv:1711.04323v1 [cs.CV] 12 Nov 2017
High-Order Attention Models for Visual Question
Answering
Idan Schwartz
Department of Computer Science
Technion
[email protected]
Alexander G. Schwing
Department of Electrical and Computer Engineering
University of Illinois at Urbana-Champaign
[email protected]
Tamir Hazan
Department of Industrial Engineering & Management
Technion
[email protected]
Abstract
The quest for algorithms that enable cognitive abilities is an important part of
machine learning. A common trait in many recently investigated cognitive-like
tasks is that they take into account different data modalities, such as visual and
textual input. In this paper we propose a novel and generally applicable form
of attention mechanism that learns high-order correlations between various data
modalities. We show that high-order correlations effectively direct the appropriate
attention to the relevant elements in the different data modalities that are required
to solve the joint task. We demonstrate the effectiveness of our high-order attention
mechanism on the task of visual question answering (VQA), where we achieve
state-of-the-art performance on the standard VQA dataset.
1
Introduction
The quest for algorithms which enable cognitive abilities is an important part of machine learning
and appears in many facets, e.g., in visual question answering tasks [6], image captioning [26],
visual question generation [18, 10] and machine comprehension [8]. A common trait in these recent
cognitive-like tasks is that they take into account different data modalities, for example, visual and
textual data.
To address these tasks, recently, attention mechanisms have emerged as a powerful common theme,
which provides not only some form of interpretability if applied to deep net models, but also often
improves performance [8]. The latter effect is attributed to more expressive yet concise forms of the
various data modalities. Present day attention mechanisms, like for example [15, 26], are however
often lacking in two main aspects. First, the systems generally extract abstract representations of
data in an ad-hoc and entangled manner. Second, present day attention mechanisms are often geared
towards a specific form of input and therefore hand-crafted for a particular task.
To address both issues, we propose a novel and generally applicable form of attention mechanism
that learns high-order correlations between various data modalities. For example, second order
correlations can model interactions between two data modalities, e.g., an image and a question, and
more generally, k−th order correlations can model interactions between k modalities. Learning these
correlations effectively directs the appropriate attention to the relevant elements in the different data
modalities that are required to solve the joint task.
We demonstrate the effectiveness of our novel attention mechanism on the task of visual question
answering (VQA), where we achieve state-of-the-art performance on the VQA dataset [2]. Some
Original Image
Unary Potentials
Pairwise Potentials
Final Attention
What does the man
have on his head?
What does the man
have on his head?
What does the man
have on his head?
What does the man
have on his head?
How many cars
are in the picture?
How many cars are
in the picture?
How many cars are
in the picture?
How many cars are in
the picture?
Figure 1: Results of our multi-modal attention for one image and two different questions (1st
column). The unary image attention is identical by construction. The pairwise potentials differ
for both questions and images since both modalities are taken into account (3rd column). The final
attention is illustrated in the 4th column.
of our results are visualized in Fig. 1, where we show how the visual attention correlates with the
textual attention.
We begin by reviewing the related work. We subsequently provide details of our proposed technique,
focusing on the high-order nature of our attention models. We then conclude by presenting the
application of our high-order attention mechanism to VQA and compare it to the state-of-the-art.
2
Related work
Attention mechanisms have been investigated for both image and textual data. In the following we
review mechanisms for both.
Image attention mechanisms: Over the past few years, single image embeddings extracted from a
deep net (e.g., [17, 16]) have been extended to a variety of image attention modules, when considering
VQA. For example, a textual long short term memory net (LSTM) may be augmented with a spatial
attention [29]. Similarly, Andreas et al. [1] employ a language parser together with a series of neural
net modules, one of which attends to regions in an image. The language parser suggests which neural
net module to use. Stacking of attention units was also investigated by Yang et al. [27]. Their stacked
attention network predicts the answer successively. Dynamic memory network modules which capture
contextual information from neighboring image regions has been considered by Xiong et al. [24].
Shih et al. [23] use object proposals and and rank regions according to relevance. The multi-hop
attention scheme of Xu et al. [25] was proposed to extract fine-grained details. A joint attention
mechanism was discussed by Lu et al. [15] and Fukui et al. [7] suggest an efficient outer product
mechanism to combine visual representation and text representation before applying attention over
the combined representation. Additionally, they suggested the use of glimpses. Very recently, Kazemi
et al. [11] showed a similar approach using concatenation instead of outer product. Importantly, all of
these approaches model attention as a single network. The fact that multiple modalities are involved
is often not considered explicitly which contrasts the aforementioned approaches from the technique
we present.
Very recently Kim et al. [14] presented a technique that also interprets attention as a multi-variate
probabilistic model, to incorporate structural dependencies into the deep net. Other recent techniques
are work by Nam et al. [19] on dual attention mechanisms and work by Kim et al. [13] on bilinear
2
models. In contrast to the latter two models our approach is easy to extend to any number of data
modalities.
Textual attention mechanisms: We also want to provide a brief review of textual attention. To
address some of the challenges, e.g., long sentences, faced by translation models, Hermann et al. [8]
proposed RNNSearch. To address the challenges which arise by fixing the latent dimension of neural
nets processing text data, Bahdanau et al. [3] first encode a document and a query via a bidirectional
LSTM which are then used to compute attentions. This mechanism was later refined in [22] where
a word based technique reasons about sentence representations. Joint attention between two CNN
hierarchies is discussed by Yin et al. [28].
Among all those attention mechanisms, relevant to our approach is work by Lu et al. [15] and the
approach presented by Xu et al. [25]. Both discuss attention mechanisms which operate jointly over
two modalities. Xu et al. [25] use pairwise interactions in the form of a similarity matrix, but ignore
the attentions on individual data modalities. Lu et al. [15] suggest an alternating model, that directly
combines the features of the modalities before attending. Additionally, they suggested a parallel
model which uses a similarity matrix to map features for one modality to the other. It is hard to extend
this approach to more than two modalities. In contrast, our model develops a probabilistic model,
based on high order potentials and performs mean-field inference to obtain marginal probabilities.
This permits trivial extension of the model to any number of modalities.
Additionally, Jabri et al. [9] propose a model where answers are also used as inputs. Their approach
questions the need of attention mechanisms and develops an alternative solution based on binary
classification. In contrast, our approach captures high-order attention correlations, which we found to
improve performance significantly.
Overall, while there is early work that propose a combination of language and image attention for
VQA, e.g., [15, 25, 12], attention mechanism with several potentials haven’t been discussed in detail
yet. In the following we present our approach for joint attention over any number of modalities.
3
Higher order attention models
Attention modules are a crucial component for present day decision making systems. Particularly
when taking into account more and more data of different modalities, attention mechanisms are able
to provide insights into the inner workings of the oftentimes abstract and automatically extracted
representations of our systems.
An example of such a system that captured a lot of research efforts in recent years is Visual Question
Answering (VQA). Considering VQA as an example, we immediately note its dependence on two or
even three different data modalities, the visual input V , the question Q and the answer A, which get
processed simultaneously. More formally, we let
V ∈ Rnv ×d , Q ∈ Rnq ×d , A ∈ Rna ×d
denote a representation for the visual input, the question and the answer respectively. Hereby, nv , nq
and na are the number of pixels, the number of words in the question, and the number of possible
answers. We use d to denote the dimensionality of the data. For simplicity of the exposition we
assume d to be identical across all data modalities.
Due to this dependence on multiple data modalities, present day decision making systems can be
decomposed into three major parts: (i) the data embedding; (ii) attention mechanisms; and (iii) the
decision making. For a state-of-the-art VQA system such as the one we developed here, those three
parts are immediately apparent when considering the high-level system architecture outlined in Fig. 2.
3.1
Data embedding
Attention modules deliver to the decision making component a succinct representation of the relevant
data modalities. As such, their performance depends on how we represent the data modalities
themselves. Oftentimes, an attention module tends to use expressive yet concise data embedding
algorithms to better capture their correlations and consequently to improve the decision making
performance. For example, data embeddings based on convolutional deep nets which constitute the
state-of-the-art in many visual recognition and scene understanding tasks. Language embeddings
heavily rely on LSTM which are able to capture context in sequential data, such as words, phrases
and sentences. We give a detailed account to our data embedding architectures for VQA in Sec. 4.1.
3
Yes
MCB
MCB
Unary
Potential
Decision (Sec. 3.3)
MCB
Ternary
Potential
Pairwise
Potential
Concatenate
LSTM
LSTM
1D-Conv
Word
Embedding
Unary
Potential
Softmax
Softmax
Softmax
Pairwise
Potential
Unary
Potential
Pairwise
Potential
Word
Embedding
ResNet
1. Yes
2. Yellow
…
17. No
18. Food
Is the dog trying
to catch a frisbee?
Attention (Sec. 3.2)
Data embedding (Sec. 3.1)
Figure 2: Our state-of-the-art VQA system
3.2
Attention
As apparent from the aforementioned description, attention is the crucial component connecting data
embeddings with decision making modules.
Subsequently we denote attention over the nq words in the question via PQ (iq ), where iq ∈
{1, . . . , nq } is the word index. Similarly, attention over the image is referred to via PV (iv ),
where iv ∈ {1, . . . , nv }, and attention over the possible answers are denoted PA (ia ), where
ia ∈ {1, . . . , na }.
We consider the attention mechanism as a probability model, with each attention mechanism computing “potentials.” First, unary potentials θV , θQ , θA denote the importance of each feature (e.g.,
question word representations, multiple choice answers representations, and image patch features)
for the VQA task. Second, pairwise potentials, θV,Q , θV,A , θQ,A express correlations between two
modalities. Last, third-order potential, θV,Q,A captures dependencies between the three modalities.
To obtain marginal probabilities PQ , PV and PA from potentials, our model performs mean-field
inference. We combine the unary potential, the marginalized pairwise potential and the marginalized
third order potential linearly including a bias term:
PV (iv ) = smax(α1 θV (iv )+α2 θV,Q (iv )+α3 θA,V (iv )+α4 θV,Q,A (iv ) + α5),
PQ (iq ) = smax(β1 θQ (iq )+β2 θV,Q (iq )+β3 θA,Q (iq )+β4 θV,Q,A (iq ) + β5),
PA (ia ) = smax(γ1 θA (ia )+γ2 θA,V (ia )+γ3 θA,Q (ia )+γ4 θV,Q.A (ia ) + γ5).
(1)
Hereby αi , βi , and γi are learnable parameters and smax(·) refers to the soft-max operation over
iv ∈ {1, . . . , nv }, iq ∈ {1, . . . , nq } and ia ∈ {1, . . . , na } respectively. The soft-max converts the
combined potentials to probability distributions, which corresponds to a single mean-field iteration.
Such a linear combination of potentials provides extra flexibility for the model, since it can learn
the reliability of the potential from the data. For instance, we observe that question attention relies
more on the unary question potential and on pairwise question and answer potentials. In contrast, the
image attention relies more on the pairwise question and image potential.
Given the aforementioned probabilities PV , PQ , and PA , the attended image, question and answer
vectors are denoted by aV ∈ Rd , aQ ∈ Rd and aA ∈ Rd . The attended modalities are calculated
as the weighted sum of the image features V = [v1 , . . . , vnv ]T ∈ Rnv ×d , the question features
Q = [q1 , . . . , qnq ]T ∈ Rnq ×d , and the answer features A = [a1 , . . . , ana ]T ∈ Rna ×d , i.e.,
aV =
nv
X
iv =1
PV (iv )viv ,
aQ =
nq
X
PQ (iq )qiq ,
iq =1
and
aV =
na
X
ia =1
4
PA (ia )aia .
tanh
conv
tanh
θQ,V,A (iq )
conv
tanh
θQ,V,A (iv )
conv
tanh
tanh
conv
conv
θQ,V (iv ) A
conv
Corr3
conv
V
Unary Potential
conv
conv
conv
θQ,V (iq )
conv
conv
tanh
V
Ternary Potential
Unary Potential
tanh
conv
Corr2
θV
conv
conv
tanh
V
Pairwise Potential
tanh
conv
Q
Unary Potential
conv
tanh
conv
θQ,V,A (ia )
conv
tanh
conv
tanh
conv
tanh
Corr3
tanh
The attended modalities, which effectively focus on the data relevant for the task, are passed to a
classifier for decision making, e.g., the ones discussed in Sec. 3.3. In the following we now describe
the attention mechanisms for unary, pairwise and ternary potentials in more detail.
conv
conv
module (e.g., visual and question) marginalized over its two data modalities. (c) ternary attention module (e.g.,
visual, question and answer) marginalized over its three data modalities..
conv
tanh
(a)
(b)
(c) Unary Pairwise
PairwisePotential
Ternary
Unary
Threeway
Threeway
Potential
Potential
Potential
Potential
Figure 3: IllustrationPotential
of our k−order
attention.
(a) unary attention module (e.g.,
visual).
(b)Potential
pairwise attention
conv
tanh
conv
Corr3
conv
Ternary Potential
Q
conv
Corr2
tanh
conv
Pairwise Potential
tanh
conv
Corr2
conv
Pairwise Potential
3.2.1 Unary potentials
We illustrate the unary attention schematically in Fig. 3 (a). The input to the unary attention module
is a data representation, i.e., either the visual representation V , the question representation Q, or the
answer representation A. Using those representations, we obtain the ‘unary potentials’ θV , θQ and
θA using a convolution operation with kernel size 1 × 1 over the data representation as an additional
embedding step, followed by a non-linearity (tanh in our case), followed by another convolution
operation with kernel size 1 × 1 to reduce embedding dimensionality. Since convolutions with kernel
size 1 × 1 are identical to matrix multiplies we formally obtain the unary potentials via
θV (iv ) = tanh(V Wv2 )Wv1 ,
θQ (iq ) = tanh(QWq2 )Wq1 ,
θA (ia ) = tanh(AWa2 )Wa1 .
where Wv1 , Wq1 , Wa1 ∈ Rd×1 , and Wv2 , Wq2 , Wa2 ∈ Rd×d are trainable parameters.
3.2.2 Pairwise potentials
Besides the mentioned mechanisms to generate unary potentials, we specifically aim at taking
advantage of pairwise attention modules, which are able to capture the correlation between the
representation of different modalities. Our approach is illustrated in Fig. 3 (b). We use a similarity
matrix between image and question modalities C2 = QWq (V Wv )> . Alternatively, the (i, j)-th entry
is the correlation (inner-product) of the i-th column of QWq and the j-th column of V Wv :
(C2 )i,j = corr2 ((QWq ):,i , (V Wv ):,j ),
corr2 (q, v) =
d
X
q l vl .
l=1
where Wq , Wv ∈ Rd×d are trainable parameters. We consider (C2 )i,j as a pairwise potential that
represents the correlation of the i-th word in a question and the j-th patch in an image. Therefore, to
retrieve the attention for a specific word, we convolve the matrix along the visual dimension using a
1 × 1 dimensional kernel. Specifically,
!
nq
nv
X
X
θV,Q (iq ) = tanh
wiv (C2 )iv ,iq , and θV,Q (iv ) = tanh
wiq (C2 )iv ,iq .
iv =1
iq =1
Similarly, we obtain θA,V and θA,Q , which we omit due to space limitations. These potentials are
used to compute the attention probabilities as defined in Eq. (1).
3.2.3
Ternary Potentials
To capture the dependencies between all three modalities, we consider their high-order correlations.
(C3 )i,j,k = corr3 ((QWq ):,i , (V Wv ):,j , (AWa ):,k ),
corr3 (q, v, a) =
d
X
l=1
5
ql vl al .
Threeway
Potential
Unary
Potential
Pairwise
Potential
v
h
v
T
P
Threeway
Potential
aV
aA
Outer Product
Space
Outer Product
(b)
Space
(a)
Outer Product
Space
MCB
MCB
MCT
aV
MCT
aQ
aQ
Pairwise
Potential
Unary
Potential
Figure 4: Illustration of correlation units used for decision making. (a) MCB unit approximately sample from
outer product space of two attention vectors, (b) MCT unit approximately sample from outer product space of
three attention vectors.
Where Wq , Wv , Wa ∈ Rd×d are trainable parameters. Similarly to the pairwise potentials, we use
the C3 tensor to obtain correlated attention for each modality:
!
nq na
nv X
na
X
X
X
θV,Q,A (iq ) = tanh
wiv ,ia (C3 )iq ,iv ,ia , θV,Q,A (iv ) = tanh
wiq ,ia (C3 )iq ,iv ,ia
iv =1 ia =1
iq =1 ia =1
and
θV,Q,A (ia ) = tanh
nq
nv X
X
wiq ,ia (C3 )iq ,iv ,ia .
iv =1 iq =1
These potentials are used to compute the attention probabilities as defined in Eq. (1).
3.3
Decision making
The decision making component receives as input the attended modalities and predicts the desired
output. Each attended modality is a vector that consists of the relevant data for making the decision.
While the decision making component can consider the modalities independently, the nature of
the task usually requires to take into account correlations between the attended modalities. The
correlation of a set of attended modalities are represented by the outer product of their respective
vectors, e.g., the correlation of two attended modalities is represented by a matrix and the correlation
of k-attended modalities is represented by a k-dimensional tensor.
Ideally, the attended modalities and their high-order correlation tensors are fed into a deep net which
produces the final decision. The number of parameters in such a network grows exponentially in
the number of modalities, as seen in Fig. 4. To overcome this computational bottleneck, we follow
the tensor sketch algorithm of Pham and Pagh [21], which was recently applied to attention models
by Fukui et al. [7] via Multimodal Compact Bilinear Pooling (MCB) in the pairwise setting or
Multimodal Compact Trilinear Pooling (MCT), an extension of MCB that pools data from three
modalities. The tensor sketch algorithm enables us to reduce the dimension of any rank-one tensor
while referring to it implicitly. It relies on the count sketch technique [4] that randomly embeds an
attended vector a ∈ Rd1 into another Euclidean space Ψ(a) ∈ Rd2 . The tensor sketch algorithm
then projects the rank-one tensor ⊗ki=1 ai which consists of attention correlations of order k using
the convolution Ψ(⊗ki=1 ai ) = ∗ki=1 Ψ(ai ). For example, for two attention modalities, the correlation
d2
matrix a1 a>
by the convolution Ψ(a1 ⊗a2 ) = Ψ(a1 )∗Ψ(a2 ).
2 = a1 ⊗a2 is randomly projected to R
The attended modalities Ψ(ai ) and their high-order correlations Ψ(⊗ki=1 ai ) are fed into a fully
connected neural net to complete decision making.
4
Visual question answering
In the following we evaluate our approach qualitatively and quantitatively. Before doing so we
describe the data embeddings.
4.1
Data embedding
The attention module requires the question representation Q ∈ Rnq ×d , the image representation
V ∈ Rnv ×d , and the answer representation A ∈ Rna ×d , which are computed as follows.
Image embedding: To embed the image, we use pre-trained convolutional deep nets (i.e., VGG-19,
ResNet). We extract the last layer before the fully connected units. Its dimension in the VGG net
case is 512 × 14 × 14 and the dimension in the ResNet case is 2048 × 14 × 14. Hence we obtain
6
Table 1: Comparison of results on the Multiple-Choice VQA dataset for a variety of methods. We
observe the combination of all three unary, pairwise and ternary potentials to yield the best result.
test-dev
test-std
Method
Y/N
Num
Other
All
All
HieCoAtt (VGG) [15]
HieCoAtt (ResNet) [15]
RAU (ResNet) [20]
MCB (ResNet) [7]
DAN (VGG) [19]
DAN (ResNet) [19]
MLB (ResNet) [13]
79.7
79.7
81.9
-
40.1
40.0
41.1
-
57.9
59.8
61.5
-
64.9
65.8
67.7
68.6
67.0
69.1
-
66.1
67.3
69.0
68.9
Unary+Pairwis (ResNet)
80.9
Unary+Pairwise (ResNet)
82.0
Unary + Pairwise + Ternary (VGG)
81.2
Unary + Pairwise + Ternary (ResNet) 81.6
36.0
42.7
42.7
43.3
61.6
63.3
62.3
64.8
66.7
68.7
67.9
69.4
68.7
69.3
2-Modalities:
3-Modalities:
3-Modalities:
3-Modalities:
nv = 196 and we embed both the 196 VGG-19 or ResNet features into a d = 512 dimensional space
to obtain the image representation V .
Question embedding: To obtain a question representation, Q ∈ Rnq ×d , we first map a 1-hot encoding of each word in the question into a d-dimensional embedding space using a linear transformation
plus corresponding bias terms. To obtain a richer representation that accounts for neighboring words,
we use a 1-dimensional temporal convolution with filter of size 3. While a combination of multiple
sized filters is suggested in the literature [15], we didn’t find any benefit from using such an approach.
Subsequently, to capture long-term dependencies, we used a Long Short Term Memory (LSTM)
layer. To reduce overfitting caused by the LSTM units, we used two LSTM layers with d/2 hidden
dimension, one uses as input the word embedding representation, and the other one operates on
the 1D conv layer output. Their output is then concatenated to obtain Q. We also note that nq is a
constant hyperparameter, i.e., questions with more than nq words are cut, while questions with less
words are zero-padded.
Answer embedding: To embed the possible answers we use a regular word embedding. The
vocabulary is specified by taking only the most frequent answers in the training set. Answers that
are not included in the top answers are embedded to the same vector. Answers containing multiple
words are embedded as n-grams to a single vector. We assume there is no real dependency between
the answers, therefore there is no need of using additional 1D conv, or LSTM layers.
4.2
Decision making
For our VQA example we investigate two techniques to combine vectors from three modalities. First,
the attended feature representation for each modality, i.e., aV , aA and aQ , are combined using an
MCT unit. Each feature element is of the form ((aV )i · (aQ )j · (aA )k ). While this first solution
is most general, in some cases like VQA, our experiments show that it is better to use our second
approach, a 2-layer MCB unit combination. This permits greater expressiveness as we employ
features of the form ((aV )i · (aQ )j · (aQ )k · (aA )t ) therefore also allowing image features to interact
with themselves. Note that in terms of parameters both approaches are identical as neither MCB nor
MCT are parametric modules.
Beyond MCB, we tested several other techniques that were suggested in the literature, including
element-wise multiplication, element-wise addition and concatenation [13, 15, 11], optionally followed by another hidden fully connected layer. The tensor sketching units consistently performed
best.
4.3
Results
Experimental setup: We use the RMSProp optimizer with a base learning rate of 4e−4 and α = 0.99
as well as = 1e−8 . The batch size is set to 300. The dimension d of all hidden layers is set to 512.
The MCB unit feature dimension was set to d = 8192. We apply dropout with a rate of 0.5 after the
word embeddings, the LSTM layer, and the first conv layer in the unary potential units. Additionally,
for the last fully connected layer we use a dropout rate of 0.3. We use the top 3000 most frequent
7
How many glasses are on the table?
How many glasses are on the table?
How many glasses are on the table?
Is anyone in the scene wearing blue?
Is anyone in the scene wearing blue?
Is anyone in the scene wearing blue?
What kind of flooring is in the bathroom?
What kind of flooring is in the bathroom?
What kind of flooring is in the bathroom?
What room is this?
What room is this?
What room is this?
st
Figure 5: For each image (1 column) we show the attention generated for two different questions in columns
2-4 and columns 5-7 respectively. The attentions are ordered as unary attention, pairwise attention and combined
attention for both the image and the question. We observe the combined attention to significantly depend on the
question.
Is this animal drinking water?
What kind of animal is this?
no
... this
red
no
yes
white
forks
4
1
tomatoes
presidential
blue
3
13
green
2
fila
i ... don't
Is this animal drinking water?
0.00
blue
red
cutting ... cake
green
bear
1
white
objazd
3
elephant
4
giraffe
yes
reject
cow
2
spain
no
0.02
0.04
0.06
0.08
Attention
0.10
0.12
0.14
What kind of animal is this?
0.00
0.02
0.04
0.00
0.08 0.10
Attention
0.12
0.14
0.16
3
not
white
1
on ... boy's
red
yes
4
no
2
aspro
pimp
player
blue
pain
if ... you've
green
no ... image
yes
next ... to
blue
green
parka
3
1
pirates
gadzoom
picture ... of
2
picture
clock
no
4
white
photo
red
What is on the wall?
0.06
Is a light on?
What is on the wall?
0.02
0.04
0.06
0.08 0.10
Attention
0.12
0.14
0.16
Is a light on?
0.00
0.02
0.04
0.06
Attention
0.08
0.10
0.12
Figure 6: The attention generated for two different questions over three modalities. We find the attention over
multiple choice answers to emphasis the unusual answers.
answers as possible outputs, which covers 91% of all answers in the train set. We implemented our
models using the Torch framework1 [5].
As a comparison for our attention mechanism we use the approach of Lu et al. [15] and the technique
of Fukui et al. [7]. Their methods are based on a hierarchical attention mechanism and multi-modal
compact bilinear (MCB) pooling. In contrast to their approach we demonstrate a relatively simple
technique based on a probabilistic intuition grounded on potentials. For comparative reasons only,
the visualized attention is based on two modalities: image and question.
We evaluate our attention modules on the VQA real-image test-dev and test-std datasets [2]. The
dataset consists of 123, 287 training images and 81, 434 test set images. Each image comes with 3
questions along with 18 multiple choice answers.
Quantitative evaluation: We first evaluate the overall performance of our model and compare it to a
variety of baselines. Tab. 1 shows the performance of our model and the baselines on the test-dev and
the test-standard datasets for multiple choice (MC) questions. To obtain multiple choice results we
follow common practice and use the highest scoring answer among the provided ones. Our approach
(Fig. 2) for the multiple choice answering task achieved the reported result after 180,000 iterations,
which requires about 40 hours of training on the ‘train+val’ dataset using a TitanX GPU. Despite
the fact that our model has only 40 million parameters, while techniques like [7] use over 70 million
parameters, we observe state-of-the-art behavior. Additionally, we employ a 2-modality model having
a similar experimental setup. We observe a significant improvement for our 3-modality model, which
shows the importance of high-order attention models. Due to the fact that we use a lower embedding
dimension of 512 (similar to [15]) compared to 2048 of existing 2-modality models [13, 7], the
2-modality model achieves inferior performance. We believe that higher embedding dimension and
proper tuning can improve our 2-modality starting point.
Additionally, we compared our proposed decision units. MCT, which is a generic extension of MCB
for 3-modalities, and 2-layers MCB which has greater expressiveness (Sec. 4.2). Evaluating on the
’val’ dataset while training on the ’train’ part using the VGG features, the MCT setup yields 63.82%
1
https://github.com/idansc/HighOrderAtten
8
Is she using a battery-operated device?
Is this a boy or a girl?
Is she using a battery-operated device?
Is she using a
battery device?
Ours: yes
[15]: no
[7]: no
GT: yes
Is this a boy or a girl?
Is this boy
or a girl?
Ours: girl
[15]: boy
[7]: girl
GT: girl
Figure 7: Comparison of our attention results (2nd column) with attention provided by [15] (3rd column)
and [7] (4th column). The fourth column provides the question and the answer of the different techniques.
What color is
the table?
GT: brown
Ours: blue
What color is the table?
What color is the table?
What color is the table?
What color is
the umbrella?
GT: blue
Ours: blue
What color is the umbrella?
What color is the umbrella?
What color is the umbrella?
Figure 8: Failure cases: Unary, pairwise and combined attention of our approach. Our system
focuses on the colorful umbrella as opposed to the table in the first row.
where 2-layer MCB yields 64.57%. We also tested a different ordering of the input to the 2-modality
MCB and found them to yield inferior results.
Qualitative evaluation: Next, we evaluate our technique qualitatively. In Fig. 5 we illustrate the
unary, pairwise and combined attention of our approach based on the two modality architecture,
without the multiple choice as input. For each image we show multiple questions. We observe the
unary attention usually attends to strong features of the image, while pairwise potentials emphasize
areas that correlate with question words. Importantly, the combined result is dependent on the
provided question. For instance, in the first row we observe for the question “How many glasses are
on the table?,” that the pairwise potential reacts to the image area depicting the glass. In contrast, for
the question “Is anyone in the scene wearing blue?” the pairwise potentials reacts to the guy with the
blue shirt. In Fig. 6, we illustrate the attention for our 3-modality model. We find the attention over
multiple choice answers to favor the more unusual results.
In Fig. 7, we compare the final attention obtained from our approach to the results obtained with
techniques discussed in [15] and [7]. We observe that our approach attends to reasonable pixel and
question locations. For example, considering the first row in Fig. 7, the question refers to the battery
operated device. Compared to existing approaches, our technique attends to the laptop, which seems
to help in choosing the correct answer. In the second row, the question wonders “Is this a boy or a
girl?”. Both of the correct answers were produced when the attention focuses on the hair.
In Fig. 8, we illustrate a failure case, where the attention of our approach is identical, despite two
different input questions. Our system focuses on the colorful umbrella as opposed to the object
queried for in the question.
5
Conclusion
In this paper we investigated a series of techniques to design attention for multimodal input data.
Beyond demonstrating state-of-the-art performance using relatively simple models, we hope that this
work inspires researchers to work in this direction.
9
Acknowledgments: This research was supported in part by The Israel Science Foundation (grant
No. 948/15). This material is based upon work supported in part by the National Science Foundation
under Grant No. 1718221. We thank Nvidia for providing GPUs used in this research.
References
[1] Jacob Andreas, Marcus Rohrbach, Trevor Darrell, and Dan Klein. Learning to compose neural networks
for question answering. arXiv preprint arXiv:1601.01705, 2016.
[2] Stanislaw Antol, Aishwarya Agrawal, Jiasen Lu, Margaret Mitchell, Dhruv Batra, C Lawrence Zitnick,
and Devi Parikh. Vqa: Visual question answering. In ICCV, 2015.
[3] Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. Neural machine translation by jointly learning
to align and translate. arXiv preprint arXiv:1409.0473, 2014.
[4] Moses Charikar, Kevin Chen, and Martin Farach-Colton. Finding frequent items in data streams. In ICALP.
Springer, 2002.
[5] Ronan Collobert, Koray Kavukcuoglu, and Clément Farabet. Torch7: A matlab-like environment for
machine learning. In BigLearn, NIPS Workshop, number EPFL-CONF-192376, 2011.
[6] Abhishek Das, Harsh Agrawal, C Lawrence Zitnick, Devi Parikh, and Dhruv Batra. Human attention
in visual question answering: Do humans and deep networks look at the same regions? arXiv preprint
arXiv:1606.03556, 2016.
[7] Akira Fukui, Dong Huk Park, Daylen Yang, Anna Rohrbach, Trevor Darrell, and Marcus Rohrbach.
Multimodal compact bilinear pooling for visual question answering and visual grounding. arXiv preprint
arXiv:1606.01847, 2016.
[8] Karl Moritz Hermann, Tomas Kocisky, Edward Grefenstette, Lasse Espeholt, Will Kay, Mustafa Suleyman,
and Phil Blunsom. Teaching machines to read and comprehend. In NIPS, pages 1693–1701, 2015.
[9] Allan Jabri, Armand Joulin, and Laurens van der Maaten. Revisiting visual question answering baselines.
In ECCV. Springer, 2016.
[10] U. Jain∗ , Z. Zhang∗ , and A. G. Schwing. Creativity: Generating Diverse Questions using Variational
Autoencoders. In CVPR, 2017. ∗ equal contribution.
[11] Vahid Kazemi and Ali Elqursh. Show, ask, attend, and answer: A strong baseline for visual question
answering. arXiv preprint arXiv:1704.03162, 2017.
[12] Jin-Hwa Kim, Sang-Woo Lee, Donghyun Kwak, Min-Oh Heo, Jeonghee Kim, Jung-Woo Ha, and ByoungTak Zhang. Multimodal residual learning for visual qa. In NIPS, 2016.
[13] Jin-Hwa Kim, Kyoung-Woon On, Jeonghee Kim, Jung-Woo Ha, and Byoung-Tak Zhang. Hadamard
product for low-rank bilinear pooling. arXiv preprint arXiv:1610.04325, 2016.
[14] Yoon Kim, Carl Denton, Luong Hoang, and Alexander M Rush. Structured attention networks. arXiv
preprint arXiv:1702.00887, 2017.
[15] Jiasen Lu, Jianwei Yang, Dhruv Batra, and Devi Parikh. Hierarchical question-image co-attention for
visual question answering. In NIPS, 2016.
[16] Lin Ma, Zhengdong Lu, and Hang Li. Learning to answer questions from image using convolutional neural
network. arXiv preprint arXiv:1506.00333, 2015.
[17] Mateusz Malinowski, Marcus Rohrbach, and Mario Fritz. Ask your neurons: A neural-based approach to
answering questions about images. In ICCV, 2015.
[18] Nasrin Mostafazadeh, Ishan Misra, Jacob Devlin, Margaret Mitchell, Xiaodong He, and Lucy Vanderwende.
Generating natural questions about an image. arXiv preprint arXiv:1603.06059, 2016.
[19] Hyeonseob Nam, Jung-Woo Ha, and Jeonghee Kim. Dual attention networks for multimodal reasoning
and matching. arXiv preprint arXiv:1611.00471, 2016.
[20] Hyeonwoo Noh and Bohyung Han. Training recurrent answering units with joint loss minimization for
vqa. arXiv preprint arXiv:1606.03647, 2016.
[21] Ninh Pham and Rasmus Pagh. Fast and scalable polynomial kernels via explicit feature maps. In SIGKDD.
ACM, 2013.
10
[22] Tim Rocktäschel, Edward Grefenstette, Moritz Hermann, Karl, Tomáš Kočiskỳ, and Phil Blunsom.
Reasoning about entailment with neural attention. In ICLR, 2016.
[23] Kevin J Shih, Saurabh Singh, and Derek Hoiem. Where to look: Focus regions for visual question
answering. In CVPR, 2016.
[24] Caiming Xiong, Stephen Merity, and Richard Socher. Dynamic memory networks for visual and textual
question answering. arXiv preprint arXiv:1603.01417, 2016.
[25] Huijuan Xu and Kate Saenko. Ask, attend and answer: Exploring question-guided spatial attention for
visual question answering. In ECCV, pages 451–466. Springer, 2016.
[26] Kelvin Xu, Jimmy Ba, Ryan Kiros, Kyunghyun Cho, Aaron Courville, Ruslan Salakhudinov, Rich Zemel,
and Yoshua Bengio. Show, attend and tell: Neural image caption generation with visual attention. In ICML,
2015.
[27] Zichao Yang, Xiaodong He, Jianfeng Gao, Li Deng, and Alex Smola. Stacked attention networks for image
question answering. In CVPR, 2016.
[28] Wenpeng Yin, Hinrich Schütze, Bing Xiang, and Bowen Zhou. Abcnn: Attention-based convolutional
neural network for modeling sentence pairs. arXiv preprint arXiv:1512.05193, 2015.
[29] Yuke Zhu, Oliver Groth, Michael Bernstein, and Li Fei-Fei. Visual7w: Grounded question answering in
images. In CVPR, 2016.
11
| 2cs.AI
|
Double Deep Machine Learning
Moshe BenBassat ([email protected])
Arison School of Business, Interdisciplinary Center (IDC), Herzliya, Israel
Abstract
Very important breakthroughs in data-centric machine learning algorithms led to impressive performance in ‘transactional’
point applications such as detecting anger in speech, alerts from a Face Recognition system, or EKG interpretation. Nontransactional applications, e.g. medical diagnosis beyond the EKG results, require AI algorithms that integrate deeper and
broader knowledge in their problem-solving capabilities, e.g. integrating knowledge about anatomy and physiology of the heart
with EKG results and additional patient’s findings. Similarly, for military aerial interpretation, where knowledge about enemy
doctrines on force composition and spread helps immensely in situation assessment beyond image recognition of individual
objects.
An initiative is proposed to build Wikipedia for Smart Machines, meaning target readers are not human, but rather smart
machines. Named ReKopedia, the goal is to develop methodologies, tools, and automatic algorithms to convert humanity
knowledge that we all learn in schools, universities and during our professional life into Reusable Knowledge structures that
smart machines can use in their inference algorithms. Ideally, ReKopedia would be an open source shared knowledge repository
similar to the well-known shared open source software code repositories.
The Double Deep Learning approach advocates integrating data-centric machine self-learning techniques with machineteaching techniques to leverage the power of both and overcome their corresponding limitations. For illustration, an outline of a
$15M project is described to produce ReKo knowledge modules for medical diagnosis of about 1,000 disorders.
AI applications that are based solely on data-centric machine learning algorithms are typically point solutions for transactional
tasks that do not lend themselves to automatic generalization beyond the scope of the data sets they are based on. Today’s AI
industry is fragmented, and we are not establishing broad and deep enough foundations that will enable us to build higher level
‘generic’, ‘universal’ intelligence, let alone ‘super-intelligence’. We must find ways to create synergies between these fragments
and connect them with external knowledge sources, if we wish to scale faster the AI industry.
Examples in the article are based on- or inspired by- real-life non-transactional AI systems I deployed over decades of AI career
that benefit hundreds of millions of people around the globe. We are now in the second AI ‘spring’ after a long AI ‘winter’.
To avoid sliding again into an AI winter, it is essential that we rebalance the roles of data and knowledge. Data is
important but knowledge- deep and commonsense- are equally important.
1. Introduction
In recent years, Deep Learning (DL) algorithms achieved very important breakthroughs and outstanding results [10], [1];
primarily in image, speech and natural language understanding; leading to impressive performance in ‘transactional’ tasks such
as bank-check verification, detecting anger, alerts from a Face Recognition system, or EKG interpretation. DL algorithms use
data to automatically train neural networks to make intelligent inferences for tasks covered by the training data. They are based
on mathematical/statistical models which means that their behavior is predictable. Once trained to a certain level, they are likely
to perform consistently- within their statistical error boundaries- for cases within the scope of their training data. Another key
advantage of DL algorithms is the ‘no human touch feature engineering’ for pattern recognition tasks, meaning no need for
lengthy research projects requiring domain experts, e.g. fingerprints experts, or EKG experts, to find/extract good differentiating
features for classification decisions. Again, impressive achievements which are universal and domain-agnostic. During the early
part of my AI career, I could have certainly benefited from DL in many pattern recognition projects, including: object
recognition for a Ballistic Missile Defense system (cold war time), ultrasound wave recognition for an autonomous machine
digging coal on the moon, EKG, EEG/ERP waves, radar signals, and handwritten character recognition. I view DL’s
remarkable progress and achievements as key development in the future of AI; and as a mathematician, it is music to my ears.
However, with all due appreciation, DL algorithms have their limitations, as discussed below, specifically with ‘nontransactional’ applications that require broader and deeper reasoning; possibly involving multiple deep knowledge sources, e.g.
optimizing manufacturing and service operations, medical diagnosis and equipment troubleshooting, or military situation
assessment and mission planning. Early successes with DL led to overstating its applicability, reaching extreme claims such as
‘with DL and a sufficient amount of data you can solve all AI problems’. The examples bellow, inspired by real life AI
challenges I was presented with during my long AI career, illustrate why being radically religious about such claims limits the
progress of AI.
This article is NOT against Deep Learning’s algorithms and architecture; their track record speaks for itself. It is in favor of
enriching and amplifying DL, and AI in general, by using the wealth of knowledge that mankind developed in many fields over
thousands of years.
Following a discussion of Deep Learning’s current limitations for certain AI needs, I proceed to presenting the Double Deep
Learning approach and the idea of Wikipedia for Smart Machines as directions to overcome these limitations. The double
use of the word ‘deep’ refers to: first, data-centric deep learning as we all know it, and second, teaching computers deep
knowledge, like the difference between teaching physicians versus paramedics, or teaching engineers versus technicians. The
computer teaching process could potentially involve some automatic or semi-automatic learning from publications and other
documented sources.
“Soon We Won't Program Computers. We'll Train Them Like Dogs” (https://www.wired.com/2016/05/the-end-of-code/)
was the title of a June 2016 WIRED Magazine’s article focusing on the key difference between classic software programming
that provides explicit step by step instructions how to solve a problem, and Machine Learning software by which you provide
sample cases and a generic training algorithm that keeps iterating until the software learns how to solve the problem at a desired
performance level. The “dog” analogy was inspired by classic behaviorism studies: “…Pavlov triggered his dog's salivation not
through a deep understanding of hunger but simply by repeating a sequence of events over and over. He provided data, again
and again, until the code rewrote itself”. Paraphrasing on this title to describe the Double Deep approach, I would say: Soon We
Won't Program Computers. We'll Train Them Like We Train Human University Students with Universal Deep
Knowledge and with Sample Cases, e.g. medical students. Let us teach computers fundamental knowledge and equip them
with generic inference algorithms that will leverage these knowledge modules as they solve a specific case. In medical schools
we teach students (a) anatomy and physiology, (b) characteristics of specific diseases/disorders by means of
signs/symptoms/test results, along with sample cases, (c) how to execute a good diagnostic process, generically. Note that (a)
and (b) are knowledge modules, that are independent of (c) which is a generic inference process. In practice, when a patient
arrives he/she does not announce “I have Appendicitis”. He presents initial complaints/signs, and then a physician uses a
generic inference engine (c), while accessing knowledge modules (a) and (b) to drive a cost-effective diagnostic process. That’s
how I built with my team medical diagnostic systems for endocrinology, for emergency and critical care, for arthritis, for
space medicine and for toxicology [2], [3]. The same inference engine- based on Bayesian Inference Networks- was applied to
knowledge modules of different medical fields. (The anatomy and physiology part did not exist in the way I would do it today).
See more in the last sections of this article.
The Double Deep Learning approach could serve to build DL’s next generation solutions that integrate knowledge modules
from the wealth of humanity’s knowledge repository, and thus amplify and expand the applicability of DL. It is likely to
improve DL on both sides of the spectrum: increase quality and scope (breadth) of “good” decisions, and, not less important,
reduce the amount of glaring mistakes, such as those we see by contemporary personal assistants like Siri, Cortana, and Alexa.
(It is OK for an algorithm to make a mistake in a ‘twilight zone’ where a human professional may also err. It is totally
unacceptable for an algorithm to make glaring mistakes that even a human beginner would not make. More research effort
should be devoted to eliminating glaring mistakes by DL-based solutions as they raise very fundamental questions about the
intelligence of the algorithm and risk its credibility). Also, a lot has been said about the risks of DL machines taking over the
world. One way to start dealing with that, is to integrate at the output points of DL algorithms- (or within their neural net?)sanity checks that are based on external knowledge, to monitor DL’s output and, when needed, interfere with the ensuing
actions before they are executed, e.g. mistakenly shutting down a nuclear station, or a production line. Several examples are
given in the next two sections.
The article is based on lessons I learned over decades of AI-focused career. All examples are based on- or inspired by- real-life
non-transactional AI systems I deployed with my teams that benefit hundreds of millions of people around the globe. For
example, as of mid-2017, ClickSoftware's products schedule daily close to 750,000 Field Engineers (FE) for many of the
world’s largest service providers. Assuming that each engineer delivers on average 3 to 3.5 jobs per day, and works roughly 210
field days per year, this means that, over a year period, these products touch the life of about 500 Million people, which are
roughly 6% to 7% of the 7 Billion+ world population.
2. DL Limitations: Application-Oriented Overview
(a) When Sufficient Volume of Data does not Exist. DL requires data, massive amounts of data, e.g. thousands of
speech recording hours are needed to build a speech understanding system. For many business scenarios such volumes
of data simply do not exist (notwithstanding Big Data, see below).
Example 1: Troubleshooting New Equipment: Consider building an AI solution to support field service technicians
of a new complex medical imaging equipment that just came out. It will take several years before large and rich enough
fault data become available for training a DL-based solution that can guide service technicians with efficient fault
isolation and subsequent repair actions. Do we do nothing until sufficient data is available for a DL-based solution?
In fact, by the time sufficient data is accumulated, the current equipment model is about to be replaced by a newer
model. How would a DL algorithm know which data is only partially applicable, or no longer applicable?
Big Data. Internet of Things (IoT), connected vehicles, and other intense IT technologies are all around us producing
vast amounts of data serving as an excellent source for building AI solutions, e.g. context-aware real-time factory floor
optimization, or traffic capacity management; two AI-based solutions I am actively involved with. DL and other
machine learning technologies are perfect fit for many cases. While recognizing this potential, we should also be aware
though that ‘big data’ is sometimes not big enough for DL, as the following story illustrates:
In a recent business plan presentation of a young entrepreneur, he proposed using DL to recognize patterns of certain
business situations while referencing the recent successes in face recognition and animal classification as evidence to
the power of DL. When asked about the data he plans to use, he replied proudly and confidently “5 years of good
quality, comprehensive daily data (75 variables)”, which indeed is quite nice in a business environment. But this is just
under 2,000 cases (365*5); a small number of cases for a DL algorithm to produce useful results.
(b) Explainable AI. Today’s DL solutions operate like a “black-box” and even their developers cannot fully explain their
reasoning. For non-transactional applications in business, medicine, or military, explaining the reasoning is mandatory,
or at least very highly desirable. DARPA’ recent initiative into ‘explainable AI’ is very important [7],[9].
(c) Transactional vs non-Transactional Tasks. I used earlier the terms ‘transactional, and ’non-transactional’ tasks.
Rather than going into formal definitions, let me use EKG interpretation to clarify the difference.
Example 2: EKG Classification vs Medical Diagnosis. With thousands of EKG training data signals, a DL algorithm
can do an excellent job classifying an EKG signal shape, e.g. producing as output: Class = "ST Elevation”, see [12]
based on 64,000 EKG records. If the user now asks the DL algorithm to elaborate on the meaning of its output for
patient diagnosis, he/she is unlikely to receive a meaningful answer. A physician, on the other hand, will explain that
ST Elevation represents ventricular contraction and may indicate an artery clog that may damage the heart muscle
(Myocardial Infarction). The difference between the DL algorithm and the Physician is the level of understanding of
EKG findings. The physician’s answer is based on layers on top of layers of anatomy and physiology knowledge,
including the electrical impulses and their relationship to EKG findings. For an AI-based medical decision-making
system, just EKG classification is a narrow point solution (‘transactional’) to a small part of the problem. Such system
should go beyond signal analysis and also connect a given EKG shape to the way the heart functions and fails, and
integrate these with other patient findings.
Can a DL algorithm learn from patient data ONLY the anatomy and physiology of the human heart? That is: learn the
four chambers structure, the arteries, the valves, the conduction system and the pacemaker, the walls, …, the function
of each module and the overall blood flow. I doubt it simply because patient data does not contain the information
to enable such learning. (To appreciate the complexity, check https://www.youtube.com/watch?v=RYZ4daFwMa8 for
an excellent heart simulation that connects the human heart and EKG). Even with man-made fully documented
equipment, e.g. Semiconductor equipment, or Medical Imaging, the challenge for machine self-learning of equipment’s
structure, function and process flow is enormous. For medical diagnosis the challenge is higher because we are still
looking for the engineering design documentation of the human body, ….
As a scientist, I am all in favor of research to push further the spectrum of what data-only approaches can learn, while
also understanding its boundaries. As a business executive and AI practitioner, I believe that producing today a
working AI system for non-transactional tasks like diagnosis in cardiology and emergency medicine, a more promising
approach is to teach computers explicitly the anatomy/physiology knowledge like we teach human medical students,
rather than wait until, and if, a data-only DL algorithm will learn it from zero at a comparable level.
Several articles report that DL has been successful in medical diagnosis, e.g. for cancer. A fairer description of
the situation would be: DL algorithms support narrow aspects of the medical diagnosis process by providing
point solutions such as classifying an EKG signal or detecting tumors in a medical image, or searching for past
patients that are most similar to a given patient.
(d) Thinking versus Calculating, Newton’s Physics and DL. With data about
billions of “things”, and thousands of apples, that fall down every day, DL
algorithms, with no human touch, can certainly come up with a model to
calculate the time at which any given falling object will touch the ground.
But can DL today come up with Newton’s laws? I mean produce models that
represent deeper understanding of Earth forces along with “compact”
formula such as Time to hit the ground=SQRT(2*Hight)/g), where
g=gravity=9.8 (as opposed to a gigantic black box neural net)? If you are
only interested in building calculators for smart machines, you probably
would ask back: “Why do I need a compact formula if I get the right result
with a DL-generated neural network (possibly even more accurate if the data
also includes air resistance)?” My answer is that the importance of deep
understanding/grasping of Newton’s laws (mid 1600’s) goes way beyond a calculating tool for falling objects. For
example, the beautiful law of inertia is not at all about calculation: ‘An object at rest (or in motion) remains at rest (or
in motion), unless acted upon by an external force…’ The abstraction, generalization, and analytic formula of
Newton’s laws were the basis for future physicists to refine and expand them and discover new ones on Earth forces.
Similar processes in the 1800’s led to deeper understanding of heat and energy and the discovery of Thermodynamics
laws, then Electricity, continuing all the way to Plank and Einstein (1900-1905) with quantum physics and relativity
theory, and on to the Apollo project (1960’s), up until today, a time in which we also have fairly good understanding on
gravity forces in Space far away from Earth. In most cases, science discoveries were (a) based on sparks of brilliant
human theoretical thinking with very little data to learn from, as Sir Isaac Newton put it:” No great discovery was ever
made without a bold guess”, and (b) relied on what was already known; quoting Newton again: "If I have seen further,
it is by standing on the shoulders of giants”. As opposed to learning from zero, which is what a typical DL
algorithm does.
Why is this relevant to AI? Because physics is one of the cornerstones of engineering, which, in turn, is the basis of
all equipment around us that enable life in the modern world, e.g. agriculture equipment, food production equipment,
medical equipment, cars, airplanes, and of course, computers and mobile phones. AI systems to support equipment
maintenance and troubleshooting can improve substantially equipment’s uptime thereby offering great value. Having
led the development of the AITEST troubleshooting AI software and deployed it for dozens of complex equipment
around the globe [4], [5], I am confident that equipment-specific design knowledge, as well as universal engineering
knowledge, can greatly improve the performance of any ‘data-only’ smart machines. That’s because data can tell you
how equipment fails, equipment-specific design knowledge and universal engineering knowledge can tell you
how it works. Both types of knowledge are required to reach high performance for diagnostic and repair decisions. The
AITEST system illustrates the first steps in this direction, i.e. automatic conversion of engineering diagrams (topology
and test paths) into a Bayesian Inference network (on a massive scale).
In summary, it is one thing to learn from data how to recognize visual objects or acoustic signals. It is a totally
different challenge to derive from data full understanding of Newton’s laws, how to build a bridge, or how
equipment or human organs operate with their dynamic process flows.
(e) Glaring Mistakes: Every other day we hear jokes about glaring mistakes by AI personal assistants, e.g. Siri, Cortana,
Alexa, that quickly lead you to recognize the very limited understanding, scope and depth that the software has. DL
developers typically focus on maximizing overall percentage accuracy. How do you protect a DL-based smart machine
against glaring mistakes that even human beginners would not make? The more you push a DL algorithm for an overall
higher percentage accuracy, the higher the likelihood that glaring mistakes will sneak in (one manifestation of
overfitting).
While in some applications glaring mistakes may be something to joke about, in others, e.g. military air-defense, they
could be catastrophic. Just imagine shooting down a passenger airplane mistakenly classified as a threatening object.
Similarly, for potential misclassification mistakes by autonomous land vehicles or drones. It only takes one or a few
glaring mistakes to make users question the ‘true’ intelligence of the software to a point that the solution loses
credibility and is soon rejected/shelved (before a costly or catastrophic event makes it too late). Arguing that the overall
accuracy performance is within the, say 90%, promised error boundaries, does not help much.
Business software providers should specifically note that recovering from ‘unforgivable’ glaring-mistake events could
take a long time and be very costly for the business. The client may activate liability clauses in the contract, and worse,
the competition may run a whole marketing campaign around it to destroy your product’s reputation. That’s why I
always guide my teams with the following principle:
Glaring Mistake Protection Principle: In addition to working towards high overall accuracy, you should also always
include sanity checks to protect against glaring mistakes with individual cases. Before displaying the output of your
‘ultra-intelligent’ algorithm to a human user, or take automatic action, run sanity checks for extra protection.
Developers of autonomous vehicles are investing in multiple sensors, e.g. cameras, Lidar (Light and Radar), and
ultrasound, to overcome the limitations of each individual sensor technology. One more direction to overcome these
limitations is to add intelligent algorithms based on humanity knowledge, including common sense knowledge, as well
as deeper universal “world” knowledge, e.g. environmental, physics and engineering, and human/animal behavior.
Beyond ordinary glaring mistakes, such algorithms could also contribute to overcoming mistakes due to intentional
adversarial images designed to fool DL-based systems, see https://www.theverge.com/2017/11/2/16597276/googleai-image-attacks-adversarial-turtle-rifle-3d-printed in the context of confusing a turtle for a rifle.
External knowledge is a good way to equip DL-based solutions with ‘sanity checks’/ ‘second opinion’ to fight glaring
mistakes. The example in the next paragraph also illustrates this point.
(f) External Knowledge which is not in DL’s Data Set Could be Very Helpful: When a DL model does not produce
good enough results, those who are radically religious about ‘data-only’ ‘no human touch’ philosophy adopt a closed
garden DL doctrine and limit their options to improve performance to those within the DL world, such as: add data,
change neural net architecture, or augment the data with pre-processing operators, and then run again DL. Using
external knowledge or alternative inference algorithms are taboo. The following example provide good reasons when
and why to avoid the data-only doctrine:
Example 3: Aerial Image Interpretation; a Twilight Zone Case.
David and Abi- top notch experienced aerial image interpretation analysts at an Air-Force base- are faced with one of
those challenging cases where they cannot decide whether an object O in an image is equipment type A (agriculture) or
B (military). They have tried all options to enhance the image, but uncertainty is still very high. Sam, a security
specialist who stops by just to say hello, arrives at the peak of their heated debate on A or B. As he is waiting, he looks
at the picture and calmly says: “guys, coming from a farmer’s family, and judging by the terrain and vegetation, I
strongly doubt it is equipment A, because no farmer would use A in this situation”. After a short pause, Abi says “if
this is B, we have a major development”, and David replies: “Absolutely, I am going to wake up Jim (their boss)”.
Sam was using knowledge which is not in the picture data. Adopting the ‘data only’ doctrine of some contemporary DL
practitioners is like David and Abi ignoring Sam’s input. It limits the progress of DL. Well, a DL fan would now
suggest collecting more data that cover Sam’s farming knowledge and then re-run DL. That’s a good theoretical
exercise, but it does not go far, because equipment B only shows up about twice a week for a short while, and every
time with a slightly different silhouette, meaning about 100 pictures of B over a full year. Will this be sufficient for
DL? Indeed, data augmentation can also be used to fight the low volume of data, and, yes, separate DL networks can be
built to learn contexts where objects appear by terrain, vegetation, time of the year, etc., but how about simply asking
Sam? I mean explicitly embedding farmers’ knowledge in the AI solution. Why learn from data what humanity
already know?
Table 1 summarizes some of the above key messages and DL’s limitations. All rows in Table 1 are based on- or inspired byreal life ‘non-transactional’ AI systems I deployed and provide further evidence that knowledge plus data are likely to yield
higher AI performance than data only. See also Shoham [13]
Table 1: Data Tells you…, Knowledge tells you
Object
Data tells you…
MRI (Medical equipment)
How it fails
Frigate ZX8
What it looks like
EKG signal
Arrhythmia type C
Apples falling to the ground
How to calculate time to hit ground
Knowledge tells you…
How it works
Its capabilities
Relationship to heart’s anatomy, physiology
Deeper understanding of Earth forces
Where do we go from here?
3. Double Deep Learning
The maximum knowledge a Deep Learning (DL) algorithm can learn is encapsulated in its data set for the given task, which,
typically, is substantially less than the full humanity’s knowledge for the same task. The Double Deep Learning approach
advocates integrating data-centric machine self-learning techniques with machine-teaching techniques to leverage the power
of both, and overcome their corresponding limitations.
While the first ‘deep’ is for data-centric Deep Learning, the second ‘deep’ is for ‘machine teachers’ of knowledge and it stands
for extra focus on teaching deep ‘foundations’ and ‘first principles’ for reasoning in the task domain; in addition to shallow
prescriptive knowledge or just facts whenever needed. By ‘deep’ teaching I mean going beyond teaching just ‘shallow’
‘experiential’ knowledge which DL self-learning algorithm can also achieve if data is available. This was the main drawback of
early days rule-based expert systems of the 1970-80’s. By analogy it is like the difference between teaching physicians versus
teaching paramedics, or teaching engineers versus teaching technicians. Or quoting Aristotle: “Knowledge of the fact differs
from knowledge of the reason for the fact”. Or, as I discussed above in Example 2, knowing that EKG signal has ST changes, is
different than understanding the reasons for this finding, and what actions to take. In 2015, Dietterich and Horvitz [6] also
called to attention that:”…we have made surprisingly little progress to date on building the kinds of general intelligence that
experts and lay public envision when they think about ‘artificial Intelligence’”.
DARPA’s important initiative into ‘explainable AI’ [7] is also likely to contribute to the Double Deep Learning approach.
4. Wikipedia for Smart Machines
ReKopedia: An Open-Source Shared Knowledge Repository
ReKopedia Concept
Think about a repository that contains software representation structures of humanity’s science & technology knowledge in
various disciplines; call it the ReKopedia repository. ReKo stands for reusable knowledge. The representation structures
could be whatever we agree on, e.g. state transition graphs, neural nets, Bayesian nets, logic, fuzzy logic, frames, or rules, as
long as they are reusable by smart machines. I am proposing a community-wide initiative to establish an open-source shared
knowledge repository under which people contribute knowledge structures that are compatible with some protocols and enable
others to use them. Ideas from Service Oriented Architecture (SOA) and other software initiatives can serve as a basis to learn
from, e.g. self-contained modules, no need to know the inside technical details, and, of course, the concept of Web Services e.g.
SOAP, CORBA or REST. Modularity is key, together with mechanisms to combine modules into higher level knowledge
modules, which, when applied iteratively, create layers on top of layers of humanity knowledge.
In today’s shared economy spirit, where almost every AI algorithm can be found in open-source libraries like Python or R, the
ReKo repository can be a significant complement and energize the AI industry. The same way we agreed to share open
source software code, we will agree to share ReKo knowledge structures. Note that knowledge sharing via textbooks and
school teaching has already been a hallmark of mankind for generations. Let us do the same for smart machines.
In the early 2000’s, Google set a goal to scan all humanity’s published books. Now, in the AI era, let us embark on a similar
audacious goal to create a Wikipedia for Smart Machines (target readers are not human, but rather smart machines):
Goal - Humanity Knowledge in Software Structures: develop methodologies, tools, and automatic algorithms to convert
humanity’s documented knowledge into software structures that smart machines can use in their inference algorithms.
I am not talking about a monolithic centrally managed initiative, but rather a distributed self-organized initiative managed by a
mutually agreed upon governance.
ReKopedia Content
Content contribution to the ReKopedia repository can be made in any order and can come from everywhere, subject to some
covenant rules. As people build smart machines for a variety of applications, they will contribute knowledge modules to the
repository.
I can also envision work-groups in different disciplines, e.g. Medicine, Agriculture, Environment, Military, Engineering,
Manufacturing, Field Service, Finance, Insurance, Marketing, and Sales, each coming up with a long-term plan and priorities
for the content to populate their domain in the ReKopedia knowledge repository. Reviewing the syllabuses of schools and
universities in different areas will teach us the content we teach humans, and can be a good starting point for the content we
should teach machines. The CYC project [11], initiated by D. Lenat in the 1980’s with initial focus on commonsense
knowledge, led to a commercial product that offers extensive set of reusable knowledge modules and is available through his
company.
ReKo Representations and Algorithms
We do not have today all the answers to build ReKopedia for smart machines, in terms of knowledge and problem
representations and their corresponding algorithms, but we have very good foundations in Mathematics, Computer Science,
classic AI, Simulation theory, Management Science, Operations Research and related fields. The key principle, in my opinion,
is to maximize separation between the knowledge modules and the inference algorithms that will operate on them, as Example 4
illustrates for medical diagnosis.
Example 4: ReKopedia Modules for Medical Diagnosis: Representation and Practice
As an indication, the Bayesian Network structures (Figure 1) we developed for knowledge representation in the MEDAS [2]; an
AI system for emergency and critical care disorders and their inference algorithms (Figure 2), were also used for Space
medicine, for Arthritis, for Toxicology, and for other situation assessment applications beyond medicine. From years of
experience, I learned that, on average, about 50 human expert hours are needed to put into Bayesian Network templates the
knowledge for diagnosing a single medical disorder. This means that with 50,000 hours we can complete 1,000 disorders which
are likely to involve tens of thousands of symptoms, signs, syndromes, test results, and other findings. Assuming 50 to 100
MD’s working part time with support staff over 1 to 2 years, a $15M budget would take care of the expenses to build ReKo
modules for a non-marginal part of medicine. In fact, the MEDAS approach advocates hierarchical structures of disorders,
which means that after completing a base set, the average time per disorder will come down from 50 hours per disorder.
MEDAS reached convincing performance in its early stages [2], and by 1990 it reached “90% agreement with gold standard”
[8], long after I moved on to other areas. As for probability values on the links and nodes of the Bayesian Nets, we can start
with known values from medical publications and data bases, or expert’s subjective values, and then, as more patient data is
accumulated, apply machine learning algorithms to update them. The Bayesian Nets should be complemented and connected
with ReKo modules that capture knowledge about anatomy, bio-engineering, DNA, and other knowledge sources that can
improve the inferences made by the Bayesian inference algorithms.
Looking not too far in the future, where in large parts of the world patient data is automated starting at birth date, including
genome map data for every individual, ReKopedia-based AI systems can take intelligent healthcare automation to new
heights in terms of early warning, prevention, diagnosis and treatment, reducing cost while improving quality.
Automatic Learning of ReKo Structures from Humanity Documented Knowledge
Developing tools to automate the conversion process of natural language material; including diagrams and pictures, into ReKo
structures, can accelerate it considerably, but it requires taking Natural Language Understanding (NLU) to a higher level.
We are not there yet. To get an appreciation of the challenge, consider the task of automatic summary generation of
documents. The state of the art of this field tells us that AI NLU software is still far away from “truly understanding” what it
reads, let alone extracting knowledge from it, as compared with a college student reading a chapter in an Economy 101 textbook
and being able to solve homework exercises. This should not stop us, however, from starting to manually build the ReKo
repository for whichever field of science and technology we desire.
Figure 1: MEDAS- Hierarchical Structure of Medical Disorders [2]
Figure 2: Cycle of Diagnostic Assessment, BenBassat 1980’s [2], [3]
5. Summary
Today’s DL-based AI applications are typically point solutions for transactional tasks that do not lend themselves to automatic
generalization beyond the scope of the data sets they are based on. The AI industry is fragmented, and we are not establishing
broad and deep enough foundations that will enable us to build higher level ‘generic’, ‘universal’ intelligence, let alone ‘superintelligence’. We must find ways to create synergies between these fragments and connect them with external knowledge
sources, if we wish to scale faster the AI industry.
We are now in the second AI ‘spring’ after a long ‘winter’. To avoid sliding again into an AI winter, it is essential that
we rebalance the roles of data and knowledge. Data is important but knowledge- deep and commonsense- are equally
important.
If indeed AI is the driver of our next economic and social revolution (like electricity was), we'd better establish solid
foundations and infrastructure to develop and disseminate it; preferably with standards and fair economics.
Personal Note & Acknowledgments
This article is based on decades of my AI-focused career that are a blend of being a mathematician/statistician/computer
scientist (USC, Tel-Aviv University, UCLA), and being a business entrepreneur and 15 years CEO of ClickSoftware, a
NASDAQ (CKSW) public company. I have been researching, practicing and educating Artificial Intelligence from the first AI
“Spring” of the 1980’s, during the AI “Winter” of the 1990th and early 2000 years, and now in the AI renaissance of the 21th
century. My academic research was supported by NIH, NSF, DARPA, NASA, BMD (Ballistic Missile Defense Agency), ARI
(U.S. Army Research Institute), Israel Defense Forces, and others.
As the founder and CEO of ClickSoftware (inventor of service chain optimization- patent awarded, acquired in 2015 by a
private equity firm), and Plataine (a leader in AI and IoT-based solutions for manufacturing optimization), we leverage AI
technologies to solve large scale real-life business problems. We developed innovative AI products that benefit hundreds of
millions of people around the globe.
For more details and Publication List see http://www.moshebenbassat.com/
I am very grateful to Israel Beniaminy, my son Avner Ben-Bassat, and other colleagues for deep and useful discussions,
as well as comments on early drafts of this article.
References
[1] Brynjolfsson E. and Mcafee A. The Business of Artificial Intelligence, Harvard Business Review, July 2017
[2] Ben-Bassat M., Carlson R.W., Puri V.K., Davenport M. D., Schriver J. A, Latif M., Smith R., Portigal L. D., Lipnick E. and WeiI
M. H. Pattern-Based Interactive Diagnosis of Multiple Disorders: The MEDAS System. IEEE Transactions on Pattern Analysis
and Machine Intelligence, Vol. PAMI-2, No.2:148-160, March 1980
[3] M. Ben-Bassat, Expert Systems for Clinical Diagnosis, In Approximate Reasoning in Expert Systems. M.M. Gupta, A. Kandel,
W. Bandler, Y.s. Kiszka (eds.), North Holland, 1985, pp.671- 687.
[4] Ben-Bassat M. Use of Diagnostic Expert Systems in Aircarft Maintenance (9 real life examples), Proceedings of Aircraft
Maintenance and Engineering Conference, 1996, Singapore
[5] Ben-Bassat M., I Beniaminy, I., Joseph, D. Combining model-based and case-based expert systems, Research Perspectives and
Case Studies in System Test and Diagnosis, 179-205, 1998
[6] Dietterich and Horvitz, E. J. Rise of Concerns about AI: Reflections and Directions, Communications of the ACM, Volume 58,
Oct 2015, 38-40
[7] Gunning, D. Explainable Artificial Intelligence (XAI), http://www.cc.gatech.edu/~alanwags/DLAI2016/(Gunning)%20IJCAI16%20DLAI%20WS.pdf
[8] Georgakis, D. C. Trace, D.A. Naeymi-Rad, F. and Evens. A Statistical Evaluation of the Diagnostic Performance of MEDASThe Medical Emergency Decision Assistance System Proc Annu Symp Comput Appl Med Care. 1990 Nov 7 : 815–819.
[9] Knight, W. The Dark Secret at the Heart of AI, MIT Technology Review, April 11, 2017
[10] LeCun Y., Bengio Y, & Hinton G. Deep Learning. Nature 521, 436–444, May 2015
[11] Lenat, D.B. CYC: a large-scale investment in knowledge infrastructure, Communications of the ACM, Volume 38, Nov.
1995, 33-38
[12] Rajpurkar, P. Hannun, A. Y. Haghpanahi, M. Bourn, . Ng, A. Y. Cardiologist-Level Arrhythmia Detection with
Convolutional Neural Networks, https://arxiv.org/abs/1707.01836, July 2017
[13] Shoham, Y. Why Knowledge Representation Matters, Comm. ACM, 47-49, Jan 2016
------------------------------------------------------------------------------------------------------------------
Appendix: Key Messages
1. Machines can learn many things from data, but
data is not the only source machines can learn
from.
2. The maximum knowledge a Deep Learning (DL)
algorithm can learn is what is encapsulated in its
data set for the given task, which, typically, is
substantially less than the full humanity’s
knowledge for the same task. For instance, using
field service data, a DL algorithm can learn how
equipment fails, but DL cannot learn from such
data how it works.
3. Developing and deploying AI solutions when data
is not (yet) available is possible, with substantial
business value, by directly embedding explicit
humanity knowledge.
4. It is one thing to train a DL-neural-net to calculate
the time a falling apple will hit the ground using
data about falling apples. It is a totally different
challenge to train an algorithm from data only to
come up with Newton’s earth gravity laws. If
humans can learn from explicit teaching, why
can’t machines?
5. Machine learning technologies still have some
limitations, e.g. with non-supervised learning.
Why wait until- and if- someone trains a DL
algorithm to learn from data what humanity
already learned and documented in textbooks and
other publications? E.g. anatomy, physiology,
electrical conduction of human heart. Science-wise
it has merit. Business-wise it makes no sense.
6. In today’s AI world, data is over-rated,
knowledge is under-rated. By re-balancing the
two, AI solutions will benefit considerably. On the
other hand, by adopting ‘data-only’ doctrine, you
give up many options to improve DL’s
performance and expand its applicability.
7. The Double Deep Learning approach advocates
integrating ‘machine self-learning’ with ‘machine
teachers’. The second ‘deep’ is for ‘machine
teachers’ with extra focus on teaching deep
‘foundational’ ‘first principles’ knowledge aiming
at higher level intelligence, like the difference
between teaching physicians versus paramedics,
or teaching engineers versus technicians.
8. Being radically religious about a specific algorithm
(e.g. DL) aiming to push its applicability envelope
as far as possible, is good, even desirable, from a
science perspective. From a business perspective,
however, it may not be cost-effective, and may
even prevent you from deploying today business
solutions that deliver tremendous value.
9. Wikipedia for smart machines. AI can grow
faster by establishing an open-source shared
repository of reusable knowledge modules
(coined ReKopedia here) covering humanity’s
science & technology in various disciplines. For
illustration, a $15M project is proposed to produce
ReKopedia modules for medical diagnosis of
1,000 disorders.
| 2cs.AI
|
A Logarithmic Integrality Gap Bound for Directed Steiner Tree in
Quasi-bipartite Graphs ∗
Zachary Friggstad1 , Jochen Könemann2 , and Mohammad Shadravan3
arXiv:1604.08132v1 [cs.DS] 27 Apr 2016
1
Department of Computing Science, University of Alberta, Edmonton, AB, Canada, T6G 2E8,
[email protected]
2
Department of Combinatorics and Optimization, University of Waterloo, Waterloo, ON, Canada,
N2L 3G1, [email protected]
3
Department of Industrial Engineering and Operations Research, Columbia University, New
York, NY, USA, 10027, [email protected]
April 28, 2016
Abstract
We demonstrate that the integrality gap of the natural cut-based LP relaxation for the directed Steiner
tree problem is O(log k) in quasi-bipartite graphs with k terminals. Such instances can be seen to
generalize set cover, so the integrality gap analysis is tight up to a constant factor. A novel aspect
of our approach is that we use the primal-dual method; a technique that is rarely used in designing
approximation algorithms for network design problems in directed graphs.
1
Introduction
In an instance of the directed Steiner tree (DST) problem, we are given a directed graph G = (V, E),
non-negative costs ce for all e ∈ E, terminal nodes X ⊆ V , and a root r ∈ V . The remaining nodes in
V − (X ∪ {r}) are the Steiner nodes. The goal is to find the cheapest collection of edges F ⊆ E such that
for every terminal t ∈ X there is an r, t-path using only edges in F . Throughout, we let n denote |V | and k
denote |X|.
If X ∪ {r} = V , then the problem is simply the minimum-cost arborescence problem which can be
solved efficiently [4]. However, the general case is well-known to be NP-hard. In fact, the problem can be
seen to generalize the set-cover and group Steiner tree problems. The latter cannot be approximated within
O(log2− (n)) for any constant > 0 unless NP ⊆ DTIME(npolylog(n) ) [10].
For a DST instance G, let OP TG denote the value of the optimum solution for this instance Say that an
instance G = (V, E) of DST with terminals X is `-layered if V can be partitioned as V0 , V1 , . . . , V` where
V0 = {r}, V` = X and every edge uv ∈ E has u ∈ Vi and v ∈ Vi+1 for some 0 ≤ i < `. Zelikovsky
showed for any DST instance G and integer ` ≥ 1 that we can compute an `-layered DST instance H in
poly(n, `) time such that OP TG ≤ OP TH ≤ `·k 1/` ·OP TG and that a DST solution in H can be efficiently
mapped to a DST solution in G with the same cost [2, 17].
∗
This work was in part supported by NSERC’s Discovery grant program. The second author greatfully acknowledges the support
of the Hausdorff Institute and the Institute for Discrete Mathematics in Bonn, Germany.
1
Charikar et al. [3] exploited this fact and presented an O(`2 · k 1/` · log k)-approximation with running
time poly(n, k ` ) for any integer ` ≥ 1. In particular, this can be used to obtain an O(log3 k)-approximation
in quasi-polynomial time and a polynomial-time O(k )-approximation for any constant > 0. Finding a
polynomial-time polylogarithmic approximation remains an important open problem.
For a set of nodes S, we let δ in (S) = {uv ∈ V : u 6∈ S and v ∈ S} be the set of edges entering S. The
following is a natural linear programming (LP) relaxation for directed Steiner tree.
X
min
ce xe
(DST-Primal)
e∈E
in
s.t. x(δ (S)) ≥ 1 ∀ S ⊆ V − r, S ∩ X 6= ∅
(1)
xe ≥ 0 ∀e ∈ E
This LP is called a relaxation because of the natural correspondence between feasible solutions to a DST
instance G and feasible {0, 1}-integer solutions to the corresponding LP (DST-Primal). Thus, if we let
OP TLP denote the value of an optimum (possibly fractional) solution to LP (DST-Primal) then we have
OP TLP ≤ OP TG . For a particular instance G we say the integrality gap is OP TG /OP TLP ; we are
interested in placing the smallest possible upper bound on this quantity.
Interestingly, if |X| = 1 (the shortest path problem) or X ∪ {r} = V (the minimum-cost arborescence problem), the extreme points of (DST-Primal) are integral so the integrality gap is 1 ([12] and [4],
respectively). However, in the general case Zosin and Khuller showed that (DST-Primal) is not useful for
finding polylog(k)-approximation algorithms for DST [18]. √
The authors showed that the integrality gap of
(DST-Primal) relaxation can, unfortunately, be as bad as Ω( k), even in instances where G is a 4-layered
graph. In their examples, the number of nodes n is exponential in k so the integrality gap may still be
O(logc n) for some constant c.
On the other hand, Rothvoss recently showed that applying O(l) rounds of the semidefinite programming
Lasserre hierarchy to (the flow-based extended formulation of) (DST-Primal) yields an SDP with integrality
gap O(` · log k) for `-layered instances [14]. Subsequently, Friggstad et al. [6] showed similar results for
the weaker Sherali-Adams and Lovász-Schrijver linear programming hierarchies.
In this paper we consider the class of quasi-bipartite DST instances. An instance of DST is quasibipartite if the Steiner nodes V \(X ∪{r}) form an independent set (i.e., no directed edge has both endpoints
in V \ (X ∪ {r})). Such instances still capture the set cover problem, and thus do not admit an (1 − ) ln kapproximation for any constant > 0 unless P = NP [15, 5]. Furthermore, it is straightforward to adapt
known integrality gap constructions for set cover (e.g. [16]) to show that the integrality gap of (DST-Primal)
can be as bad as (1 − o(1)) · ln k in some instances. Hibi and Fujito [11] give an O(log k)-approximation
for quasi-bipartite instances of DST, but do not provide any integrality gap bounds.
Quasi-bipartite instances have been well-studied in the context of undirected Steiner trees. The class of
graphs was first introduced by Rajagopalan and Vazirani [13] who studied the integrality gap of (DST-Primal)
for the bidirected map of the given undirected Steiner tree instances. Currently, the best approximation for
73
quasi-bipartite instances of undirected Steiner tree is 60
by Goemans et al. [8] who also bound the integrality
gap of the bidirected cut relaxation by the same quantity. This is the same LP relaxation as (DST-Primal),
applied to the directed graph obtained by replacing each undirected edge {u, v} with the two directed edges
uv and vu. This is a slight improvement over a prior ( 73
60 + )-approximation for any constant > 0 by
Byrka et al. [1].
The best approximation for general instances of undirected Steiner tree is ln(4) + for any constant
> 0 [1]. However, the best known upper bound on the integrality gap of the bidirected cut relaxation
for non-quasi-bipartite instances is only 2; it is an open problem to determine if this integrality gap is a
constant-factor better than 2.
2
1.1
Our contributions
Our main result is the following. Let Hn =
Pn
= O(log n) be the nth harmonic number.
i=1 1/i
Theorem 1. The integrality gap of LP (DST-Primal) is at most 2 Hk = O(log k) in quasi-bipartite graphs
with k terminals. Furthermore, a Steiner tree with cost at most 2 Hk · OP TLP can be constructed in
polynomial time.
As noted above, Theorem 1 is asymptotically tight since any of the well-known Ω(log k) integrality gap
constructions for set cover instances with k items translate directly to an integrality gap lower bound for
(DST-Primal), using the usual reduction from set cover to 2-layered quasi-bipartite instances of directed
Steiner tree.
This integrality gap bound asymptotically matches the approximation guarantee proven by Hibi and
Fujito for quasi-bipartite DST instaces [11]. We remark that their approach is unlikely to give any integrality
gap bounds for (DST-Primal) because they iteratively choose low-density full Steiner trees in the same spirit
as [3] and give an O(` · log k)-approximation for finding the optimum DST solution T that does not contain
a path with ≥ ` Steiner nodes V \ (X ∪ {r}). In particular, their approach will also find an O(log k)approximation to the optimum
DST solution in 4-layered graphs and we know the integrality gap in some
√
4-layered instances is Ω( k) [18].
We prove Theorem 1 by constructing a directed Steiner tree in an iterative manner. An iteration starts
with a partial Steiner tree (see Definition 1 below), which consists of multiple directed components containing the terminals in X. Then a set of arcs are purchased to augment this partial solution to one with fewer
directed components. These arcs are discovered through a primal-dual moat growing procedure; a feasible
solution for the dual (DST-Primal) is constructed and the cost of the purchased arcs can be bounded using
this dual solution.
While the primal-dual technique has been very successful for undirected network design problems (e.g.,
see [9]), far fewer success stories are known in directed domains. Examples include a primal-dual interpretation of Dijkstra’s shortest path algorithm (e.g., see Chapter 5.4 of [12]), and Edmonds’ [4] algorithm
for minimum-cost arborescences. In both cases, the special structure of the problem is instrumental in the
primal-dual construction. One issue arising in the implementation of primal-dual approaches for directed
network design problems appears to be a certain overlap in the moat structure maintained by these algorithms. We are able to handle this difficulty here by exploiting the quasi-bipartite nature of our instances.
2
2.1
The integrality gap bound
Preliminaries and definitions
We now present an algorithmic proof of Theorem 1. As we will follow a primal-dual strategy, we first
present the LP dual of (DST-Primal).
X
max
yS
(DST-Dual)
S
s.t.
X
yS ≤ ce ∀e ∈ E
S:e∈δ in (S)
y ≥0
In (DST-Dual), the sums range only over sets of nodes S such that S ⊆ V − r and S ∩ X 6= ∅.
Our algorithm builds up partial solutions, which are defined as follows.
3
(2)
Definition 1. A partial Steiner tree is a tuple T = ({Bi , hi , Fi }`i=0 , B̄) where, for each 0 ≤ i ≤ `, Bi is a
subset of nodes, hi ∈ Bi , and Fi is a subset of edges with endpoints only in Bi such that the following hold.
• The sets B0 , B1 , . . . , B` , B̄ form a partition V .
• B̄ ⊆ V − X − r (i.e. B̄ is a subset of Steiner nodes).
• h0 = r and hi ∈ X for each 1 ≤ i ≤ `.
• For every 0 ≤ i ≤ ` and every v ∈ Bi , Fi contains an hi , v-path.
We say that B̄ is the set of free Steiner nodes in T and that hi is the head of Bi for each 0 ≤ i ≤ `. The
edges of T , denoted by E(T ), are simply ∪`i=0 Fi . We say that B0 , . . . , B` are the components of T where
B0 is the root component and B1 , . . . , B` are the non-root components.
Figure 1 illustrates a partial Steiner tree. Note that if T is a partial Steiner tree with ` = 0 non-root
components, then E(T ) is in fact a feasible DST solution.
P
Finally, for a subset of edges F we let cost(F ) = e∈F ce .
r
Figure 1: A partial Steiner tree with ` = 3 non-root components (the root is pictured at the top). The only
edges shown are those in some Fi . The white circles are the heads of the various sets Bi and the black
circles are terminals that are not heads of any components. The squares outside of the components are the
free Steiner nodes B̄. Note, in particular, that each head can reach every node in its respective component.
We do not require each Fi to be a minimal set of edges with this property.
4
2.2
High-level approach
Our algorithm builds up partial Steiner trees in an iterative manner while ensuring that the cost does not
increase by a significant amount between iterations. Specifically, we prove the following lemma in Section
3. Recall that OP TLP refers to the optimum solution value for (DST-Primal).
Lemma 1. Given a partial Steiner tree T with ` ≥ 1 non-root components, there is a polynomial-time
algorithm that finds a partial Steiner tree T 0 with `0 < ` non-root components such that
cost(E(T 0 )) ≤ cost(E(T )) + 2 · OP TLP ·
` − `0
.
`
Theorem 1 follows from Lemma 1 in a standard way.
Proof of Theorem 1. Initialize a partial Steiner tree Tk with k non-root components as follows. Let B̄ be the
set of all Steiner nodes, B0 = {r}, and F0 = ∅. Furthermore, label the terminals as t1 , . . . , tk ∈ X and for
each 1 ≤ i ≤ k let Bi = {ti }, hi = ti and Fi = ∅. Note that cost(E(Tk )) = 0.
Iterate Lemma 1 to obtain a sequence of partial Steiner trees T`0 , T`1 , T`2 , . . . , T`a where T`i has `i
non-root components such that k = `0 > `1 > . . . > `a = 0 and
cost(E(Ti+1 )) ≤ cost(E(Ti )) + 2 · OP TLP ·
`i − `i+1
`i
for each 0 ≤ i < a. Return E(T`a ) as the final Steiner tree.
That E(Ta ) can be found efficiently follows simply because we are iterating the efficient algorithm from
Lemma 1 at most k times. The cost of this Steiner tree can be bounded as follows.
cost(E(Ta )) ≤ 2 · OP TLP ·
≤ 2 · OP TLP ·
a−1
X
`i − `i+1
i=0
`i
a−1
X
`i
X
i=0 j=`i+1 +1
= 2 · OP TLP ·
a−1
X
`i
X
i=0 j=`i+1 +1
1
`i
k
X
1
1
= 2 · OP TLP ·
j
k
j=1
= 2 · OP TLP · Hk .
The idea presented above resembles one proposed by Guha et al. [7] for bounding the integrality gap
of a natural relaxation for undirected node-weighted Steiner tree by O(log k) [7]. Like our approach, Guha
et al. also build a solution incrementally. In each phase of the algorithm, the authors reduce the number of
connected components of a partial solution by adding vertices whose cost is charged carefully to the value
of a dual LP solution that the algorithm constructs simultaneously.
3
A primal-dual proof of Lemma 1
Consider a given partial Steiner tree T = ({Bi , hi , Fi }`i=0 , B̄) with ` ≥ 1 non-root components. Lemma
1 promises a partial Steiner tree T 0 with `0 < ` non-root components with cost(E(T 0 )) ≤ cost(E(T )) +
0
2 · OP TLP · `−`
` . In this section we will present an algorithm that augments forest T in the sense that it
computes a set of edges to add to T . The proof presented here is constructive: we will design a primal-dual
algorithm that maintains a feasible dual solution for (DST-Dual), and uses the structure of this solution to
guide the process of adding edges to T .
5
3.1
The algorithm
For any two nodes u, v ∈ V , let d(u, v) be the cost of the cheapest u, v-path in G. More generally, for a
subset ∅ ( S ⊆ V and a node v ∈ V we let d(S, v) = minu∈S d(u, v). We will assume that for every
0 ≤ i ≤ ` and 1 ≤ j ≤ `, j 6= i that d(Bi , hj ) > 0 as otherwise, we could merge Bi and Bj by adding the
0-cost Bi , hj -path to T .
The usual conventions of primal-dual algorithms will be adopted. We think of such an algorithm as
a continuous process that increases the value of some dual variables over time. At time t = 0, all dual
variables are initialized to a value of 0. At any point in time, exactly ` dual variables will be raised at a rate
of one unit per time unit. We will use ∆ for the time at which the algorithm terminates. As is customary, we
will say that an edge e goes tight if the dual constraint for e becomes tight as the dual variables are being
increased. When an edge goes tight, we will perform some updates to the various sets being maintained by
the algorithm. Again, the standard convention applies that if multiple edges go tight at the same time, then
we process them in any order.
Algorithm 1 describes the main subroutine that augments the partial Steiner tree T to one with fewer
components. It maintains a collection of moats Mi ⊆ V − {r} and edges Fi0 for each 1 ≤ i ≤ `, while
ensuring that the dual solution y it grows remains feasible. Mainly to aid notation, our algorithm will
maintain a so called virtual body βi for all 0 ≤ i ≤ ` such that Bi ⊆ βi ⊆ Bi ∪ B̄. We will ensure that each
v ∈ B̄ ∩ βi has a mate u ∈ Bi such that the edge uv has cost no more than ∆. For notational convenience,
we will let β0 = B0 be the virtual body of the root component. The algorithm will not grow a moat around
the root since dual variables do not exist for sets containing the root.
Our algorithm will ensure that moats are pairwise terminal-disjoint. In fact, we ensure that any two
moats may only intersect in B̄. Terminal-disjointness together with the quasi-bipartite structure of the input
graph will allow us to charge the cost of arcs added in the augmentation process to the duals grown.
An intuitive overview of our process is the following. At any time t ≥ 0, the moats Mi will consist of all
nodes v with d(v, hi ) ≤ t. The moats Mi will be grown until, at some time ∆, for at least one pair i, j with
i 6= j, there is a tight path connecting βj to hi . At this point the algorithm stops, and adds a carefully chosen
collection of tight arcs to the partial Steiner tree that merges Bj and Bi (and potentially other components).
Crucially, the cost of the added arcs will be charged to the value of the dual solution grown around the
merged components.
Due the structure of quasi-bipartite graphs, we are able to ensure that in each step of the algorithm the
active moats pay for at most one arc that is ultimately bought to form T 0 . Also, if T 0 has `0 < ` non-root
components then each arc was paid for by moats around at most ` − `0 + 1 ≤ 2(` − `0 ) different heads. So,
the total cost of all purchased arcs is at most 2(` − `0 ) · ∆. Finally, the total dual grown is ` · ∆, which is
0
≤ OP TLP due to feasibility, so the cost of the edges bought can be bounded by 2 `−`
` · OP TLP .
3.2
Algorithm and invariants
Now we will be more precise. The primal-dual procedure is presented in Algorithm 1. The following
invariants will be maintained at any time 0 ≤ t ≤ ∆ during the execution of Algorithm 1.
1. For each 1 ≤ i ≤ `, hi ∈ Mi and Mi ⊆ V − {r} (so there is a variable yMi in the dual).
2. For each 1 ≤ i ≤ `, Mi = {v ∈ V : d(v, hi ) < t} ∪ S where S ⊆ {v ∈ V : d(v, hi ) = t}.
3. Mi ∩ Mj ⊆ B̄ and both βi ∩ βj = Mi ∩ βj = ∅ for distinct 0 ≤ i, j ≤ `.
4. For each 1 ≤ i ≤ ` we have Bi ⊆ βi ⊆ Bi ∪ B̄. Furthermore, for each each v ∈ βi − Bi there is a
mate u ∈ Bi such that uv ∈ E and cuv ≤ t.
6
5. y is feasible for LP (DST-Dual) with value exactly ` · t.
These concepts are illustrated in Figure 2.
Figure 2: The moats around the two partial Steiner trees are depicted by the gray circles. The dashed edges
are those bought by the first moat and the solid edges are those bought by the second moat. Note the moats
only intersect in B (in particular, v is the only lying in both moats). Also, u lies in the virtual body for the
left partial Steiner tree and the dashed arc entering u is coming from its mate. The edges Fi from the original
partial Steiner trees are not shown. Observe that if any edge entering v goes tight then it must be from either
r or some terminal (because G is quasi-bipartite). This would allow us to merge at least one partial Steiner
tree into the body of another.
Algorithm 1 Dual Growing Procedure
1: Mi ← {v ∈ V : d(v, hi ) = 0}, 1 ≤ i ≤ `
2: βi ← Bi for 0 ≤ i ≤ `
3: y ← 0
4: Raise yMi0 uniformly for each moat Mi0 until some edge uv goes tight
5: if u ∈ βj for some 0 ≤ j ≤ ` and v ∈ Mi0 for some i0 6= j then
6:
return the partial Steiner tree T 0 described in Lemma 3.
7: else
8:
Let Mi be the unique moat with uv ∈ δ in (Mi )
9:
Mi ← Mi ∪ {u}
10:
if u ∈ βi then
11:
βi ← βi ∪ {v}
12:
go to Step (4)
3.3
. c.f. Proposition 1
Invariant analysis
Lemma 2. Invariants 1-5 are maintained by Algorithm 1 until the condition in the if statement in Step (5)
is true. Furthermore, the algorithm terminates in O(n · k) iterations.
Proof. Clearly the invariants are true after the initialization steps (at time t = 0), given that d(Bi , hj ) > 0
for any i 6= j. To see why Algorithm 1 terminates in a polynomial number of iterations, note that each
7
iteration increases the size some moat by 1 and does not decrease the size of any moats. So after at most
kn iterations some moat will grow to include the virtual body of another moat, at which point the algorithm
stops.
Assume now that the invariants are true at some point just before Step (4) is executed and that the
condition in Step (5) is false after Step (4) finishes. We will show that the invariants continue to hold just
before the next iteration starts. We let uv denote the edge that went tight that is considered in Step (4). We
also let t denote the total time the algorithm has executed (i.e. grown moats) up to this point.
0
Before proceeding with our proof, we exhibit the following useful fact. In what follows, let Mjt be the
moat around hj at any time t0 ≤ t during the algorithm. This proposition demonstrates how we control the
overlap of the moats by exploiting the quasi-bipartite structure.
0
Proposition 1. If uv ∈ δ in (Mi ), then uv 6∈ δ in (Mjt ) for any j 6= i, and for any t0 ≤ t.
0
0
Proof. Suppose, for the sake of contradiction, that uv ∈ δ in (Mjt ) for some j 6= i and t0 ≤ t. Since Mjt is
a subset of Mj , the moat containing hj at time t, we must have v ∈ Mj ∩ Mi . Invariant 3 now implies that
v ∈ B̄. Since G is quasi-bipartite, then u ∈ X. Therefore u ∈ Bj 0 for some j 0 . Since j 0 6= i or j 0 6= j, then
the terminating condition in Step (5) would have been satisfied as u ∈ βj 0 . A contradiction.
Following Proposition 1, we let i be the unique index such that uv ∈ δ in (Mi ) as in Step (8).
Invariant 1
First note that Mi never loses vertices during the algorithm’s execution, and it therefore always contains
head vertex hi . Also, vertex u is not part of B0 as otherwise the algorithm would have terminated in Step
(5). Hence Mi ∪ {u} also does not contain the root node r.
Invariant 2
This is just a reinterpretation of Dijkstra’s algorithm in the primal-dual framework (e.g. Chapter 5.4 of [12]),
coupled with the fact that no edge considered in Step (4) in some iteration crosses more than one moat at
any given time (Proposition 1).
Invariant 3
Suppose (Mi ∪ {u}) ∩ Mj 6⊆ B̄ for some i 6= j. This implies u ∈ Mj \ B̄, and hence u ∈ Bj ⊆ βj . Thus,
the termination condition in Step (5) was satisfied and the algorithm should have terminated; contradiction.
If v is not added to βi , and thus βi remains unchanged, βi ∩ βj = Mj ∩ βi = ∅ continues to hold for
j 6= i. We also must have that (Mi ∪ {u}) ∩ βj = ∅ for i 6= j, as otherwise u ∈ βj and this would violate
the termination condition in Step (5).
Now suppose that v is added to βi . Then for j 6= i we still have (βi ∪ {v}) ∩ βj = ∅ as otherwise v ∈ βj
which contradicts v ∈ Mi and the fact that Invariant 3 holds at the start of this iteration. We also have that
Mj ∩ (βi ∪ {v}) = ∅ as otherwise v ∈ Mj . But this would mean that u ∈ Mj as well by Proposition 1. We
established above that (Mi ∪ {u}) ∩ Mj ⊆ B. However, {u, v} ⊆ (Mi ∪ {u}) ∩ Mj ⊆ B contradicts the
fact that G is quasi-bipartite.
Invariant 4
That Bi ⊆ βi is clear simply because we only add nodes to the sets βi . Suppose now that v is added to
βi . In this case, v 6∈ Bi as Bi ⊆ βi from the start. We claim that v can also not be part of Bj for some
j 6= i, since otherwise ∅ 6= Bj ∩ Mi ⊆ βj ∩ Mi , contradicting Invariant 3. Hence v ∈ B̄. Note that the
quasi-bipartiteness of G implies that u ∈ X, and hence u ∈ Bi . Proposition 1 finally implies that only the
moats crossed by uv are moats around i, so since the algorithm only grows one moat around i at any time
we have cuv ≤ t, and this completes the proof of Invariant 4.
8
Invariant 5
The Step (4) stops the first time a constraint becomes tight, so feasibility is maintained. In each step, the
algorithm grows precisely ` moats simultaneously. Because the objective function of (DST-Dual) is simply
the sum of the dual variables, then the value of the dual is just ` times the total time spent growing dual
variables.
3.4
Augmenting T
To complete the final detail in the description of the algorithm, we now show how to construct the partial
Steiner tree after Step (5) has been reached. Lemma 2 shows that Invariants 1 through 5 hold just before
Step (4) in the final iteration. Say the final iteration executes for δ time units and that uv is the edge that
goes tight and was considered in Step (5).
Lemma 3. When Step (6) is reached in Algorithm 1, we can efficiently find a partial Steiner tree T 0 with
0
`0 < ` non-root components such that cost(E(T 0 )) ≤ cost(E(pt)) + 2 `−`
` · OP TLP .
Proof. Let j be the unique index such that u ∈ βj at time ∆. There is exactly one such j because βi ∩βj = ∅
for i 6= j is ensured by the invariants. Next, let J = {i0 6= j : v ∈ Mi0 } and note that J consists of all
indices i0 (except, perhaps, j) such that uv ∈ δ in (Mi0 ). By the termination condition, J 6= ∅. Vertex u lies
in βj by definition. If u 6∈ Bj then we let w be the mate of u as defined in Invariant 4. Otherwise, if w ∈ Bj ,
we let w = u.
For notational convenience, we let Pj be the path consisting of the single edge wu (or just the trivial
path with no edges if w = u). In either case, say cost of Pj is ∆ − j where j ≥ 0 (c.f. Invariant 4). For
each i0 ∈ J, let Pi0 be a shortest v, hi0 -path. Invariant 2 implies that
c(Pi0 ) = ∆ − i0 ,
for some i0 ≥ 0. Observe also that the tightness of uv at time ∆ and the definition of J imply that
X
i0 ≥ cuv .
(3)
(4)
i0 ∈J∪{j}
In fact, precisely a i0 -value of the dual variables for i0 6= j contribute to cuv ; the contribution of j’s variables
to cuv is at most i0 .
Construct a partial Steiner tree T 0 obtained from T and Algorithm 1 as follows.
• The sets Bj 0 , Fj 0 and head hj 0 are unchanged for all j 0 6∈ J ∪ {j}.
S
• Replace the components {Bi0 }i0 ∈J∪{j} with a component B := i0 ∈J∪{j} (Bi0 ∪ V (Pi0 )) having
S
head h := hj . The edges of this component in T 0 are F := i0 ∈J∪{j} (Fi0 ∪ E(Pi0 )) ∪ {uv}.
• The free Steiner nodes B̄ 0 of T 0 are the Steiner nodes not contained in any of these components.
Namely, B̄ 0 consists of those nodes in B̄ that are not contained on any path Pi0 , i0 ∈ J ∪ {j}.
We show that Steiner tree T 0 as constructed above satisfies the conditions stated in Lemma 1. We first
verify that T 0 as constructed above is indeed a valid partial Steiner tree. Clearly the new sets B̄ 0 , {Bi }i6∈J+j
and B partition V and B̄ 0 is a subset of Steiner nodes.
Note that if 0 ∈ J ∪ {j} in the above construction, then j = 0 because no moat contains r. Thus, if B0
is replaced when B is constructed, then r is the head of this new component.
9
Next, consider any b ∈ B. If b ∈ Bj then there is an hj , b-path in Fj ⊆ F . If b ∈ Bi0 , i0 6= j then it can
be reached from hj in (B, F ) as follows. Follow the hj , w-path in Fj , then the w, u path Pj , cross the edge
uv, follow Pi0 to reach hi0 , and finally follow the hi0 , b-path in Fi0 . Finally, if b 6∈ Bi0 for any i0 ∈ J + j
then b lies on some path Pi0 , in which case it can be reached in a similar way.
It is also clear that E(T ) ⊆ E(T 0 ) and that the number of non-root components in T 0 is ` − |J| < `.
Also, cost(E(T 0 )) − cost(E(T )) is at most the cost of the the paths {Pi0 }i0 ∈J+i plus cuv .
It now easily follows from (3) and (4) that
X
cost(E(Pi0 )) + cuv ≤
i0 ∈J∪{j}
X
(∆ − i0 ) + cuv ≤ (|J| + 1)∆ ≤
i0 ∈J∪{j}
|J| + 1
· OP TLP .
`
The last bound follows because the feasible dual we have grown has value ` · ∆ ≤ OP TLP . Let `0 = ` − |J|
be the number of nonroot components in T 0 . Conclude by observing |J| + 1 = ` − `0 + 1 ≤ 2(` − `0 ).
To wrap things up, executing Algorithm 1 and constructing the partial Steiner tree as in Lemma 3 yields
the partial Steiner tree that is promised by Lemma 1.
4
Conclusion
We have shown that the integrality gap of LP relaxation (DST-Primal)
is O(log k) in quasi-bipartite in√
stances of directed Steiner tree. The gap is known to be Ω( k) in 4-layered instances [18] and O(log k) in
3-layered instances [6]. Since quasi-bipartite graphs are a generalization 2-layered instances,
it is natural to
√
ask if there is a generalization of 3-layered instances which has an O(log k) or even o( k) integrality gap.
One possible generalization of 3-layered graphs would be when the subgraph of G induced by the Steiner
nodes does not have a node with both positive indegree and positive outdegree. None of the known results
on directed Steiner tree suggest such instances have a bad gap.
Even when restricted to 3-layered graphs, a straightforward adaptation of our algorithm that grow moats
around the partial Steiner tree heads until some partial Steiner trees absorbs another fails to grow a sufficiently large dual to pay for the augmentation within any reasonable factor. A new idea is needed.
References
[1] J. Byrka, F. Grandoni, T. Rothvoss, and L. Sanita. Steiner tree approximation via iterative randomized
rounding. Journal of the ACM, 60(1):6, 2013.
[2] G. Calinescu and G. Zelikovsky. The polymatroid Steiner problems. J. Combinatorial Optimization,
9(3):281–294, 2005.
[3] M. Charikar, C. Chekuri, T. Cheung, Z. Dai, A. Goel, S. Guha, and M. Li. Approximation algorithms
for directed Steiner problems. J. Algorithms, 33(1):73–91, 1999.
[4] J. Edmonds. Optimum branchings. J. Res. Natl. Bur. Stand., 71:233–240, 1967.
[5] U. Feige. A threshold of ln n for approximating Set-Cover. Journal of the ACM, 45(4):634–652, 1998.
[6] Z. Friggstad, A. Louis, Y. K. Ko, J. Könemann, M. Shadravan, and M. Tulsiani. Linear programming
hierarchies suffice for directed Steiner tree. In proceedings of IPCO, 2014.
[7] S. Guha, A. Moss, J. Naor, and B. Schieber. Efficient recovery from power outage (extended abstract).
In proceedings of STOC, 1999.
10
[8] M. X. Goemans, N. Olver, T. Rothvoss, and R. Zenklusen. Matroids and integrality gaps for hypergraphic Steiner tree relaxations. In proceedings of STOC, 2012.
[9] M. X. Goemans and D. P. Williamson. A general approximation technique for constrained forest
problems. SIAM Journal on Computing, 24(2):296–317, 1995.
[10] E. Halperin and R. Krauthgamer. Polylogarithmic inapproximability. In proceedings of STOC, 2003.
[11] T. Hibi, and T. Fujito. Multi-rooted Greedy Approximation of directed Steiner trees with applications.
In proceedings of WG, 2012.
[12] C. H. Papadimitriou and K. Steiglitz. Combinatorial Optimization: Algorithms and Complexity.
Prentice-Hall, Inc., 1982.
[13] S. Rajagopalan, and V. V. Vazirani. On the bidirected cut relaxation for the metric Steiner tree problem.
In proceedings of SODA, 742–751, 1999.
[14] T. Rothvoss. Directed Steiner tree and the Lasserre hierarchy. CoRR abs/1111.5473, 2011.
[15] D. Steurer and I. Dinur. Analytical approach to parallel repetition. CoRR abs/1305.1979, 2013.
[16] V. V. Vazirani. Approximation Algorithms. Springer-Verlag, 2003.
[17] A. Zelikovsky. A series of approximation algorithms for the acyclic directed Steiner tree problem.
Algorithmica, 18:99–110, 1997.
[18] L. Zosin and S. Khuller. On directed Steiner trees. In proceedings of SODA, 2002.
11
| 8cs.DS
|
Transfer Learning for Named-Entity Recognition with Neural Networks
Ji Young Lee∗
MIT
[email protected]
Franck Dernoncourt∗
MIT
[email protected]
arXiv:1705.06273v1 [cs.CL] 17 May 2017
Abstract
Recent approaches based on artificial neural networks (ANNs) have shown promising results for named-entity recognition
(NER). In order to achieve high performances, ANNs need to be trained on a
large labeled dataset. However, labels
might be difficult to obtain for the dataset
on which the user wants to perform NER:
label scarcity is particularly pronounced
for patient note de-identification, which
is an instance of NER. In this work, we
analyze to what extent transfer learning
may address this issue. In particular,
we demonstrate that transferring an ANN
model trained on a large labeled dataset to
another dataset with a limited number of
labels improves upon the state-of-the-art
results on two different datasets for patient
note de-identification.
1
Introduction
Electronic health records (EHRs) have been
widely adopted in some countries such as the
United States and represent gold mines of information for medical research. The majority of EHR
data exist in unstructured form such as patient
notes (Murdoch and Detsky, 2013). Applying natural language processing on patient notes can improve the phenotyping of patients (Ananthakrishnan et al., 2013; Pivovarov and Elhadad, 2015;
Halpern et al., 2016), which has many downstream applications such as the understanding of
diseases (Liao et al., 2015).
However, before patient notes can be shared
with medical investigators, some types of information, referred to as protected health information (PHI), must be removed in order to preserve
∗
These authors contributed equally to this work.
Peter Szolovits
MIT
[email protected]
patient confidentiality. In the United States, the
Health Insurance Portability and Accountability
Act (HIPAA) (Office for Civil Rights, 2002) defines 18 different types of PHI, ranging from patient names and ID numbers to addresses and
phone numbers. The task of removing PHI from a
patient note is referred to as de-identification. The
essence of de-identification is recognizing PHI in
patient notes, which is a form of named-entity
recognition (NER).
Existing de-identification systems are often
rule-based approaches or feature-based machine
learning approaches. However, these techniques
require additional lead time for developing and
fine-tuning the rules or features specific to each
new dataset. Meanwhile, recent work using ANNs
have yielded state-of-the-art performances without using any manual features (Dernoncourt et al.,
2016). Compared to the previous systems, ANNs
have a competitive advantage that the model can
be fine-tuned on a new dataset without the overhead of manual feature development, as long as
some labels for the dataset are available.
However, it may still be inefficient to mass deploy ANN-based de-identification system in practical settings, since creating annotations for patient notes is especially difficult. This is due to
the fact that only a restricted set of individuals
is authorized to access original patient notes; the
annotation task cannot be crowd-sourced, making it slow and expensive to obtain a large annotated corpus. Medical professionals are therefore
wary to explore patient notes because of this deidentification barrier, which considerably hampers
medical research.
In this paper, we analyze to what extent transfer learning may improve de-identification performances on datasets with a limited number of labels. By training an ANN model on a large dataset
(MIMIC) and transferring it to smaller datasets
(i2b2 2014 and i2b2 2016), we demonstrate that
transfer learning allows to outperform the state-ofthe-art results.
2
Related Work
Transfer learning has been studied for a long time.
There is no standard definition of transfer learning
in the literature (Li, 2012). We follow the definition from (Pan and Yang, 2010): transfer learning
aims at performing a task on a target dataset using
some knowledge learned from a source dataset.
The idea has been applied to many fields such as
speech recognition (Wang and Zheng, 2015) and
finance (Stamate et al., 2015).
The successes of ANNs for many applications
over the last few years have escalated the interest
in studying transfer learning for ANNs. In particular, much work has been done for computer
vision (Yosinski et al., 2014; Oquab et al., 2014;
Zeiler and Fergus, 2014). In these studies, some
of the parameters learned on the source dataset are
used to initialize the corresponding parameters of
the ANNs for the target dataset.
Fewer studies have been performed on transfer
learning for ANN-based models in the field of natural language processing. For example, Mou et
al. (2016) focused on transfer learning with convolutional neural networks for sentence classification. To the best of our knowledge, no study has
analyzed transfer learning for ANN-based models
in the context of NER.
3
nating the outputs of the token embedding layer
and the character LSTM layer, and outputs a sequence of vectors.
5. Fully connected layer takes the output of the
token LSTM layer as input, and outputs vectors containing the scores of each label for the
corresponding tokens.
6. Sequence optimization layer takes the sequence of vectors from the output of the fully
connected layer and outputs the most likely sequence of predicted labels, by optimizing the
sum of unigram label scores as well as bigram
label transition scores.
Figure 1 shows how these six components are interconnected to form the model. All layers are
learned jointly using stochastic gradient descent.
For regularization, dropout is applied before the
token LSTM layer, and early stopping is used on
the development set with a patience of 10 epochs.
labels of each token in the sentence
yn-1
yn
Sequence optimization
···
FC
FC
···
Fully connected
FC
FC
Token LSTM
Model
The model we use for transfer learning experiments is based on a type of recurrent neural networks called long short-term memory
(LSTM) (Hochreiter and Schmidhuber, 1997), and
utilizes both token embeddings and character embeddings. It comprises six major components:
yj
y2
y1
···
···
···
···
concatenate
Character LSTM
concatanate
···
Token
embeddings
···
1. Token embedding layer maps each token to a
token embedding.
Character embeddings
2. Character embedding layer maps each character to a character embedding.
3. Character LSTM layer takes as input character embeddings and outputs a single vector that
summarizes the information from the sequence
of characters in the corresponding token.
4. Token LSTM layer takes as input a sequence
of token vectors, which are formed by concate-
xj
jth token in the sentence
c1j
c2j
c(l-1)j clj
characters in the jth token
Figure 1: ANN model for NER. For transfer learning experiments, we train the parameters of the
model on a source dataset, and transfer all or some
of the parameters to initialize the model for training on a target dataset.
4
4.1
Experiments
Datasets
We use three de-identification datasets for the
transfer learning experiments: MIMIC, i2b2 2014,
and i2b2 2016. The MIMIC de-identification
dataset was introduced in (Dernoncourt et al.,
2016), and is a subset of the MIMIC-III
dataset (Johnson et al., 2016; Goldberger et al.,
2000; Saeed et al., 2011). The i2b2 2014 and
2016 datasets were released as part of the 2014
i2b2/UTHealth shared task Track 1 (Stubbs et al.,
2015) and the 2016 i2b2 CEGS N-GRID shared
task, respectively. Table 1 presents the datasets’
sizes.
MIMIC i2b2 2014 i2b2 2016
Vocabulary size
69,525
46,803
61,503
Number of notes
1,635
1,304
1,000
Number of tokens
2,945,228 984,723 2,689,196
Number of PHI instances 60,725
28,867
41,142
Number of PHI tokens
78,633
41,355
54,420
Table 1: Overview of the MIMIC and i2b2
datasets. PHI stands for protected health information.
4.2
Transfer learning
The goal of transfer learning is to leverage the
information present in a source dataset to improve the performance of an algorithm on a target
dataset. In our setting, we apply transfer learning
by training the parameters of the ANN model on
the source dataset (MIMIC), and using the same
ANN to retrain on the target dataset (i2b2 2014
or 2016) for fine-tuning. We use MIMIC as the
source dataset since it is the dataset with the most
labels. We perform two sets of experiments to gain
insights on how effective transfer learning is and
which parameters of the ANN are the most important to transfer.1
Experiment 1 Quantifying the impact of transfer learning for various train set sizes of the target
dataset. The primary purpose of this experiment is
to assess to what extent transfer learning improves
the performances on the target dataset. We experiment with different train set sizes to understand
how many labels are needed for the target dataset
1
Our code is an extension of the NER library
NeuroNER (Dernoncourt et al., 2017), which we committed to NeuroNER’s repository https://github.com/
Franck-Dernoncourt/NeuroNER
to achieve reasonable performances with and without transfer learning.
Experiment 2 Analyzing the importance of
each parameter of the ANN in the transfer learning. Instead of transferring all the parameters,
we experiment with transferring different combinations of parameters. The goal is to understand which components of the ANN are the most
important to transfer. The lowest layers of the
ANN tend to represent task-independent features,
whereas the topmost layers are more task-specific.
As a result, we try transferring the parameters
starting from the bottommost layer up to the topmost layer, adding one layer at a time.
5
Results
Experiment 1 Figure 2 compares the F1-scores
of the ANN trained only on the target dataset
against the ANN trained on the source dataset followed by the target dataset. Transfer learning improves the F1-scores over training only with the
target dataset, though the improvement diminishes
as the number of training samples used for the target dataset increases. This implies that the representations learned from the source dataset are
efficiently transferred and exploited for the target
dataset.
Therefore, when transfer learning is adopted,
fewer annotations are needed to achieve the same
level of performance as when the source dataset is
unused. For example, on the i2b2 2014 dataset,
performing transfer learning and using 16% of the
i2b2 train set leads to similar performance as not
using transfer learning and using 34% of the i2b2
train set. Transfer learning thus allows to cut by
half the number of labels needed on the target
dataset in this case.
For both the i2b2 2014 and 2016 datasets,
the performance gains from transfer learning are
greater when the train set size of the target dataset
is small. The largest improvement can be observed
for i2b2 2014 when using 5% of the dataset as the
train set (consisting of around 2k PHI tokens out of
50k tokens), where transfer learning increases the
F1-score by around 3.1 percent point, from 90.12
to 93.21. Even when all of the train set is used,
the F1-score improves when using transfer learning, albeit by just 0.17 percent point, from 97.80
to 97.97.
(b) i2b2 2016
98
96
96
94
F1-score (%)
F1-score (%)
(a) i2b2 2014
94
92
90
5%
10% 20% 40% 60%
Target train set size (%)
Baseline
Transfer
92
90
88 5%
10% 20% 40% 60%
Target train set size (%)
Figure 2: Impact of transfer learning on the F1-scores. Baseline corresponds to training the ANN model
only with the target dataset, and transfer learning corresponds to training on the source dataset followed
by training on the target dataset. The target train set size is the percentage of train set in the whole
dataset, and 60% corresponds to the full official train set.
(b) i2b2 2016
98
96
96
94
94
92
F1-score (%)
F1-score (%)
(a) i2b2 2014
92
90
88
No
tra
To nsfe
ke r
ne
Ch mb
ar
Ch emb
ar
To LST
Fu ken M
lly LS
co TM
nn
ec
ted
CR
F
No
tra
To nsfe
ke r
ne
Ch mb
ar
Ch emb
ar
To LST
Fu ken M
lly LS
co TM
nn
ec
ted
CR
F
90
5%
10%
20%
40%
60%
Figure 3: Impact of transferring the parameters up to each layer of the ANN model using various train
set sizes on the target dataset: 5%, 10%, 20%, 40%, and 60% (official train set).
Experiment 2 Figure 3 shows the importance of
each layer of the ANN in transfer learning. We
observe that transferring a few lower layers is almost as efficient as transferring all layers. For i2b2
2014, transferring up to the token LSTM shows
great improvements for each layer, but there is less
improvement for each added layer beyond that.
For i2b2 2016, larger improvements can be observed up to the character LSTM and less so beyond that layer.
The parameters in the lower layers therefore
seems to contain most information that are relevant to the de-identification task in general, which
supports the common hypothesis that higher layers
of ANN architectures contain the parameters that
are more specific to the task as well as the dataset
used for training.
Despite the observation that transferring a few
lower layers may be sufficient for efficient transfer learning, it is interesting to see that adding the
topmost layers to the transfer learning does not
hurt the performance. When retraining the model
on the target dataset, the ANN is able to adapt
to the target dataset quite well despite some the
higher layers being initialized to parameters that
are likely to be more specific to the source dataset.
6
Conclusion
In this work, we have studied transfer learning
with ANNs for NER, specifically patient note
de-identification, by transferring ANN parameters
trained on a large labeled dataset to another dataset
with limited human annotations. We demonstrated
that transfer learning improves the performance
over the state-of-the-art results on two datasets.
Transfer learning may be especially beneficial for
a target dataset with small number of labels.
References
Ashwin N Ananthakrishnan, Tianxi Cai, Guergana
Savova, Su-Chun Cheng, Pei Chen, Raul Guzman
Perez, Vivian S Gainer, Shawn N Murphy, Peter
Szolovits, Zongqi Xia, et al. 2013. Improving case
definition of Crohn’s disease and ulcerative colitis
in electronic medical records using natural language
processing: a novel informatics approach. Inflammatory bowel diseases 19(7):1411.
Franck Dernoncourt, Ji Young Lee, and Peter
Szolovits. 2017. NeuroNER: an easy-to-use program for named-entity recognition based on neural
networks. arXiv:1705.05487 .
Lili Mou, Zhao Meng, Rui Yan, Ge Li, Yan Xu,
Lu Zhang, and Zhi Jin. 2016. How transferable
are neural networks in NLP applications? arXiv
preprint arXiv:1603.06111 .
Travis B Murdoch and Allan S Detsky. 2013. The inevitable application of big data to health care. Jama
309(13):1351–1352.
HHS Office for Civil Rights. 2002. Standards for privacy of individually identifiable health information.
final rule. Federal Register 67(157):53181.
Maxime Oquab, Leon Bottou, Ivan Laptev, and Josef
Sivic. 2014. Learning and transferring mid-level image representations using convolutional neural networks. In Proceedings of the IEEE conference
on computer vision and pattern recognition. pages
1717–1724.
Sinno Jialin Pan and Qiang Yang. 2010. A survey on
transfer learning. IEEE Transactions on knowledge
and data engineering 22(10):1345–1359.
Franck Dernoncourt, Ji Young Lee, Ozlem Uzuner, and
Peter Szolovits. 2016. De-identification of patient
notes with recurrent neural networks. Journal of
the American Medical Informatics Association page
ocw156.
Rimma Pivovarov and Noémie Elhadad. 2015. Automated methods for the summarization of electronic
health records. Journal of the American Medical Informatics Association 22(5):938–947.
Ary L Goldberger, Luis AN Amaral, Leon Glass, Jeffrey M Hausdorff, Plamen Ch Ivanov, Roger G
Mark, Joseph E Mietus, George B Moody, ChungKang Peng, and H Eugene Stanley. 2000. Physiobank, physiotoolkit, and physionet components of
a new research resource for complex physiologic
signals. Circulation 101(23):e215–e220.
Mohammed Saeed, Mauricio Villarroel, Andrew T
Reisner, Gari Clifford, Li-Wei Lehman, George
Moody, Thomas Heldt, Tin H Kyaw, Benjamin
Moody, and Roger G Mark. 2011. Multiparameter
intelligent monitoring in intensive care II (MIMICII): a public-access intensive care unit database.
Critical care medicine 39(5):952.
Yoni Halpern, Steven Horng, Youngduck Choi, and
David Sontag. 2016. Electronic medical record
phenotyping using the anchor and learn framework.
Journal of the American Medical Informatics Association page ocw011.
Cosmin Stamate, George D Magoulas, and
Michael SC Thomas. 2015.
Transfer learning
approach for financial applications. arXiv preprint
arXiv:1509.02807 .
Sepp Hochreiter and Jürgen Schmidhuber. 1997.
Long short-term memory. Neural computation
9(8):1735–1780.
Alistair E. W. Johnson, Tom J. Pollard, Lu Shen,
Li wei Lehman, Mengling Feng, Mohammad Ghassemi, Benjamin Moody, Peter Szolovits, Leo Anthony Celi, and Roger G. Mark. 2016. MIMIC-III,
a freely accessible critical care database. Scientific
Data .
Amber Stubbs, Christopher Kotfila, and Özlem Uzuner.
2015. Automated systems for the de-identification
of longitudinal clinical narratives: Overview of 2014
i2b2/UTHealth shared task track 1. Journal of
biomedical informatics 58:S11–S19.
Dong Wang and Thomas Fang Zheng. 2015. Transfer learning for speech and language processing. In
Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2015 AsiaPacific. IEEE, pages 1225–1237.
Qi Li. 2012. Literature survey: domain adaptation algorithms for natural language processing. Department of Computer Science The Graduate Center, The
City University of New York pages 8–10.
Jason Yosinski, Jeff Clune, Yoshua Bengio, and Hod
Lipson. 2014. How transferable are features in deep
neural networks? In Advances in neural information
processing systems. pages 3320–3328.
Katherine P Liao, Tianxi Cai, Guergana K Savova,
Shawn N Murphy, Elizabeth W Karlson, Ashwin N
Ananthakrishnan, Vivian S Gainer, Stanley Y Shaw,
Zongqi Xia, Peter Szolovits, et al. 2015. Development of phenotype algorithms using electronic medical records and incorporating natural language processing. bmj 350:h1885.
Matthew D Zeiler and Rob Fergus. 2014. Visualizing
and understanding convolutional networks. In European conference on computer vision. Springer, pages
818–833.
| 2cs.AI
|
arXiv:1604.03640v1 [cs.LG] 13 Apr 2016
CBMM Memo No. 047
April 12, 2016
Bridging the Gaps Between Residual Learning,
Recurrent Neural Networks and Visual Cortex
by
Qianli Liao and Tomaso Poggio
Center for Brains, Minds and Machines, McGovern Institute, MIT
Abstract: We discuss relations between Residual Networks (ResNet), Recurrent Neural Networks (RNNs) and
the primate visual cortex. We begin with the observation that a shallow RNN is exactly equivalent to a very deep
ResNet with weight sharing among the layers. A direct implementation of such a RNN, although having orders
of magnitude fewer parameters, leads to a performance similar to the corresponding ResNet. We propose 1) a
generalization of both RNN and ResNet architectures and 2) the conjecture that a class of moderately deep RNNs
is a biologically-plausible model of the ventral stream in visual cortex. We demonstrate the effectiveness of the
architectures by testing them on the CIFAR-10 dataset.
This work was supported by the Center for Brains, Minds and Machines
(CBMM), funded by NSF STC award CCF - 1231216.
1
1
Introduction
Residual learning [8], a novel deep learning scheme characterized by ultra-deep architectures has recently achieved
state-of-the-art performance on several popular vision benchmarks. The most recent incarnation of this idea [10]
with hundreds of layers demonstrate consistent performance improvement over shallower networks. The 3.57% top-5
error achieved by residual networks on the ImageNet test set arguably rivals human performance.
Because of recent claims [33] that networks of the AlexNet[16] type successfully predict properties of neurons in
visual cortex, one natural question arises: how similar is an ultra-deep residual network to the primate cortex? A
notable difference is the depth. While a residual network has as many as 1202 layers[8], biological systems seem
to have two orders of magnitude less, if we make the customary assumption that a layer in the NN architecture
corresponds to a cortical area. In fact, there are about half a dozen areas in the ventral stream of visual cortex from
the retina to the Inferior Temporal cortex. Notice that it takes in the order of 10ms for neural activity to propagate
from one area to another one (remember that spiking activity of cortical neurons is usually well below 100 Hz).
The evolutionary advantage of having fewer layers is apparent: it supports rapid (100msec from image onset to
meaningful information in IT neural population) visual recognition, which is a key ability of human and non-human
primates [31, 28].
It is intriguingly possible to account for this discrepancy by taking into account recurrent connections within each
visual area. Areas in visual cortex comprise six different layers with lateral and feedback connections [17], which are
believed to mediate some attentional effects [2, 17, 14, 25, 12] and even learning (such as backpropagation [20]).
“Unrolling” in time the recurrent computations carried out by the visual cortex provides an equivalent “ultra-deep”
feedforward network, which might represent a more appropriate comparison with the state-of-the-art computer
vision models.
In addition, we conjecture that the effectiveness of recent “ultra-deep” neural networks primarily come from the
fact they can efficiently model the recurrent computations that are required by the recognition task. We show
compelling evidences for this conjecture by demonstrating that 1. a deep residual network is formally equivalent to
a shallow RNN; 2. such a RNN with weight sharing, thus with orders of magnitude less parameters (depending on
the unrolling depth), can retain most of the performance of the corresponding deep residual network.
Furthermore, we generalize such a RNN into a class of models that are more biologically-plausible models of cortex
and show their effectiveness on CIFAR-10.
2
2.1
Equivalence of ResNet and RNN
Intuition
We discuss here a very simple observation: a Residual Network (ResNet) approximates a specific, standard Recurrent
Neural Network (RNN) implementing the discrete dynamical system described by
ht = K ◦ (ht−1 ) + ht−1
(1)
where ht is the activity of the neural layer at time t and K is a nonlinear operator. Such a dynamical systems
corresponds to the feedback system of Figure 1 (B). Figure 1 (A) shows that unrolling in (discrete) time the feedback
system gives a deep residual network with the same (that is, shared) weights among the layers. The number of
layers in the unrolled network corresponds to the discrete time iterations of the dynamical system. The identity
shortcut mapping that characterizes residual learning appears in the figure.
Thus, ResNets with shared weights can be reformulated into the form of a recurrent system. In section 5.2) we show
experimentally that a ResNet with shared weights retains most of its performance (on CIFAR-10).
A comparison of a plain RNN and ResNet with shared weights is in the Appendix Figure 11.
2
8
h
...
h
+
I
K
h2
Unfold
+
I
I
K
Fold
h1
+
I
h0
K+I
+
K
x
x0
(A) ResNet with shared weights
xt=x0δt
(B) ResNet in recurrent form
Figure 1: A formal equivalence of a ResNet (A) with weight sharing and a RNN (B). I is the identity operator. K is
an operator denoting the nonlinear transformation called f in the main text. xt is the value of the input at time t.
δt is a Kronecker delta function.
2.2
Formulation in terms of Dynamical Systems (and Feedback)
We frame recurrent and residual neural networks in the language of dynamical systems. We consider here dynamical
systems in discrete time, though most of the definitions carry over to continuous time. A neural network (that we
assume for simplicity to have a single layer with n neurons) can be a dynamical system with a dynamics defined as
ht+1 = f (ht ; wt ) + xt
(2)
where ht ∈ Rn is the activity of the n neurons in the layer at time t and f : Rn → Rn is a continuous, bounded
function parametrized by the vector of weights wt . In a typical neural network, f is synthesized by the following
relation between the activity yt of a single neuron and its inputs xt−1 :
yt = σ(hw, xt−1 i + b),
(3)
where σ is a nonlinear function such as the linear rectifier σ(·) = | · |+ .
A standard classification of dynamical systems defines the system as
1. homogeneous if xt = 0, ∀t > 0 (alternatively the equation reads as ht+1 = f (ht ; wt ) with the inital condition
h0 = x0 )
2. time invariant if wt = w.
Residual networks with weight sharing thus correspond to homogeneous, time-invariant systems which in turn
correspond to a feedback system (see Figure 1) with an input which is non-zero only at time t = 0 (xt=0 = x0 , xt =
0 ∀t > 0) and with f (z) = (K + I) ◦ z:
3
hn = f (ht ; wt ) = (K + I)n ◦ x0
(4)
“Normal” residual networks correspond to homogeneous, time-variant systems. An analysis of the corresponding
inhomogeneous, time-invariant system is provided in the Appendix.
3
A Generalized RNN for Multi-stage Fully Recurrent Processing
As shown in the previous section, the recurrent form of a ResNet is actually shallow (if we ignore the possible depth
of the operator K). In this section, we generalize it into a moderately deep RNN that reflects the multi-stage
processing in the primate visual cortex.
3.1
Multi-state Graph
We propose a general formulation that can capture the computations performed by a multi-stage processing hierarchy
with full recurrent connections. Such a hierarchy can be characterized by a directed (cyclic) graph G with vertices
V and edges E.
G = {V, E}
(5)
where vertices V is a set contains all the processing stages (i.e., we also call them states). Take the ventral stream
of visual cortex for example, V = {LGN, V 1, V 2, V 4, IT }. Note that retina is not listed since there is no known
feedback from primate cortex to the retina. The edges E are a set that contains all the connections (i.e., transition
functions) between all vertices/states, e.g., V1-V2, V1-V4, V2-IT, etc. One example of such a graph is in Figure 2
(A).
3.2
Pre-net and Post-net
The multi-state fully recurrent system does not have to receive raw inputs. Rather, a (deep) neural network can
serve as a preprocesser. We call the preprocesser a “pre-net” as shown in Figure 2 (B). On the other hand, one also
needs a “post-net” as a postprocessor and provide supervisory signals to the recurrent system and the pre-net. The
pre-net, recurrent system and post-net are trained in an end-to-end fashion with backpropagation.
For most models in this paper, unless stated otherwise, the pre-net is a simple 3x3 convolutional layer and the
post-net is a pipeline of a batch normalization, a ReLU, a global average pooling and a fully connected layer (or a
1x1 convolution, we use these terms interchangeably).
Take primate visual system for instance, the retina is a part of the “pre-net”. It does not receive any feedback from
the cortex and thus can be separated from the recurrent system for simplicity. In Section 5.3.3, we also tried 3 layers
of 3x3 convolutions as an pre-net, which might be more similar to a retina, and observed slightly better performance.
3.3
Transition Matrix
The set of edges E can be represented as a 2-D matrix where each element (i,j) represents the transition function
from state i to state j.
One can also extend the representation of E to a 3-D matrix, where the third dimension is time and each element
(i,j,t) represents the transition function from state i to state j at time t. In this formulation, the transition functions
4
Pre-net
Post-net
...
Retina
V1
V2
V4
IT
V1
V2
V4
Loss
IT
...
Input
(A) Multi-state (Fully) Recurrent Neural Network
(B) Full model
...
t=T
V1
V2
V4
IT
Pool
Loss
Loss
h
...
Conv
...
K+I
t=2
V1
V2
V4
IT
h
K+I
t=1
V1
V2
V4
IT
h
...
Input
Input
Optional
(C) Simulating our model in time by unrolling
Conv
(D) An example ResNet: for comparison
Figure 2: Modeling the ventral stream of visual cortex using a multi-state fully recurrent neural network
can vary over time (e.g., being blocked from time t1 to time t2 , etc.). The increased expressive power of this
formulation allows us to design a system where multiple locally recurrent systems are connected sequentially: a
downstream recurrent system only receives inputs when its upstream recurrent system finishes, similar to recurrent
convolutional neural networks (e.g., [19]). This system with non-shared weights can also represent exactly the
state-of-the-art ResNet (see Figure 3).
Nevertheless, time-dependent dynamical systems, that is recurrent networks of real neurons and synapses, offer
interesting questions about the flexibility in controlling their time dependent parameters.
Example transition matrices used in this paper are shown in Figure 4.
When there are multiple transition functions to a state, their outputs are summed together.
3.4
Shared vs. Non-shared Weights
Weight sharing is described at the level of an unrolled network. Thus, it is possible to have unshared weights with a
2D transition matrix — even if the transitions are stable over time, their weights could be time-variant.
Given an unrolled network, a weight sharing configuration can be described as a set S, whose element is a set of tied
5
Pool
Conv
Pool
e.g., size: 32x32x16
...
e.g., size: 8x8x64
Loss
h
...
...
e.g., size: 16x16x32
K+I
...
e.g., size: 32x32x16
K+I
Input
h
K3+I
h3
h2
K2+I
Input
(A) ResNet without changing spacial&feature sizes
h
h1
K1+I
h1
Conv
Pre-net
Loss
h3
h2
h
e.g., size: 32x32x16
Conv
Connection available only
at a specified time t
Conv
(B) ResNet with changes of spacial&feature sizes (He et. al.)
Post-net
Pre-net
(C) Recurrent form of A
h1
h2
Subsample
&increase
features
h3
Post-net
Subsample
&increase
features
(D) Recurrent form of B
Figure 3: We show two types of ResNet and corresponding RNNs. (A) and (C): Single state ResNet. The spacial
and featural sizes are fixed. (B) and (D) 3-state ResNet. The spacial size is reduced by a factor of 2 and the featural
size is doubled at time n and 2n, where n is a meta parameter. This type corresponds to the ones proposed by He
et. al. [8].
weights s = {Wi1 ,j1 ,t1 , ..., Wim ,jm ,tm }, where Wim ,jm ,tm denotes the weight of the transition functions from state im
to jm at time tm . This requires: 1. all weights Wim ,jm ,tm ∈ s have the same initial values. 2. the actual gradients
used for updating each element of s is the sum of the gradients of all elements in s:
∀W ∈ s, (
X ∂E
∂E
)used =
(
)original
∂W
∂W 0
0
(6)
W ∈s
where E is the training objective.
For RNNs, weights are usually shared across time, but one could unshare the weights, share across states or perform
more complicated sharing using this framework.
3.5
Notations: Unrolling Depth vs. Readout Time
The meaning of “unrolling depth” may vary in different RNN models since “unrolling” a cyclic graph is not well
defined. In this paper, we adopt a biologically-plausible definition: we simulate the time after the onset of the visual
stimuli assuming each transition function takes constant time 1. We use the term “readout time” to refer to the
time the post-net reads the data from the last state.
This definition in principle allows one to have quantitive comparisons with biological systems. e.g., for a model with
readout time t in this paper, the wall clock time can be estimated to be 20t to 50t ms, considering the latency of a
single layer of biological neurons.
Regarding the initial values, at t = 0 all states are empty except that the first state has some data received from the
6
BN-ReLU-Conv x 3 (BRCx3)
BRCx2+I
BRCx2
BRCx2
BRCx2+I
V1
V2
V4
BRCx2
IT
h1
BRCx2+I
BN-ReLU-Deconv x 3 (BRDx3)
t=1...Inf.
V1
V2
V4
V1
BRCx2+I
BRCx2
BRCx2
BRCx3
V2
BRDx2
BRCx2+I
BRCx2
BRCx2
V4
BRDx2
h1
BRDx2
BRDx2
h1
BRCx2+I
BRDx2
h2
BRCx2
BRCx2+I
BRDx2
BRCx1
h3
h1
Connection available only
at a specified time t
BRCx2+I
h3
t=1...Inf.
h1
h2
h1
BRCx2+I
BRCx2
h2
BRDx2
BRCx2+I
BRCx2
BRCx2
BRDx2 BRCx2+I
t=
1...Inf.
h1
h2
h1
BRCx2+I
Conv
(only at t=n)
h2
h3
(C) an example 2-D
transition matrix
for a 2-state fully
recurrent NN
(B) an example 2-D transition
matrix for a 3-state fully
recurrent NN
BRCx2+I
h2
BRCx2+I
(A) an example 2-D transition matrix
for a 4-state fully recurrent NN for
modeling the visual cortex
BRCx2+I
h2
BRCx2
BRCx2+I
BRCx2
h3
BRDx3
h1
IT
h2
IT
h3
BRCx2
BRCx2+I
t=1...Inf.
BRDx2 BRCx2+I
h2
BRCx2
BRCx1
h1
BRDx2
BRCx2+I
BRCx2+I
h3
t=
1...Inf.
Conv
(only at t=2n)
h1
h1 BRCx2+I
BRCx2+I
(D) 3-D transition matrix of
a 3-state ResNet
(E) transition
matrix of a
1-state ResNet
Figure 4: The transition matrices used in the paper. “BN” denotes Batch Normalization and “Conv” denotes
convolution. Deconvolution layer (denoted by “Deconv”) is [34] used as a transition function from a spacially small
state to a spacially large one. BRCx2/BRDx2 denotes a BN-ReLU-Conv/Deconv-BN-ReLU-Conv/Deconv pipeline
(similar to a residual module [10]). There is always a 2x2 subsampling/upsampling between nearby states (e.g.,
V1/h1: 32x32, V2/h2: 16x16, V4/h3:8x8, IT:4x4). Stride 2 (convolution) or upsampling 2 (deconvolution) is used
in transition functions to match the spacial sizes of input and output states. The intermediate feature sizes of
transition function BRCx2/BRDx2 or BRCx3/BRDx3 are chosen to be the average feature size of input and output
states. “+I” denotes a identity shortcut mapping. The design of transition functions could be an interesting topic
for future research.
pre-net. We only start simulate a transition function when its input state is populated.
3.6
Sequential vs. Static Inputs/Outputs
As an RNN, our model supports sequential data processing and in principle all other tasks supported by traditional
RNNs. See Figure 5 for illustrations. However, if there is a batch normalization in the model, we have to use
“time-specific normalization” described in Section 3.7, which might not be feasible for some tasks.
3.7
Batch Normalizations for RNNs
As an additional observation, we found that it generally hurts performance when the normalization statistics (e.g.,
average, standard deviation, learnable scaling and shifting parameters) in batch normalization are shared across
time. This may be consistent with the observations from [18].
However, good performance is restored if we apply a procedure we call a “time-specific normalization”: mean and
standard deviation are calculated independently for every t (using training set). The learnable scaling and shifting
parameters should be time-specific. But in most models we do not use the learnable parameters of BN since they
tend not to affect the performance much.
We expect this procedure to benefit other RNNs trained with batch normalization. However, to use this procedure,
one needs to have a initial t = 0 and enumerate all possible ts. This is feasible for visual processing but needs
modifications for other tasks.
7
Input
Recurrence
Output
...
t=T
V1
V2
...
V4
YT
IT
...
XT
t=1
V1
V2
V4
Y2
IT
...
X2
V1
V2
V4
IT
...
X1
V2
V4
IT
V1
V2
V4
IT
V1
V2
V4
IT
V1
V2
V4
IT
One-to-one
...
t=2
V1
V1
V2
V4
IT
V1
V2
V4
IT
V1
V2
V4
IT
V1
V2
V4
IT
One-to-many
V1
V2
V4
IT
V1
V2
V4
IT
V1
V2
V4
IT
V1
V2
V4
IT
t=T
.
.
.
t=2
t=1
Many-to-one
V1
V2
V4
IT
V1
V2
V4
IT
V1
V2
V4
IT
V1
V2
V4
IT
t=T
.
.
.
t=2
t=1
Many-to-many
An example of sequential data processing
Figure 5: Our model supports sequential inputs/outputs, which includes one-to-one, many-to-one, one-to-many and
many-to-many input-output mappings.
4
Related Work
Deep Recurrent Neural Networks: Our final model is deep and similar to a stacked RNN [27, 5, 7] with several
main differences: 1. our model has feedback transitions between hidden layers and self-transition from each hidden
layer to itself. 2. our model has identity shortcut mappings inspired by residual learning. 3. our transition functions
are deep and convolutional.
As suggested by [23], the term depth in RNN could also refer to input-to-hidden, hidden-to-hidden or hidden-to-output
connections. Our model is deep in all of these senses. See Section 3.2.
Recursive Neural Networks and Convolutional Recurrent Neural Networks: When unfolding RNN
into a feedforward network, the weights of many layers are tied. This is reminiscent of Recursive Neural Networks
(Recursive NN), first proposed by [29]. Recursive NN are characterized by applying same operations recursively on
a structure. The convolutional version was first studied by [4]. Subsequent related work includes [24] and [19]. One
characteristic distinguishes our model and residual learning from Recursive NN and convolutional recurrent NN is
whether there are identity shortcut mappings. This discrepancy seems to account for the superior performance of
residual learning and of our model over the latters.
A recent report [3] we became aware of after we finished this work discusses the idea of imitating cortical feedback
by introducing loops into neural networks.
A Highway Network [30] is a feedforward network inspired by Long Short Term Memory [11] featuring more general
shortcut mappings (instead of hardwired identity mappings used by ResNet).
5
5.1
Experiments
Dataset and training details
We test all models on the standard CIFAR-10 [15] dataset. All images are 32x32 pixels with color. Data augmentation
is performed in the same way as [8].
8
Momentum was used with hyperparameter 0.9. Experiments were run for 60 epochs with batchsize 64 unless stated
otherwise. The learning rates are 0.01 for the first 40 epochs, 0.001 for epoch 41 to 50 and 0.0001 for the last 10
epochs. All experiments used the cross-entropy loss function and softmax for classification. Batch Normalization
(BN) [13] is used for all experiments. But the learnable scaling and shifting parameters are not used (except for the
last BN layer in the post-net). Network weights were initialized with the method described in [9]. Although we do
not expect the initialization to matter as long as batch normalization is used. The implementations are based on
MatConvNet[32].
5.2
5.2.1
Experiment A: ResNet with shared weights
Sharing Weights Across Time
We conjecture that the effectiveness of ResNet mainly comes from the fact that it efficiently models the recurrent
computations required by the recognition task. If this is the case, one should be able to reinterpret ResNet as a
RNN with weight sharing and achieve comparable performance to the original version. We demonstrate various
incarnations of this idea and show it is indeed the case.
We tested the 1-state and 3-state ResNets described in Figure 3 and 4. The results are shown in Figure 6.
0.2
0.1
0
0.3
0.2
0.1
0
20
40
Epoch
60
0
0.4
0.3
0.2
0.1
0
20
40
Epoch
60
0
0.6
Non−Shared
#Param 667274
Shared
#Param 76426
0.5
0.4
0.3
0.2
0.1
0
20
40
Epoch
60
0
3-state
ResNet
0.5
0.4
0.3
0.2
0.1
0
20
40
Epoch
60
0
2-state
Fully Recurrent
0.6
Non−Shared
#Param 315338
Shared
#Param 121354
Non−Shared
#Param 2365962
Shared
#Param 297994
0.5
Validation Error on CIFAR−10
0.3
0.4
0.6
Non−Shared
#Param 2365962
Shared
#Param 297994
0.5
1-state
ResNet
Validation Error on CIFAR−10
0.4
2-state
Fully Recurrent
0.6
Non−Shared
#Param 315338
Shared
#Param 121354
0.5
Training Error on CIFAR−10
0.5
Training Error on CIFAR−10
0.6
Non−Shared
#Param 667274
Shared
#Param 76426
Training Error on CIFAR−10
0.6
3-state
ResNet
Validation Error on CIFAR−10
1-state
ResNet
0.4
0.3
0.2
0.1
0
20
40
Epoch
60
0
0
20
40
Epoch
60
Figure 6: All models are robust to sharing weights across time. This supports our conjecture that deep networks
can be well approximated by shallow/moderately-deep RNNs. The transition matrices of all models are shown in
Figure 4. “#Param” denotes the number of parameters. The 1-state ResNet has a single state of size 32x32x64
(height × width × #features). It was trained and tested with readout time t=10. The 3-state ResNet has 3 states
of size 32x32x16, 16x16x32 and 8x8x64 – there is a transition (via a simple convolution) at time 4 and 8 — each
state has a self-transition unrolled 3 times. The 2-state fully recurrent NN has 2 states of the same size: 32x32x64.
It was trained and tested with readout time t=10 (same as 1-state ResNet). It is a generalization of and directly
comparable with 1-state ResNet, showing the benefit of having more states. The 2-state fully recurrent NN with
shared weights and fewer parameters outperforms 1-state and 3-state ResNet with non-shared weights.
5.2.2
Sharing Weights Across All Convolutional Layers (Less Biologically-plausible)
Out of pure engineering interests, one could further push the limit of weight sharing by not only sharing across time
but also across states. Here we show two 3-state ResNets that use a single set of convolutional weights across all
convolutional layers and achieve reasonable performance with very few parameters (Figure 7).
9
CIFAR−10 with Very Few Parameters
Feat. 30
#Param. 9460
Feat. 64
#Param 39754
0.5
Validation Error on CIFAR−10
Training Error on CIFAR−10
0.5
0.4
0.3
0.2
0.1
0
Feat. 30
#Param. 9460
Feat. 64
#Param 39754
0.4
0.3
0.2
0.1
0
50
100
150
Epoch
0
0
50
100
150
Epoch
Figure 7: A single set of convolutional weights is shared across all convolutional layers in a 3-state ResNet. The
transition (at time t= 4 and 8) between nearby states is a 2x2 max pooling with stride 2. This means that each
state has a self-transition unrolled 3 times. “Feat.” denotes the number of feature maps, which is the same across all
3 states. The learning rates were the same as other experiments except that more epochs are used (i.e., 100, 20 and
20).
5.3
5.3.1
Experiment B: Multi-state Fully/Densely Recurrent Neural Networks
Shared vs. Non-shared Weights
Although an RNN is usually implemented with shared weights across time, it is however possible to unshare the
weights and use an independent set of weights at every time t. For practical applications, whenever one can have
a initial t = 0 and enumerate all possible ts, an RNN with non-shared weights should be feasible, similar to the
time-specific batch normalization described in 3.7. The results of 2-state fully recurrent neural networks with shared
and non-shared weights are shown in Figure 6.
5.3.2
The Effect of Readout Time
In visual cortex, useful information increases as time proceeds from the onset of the visual stimuli. This suggests
that recurrent system might have better representational power as more time is allowed. We tried training and
testing the 2-state fully recurrent network with various readout time (i.e., unrolling depth, see Section 3.5) and
observe similar effects. See Figure 8.
5.3.3
Larger Models With More States
We have shown the effectiveness of 2-state fully recurrent network above by comparing it with 1-State ResNet. Now
we discuss several observations regarding 3-state and 4-state networks.
First, 3-state models seem to generally outperform 2-state ones. This is expected since more parameters are
introduced. With a 3-state models with minimum engineering, we were able to get 7.47% validation error on
CIFAR-10.
10
2−State Fully Recurrent NN With Different Readout Time t
t=2
#Param. 76426
t=3
#Param. 224138
t=5
#Param. 297994
t=10
#Param. 297994
0.4
0.5
Validation Error on CIFAR−10
Training Error on CIFAR−10
0.5
0.3
0.2
0.1
0
t=2
#Param. 76426
t=3
#Param. 224138
t=5
#Param. 297994
t=10
#Param. 297994
0.4
0.3
0.2
0.1
0
20
40
0
60
Epoch
0
20
40
60
Epoch
Figure 8: A 2-state fully recurrent network with readout time t=2, 3, 5 or 10 (See Section 3.5 for the definition of
readout time). There is consistent performance improvement as t increases. The number of parameters changes
since at some t, some recurrent connections have not been contributing to the output and thus their number of
parameters are subtracted from the total.
Next, for computational efficiency, we tried only allowing each state to have transitions to adjacent states and to
itself by disabling bypass connections (e.g., V1-V3, V2-IT, etc.). In this case, the number of transitions scales linearly
as the number of states increases, instead of quadratically. This setting performs well with 3-state networks and
slightly less well with 4-state networks (perhaps as a result of small feature/parameter sizes). With only adjacent
connections, the models are no longer fully recurrent.
Finally, for 4-state fully recurrent networks, the models tend to become overly computationally heavy if we train
it with large t or large number of feature maps. With small t and feature maps, we have not achieved better
performance than 3-state networks. Reducing the computational cost of training multi-state densely recurrent
networks would be an important future work.
For experiments in this subsection, we choose a moderately deep pre-net of three 3x3 convolutional layers to model
the layers between retina and V1: Conv-BN-ReLU-Conv-BN-ReLU-Conv. This is not essential but outperforms
shallow pre-net slightly (within 1% validation error).
The results are shown in Figure 9.
5.3.4
Generalization Across Readout Time
As an RNN, our model supports training and testing with different readout time. Based on our theoretical analyses
in Section 2.2, the representation is usually not guaranteed to converge when running a model with time t → ∞.
Nevertheless, the model exhibits good generalization over time. Results are shown in Figure 10. As a minor detail,
the model in this experiment has only adjacent connections and does not have any self-transition, but we do not
expect this to affect the conclusion.
11
3−State Fully/Densely Recurrent Neural Networks
IT
Full
V1
V2
V4
IT
0.3
0.25
0.2
0.15
0.1
Adjacent
0.05
0.3
0.25
0.2
0.15
0.1
0
20
Epoch
40
60
0.05
0.018
0.016
Training Error on CIFAR−10
V4
Full
#Param 351970
Adjacent
#Param 154958
0.35
Validation Error on CIFAR−10
V2
Training Error on CIFAR−10
V1
Full
#Param 351970
Adjacent
#Param 154958
0.35
0.02
0.4
0
20
Epoch
40
Full
#Param 4210186
Adjacent
#Param 3287946
0.088
0.086
Validation Error on CIFAR−10
4−State Fully/Densely Recurrent Neural Networks (Small Model)
0.4
0.014
0.012
0.01
0.008
0.006
0.084
0.082
0.08
0.078
0.076
0.004
0.074
0.002
0.072
60
0
40
50
Epoch
60
Full
#Param 4210186
Adjacent
#Param 3287946
0.07
40
50
Epoch
60
Figure 9: The performance of 4-state and 3-state models. The state sizes of the 4-state model are: 32x32x8, 16x16x16,
8x8x32, 4x4x64. The state sizes of the 3-state model are: 32x32x64, 16x16x128, 8x8x256. 4-state models are small
since they are computationally heavy. The readout time is t=5 for both models. All models are time-invariant
systems (i.e., weights are shared across time).
6
Discussion
The dark secret of Deep Networks: trying to imitate Recurrent Shallow Networks?
A radical conjecture would be: the effectiveness of most of the deep feedforward neural networks, including but not
limited to ResNet, can be attributed to their ability to approximate recurrent computations that are prevalent in
most tasks with larger t than shallow feedforward networks. This may offer a new perspective on the theoretical
pursuit of the long-standing question “why is deep better than shallow” [22, 21].
Equivalence between Recurrent Networks and Turing Machines
Dynamical systems (in particular discrete time systems, that is difference equations) are Turing universal (the game
“Life" is a cellular automata that has been demonstrated to be Turing universal). Thus dynamical systems such as
the feedback systems we discussed can be equivalent to Turing machine. This offers the possibility of representing
a computation more complex than a single (for instance boolean) function with the same number of learnable
parameters. Consider for instance the powercase of learning a mapping F between an input vector x and an output
vector y = F (x) that belong to the same n-dimensional space. The output can be thought as the asymptotic states
of the discrete dynamical system obtained iterating some map f . We expect that in many cases the dynamical
system that asymptotically performs the mapping may have a much simpler structure than the direct mapping F .
In other words, we expect that the mapping f such that f (n) (x) = F (x) for appropriate, possibly very large n can
be much simpler than the mapping F (here f (n) means the n-th iterate of the map f ).
Empirical Finding: Recurrent Network or Residual Networks with weight sharing work well
Our key finding is that multi-state time-invariant recurrent networks seem to perform as well as very deep residual
networks (each state corresponds to a cortical area) without shared weights. On one hand this is surprising because
the number of parameters is much reduced. On the other hand a recurrent network with fixed parameters can be
equivalent to a Turing machine and maximally powerful.
Conjecture about Cortex and Recurrent Computations in Cortical Areas
Most of the models of cortex that led to the Deep Convolutional architectures and followed them – such as the
Neocognitron [6], HMAX [26] and more recent models [1] – have neglected the layering in each cortical area and the
feedforward and recurrent connections within each area and between them. They also neglected the time evolution
of selectivity and invariance in each of the areas. The conjecture we propose in this paper changes this picture quite
drastically and makes several interesting predictions. Each area corresponds to a recurrent network and thus to a
12
The model is trained with readout time 10
0.2
Error On Training Set
Error On Test Set
0.18
0.16
Error on CIFAR−10
0.14
0.12
0.1
0.08
0.06
0.04
Train
0.02
0
6
7
8
9
10
11
12
Test Readout Time t
13
14
15
Figure 10: Training and testing with different readout time. A 3-state recurrent network with adjacent connections
is trained with readout time t=10 and test with t=6,7,8,9,10,11,12 and 15.
system with a temporal dynamics even for flashed inputs; with increasing time one expects asymptotically better
performance; masking with a mask an input image flashed briefly should disrupt recurrent computations in each
area; performance should increase with time even without a mask for briefly flashed images. Finally, we remark that
our proposal, unlike relatively shallow feedforward models, implies that cortex, and in fact its component areas are
computationally as powerful a universal Turing machines.
Acknowledgments
This work was supported by the Center for Brains, Minds and Machines (CBMM), funded by NSF STC award CCF
– 1231216.
References
References
[1] Using goal-driven deep learning models to understand sensory cortex. Nature Neuroscience, 19,3:356–365, 2016.
[2] Christian Büchel and KJ Friston. Modulation of connectivity in visual pathways by attention: cortical
interactions evaluated with structural equation modelling and fmri. Cerebral cortex, 7(8):768–778, 1997.
[3] Isaac Caswell, Chuanqi Shen, and Lisa Wang. Loopy neural nets: Imitating feedback loops in the human brain.
CS231n Report, Stanford, http://cs231n.stanford.edu/reports2016/110_Report.pdf. Google Scholar time
stamp: March 25th, 2016.
[4] David Eigen, Jason Rolfe, Rob Fergus, and Yann LeCun. Understanding deep architectures using a recursive
convolutional network. arXiv preprint arXiv:1312.1847, 2013.
13
[5] Salah El Hihi and Yoshua Bengio. Hierarchical recurrent neural networks for long-term dependencies. Citeseer.
[6] Kunihiko Fukushima. Neocognitron: A self-organizing neural network model for a mechanism of pattern
recognition unaffected by shift in position. Biological Cybernetics, 36(4):193–202, April 1980.
[7] Alex Graves. Generating sequences with recurrent neural networks. arXiv preprint arXiv:1308.0850, 2013.
[8] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. arXiv
preprint arXiv:1512.03385, 2015.
[9] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Delving deep into rectifiers: Surpassing human-level
performance on imagenet classification. In Proceedings of the IEEE International Conference on Computer
Vision, pages 1026–1034, 2015.
[10] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Identity mappings in deep residual networks. arXiv
preprint arXiv:1603.05027, 2016.
[11] Sepp Hochreiter and Jürgen Schmidhuber. Long short-term memory. Neural computation, 9(8):1735–1780,
1997.
[12] JM Hupe, AC James, BR Payne, SG Lomber, P Girard, and J Bullier. Cortical feedback improves discrimination
between figure and background by v1, v2 and v3 neurons. Nature, 394(6695):784–787, 1998.
[13] Sergey Ioffe and Christian Szegedy. Batch normalization: Accelerating deep network training by reducing
internal covariate shift. arXiv preprint arXiv:1502.03167, 2015.
[14] Minami Ito and Charles D Gilbert. Attention modulates contextual influences in the primary visual cortex of
alert monkeys. Neuron, 22(3):593–604, 1999.
[15] Alex Krizhevsky. Learning multiple layers of features from tiny images, 2009.
[16] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. Imagenet classification with deep convolutional neural
networks. In Advances in neural information processing systems, pages 1097–1105, 2012.
[17] Victor AF Lamme, Hans Super, and Henk Spekreijse. Feedforward, horizontal, and feedback processing in the
visual cortex. Current opinion in neurobiology, 8(4):529–535, 1998.
[18] César Laurent, Gabriel Pereyra, Philémon Brakel, Ying Zhang, and Yoshua Bengio. Batch normalized recurrent
neural networks. arXiv preprint arXiv:1510.01378, 2015.
[19] Ming Liang and Xiaolin Hu. Recurrent convolutional neural network for object recognition. In Proceedings of
the IEEE Conference on Computer Vision and Pattern Recognition, pages 3367–3375, 2015.
[20] Qianli Liao, Joel Z Leibo, and Tomaso Poggio. How important is weight symmetry in backpropagation? arXiv
preprint arXiv:1510.05067, 2015.
[21] Hrushikesh Mhaskar, Qianli Liao, and Tomaso Poggio. Learning real and boolean functions: When is deep
better than shallow. arXiv preprint arXiv:1603.00988, 2016.
[22] Guido F Montufar, Razvan Pascanu, Kyunghyun Cho, and Yoshua Bengio. On the number of linear regions of
deep neural networks. In Advances in neural information processing systems, pages 2924–2932, 2014.
[23] Razvan Pascanu, Caglar Gulcehre, Kyunghyun Cho, and Yoshua Bengio. How to construct deep recurrent
neural networks. arXiv preprint arXiv:1312.6026, 2013.
[24] Pedro HO Pinheiro and Ronan Collobert. Recurrent convolutional neural networks for scene parsing. arXiv
preprint arXiv:1306.2795, 2013.
[25] Rajesh PN Rao and Dana H Ballard. Predictive coding in the visual cortex: a functional interpretation of
some extra-classical receptive-field effects. Nature neuroscience, 2(1):79–87, 1999.
[26] M Riesenhuber and T Poggio. Hierarchical models of object recognition in cortex. Nature Neuroscience,
2(11):1019–1025, November 1999.
[27] Jürgen Schmidhuber. Learning complex, extended sequences using the principle of history compression. Neural
Computation, 4(2):234–242, 1992.
14
[28] Thomas Serre, Aude Oliva, and Tomaso Poggio. A feedforward architecture accounts for rapid categorization.
Proceedings of the National Academy of Sciences of the United States of America, 104(15):6424–6429, 2007.
[29] Richard Socher, Cliff C Lin, Chris Manning, and Andrew Y Ng. Parsing natural scenes and natural language
with recursive neural networks. In Proceedings of the 28th international conference on machine learning
(ICML-11), pages 129–136, 2011.
[30] Rupesh Kumar Srivastava, Klaus Greff, and Jürgen Schmidhuber. Highway networks. arXiv preprint
arXiv:1505.00387, 2015.
[31] Simon Thorpe, Denis Fize, Catherine Marlot, et al. Speed of processing in the human visual system. nature,
381(6582):520–522, 1996.
[32] Andrea Vedaldi and Karel Lenc. Matconvnet: Convolutional neural networks for matlab. In Proceedings of the
23rd Annual ACM Conference on Multimedia Conference, pages 689–692. ACM, 2015.
[33] D.L.K. Yamins and J.D. Dicarlo. Using goal-driven deep learning models to understand sensory cortex, 2016.
[34] Matthew D Zeiler, Dilip Krishnan, Graham W Taylor, and Rob Fergus. Deconvolutional networks. In Computer
Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on, pages 2528–2535. IEEE, 2010.
A
An Illustrative Comparison of a Plain RNN and a ResNet
h
Plain
RNN
h0
K
h1
K
X0
X
ResNet
Recurrent
Form
+
Unfold
h
K
h2
...
h2
...
X1
K
K
h0
Unrolled
RNN
h1
+
+
K
ResNet With
Weight Sharing
X0
Figure 11: A ResNet can be reformulated into a recurrent form that is almost identical to a conventional RNN.
B
Inhomogeneous, Time-invariant ResNet
The inhomogeneous, time-invariant version of ResNet is shown in Figure 12.
Let K 0 = K + I, asymptotically we have:
h = Ix + K 0 h
(7)
(I − K 0 )h = x
0 −1
h = (I − K )
x
(8)
(9)
The power series expansion of above equation is:
h = (I − K 0 )−1 x = (I + K 0 + K 0 ◦ K 0 + K 0 ◦ K 0 ◦ K 0 + ...)x
(10)
Inhomogeneous, time-invariant version of ResNet corresponds to the standard ResNet with shared weights and
shortcut connections from input to every layer. If the model has only one state, it is experimentally observed that
these shortcuts undesirably add raw inputs to the final representations and degrade the performance. However, if
15
8
h
...
h
+
I
K'
Unfold
h2
I
+
I
K'
Fold
h1
+
+
I
h0
K'
x0
K'
x
xt=x0
K'=K+I
(A) ResNet with shared weights
and shortcuts from input to all layers
(B) Folded
Figure 12: Inhomogeneous, Time-invariant ResNet
the model has multiple states (like the visual cortex), it might be biologically-plausible for the first state (V1) to
receive constant inputs from the pre-net (retina and LGN). Figure 13 shows the performance of an inhomogeneous
3-state recurrent network in comparison with homogeneous ones.
3−State Fully/Densely Recurrent Neural Networks
0.02
Full
#Param 4210186
Adjacent
#Param 3287946
Adjacent, inhomogeneous
#Param 3287946
V2
V4
IT
V1
V2
V4
IT
t=4
V1
V2
V4
IT
V1
V2
V4
IT
t=3
V1
V1
Input
V2
V2
V4
V4
IT
V1
IT
Homogeneous
V1
Input
V2
V2
V4
V4
IT
IT
t=2
t=1
Inhomogeneous
0.016
Training Error on CIFAR−10
V1
0.014
0.086
0.012
0.01
0.008
0.006
0.084
0.082
0.08
0.078
0.076
0.004
0.074
0.002
0.072
0
40
45
50
Epoch
55
Full
#Param 4210186
Adjacent
#Param 3287946
Adjacent, inhomogeneous
#Param 3287946
0.088
Validation Error on CIFAR−10
0.018
60
0.07
40
45
50
Epoch
55
Figure 13: Inhomogeneous 3-state models. All settings are the same as Figure 9. All models are time-invariant.
16
60
| 9cs.NE
|
EXISTENCE OF SLICES ON A TAME CONTEXT
SOPHIE MARQUES
arXiv:1401.1409v1 [math.AG] 7 Jan 2014
Contents
Keywords
Acknowledgment
Introduction
Hypotheses, basic concepts and notation
1. Definition of slices
2. Slice theorem for actions by finite étale (smooth) group scheme
3. Unramified case
3.1. Definitions
3.2. Global slice theorem
3.3. Local slice theorem
4. Linearly reductive group scheme
4.1. Definition
4.2. Cohomological properties
4.3. Liftings of linearly reductive group schemes
5. Tame quotient stack
5.1. Coarse moduli spaces
5.2. On the exactness of the functor of invariants
5.3. Definition of tame quotient stack
5.4. Local definition of tameness
5.5. Existence of a torsor
5.6. Slice theorem for tame quotient stacks
6. Tame action by affine group scheme vs Tame quotient stack
6.1. Algebraic interlude
6.2. Tame actions
6.3. Exactness of the functor of the invariants for tame actions
6.4. Relationship between the two notions of tameness
References
Abstract. We study the ramification theory for actions involving group schemes, focusing on the tame ramification. We consider the notion of tame quotient stack introduced
in [AOV] and the one of tame action introduced in [CEPT]. We establish a local Slice
theorem for unramified actions and after proving some interesting lifting properties for
linearly reductive group schemes, we establish a Slice theorem for actions by commutative group schemes inducing tame quotient stacks. Roughly speaking, we show that
these actions are induced from an action of an extension of the inertia group on a finitely
presented flat neighborhood. We finally consider the notion of tame action and determine
how this notion is related to the one of tame quotient stack previously considered.
Date: 28 février 2018.
1. SUBMITTED IN CEJM
1
2
2
2
3
6
7
8
8
9
9
10
10
10
11
12
12
13
14
15
17
18
18
18
19
20
22
23
Keywords. Group schemes, Ramification, Unramified, Freeness, Tameness, Slice theorem, Linearly reductive group schemes, Lifting, Actions, Quotient stack, Trivial cohomology.
Acknowledgment. I would like to thanks my supervisors Boas Erez and Marco Garuti but also Angelo
Vistoli and Yuri Tschinkel for their help and advise.
Introduction
It is well-known that locally, for the étale topology, actions of constant group
schemes (and slightly more generally etale group schemes) are induced from actions
of their inertia groups: one can reconstruct the original action from the action of an
inertia group at a point (Theorem 2.1) (this is a direct extension of the classic result
of decomposition of finite extensions of valuation field after moving to the completion
[Ser68, II, §3, Théorème 1, Corollaire 4 and Proposition 4]). This statement is an
instance of a slice theorem (see Theorem 2.2).
In this paper, we establish a more general slice theorem, under a tameness hypothesis. One motivation for studying slices in this generality is the theory of tame covers,
in the sense of Grothendieck and Murre: these admit étales slices (see Abhyankar’s
lemma in [GM71], [CE92]). Another motivation is the fundamental theorem of Luna,
which states that actions of linearly reductive algebraic groups on an affine varieties
are tame (see [Lun73]) and admit slices.
In the simple case when the action has trivial inertia groups our slice theorem
is simply the statement that freeness is local (Proposition 3.3). More general tame
quotient stacks were introduced by Abramovich, Olsson and Vistoli in [AOV08,
§3] in their study of certain ramification issues arising in moduli theory. Here, we
characterize tameness for quotient stacks for actions of finite commutative group
schemes via the existence of finitely presented flat slices with linearly reductive
slice groups (Theorem 5.16). Roughly speaking, we show that these actions are
induced from an action of an extension of the inertia group on a finitely presented
flat neighborhood. Furthermore, this lifting of the inertia group can be constructed
also in the non-commutative case, as a subgroup of the initial group and as a flat
and linearly reductive group scheme (Theorem 4.4). Moreover, [AOV08, Theorem
3.2] shows that tameness is characterized by the property that all inertia groups
at topological points are linearly reductive (it suffices to require this only at the
geometric points).
This is what one could have expected as a definition of tameness. In fact, let us
consider a Γ-extension of Dedekind rings B{BΓ , where Γ is an abstract finite group
and BΓ is the invariant ring for the action of Γ on B. For any prime ideal p of B we
write kppq; then, it is well known, that B{BΓ is tame if and only if for all prime p
of B, the inertia group Γ0 ppq has order prime to the characteristic of kppq. This last
condition is equivalent to requiring that the group algebra kppqrΓ0 ppqs be semisimple,
i.e., that the constant group scheme Γ0 ppq attached to Γ0 ppq is linearly reductive.
2
But as kppq-group, Γ0 ppq is exactly the inertia group of the action of the constant
group scheme attached to Γ on X “ SpecpBq (cf [DG70, III, §2, n˚2, Example 2.4]).
Independently, in [CEPT96, §2], Chinburg, Pappas, Erez and Taylor introduced
the notion of tame actions. Thus it is natural to anticipate a relationship between
these two notions of tameness. We prove that under quite general hypotheses, tame
actions define tame quotient stacks (Theorem 6.8). In fact, under additional hypotheses such as finiteness, the two notions are equivalent (Theorem 6.9). Thus, the
previous results apply to this notion of tameness and we can answer more precisely
[CEPT96, §4, Question 2 and 3].
Hypotheses, basic concepts and notation
We write fppf for faithfully flat and finitely presented. Throughout, we fix the
following notation.
Let R be a commutative, noetherian, unitary base ring: all modules and algebras
are over R and all algebras are commutative. Let S :“ SpecpRq be the corresponding
affine base scheme: all schemes are S-schemes. For V a scheme over S and S1 an Sscheme, let VS1 (resp. S1 V) be the base change V ˆS S1 (resp. S1 ˆS V). In particular,
for V a scheme over S and R1 an R-algebra, we write VR1 (resp. R1 V) instead of
VSpecpR1 q (resp. SpecpR1 q V) for the base change V ˆS SpecpR1 q (resp. SpecpR1 q ˆS V).
Given S-morphisms of schemes V Ñ W and Z Ñ W, we have the fiber product
V ˆW Z
pr2
/
Z
pr1
/
V
W
together with the natural projections.
Let A “ pA, δ, ǫ, sq be a flat, finitely presented commutative Hopf algebra over R
where δ denotes the comultiplicaton, ǫ the unit map and s the antipode, G the affine
flat group scheme associated to A over S and X :“ SpecpBq an affine scheme over S.
Remark. For simplicity, we only consider actions involving affine schemes even
though most of the following results are true for actions involving general schemes by
glueing. Only the definition of tameness by [CEPT96] cannot be always generalized
for actions involving the non-affine schemes (see [CEPT96, §7]).
An action of G on X over S is denoted by pX, Gq; we write µX : X ˆS G Ñ X
for its structure map, (we write x ¨ g :“ µX px, gq, for any x P X and g P G) and
3
ρB : B Ñ B bR A for the structure map giving the A-comodule structure on B (see
[CEPT96, §1.b]).
We will use the sigma notation, well-established in the Hopf algebra literature.
ř
Specifically, for a P A, we write δpaq “ paq a1 b a2 . This presentation itself is
purely symbolic; the terms a1 and a2 do not stand for particular elements of A. The
comultiplication δ takes values in A bR A, and we know that:
δpaq “ pa1,1 b a1,2 q ` pa2,1 b a2,2 q ` pa3,1 b a3,2 q ` . . . ` pan,1 b an,2 q,
for some elements ai, j of A and some integer n. The Sigma notation is a way to
separate the ai,1 from the a j,2 . In other words, the notation a1 stands for the generic
ai,1 and the notation a2 stands for the generic a j,2 . Similarly, for any right comodule
ř
(respectively left comodule) M, any m P M, we write ρM pmq “ mp0q b mp1q (reř
spectively M ρpmq “ mp´1q b mp0q ).
For p P X, we denote IG ppq the inertia group at p to be the fiber product:
IG ppq
pr2
/
Specpkppqq
pr1
∆˝ξ
X ˆS G
pµX ,pr1 q
/
X ˆS X
where kppq is the residue field at p, ξ : Specpkppqq Ñ X is the morphism induced by
the canonical morphism B Ñ kppq and pµX , pr1q : X ˆS G Ñ X ˆS X is the Galois
map sending px, gq to px ¨ g, xq.
Let
C :“ BA “ tb P B|ρB pbq “ b b 1u
be the ring of invariants for this action, Y :“ SpecpCq and π : X Ñ Y the morphism
induced by the inclusion C Ď B.
Remark. We can also then consider X as a scheme over Y. Then the data of the
S-scheme morphism µX : X ˆS G Ñ X defining an action pX, Gq over S is equivalent
to the data of the Y-scheme morphism µX : X ˆY GY Ñ X defining an action pX, GY q
1
over Y. For Y1 a Y-scheme, we denote XYY the base change to Y1 for X considered
as a Y-scheme.
In the following, we will say that a U-scheme Z together with a G-action over S
where U is a S-scheme is a G-torsor over U if Z Ñ U is fppf and the Galois map
pµZ , pr1q : Z ˆS G » Z ˆU Z is an isomorphism. (Here, we choose to work with the
4
fppf topology which is the more reasonable topology to work under our assumptions).
We write rX{Gs for the quotient stack associated to this action. Recall, that it is
defined on the T-points, where T is a S-scheme as:
rX{GspTq “ tP is G-torsor over T together with a G-equivariant morphism P Ñ Xu
We get a canonical S-morphism p : X Ñ rX{Gs by sending a T-point T Ñ X to trivial G-torsor T ˆS G over T together with the G-equivariant morphism T ˆS G Ñ X.
Under the present hypothesis, p is fppf and by the Artin criterium (see [LMB00,
Théorème 10.1]), rX{Gs is an Artin stack. We denote BS G the classifying stack
that is the quotient stack associated to the trivial action of G on S.
Moreover, X{G stands for the categorical quotient in the category of algebraic
spaces, that is X{G is an algebraic space, there is a morphism φ : X Ñ X{G such
that φ ˝ µX “ φ ˝ pr1 and for any algebraic space Z and any morphism ψ : X Ñ Z
such that ψ ˝ µX “ ψ ˝ pr1, ψ factorizes via φ, e.g. there is a morphism X{G Ñ Z
making the following diagram commute:
X
φ
ψ
/
= Z
⑤
⑤⑤
⑤⑤
⑤
⑤⑤
X{G
If G is finite, flat over S then X{G “ Y, by [Con05, Theorem 3.1].
Remark. The quotient stack rX{Gs can always be defined, as soon as G is a flat
group scheme, instead X{G does not exist necessarily. Even if X{G does exist, the
quotient stack rX{Gs gives more information about the action than the categorical
quotient X{G. More precisely, the only difference between the two holds in the existence of automorphisms of points for the stack rX{Gs, but these automorphisms
correspond to the inertia groups for the action pX, Gq. A slice theorem reducing, fppf
locally, the action pX, Gq to an action by a lifting of an inertia group would imply
that the data of the quotient stack associated to X and G is enough to rebuild locally
the action pX, Gq. This is the case for action of finite and étale group scheme (see
Theorem 2.1).
We denote by MA (resp. A M) the category of the right (resp. left) A-comodules
and by (MR (resp. R M) the category of right (resp. left) R-modules). Let pM, ρM q
and pN, ρN q be two right A-comodules. Denote by ComA pM, Nq the R-module of the
A-comodule morphisms from M to N. We recall that a R-linear map g : M Ñ N is
called A-comodule morphism if ρN ˝ g “ pg b IdA q ˝ ρM .
5
We denote by B MA the category of (B,A)-modules. The objects are R-modules
N which are also right A-comodules and left B-modules such that the structural map
of comodules is B-linear, i.e.,
ÿ
ρN pbnq “ ρB pbqρN pnq “
bp0q np0q b bp1q np1q , for all n P N, b P B.
The morphisms of B MA are morphisms that are simultaneously B-linear and Acomodule morphisms. For any M, N P B MA , we write B BimA pM, Nq for the set of such
morphisms from M to N. For a pB, Aq-module M, its submodule of invariants
pMqA is defined by the exact sequence
0 Ñ pMqA Ñ M
ρM /
Mb1
/
MbA
This defines the functor of invariants
p´qA : B MA Ñ C M
which is left exact, by definition. We denote QcohG pXq the G-equivariant quasicoherent sheaves over X (see [AOV08, 2.1]). We have that QcohG pXq » B MA . For
X an Artin stack, we denote by QcohpXq the quasi-coherent sheaves over X.
We have QcohprX{Gsq » QcohG pXq (see [AOV08, 2.1] or [Mar, Chapter IV, §9]).
1. Definition of slices
Here we recall the notion of slices introduced in [CEPT96, Definition 3.1]:
Definition 1.1. We say that the action pX, Gq over S admits étale (respectively
finitely presented flat) slices if:
(1) There is a categorical quotient Q :“ X{G, in the category of algebraic spaces.
(2) For any q P Q, there exist:
(a) a S-scheme Q1 and an étale (resp. finitely presented flat) S-morphism
Q1 Ñ Q such that there is q1 P Q1 which maps to q via this morphism.
(b) a closed subgroup Gq of GQ1 over Q1 which stabilizes some point p1 of
X ˆQ Q1 above q1 , i.e., Gq kpp1 q » IGQ1 pp1 q,
(c) a Q1 -scheme Z with a Gq -action such that Q1 “ Z{Gq and the action
pX ˆQ Q1 , GQ1 q is induced by pZ, Gq q.
The subgroup Gq is called a slice group.
Remark 1.2.
(1) Roughly speaking, for the étale (respectively fppf ) topology, an
action which admits slices can be described by the action of a lifting of an
inertia group of a point.
(2) The action pXQ1 , GQ1 q should be thought of as a G-stable neighborhood of an
orbit. Such a neighborhood induced from an action pZ, Hq, where H is a lifting
of an inertia group of a point, is called a “tubular neighborhood”.
6
2. Slice theorem for actions by finite étale (smooth) group scheme
Since a finite and smooth group scheme is étale, and an étale group scheme is locally constant for the étale topology, it is enough to consider an action by a constant
group scheme.
Let Γ be an abstract finite group. Denote by Γ the constant group scheme associated
to Γ over S. The associated Hopf algebra is then of the form MappΓ, Rq. We recall
first some important facts:
(1) The data of an action of G on X is equivalent to the data of an action of Γ on
B, C “ BΓ “ tγ P Γ|γb “ bu (see [CEPT96, §1.d]) and X{Γ “ Y (see [Con05,
Theorem 3.1]). This particular case also permits to make the transition from
algebra and classic number theory to the algebraic geometry context and to
understand later definitions.
(2) For q P Y, Γ operates transitively on the prime ideals above q (see [Bou81,
Chap. V, §2, Theorem 2]).
(3) The inertia group scheme at a point p P X is the constant group scheme
associated to the algebraic inertia group
Γ0 ppq “ tγ P Γ|γp “ p and γ.x “ x, @x P kppqu
for the action Γ on B induced by pX, Gq at the ideal p (see [DG70, III, §2, n˚
2, Example 2.4]).
In order to alleviate writing, we use that the morphism B Ñ C is integral (see [Bou81,
Chap. V, §1, n˚9, Proposition 22]).Let q be a prime ideal on C, if we write Csh
q for
sh
sh
the strict henselization of C at q, then the base change BbC Cq Ñ Cq is also integral
and since we want a result locally for the étale topology, without loss of generality,
we suppose in the following that the base is local strictly henselian with maximal
ideal q and that B is semi-local over C that is, the product of its local component
pBm q where m are runs though the set of the prime (maximal) ideals of B over the
maximal ideal q of C. Let p be a prime ideal over q. We define MapΓ0 ppq pΓ, Bp q to be
the set of maps
u : Γ Ñ Bp
such that upγiq “ i´1upγq, for any γ P Γ and i P Γ0 pPq; it carries a Γ-action via
λ.upγq “ upλ´1 γq,
for any
λ, γ P Γ.
With these notations, we obtain easily the following Γ-equivariant isomorphism:
pMappΓ, Cq bC Bp qΓ0 ppq » MapΓ0 ppq pΓ, Bp q
With all the previous notations, one obtains that the action of Γ on B can be rebuilt
locally at q thanks to the action of an inertia group at p on Bp :
7
Lemma 2.1. [Ray70, Chapitre X] We have a canonical isomorphism φ, compatible
with the actions of Γ defined by
φ : B Ñ MapΓ0 ppq pΓ, Bp q
b ÞÑ u : γ ÞÑ pγ´1 bqp
Γ ppq
Moreover, C » Bp0 .
Proof. Since Bp » iBp , for any i P Γ0 ppq, φ is well-defined. Let p1 , ....,ps be the
prime ideals over q, we put p1 :“ p. Since the action of Γ is transitive on the
pi ’s, for any i ‰ 1, we have a γi P Γ, such that pi “ γi p. Moreover, Bp j » γ j Bp .
Since we suppose C strictly henselian and B is integral over C, then we know that
B “ ‘si“1 Bpi » ‘si“1 γi Bp . As a consequence, any b P B can be written uniquely as
pγ1 b1 , γ2 b2 , ..., γsbs q in ‘si“1 γi Bp with bi P Bp . Each γi acts on this representation, by
left translation and permuting the term on the direct sum. In particular, we obtain
pγ´1
bqP “ γ´1
γ j b j “ b j , and this proves that φ is an isomorphism. Finally, the
j
j
composite map
B »φ MapΓ0 ppq pΓ, Bp q Ñ Bp
u
ÞÑ up1Γ q
Γ ppq
induces an isomorphism between C and Bp0 .
Rewriting the previous theorem in algebro-geometric terms gives us exactly étales
slices for any action by a finite étale group scheme.
Theorem 2.2. An action of a finite étale group scheme G on X over S admits étale
slices.
Proof. First, Y “ X{G is a categorical quotient in the category of algebraic space (see
[Con05, Theorem 3.1]). The rest of the proof is a direct consequence of the previous
theorem since as we already mentioned we can assume without loss of generality that
G is constant of the form Γ using the previous notation: take q P Y and p P X over
q. Write Chs
q for the strict Henselization of C at q. In Definition 1.1, since X Ñ Y
is finite, we can take Y1 “ SpecpC1 q as an étale subextension of SpecpChs
q q over Y
1
containing q in its image with C a local ring, the slice group Gq to be the constant
group scheme associated to Γ0 ppq over Y1 and Z :“ SpecppB bC C1 qm q, where m is a
prime ideal above the maximal ideal of the local ring C1 corresponding to q.
3. Unramified case
3.1. Definitions.
Definition 3.1. We say that the action pX, Gq is unramified at p P X if the
inertia group IG ppq is trivial. We say that the action pX, Gq is unramified if pX, Gq
is unramified at any p. We say the action is free if the Galois morphism pµX , pr1q :
X ˆS G Ñ X ˆS X is a closed immersion.
8
Lemma 3.2. [DG70, III, §2, n˚ 2, 2.2] The following assertions are equivalent:
(1) pX, Gq is free.
(2) pX, Gq is unramified.
3.2. Global slice theorem. We already have the following theorem.
Theorem 3.3. [DG70, III, §2, n˚2 & n˚3] Suppose that G is finite, flat over S. The
following assertions are equivalent:
(1) pX, Gq is unramified.
(2) X is a G-torsor over Y.
3.3. Local slice theorem.
Lemma 3.4. Suppose that S “ Y is local, with maximal ideal q. The following
assertions are equivalent:
(1) pX, Gq is a free action.
(2) IG ppq is trivial for some p over q.
Proof. The first implication follows from the definition. Let us prove that p2q ñ p1q.
Let kpqq “ R{q be the residue field of R at q and f : X Ñ S be the quotient morphism:
since G is finite, f is finite. Set S0 :“ Specpkpqqq and X0 :“ f ´1 pqq “ tp1 , .., pr u “
X ˆS S0 where for any i P 1, ..., r, pi are the primes above q. Since the inertia is trivial
at some prime over q, it is trivial at any prime over q since all the prime ideals over
q are conjugate up to a finitely presented flat finite base change. Then, up to this
finitely presented flat finite base change, the action pXS0 , GS0 q is free, in other words
X0 ˆS0 GS0 Ñ X0 ˆS0 X0 is a closed immersion (see [DG70, III, §2, n˚2, Proposition
2.2]). That is, we have the surjection
pB bR Bq bR R{q Ñ pB bR Aq bR R{q.
Since BbR B and BbR A are finite R-algebras, by Nakayama’s lemma, BbR B Ñ BbR A
is a surjection, hence the action is free.
From this lemma, we can deduce easily the following theorem which is a local slice
theorem for free action:
Theorem 3.5. Suppose that G is finite and flat over S. Let p P X and q P Y its
image via the morphism π : X Ñ Y. The following assertions are equivalent:
(1) The inertia group scheme is trivial at p, up to a finite base change.
(2) There is an finite, flat morphism Y1 Ñ Y containing q in its image such that
the action pXYY1 , GY1 q over Y1 is free. In other words, pXYY1 ˆY XYY1 , GXY1 q is
induced by the action pXYY1 ˆY1 XYY1 , eXY1 q, where eXY1 denotes the trivial group
Y
scheme over XYY1 .
9
Y
Proof. p1q ñ p2q From the previous lemma, there is an finite, flat morphism Y1 Ñ Y
containing q in its image such that pXYY1 , GY1 q is free, and since GY1 is finite over Y1 ,
XY1 is a GY1 -torsor over Y1 (see Theorem 3.3) hence XYY1 is an fppf morphism over Y1 ,
there is a GY1 -equivariant isomorphism
pµXY1 , pr1q : pXYY1 ˆY1 GY1 q{eXY1 » XYY1 ˆY1 XYY1
Y
Y
where on the left hand side GY1 acts only on the factor GY1 by translation and on
the right hand side GY1 acts on the first factor only.
p2q ñ p1q Trivial.
4. Linearly reductive group scheme
4.1. Definition. From the notion of tameness, we can define a class of group
schemes with nice properties, which will be very important for the following.
Definition 4.1. We say that G is linearly reductive group scheme, if p´qA :
A
R M Ñ R M is exact.
4.2. Cohomological properties. The cohomology of linearly reductive group schemes
has some very interesting cohomological vanishing properties that are useful for deformation involving such group schemes. We can even characterize linearly reductivity by the vanishing of the cohomology:
Lemma 4.2. (see [Kem00, Proposition 1]) Suppose that G is flat, finite over S,
that X finitely presented over S and S “ Specpkq where k is a field. The following
assertion are equivalent:
(1) G is linearly reductive over S.
(2) H1 pG, Mq “ 0 for any M P MA .
The following lemma is part of the proof of [AOV08, Lemma 2.13]:
Lemma 4.3. If G is linearly reductive over S, then
(1)
Exti pLBk G{k , F q “ 0, f or i ‰ ´1, 0.
for any coherent sheaf F on Bk G.
(2) If we suppose that G is also smooth,
Exti pLBk G{k , F q “ 0, f or i ‰ ´1
for any coherent sheaf F on Bk G.
Proof. By [AOV08, Lemma 2.15], the cotangent complex LBk G{k of the structural
r´1,0s
morphism Bk G Ñ k (where k is a field) belongs to Dcoh pOBk G q. Since k is a field,
any coherent sheaf on Bk G is locally free, and therefore for any coherent sheaf F on
Bk G, we have:
r´1,0s
RHompLBk G{k , F q P Dcoh pOBk G q.
10
(1) Since the global section functor is exact on the category CohpOBk G q (since G
is linearly reductive), we obtain that then
Exti pLBk G{k , F q “ 0, f or i ‰ ´1, 0.
for any F is a coherent sheaf on Bk G.
r0s
(2) When G is smooth, then LBk G{k P Dcoh pOBk G q and
Exti pLBk G{k , F q “ 0, f or i ‰ ´1
for any F is a coherent sheaf on Bk G.
4.3. Liftings of linearly reductive group schemes. By [AOV08, Proposition
2.18], we know that a linearly reductive group scheme over some point can be lifted
as linearly reductive group to an étale neighborhood. Thanks to this result, we were
able to prove that we can lift this group fppf locally as a subgroup in the following
sense.
Theorem 4.4. Let p be a point of S, G be a finite, flat group scheme over S and H0
be a finite, linearly reductive closed subgroup scheme of Gkppq over Specpkppqq. Then,
there exists a flat, finitely presented morphism U Ñ S, a point q P U mapping to p
and a flat linearly reductive closed subgroup scheme H of GU over U whose pullback
Hkpqq is isomorphic to the pullback of H0 kpqq .
Proof. Let p P S. By [AOV08, Proposition 2.18], there exists an étale morphism
U Ñ S, a point q P U mapping to p and a linearly reductive group scheme H over
U such that Hkpqq » H0 kpqq . Set Un :“ SpecpR{qn`1 q. One has that H0 is a subgroup
scheme of Gkppq , and this defines a representable morphism of algebraic stacks x0 :
Bkpqq H0 Ñ Bkpqq Gkpqq over kpqq. We want to prove the existence a representable
morphism of algebraic stacks x : BU H Ñ BU GU filling in the following 2-commutative
diagram
/
Bkpqq H0
✷✷ ❑❑❑
✷✷ ❑❑x❑
❑❑❑
✷✷
❑%
✷✷
✷✷
Bkpqq Gkpqq
✷✷
✷✷
✷✷
✷✷
g
✷✷
✷✷
✷✷
U0
BU H
✴✴
x1
✴✴
✴✴
#
✴✴
✴✴ / BU GU
✴✴
✴✴
✴✴
✴✴
✴✴
✴✴
✴
/ U
We can prove, thanks to Grothendieck ’s Existence theorem for algebraic stacks (see
[Ols07, Theorem 11.1]) and Artin’s approximation theorem (see [Art69, Théorème
11
1.12]), that the existence of such x only depends on the existence of a formal deformation, that is morphisms xn : BUn HUn Ñ BUn GUn filling in the following 2-commutative
diagram:
Bkpqq H0
in
✸✸ ▲▲▲ x
✸✸ ▲▲▲1
▲▲▲
✸✸
▲&
✸✸
✸✸
B
kpqq Gkpqq
✸✸
✸✸
✸✸
✸✸
✸✸
✸✸
✸✸
Specpkpqqq
/
/
BUn´1 HUn´1
jn
✻✻ ◆◆◆ xn´1
◆◆◆
✻✻
◆◆◆
✻✻
◆◆'
✻✻
/ B
✻✻
Un´1 GUn´1
✻✻
✻✻
✻✻
✻✻
✻✻
✻✻
✻✻
✻
/ U
n´1
BU n H U n
✶✶
xn
✶✶
✶✶
%
✶✶
/ B G
✶✶
Un Un
✶✶
✶✶
✶✶
✶✶
✶✶
✶✶
✶✶
/ U
n
By [Ols06, Theorem 1.5], the obstruction to extend the morphism xn´1 to xn lies in
Ext1 pLx˚ LBkpqq Gkpqq {kpqq , mn {mn`1 bkpqq OBkpqq Gkpqq q,
which is trivial for any n P N by Lemma 4.3. It follows that there exists an arrow xn
filling the previous diagram. This leads to the existence of a representable morphism
of stacks F : BU HU Ñ BU GU . Let Q Ñ U be the GU -torsor which is the image via F of
the trivial HU -torsor HU Ñ U. Furthermore, the functor F induces a homomorphism
from AutS pHQ Ñ Qq “ HQ to the automorphism group scheme of the image of the
HQ -torsor HQ Ñ Q in BQ GQ . Since this image is the pullback of Q to Q over BQ GQ ,
which is canonically a trivial torsor, its automorphism group is GQ . This defines a
group morphism HQ Ñ GQ , with Q Ñ U an fppf morphism as GU -torsor. Since
F is representable, this morphism is injective. Finally, since H is proper and G is
separated, HV is closed in GV .
5. Tame quotient stack
5.1. Coarse moduli spaces. Abramovich, Olsson and Vistoli introduced in [AOV08]
the notion of tame stack. Before recalling their definition, we need some additional
terminology.
Definition 5.1. A coarse moduli space for the quotient stack rX{Gs is a
couple pM, φq where M is a algebraic space and φ : rX{Gs Ñ M a morphism of stacks
such that any morphism from rX{Gs to an algebraic space factor through φ and such
that for any algebraically closed field Ω, |rX{GspΩq| » MpΩq where |rX{GspΩq| is
the set of isomorphism classes of the geometric points of rX{Gs taking value on Ω.
Remark 5.2.
(1) The notion of coarse moduli spaces can be generalized for general Artin stack. Coarse moduli space for quotient stack are in particular a
categorical quotient in the category of algebraic spaces for the action pX, Gq.
More precisely,
12
(a) Let M be an algebraic space. The datum of a morphism φ : rX{Gs Ñ M
is equivalent to the datum of a morphism of S-algebraic spaces f : X Ñ M
such that f ˝ pr1 “ f ˝ µX . In particular, the canonical map π : X Ñ Y
induces a map ρ : rX{Gs Ñ Y.
(b) If f : X Ñ M is a geometric quotient which is categorical in the category
of algebraic spaces, then rX{Gs Ñ M is a coarse moduli space.
For more details, see [Mar, 10.4].
(2) If G is finite, flat over S then ρ : rX{Gs Ñ Y is a coarse moduli space for
rX{Gs (see [Con05, §3]).
Theorem 5.3. Suppose that the group scheme G and the scheme X are finitely
presented over S and that all the inertia group schemes are finite. The quotient
stack rX{Gs admits a coarse moduli space φ : rX{Gs Ñ M such that φ is proper.
Moreover, φ induces a functor φ˚ : QcohprX{Gsq Ñ QcohpMq.
Proof. Since G is finitely presented over S, so is X Ñ rX{Gs (X is a G-torsor over
rX{Gs). Since X Ñ rX{Gs is surjective, flat of finite presentation and X Ñ S is also
of finite presentation, rX{Gs Ñ S is of finite presentation. By [Con05, Theorem 1.1],
the hypotheses insure that the quotient stack admits a coarse moduli space that we
denote φ : rX{Gs Ñ M such that φ is proper. In particular, φ is quasi-compact
and quasi-separated, thus by [Ols07, Lem. 6.5(i)], the induced morphism on the
quasi-coherent sheaves φ˚ : QcohprX{Gsq Ñ QcohpMq is well defined.
5.2. On the exactness of the functor of invariants.
Lemma 5.4. The map ρ : rX{Gs Ñ Y (defined in Remark 5.2) induces a functor
ρ˚ : QcohprX{Gsq Ñ QcohpYq. Then, the functor ρ˚ is exact if and only if the
functor of invariants p´qA : B MA Ñ C M is exact.
Proof. By [Mar, Lemma IV.10], we know that the map ρ is quasi-compact and quasiseparated, thus by [Ols07, Lem. 6.5(i)], the induced morphism on the quasi-coherent
sheaves ρ˚ : QcohprX{Gsq Ñ QcohpMq is well defined. ρ is defined as making the
diagram bellow commute:
ρ
rX{Gs
b❊❊
❊❊
❊
p ❊❊❊
/
@
Y
π
X
Thus, it induces the following commutating diagram of functors:
QcohprX{Gsq
ρ˚
/
QcohpYq
q8
qqq
q
q
q
qqq π˚
g❖❖❖
❖❖❖
❖❖
p˚ ❖❖❖
QcohG pXq
13
The functor p˚ is an equivalence of categories (see [Mar, Proposition IV.24]). Moreover, by [Har77, §5], we have the following commutative diagram:
QcohG pXq
π˚
/
QcohpYq
ΓpX, q
ΓpY, q
A
BM
p qA
/
CM
where the functors of global section ΓpX, q and ΓpY, q are equivalences of categories.
This proves the lemma.
Theorem 5.5. Suppose that X is noetherian, finitely presented over S, that G is
finitely presented over S and that all the inertia groups are finite. If the functor of
invariants p´qA is exact, then the map ρ : rX{Gs Ñ Y is a coarse moduli space of
rX{Gs and ρ is proper.
Proof. , By [Alp08, Theorem 6.6], the quotient π : X Ñ Y is categorical in the
category of algebraic spaces. [Con05, Theorem 1.1] insures that the quotient stack
admits a coarse moduli space that we denote ρ : rX{Gs Ñ M such that ρ is proper.
But, since ρ ˝ p : X Ñ rX{Gs Ñ M and π : X Ñ Y are categorical quotients
in the category of algebraic spaces, we obtain by unicity that M » Y and that
ρ : rX{Gs Ñ Y is a coarse moduli space.
5.3. Definition of tame quotient stack. Finally, we can define a tame quotient
stack. Since we need the existence of a coarse moduli space. Until the end of section
5, we suppose that G is flat, finitely presented over S, that X is finitely presented
over S and that all the inertia groups at the geometric points for the action pX, Gq
are finite. Moreover, we denote M the coarse moduli space and φ : rX{Gs Ñ M the
proper map (see Theorem 5.3).
Definition 5.6. We say that the quotient stack rX{Gs is tame if the functor φ˚ :
QcohrX{Gs Ñ QcohpMq is exact.
Remark 5.7.
(1) The notion of tameness can be defined similarly for general
stacks (see [AOV08, Definition 3.1]).
(2) When G is finite flat over S, rX{Gs is tame if and only if the functor of
invariants p´qA is exact. (It is a consequence of Lemma 5.4 since Y is a
coarse moduli space for G finite flat over S, by [Con05, §3]).
(3) When G is finite flat over S, G is linearly reductive if and only if the classifying stack BS G is tame.
Tameness is local. In fact,
14
Lemma 5.8. [Alp08, Proposition 3.10] For any morphism of S-schemes g : M1 Ñ
M, we consider the following 2-cartesian diagram:
g1
rX{GsM1
/
rX{Gs
φ1
φ
M1
g
/
M
Suppose that φ (resp. φ1 ) is the coarse moduli space for rX{Gs (resp. rX{GsM1 ).
(1) If g is faithfully flat and the quotient stack rX{GsM1 is tame then the quotient
stack rX{Gs is tame.
(2) If the quotient stack rX{Gs is tame then the quotient stack rX{GsM1 is also
tame.
Proof.
(1) From the 2-cartesian diagram we deduce that the functors g˚ φ˚ and
φ1˚ g1˚ are isomorphic. Since g is flat, g1 is flat as well and g1˚ is exact; also
φ1˚ is exact by assumption, so the composite φ1˚ g1˚ is exact, hence so is g˚ φ˚ .
But, since g is faithfully flat, we have that φ˚ is also exact as required.
(2) First suppose that g is an open, quasi-compact immersion. Let
0 Ñ F11 Ñ F21 Ñ F31 Ñ 0
be an exact sequence of OrX{GsM1 -modules. Set F3 :“ g1˚ F2 {g1˚ F1 . Then
0 Ñ g1˚ F11 Ñ g1˚ F21 Ñ F3 Ñ 0
is exact. Moreover, g1˚ F3 » F31 since the adjunction morphism g1˚ g1˚ Ñ id is
an isomorphism. Since φ˚ is exact by assumption, φ˚ g1˚ F21 Ñ φ˚ F3 is also
surjective, but then g˚ φ1˚ F21 Ñ φ˚ F3 is surjective as well. Since g is an open
immersion, φ1˚ F21 Ñ g˚ φ˚ F3 is surjective. Finally, since g˚ φ˚ and φ1˚ g1˚ are
isomorphic functors, φ1˚ F21 Ñ φ1˚ F31 is surjective.
We consider now any morphism of schemes g : M1 Ñ M. Since the tameness
property on a stack is Zariski local, we can assume M1 and M affine. Then g1
is also affine, so the functor g1˚ is exact. By assumption φ˚ is exact, therefore
φ˚ g1˚ “ g˚ φ1˚ is exact. But the functor g˚ has the property that a sequence
F1 Ñ F2 Ñ F3 is exact if and only if g˚ F1 Ñ g˚ F2 Ñ g˚ F3 is exact. It
follows that φ1˚ is exact as required.
5.4. Local definition of tameness.
Theorem 5.9. [AOV08, Theorem 3.2] The following assertions are equivalent:
(1) The quotient stack rX{Gs is tame.
(2) The inertia groups IG pξq Ñ Specpkq are linearly reductive groups, for any
ξ : Specpkq Ñ X, where k is a field.
15
(3) The inertia groups IG pξq Ñ Specpkq are linearly reductive groups, for any
geometric point ξ : Specpkq Ñ X, where k is an algebraically closed field.
(4) The inertia groups IG ppq Ñ Specpkppqq are linearly reductive groups, for any
p P X.
(5) For any point p P X, denote q its image via the morphism X Ñ M there
exist an fppf (also can be chosen étale surjective) morphism M1 Ñ M containing q in its image, a linearly reductive group scheme H Ñ M1 , such that
Hkpqq » IG ppq, acting on a finite and finitely presented scheme P Ñ M1 and
an isomorphism of algebraic stacks over M1
rX{Gs ˆM M1 » rP{Hs.
Proof. p1q ñ p2q Let ξ : Specpkq Ñ X be a k-point, where k is a field, and IG pξq is the
inertia group in ξ. The quotient stack rGk {IG pξqs is a scheme, denote it Gk {IG pξq.
Since the square
Gk {IG pξq
/
Bk IG pξq
/
X ˆS Specpkq
rX{Gs ˆS Specpkq
is 2-cartesian, Bk IG pξq Ñ rX{Gs ˆS Specpkq is affine since Gk {IG pξq Ñ X ˆS Specpkq
is affine.
Now, let us consider the following commutative diagram:
Bk IG pξq
g
/
rX{Gs p‹q
p´qIG pξq
φ
Specpkpqqq
f
/
M
Since we have seen that g is affine, g˚ : QcohpBkIG pξqq Ñ QcohprX{Gsq is an exact
functor and φ˚ : QcohprX{Gsq Ñ QcohpYq is exact by definition of tameness. Since
f˚ φ1˚ “ φ˚ g˚ , if
0 Ñ V1 Ñ V2 Ñ V3 Ñ 0
is an exact sequence of G-representations, considered as exact sequence of quasi
coherent sheaves over Bk IG pξq, we have the following exact sequence:
0 Ñ f˚ pV1 qIG pξq Ñ f˚ pV2 qIG pξq Ñ f˚pV3 qIG pξq Ñ 0.
Moreover, p´qIG pξq is left exact and this implies that
0 Ñ pV1 qIG pξq Ñ pV2 qIG pξq Ñ pV3 qIG pξq Ñ 0
is exact. So, IG pξq is linearly reductive.
p2q ñ p3q Immediate.
p3q ñ p4q By [AOV08, Theorem 2.16], it is enough to prove that IG ppqΩ is trivial,
16
for any Ω algebraically closed field. Denoting by pΩ the composite SpecpΩq Ñ
Specpkppqq Ñ X. But, IG ppqΩ is a subgroup of IG ppΩ q which is trivial by assumption.
Thus, IG ppqΩ is trivial.
p4q ñ p5q See [AOV08, Theorem 3.2]
p5q ñ p1q See Lemma 5.8.
We obtain the following corollary.
Corollary 5.10. [AOV08, Corollary 3.5] The stack rX{Gs Ñ S is tame if and only if
for any morphism Specpkq Ñ S, where k is an algebraically closed field, the geometric
fiber rX{Gs ˆS Specpkq Ñ Specpkq is tame.
Definition 5.11. We say that rX{Gs is tame at p if the inertia group IG ppq is
linearly reductive.
Remark 5.12. By the previous theorem, rX{Gs is tame if and only if rX{Gs is tame
at p, for any p P X.
5.5. Existence of a torsor. We state now an interesting consequence of the previous theorem which permits to define a torsor for a tame quotient stack for actions
of finite commutative group schemes.
Proposition 5.13. Suppose that G is finite, commutative flat over S. If the quotient
stack rX{Gs is tame, then for any point p P X, denoting by q P Y its image by the
morphism X Ñ Y, there exist a finitely presented flat morphism Y1 Ñ Y containing
q in its image and a subgroup H of GY1 over Y1 lifting the inertia group at p such
that XYY1 {H is a GY1 {H-torsor over Y1 .
Proof. Notice first that under the assumption of the theorem, GY1 {H is a finite affine
group scheme. By the previous theorem, we know that the inertia at p is linearly
reductive. So, by Lemma 4.4, there are a finitely presented flat morphism Y1 Ñ Y
containing q in its image and a linearly reductive group H Ñ Y1 lifting this inertia
group as a subgroup of GY1 . Moreover, the inertia group at p, image of p by the
quotient morphism XYY1 Ñ XYY1 {H for the action pXYY1 {H, GY1 {Hq, is equal to
IGY1 {H ppq “ IG ppq{pIG ppq X Hkppq q “ teu
By Theorem 3.3, up to passing to a finitely presented flat neighborhood of q, the
action pXYY1 {H, GY1 {Hq is free, thus XYY1 {H is a GY1 {H-torsor over Y1 since GY1 {H is
finite (see Theorem 3.3).
Remark 5.14. It would be useful to establish the previous proposition in general
if G is not commutative. But, in this case G{H is not necessarily a group scheme
and we cannot even define the notion of action or of torsor. But, taking the normal
closure of H in GY1 instead of H, we can establish the same result.
17
5.6. Slice theorem for tame quotient stacks. We manage to prove a slice theorem for actions by a finite commutative group scheme, using the following lemma.
Lemma 5.15. [CEPT96, Proposition 6.5] Let H be a subgroup of G such that the
quotient for the natural translation action exists and is universal. Let ψ : X Ñ G{H
be a morphism of schemes preserving the G-actions. Let
Z “ X ˆG{H e
be defined as the fibered product of the two maps ψ and the inclusion e “ H{H Ñ
G{H. Assume that the balanced product Z ˆH G exists and is a universal quotient.
Then we have an isomorphism of G-actions
pX, Gq » pZ ˆH G, Gq.
Finally, we get the following slice theorem which extends [CEPT96, Theorem 6.4]
as we will see above:
Theorem 5.16. Suppose that G is commutative and finite over S. The quotient
stack rX{Gs is tame if and only if the action pX, Gq admits finitely presented flat
slices such that the slice group at p P X are linearly reductive.
Proof. When G is commutative, since by proposition 5.13, up to passing to a finite
finitely presented flat neighborhood of q, there is a subgroup H of G such that
pX{H, G{Hq defines a torsor over Y, then X{H ˆY X{H » X{H ˆY G{H. This gives
us a G-equivariant morphism ψ : X Ñ G{H after the fppf base change X{H Ñ Y. So,
pX, Gq is induced by the action pZ, Hq using the notation of the previous lemma. The
converse is due to Theorem 5.9 since if the action pX, Gq admits finitely presented
flat slices such that the slice group at p P X are linearly reductive, then for any
p P X, IG ppq is linearly reductive.
6. Tame action by affine group scheme vs Tame quotient stack
6.1. Algebraic interlude. The following lemma is quite important in the sense
that it relates the functor of invariants to the functor ComA p´, Bq. As a consequence,
it relates in particular the exactness of this functors which will be important in order
to compare the two notions of tameness (see Lemma 6.7).
Lemma 6.1. Suppose that the Hopf algebra A is flat over R. Let B P MA and
M P R M be finitely presented as R-modules. There is a natural (functorial on M)
isomorphism:
pB bR M˚ qA » ComA pM, Bq
18
Proof. The commutativity of the right square of the diagram below insures the
existence of λ which is an isomorphism and so α and γ as well.
/
0
pB bR M˚ qA
/
B bR M˚
0
/
ComA pM, Bq
/
pB bR M˚ q bR A
γ
α
λ
φ
/
HomR pM, Bq
ψ
/
HomR pM, B bR Aq
where φ :“ ρBbR M˚ ´ IdB b IdM˚ b 1, ψ :“ pρB ˝ ´q ´ ρM˚ and for any b b f b a P
ř
B bR M˚ bR A and m P M, γpb b f b aqpmq “ b. f pmp0q q b a.mp´1q
Indeed, the map γ is an isomorphism as composite of the isomorphism γ1 : B bR
M˚ bR A Ñ B bR A bR M˚ defined for any b b f b a P B bR M˚ bR A by γ1 pb b f b aq “
b b a.mp´1q b f pmp0q q (Its inverse map is defined for any b b a b f P B bR A bR M˚
ř
by γ´1
pb b a b f q “ b b f pmp0q q b a.Spmp´1q q) with the canonical isomorphism
1
γ2 : B bR A bR M˚ Ñ HomR pM, B bR Aq. For any b b f P B bR M˚ , we have
ř
ψ ˝ αpb b f q “ ψprm ÞÑ b f pmqsq “ rm ÞÑ ρB pbq f pmq ´ b f pmp0q q b mp´1q s
and
γ ˝ φpb b f q “
“
“
“
ř
γprm ÞÑ bp0q b f pmp0q q b bp1q Spmp´1q q ´ b b f pmq b 1sq
ř
rm ÞÑ pbp0q b bp1q Spmp1 q qpmp0q qp´1q q f ppmp0q qp0q ´ b f pmp0q b mp´1q s
ř
ř
rm ÞÑ pbp0q b bp1q ǫpmp´1q qq f pmp0q q ´ b f pmp0q q b mp´1q s
ř
rm ÞÑ ρB pbq f pmq ´ b f pmp0q q b mp´1q s.
6.2. Tame actions. Chinburg, Erez, Pappas and Taylor defined in their article
[CEPT96] the notion of tame action. We recall here this definition and some useful
properties.
Definition 6.2. We say that an action pX, Gq is tame if there is a unitary (that is
αp1A q “ 1B ) morphism of A-comodules α : A Ñ B, which means that α is a R-linear
map such that ρB ˝ α “ pα b IdA q ˝ δ, such a morphism is called a total integral.
Tame actions are stable under base change.
Lemma 6.3. If the action pX, Gq is tame, then after an affine base change R1 Ñ R
the action pXR1 , GR1 q is also tame.
Proof. Since the action pX, Gq is tame, there is a AC -comodule map A Ñ B, which
induces naturally a comodule map AR1 Ñ BR1 .
The next lemma will allow us to assume that the base is equal to the quotient,
if the structural map X Ñ S has the same properties as the quotient morphism
X Ñ Y.
Lemma 6.4. The following assertions are equivalent:
19
(1) The action pX, CGq over C is tame .
(2) The action pX, Gq over S is tame.
(3) The action pC X, C Gq over C is tame.
Proof. p1q ñ p2q Let α : C A Ñ B be a total integral for the tame action pX, CGq.
Since B is a C A-comodule via ρB : B Ñ B bR A » B bC C A, the composite α1 :“
α ˝ iA : A Ñ B, where iA : A Ñ C bR A maps a to 1 b a, is a unitary A-comodule
map so a total integral for the action pX, Gq.
p2q ñ p3q Follows from base change, by Lemma 6.3.
p3q ñ p1q Denote by β : C A Ñ C B the total integral for the action pC X, CGq. Recall
that IdC bR A is a C A-comodule via IdC bδ and C B is a C A-comodule map via IdC bρB .
Consider the composite β1 :“ µC ˝ β : C bR A Ñ B where µC : C bR B Ñ B comes
from the algebra multiplication of B. For any b P B and c P C,
ř
pµC b IdA qppIdC b ρB qpc b bqq “ pµC b IdA qp c b bp0q b bp1q q
ř
“
cbp0q b bp1q “ ρB pcqρB pbq (since C “ BA )
“ ρB pµC pb b cqq (since B is an A-comodule algebra).
Thus, µC is an AC -comodule map and β1 also being compositions of AC -comodule
maps.
6.3. Exactness of the functor of the invariants for tame actions. In the case
of a constant group scheme, by [CEPT96, Lemma 2.2], the tameness of an action is
equivalent to the surjectivity of the trace map, which generalizes a characterization
of tameness in number theory (see [Cas67, Chapter I, §5, Theorem 2]) and justifies
the choice of the terminology. In the general case, we can define a projector which
plays the role of the trace map in the case of an action by a constant group scheme
(see [Doi90, section 1]).
Lemma 6.5. [Doi90, §1] From a total integral map α : A Ñ B and M P B MA , we
can define a R-linear projector called Reynold operator
prM : M Ñ MA
ř
m ÞÑ prM pmq :“ prM,αpmq “ pmq αpSpmp1q qqmp0q .
Proof. For any m P M and a P A, we have
ρM pαpaqq “ pα b Aqδpaq “ pα b Aqp
ÿ
a1 b a2 q “
ÿ
Thus,
ρM pm.αpaqq “
ÿ
mp0q αpa1 q b mp1q a2 p˝q.
20
αpa1 q b a2 .
We obtain:
ř
ρM p mp0q αpSpmp1q qq
ř
pm q αpSpmp1q q1 b pmp0q q1 Spmp1q q1 q pby p˝qq
ř p0q p0q
pm q αpSppmp1q q2 q b pmp0q q1 Sppmp1q q1 q (since S is an antimorphism)
ř p0q p0q
ř
mp0q αpSpmp3q qq b mp1q Spmp2q q “ mp0q αpSpmp2q qq b pmp1q q1 Spmp1q q2
ř
m Spmp2q q b ǫpmp1q q1 (by the definition of an antipodeq
ř p0q
ř
mp0q Spmp1q ǫpmp1q qq b 1 “ mp0q Sppmp1q q1 ǫpmp1q q1 q b 1
ř
mp0q Spmp1q q b 1(by the properties of the counity).
prM pmq b 1
ρM pprM pmqq “
“
“
“
“
“
“
“
So, prM pmq P pMqA and prM 2 “ prM . Moreover, for any m P pMqA , ρM pmq “ m b 1,
Hence, prM pmq “ mαpsp1qq “ mαp1q “ m since αp1q “ 1. This proves that prM is a
Reynold operator.
The existence of this projector insures that the functor of invariants in exact, for
tame actions. The following lemma will permit to relate the previous two notions of
tameness.
Lemma 6.6. [CEPT96, Lemma 2.3] If the action pX, Gq is tame then the functor
of invariants p´qA : B MA Ñ C M is exact.
Proof. Let 0 Ñ M1 Ñ M2 Ñ M3 Ñ 0 be an exact sequence of BMA . Using the
notation of the previous lemma, we have the following commutative diagram:
0
prM1
|
pM1 qA “ prM1 pM1 q
/
0
φ1 |pM
1q
A
A
M1
φ1
pM2 q “ prM2 pM2 q
/
0
φ2 |pM
2q
A
0
/
prM2
|
/
|
/
M2
φ2
prM3
pM3 qA “ prM3 pM3 q
ρM1
/
M3
M1 b1
//
M1 b A
//
M2 b A
//
M3 b A
ρM2
M2 b1
ρM3
M3 b1
0
Left exactness is automatic, right exactness follows from the previous diagram.
Adding finite hypothesis, we are able to prove that the exactness of the functor
of invariant is equivalent to tameness of the action.
Proposition 6.7. Suppose that C is locally noetherian, that B is flat over C and
that A is finite, locally free over R. Then, the following assertions are equivalent:
(1) The action pX, Gq is tame.
21
(2) The functor p´qA : B MA Ñ C M, N ÞÑ pNqA is exact.
(1’) The action pX, CGq is tame.
(2’) The functor p´qC A : B MC A Ñ C M, N ÞÑ pNqCA is exact.
Proof. p1q ô p11 q follows from lemma 6.4.
p2q ô p21 q follows from B MA “ B MAC .
p1q ñ p2q follows from lemma 6.5
p21 q ñ p11 q Suppose that p´qA is exact. Since C A is finite over C (base change of A
which is finite over R) and B is finite over C, B bC C A is finite over C. Moreover, as
C is locally noetherian, B and B bR A are also of finite presentation as algebras over
C so, in particular, as C-modules. By lemma 6.1 since we suppose B flat over C, we
have the following isomorphism
pB bR B˚ qC A » ComC A pB, Bq and pB bR pB bR Aq˚ qC A » ComC A pB bC C A, Bq
Since pB b ǫq is a C-linear section of ρB : B Ñ B bR A, pB bC C Aq˚ Ñ B˚ is surjective.
Thus, from the exactness of p´qC A , we obtain the surjectivity of
pB bR pB bR Aq˚ qC A Ñ pB bR B˚ qC A
Finally, the isomorphisms above imply the surjectivity of the natural map
ComC A pB bC C A, Bq Ñ ComC A pB, Bq
This insures the existence of a C A-comodule map λB : B bC C A Ñ B such that
λB ˝ ρB “ B. The previous lemma permits to conclude the proof.
6.4. Relationship between the two notions of tameness. First, we also can
prove easily that the tame actions defines always tame quotient stacks.
Theorem 6.8. Suppose that X is noetherian, finitely presented over S, that G is
finitely presented over S and and that all the inertia groups are finite. If the action
pX, Gq is tame then the quotient stack rX{Gs is tame.
Proof. This follows directly from Lemma 6.6 and Corollary 5.5.
We manage to prove the equivalence of these two notions of tameness defined in
this paper for actions involving finite group schemes such that the B is flat over C:
Theorem 6.9. Suppose that G is finite and locally free over S. The action pX, Gq is
tame if and only if the quotient stack rX{Gs is tame. If moreover, C is noetherian
and B flat over C, the converse is true.
Proof. By [Con05, §3], we know that ρ : rX{Gs Ñ Y is a coarse moduli space.
Moreover, ρ˚ : QcohprX{Gsq Ñ QcohpYq is exact by Lemma 6.6, thus rX{Gs is tame.
The converse follows from Proposition 6.7..
22
Remark 6.10. We can replace the hypothesis Y noetherian by X of finite type over
S. In fact, by [Con05, Theorem 3.1, (2)], Y is of finite type over S so also noetherian
since S is supposed noetherian.
We obtain easily the following corollary.
Corollary 6.11. Suppose that S is noetherian and G is finite and flat over S. Then,
G is linearly reductive over S if and only if the trivial action pS, Gq is tame over S.
Remark 6.12. We say that a Hopf algebra A is relatively cosemisimple if for all
M P MA the submodules which are direct summands in MR are also direct summands
in MA . The Hopf algebra A is relatively cosemisimple if and only if the trivial action
pSpecpRq, Gq is tame (see [BW03, 16.10]). In particular, when G is finite, flat over
S, this is also equivalent to G being linearly reductive.
The following result can be seen as an analogue of the trace surjectivity that we
have proved in the constant case.
Corollary 6.13. Suppose that G is finite, locally free over S, C is locally noetherian
and B flat over C. The following assertions are equivalent:
(1) The action pX, Gq is tame.
(2) The quotient stack rX{Gs is tame.
(3) The functor p´qA : B MA Ñ C M, N ÞÑ pNqA is exact.
(4) There is a Reynold operator prM : M Ñ MA for any M P B MA .
Proof. p1q ô p2q ô p3q Follows from the previous theorem.
p1q ñ p4q follows from Lemma 6.5.
p4q ñ p2q As the functor p´qA is left exact, it is enough to prove exactness on the
right. So, let ξ : M Ñ N P B BimA pM, Nq be an epimorphism. It induces a morphism
ξA : MA Ñ N A . For n P N A , by the surjectivity of ξ, there is m P M such that
ξpmq “ n. Moreover, prM pmq P MA , so ξpprM pmqq “ prN pξpmqq “ n. Therefore ξ is
surjective.
References
[Alp08]
Jarod Alper : Good moduli spaces for Artin stacks. ProQuest LLC, Ann Arbor, MI, 2008.
Thesis (Ph.D.)–Stanford University.
[AOV08]
D. Abramovich, M. Olsson et A. Vistoli : Tame stacks in positive characteristic. Ann. Inst.
Fourier (Grenoble), 58(4):1057–1091, 2008.
[Art69]
M. Artin : Algebraic approximation of structures over complete local rings. Inst. Hautes Études
Sci. Publ. Math., (36):23–58, 1969.
[Bou81]
N. Bourbaki : Éléments de mathématique. Lecture Notes in Mathematics, Vol. 305. Masson,
Paris, 1981. Algèbre. Chapitres 4 à 7. [Algebra. Chapters 4–7].
[BW03]
T. Brzezinski et R. Wisbauer : Corings and comodules, volume 309 de London Mathematical
Society Lecture Note Series. Cambridge University Press, Cambridge, 2003.
23
[Cas67]
Algebraic number theory. Proceedings of an instructional conference organized by the London Mathematical Society (a NATO Advanced Study Institute) with the support of the Inter
national Mathematical Union. Edited by J. W. S. Cassels and A. Fröhlich. Academic Press,
London, 1967.
[CE92]
T. Chinburg et B. Erez : Equivariant Euler-Poincaré characteristics and tameness. Astérisque,
(209):13, 179–194, 1992. Journées Arithmétiques, 1991 (Geneva).
[CEPT96] T. Chinburg, B. Erez, G. Pappas et M. J. Taylor : Tame actions of group schemes: integrals
and slices. Duke Math. J., 82(2):269–308, 1996.
[Con05]
B. Conrad : The Keel-Mori theorem via stacks. Preprint from the University of Stanford
available at http://math.stanford.edu/˜conrad/papers/coarsespace.pdf, 2005.
[DG70]
M. Demazure et P. Gabriel : Groupes algébriques. Tome I: Géométrie algébrique, généralités,
groupes commutatifs. Masson & Cie, Éditeur, Paris, 1970. Avec un appendice Corps de classes
local par Michiel Hazewinkel.
[Doi90]
Y. Doi : Hopf extensions of algebras and Maschke type theorems. Israel J. Math., 72(1-2):99–
108, 1990. Hopf algebras.
[GM71]
A. Grothendieck et J. P. Murre : The tame fundamental group of a formal neighbourhood of
a divisor with normal crossings on a scheme. Lecture Notes in Mathematics, Vol. 208. SpringerVerlag, Berlin, 1971.
[Har77]
R. Hartshorne : Algebraic geometry. Springer-Verlag, New York, 1977. Graduate Texts in
Mathematics, No. 52.
[Kem00]
G. Kemper : A characterization of linearly reductive groups by their invariants. Transform.
Groups, 5:85–92, 2000.
[LMB00]
G. Laumon et L. Moret-Bailly : Champs algébriques, volume 39 de Ergebnisse der Mathematik und ihrer Grenzgebiete. 3. Folge. A Series of Modern Surveys in Mathematics [Results
in Mathematics and Related Areas. 3rd Series. A Series of Modern Surveys in Mathematics].
Springer-Verlag, Berlin, 2000.
[Lun73]
D. Luna : Slices étales. In Sur les groupes algébriques, pages 81–105. Bull. Soc. Math. France,
Paris, Mémoire 33. Soc. Math. France, Paris, 1973.
[Mar]
Sophie Marques : Tameness for actions of affine group schemes and quotient stacks. Preprint
available at https://files.nyu.edu/sm5439/public/memoire/these.pdf.
[Ols06]
M. C. Olsson : Deformation theory of representable morphisms of algebraic stacks. Math. Z.,
253(1):25–62, 2006.
[Ols07]
M. C. Olsson : Sheaves on Artin stacks. J. Reine Angew. Math., 603:55–112, 2007.
[Ray70]
M. Raynaud : Anneaux locaux henséliens. Lecture Notes in Mathematics, Vol. 169. SpringerVerlag, Berlin, 1970.
[Ser68]
J.-P. Serre : Corps locaux. Hermann, Paris, 1968. Deuxième édition, Publications de
l’Université de Nancago, No. VIII.
(MARQUES Sophie) Visiting assistant professor at New York University, Courant institute of mathematical sciences, 251 Mercer St, New York, NY 10012, USA
E-mail address: [email protected]
24
| 0math.AC
|
arXiv:1611.07237v2 [math.ST] 24 Nov 2016
Multivariate Intensity Estimation via Hyperbolic Wavelet
Selection
NATHALIE AKAKPO
Laboratoire de Probabilités et Modèles Aléatoires (LPMA), UMR 7599
Université Pierre et Marie Curie (UPMC), Paris
Centre de Recherches Mathématiques (CRM), UMI 3457
Université de Montréal (UdeM)
Abstract. We propose a new statistical procedure able in some way to overcome the curse
of dimensionality without structural assumptions on the function to estimate. It relies on
a least-squares type penalized criterion and a new collection of models built from hyperbolic
biorthogonal wavelet bases. We study its properties in a unifying intensity estimation framework,
where an oracle-type inequality and adaptation to mixed smoothness are shown to hold. Besides,
we describe an algorithm for implementing the estimator with a quite reasonable complexity.
Keywords: Hyperbolic wavelets; Biorthogonal wavelets; Mixed smoothness; Model selection; Density;
Copula; Poisson process; Lévy process.
Contents
1. Introduction
2. Framework and examples
2.1. General framework
2.2. Examples
3. Estimation on a given pyramidal wavelet model
3.1. Wavelets on L2 ([0, 1])
3.2. Hyperbolic wavelet basis on L2 ([0, 1]d )
3.3. Pyramidal models
3.4. Least-squares type estimator on a pyramidal model
3.5. Quadratic risk on a pyramidal model
4. Wavelet pyramid model selection
4.1. Penalized pyramid selection
4.2. Combinatorial complexity and choice of the penalty function
4.3. Back to the examples
5. Adaptivity to mixed smoothness
5.1. Function spaces with dominating mixed smoothness
5.2. Link with structural assumptions
5.3. Approximation qualities and minimax rate
6. Implementing wavelet pyramid selection
6.1. Algorithm and computational complexity
6.2. Illustrative examples
7. Proofs
7.1. Proof of Proposition 2
7.2. Proof of Proposition 3
E-mail address: [email protected].
Date: November 28, 2016.
1
2
3
3
3
5
5
6
7
7
8
10
10
10
12
14
14
15
16
18
18
18
20
20
21
2
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
7.3. Proof of Proposition 4
7.4. Proof of Theorem 1
7.5. Proofs of Corollaries 1 to 5
7.6. Proof of Proposition 5
7.7. Proof of Theorem 2
References
22
23
26
27
28
29
1. Introduction
Over the last decades, many wavelet procedures have been developed in various statistical
frameworks. Yet, in multivariate settings, most of them are based on isotropic wavelet bases.
These indeed have the advantage of being as easily tractable as their univariate counterparts since
each isotropic wavelet is a tensor product of univariate wavelets coming from the same resolution
level. Notable counterexamples are [Don97], [Neu00] and [NvS97], or [ACF15] and [ACF14]. They
underline the usefulness of hyperbolic wavelet bases, where coordinatewise varying resolution levels
are allowed, so as to recover a wider range of functions, and in particular functions with anisotropic
smoothness.
Much attention has also been paid to the so-called curse of dimensionality. A common way
to overcome this problem in Statistics is to impose structural assumptions on the function to
estimate. In a regression framework, beyond the well-known additive and single-index models,
we may cite the work of [HM07] who propose a spline-based method in an additive model with
unknown link function, or the use of ANOVA-like decompositions in [IS07] or [DIT14]. Besides,
two landmark papers consider a general framework of composite functions, encompassing several
classical structural assumptions: [JLT09] propose a kernel-based procedure in the white noise
framework, whereas [BB14] propose a general model selection procedure with a wide scope of
applications. Finally, Lepski [Lep13] (see also [Reb15b, Reb15a]) consider density estimation
with adaptation to a possibly multiplicative structure of the density. In the meanwhile, in the
field of Approximation Theory and Numerical Analysis, a renewed interest in function spaces
with dominating mixed smoothness has been growing (see for instance [DTU16]), due to their
tractability for multivariate integration for instance. Such spaces do not impose any structure,
but only that the highest order derivative is a mixed derivative. Surprisingly, in the statistical
literature, it seems that only the thresholding-type procedures of [Neu00] and [BPP13] deal with
such spaces, either in the white noise framework or in a functional deconvolution model.
In order to fill this gap, this paper is devoted to a new statistical procedure based on wavelet
selection from hyperbolic biorthogonal bases. We underline its universality by studying it in a
general intensity estimation framework, encompassing many examples of interest such as density,
copula density, Poisson intensity or Lévy jump intensity estimation. We first define a whole
collection of linear subspaces, called models, generated by subsets of the dual hyperbolic basis,
and a least-squares type criterion adapted to the norm induced by the primal hyperbolic basis.
Then we describe a procedure to choose the best model from the data by using a penalized
approach similar to [BBM99]. Our procedure satisfies an oracle-type inequality provided the
intensity to estimate is bounded. Besides, it reaches the minimax rate up to a constant factor,
or up to a logarithmic factor, over a wide range of spaces with dominating mixed smoothness,
and this rate is akin to the one we would obtain in a univariate framework. Notice that, contrary
to [Neu00] or [BPP13], we allow for a greater variety of such spaces (of Sobolev, Hölder or Besov
type smoothness) and also for spatially nonhomogeneous smoothness. For that purpose, we prove
a key result from nonlinear approximation theory, in the spirit of [BM00], that may be of interest
for other types of model selection procedures (see for instance [Bir06, Bar11, BB16]). Depending
on the kind of intensity to estimate, different structural assumptions might make sense, some of
which have been considered in [JLT09], [BB14], [Lep13], [Reb15b, Reb15a], but not all. We explain
in what respect these structural assumptions fall within the scope of estimation under dominating
mixed smoothness. Yet, we emphasize that we do not need to impose any structural assumptions
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
3
on the target function. Thus in some way our method is adaptive at the same time to many
structures. Besides, it can be implemented with a computational complexity linear in the sample
size, up to logarithmic factors.
The plan of the paper is as follows. In Section 2, we describe the general intensity estimation
framework and several examples of interest. In Section 3, we define the so-called pyramidal wavelet
models and a least-squares type criterion, and provide a detailed account of estimation on a given
model. Section 4 is devoted to the choice of an adequate penalty so as to perform data-driven
model selection. The optimality of the resulting procedure from the minimax point of view is then
discussed in Section 5, under mixed smoothness assumptions. The algorithm for implementing our
wavelet procedure and an illustrative example are given in Section 6. All proofs are postponed to
Section 7. Let us end with some remark about the notation. Throughout the paper, C, C1 , . . . will
stand for numerical constants, and C(θ), C1 (θ), . . . for positive reals that only depend on some θ.
Their values are allowed to change from line to line.
2. Framework and examples
Qd
2.1. General framework. Let d ∈ N, d ≥ 2, and Q = k=1 [ak , bk ] be a given hyperrectangle in
Rd equipped with its Borel σ−algebra B(Q) and the Lebesgue measure. We denote by L2 (Q) the
space of square integrable functions on Q, equipped with its usual norm
sZ
t2 (x)dx
(1)
ktk =
Q
and scalar product h., .i. In this article, we are interested in a nonnegative measure on B(Q) that
admits a bounded density s with respect to the Lebesgue measure, and our aim is to estimate that
function s over Q. Given a probability space (Ω, E, P), we assume that there exists some random
measure M defined on (Ω, E, P), with values in the set of Borel measures on Q such that, for all
A ∈ B(Q),
E [M (A)] = h1IA , si.
(2)
By classical convergence theorems, this condition implies that, for all nonnegative or bounded
measurable functions t,
Z
(3)
E
tdM = ht, si.
Q
c, which is close enough to M in a sense to
We assume that we observe some random measure M
c = M.
be made precise later. When M can be observed, we set of course M
2.2. Examples. Our general framework encompasses several special frameworks of interest, as
we shall now show.
2.2.1. Example 1: density estimation. Given n ∈ N? , we observe identically distributed random variables Y1 , . . . , Yn with common density s with respect to the Lebesgue measure on Q =
Qd
k=1 [ak , bk ] . The observed empirical measure is then given by
n
X
c(A) = M (A) = 1
M
1IA (Yi ), for A ∈ B(Q),
n i=1
and obviously satisfies (2).
2.2.2. Example 2: copula density estimation. Given n ∈ N? , we observe independent and identically distributed random variables X1 , . . . , Xn with values in Rd . For i = 1, . . . , n and j = 1, . . . , d,
the j-th coordinate Xij of Xi has continuous distribution function Fj . We recall that, from Sklar’s
Theorem [Skl59] (see also [Nel06], for instance), there exists a unique distribution function C on
[0, 1]d with uniform marginals such that, for all (x1 , . . . , xd ) ∈ Rd ,
P(Xi1 ≤ x1 , . . . , Xid ≤ xd ) = C(F1 (x1 ), . . . , Fd (xd )).
4
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
This function C is called the copula of Xi1 , . . . , Xid . We assume that it admits a density s with
respect to the Lebesgue measure on Q = [0, 1]d . Since C is the joint distribution function of the
Fj (X1j ), j = 1, . . . , d, a random measure satisfying (2) is given by
n
M (A) =
1X
1IA (F1 (Xi1 ), . . . , Fd (Xid )) , for A ∈ B([0, 1]d ).
n i=1
As the marginal distributions Fj are usually unknown, we replace them by the empirical distribution functions F̂nj , where
n
1X
1IX ≤t ,
F̂nj (t) =
n i=1 ij
and define
n
X
c(A) = 1
M
1IA F̂n1 (Xi1 ), . . . , F̂nd (Xid ) , for A ∈ B([0, 1]d ).
n i=1
2.2.3. Example 3: Poisson intensity estimation. Let us denote by Vold (Q) the Lebesgue meaQd
sure of Q = k=1 [ak , bk ] . We observe a Poisson process N on Q whose mean measure has
intensity Vold (Q)s. Otherwise said, for all finite family (Ak )1≤k≤K of disjoint measurable subsets
of Q, N (A
R independent Poisson random variables with respective parameters
R 1 ), . . . , N (AK ) are
Vold (Q) A1 s, . . . , Vold (Q) AK s. Therefore the empirical measure
c(A) = M (A) = N (A) , for A ∈ B(Q),
M
Vold (Q)
does satisfy (2). We do not assume s to be constant throughout Q so that the Poisson process
may be nonhomogeneous.
2.2.4. Example 4: Lévy jump intensity estimation (continuous time). Let T be a fixed positive
real, we observe on [0, T ] a Lévy process X = (Xt )t≥0 with values in Rd . Otherwise said, X is
a process starting at 0, with stationary and independent increments, and which is continuous in
probability with càdlàg trajectories (see for instance [Ber96, Sat99, CT04]). This process may
have jumps, whose sizes are ruled by the so-called jump intensity measure or Lévy measure. An
important example of such process is the compound Poisson process
Xt =
Nt
X
ξi , t ≥ 0,
i=1
where (Nt )t≥0 is a univariate homogeneous Poisson process, (ξi )i≥i are i.i.d. with values in Rd
and distribution ρ with no mass at 0, and (Nt )t≥0 and (ξi )i≥i are independent. In this case, ρ is
also the Lévy measure of X.
Here, we assume that the Lévy measure admits a density f with respect to the Lebesgue
Qd
measure on Rd \{0}. Given some compact hyperrectangle Q = k=1 [ak , bk ] ⊂ Rd \{0}, our aim is
to estimate the restriction s of f to Q. For that purpose, we use the observed empirical measure
ZZ
c(A) = M (A) = 1
M
N (dt, dx), for A ∈ B(Q).
T
[0,T ]×A
A well-known property
of Lévy processes states that the random measure N defined for B ∈
B [0, +∞) × Rd \{0} by
N (B) = ]{t > 0/(t, Xt − Xt− ) ∈ B}
is a Poisson process with mean measure
Z Z
µ(B) =
f (x)dtdx,
B
so that M satisfies (2).
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
5
2.2.5. Example 5: Lévy jump intensity estimation (discrete time). The framework is the same as
in Example 4, except that (Xt )t≥0 is not observed. Given some time step ∆ > 0 and n ∈ N? , we
only have at our disposal the random variables
Yi = Xi∆ − X(i−1)∆ , i = 1, . . . n.
In order to estimate s on Q, we consider the random measure
ZZ
1
N (dt, dx), for A ∈ B(Q),
M (A) =
n∆
[0,n∆]×A
which is unobserved, and replaced for estimation purpose with
n
X
c(A) = 1
M
1IA (Yi ), for A ∈ B(Q).
n∆ i=1
3. Estimation on a given pyramidal wavelet model
The first step of our estimation procedure relies on the definition of finite dimensional linear
subspaces of L2 (Q), called models, generated by some finite families of biorthogonal wavelets. We
only describe here models for Q = [0, 1]d . For a general hyperrectangle Q, the adequate models
can be deduced by translation and scaling. We then introduce a least-squares type contrast that
allows to define an estimator of s within a given wavelet model.
3.1. Wavelets on L2 ([0, 1]). We shall first introduce a multiresolution analysis and a wavelet
basis for L2 ([0, 1]) satisfying the same general assumptions as in [Hoc02b] and [Hoc02a]. Concrete
examples of wavelet bases satisfying those assumptions may be found in [CDV93] and [DKU99] for
instance. In the sequel, we denote by κ some positive constant, that only depends on the choice
of the bases. We fix the coarsest resolution level at j0 ∈ N. On the one hand, we assume that the
scaling spaces
Vj = Vect{φλ ; λ ∈ ∆j } and Vj? = Vect{φ?λ ; λ ∈ ∆j }, j ≥ j0 ,
satisfy the following hypotheses:
S.i) (Riesz bases) For all j ≥ j0 , {φλ ; λ ∈ ∆j } are linearly independent functions from L2 ([0, 1]),
P
∼
so are {φ?λ ; λ ∈ ∆j }, and they form Riesz bases of Vj and Vj? , i.e.
λ∈∆j aλ φλ
P
1/2
P
2
?
∼
λ∈∆j aλ
λ∈∆j aλ φλ .
S.ii) (Dimension) There exists some nonnegative integer B such that, for all j ≥ j0 , dim(Vj ) =
dim(Vj? ) = ]∆j = 2j + B.
?
S.iii) (Nesting) For all j ≥ j0 , Vj ⊂ Vj+1 and Vj? ⊂ Vj+1
.
?
S.iv) (Density) ∪j≥j0 Vj = ∪j≥j0 Vj = L2 ([0, 1]).
S.v) (Biorthogonality) Let j ≥ j0 , for all λ, µ ∈ ∆j , hφλ , φ?µ i = δλ,µ .
S.vi) (Localization) Let j ≥ j0 , for all λ ∈ ∆j , |Supp(φλ )| ∼ |Supp(φ?λ )| ∼ 2−j .
S.vii) (Almost disjoint supports) For all j ≥ j0 and all λ ∈ ∆j ,
max ]{µ ∈ ∆j s.t. Supp(φλ ) ∩ Supp(φµ ) 6= ∅}, ]{µ ∈ ∆j s.t. Supp(φ?λ ) ∩ Supp(φ?µ ) 6= ∅} ≤ κ.
S.viii) (Norms) For all j ≥ j0 and all λ ∈ ∆j , kφλ k = kφ?λ k = 1 and max(kφλ k∞ , kφ?λ k∞ ) ≤ κ2j/2 .
S.ix) (Polynomial reproducibility) The primal scaling spaces are exact of order N , i.e. for all
j ≥ j0 , ΠN −1 ⊂ Vj , where ΠN −1 is the set of all polynomial functions with degree ≤ N − 1
over [0, 1].
On the other hand, the wavelet spaces
Wj = Vect{ψλ ; λ ∈ ∇j } and Wj? = Vect{ψλ? ; λ ∈ ∇j }, j ≥ j0 + 1,
fulfill the following conditions:
W.i) (Riesz bases) The functions {ψλ ; λ ∈ ∪j≥j0 +1 ∇j } are linearly independent. Together with
the {φλ ; λ ∈ ∆j0 }, they form a Riesz basis for L2 ([0, 1]). The same holds for the ψ ? and
the φ? .
6
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
?
?
?
, with Vj ⊥ Wj+1
= Vj? ⊕ Wj+1
W.ii) (Orthogonality) For all j ≥ j0 , Vj+1 = Vj ⊕ Wj+1 and Vj+1
and Vj? ⊥ Wj+1 .
W.iii) (Biorthogonality) Let j ≥ j0 , for all λ, µ ∈ ∇j+1 , hψλ , ψµ? i = δλ,µ .
W.iv) (Localization) Let j ≥ j0 , for all λ ∈ ∇j+1 , |Supp(ψλ )| ∼ |Supp(ψλ? )| ∼ 2−j .
W.v) (Almost disjoint supports) For all j ≥ j0 and all λ ∈ ∇j+1 ,
max ]{µ ∈ ∇j+1 s.t. Supp(ψλ ) ∩ Supp(ψµ ) 6= ∅}, ]{µ ∈ ∇j+1 s.t. Supp(ψλ? ) ∩ Supp(ψµ? ) 6= ∅} ≤ κ.
W.vi) (Norms) For all j ≥ j0 and all λ ∈ ∇j+1 , kψλ k = kψλ? k = 1 and max(kψλ k∞ , kψλ? k∞ ) ≤
κ2j/2 .
W.vii) (Fast Wavelet Transform) Let j ≥ j0 , for all λ ∈ ∇j+1 ,
]{µ ∈ ∆j+1 |hψλ , φµ i =
6 0} ≤ κ
and for all µ ∈ ∆j+1
The same holds for the
ψλ?
|hψλ , φµ i| ≤ κ.
and the φ?λ .
Remarks:
• These properties imply that any function f ∈ L2 ([0, 1]) may be decomposed as
X
X X
(4)
f=
hf, φλ iφ?λ +
hf, ψλ iψλ? .
λ∈∆j0
j≥j0 +1 λ∈∇j
• Properties S.ii) and W.ii) imply that dim(Wj+1 ) = 2j .
• Property W.vii) means in particular that, for each resolution level j, any wavelet can be
represented as a linear combination of scaling functions from the same resolution level
with a number of components bounded independently of the level as well as the amplitude
of the coefficients.
As is well known, contrary to orthogonal bases, biorthogonal bases allow for both symmetric
and smooth wavelets. Besides, properties of dual biorthogonal bases are usually not the same.
Usually, in decomposition (4), the analysis wavelets φλ and ψλ are the one with most null moments,
whereas the synthesis wavelets φ?λ and ψλ? are the one with greatest smoothness. Yet, we may
sometimes need the following smoothness assumptions on the analysis wavelets (not very restrictive
c.
in practice), only to bound residual terms due to the replacement of M with M
Assumption (L). For all λ ∈ ∆j0 , for all j ≥ j0 and all µ ∈ ∇j+1 , φλ and ψµ are Lipschitz
functions with Lipschitz norms satisfying kφλ kL ≤ κ23j0 /2 and kψµ kL ≤ κ23j/2 .
We still refer to [CDV93] and [DKU99] for examples of wavelet bases satisfying this additional
assumption.
3.2. Hyperbolic wavelet basis on L2 ([0, 1]d ). In the sequel, for ease of notation, we set Nj0 =
{j ∈ N, j ≥ j0 }, ∇j0 = ∆j0 , Wj0 = Vj0 and Wj?0 = Vj?0 , and for λ ∈ ∇j0 , ψλ = φλ and
ψλ? = φ?λ . Given a biorthogonal basis of L2 ([0, 1]) chosen according to 3.1, we deduce biorthogonal
wavelets of L2 ([0, 1]d ) by tensor product. More precisely, for j = (j1 , . . . , jd ) ∈ Ndj0 , we set ∇j =
∇j1 × . . . × ∇jd and for all λ = (λ1 , . . . , λd ) ∈ ∇j , we define Ψλ (x1 , . . . , xd ) = ψλ1 (x1 ) . . . ψλd (xd )
and Ψ?λ (x1 , . . . , xd ) = ψλ?1 (x1 ) . . . ψλ?d (xd ). Contrary to most statistical works based on wavelets,
we thus allow for tensor products of univariate wavelets coming from different resolution levels
j1 , . . . , jd . Writing Λ = ∪j∈Ndj ∇j , the families {Ψλ ; λ ∈ Λ} and {Ψ?λ ; λ ∈ Λ} define biorthogonal
0
bases of L2 ([0, 1]d ) called biorthogonal hyperbolic bases. Indeed,
L2 ([0, 1]d ) = ∪j≥j0 Vj ⊗ . . . ⊗ Vj ,
and for all j ≥ j0 ,
Vj ⊗ . . . ⊗ Vj = (Wj0 ⊕ Wj0 +1 ⊕ . . . ⊕ Wj ) ⊗ . . . ⊗ (Wj0 ⊕ Wj0 +1 ⊕ . . . ⊕ Wj )
=
⊕
j0 ≤k1 ,...,kd ≤j
Wk1 ⊗ . . . ⊗ Wkd .
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
7
In the same way,
L2 ([0, 1]d ) = ∪j≥j0
⊕
j0 ≤k1 ,...,kd ≤j
Wk?1 ⊗ . . . ⊗ Wk?d .
Besides, they induce on L2 ([0, 1]d ) the norms
sX
sX
2
(5)
ktkΨ =
ht, Ψλ i and ktkΨ? =
ht, Ψ?λ i2 ,
λ∈Λ
λ∈Λ
which are both equivalent to k.k, with equality when the wavelet basis is orthogonal. It should be
noticed that the scalar product derived from k.kΨ , for instance, is
X
(6)
ht, uiΨ =
ht, Ψλ ihu, Ψλ i.
λ∈Λ
3.3. Pyramidal models. A wavelet basis in dimension 1 has a natural pyramidal structure when
the wavelets are grouped according to their resolution level. A hyperbolic basis too, provided we
define a proper notion of resolution level that takes into account anisotropy: for a wavelet Ψλ or
Ψ?λ with λ ∈ ∇j , we define the global resolution level as |j| := j1 + . . . + jd . Thus, the supports
of all wavelets corresponding to a given global resolution level ` ∈ Ndj0 have a volume of roughly
2−` but exhibit very different shapes. For all ` ∈ Ndj0 , we define J` = {j ∈ Ndj0 /|j| = `}, and
U ∇(`) = ∪j∈J` ∇j the index set for d-variate wavelets at resolution level `.
Given some maximal resolution level L• ∈ Ndj0 , we define, for all `1 ∈ {dj0 + 1, . . . , L• + 1}, the
family MP
`1 of all sets m of the form
!
`[
L•[
−`1
1 −1
m=
m(`1 + k) ,
U ∇(`) ∪
k=0
`=dj0
where, for all 0 ≤ k ≤ L• − `1 , m(`1 + k) may be any subset of U ∇(`1 + k) with N (`1 , k) elements.
Typically, N (`1 , k) will be chosen so as to impose some sparsity: it is expected to be smaller than
the total number of wavelets at level `1 + k and to decrease when the resolution level increases.
An adequate choice of N (`1 , k) will be proposed in Proposition 4. Thus, choosing a set in MP
`1
amounts to keep all hyperbolic wavelets at level at most `1 − 1, but only a few at deeper levels.
P
• +1
We set MP = ∪L
`1 =dj0 +1 M`1 and define a pyramidal model as any finite dimensional subspace of
the form
?
Sm
= Vect{Ψ?λ ; λ ∈ m}, for m ∈ MP .
SL •
?
We denote by Dm the dimension of Sm
. Setting m• = `=dj
U ∇(`), we can see that all pyramidal
0
?
models are included in Sm
.
•
3.4. Least-squares type estimator on a pyramidal model. Let us fix some model m ∈ MP .
If the random measure M is observed, then we can build a least-squares type estimator š?m for s
?
with values in Sm
and associated with the norm k.kΨ defined by (5). Indeed, setting
X
γ(t) = ktk2Ψ − 2
ht, Ψλ iβ̌λ ,
λ∈Λ
where
Z
β̌λ =
Ψλ dM,
Q
we deduce from (3) that s minimizes over t ∈ L2 (Q)
X
ks − tk2Ψ − ksk2Ψ = ktk2Ψ − 2
ht, Ψλ ihs, Ψλ i = E[γ(t)],
λ∈Λ
so we introduce
š?m = argmin γ(t).
?
t∈Sm
8
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
For all sequences of reals (αλ )λ∈m ,
!
(7)
γ
X
αλ Ψ?λ
=
λ∈m
X
αλ − β̌λ
2
−
λ∈m
X
β̌λ2 ,
λ∈m
hence
š?m =
X
β̌λ Ψ?λ .
λ∈m
c, we consider the pseudo-least-squares contrast
Since we only observe the random measure M
X
γ
b(t) = ktk2 − 2
ht, Ψλ iβbλ ,
Ψ
λ∈Λ
where
Z
c,
Ψλ dM
βbλ =
Q
?
as
and we define the best estimator of s within Sm
sb?m = argmin γ
b(t) =
?
t∈Sm
X
βbλ Ψ?λ .
λ∈m
3.5. Quadratic risk on a pyramidal model. Let us introduce the orthogonal projection of s
?
for the norm k.kΨ , that is
on Sm
X
s?m =
βλ Ψ?λ ,
λ∈m
where
βλ = hΨλ , si.
It follows from (3) that β̌λ is an unbiased estimator for βλ , so that š?m is an unbiased estimator
for s?m . Thanks to Pythagoras’ equality, we recover for š?m the usual decomposition
X
(8)
E ks − š?m k2Ψ = ks − s?m k2Ψ +
Var(β̌λ ),
λ∈m
where the first term is a bias term or approximation error and the second term is a variance
c is observed, combining the triangle inequality, the basic
term or estimation error. When only M
inequality (14) and (8) easily provides at least an upper-bound akin to (8), up to a residual term.
Proposition 1. For all θ > 0,
!
X
Var(β̌λ ) + (1 + 1/θ)E kš?m − ŝ?m k2Ψ .
E ks − ŝ?m k2Ψ ≤ (1 + θ) ks − s?m k2Ψ +
λ∈m
c = M, θ can be taken equal to 0 and equality holds.
When M
In all the examples introduced in Section 2.2, we shall verify that the quadratic risks satisfies, for
all θ > 0,
(9)
ksk∞ Dm
E ks − ŝ?m k2Ψ ≤ c1 ks − s?m k2Ψ + c2
+ r1 (n̄),
n̄
where n̄ describes the amount of available data, and the residual term r1 (n̄) does not weigh too
much upon the estimation rate.
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
9
3.5.1. Example 1: density estimation (continued). In this framework, the empirical coefficients
are of the form
n
1X
β̌λ =
Ψλ (Yi ).
n i=1
As the wavelets are normalized and s is bounded,
Z
1
ksk∞
Ψ2 (x)s(x)dx ≤
,
Var(β̌λ ) ≤
n Q λ
n
so
ksk∞ Dm
E ks − ŝ?m k2Ψ ≤ ks − s?m k2Ψ +
.
n
Hence (9) is satisfied for instance with n̄ = n, c1 = c2 = 1, r1 (n) = 0.
3.5.2. Example 2: copula density estimation (continued). In this case,
n
β̌λ =
while
1X
Ψλ (F1 (Xi1 ), . . . , Fd (Xid )) ,
n i=1
n
1X
Ψλ F̂n1 (Xi1 ), . . . , F̂nd (Xid ) .
βbλ =
n i=1
As in Example 1, Var(β̌λ ) ≤ ksk∞ /n. Besides we prove in Section 7.1 the following upper-bound
for the residual terms.
Proposition 2. Under Assumption (L), for all m ∈ MP ,
E[kš?m − ŝ?m k2 ] ≤ C(κ, d)Ld−1
24L• log(n)/n.
•
√
√
Hence choosing n̄ = n, 24L• = n/ log(n), c1 = c2 = 2, and r1 (n) = C(κ, d) log(n)d−1 / n
yields (9).
3.5.3. Example 3: Poisson intensity estimation (continued). In this case,
Z
1
Ψλ (x)N (dx).
β̌λ =
Vold (Q) Q
From Campbell’s formula,
Var(β̌λ ) =
1
Vold (Q)
Z
Ψ2λ (x)s(x)dx
Q
so
ksk∞ Dm
E ks − ŝ?m k2Ψ ≤ ks − s?m k2Ψ +
,
n̄
with n̄ = Vold (Q).
3.5.4. Example 4: Lévy jump intensity estimation with continuous time observations (continued).
In this case,
ZZ
1
β̌λ =
Ψλ (x)N (dt, dx).
T
[0,T ]×Q
From Campbell’s formula again,
Var(β̌λ ) =
1
T2
ZZ
Ψ2λ (x)s(x)dtdx
[0,T ]×Q
so
ksk∞ Dm
E ks − ŝ?m k2Ψ ≤ ks − s?m k2Ψ +
,
n̄
with n̄ = T.
10
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
3.5.5. Example 5: Lévy jump intensity estimation with discrete time observations (continued). In
this case, the empirical coefficients and their approximate counterparts are of the form
ZZ
n
1 X
1
b
Ψλ (x)N (dt, dx) and βλ =
β̌λ =
Ψλ (Xi∆ − X(i−1)∆ ).
n∆
n∆ i=1
[0,n∆]×Q
We deduce as previously that Var(β̌λ ) ≤ ksk∞ /n̄ with n̄ = n∆. Besides we can bound the residual
term thanks to the following proposition, proved in Section 7.2.
Proposition 3. Under Assumption (L), for all m ∈ MP ,
E[kš?m − ŝ?m k2 ] ≤ 8
24L• n∆3 + 23L• ∆
ksk∞ Dm
+ C(κ, d, f, Q)Ld−1
.
•
n∆
n∆
provided ∆ is small enough.
Assuming n∆2 stays bounded while n∆ → ∞ as n → ∞, and choosing 24L• = n∆, we deduce that (9) is satisfied under Assumption (L) with n̄ = n∆, c1 = 2, c2 = 18, and r1 (n̄) =
C(κ, d, f, Q) log(n̄)d−1 /n̄. Notice that these assumptions on n and ∆ are classical in the so-called
framework of high-frequency observations.
Remark: Proposition 3 extends [FL09] to a multivariate model with a complex structure due
to the use of hyperbolic wavelets, instead of isotropic ones. Yet, the extension is not so straightforward, so we give a detailed proof in Section 7.
4. Wavelet pyramid model selection
The upper-bound (9) for the risk on one pyramidal model suggests that a good model should
be large enough so that the approximation error is small, and small enough so that the estimation
error is small. Without prior knowledge on the function s to estimate, choosing the best pyramidal
model is thus impossible. In this section, we describe a data-driven procedure that selects the best
pyramidal model from the data, without using any smoothness assumption on s. We provide
theoretical results that guarantee the performance of such a procedure. We underline how these
properties are linked with the structure of the collection of models.
4.1. Penalized pyramid selection. When M is observed, we deduce from (8) that
X
E ks − š?m k2Ψ − ksk2Ψ = −ks?m k2Ψ +
Var(β̌λ )
λ∈m
that γ(š?m )
P
+
−kš?m k2Ψ .
=
Following the work of [BBM99], we introduce a penalty
and from (7)
function pen : M → R and choose a best pyramidal model from the data defined as
m̂P = argmin (γ̂(ŝ?m ) + pen(m)).
m∈MP
In order to choose the pyramidal model with smallest quadratic risk, the penalty pen(m) is expected to behave roughly as the estimation error within model m. We provide such a penalty in
the following Section. Our final estimator for s is then
s̃P = ŝ?m̂P .
4.2. Combinatorial complexity and choice of the penalty function. As widely examplified
in [Mas07, BGH09] for instance, the choice of an adequate penalty depends on the combinatorial
complexity of the collection of models, which is measured through the index
log ]MP
`1
,
(10)
max
dj0 +1≤`1 ≤L• +1
D(`1 )
where D(`1 ) is the common dimension of all pyramidal models in MP
`1 . Ideally, this index should
be upper-bounded independently of the sample size for the resulting model selection procedure
to reach the optimal estimation rate. The following proposition describes the combinatorial complexity of the collection of pyramidal models.
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
11
Proposition 4. Let M = 2+B/2j0 −1 . For all `1 ∈ {dj0 +1, . . . , L• +1} and all k ∈ {0, . . . , L• −`1 },
let
N (`1 , k) = b2]U ∇(`1 + k)(k + 2)−(d+2) 2−k M −d c
(11)
and D(`1 ) be the common dimension of all models in MP
`1 . There exists positive reals κ1 (d),
κ2 (j0 , B, d) and κ3 (j0 , B, d) such that
κ1 (d)(`1 − dj0 + d − 2)d−1 2`1 ≤ D(`1 ) ≤ κ2 (j0 , B, d)(`1 − dj0 + d − 2)d−1 2`1
and
log ]MP
`1 ≤ κ3 (j0 , B, d)D(`1 ).
We remind that B is defined in Section 3.1(Assumption S.ii)). Possible values for κ1 , κ2 and κ3
are given in the proof, which is postponed
to Section 7.3. In the same way, we could prove a
matching lower-bound for log ]MP
for
large
enough `1 , so that the whole family MP contains
`1
d−1 L•
of order of L• 2 models. Typically, we will choose L• such that 2L• is a power of the sample
size n̄. So while MP contains at least an exponential number of models, the number of models
per dimension is moderate enough so that the combinatorial index (10) bounded.
From now on, we assume that (11) is satisfied, as well as the following hypotheses. For all
?
, let
subfamily T of Sm
•
!
Z X
Z(T ) = sup
ht, Ψλ iΨλ dM − hs, tiΨ .
t∈T
Q λ∈m
•
Assumption
(Conc). There exist positive reals n̄, κ01 , κ02 , κ03 such that, for all countable subfamily
?
T of t ∈ Sm• |ktkΨ = 1 satisfying
sup
t∈T
X
ht, Ψλ iΨλ
λ∈m•
≤ B(T )
∞
for some positive constant B(T ), we have, for all x > 0,
r
x
x
P Z(T ) ≥ κ01 E [Z(T )] + κ02 ksk∞ + κ03 B(T )
≤ exp(−x).
n̄
n̄
Assumption (Var). There exist a nonnegative constant κ04 and a collection of estimators
(σ̂λ2 )λ∈m• such that, for all λ ∈ m• ,
E σ̂λ2 ≤ κ04 max(ksk∞ , 1).
Besides there exist a nonnegative constant κ05 , a nonnegative function w such that w(n̄)/n̄ −−−−→ 0,
n̄→∞
and a measurable event Ωσ on which, for all λ ∈ m• ,
Var(β̌λ ) ≤ κ05
max{σ̂λ2 , 1}
n̄
and such that
pσ := P(Ωcσ ) ≤
w(n̄)
.
n̄
Assumption (Rem). For the same function w as in Assumption (Var) and some nonnegative
constant κ06 ,
ksk∞ Dm
w(n̄)
E kš?m − ŝ?m k2Ψ ≤ κ06
+
, for all m ⊂ m• ,
n̄
n̄
and
q
q
1
w(n̄)
? − ŝ? k4 ,
? − ŝ? k4
max
E
kš
p
E
kš
≤
.
σ
m•
m• Ψ
m•
m• Ψ
(d+1)/2
n̄
n̄(log(n̄)/d)
12
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
Assumption (Conc) describes how the random measure M concentrates around the
measure to
estimate. Assumption (Var) ensures that we can estimate the variance terms E ks?m − š?m k2Ψ
c is to M.
over each m ∈ MP . Last, Assumption (Rem) describes how close M
Theorem 1. Assume that (11), Assumptions (Conc), (Var),(Rem) are satisfied, and that
max(ksk∞ , 1) ≤ R̄. Choose L• such that
n̄
2L• ≤
2d
((log n̄)/d)
and a penalty of the form
pen(m) =
X c1 σ̂ 2 + c2 R̄
λ
, m ∈ MP .
n̄
λ∈m
If c1 , c2 are positive and large enough, then
max ksk2Ψ , ksk∞ , 1
R̄Dm
−3(d+1)/2
P 2
? 2
1 + (log(n̄)/d)
+ w(n̄)
+C2
E ks − s̃ kΨ ≤ C1 min ks − sm kΨ +
n̄
n̄
m∈MP
where C1 may depend on κ01 , κ02 , κ04 , κ05 , κ06 , c1 , c2 and C2 may depend κ01 , κ02 , κ03 , κ07 , j0 , d.
In practice, the penalty constants c1 and c2 are calibrated by simulation study. We may also
replace R̄ in the penalty by max{kŝ?m• k∞ , 1}, and extend Theorem 1 to a random R̄ by using
arguments similar to [AL11].
?
4.3. Back to the examples. First, two general remarks are in order. For t ∈ Sm
, let ft =
•
P
?
λ∈m• ht, Ψλ iΨλ , then kft k = ktkΨ and by (3), for all countable subfamily T of Sm• ,
Z
Z
Z(T ) = sup
ft dM − E
ft dM
.
t∈T
Q
Q
So Assumption (Conc) usually proceeds from a Talagrand type concentration inequality. Besides,
we have seen in Section 3.5 that in general
ksk∞
.
λ∈m•
n̄
Thus, whenever some upper-bound R∞ for ksk∞ is known, Assumption (Var) is satisfied with
σ̂λ2 = R∞ for all λ ∈ m• , Ωσ = Ω, w(n̄) = 0, κ04 = κ05 = 1. One may also estimate each variance
term: this is what we propose in the following results, proved in Section 7.5.
max Var(β̌λ ) ≤
Corollary 1. In the density estimation framework (see 2.2.1), let R̄ ≥ max(ksk∞ , 1), 2L• =
−2d
n((log n)/d) ,
n
σ̂λ2 =
i−1
XX
1
2
(Ψλ (Yi ) − Ψλ (Yj )) for all λ ∈ m• ,
n(n − 1) i=2 j=1
and
pen(m) =
X c1 σ̂ 2 + c2 R̄
λ
, for all m ∈ MP .
n
λ∈m
If c1 , c2 are positive and large enough, then
max ksk2Ψ , R̄
R̄Dm
E ks − s̃P k2Ψ ≤ C1 min ks − s?m k2Ψ +
+ C2
n
n
m∈MP
where C1 may depend on κ, d, c1 , c2 and C2 may depend κ, j0 , d.
Corollary 2. In the copula density estimation framework (see 2.2.2), let R̄ ≥ max(ksk∞ , 1) and
−2d
2L• = min{n1/8 (log n)−1/4 , n((log n)/d) }. For all λ ∈ m• , define
σ̂λ2 =
n X
i−1
2
X
1
Ψλ F̂n1 (Xi1 ), . . . , F̂nd (Xid ) − Ψλ F̂n1 (Xj1 ), . . . , F̂nd (Xjd )
,
n(n − 1) i=2 j=1
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
13
and for all m ∈ MP , let
pen(m) =
X c1 σ̂ 2 + c2 R̄
λ
.
n
λ∈m
Under Assumption (L), and if c1 , c2 are positive and large enough, then
(log n)d−1
R̄Dm
P 2
? 2
√
+ C2 max ksk2Ψ , R̄
E ks − s̃ kΨ ≤ C1 min ks − sm kΨ +
n
n
m∈MP
where C1 may depend on κ, d, c1 , c2 and C2 may depend κ, j0 , d.
Corollary 3. In the Poisson intensity estimation framework (see 2.2.3), let R̄ ≥ max(ksk∞ , 1),
−2d
2L• = Vold (Q)((log Vold (Q))/d) ,
Z
1
2
Ψ2 dN, for all λ ∈ m• ,
σ̂λ =
Vold (Q) Q λ
and
pen(m) =
X c1 σ̂ 2 + c2 R̄
λ
, for all m ∈ MP .
Vold (Q)
λ∈m
If c1 , c2 are positive and large enough, then
max ksk2Ψ , R̄
R̄Dm
P 2
? 2
E ks − s̃ kΨ ≤ C1 min ks − sm kΨ +
+ C2
Vold (Q)
Vold (Q)
m∈MP
where C1 may depend on κ, d, c1 , c2 and C2 may depend κ, j0 , d.
Corollary 4. In the Lévy jump intensity estimation framework with continuous time observations
−2d
(see 2.2.4), let R̄ ≥ max(ksk∞ , 1), 2L• = T ((log T )/d) ,
ZZ
1
σ̂λ2 =
Ψ2λ (x)N (dt, dx), for all λ ∈ m• ,
T
[0,T ]×Q
and
pen(m) =
X c1 σ̂ 2 + c2 R̄
λ
, for all m ∈ MP .
T
λ∈m
If c1 , c2 are positive and large enough, then
max ksk2Ψ , R̄
R̄Dm
P 2
? 2
E ks − s̃ kΨ ≤ C1 min ks − sm kΨ +
+ C2
T
T
m∈MP
where C1 may depend on κ, d, c1 , c2 and C2 may depend κ, j0 , d.
Corollary 5. In the Lévy jump intensity estimation
framework with discrete
o time observations
n
−2d
(see 2.2.5), let R̄ ≥ max(ksk∞ , 1), 2L• = min (n∆)1/4 , n∆(log(n∆)/d)
,
n
σ̂λ2 =
1 X 2
Ψλ Xi∆ − X(i−1)∆ , for all λ ∈ m• ,
n∆ i=1
and
pen(m) =
X c1 σ̂ 2 + c2 R̄
λ
, for all m ∈ MP .
n∆
λ∈m
2
If Assumption (L) is satisfied, if n∆ stays bounded while n∆ → ∞ as n → ∞, and if c1 , c2 are
positive and large enough, then
R̄Dm
logd−1 (n∆)
E ks − s̃P k2Ψ ≤ C1 min ks − s?m k2Ψ +
+ C2 max ksk2Ψ , R̄
T
n∆
m∈MP
where C1 may depend on κ, d, c1 , c2 and C2 may depend κ, j0 , d, Q, f.
Corollaries 3, 4, 5 extend respectively the works of [RB03, FLH09, UK11] to a multivariate framework, with a complex family of models allowing for nonhomogeneous smoothness, and a more
refined penalty.
14
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
5. Adaptivity to mixed smoothness
There remains to compare the performance of our procedure s̃P to that of other estimators.
For that purpose, we derive the estimation rate of s̃P under smoothness assumptions that induce
sparsity on the hyperbolic wavelet coefficients of s. We then compare it to the minimax rate.
5.1. Function spaces with dominating mixed smoothness. For α ∈ N? and 1 ≤ p ≤ ∞, the
mixed Sobolev space with smoothness α measured in the Lp −norm is defined as
r1 +...+rd
X
∂
f
α
α
<
∞
,
= f ∈ Lp ([0, 1]d ) kf kSWp,(d)
:=
SWp,(d)
∂ r1 x 1 . . . ∂ rd x d p
0≤r1 ,...,rd ≤α
while the classical Sobolev space is
α
α
:=
Wp,(d)
= f ∈ Lp ([0, 1]d ) kf kWp,(d)
X
0≤r1 +...+rd ≤α
r1 +...+rd
∂
f
∂ r1 x 1 . . . ∂ rd x d
<∞
p
.
The former contains functions whose highest order derivative is the mixed derivative ∂ dα f /∂ α x1 . . . ∂ α xd ,
while the latter contains all derivatives up to global order dα. Both spaces coincide in dimension
d = 1, and otherwise we have the obvious continuous embeddings
(12)
dα
α
α
Wp,(d)
,→ SWp,(d)
,→ Wp,(d)
.
Hölder and Besov spaces with mixed dominating smoothness may be defined thanks to mixed
differences. For f : [0, 1] → R, x ∈ [0, 1] and h > 0,
∆0h (f, x) = f (x),
∆1h (f, x) = f (x + h) − f (x)
and more generally, for r ∈ N? , the r-th order univariate difference operator is
∆rh = ∆1h ◦ ∆hr−1 ,
so that
(13)
∆rh (f, x)
=
r
X
r
k=0
k
(−1)r−k f (x + kh).
Then for t > 0 the univariate modulus of continuity of order r in Lp is defined as
wr (f, t)p = sup k∆rh (f, .)kp .
0<h<t
For f : [0, 1]d → R, x = (x1 , . . . , xd ) ∈ [0, 1]d , r ∈ N? and h` > 0, we denote by ∆rh` ,` the univariate
difference operator applied to the `-th coordinate while keeping the other ones fixed, so that
r
X
r
r
∆h` ,` (f, x) =
(−1)r−k f (x1 , . . . , x` + kh` , . . . , xd ).
k
k=0
For any subset e of {1, . . . , d} and h = (h1 , . . . , hd ) ∈ (0, +∞)d , the r-th order mixed difference
operator is given by
Y
∆r,e
∆rh` ,` .
h :=
`∈e
For t = (t1 , . . . , td ) ∈ (0, +∞)d , we set te = (t` )`∈e , and define the mixed modulus of continuity
wre (f, te )p =
sup
0<h` <t` ,`∈e
k∆r,e
h (f, .)kp .
α
For α > 0 and 0 < p ≤ ∞, the mixed Hölder space SHp,(d)
is the space of all functions f : [0, 1]d →
R such that
X
Y
e
α
kf kSHp,(d)
:=
t−α
sup
` wbαc+1 (f, te )p
e⊂{1,...,d}
t>0
`∈e
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
15
is finite, where by convention the term associated with e = ∅ is kf kp . More generally, for α > 0
α
and 0 < p, q ≤ ∞, the mixed Besov space SBp,q,(d)
is the space of all functions f : [0, 1]d → R
such that
!1/q
!q
Z
Z
X
Y
Y dt`
−α
e
α
kf kSBp,q,(d)
:=
,
...
t` wbαc+1 (f, te )p
t`
(0,1)
(0,1)
`∈e
e⊂{1,...,d}
`∈e
α
α
where the Lq -norm is replaced by a sup-norm in case q = ∞, so that SBp,∞,(d)
= SHp,(d)
. By
α
comparison, the usual Besov space Bp,q,(d) may be defined as the space of all functions f ∈
Lp ([0, 1]d ) such that
1/q
q
Pd R
{`}
`
if 0 < q < ∞
kf kp + `=1 (0,1) t−α
wbαc+1 (f, t` )p dt
`
t`
α
kf kBp,q,(d)
:=
kf k + Pd sup
−α {`}
t w
(f, t )
if q = ∞
p
`=1
t` >0 `
bαc+1
` p
is finite. Extending (12), the recent results of [NS16a] confirm that the continuous embeddings
dα
α
α
Bp,q,(d)
,→ SBp,q,(d)
,→ Bp,q,(d)
,
hold under fairly general assumptions on α, p, q, d..
On the other hand, given α > 0, 0 < p < ∞, 0 < q ≤ ∞, we define
P
q/p 1/q
P
P
q`(α+1/2−1/p)
p
2
|hf,
Ψ
i|
λ
j∈J`
`≥dj0
λ∈∇j
NΨ,α,p,q (f ) =
P
1/p
p
sup`≥dj 2`(α+1/2−1/p) supj∈J
|hf,
Ψ
i|
λ
λ∈∇j
0
`
if 0 < q < ∞
if q = ∞
and NΨ,α,∞,q in the same way by replacing the `p -norm with a sup-norm. Then for α > 0, 0 <
p, q ≤ ∞, R > 0, we denote by SB(α, p, q, R) the set of all functions f ∈ Lp ([0, 1]d ) such that
NΨ,α,p,q (f ) ≤ R.
Under appropriate conditions on the smoothness of Ψ? , that we will assume to be satisfied in
the sequel, the sets SB(α, p, q, R) may be interpreted as balls with radius R in Besov spaces with
α
dominating mixed smoothness SBp,q,(d)
(see for instance [ST87, Hoc02a, Hep04, DTU16]). Mixed
Sobolev spaces are not easily characterized in terms of wavelet coefficients, but they satisfy the
compact embeddings
α
α
α
SBp,min(p,2),(d)
,→ SWp,(d)
,→ SBp,max(p,2),(d)
, for 1 < p < ∞
and
α
α
α
SB1,1,(d)
,→ SW1,(d)
,→ SB1,∞,(d)
(see [DTU16], Section 3.3). So, without loss of generality, we shall mostly turn our attention to
Besov-Hölder spaces in the sequel.
5.2. Link with structural assumptions. The following property collects examples of composite
functions with mixed dominating smoothness built from lower dimensional functions with classical
Sobolev or Besov smoothness. The proof and upper-bounds for the norms of the composite
functions are given in Section 7.6. An analogous property for (mixed) Sobolev smoothness instead
of (mixed) Besov smoothness can be proved straightforwardly.
Proposition 5. Let α > 0 and 0 < p, q ≤ ∞.
Pd
α
α
, then f (x) = `=1 u` (x` ) ∈ SBp,q,(d)
.
(i) If u1 , . . . , ud ∈ Bp,q,(1)
αI
(ii) Let P be some partition of {1, . . . , d}. If, for all I ∈ P, uI ∈ Bp,q,(|I|)
, then f (x) =
Q
ᾱ
u
(x
)
∈
SB
where
ᾱ
=
min
(α
/|I|).
I
I
I∈P
I
I∈P
p,q,(d)
dα
α
(iii) Let α ∈ N? and p > 1, if g ∈ W∞,(1)
and u` ∈ Wp,1
for ` = 1, . . . , d, then f (x) =
P
d
α
g
`=1 u` (x` ) ∈ SWp,(d) .
α
(iv) If f ∈ SBp,q,(d)
with α > 1 and ∂ d f /∂x1 . . . ∂xd ∈ Lp ([0, 1]d ), then ∂ d f /∂x1 . . . ∂xd ∈
α−1
SBp,q,(d)
.
16
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
α
(v) If f1 and f2 ∈ SBp,p,(d)
where either 1 < p ≤ ∞ and α > 1/p, or p = 1 and α ≥ 1, then the
α
product function x 7→ f1 (x)f2 (x) ∈ SBp,p,(d)
.
Notice that in (i) (resp. (ii), (iii)), the assumptions on the component functions u` , uI or g are
dα
dᾱ
dα
not enough to ensure that f ∈ Bp,q,(d)
(resp. Bp,q,(d)
, Wp,(d)
).
Remark: We believe that a generalization of (iii) to Besov or fractional Sobolev smoothness holds.
Yet such a generalization would require refined arguments from Approximation Theory in the spirit
of [BS11, Mou11] which are beyond the scope of that paper.
The structural assumption (ii) may be satisfied in the multivariate density estimation framework 2.2.1 whenever Y1 = (Y11 , . . . , Y1d ) can be split into independent sub-groups of coordinates,
and has recently been considered in [Lep13, Reb15b, Reb15a]. Case (i) and its generalization
(iii) may not be directly of use in our multivariate intensity framework, but they will allow to
draw a comparison with [HM07, BB14]. Combining (iii) and (iv) is of interest for copula density
estimation 2.2.2, having in mind that a wide nonparametric family of copulas are Archimedean
copulas (see [Nel06], Chapter 4), which have densities of the form
s(x1 , . . . , xd ) = (φ−1 )0 (x1 ) . . . (φ−1 )0 (xd )φ(d) φ−1 (x1 ) + . . . + φ−1 (xd )
provided the generator φ is smooth enough (see for instance [MN09]). Combining (iii), (iv), (v)
may be of interest for Lévy intensity estimation in 2.2.4 or 2.2.5. Indeed, a popular way to build
multivariate Lévy intensities is based on Lévy copulas studied in [KT06] (see also [CT04], Chapter
5). The resulting Lévy intensities then have the form
f (x1 , . . . , xd ) = f1 (x1 ) . . . fd (xd )F (1,...,1) (U1 (x1 ) + . . . + Ud (xd ))
R∞
where F is a so-called Lévy copula, F (1,...,1) = ∂ d F/∂t1 . . . ∂td and U` (x` ) = x` f` (t)dt. Besides,
a common form for F is
F (x) = φ φ−1 (x1 ) + . . . + φ−1 (xd )
under appropriate smoothness assumptions on φ. Last, let us emphasize that any linear combinaα
tion (mixtures for instance) of functions in SBp,q,(d)
inherits the same smoothness. Consequently,
mixed dominating smoothness may be thought as a fully nonparametric surrogate for a wide range
of structural assumptions.
5.3. Approximation qualities and minimax rate. We provide in Section 7.7 a constructive
proof for the following nonlinear approximation result, in the spirit of [BBM99].
Theorem 2. Let R > 0, 0 < p < ∞, 0 < q ≤ ∞, α > max(1/p − 1/2, 0), and f ∈ L2 ([0, 1]d ) ∩
SB(α, p, q, R). Under (11), for all `1 ∈ {dj0 +1, . . . , L• +1}, there exists some model m`1 (f ) ∈ MP
`1
?
and some approximation A(f, `1 ) ∈ Sm
for f such that
` (f )
1
kf − A(f, `1 )k2Ψ
2(d−1)(1/2−1/q)+ −2L• (α−(1/p−1/2)+ )
2(d−1)(1/2−1/ max(p,q)) −2α`1
≤ C(B, j0 , α, p, d)R2 L•
2
+ `1
2
.
Remark: When p ≥ 2, the same kind of result still holds with all N (`1 , k) = 0. But Assumption (11)
is really useful when p < 2, the so-called non-homogeneous smoothness case.
The first term in the upper-bound is a linear approximation error by the highest dimensional model
?
Sm
in the collection. As Dm• is of order Ld−1
2L• , we deduce from [DTU16] (Section 4.3) that this
•
•
α
first term is optimal over SBp,q , at least for 1 < p < ∞, 1 ≤ q ≤ ∞ and α > max(1/p − 1/2, 0), for
instance. The second term in the upper-bound is a nonlinear approximation error of f within the
?
model Sm
, with dimension Dm`1 (f ) of order `1d−1 2`1 . So we deduce from [DTU16] (Theorem
` (f )
1
−2α
7.6) that this second term, which is of order Dm
(log Dm`1 (f ) )2(d−1)(α+1/2−1/q) , is also optimal
`1 (f )
α
up to a constant factor over SBp,q , at least for 1 < p < ∞, p ≤ q ≤ ∞ and α > max(1/p − 1/2, 0).
α
Notice that, under the classical Besov smoothness assumption f ∈ L2 ([0, 1]d ) ∩ Bp,q,(d)
, the best
possible approximation rate for f by D-dimensional linear subspaces in the L2 -norm would be
of order D−2α/d . Thus with a mixed smoothness of order α in dimension d, we recover the same
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
17
approximation rate as with a classical smoothness of order dα in dimension d, up to a logarithmic
factor.
Let us define, for α, p, q, R, R0 > 0,
SB(α, p, q, R, R0 ) = {f ∈ SB(α, p, q, R)/kf k∞ ≤ R0 }.
In the sequel, we use the notation a C(θ)b when there exist positive reals C1 (θ), C2 (θ) such that
C1 (θ)b ≤ a ≤ C2 (θ)b.
Corollary 6. Assume L• is large enough, then for all 0 < p < ∞, 0 < q ≤ ∞, α > (1/p −
1/2)+ , R ≥ n̄−1 , R0 > 0,
2/(1+2α)
(d−1)(α+1/2−1/ max(p,q))
Es ks − s̃P k2Ψ ≤ C(B, d, α, p, R0 ) log(n̄R2 )
sup
Rn̄−α
.
s∈SB(α,p,q,R,R0 )
Proof. In order to minimize approximately the upper-bound, we choose `1 such that
2(d−1)(1/2−1/ max(p,q)) −2α`1
`1
2
R2 C(α, p, q, d)`1d−1 2`1 /n̄,
that is for instance
2`1 C(α, p, q, d)
1/(1+2α)
−2(d−1)/ max(p,q)
,
log(n̄R2 )
(n̄R2 )
which yields the announced upper-bound.
Remember that a similar result holds when replacing the Ψ-norm by the equivalent L2 -norm.
Though unusual, the upper-bound in Corollary 6 is indeed related to the minimax rate.
Proposition 6. In the density estimation framework, assume R2 ≥ n−1 , R0 > 0, p > 0, 0 < q ≤
∞, and either α > (1/p − 1/2)+ and q ≥ 2 or α > (1/p − 1/2)+ + 1/ min(p, q, 2) − 1/ min(p, 2),
then
2/(1+2α)
(d−1)(α+1/2−1/q)
inf
sup
Rn−α
Es ks − ŝk2 C(α, p, q, d) log(nR2 )
.
ŝ estimator of s
s∈SB(α,p,q,R,R0 )
Proof. One may derive from [DTU16] (Theorem 6.20), [Dun01] (proof of Theorem 1) and the link
between entropy number and Kolmogorov entropy that the Kolmogorov -entropy of SB(α, p, q, R)
is
(d−1)(α+1/2−1/q)/α
H (α, p, q, R) = (R/)1/α (log(R/))
.
According to [YB99] (Proposition 1), in the density estimation framework, the minimax risk over
SB(α, p, q, R, R0 ) is of order ρ2n where ρ2n = Hρn (α, p, q, R)/n, which yields the announced rate.
Consequently, in the density estimation framework, the penalized pyramid selection procedure is
minimax over SB(α, p, q, R) up to a constant factor if p ≤ q ≤ ∞, and only up to a logarithmic
factor otherwise.
Let us end with some comments about these estimation rates. First, we remind that the minα
imax rate under the assumption s ∈ Bp,q,(d)
is of order n−2α/d/(1+2α/d) . Thus, under a mixed
smoothness assumption of order α, we recover, up to a logarithmic factor, the same rate as with
smoothness of order α in dimension 1, which can only be obtained with smoothness of order dα
under a classical smoothness assumption in dimension d. Besides, under the multiplicative constraint (ii) of Proposition 5, we recover the same rate as [Reb15a], up to a logarithmic factor. And
under the generalized additive constraint (iii) of Proposition 5, we recover the same rate as [BB14]
(Section 4.3), up to a logarithmic factor. Regarding Neumann seminal work on estimation under
mixed smoothness [Neu00] (see his Section 3), a first adaptive wavelet thresholding is proved to
r
r
be optimal up to a logarithmic factor over SW2,(d)
= SB2,2,(d)
, and another, nonadaptive one, is
r
proved to be optimal up to a constant over SB1,∞,(d) , where r is a positive integer. Our procedure thus outperforms [Neu00] by being at the same time adaptive and minimax optimal up to a
constant over these two classes, and many other ones.
18
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
6. Implementing wavelet pyramid selection
We end this paper with a quick overview of practical issues related to wavelet pyramid selection.
As we perform selection within a large collection of models, where typically the number of models
is exponential in the sample size, we must guarantee that the estimator can still be computed in
a reasonable time. Besides, we provide simulation based examples illustrating the interest of this
new method.
6.1. Algorithm and computational complexity. Theorem 1 supports the choice of an additive
penalty of the form
X
pen(m) =
v̂λ2 ,
λ∈m
where detailed expressions for v̂λ2 in several statistical frameworks have been given in Section 4.3.
P
As γ̂(ŝ?m ) = − λ∈m β̂λ2 , the penalized selection procedure amounts to choose
m̂P = argmax crit(m)
m∈MP
where
X
crit(m) =
(β̂λ2 − v̂λ2 ).
λ∈m
v̂λ2
Since each
is roughly an (over)estimate for the variance of β̂λ2 , our method, though different
from a thresholding procedure, will mainly retain empirical wavelet coefficients β̂λ2 which are
significantly larger than their variance.
A remarkable thing is that, due to both the structure of the collection of models and of the
penalty function, the penalized estimator can be determined without computing all the preliminary
estimators (ŝ?m )m∈MP , which makes the computation of s̃P feasible in practice. Indeed, we can
proceed as follows.
Step 1. For each `1 ∈ {dj0 + 1, . . . , L• + 1}, determine
X
m̂`1 = argmax
(β̂λ2 − v̂λ2 ).
m∈MP
`1 λ∈m
For that purpose, it is enough, for each k ∈ {0, . . . , L• − `1 }, to
• compute and sort in decreasing order all the coefficients (β̂λ2 − v̂λ2 )λ∈U ∇(`1 +k) ;
• keep the N (`1 , k) indices in U ∇(`1 + k) that yield the N (`1 , k) greatest such coefficients.
Step 2. Determine the integer `ˆ ∈ {dj0 + 1, . . . , L• + 1} such that
m̂`ˆ =
argmax
crit(m̂`1 ).
dj0 +1≤`1 ≤L• +1
The global computational complexity of s̃P is thus O(log(L• )Ld• 2L• ). Typically, we will choose
L• at most of order log2 (n̄) so the resulting computational complexity will be at most of order
O(log(log(n̄)) logd (n̄)n̄).
6.2. Illustrative examples. In this section, we study two examples in dimension d = 2 by using
Haar wavelets.
First, in the density estimation framework, we consider an example where the coordinates of
Yi = (Yi1 , Yi2 ) are independent conditionally on a K-way categorical variable Z, so that the density
of Yi may be written as
K
X
s(x1 , x2 ) =
πk s1,k (x1 )s2,k (x2 ),
k=1
where π = (π1 , . . . , πK ) is the probability vector characterizing the distribution of Z. For a compact
interval I, and a, b > 0, let us denote by β(I; a, b) the Beta density with parameters a, b shifted
and rescaled to have support I, and by U(I) the uniform density on I. In our example, we take
• K = 4 and π = (3/5, 1/10, 1/40, 11/40) ;
• s1,1 = β ([0, 3/5]; 4, 4) and s2,1 = β ([0, 2/5]; 4, 4) ;
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
19
• s1,2 = β ([2/5, 1]; 100, 100) and s2,2 = β ([2/5, 1]; 20, 20) ;
• s1,3 = U ([0, 1]) and s2,3 = U ([0, 1]) ;
• s1,4 = β ([3/5, 1]; 8, 4) and s2,4 = U ([2/5, 1]) .
The resulting mixture density s of Yi is shown in Figure 1 (b). We choose L• = n/((log n)/2)2
and first compute the least-squares estimator ŝ?• of s on the model VL?• /2 ⊗ . . . ⊗ VL?• /2 , which
provides the estimator R̂ = max{kŝ?• k, 1} for R̄. We then use the penalty
pen(m) =
X 1.5σ̂ 2 + 0.5R̂
λ
.
n
λ∈m
For a sample with size n = 2000, Figure 1 illustrates how the procedure first selects a rough model
m̂`ˆ (Figure 1 (c)) and then add some details wherever needed (Figure 1 (d)). Summing up the two
yields the pyramid selection estimator s̃P (Figure 1 (e)). By way of comparison, we also represent
in Figure 1 (f) a widely used estimator: the bivariate Gaussian kernel estimator, with the "known
support" option, implemented in MATLAB ksdensity function. We observe that, contrary to the
kernel density estimator, the pyramid selection estimator recovers indeed the main three modes,
and in particular the sharp peak.
Figure 1. Pyramid selection and standard kernel for an example of mixture of
multiplicative densities.
In the copula density estimation framework, we consider an example where the copula of Xi =
(Xi1 , Xi2 ) is either a Frank copula or a Clayton copula conditionally to a binary variable Z. More
precisely, we consider the mixture copula
s(x1 , x2 ) = 0.5sF (x1 , x2 ) + 0.5sC (x1 , x2 )
where sF is the density of a Frank copula with parameter 4 and sC is the density of a Clayton copula
with parameter 2. These two examples of Archimedean copula densities are shown in Figure 2
and the resulting mixture in Figure 3 (b). We use the same penalty as in the previous example,
adapted of course to the copula density estimation framework. We illustrate in Figure 3 the
pyramid selection procedure on a sample with size n = 2000. Though not all theoretical conditions
are fully satisfied here, the pyramid selection procedure still provides a reliable estimator.
As a conclusion, those examples suggest that the Haar pyramid selection already provides a
useful new estimation procedure. This is most encouraging for pyramid selection based on higher
order wavelets, whose full calibration based on an extensive simulation study in each framework
will be the subject of another work.
20
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
Figure 2. Left: Frank copula density with parameter 4; Right: Clayton copula
density with parameter 2.
Figure 3. Pyramid selection for an example of mixture copula density.
7. Proofs
We shall use repeatedly the classical inequality
(14)
1
2ab ≤ θa2 + b2
θ
for all positive θ, a, b.
7.1. Proof of Proposition 2. We only have to prove 2 for m• . Indeed, as any pyramidal model
m is a subset of m• , a common upper-bound for the residual terms is
kš?m − ŝ?m k2 ≤ kš?m• − ŝ?m• k2 .
Under Assumption (L), and thanks to assumptions S.iii) and W.v), we have that for all λ ∈ m• ,
x = (x1 , . . . , xd ) and y = (y1 , . . . , yd ) ∈ Q,
|Ψλ (x) − Ψλ (y)| ≤ κd 23L• /2
d
X
|xk − yk |.
k=1
According to Massart’s version of Dworetzky-Kiefer-Wolfowitz inequality (see [Mas90]), for any
√
positive z, and 1 ≤ k ≤ d, there exists some event Ωk (z) on which kF̂nk − Fk k∞ ≤ z/ n and such
c
2
d
that P(Ωk (z)) ≤ 2 exp(−2z ). Setting Ω(z) = ∩k=1 Ωk (z), we thus have for all λ ∈ m•
√
|β̌λ − βbλ | ≤ κd 23L• /2 d(z/ n)1IΩ(z) + κd 23L• /2 d1IΩc (z) ,
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
21
hence
E[kš?m• − ŝ?m• k2 ] ≤ κ2d 23L• d2 (z 2 /n + 2d exp(−2z 2 ))Dm• .
Finally, Dm• is of order Ld−1
2L• (see Proposition 4), so by choosing 2z 2 = log(n),
•
E[kš?m• − ŝ?m• k2 ] ≤ C(κ, d)L•d−1 24L• log(n)/n.
7.2. Proof of RProposition 3. For all bounded measurable function g, let us denote D∆ (g) =
E[g(X∆ )]/∆ − Q gs. For all λ ∈ Λ,
2
D∆ (Ψ2λ )
ksk∞
2
2
(15) E β̌λ − βbλ
≤ 4 Var(β̌λ ) + Var(βbλ ) + D∆
+4
+ 4D∆
(Ψλ ) ≤ 8
(Ψλ ).
n∆
n∆
We shall bound D∆ (Ψλ ) by using the decomposition of a Lévy process into a big jump compound
Poisson process and an independent small jump Lévy process. Let us fix ε > 0 small enough so
Qd
that Q = k=1 [ak , bk ] ⊂ {kxk > ε} and denote by (Σ, µ, ν) the characteristic Lévy triplet of
X = (Xt )t≥0 , where µ stands for the drift and ν is the Lévy measure, with density f with respect
to the Lebesgue measure on Rd (see Section 2.2). Then X is distributed as Xε + X̃ε , where Xε
and X̃ε are independent Lévy processes with following characteristics. First, Xε is a Lévy process
with characteristic Lévy triplet (Σ, µε , ν ), where the drift is
Z
µε = µ −
x f (x)dx.
ε<kxk≤1
and the Lévy measure is
νε (dx) = 1Ikxk≤ε f (x)dx.
ε
The process X̃ is the compound Poisson process
X̃tε
=
Ñt
X
ξi ,
i=1
where Ñ is a homogeneous Poisson process with intensity λε = ν({kxk > ε}), (ξi )i≥1 are i.i.d.
with density λ−1
ε 1Ikxk>ε f (x), and Ñ and (ξi )i≥1 are independent.
Conditioning by Ñ and using the aforementioned independence properties yields
"
!#
j+2
∞
ε
X
X
(λε ∆)j
E[Ψλ (X∆ )]
−λε ∆ E[Ψλ (X∆ )]
−λε ∆
ε
2
−λε ∆
ε
=e
+λε e
E[Ψλ (X∆ +ξ1 )]+λε ∆e
E Ψλ X∆ +
ξi
.
∆
∆
(j + 2)!
j=0
i=1
ε
and ξ1 then yields
Conditioning by ξ1 and using independence between X∆
Z
ε
ε
λε E[Ψλ (X∆
+ ξ1 )] =
E[Ψλ (X∆
+ x)]f (x)dx.
kxk>ε
Writing hΨλ , si = e
−λε ∆
hΨλ , si + (1 − e
(1)
−λε ∆
)hΨλ , si and using (1 − e−λε ∆ ) ≤ λε ∆ leads to
(2)
(3)
(4)
|D∆ (Ψλ )| ≤ R∆ (Ψλ ) + R∆ (Ψλ ) + R∆ (Ψλ ) + R∆ (Ψλ ),
where
(1)
R∆ (Ψλ ) = e−λε ∆
(16)
ε
E[Ψλ (X∆
)]
,
∆
(3)
(2)
R∆ (Ψλ ) = e−λε ∆
R∆ (Ψλ ) = λε ∆kΨλ k1 ksk∞ ,
Z
ε
|E [Ψλ (X∆
+ x) − Ψλ (x)]| f (x)dx,
kxk>ε
(4)
R∆ (Ψλ ) = λ2ε ∆kΨλ k∞ .
As Ψλ has compact support Q,
ε
P(X∆
∈ Q)
.
∆
ε
ε
Let us denote by X∆,k
the k-th coordinate of X∆
and by dQ the maximal distance from [ak , bk ] to
0, for k = 1, . . . , d, reached for instance at k = k0 . We deduce from the proof of Lemma 2 in [RW02]
(see also [FLH09], equation (3.3)) that there exists z0 = z0 (ε) such that if ∆ < dQ /z0 (ε),
(1)
R∆ (Ψλ ) ≤ e−λε ∆ kΨλ k∞
ε
ε
P(X∆
∈ Q) ≤ P(|X∆,k
| ≥ dQ ) ≤ exp ((z0 log(z0 ) + u − u log(u))/(2ε)) ∆dQ /(2ε)
0
22
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
so that
(1)
R∆ (Ψλ ) ≤ C(dQ , ε)e−λε ∆ kΨλ k∞ ∆dQ /(2ε)−1 .
(17)
Under Assumption (L), Ψλ is Lipschitz on Q, so
ε
ε
.
+kΨλ k∞ 1I{X∆ε +x∈Q}∩{x∈Q}
|Ψλ (X∆
+ x) − Ψλ (x)| ≤ kΨλ kL kX∆
k1 1I{X∆ε +x∈Q}∩{x∈Q} +|Ψλ (x)|1I{X∆ε +x∈Q}∩{x∈Q}
/
/
Besides, as Q is compact and bounded away from the origin, there exists δQ and ρQ > 0 such that
ε
ε
{X∆
+ x ∈ Q} ∩ {x ∈ Q} ⊂ {kX∆
k ≥ δQ }
ε
ε
ε
({X∆
+ x ∈ Q} ∩ {x ∈
/ Q}) ∪ ({X∆
+x∈
/ Q} ∩ {x ∈ Q}) ⊂ {kX∆
k ≥ ρQ }
ε
The Lévy measure of X is compactly supported and satisfies
Z
Z
kxk2 νε (dx) =
kxk2 ν(dx)
kxk≤ε
which is finite since ν is a Lévy measure (see for instance [Sat99], Theorem 8.1). So we deduce
from [Mil71], Theorem 2.1, that
ε 2
E kX∆
k ≤ C(d, f )∆,
hence
ε
ε 2
−1
−1
E kX∆
k1 1IkX∆ε k≥δQ ≤ C(d)δQ
E kX∆
k ≤ C(d, f )δQ
∆
and from Markov inequality
ε
P(kX∆
k ≥ ρQ ) ≤ C(d, f )ρ−2
Q ∆.
Finally, fixing 0 < ε < min(dQ /4, inf x∈Q kxk), we have for all 0 < ∆ < min(dQ /z0 (), 1)
(18)
(2)
−1
−2
R∆ (Ψλ ) ≤ C(d, f )e−λε ∆ ∆(δQ
λε kΨλ kL + ρ−2
Q ksk∞ kΨλ k1 + ρQ λε kΨλ k∞ ).
For all λ ∈ m• ,
max(kΨλ kL , kΨλ k∞ , kΨλ k1 ) ≤ C(κ)23L• /2 , max(kΨ2λ kL , kΨ2λ k∞ , kΨ2λ k1 ) ≤ C(κ)22L• ,
so that combining (15), (17), (18) and (16) yields
E[kš?m − ŝ?m k2 ] ≤ 8
24L• n∆3 + 23L• ∆
ksk∞ Dm
+ C(κ, d, f, Q, ε)L•d−1
.
n∆
n∆
7.3. Proof of Proposition 4. Due to hypotheses S.ii) and W.ii), we have for all j ≥ j0 ,
2j−1 ≤ ]∇j ≤ M 2j−1 ,
hence, for all j ∈ Ndj0 ,
(1/2)d 2|j| ≤ ]∇j ≤ (M/2)d 2|j| .
Let us fix ` ∈ {dj0 , . . . , L• }. The number of d-uples j ∈ Ndj0 such that |j| = ` is equal to the
number of partititions of the integer ` − dj0 into d nonnegative integers, hence
d−1
Y
` − dj0 + d − 1
` − dj0
]J` =
=
1+
.
d−1
k
k=1
The last two displays and the classical upper-bound for binomial coefficient (see for instance [Mas07],
Proposition 2.5) yield
(19)
c0 (d)(` − dj0 + d − 1)d−1 2` ≤ ]U ∇(`) ≤ c1 (M, d)(` − dj0 + d − 1)d−1 2` ,
where c0 (d) = 2−d (d − 1)−(d−1) and c1 (M, d) = (M/2)d (e/(d − 1))d−1 .
Let us now fix `1 ∈ {dj0 + 1, . . . , L• + 1}. Any model m ∈ MP
`1 satisfies
Dm =
`X
1 −1
`=dj0
]U ∇(`) +
LX
• −`1
N (`1 , k).
k=0
So we obviously have
Dm ≥ ]U ∇(`1 − 1) ≥ κ1 (d)(`1 − dj0 + d − 2)d−1 2`1 ,
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
23
with κ1 (d) = c0 (d)/2 = 2−(d+1) (d − 1)−(d−1) . Besides, with our choice of N (`1 , k),
`X
1 −1
Dm ≤ c1 (M, d)(`1 − dj0 + d − 2)d−1
2` + 2M −d c1 (M, d)s1 (d)(`1 − dj0 + d − 2)d−1 2`1 ,
`=dj0
so that Proposition 4 holds with κ2 (d, j0 , B) = c1 (M, d)(1 + 2M −d c1 (M, d)s1 (d)), where
∞
X
(1 + k/(d − 1))d−1
s1 (d) =
.
(2 + k)d+2
k=0
MP
`1
The number of subsets of Λ in
satisfies
LY
N (`1 ,k)
LY
−`
• −`1
•
1
e ]U ∇(`1 + k)
]U ∇(`1 + k)
≤
]MP
=
.
`1
N (`1 , k)
N (`1 , k)
k=0
k=0
d+2 k
d
For k ∈ {0, . . . , L• − `1 }, let f (k) = (k + 2) 2 M /2, then N (`1 , k) ≤ ]U ∇(`1 + k)/f (k). As the
function x ∈ [0, U ] 7→ x log(eU/x) is increasing, we deduce
log(]MP
`1 ) ≤ D(`1 )
LX
• −`1
k=0
Setting
s2 =
∞
X
k=0
1
,
(k + 2)3
s3 =
]U ∇(`1 + k) 1 + log(f (k))
.
]U ∇(`1 − 1)
f (k)
∞
X
log(k + 2)
k=0
(k + 2)3
, s4 =
∞
X
k=0
1
,
(k + 2)2
one may take for instance κ3 (j0 , B, d) = (log(e/2) + d log(M ))s2 + (d + 2)s3 + log(2)s4 in Proposition 4.
7.4. Proof of Theorem 1.
7.4.1. Notation and preliminary results. Hyperbolic wavelet bases inherit from the underlying
univariate wavelet bases a localization property which can be stated as follows.
d−1
Lemma 1. Let D(L• ) = (e(L• − dj0 + d − 1)/(d − 1))
2L• /2 , then for all real-valued sequence
(aλ )λ∈m• ,
X
X
aλ Ψ?λ
≤ κ07 max |aλ |D(L• ),
aλ Ψλ
,
max
λ∈m•
λ∈m•
λ∈m•
∞
∞
√
where κ07 = κ2d (2 + 2) for instance.
Proof. For all x = (x1 , . . . , xd ) ∈ [0, 1]d , using assumptions S.vi), S.vii), S.viii), W.iv), W.v), W.vi)
in Section 3.1, we get
L• X Y
d
X
X
X
aλ Ψλ ≤ max |aλ |
|ψλk (xk )|
λ∈m•
λ∈m•
`=dj0 j∈J` k=1
≤ κ2d max |aλ |
λ∈m•
L• X
X
λk ∈∇jk
2`/2 .
`=dj0 j∈J`
d−1
We deduce from the proof of Proposition 4 the upper-bound ]J` ≤ (e(L• − dj0 + d − 1)/(d − 1))
which allows to conclude.
For all t ∈ L2 ([0, 1]d ), we define
X
ν(t) =
ht, Ψλ i(β̌λ − hs, Ψλ i),
νR (t) =
λ∈Λ
X
ht, Ψλ i(β̂λ − β̌λ ),
ν̂(t) = ν(t) + νR (t),
λ∈Λ
and for all m ∈ MP , we set
χ(m) =
sup
? |ktk =1
t∈Sm
Ψ
ν(t),
χR (m) =
sup
? |ktk =1
t∈Sm
Ψ
νR (t).
24
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
P
Lemma 2. For all m ∈ MP , let t?m = λ∈m (ν(Ψ?λ )/χ(m))Ψ?λ , then
sX
χ(m) =
ν 2 (Ψ?λ ) = ks?m − š?m kΨ = ν(t?m ),
λ∈m
χR (m) =
sX
2 (Ψ? ) = kš? − ŝ? k .
νR
m
m Ψ
λ
λ∈m
Proof. The proof follows from the linearity of ν and νR and Cauchy-Schwarz inequality.
Lemma 3. Let = κ02 ksk∞ /(κ03 κ07 D(L• )) and
ΩT = ∩λ∈m• {|ν(Ψ?λ )| ≤ } .
For all x > 0, there exists a measurable event Ωm (x) on which
X max{σ̂ 2 , 1}
x
0
λ
χ2 (m)1IΩT ∩Ωσ ≤ 2κ02
+ 8κ02 ksk∞ .
1 κ5
n̄
n̄
λ∈m
and such that
P(Ωcm (x))
≤ exp(−x).
?
|ktkΨ = 1}. Let us set z =
Proof.
We observe that χ(m) = Z(Tm ) where Tm = {t ∈ Sm
p
?
0
0
|ktkΨ = 1, maxλ∈m |ht, Ψλ i| ≤
κ2 ksk∞ x/n̄ and consider a countable and dense subset Tm of {t ∈ Sm
/z}. Thanks to the localization property in Lemma 1,
p
X
κ0 ksk∞
sup
ht, Ψλ iΨλ
≤ κ03 p2
.
0
x/n̄
t∈Tm
λ∈m•
∞
So Assumption (Conc) ensures that there exists Ωm (x) such that P(Ωcm (x)) ≤ exp(−x) and on
which
r
x
0
0
0
Z(Tm ) ≤ κ1 E [Z(Tm )] + 2 κ02 ksk∞ ,
n̄
hence
x
2
0
0
Z 2 (Tm0 ) ≤ 2κ02
1 E [Z(Tm )] + 8κ2 ksk∞ .
n̄
As Z(Tm0 ) ≤ χ(m), we obtain by convexity and Lemma 2
X
E2 [Z(Tm0 )] ≤ E χ2 (m) =
Var(β̌λ ).
λ∈m
t?m
On ΩT ∩ {χ(m) ≥ z},
given by Lemma 2 satisfies supλ∈m |ht?m , Ψλ i| ≤ /z, so that χ2 (m) =
2
0
Z (Tm ), while on ΩT ∩{χ(m) < z}, χ2 (m) < κ02 ksk∞ x/n̄. The proof then follows from Assumption
(Var).
7.4.2. Proof of Theorem 1. Let us fix m ∈ MP . From the definition of m̂P and of ŝ?m , we get
γ̂(s̃P ) + pen(m̂P ) ≤ γ̂(s?m ) + pen(m).
For all t, u ∈ L2 ([0, 1]d ),
γ̂(t) − γ̂(u) = kt − sk2Ψ − ku − sk2Ψ − 2ν̂(t − u),
so
ks − s̃P k2Ψ ≤ ks − s?m k2Ψ + 2ν̂(s̃P − s?m ) + pen(m) − pen(m̂P ).
Using the triangle inequality and Inequality (14) with θ = 1/4 and θ = 1, we get
2ν̂(s̃P − s?m ) ≤ 2ks̃P − s?m kΨ (χ(m ∪ m̂P ) + χR (m ∪ m̂P ))
1
1
≤ ks − s̃P k2Ψ + ks − s?m k2Ψ + 8χ2 (m ∪ m̂P ) + 8χ2R (m ∪ m̂P ),
2
2
hence
(20)
ks − s̃P k2Ψ ≤ 3ks − s?m k2Ψ + 16χ2 (m ∪ m̂P ) + 2(pen(m) − pen(m̂P )) + 16χ2R (m ∪ m̂P ).
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
25
Let us fix ζ > 0 and set ω = κ3 (j0 , B, d) + log(2) and Ω? (ζ) = ∩m0 ∈MP Ωm∪m0 (ζ + ωDm ). We
deduce from Lemma 3 that on Ω? (ζ)
X max{σ̂ 2 , 1}
ω(Dm + Dm̂P )
ζ
0
λ
+ 8κ02 ksk∞
+ 8κ02 ksk∞ .
(21) χ2 (m ∪ m̂P )1IΩT ∩Ωσ ≤ 2κ02
1 κ5
n̄
n̄
n̄
P
λ∈m∪m̂
Besides, given Proposition 4, our choice of ω leads to
LX
• +1
log(]MP
` )
P(Ωc? (ζ)) ≤ e−ζ
≤ e−ζ .
exp −D(`) ω −
D(`)
`=dj0 +1
Choosing for instance
pen(m) = c1
X σ̂ 2
R̄Dm
λ
+ c2
,
n̄
n̄
λ∈m
0
0
0
with c1 ≥ 16κ02
1 κ5 and c2 ≥ 64κ2 ω + 8κ6 and integrating with respect to ζ > 0, we deduce
from (20), (21), Assumption (Var) and Assumption (Conc) that
w(n̄)
R̄Dm
ksk∞
+ 64κ02
+8
,
E ks − s̃P k2Ψ 1IΩT ∩Ωσ ≤ 3ks − s?m k2Ψ + C
n̄
n̄
n̄
where C may depend on κ01 , κ02 , κ04 , κ05 , κ06 , c1 , c2 .
In order to bound E ks − s̃P k2Ψ 1IΩcT ∪Ωcσ , we first notice that from the triangle inequality and
Lemma 2
(22)
ks − s̃P kΨ ≤ ks − s?m̂P kΨ + ks?m̂P − ŝ?m̂P kΨ
≤ kskΨ + χ(m̂) + χR (m̂),
hence
ks − s̃P k2Ψ ≤ ksk2Ψ + 4χ2 (m• ) + 4χ2R (m• ).
Then setting pT = P(ΩcT ) and pσ = P(Ωcσ ), Cauchy-Schwarz inequality entails
q
p
√
E [χ4 (m• )] + E [χ4R (m• )] .
E ks − s̃P k2Ψ 1IΩcT ∪Ωcσ ≤ 2(pT + pσ )ksk2Ψ + 4 pT + pσ
Let λ ∈ m• , kΨ?λ k∞ ≤ κd 2L• /2 , so applying Assumption (Conc) with T = {Ψ?λ } and T = {−Ψ?λ },
we get
n̄2
n̄
?
P (|ν(Ψλ )| ≥ ) ≤ 2 exp − min
.
,
4κ02 ksk∞ 2κ03 κd 2L• /2
d−1
Then setting ι = (e(L• − dj0 + d − 1)/(d − 1))
pT ≤ 2ι2L• exp −Cksk∞
, Proposition 4 yields
C
n̄
,
≤ 2
ι2 2L•
n̄ (log(n̄)/d)d+1
where C may depend on κ02 , κ03 , κ07 , j0 , d. Besides, we deduce from Assumption (Conc) and Lemma 1
that, for all x > 0,
!
r
r
ksk∞ Dm•
x
x
0
0 0
0
P χ(m• ) ≥ κ1
+ κ2 ksk∞ + κ3 κ7 D(L• )
≤ exp(−x).
n̄
n̄
n̄
For a nonnegative random variable U, Fubini’s inequality implies
Z ∞
4
E[U ] =
4xp−1 P(U ≥ x)dx
0
so
4
E[χ (m• )] ≤ C max
where C may depend on
ι4 22L• ι2 22L•
,
n̄4
n̄2
κ01 , κ02 , κ03 , κ07 , j0 , d.
≤
C
2(d+1)
(log(n̄)/d)
Remembering (22) , we conclude that
R̄Dm
ksk∞
E ks − s̃P k2Ψ ≤ 3ks−s?m k2Ψ +C1
+C2
+C3 max{ksk2Ψ , 1}
n̄
n̄
1
3(d+1)/2
n̄ (log(n̄)/d)
w(n̄)
+
n̄
!
,
26
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
where C1 may depend on κ01 , κ02 , κ04 , κ05 , κ06 , c1 , c2 , C2 may depend on κ02 , C3 may depend κ01 , κ02 , κ03 , κ07 , j0 , d.
7.5. Proofs of Corollaries 1 to 5.
7.5.1. Proof of Corollary 1. Assumption (Conc) is a straightforward consequence of Talagrand’s
inequality, as stated for instance in [Mas07] (Inequality (5.50), and is satisfied, whatever θ > 0,
for
(23)
n̄ = n, κ01 = 1 + θ, κ02 = 2, κ03 = (1/3 + 1/θ)/2.
For all λ ∈ m• , σ̂λ2 is an unbiased estimator for Var(Ψλ (Y1 )). Besides, the existence of Ωσ follows
from Lemma 1 in [RBRTM11] with γ = 2. Thus Assumptions (Var) and (Rem) are satisfied by
taking κ04 = 1, κ05 that only depends on κ and d, κ06 = 0, w(n) = C(κ, j0 , d)/ logd+1 (n).
7.5.2. Proof of Corollary 2. Setting Yi = (F1 (Xi1 ), . . . , Fd (Xid )), i = 1, . . . , n, we recover the
previous density estimation framework, so Assumption (Conc) is still satisfied with (24). Setting
Ŷi = (Fn1 (Xi1 ), . . . , F̂nd (Xid )), i = 1, . . . , n, and
n
σ̌λ2
i−1
XX
1
2
=
(Ψλ (Yi ) − Ψλ (Yj )) ,
n(n − 1) i=2 j=1
we observe that, for all λ ∈ m•
max σ̂λ2 − 4σ̌λ2 , σ̌λ2 − 4σ̂λ2 ≤ 8Rλ (n)
where
Rλ (n) =
n
2
X
1
(i − 1) Ψλ (Ŷi ) − Ψλ (Yi ) .
n(n − 1) i=2
Using the same arguments as in the proof of Proposition 2, we get for all λ ∈ m• and all m ⊂ m•
E [Rλ (n)] ≤ C(κ, d)23L• log(n)/n,
Rλ (n) ≤ C(κ, d)23L• log(n)/n
except on a set with probability smaller than 2d/n,
E kš?m − ŝ?m k2 ≤ C(κ, d, j0 )L•d−1 24L• log(n)/n,
and
q
√
E kš?m• − ŝ?m• k4 ≤ C(κ, d, j0 )L•d−1 24L• / n.
Building on the proof of Corollary 1, we conclude that Assumptions (Var) and (Rem) are satisfied
√
with κ04 , κ05 that only depend on κ, j0 , d, κ06 = 0, and w(n) = n logd−1 (n).
7.5.3. Proof of Corollary 3. Assumption (Conc) is a straightforward consequence of Talagrand’s
inequality for Poisson processes proved by [RB03] (Corollary 2), and is satisfied, whatever θ > 0,
by
n̄ = Vold (Q), κ01 = 1 + θ, κ02 = 12, κ03 = (1.25 + 32/θ).
R
For all λ ∈ m• , σ̂λ2 is an unbiased estimator for Q Ψ2λ s = Vold (Q)Var(β̌λ ). Besides, the existence
of Ωσ follows from Lemma 6.1 in [RBR10]. Thus Assumptions (Var) and (Rem) are satisfied by
taking κ04 = 1, κ05 that only depends on κ and d, κ06 = 0, w(n̄) = C(κ, j0 , d)/ logd+1 (n̄).
(24)
7.5.4. Proof of Corollary 4. The proof is similar to that of Corollary 3 with n̄ = T.
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
27
7.5.5. Proof of Corollary 5. Regarding Assumption (Conc), the proof is similar to that of Corollary 3 with n̄ = n∆. For all λ ∈ m• , let
ZZ
1
2
σ̌λ =
Ψ2λ (x)N (dt, dx).
n∆
[0,n∆]×Q
For any bounded measurable function g on Q, let
Z
Z
Z
c
R(g) =
g(dM − dM ), I(g) =
gdM − E
gdM ,
Q
Q
ˆ =
I(g)
Q
Z
Z
c−E
gdM
Q
c
gdM ,
Q
then
where D∆
ˆ − I(g) + D∆ (g)
R(g) = I(g)
has been defined in the proof of Proposition 3. Notice that
σ̂λ2 − σ̌λ2 = R(Ψ2λ )
and
kŝ?m• − š?m• k2Ψ =
X
R2 (Ψλ ).
λ∈m•
In the course of the proof of Proposition 3, we have shown that, for bounded and Lipschitz
functions g on Q,
|D∆ (g)| ≤ C(λε , ε, f, Q) max {kgk1 , kgk∞ , kgkL } ∆
ˆ
provided ∆ and ε are small enough. Besides, both I(g)
and I(g) satisfy Bernstein inequalities
(Bernstein inequality as stated in [Mas07], Proposition 2.9, for the former, and Bernstein inequality as stated in [RB03], Proposition 7, for the latter). Combining all these arguments yields
Corollary 5.
7.6. Proof of Proposition 5. For α > 0, we set r = bαc + 1.
{`}
(i). From (13), it is easy to see that ∆rh` ,` (f, x) = ∆rh` (u` , x` ). Thus wr (f, t` )p = wr (u` , t` )p
and wre (f, te )p = 0 as soon as e ⊂ {1, . . . , d} contains at least two elements. Therefore,
kf k
α
SBp,q,(d)
≤ C(p)
d
X
α
ku` kBp,q,(1)
.
`=1
(ii). For the sake of readability, we shall detail only two special cases. Let us first deal with the
Qd
α
case f (x) = `=1 u` (x` ) where each u` ∈ Bp,q,(1)
. From (13),
Y
Y
∆r,e
∆rh` (u` , x` )
u` (x` ),
h (f, x) =
`∈e
/
`∈e
so
α
kf kSBp,q,(d)
≤ 2d
d
Y
α
ku` kBp,q,(1)
.
`=1
α1
Let us now assume that d = 3 and that f (x) = u1 (x1 )u2,3 (x2 , x3 ) where u1 ∈ Bp,q,(1)
and
α2
u2,3 ∈ Bp,q,(2) . We set r` = bα` c + 1 for ` = 1, 2, and r̄ = bᾱc + 1, where ᾱ = min(α1 , α2 /2). For
0 < t1 , t2 , t3 < 1, we easily have
kf kp = ku1 kp ku2,3 kp
{1}
t1−ᾱ wr̄ (f, t1 )p ≤ t1−α1 wr1 (u1 , t1 )p ku2,3 kp
{`}
t`−ᾱ wr̄ (f, t` )p ≤ ku1 kp t`−α` wr{`}
(u2,3 , t` )p , for ` = 2, 3
`
{1,`}
ᾱ
t1−ᾱ t−
(f, t1 , t` )p ≤ t1−α1 wr1 (u1 , t1 )p t`−α` wr{`}
(u2,3 , t` )p , for ` = 2, 3.
` wr̄
`
Besides, we deduce from (13) that
k∆r̄h (g, .)kp ≤ C(r̄, p)kgkp ,
and as operators ∆r̄h` ,` commute, we have
{2,3}
ᾱ −ᾱ
t−
2 t3 wr̄
n
o
{2}
{3}
ᾱ −ᾱ
(f, t2 , t3 )p ≤ C(p, r̄)ku1 kp t−
t
min
w
(u
,
t
)
,
w
(u
,
t
)
2,3 2 p
2,3 3 p .
r̄
r̄
2
3
28
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
ᾱ −ᾱ
ᾱ
ᾱ
The inequality of arithmetic and geometric means entails that 2t−
≤ t−2
+ t−2
, so
2 t3
2
3
{2,3}
t2−ᾱ t3−ᾱ wr̄
(f, t2 , t3 )p ≤ C(p, r̄)ku1 kp t2−α2 wr{2}
(u2,3 , t2 )p + t3−α3 wr{3}
(u2,3 , t3 )p .
2
2
In the same way,
{1,2,3}
ᾱ −ᾱ −ᾱ
t−
1 t2 t3 wr̄
−α3 {3}
2
(u
,
t
)
.
w
(u
,
t
)
+
t
wr{2}
(f, t1 , t2 , t3 )p ≤ C(p, r̄)t1−α1 wr1 (u1 , t1 )p t−α
2,3
3
p
2,3
2
p
r
3
2
2
2
Consequently,
ᾱ
≤ C(p, r̄)ku1 kB α1
kf kSBp,q,(d)
p,q,(1)
ku2,3 kB α2
p,q,(2)
.
(iii). The proof follows from the chain rule for higher order derivatives of a composite function.
(r)
(r)
α−r
Notice that for all 1 ≤ ` ≤ d and 1 ≤ r ≤ α − 1, u` ∈ Wp,(1)
, with α − r > 1/p, so u` is bounded.
(iv). The proof follows from a d-variate extension of Theorem 4.1, Inequality (10) in [PST13]
(see also [DL93] Chapter 6, Theorem 3.1).
(v). See Theorem 3.10 in [NS16b].
7.7. Proof of Theorem 2. We recall that for any finite sequence (ai )i∈I , and 0 < p1 , p2 < ∞,
!1/p2
!1/p1
X
X
p2
(1/p2 −1/p1 )+
p1
|ai |
≤ |I|
|ai |
.
i∈I
i∈I
Besides, we have proved in the course of the proof of Proposition 4 that
J` ≤ c1 (M, d)(` − dj0 + d − 1)d−1 .
In the hyperbolic basis, f admits a unique decomposition of the form
∞
X
X
hf, Ψλ iΨ?λ .
f=
`=dj0 λ∈U ∇(`)
Defining
f• =
L•
X
X
hf, Ψλ iΨ?λ ,
`=dj0 λ∈U ∇(`)
we have for finite q > 0, using the aforementioned reminders,
∞
X
X X
kf − f• k2Ψ =
hf, Ψλ i2
`=L• +1 j∈J` λ∈∇j
≤
∞
X
2/p
X
X
2(1/2−1/p)+
(]∇j )
λ∈∇j
`=L• +1 j∈J`
22`(1/2−1/p)+
`=L• +1
X
j∈J`
∞
X
|hf, Ψλ i|p
λ∈∇j
q/p 2/q
X
X
2(1/2−1/q)+
22`(1/2−1/p)+ ]J`
|hf, Ψλ i|p
`=L• +1
≤ C(B, d, p)
X
∞
X
≤ C(B, d, p)
2/p
∞
X
≤ C(B, d, p)
|hf, Ψλ i|p
j∈J`
λ∈∇j
22`(1/2−1/p)+ (` − dj0 + d − 1)2(d−1)(1/2−1/q)+ R2 2−2`(α+1/2−1/p)
`=L• +1
∞
X
2
≤ C(B, d, p)R
(` − dj0 + d − 1)2(d−1)(1/2−1/q)+ 2−2`(α−(1/p−1/2)+ )
`=L• +1
2(d−1)(1/2−1/q)+ −2L• (α−(1/p−1/2)+ )
≤ C(B, α, p, d)R2 L•
2
The case q = ∞ can be treated in the same way.
.
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
29
Let us fix k ∈ {0, . . . , L• − `1 } and define m̄(`1 + k, f ) as the subset of U ∇(`1 + k) such that
{|hf, Ψλ i|; λ ∈ m̄(`1 + k, f )} are the N (`1 , k) largest elements among {|hf, Ψλ i|; λ ∈ U ∇(`1 + k)}.
We then consider the approximation for f given by
`X
1 −1
A(`1 , f ) =
X
LX
• −`1
hf, Ψλ iΨ?λ +
`=dj0 λ∈U ∇(`)
and the set
m`1 (f ) =
`[
1 −1
X
hf, Ψλ i2
k=0 λ∈m̄(`1 +k,f )
U ∇(`) ∪
L•[
−`1
!
m̄(`1 + k, f ) .
k=0
`=dj0
Let us first assume that 0 < p ≤ 2. Using Lemma 4.16 in [Mas07] and (7.7), we get
kf• − A(`1 , f ))k2Ψ =
LX
• −`1
X
hf, Ψλ i2
k=0 λ∈U ∇(`1 +k)\m̄(`1 +k,f )
≤
LX
• −`1
X
|hf, Ψλ i|p
k=0
≤
2/p
LX
• −`1
/(N (`1 , k) + 1)2(1/p−1/2)
λ∈U ∇(`1 +k)
q/p 2/q
X
X
2(1/p−1/q)+
|hf, Ψλ i|p /(N (`1 , k) + 1)2(1/p−1/2) .
]J`1 +k
j∈J`1 +k
k=0
λ∈∇j
Besides, it follows from (11) that
N (`1 , k) + 1 ≥ 2M −d 2−d (d − 1)−(d−1) (`1 + k − dj0 + d − 1)d−1 2`1 (k + 2)−(d+2) .
Therefore
kf• − A(`1 , f ))k2Ψ ≤ C(α, p, d)R2 (`1 − dj0 + d − 1)2(d−1)(1/2−1/ max(p,q)) 2−2α`1 .
In case p ≥ 2, the same kind of upper-bound follows from
kf• − A(`1 , f ))k2Ψ ≤
LX
• −`1
2/p
]U ∇(`1 + k)2(1/2−1/p)
X
|hf, Ψλ i|p
.
λ∈U ∇(`1 +k)
k=0
Last,
kf − A(`1 , f ))k2Ψ = kf − f• k2Ψ + kf• − A(`1 , f ))k2Ψ
which completes the proof.
References
[ACF14] F. Autin, G. Claeskens, and J.-M. Freyermuth. Hyperbolic wavelet thresholding
methods and the curse of dimensionality through the maxiset approach. Applied and
Computational Harmonic Analysis, 36(2):239 – 255, 2014.
[ACF15] Florent Autin, Gerda Claeskens, and Jean-Marc Freyermuth. Asymptotic performance of projection estimators in standard and hyperbolic wavelet bases. Electron.
J. Statist., 9(2):1852–1883, 2015.
[AL11] Nathalie Akakpo and Claire Lacour. Inhomogeneous and anisotropic conditional
density estimation from dependent data. Electronic journal of statistics, 5:1618–
1653, 2011.
[Bar11] Yannick Baraud. Estimator selection with respect to hellinger-type risks. Probability
Theory and Related Fields, 151(1):353–401, 2011.
[BB14] Yannick Baraud and Lucien Birgé. Estimating composite functions by model selection. Ann. Inst. H. Poincaré Probab. Statist., 50(1):285–314, 02 2014.
[BB16] Yannick Baraud and Lucien Birgé. Rho-estimators revisited: general theory and
applications. Working paper or preprint, June 2016.
30
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
[BBM99] Andrew Barron, Lucien Birgé, and Pascal Massart. Risk bounds for model selection
via penalization. Probab. Theory Related Fields, 113(3):301–413, 1999.
[Ber96] Jean Bertoin. Lévy processes, volume 121 of Cambridge Tracts in Mathematics.
Cambridge University Press, Cambridge, 1996.
[BGH09] Yannick Baraud, Christophe Giraud, and Sylvie Huet. Gaussian model selection with
an unknown variance. Ann. Statist., 37(2):630–672, 2009.
[Bir06] Lucien Birgé. Model selection via testing : an alternative to (penalized) maximum
likelihood estimators. Annales de l’I.H.P. Probabilités et statistiques, 42(3):273–325,
2006.
[BM00] L. Birgé and P. Massart. An adaptive compression algorithm in besov spaces. Constructive Approximation, 16(1):1–36, 2000.
[BPP13] Rida Benhaddou, Marianna Pensky, and Dominique Picard. Anisotropic de-noising
in functional deconvolution model with dimension-free convergence rates. Electron.
J. Statist., 7:1686–1715, 2013.
[BS11] Gérard Bourdaud and Winfried Sickel. Composition operators on function spaces
with fractional order of smoothness. RIMS Kokyuroku Bessatsu B, 26:93–132, 2011.
[CDV93] Albert Cohen, Ingrid Daubechies, and Pierre Vial. Wavelets on the interval and fast
wavelet transforms. Appl. Comput. Harmon. Anal., 1(1):54–81, 1993.
[CT04] Rama Cont and Peter Tankov. Financial modelling with jump processes. Chapman &
Hall/CRC Financial Mathematics Series. Chapman & Hall/CRC, Boca Raton, FL,
2004.
[DIT14] Arnak Dalalyan, Yuri Ingster, and Alexandre B. Tsybakov. Statistical inference in
compound functional models. Probability Theory and Related Fields, 158(3):513–532,
2014.
[DKU99] Wolfgang Dahmen, Angela Kunoth, and Karsten Urban. Biorthogonal spline wavelets
on the interval—stability and moment conditions. Appl. Comput. Harmon. Anal.,
6(2):132–196, 1999.
[DL93] Ronald A. DeVore and George G. Lorentz. Constructive approximation, volume
303 of Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of
Mathematical Sciences]. Springer-Verlag, Berlin, 1993.
[Don97] D. L. Donoho. CART and best-ortho-basis: a connection. Ann. Statist., 25(5):1870–
1911, 1997.
[DTU16] Dinh Dung, Vladimir N. Temlyakov, and Tino Ullrich. Hyperbolic cross approximation. arXiv preprint arXiv:1601.03978v1, 2016.
[Dun01] Dinh Dung. Non-linear approximations using sets of finite cardinality or finite pseudodimension. Journal of Complexity, 17(2):467 – 492, 2001.
[FL09] José E Figueroa-López. Nonparametric estimation for lévy models based on discretesampling. Lecture notes-monograph series, pages 117–146, 2009.
[FLH09] José E. Figueroa-López and Christian Houdré. Small-time expansions for the transition distributions of Lévy processes. Stochastic Process. Appl., 119(11):3862–3889,
2009.
[Hep04] Wang Heping. Representation and approximation of multivariate functions with
mixed smoothness by hyperbolic wavelets. J. Math. Anal. Appl., 291(2):698–715,
2004.
[HM07] Joel L. Horowitz and Enno Mammen. Rate-optimal estimation for a general class
of nonparametric regression models with unknown link functions. Ann. Statist.,
35(6):2589–2619, 12 2007.
[Hoc02a] Reinhard Hochmuth. N -term approximation in anisotropic function spaces. Math.
Nachr., 244:131–149, 2002.
[Hoc02b] Reinhard Hochmuth. Wavelet characterizations for anisotropic Besov spaces. Appl.
Comput. Harmon. Anal., 12(2):179–208, 2002.
[IS07] Yu. Ingster and I. Suslina. Estimation and detection of high-variable functions from
Sloan–Woźniakowski space. Mathematical Methods of Statistics, 16(4):318–353, 2007.
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
31
[JLT09] Anatoli B. Juditsky, Oleg V. Lepski, and Alexandre B. Tsybakov. Nonparametric
estimation of composite functions. Ann. Statist., 37(3):1360–1404, 06 2009.
[KT06] Jan Kallsen and Peter Tankov. Characterization of dependence of multidimensional
Lévy processes using Lévy copulas. Journal of Multivariate Analysis, 97(7):1551 –
1572, 2006.
[Lep13] Oleg Lepski. Multivariate density estimation under sup-norm loss: Oracle approach,
adaptation and independence structure. Ann. Statist., 41(2):1005–1034, 04 2013.
[Mas90] P. Massart. The tight constant in the Dvoretzky-Kiefer-Wolfowitz inequality. Ann.
Probab., 18(3):1269–1283, 1990.
[Mas07] P. Massart. Concentration inequalities and model selection, volume 1896 of Lecture
Notes in Mathematics. Springer, Berlin, 2007. Lectures from the 33rd Summer School
on Probability Theory held in Saint-Flour, July 6–23, 2003, With a foreword by Jean
Picard.
[Mil71] P. W. Millar. Path behavior of processes with stationary independent increments.
Z. Wahrscheinlichkeitstheorie und Verw. Gebiete, 17:53–73, 1971.
[MN09] Alexander J. McNeil and Johanna Nešlehová. Multivariate Archimedean copulas, d-monotone functions and `1 -norm symmetric distributions. Ann. Statist.,
37(5B):3059–3097, 10 2009.
[Mou11] Madani Moussai. The composition in multidimensional Triebel–Lizorkin spaces.
Mathematische Nachrichten, 284(2-3):317–331, 2011.
[Nel06] Roger B. Nelsen. An introduction to copulas. Springer Series in Statistics. Springer,
New York, second edition, 2006.
[Neu00] Michael H. Neumann. Multivariate wavelet thresholding in anisotropic function
spaces. Statist. Sinica, 10(2):399–431, 2000.
[NS16a] Van Kien Nguyen and Winfried Sickel. Isotropic and dominating mixed Besov spaces:
a comparison. arXiv preprint arXiv:1601.04000, 2016.
[NS16b] Van Kien Nguyen and Winfried Sickel. Pointwise multipliers for Sobolev and Besov
spaces of dominating mixed smoothness. arXiv preprint arXiv:1608.03414, 2016.
[NvS97] Michael H. Neumann and Rainer von Sachs. Wavelet thresholding in anisotropic
function classes and application to adaptive estimation of evolutionary spectra. Ann.
Statist., 25(1):38–76, 1997.
[PST13] MK Potapov, BV Simonov, and S Yu Tikhonov. Mixed moduli of smoothness in
Lp , 1 < p < ∞: a survey. Surveys in Approximation Theory, 8(18), 2013.
[RB03] Patricia Reynaud-Bouret. Adaptive estimation of the intensity of inhomogeneous
Poisson processes via concentration inequalities. Probab. Theory Related Fields,
126(1):103–153, 2003.
[RBR10] Patricia Reynaud-Bouret and Vincent Rivoirard. Near optimal thresholding estimation of a Poisson intensity on the real line. Electron. J. Stat., 4:172–238, 2010.
[RBRTM11] Patricia Reynaud-Bouret, Vincent Rivoirard, and Christine Tuleau-Malot. Adaptive
density estimation: a curse of support? J. Statist. Plann. Inference, 141(1):115–139,
2011.
[Reb15a] Gilles Rebelles. Lp - adaptive estimation of an anisotropic density under independence
hypothesis. Electron. J. Statist., 9(1):106–134, 2015.
[Reb15b] Gilles Rebelles. Pointwise adaptive estimation of a multivariate density under independence hypothesis. Bernoulli, 21(4):1984–2023, 11 2015.
[RW02] Ludger Rüschendorf and Jeannette H. C. Woerner. Expansion of transition distributions of Lévy processes in small time. Bernoulli, 8(1):81–96, 2002.
[Sat99] Ken-iti Sato. Lévy processes and infinitely divisible distributions, volume 68 of Cambridge Studies in Advanced Mathematics. Cambridge University Press, Cambridge,
1999. Translated from the 1990 Japanese original, Revised by the author.
[Skl59] A. Sklar. Fonctions de répartition à n dimensions et leurs marges. Publ. Inst. Statist.
Univ. Paris, 8:229–231, 1959.
[ST87] Hans-Jürgen Schmeisser and Hans Triebel. Topics in Fourier analysis and function
spaces. A Wiley-Interscience Publication. John Wiley & Sons, Ltd., Chichester, 1987.
32
MULTIVARIATE INTENSITY ESTIMATION VIA HYPERBOLIC WAVELET SELECTION
[UK11] Florian AJ Ueltzhöfer and Claudia Klüppelberg. An oracle inequality for penalised
projection estimation of lévy densities from high-frequency observations. Journal of
Nonparametric Statistics, 23(4):967–989, 2011.
[YB99] Yuhong Yang and Andrew Barron. Information-theoretic determination of minimax
rates of convergence. Ann. Statist., 27(5):1564–1599, 1999.
| 10math.ST
|
arXiv:1611.00297v4 [cs.IT] 3 Dec 2017
Generalized Entropy Concentration for Counts
Kostas N. Oikonomou
AT&T Labs Research
Middletown, NJ 07748, U.S.A.
Email: [email protected]
November 2017
Abstract
The phenomenon of entropy concentration provides strong support for the maximum entropy method, MaxEnt, for inferring a probability vector from information
in the form of constraints. Here we extend this phenomenon, in a discrete setting, to
non-negative integral vectors not necessarily summing to 1. We show that linear constraints that simply bound the allowable sums suffice for concentration to occur even
in this setting. This requires a new, ‘generalized’ entropy measure in which the sum of
the vector plays a role. We measure the concentration in terms of deviation from the
maximum generalized entropy value, or in terms of the distance from the maximum
generalized entropy vector. We provide non-asymptotic bounds on the concentration
in terms of various parameters, including a tolerance on the constraints which ensures
that they are always satisfied by an integral vector. Generalized entropy maximization
is not only compatible with ordinary MaxEnt, but can also be considered an extension of it, as it allows us to address problems that cannot be formulated as MaxEnt
problems.
Keywords: maximum generalized entropy, counts, concentration, linear constraints,
inequalities, norms, tolerances
Contents
1 Introduction
2 The
2.1
2.2
2.3
2.4
2.5
2
generalized entropy G
Basic properties . . . . . . . . . . . . .
Monotonicity and concavity properties
Lower bounds . . . . . . . . . . . . . .
Maximization . . . . . . . . . . . . . .
A connection with I-divergence . . . .
1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
7
8
9
10
11
12
3 Constraints, scaling, sensitivity, and the optimal count vector
3.1 Constraints with tolerances . . . . . . . . . . . . . . . . . . . . .
3.2 Effect of tolerances on the optimality of x∗ . . . . . . . . . . . .
3.3 Scaling of the data and bounds on the allowable sums . . . . . .
3.4 The optimal count vector ν ∗ . . . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
13
14
15
16
17
4 Concentration with respect to entropy difference
4.1 Realizations of the optimal count vector . . . . . .
4.2 Realizations of the sets with smaller entropy . . . .
4.3 The scaling factor needed for concentration . . . .
4.3.1 Bounds on the concentration threshold . . .
4.4 Examples . . . . . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
18
19
21
23
25
26
5 Concentration with respect to distance from the MaxGEnt vector
5.1 Realizations of the sets far from the MaxGEnt vector . . . . . . . . . . . .
5.2 Scaling and concentration around the MaxGEnt count vector . . . . . . .
5.3 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
27
29
31
34
6 Conclusion
37
A Proofs
37
1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Introduction
The maximum entropy method or principle, originally proposed by E.T. Jaynes in 1957,
now appears in standard textbooks on engineering probability and information theory,
[PP02], [CT06]. Commonly referred to as MaxEnt, the principle essentially states that if
the only information available about a probability vector is in the form of linear constraints
on its elements, then, among all others, the preferred probability vector is the one that
maximizes the Shannon entropy under these constraints. Besides the great wealth and
diversity of its applications, MaxEnt can be justified on a variety of theoretical grounds:
axiomatic formulations ([SJ80], [Ski89], [Csi91], [Cat12]), the concentration phenomenon
([Jay83], [Gr8], [Cat12], [OG16]), decision- and game-theoretic interpretations ([Gr8] and
references therein), and its unification with Bayesian inference ([GC07], [Cat12]).
Among these justifications, in a discrete setting, the appeal of concentration lies in its
conceptual simplicity. It is essentially a combinatorial argument, first presented by E.T.
Jaynes [Jay83], who called it “concentration of distributions at entropy maxima”. The
concentration viewpoint was further developed in [Gr8] and [OG16], which presented generalizations, improved results, eliminated the asymptotics, and studied additional aspects.
In this paper we adopt a discrete, finite, non-probabilistic, combinatorial approach,
and show that the concentration phenomenon arises in a new setting, that of non-negative
2
vectors which are not necessarily density vectors1.1 . Among other things, this requires introducing a new, ‘generalized’ entropy measure. This new concentration phenomenon lends
support to an extension of the MaxEnt method to what we call “maximum generalized
entropy”, or MaxGEnt.
The basics of entropy concentration are easiest to explain in terms of the abstract
“balls and bins” paradigm ([Jay03]). There are m labelled, distinguishable bins, to which
n indistinguishable balls are to be allocated one-by-one. The final content of the bins
is described by a count vector ν = (ν1 , . . . , νm ) which sums to n, and a corresponding
frequency vector f = ν/n, summing to 1.P
Suppose that theP
frequency vector must satisfy
a set of linear equalities and inequalities, i aij fi = bj and i aij fi 6 bj , with aij , bj ∈ R.
The concentration phenomenon is that as n becomes large, the overwhelming majority of
the allocations which accord with the constraints have frequency vectors that are close to
the m-vector which maximizes the Shannon entropy subject to the constraints.
In our extension there is no longer a given number of balls. Therefore we cannot define
a unique frequeny vector, but must deal directly with count vectors ν whose sums are
unknown (Example 1.1 below makes this clear). The linear constraints are now placed on
the counts νi , again with coefficients in R. Our only assumption about the constraints is
that they limit the sums of the count vectors to lie in a finite range [s1 , s2 ]. With just
this assumption, we show that as the counts are allowed to become larger and larger (by
a process of scaling the problem, explained in §3), the vast majority of allocations that
satisfy the constraints in fact have count vectors close to the non-negative m-vector x∗
that maximizes the generalized entropy G(x). A precise statement of this concentration
phenomenon needs some additional preliminaries, and is given at the end of this section.
Our main results are, in §2, a new generalized entropy function G, defined on arbitrary
non-negative vectors, which reduces to the Shannon entropy H on vectors summing to 1;
its properties are studied in §2 and §3, where the scaling process is also introduced. In §4
we demonstrate the new concentration pheonomenon with respect to deviations from the
maximum generalized entropy value G∗ . Theorem 4.1 gives a lower bound on the ratio of
the number of realizations of the MaxGEnt vector to that of the set of count vectors ν
whose generalized entropies G(ν) are far from the maximum value G∗ . Then Theorem 4.2
completes the picture by deriving how large the problem must be for the above ratio to
be suitably large. In §5 we establish concentration with respect to the `1 norm distance
of the count vectors from the MaxGEnt vector ; we present Theorems 5.1 and 5.2, which
are analogous to those of §4, and also Theorem 5.3, an optimized version of Theorem 5.2.
In all the theorems, ‘far’, ‘large’, etc. are defined in terms of parameters, introduced in
Table 1.2 below. None of our results involve any asymptotic considerations, and we give a
number of numerical illustrations.
The following example demonstrates the basic issues referred to above in a very simple
1.1
What we call here ‘density’ or ‘frequency’ vectors would be called “discrete probability distributions”,
possibly ‘empirical’, if we were operating in a probabilistic setting.
3
setting, which highlights the differences with the usual frequency vector case. After this,
we proceed to the precise statement of generalized entropy concentration.
Example 1.1 A number of indistinguishable balls1.2 are to be placed one-by-one in three
bins, red, green, and blue. The final content (νr , νg , νb ) of the bins must satisfy νr + νg = 4
and νg + νb 6 6. Thus the total number of balls that may be put in the bins cannot be too
small, e.g. 3, or too large, e.g. 20. Each assignment of balls to the bins is described by a
sequence made from the letters r, g, b, with a corresponding count vector ν = (νr , νg , νb );
the sequence can be of any length n consistent with the constraints. Table 1.1 lists all the
count vectors that satisfy the constraints, their sums n, and their number of realizations
#ν, i.e. the number of sequences that result in these counts, given by a multinomial
7
coefficient, e.g. 3,1,3
= 140. [In the terminology of the theory of types, #ν is the size
of the type class T (ν/n).] What can be said about the “most likely” final content of the
bins?
νr
0
1
2
3
4
0
1
2
3
4
νg
4
3
2
1
0
4
3
2
1
0
νb
0
0
0
0
1
1
1
1
1
1
n
4
5
#ν
1
4
6
4
1
5
20
30
20
5
νr
0
1
2
3
4
1
2
3
4
νg
4
3
2
1
0
3
2
1
0
νb
2
2
2
2
2
3
3
3
3
n
6
7
#ν
15
60
90
60
15
140
210
140
35
νr
2
3
4
3
4
4
νg
2
1
0
1
0
0
νb
4
4
4
5
5
6
n
8
9
10
#ν
420
280
70
504
126
210
Table 1.1: The count vectors ν = (νr , νg , νb ) satisfying νr + νg = 4, νg + νb 6 6, their sum n, and
their number of realizations #ν. If we had the additional constraint νr + νg + νb = 7, only the
n = 7 section of the table would apply, and we would reduce to a MaxEnt problem.
This example makes two points. First, it does not seem possible to find a single frequency vector that can be naturally associated with the problem; without that, one cannot
think about maximizing the usual entropy1.3 . Second, one may think that starting with
the largest possible number of balls, 10 in this case, would lead to the greatest number of
realizations. But this is not so: the count vector with the most realizations sums to 9, and
even vectors summing to 8 have more realizations than the one summing to 10.
1.2
The balls don’t have to be indistinguishable, we just ignore distinguishing characteristics, if they have
any. However, in modelling some situations, such as in Example 3.1, indistinguishability is essential.
1.3
In the ordinary entropy problem where we have a single n, the distinction between count and frequency
vectors doesn’t really matter, there is a 1-1 correspondence; but this is not true here.
4
Next we give a precise statement, GC below, of generalized entropy concentration. To
do that we need to (a) define the generalized entropy and describe how to find the vector
that maximizes it, (b) specify how to derive the bounds s1 , s2 from the constraints, (c)
describe how to ensure the existence of integral solutions (count vectors) to the constraints,
and (d) introduce parameters that define the concentration.
To find the vector with the largest number of realizations in a problem like that of
Example 1.1, we first assume that the problem does not admit arbitrarily large solutions.
This is made precise in (1.2) below, but a necessary condition is that each element of ν
appears in some constraint1.4 . Next we relax the integrality requirement on the counts,
and set up a continuous maximization problem
P
P
P
maxx∈C G(x), where G(x) = − i xi ln xi + ( i xi ) ln ( i xi )
,
(1.1)
and
C = {x ∈ Rm | AE x = bE , AI x 6 bI , x > 0}.
Here G(x) is the generalized entropy of the real vector x > 0, and the constraints on x are
expressed via the real matrices AE , AI and vectors bE , bI . We assume that the constraints
(a) are satisfiable, and (b) they bound the possible sums of the x ∈ C; this is equivalent to
assuming that all xi are bounded. Thus C is a non-empty polytope in Rm and (1.1) is a
concave maximization problem (see e.g. [BV04]) with a solution x∗ . We will refer to (1.1)
as the “MaxGEnt problem” and to x∗ as “the MaxGEnt vector” or as “the optimal
relaxed count vector”. Since the function G is concave but not strictly concave, see Fig.
2.1 in §2, it is not immediate that the solution x∗ is unique; however, we show that this is
the case in §2.4.
P
The boundedness assumption is that i xi lies between (finite) numbers s1 and s2 ;
these are determined by solving the linear programs
s1 , min(x1 + · · · + xm ),
s2 , max(x1 + · · · + xm ).
x∈C
x∈C
(1.2)
(A technicality is that the constraints may force some elements of x∗ to be 0; for reasons
explained in §3 it is convenient to eliminate such elements, so that in the end all elements
of x∗ can be assumed to be positive reals.) Finally, from x∗ we derive an integral vector ν ∗ ,
to which we refer as the optimal, or MaxGEnt count vector, by a procedure explained in
§3.
Because in the end we are interested only in integral/count vectors in the set C of (1.1),
we will introduce, as explained in §3, tolerances on the satisfaction on the constraints,
governed by a parameter δ. This will turn C into C(δ). To describe the concentration
we need two more parameters, ε specifying the strength of the concentration, and η or ϑ
describing the size of the region in which it occurs. The parameters are summarized in
Table 1.2.
Lastly, when we have ordinary entropy and frequency vectors, concentration occurs by
increasing the number of balls n. With count vectors, this is replaced by increasing bE , bI ,
1.4
But this is not sufficient: consider, e.g. m = 2 and ν1 , ν2 > 0, ν1 − ν2 = 10.
5
δ:
ε:
η:
ϑ:
relative tolerance in satisfying the constraints
concentration tolerance, on number of realizations
relative tolerance in deviation from the maximum generalized entropy value G∗
absolute tolerance in deviation (distance) from the optimal relaxed count vector x∗
Table 1.2: Parameters for the concentration results.
the values of the constraints. The increase we consider here consists in multiplying these
vectors by a scalar c > 1, a process which we call scaling. This scaling results in larger and
larger count vectors being admissible and is described in detail in §3.
Now we can give the precise statement of the concentration phenomenon for count
vectors:
GC: Theorems 4.2 and 5.2 compute a number ĉ(δ, ε, η) and ĉ(δ, ε, ϑ), respectively, called the “concentration threshold”, such that if the problem data bE , bI
is scaled by any factor c > ĉ, the number of assignments/sequences that result
in the optimal count vector ν ∗ is at least 1/ε times greater than the number of
all assignments that result in count vectors with entropy less than (1 − η)G∗
or farther than ϑ from x∗ by `1 norm.
Significance
In a problem where the only available information is embodied in the constraints and
which otherwise admits a large number of probability vectors as solutions, the concentration phenomenon provides a powerful argument for the MaxEnt method, which selects a
particular solution, the one with maximum entropy, in preference to all others1.5 . Likewise,
the concentration results in this paper support the maximization of generalized entropy
for problems involving general non-negative vectors. We believe that MaxGEnt can be
considered to be a compatible extension of MaxEnt. The compatibility is that any MaxEnt problem over the reals with constraints AE x = bE , AI x 6 bI can be formulated as
aPMaxGEnt problem of the form (1.1) with the same constraints, plus the constraint
∗
m
i xi = 1; both problems will have the same solution x ∈ R , and the maximum en∗
∗
tropy H(x ) will equal the maximum generalized entropy G(x ). Also, if P
the constraints
of the MaxGEnt problem either explicitly or implicitly fix the value of i xi , then the
problem can be reduced to a MaxEnt problem over the reals. The extension consists in
the fact that MaxGEnt addresses problems involving un-normalized vectors that cannot
be formulated as MaxEnt problems, as we saw in Example 1.1; more examples of such
problems are given in §3, §4, and §5.
1.5
MaxEnt solves the inference problem, not the decision problem. It does not claim that the maximum
entropy object is the one to use no matter what use one has in mind.
6
Related work
Our term “generalized entropy” for G is neither imaginative nor distinctive, and there
are many other generalized entropy measures. The most general of these are Csiszár’s
f -entropies and f -divergences [Csi96], and the related Φ-entropies of [BLM13]. Any relationship of G to Φ-entropies remains to be investigated. The function G, in the form
of the log of a multinomial coefficient with “variable numerator”, appeared in [OS06] and
[Oik12].
The problem of inferring a non-negative real vector from information in the form of
linear equalities was considered by Skilling [Ski89], where such vectors were termed “positive additive distributions”, and by Csizsár, [Csi91], [Csi96]. Both authors gave axiomatic
justifications, which do not involve probabilities, for minimizing the I-divergence, a generalization of relative entropy to un-normalized vectors. A further generalization is the α, β
divergences of [CCA11]. We discuss a connection between I-divergence and our generalized
entropy in §2.5.
With respect to concentration, recent developments for the discrete, normalized case
were given in [OG16]. The continuous normalized case, for relative entropy, is examined
in [Cat12] from the viewpoint of information geometry. Countable spaces are also treated
in [Gr8]. But these references do not provide explicit bounds such as the ones here and
in [OG16]. To our knowledge, concentration for non-density vectors has not been studied
before.
The structure and some of the presentation of this paper are similar to [OG16] because
of the similar subject matter, entropy concentration from a combinatorial viewpoint. Many
of the results here that appear similar to those of section III of [OG16] are generalizations
of those results, insofar as G is a generalization of H. However the main theorems here
do not actually subsume corresponding theorems in [OG16], because in both cases the
theorems include optimizations specific to count or frequency vectors, respectively.
2
The generalized entropy G
In this section we introduce the generalized entropy function G, and study its properties,
relationships with other functions, and its maximization under linear constraints.
Given a real vector x > 0, its generalized entropy is
X X
X
G(x) , H(x) +
xi ln
xi =
xi H(χ), x > 0.
(2.1)
i
i
i
Here H(x) is the form − i xi ln xi extended to vectors in Rm
+ that are not necessarily
density vectors, and χ is the density, or normalized, or probability, vector corresponding
to x. (2.1) gives two ways to look at G(x): it is the (extended) entropy of x plus the sum
of x times its log, or the sum of x times the ordinary entropy of the normalized x. If x is
already normalized G(x) coincides with H(x). Fig. 2.1 is a plot of G(x) for m = 2.
P
7
5
4
4
3
3
2
2
4.0
3.5
3.0
x2
2.5
2.0
1.5
1.0
1.0
1.5
2.0
2.5
3.0
3.5
4.0
1.0
x1
1.5
2.0
2.5
x1
3.0
3.5
4.0
1.0
1.5
2.0
2.5
3.0
3.5
G(x1 , x2 )
G( x 1 , x 2 )
5
4.0
x2
Figure 2.1: G(x1 , x2 ). Note that G(x, x) = (2 ln 2)x, which destroys the strict concavity of
G.
2.1
Basic properties
We list some important properties of the function G:
m
to “second Stirling
P1 G(x1 , . . . , xm ) is the log of the multinomial coefficient xx1 +···+x
1 ,...,xm
√
1
ϑ
,ϑ ∈
order”: by using the first two terms of ln x! = x ln x − x + 2 ln x + ln 2π + 12x
(0, 1),we find that
x1 + · · · + xm
ln
≈ G(x1 , . . . , xm ).
x1 , . . . , x m
This interpretation was given in [Oik12], where it was used to derive “most likely”
matrices, i.e. those with the largest number of realizations, from incomplete information.
P2 G is related to the ordinary entropy (of density vectors) and the extended entropy (of
arbitrary non-negative vectors) H in the two ways specified in (2.1).
P3 Unlike the entropy of normalized vectors which is bounded by ln m, the generalized
entropy G(x) increases without bound as the elements of x become larger: for any
x, y, if y > x then G(y) > G(x). This is shown in Proposition 2.3. One consequence
is that if x, y are close in norm, i.e. kx − yk 6 ζ, |G(x) − G(y)| cannot be bounded
by an expression involving only m and ζ.
P4 G(x) is positive, unless x has just one non-0 element, in which case G(x) = 0. This
follows from the second form in (2.1).
P5 Given any p.d. p = (p1 , . . . , pm ) and any n-sequence σ with count vector ν, the
probability of σ under p can be written as
Prp (σ) = e−(G(ν)+nD(f kp))
8
where D(· | ·) is the divergence, or relative entropy, between two probability vectors
and f = ν/n is the frequency vector corresponding to ν. By substituting G(ν) =
nH(f ) we obtain the well-known expression for the same probability in terms of the
ordinary entropy of a frequency vector.
P6 Like the ordinary or the extended H, G(x1 , . . . , xm ) is concave over the domain x1 >
0, . . . , xm > 0, but unlike H, it is not strictly concave. See Proposition 2.2 in §2.2.
P
P7 The maximum of G(x1 , . . . , xm ) subject just to the constraint
i xi = s is s ln m.
When s = 1, x is a density vector and this reduces to the maximum of H.
P8 What is the relationship between maximizing G and maximizing the extended H?
Consider maximizing the first formPin (2.1), subject to AE x = bE , AI x 6 bI , by
imposing the additional constraint i xi = s and treating s as a parameter taking
values in [s1 , s2 ]. For a given s, there will be a unique maximum since H is strictly
∗
concave2.1 . Further, some
subject to
P s = s will achieve maxs maxx (s ln s + H(x))
E
E
I
I
A x = b , A x 6 b , i xi = s; this maximum value will equal G(x∗ ). Using the
second form in (2.1) we see that there is a similar relationship between maximizing
G(x) and maximizing the function sH(x/s).
P9 G has a scaling (or homogeneity) property, which H does not: for any c > 0 and any
x ∈ Rm
+ , G(cx) = cG(x). This is most easily seen from the second form in (2.1).
P10 G has a further important scaling property: if x∗ maximizes G(x) under Ax 6 b, then
for any c > 0, cx∗ maximizes G(x) under Ax 6 cb. We show this in §3.3, Proposition
3.2.
2.2
Monotonicity and concavity properties
As we noted in property 2.1 in §2.1, G is an increasing function in the sense that
Proposition 2.1 For any x, y, if y > x then G(y) > G(x), and if the inequality is strict
in some places, then G(y) > G(x).
We will use this property in §2.3. Now we turn to concavity.
The extended ordinary entropy H is strictly concave, and in addition, strongly concave
for any modulus γ 6 1/a when defined over [0, a]m . The generalized entropy G is also
concave, but neither strictly concave, nor strongly concave for any modulus. However −G
is sublinear, whereas −H is not. These properties are collected in the following proposition:
Proposition 2.2
1. The function G(x1 , .., xm ) is concave over Rm
+.
2.1
One may also maximize H without the constraint
9
P
xi = s, but what would the result mean?
2. G is not strictly concave over Rm
+.
3. G is not strongly concave over Rm
+ for any modulus γ > 0.
4. If the definition of G is extended over all of Rm by setting G(x) = −∞ if any xi is < 0,
then for all α, β > 0 and for all x, y ∈ Rm , G(αx + βy) > αG(x) + βG(y).
The last property is stronger than (implies) concavity since α, β are not required to sum
to 1. The absence of strict concavity means that more care is needed with maximization,
we address this in §2.4.
2.3
Lower bounds
Given a point x, if some other point y is close to it in the distance/norm sense, how much
smaller than G(x) can G(y) be? We will need the answer in §4. Proposition 2.1 implies that
if we have a hypercube centered at x, say kx − yk∞ 6 ζ, then G(·) attains its maximum at
the “upper right-hand” corner of the hypercube and its minimum at the “lower left-hand”
corner. Specifically, for any ζ > 0, let ζ denote the m-vector (ζ, . . . , ζ), and let x > ζ.
Then it can be seen from Proposition 2.1 that for any y > 0
kx − yk∞ 6 ζ
⇒
G(x − ζ) 6 G(y) 6 G(x + ζ).
(2.2)
Using this observation we can show that
Lemma 2.1 Given ζ > 0 and x, y ∈ Rm
+ , if x > ζ and ky − xk∞ 6 ζ, then
G(y) > G(x) −
X
i
ln
kxk1
1 X 1
m
ζ−
−
ζ 2.
xi
2
xi − ζ
kxk1 /m − ζ
i
The coefficient of ζ 2 is positive unless all xi are equal, in which case it becomes 0.
The lower bound above does not depend on y, only on x and ζ. The restriction x > ζ
applies to the ‘reference’ point x, not to the ‘variable’ y; see also Remark 4.2. Lastly, since
kx − yk1 6 ζ ⇒ kx − yk∞ 6 ζ, the lemma holds also when the `∞ norm is replaced by the
`1 norm.
We will use Lemma 2.1 in §4.1 to bound how far from the maximum G(x∗ ) the value
G(x) can be if x is close to x∗ . We also comment there, Remark 4.3, on how the above
bound compares to bounds obtainable from the relationship between (ordinary) entropy
difference and `1 norm.
10
2.4
Maximization
Let C(0) denote the subset of Rm defined by the constraints in (1.1)2.2 . Here we point out
that the point x∗ solving (1.1) occupies a special location in this set, and consequently is
the unique optimal solution of our maximization problem, despite the fact that G is not a
strictly concave function (recall Proposition 2.2, part 2).
Proposition 2.3
1. The set C(0) does not contain any x s.t. x > x∗ with at least one strict inequality.
2. The point x∗ is the unique optimal solution of problem (1.1).
Figure 2.2 illustrates the first statement of the proposition.
x2
x1
0
Figure 2.2: A 2-dimensional polytope C(0). By Proposition 2.3, x∗ can lie only on the heavy black
line.
Finally we look at the form of the solution x∗ in terms of Lagrange multipliers. The
Lagrangean for problem (1.1) is
L(x, λE , λI ) = G(x) − λE · (AE x − bE ) − λI · (AI x − bI ),
(2.3)
where λE , λI are the vectors of the Lagrange multipliers corresponding to the equality and
inequality constraints. The solution x∗ will satisfy some of the inequality constraints with
equality (and these are called binding or active at x∗ ), and some with strict inequality.
It is known that multipliers λIj corresponding to inequalities non-binding at x∗ will be 0,
while the rest of them will be > 0 (see, e.g., [HUL96], Ch. VII, §2.4). Thus, denoting
the sub-vector of λI corresponding to binding inequalities by λBI and the corresponding
sub-matrix of AI by ABI , it follows from (2.3) that x∗ can be written as
x∗j = (x∗1 + · · · + x∗m )e−(λ
E ·AE +λBI ·ABI )
.j
.j
.
This expression determines the elements of the density vector χ∗ = x∗ /
the multipliers, but it does not determine the vector x∗ itself.
2.2
(2.4)
∗
i xi
P
The reason for the “0” will be seen in §3.1, where we discuss tolerances on constraints.
11
in terms of
Remark 2.1 It is clear that the form (2.4) cannot express any elements of x∗ that are 0, if
the multipliers λ are to be finite. To avoid introducing special cases in the sequel to handle
the zeros, we will assume as a convenience that any elements of the solution to problem
(1.1) that are forced to be exactly 0 by the constraints are eliminated from consideration
either before or after the solution is found. We have already alluded to this after (1.2).
Thus, whenever we speak of x∗ in what follows we will assume that all of its elements are
positive. See Example 5.3 in §5. A more detailed discussion of the issue of 0s is in [OG16],
§II.A.
Example 2.1 Returning to Example 1.1, it is possible to maximize G analytically under
the given constraints. Introducing real variables x1 , x2 , x3 corresponding to νr , νg , νb and
letting the constraints be x1 + x2 = a and x2 + x3 6 b, the solution turns out to be
√
a + b + a2 + b2
∗
∗
∗
∗
∗
∗
∗
x1 = s − b, x2 = a + b − s , x3 = s − a,
s =
.
2
Further, the bounds s1 , s2 of (1.2) on the possible sums are s1 = a and s2 = a + b. We
see that the MaxGEnt solution to the problem is never trivial,
in the sense that for all
√
13
1
∗
∗
a, b, we have s1 < s < s2 ; when a = b we have s = 2 1 + 5 s2 ≈ 0.861s2 . With
a = 4, b = 6 we find s∗ = 8.61 and x∗ = (2.61, 1.39, 4.61); compare with Table 1.1.
2.5
A connection with I-divergence
For density vectors, the relationship between ordinary entropy H(x) and divergence D(xky)
is well known: with uniform y, D(xky) reduces to H(x) to within a constant, and its
minimization is equivalent to the maximization of H(x). Here we look at whether G(x)
has any analogous properties.
P
First, if in D(xky) we take y to have all of its elements equal to
i xi , we obtain
2.3 . For example, minimizing D(xky)
−G(x). However, this is merely
a
formal
relationship
P
P
with respect to x when y = ( i xi , . . . , i xi ) cannot be given the same interpretation as
minimizing D(xky) with respect to x given a fixed ‘prior’ y. So even if x, y summed to 1,
neither the axiomatic nor the concentration justifications for cross-entropy minimization
would apply.
Second, the concentration properties we establish in §4 and §5 support the maximization
of G(x) as a method of inference of non-negative vectors from limited information. Another
method for doing this, suggested in [Ski89], [Csi96], is based on minimizing the I-divergence
(information divergence) between non-negative vectors
D(ukv) ,
X
i
2.3
ui ln
X
ui X
−
ui +
vi ,
vi
i
This is pointed out in [BV04], Ch. 3, Example 3.19.
12
i
u, v ∈ Rm
+.
(2.5)
This reduces to D(ukv) when u, v sum to 1. The inference problem is “problem (iii)” in
[Csi96]: infer a non-negative function p(z), not necessarily summing or integrating to 1,
given that (a) it belongs to a certain feasible set F of functions defined by linear equality
constraints, and (b) a default model q(z)2.4 . It is shown that the solution of this problem is
the p∗ ∈ F that minimizes the I-divergence D(pkq). (Recently, minimization of I-divergence
and generalizations to “α, β divergences” has found many applications in the area known
as “non-negative matrix factorization”, see [CCA11].)
There is a relationship between minimizing I-divergence and maximizing generalized
entropy:
Proposition 2.4 Let (AE , bE ), (AI , bI ) be linear equality and inequality constraints on a
∗
vector in Rm
+ , and let x be the solution of the MaxGEnt problem with these constraints on
∗
x. Given a prior v ∈ Rm
+ , let u (v) be the solution to the minimum I-divergence problem
with the same constraints on u. Then there is a prior ṽ which makes the two solutions
coincide, i.e. u∗ (ṽ) = x∗ . That prior is ṽ = (s∗ , . . . , s∗ ).
This follows from the fact that the minimum I-divergence solution to a problem with
prior v and constraints AE u = bE and AI u 6 bI on u is
u∗j = vj e−(λ
E ·AE +λBI ·ABI )
.j
.j
.
(2.6)
If we set vj = s∗ , it can be seen from expression (2.4) that u∗j = x∗j satisfies (2.6).
Inference by minimizing I-divergence under equality constraints has an axiomatic basis,
but as pointed out in §3 and §7 of [Csi96], the combinatorial, concentration rationale that we
are advocating here does not seem to apply to it. Proposition 2.4 shows that the adoption of
a particular prior furnishes this rationale, except that this prior cannot be properly viewed
as independent of the solution (posterior) u∗ . This dependence may shed some light on the
difficulty of finding the concentration rationale in general. [As an illustration, Example 2.1
can be solved by I-divergence minimization assuming a constant prior v = (α, α, α). An
analytical solution u∗ is possible, and it has the same form as the MaxGEnt solution, but
it is a function of α ∈ (0, ∞); the question then becomes what value to adopt for α.]
3
Constraints, scaling, sensitivity, and the optimal count
vector
In §3.1 we discuss the necessity of introducing tolerances into the constraints defining the
MaxGEnt problem, and in §3.2 the effect of these tolerances on the maximization of G.
In §3.3 we turn to the scaling of the problem, i.e. multiplying the data vector b by some
c > 0, and the important properties of this scaling. Lastly, in §3.4 we discuss the optimal ,
or MaxGEnt count vector ν ∗ , constructed from the real vector x∗ solving problem (1.1).
2.4
The sense of ‘default’ is that if q is in F, then, in the absence of any constraints, the method should
infer p∗ = q.
13
3.1
Constraints with tolerances
We pointed out the necessity of introducing tolerances into linear constraints when establishing concentration of ordinary entropy in [OG16]. The constraints involved real
coefficients, and the solutions had to be rational (frequency) vectors with a particular
denominator. Here the solutions need to be integral (count) vectors, but the equality constraints may not have any integral solution; e.g. x1 − x2 = 1, x1 + x2 = 4 are satisfied only
for (x1 , x2 ) = (2.5, 1.5), and likewise with inequalities, e.g. 1.3 6 x1 6 1.99. We therefore define the set of real m-vectors x that satisfy the constraints in (1.1) with a relative
accuracy or tolerance δ > 0:
C(δ) , {x ∈ Rm : bE − δ|β E | 6 AE x 6 bE + δ|β E |, AI x 6 bI + δ|β I |},
(3.1)
where β E , β I are identical to bE , bI , except that any elements that are 0 are replaced
by appropriate small positive constants. The tolerances are only on the values b of the
constraints, not on their structure A. Recall that the generalized entropy is maximized
over C(0), which we have assumed to be non-empty, problem (1.1).
There are three main points concerning the introduction of δ. First, the existence of
integral solutions, which is elaborated in Proposition 3.1 below. Second, and related to
the first, δ ensures that the concentration statement GC in §1 holds for all scalings of the
problem larger than a threshold ĉ. This is analogous to having concentration for frequency
(rational) vectors hold for all denominators n larger than some N , as in [OG16]. Third, δ
has an effect on the maximization of G; this the subject of §3.2.
Proposition 3.1 below gives the fundamental facts about the existence of count vectors
in C(δ). Given an x in C(0), any other vector y close enough to it is in C(δ), and, if δ is
not too small, the count vector obtained by rounding x element-wise is in C(δ); in other
words, for every real vector in C(0) there is an integral vector in C(δ). The “close enough”
and the “not too small” depend on a number ϑ∞ :
Proposition 3.1 With β E , β I as in (3.1), define
ϑ∞ , min(|β E |min / 9 AE 9∞ , |β I |min / 9 AI 9∞ ),
or ∞ if there are no constraints3.1 . Then if x is any point in C(0),
1. Given any δ > 0, any y ∈ Rm
+ such that ky − xk∞ 6 δ ϑ∞ is in C(δ).
2. In particular, if δ > 1/(2ϑ∞ ), the integral/count vector [x] is in C(δ).
As we add constraints to a problem, ϑ∞ can only decrease, or at best stay the same.
This proposition is used in §4.3, eq. (4.23), and in §5.2, after (5.9).
3.1
Recall that the infinity norm 9 · 9∞ of a matrix is the maximum of the `1 norms of the rows.
14
Example 3.1 Fig. 3.1 shows a network consisting of 6 nodes and 6 links. The links
are subject to a certain impairment x and xi is the quantity associated with link i. The
impairment is additive, e.g. its value over the path AB consisting of links 4, 1, 6 is x4 +
x1 + x6 .
B
x4 + x1 + x6 = b1
x6 + x3 + x5 = b2
x4 + x2 + x5 = b3
x4, x5, x6 6 b4
6
3
1
A
4
5
2
C
Figure 3.1: Data b on the impairment x in a 6-node, 6-link network.
Suppose that x is measured over the 3 paths AB, BC, CA, and it is also known that
the access links 4, 5, 6 contribute no more than a certain amount, as shown in Fig. 3.1.
The structure matrices AE , AI and data vectors bE , bI then are
#
"
"
#
"
#
"
#
AE =
1
0
0
0
0
1
0
1
0
1
0
1
0
1
1
1
1
0
,
bE =
b1
b2
b3
,
AI =
0
0
0
0
0
0
0
0
0
1
0
0
0
1
0
0
0
1
,
bI =
b4
b4
b4
.
The problem is to infer the impairment vector x from the measurement vector b. Clearly,
the values of the bi depend on the chosen units and can change under various conditions,
whereas the elements of AE , AI are constants defining the structure of the network, and
independent of any units.
Suppose we take (b1 , . . . , b4 ) = (10.5, 18.3, 8.7, 4). Then with β E , β I = bE , bI we have
in Proposition 3.1 |bE |min / 9 AE 9∞ = 8.7/3 and |bI |min / 9 AI 9∞ = 4/1, so ϑ∞ = 2.9. The
vector x = (6.591, 5.326, 13.26, 1.120, 2.253, 2.789) satisfies the constraints exactly. The
rounded vector [x] = (7, 5, 13, 1, 2, 3) is in the set C(δ) defined by (3.1) for any δ > 0.172.
3.2
Effect of tolerances on the optimality of x∗
With the constraints x1 − x2 = 1, x1 + x2 = 4,and x1 , x2 > 0, C(0) is a 0-dimensional
polytope in R2 , the point (2.5, 1.5). However, introducing the tolerance δ = 0.05 turns
the equalities into inequalities and C(0.05) = {0.95 6 x1 − x2 6 1.05, 3.8 6 x1 + x2 6 4.2}
becomes 2-dimensional. Apart from the change in dimension, C(0.05) also contains the
point (2.55, 1.55) at which G assumes a value greater than G∗ = G(2.5, 1.5), its maximum
over C(0). This must be taken into account, since concentration refers to the vectors in
C(δ), not those in C(0). The following lemma shows that the amount by which the value
of G can exceed G∗ due to the widening of the domain C(0) to C(δ) is bounded by a linear
function of δ; it generalizes Prop. II.2 of [OG16] for the ordinary entropy H:
15
Lemma 3.1 Let (λE , λBI ) be the vector of Lagrange multipliers in (2.4) corresponding to
the solution G∗ = G∗ (0), x∗ = x∗ (0) of the maximization problem (2.1). Define
Λ∗ , |λE | · |bE | + λBI · |bBI |,
Λ∗ > G ∗ .
Then with δ > 0, for any ν ∈ C(δ)
G(ν) 6 G∗ + Λ∗ δ − nD(f kχ∗ ),
P
where n = i νi , f is the frequency vector corresponding to ν, and χ∗ is the density vector
corresponding to x∗ .
The upper bound on G(ν) is at least (1 + δ)G∗ − nD(f kχ∗ ). When δ = 0 the lemma
says simply that G∗ is the maximum of G over C(0). The D(·k·) term is positive, and
equals 0 iff ν = αx∗ for some α > 03.2 . Leaving aside that this is possible only for special
x∗ and α, Lemma 3.1 says that if the resulting ν is in C(δ), then G(ν) = αG∗ 6 G∗ + Λ∗ δ,
i.e. the allowable α is limited by δ. Also, if we have even one equality constraint, δ limits
the size of the allowable α even further.
3.3
Scaling of the data and bounds on the allowable sums
We establish a fundamental property, 2.1 in §2.1, of maximizing the generalized entropy
G: if the problem data b is scaled by the factor c > 0, all aspects of the solution scale by
the same factor.
∗ maximizes G(x) under the linear
Proposition 3.2 Suppose that the relaxed count vector xP
constraints AE x = bE , AI x 6 bI , which also imply that i xi is between the bounds s1 , s2 .
Let c > 0 be any constant. Then the vector cx∗ maximizes G(x) under the scaled constraints
P
AE x = cbE , AI x 6 cbI , the maximum value of G is cG(x∗ ), and the new bounds on i xi
are cs1 , cs2 .
How do s1 and s2 , defined in (1.2), depend on the structure matrices AE , AI and the
data bE , bI ? In general, the problem of bounding s1 or s2 doesn’t have a simple answer:
by scaling the variables, any linear program whose objective function is a positive linear
combination of the variables can be converted to one where the objective function is simply
the sum of the variables. But in some special cases we can derive simple bounds on s1 and
s2 :
Proposition 3.3 Bounds on the sums s1 and s2 .
1. If there are some equality constraints, then s1 > kbE k1 / 9 (AE )T 9∞ . (This bound
can only increase if there are also inequalities.)
3.2
The only way the density vectors can be equal is if the un-normalized vectors are proportional.
16
I
2. Suppose allP
of AE , AI , bE
P, b I areI > 0, and EeachI xi occurs in at least one constraint.
E
E
Then s2 6 i bi /αi + i bi /αi , where αi , αi , is the smallest non-zero element of
row i of AE , respectively AI , if that element is < 1, and 1 otherwise.
Recall from §1 that “each xi occurs in at least one constraint” is a necessary condition
for the problem to be bounded. The proposition applies to Example 3.1: we find that
s1 > (b1 + b2 + b3 )/2 and s2 6 b1 + b2 + b3 + b4 .
3.4
The optimal count vector ν ∗
Given the relaxed optimal count vector x∗ , we construct from it a count vector ν ∗ which
is a reasonable approximation to the integral vector that solves problem (1.1), in the sense
that (a) its sum is close to that of x∗ , and (b) its distance from x∗ is small in `1 norm.
These properties will be needed in §4 and §5. We will require ν ∗ to sum to n∗ , where
X
n∗ , ds∗ e, s∗ ,
x∗i .
(3.2)
i
For any x > 0, let [x] be the vector obtained by rounding each of the elements of x up or
down to the nearest integer. ν ∗ is obtained from x∗ by a process of rounding and adjusting:
Definition 3.1 ([OG16], Defn. III.1) Given x∗ , form the density P
vector χ∗ = x∗ /s∗
and set ν̃ = [n∗ χ∗ ]. Construct ν ∗ by adjusting ν̃ as follows. Let d = i ν̃i − n∗ ∈ Z. If
d = 0, set ν ∗ = ν̃. Otherwise, if d < 0, add 1 to |d| elements of ν̃ that were rounded down,
and if d > 0, subtract 1 from |d| elements that were rounded up. The resulting vector is ν ∗ .
We will refer to ν ∗ as “the optimal count vector” or “the MaxGEnt count vector” (even
though it is not unique). It sums to n∗ , and does not differ too much from x∗ in norm:
Proposition 3.4 The optimal count vector ν ∗ of Definition 3.1 is such that
X
3m
3m
νi∗ = n∗ , kν ∗ − x∗ k1 6
+ 1, kν ∗ − x∗ k∞ 6 1, kf ∗ − χ∗ k1 6 ∗ .
4
4n
16i6m
There are other approximations to the integral solution of problem (1.1); for example,
simply [x∗ ] achieves smaller norms than ν ∗ : k[x∗ ] − x∗ k1 6 m/2, k[x∗ ] − x∗ k∞ 6 1/2. ([x∗ ]
is the point of Nm that minimizes the Euclidean distance kν − x∗ k2 from x∗ .) But [x∗ ] does
not have the required sum n∗ .
Another, more sophisticated
definition for ν ∗ ,Pwould use the solution of the integer
Pm
m
∗
linear programPminν∈Nm i=1 |νi − x∗i | subject to
P i=1 νi = n . [This is a linear program
because minz i |zi − ci | is equivalent to mina,z i ai subject to ai ≥ zi − ci , ai ≤ zi − ci .]
A ν ∗ better than that of Definition 3.1 would improve the bound in (4.9) below3.3 .
No integral vector can achieve `1 norm smaller than kx∗ − [x∗ ]k1 ; this solution to the linear program
ignores the constraint, and minimizes each term of the objective function individually.
3.3
17
4
Concentration with respect to entropy difference
It is not clear that concentration should occur at all in a situation like the one of Example
1.1. The fact that G has a global maximum G∗ over C(0) is not enough. In this section we
demonstrate that concentration around G∗ does indeed occur, in the sense of the statement
GC of §1, pertaining to entropies η-far from G∗ . This is done in two stages, by Theorem
4.1 in §4.2 and Theorem 4.2 in §4.3.
Consider the count vectors that sum to n and satisfy the constraints. We divide them
into two sets, An , Bn , according to the deviation of their generalized entropy from G∗ : given
δ, η > 0,
An (δ, η) , {ν ∈ Nn ∩ C(δ), G(ν) > (1 − η)G∗ },
(4.1)
Bn (δ, η) , {ν ∈ Nn ∩ C(δ), G(ν) < (1 − η)G∗ }.
Irrespective of the values of δ and η, An (δ, η) ] Bn (δ, η) = Nn ∩ C(δ). Now we discuss the
possible range of n.
E
E
I
I
P We have assumed that the problem constraints A x = b , A x 6 b imply that s1 6
i xi 6 s2 , where the bounds s1 , s2 on the sum of x are found by solving the linear
programs (1.2). So any integral vector that satisfies the constraints exactly, i.e. is in C(0),
must have a sum n between n1 = ds1 e and n2 = bs2 c. We will use a slight modification of
this definition
n1 , ds1 e, n2 , ds2 e.
(4.2)
With n∗ defined by (3.2), we have n1 6 n∗ 6 n2 . We may assume without loss of generality
that n1 6 n2 + 1; otherwise all count vectors sum to a known n, and we reduce to the case
of frequency vectors which was studied in [OG16].
Remark 4.1 There is a certain degree of arbitrariness (or flexibility) in the definitions
of n1 , n2 . Setting n1 = ds1 e, n2 = bs2 c says that the allowable sums are those of count
vectors which belong to C(0); it does not say that the only allowable vectors are those in
C(0). Now it could be argued that after introducing the tolerance δ, the numbers n1 , n2
should be allowed to become functions of δ. However, this would introduce significant
extra complexity. Our definition makes concessions to simplicity by restricting somewhat
the allowable sums, and by slightly adjusting the value of n2 to handle the ‘boundary’ case
bs2 c < s∗ 6 s2 more easily.
Having defined the range of allowable sums n as n1 6 n 6 n2 , we will use the (disjoint)
unions of the sets (4.1) over n ∈ {n1 , . . . , n2 }
P
An1 :n2 (δ, η) , {ν| i νi = n, n1 6 n 6 n2 , ν ∈ C(δ), G(ν) > (1 − η)G∗ } ,
P
(4.3)
Bn1 :n2 (δ, η) , {ν| i νi = n, n1 6 n 6 n2 , ν ∈ C(δ), G(ν) < (1 − η)G∗ } .
Irrespective of δ and η we have
An1 :n2 (δ, η) ] Bn1 :n2 (δ, η) = Nn1 :n2 ∩ C(δ).
18
(4.4)
We note the following relationship among the numbers of realizations of the optimal count
vector ν ∗ and those of the sets An1 :n2 (δ, η) and Bn1 :n2 (δ, η): if ν ∗ ∈ An1 :n2 (δ, η), then
#ν ∗
#Bn1 :n2 (δ, η)
>
1
ε
⇒
#An1 :n2 (δ, η) + # Bn1 :n2 (δ, η)
#An1 :n2 (δ, η)
#An1 :n2 (δ, η)
#(Nn1 :n2 ∩ C(δ))
ν∗
6
1+ε ⇒
>
1
1+ε
> 1 − ε.
(4.5)
w.r.t. realizations, then the
In other words, if the single vector
dominates the set Bn1 :n2
set An1 :n2 dominates the set Nn1 :n2 ∩ C(δ) likewise.
The concentration statement GC in §1 says that given δ, ε, η > 0, there is a number
ĉ = ĉ(δ, ε, η) > 1 such that when the data bE , bI are scaled by any factor c > ĉ, then
ν ∗ ∈ An1 :n2 (δ, η)
and
#ν ∗
1
> .
#Bn1 :n2 (δ, η)
ε
(4.6)
We establish the inequality in (4.6) by finding a lower bound on #ν ∗ in §4.1 and an upper
bound on #Bn1 :n2 (δ, η) in §4.2. Theorem 4.1 presents the ratio of these bounds. Then in
§4.3 we find the concentration threshold ĉ that ensures (4.6); that is given by Theorem 4.2.
Table 4.1 describes our notation for the process of scaling the problem data.
Basic quantities
x∗ 7→ cx∗
s1 , s2 , s∗ 7→ cs1 , cs2 , cs∗
G∗ 7→ cG∗
ϑ∞ 7→ cϑ∞
Derived quantities
ν∗
n1 , n2 , n∗
Table 4.1: The data scaling process b 7→ cb. The symbols x∗ , s1 , s2 , . . . on the left denote quantities before scaling. The symbols ν ∗ , . . . on the right are quantities derived from the scaled basic
quantities.
4.1
Realizations of the optimal count vector
∗
∗
m
In this section we find a lower bound on #ν ∗ = ν1ν ∗+···+ν
where ν ∗ is the m-vector of
∗
1 ,...,νm
Definition 3.1, in terms of quantities related to the generalized entropy.
Like the number of realizations of a frequency vector and its entropy, the number of
realizations #ν of a count vector ν is related to its generalized entropy. Given ν ∈ Nm ,
w.l.o.g. let ν1 , . . . , νk , k > 1 be its non-zero elements; then
√
k
n
1
− 12
G(ν)
G(ν)
e
S(ν)e
6 #ν 6 S(ν)e
,
S(ν) ,
.
(4.7)
√
(k−1)/2
ν1 · · · νk
(2π)
19
This follows immediately from eq. (III.6) in [OG16], or Problem 2.2 in [CK11]; the bounds
hold even when k = 1 and #ν = 1. Since ν ∗ has no 0 elements (Remark 2.1) we can take
k = m in (4.7), so
∗
#ν ∗ > e−m/12 S(ν ∗ )eG(ν ) .
(4.8)
Next we want to bound G(ν ∗ ) in terms of G∗ = G(x∗ ). By Proposition 3.4, kν ∗ −x∗ k∞ 6 1.
If we assume that x∗ > 1, Lemma 2.1 applies to ν ∗ and x∗ and we get
x∗ > 1
G(ν ∗ ) > G∗ −
⇒
X
ln
i
1
1 X 1
m
−
.
−
χ∗i
2
x∗i − 1 s∗ /m − 1
(4.9)
i
Returning to (4.8), it remains to find a convenient lower bound for S(ν ∗ ). Since kν ∗ −
x∗ k∞ 6 1, we can use νi∗ 6 x∗i + 1 in (4.7) to obtain
√
Y
s∗
1
∗
p ∗
.
(4.10)
S(ν ) >
(m−1)/2
(2π)
xi + 1
16i6m
[Another, simpler bound, is obtained by noting that ν1 ν2 · · · νm is maximum when all νi
are equal to n/m. The bound (4.10) is generally better, but can become slightly worse in
some exceptional situations.] Putting (4.10) and (4.9) in (4.8),
√
m
m
1
−m/12 s∗ − 1 Pm
Y
−
e
χ∗i
∗
∗
∗
i=1 x −1
2
s /m−1
i
p
#ν ∗ >
eG
e
∗
(m−1)/2
(2π)
xi + 1
, if x∗ > 1
(4.11)
i=1
∗
, C0 (x∗ )eG .
The form of C0 (x∗ ) is convenient for scaling according to Table 4.1.
Remark 4.2 On the condition x∗ > 1. It is certainly possible to formulate MaxGEnt
problems whose solutions have some elements that are smaller than 1, in fact arbitrarily
close to 0, and thus invalidate (4.9) and (4.11). Here however we are dealing with ‘large’
problems, where x∗ is scaled by c > 1 for concentration to arise; see Theorem 4.2 below. So
one way to deal with such problem formulations is to take as “the problem” a certain prescaling of the original, one might say pathological, problem. Nevertheless, if one wanted
to avoid the x∗ > 1 issue entirely, one could use a weaker bound than (4.9) not subject to
this restriction; see, for example, Remark 4.3.
Remark 4.3 We compare the bound (4.9), derived for count vectors, to one adapted from
a bound for density vectors. In [OG16], proof of Proposition III.1, we derived the bound
3m
3m
∗
∗
H(f ) > H(χ ) − ∗ ln(m − 1) − h
(4.12)
8s
8s∗
20
where h(·) is the binary entropy function; there we had n in place of s∗ . [This is based on
the bound |H(χ) − H(ψ)| 6 21 kχ − ψk1 ln(m − 1) + h 21 kχ − ψk1 ; see [CK11] problem
3.10, or [Zha07]. An improved version, using both the `1 and `∞ norms is in [Sas13].]
By multiplying both sides of (4.12) by n∗ and then using the fact that n∗ H(f ∗ ) = G(ν ∗ ),
n∗ > s∗ , and s∗ G(χ∗ ) = G(x∗ ) , G∗ , we obtain
3m
3m
∗
∗
∗
ln(m − 1) − s h
.
(4.13)
G(ν ) > G −
8
8s∗
One way to compare the bounds (4.9) and (4.13) is to ask how the right-hand sides, apart
from the G∗ term, behave under scaling
P of the problem by c (§3.3): we see that as c
increases, the r.h.s. of (4.9) tends to − i ln(1/χ∗i ) while the r.h.s. of (4.13) goes to −∞.
4.2
Realizations of the sets with smaller entropy
Here we derive upper bounds on the number of realizations of the sets Bn (δ, η) and
Bn1 :n2 (δ, η). By combining them with the lower bound on #ν ∗ of §4.1, we establish our
first main result, Theorem 4.1.
From (4.1) and (4.7),
X
X
∗
#Bn (δ, η) 6
S(ν),
S(ν)eG(ν) 6 e(1−η)G
ν∈Nn ∩C(δ), G(ν)<(1−η)G∗
ν∈Nn
where in going from the 1st to the 2nd inequality we ignored all the constraints. Using
(4.7) and proceeding as in [OG16], proof of Lemma III.1,
√
m
X
X
m
n
1
(1−η)G∗
#Bn (δ, η) 6 e
√
(k−1)/2
k (2π)
ν1 · · · νk
ν1 +···+νk =n
k=1
√
Z
m
X
m
n
dx1 · · · dxk
∗
6 e(1−η)G
√
(k−1)/2
x
+
·
·
·
+
x
=
n
1
k
k (2π)
x1 · · · xk
k=1
x1 , . . . , xk > 0
(4.14)
√
m
k/2
X
m
n
π
∗
= e(1−η)G
nk/2−1
k (2π)(k−1)/2 Γ(k/2)
k=1
m
X
p
m
n k/2
1
(1−η)G∗
= e
.
2π/n
2
Γ(k/2)
k
k=1
m/2
We show in the Appendix §A that the sum in the last line above is bounded by (n/2)
Γ(m/2) 1+
p
p
m
m
m/n . This is better than the 4 1 + n/4
bound for the same sum obtained in
[OG16], proof of Lemma III.1, as it is asymptotically tight (m fixed, n → ∞). Using this
improved bound in (4.14),
m
p
(n/2)m/2
∗p
#Bn (δ, η) < e(1−η)G 2π/n
(4.15)
1 + m/n .
Γ(m/2)
21
We now turn to the set Bn1 :n2 (δ, η) defined in (4.3). By (4.15),
X
#Bn (δ, η)
#Bn1 :n2 (δ, η) =
n1 6n6n2
(1−η)G∗
<e
√
m
X
p
1 n m2
2π
√
1 + m/n .
Γ(m/2) n 6n6n n 2
1
2
Bounding the sum in the 2nd line by an integral,
Z s2 +2
X
√ m
√ m
1 √
1 √
1
1
√
n + m 6 m/2
y + m dy
√
m/2
y
n
2
2
s1
n1 6n6n2
√
√ m+1
√ m+1
√
1
1
s2 + 2 + m
s1 + m
= m/2−1
−
m+1
2
where in the first line we have widened the interval of integration from [n1 , n2 + 1] to
[s1 , s2 + 2]; recall the definition (4.2) of n1 , n2 . Therefore
∗
#Bn1 :n2 (δ, η) < C1 (s1 , s2 )e(1−η)cG ,
√
√
√ m+1
√ m+1
√
π
C1 (s1 , s2 ) ,
s
+
2
+
m
−
s
+
m
,
2
1
(m + 1)2(m−3)/2 Γ(m/2)
(4.16)
where the sums s1 , s2 have been defined in (1.2).
By combining (4.11) and (4.16) we arrive at our first main result, a lower bound on
the ratio of the number of realizations of the optimal count vector ν ∗ to those of the set
Bn1 :n2 (δ, η), of count vectors with generalized entropy η-far from G∗ = G(x∗ ):
Theorem 4.1 Given structure matrices AE , AI and data vectors bE , bI , let (x∗ , s1 , s2 ) be
the optimal solution to problem (1.1), (1.2). Assume that x∗ > 1; recall Remark 4.2. Then
for any δ, η > 0,
#ν ∗
(m + 1)e−m/12 Γ(m/2) C2 (x∗ )C4 (x∗ ) ηG∗
e
>
m
#Bn1 :n2 (δ, η)
C3 (s1 , s2 )
2π 2
where the constants are
√
χ∗
p ∗i
,
xi + 1
16i6m
1 X
1
m
C4 (x∗ ) = exp −
−
,
2
x∗i − 1 s∗ /m − 1
16i6m
m+1
√
√
√
√ m+1
C3 (s1 , s2 ) =
m + s2 + 2
−
m + s1
.
C2 (x∗ ) =
s∗
Y
One use of the theorem is when the problem is already ‘large’ enough and doesn’t
require further scaling. Then one may substitute appropriate values for δ and η and see
what kind of concentration is achieved. Note that the concentration tolerance ε does not
appear in the theorem.
22
4.3
The scaling factor needed for concentration
What happens to the lower bound of Theorem 4.1 as the size of the problem increases? In
this section we establish Theorem 4.2, our first concentration result, which shows that the
bound can exceed 1/ε for any given ε > 0.
Introducing into the bound of Theorem 4.1 a scaling factor c > 1,
(m + 1)e−m/12 Γ(m/2) C2 (cx∗ )C4 (cx∗ ) cηG∗
#ν ∗
>
e
.
m
#Bn1 :n2 (δ, η)
C3 (cs1 , cs2 )
2π 2
(4.17)
To facilitate scaling, we develop bounds on the functions C2 , C3 , C4 of c appearing above.
First,
√
√
Y
Y
s∗
s∗
χ∗i
χ∗
∗
p ∗
p ∗i
C2 (cx ) = (m−1)/2
> (m−1)/2
, c > 1,
(4.18)
c
c
xi + 1
xi + 1/c
16i6m
16i6m
since χ∗ is invariant under scaling, and the first product above increases as c %. Next,
writing C3 as
p
p
p
m+1
√ m+1
m/c + s2 + 2/c
−
m/c + s1
,
C3 (cs1 , cs2 ) = c(m+1)/2
it can be shown that the function of c multiplying c(m+1)/2 above decreases as c %4.1 , so
its maximum occurs at c = 1. Thus
√
m+1
√
√
√ m+1
C3 (cs1 , cs2 ) 6 c(m+1)/2
m + s2 + 2
−
m + s1
, c > 1.
(4.19)
Finally, for C4 (cx∗ ),
1
m
1 X
1
1 X
1
1 X
−
>
−
>
−
,
−
∗
∗
∗
∗
2
cxi − 1 cs /m − 1
2
cxi − 1
2
xi − 1
16i6m
16i6m
16i6m
since x∗ > 1 and c > 1, and so
− 12
C4 (cx∗ ) > e
Pm
1
i=1 x∗ −1
i
.
(4.20)
Putting (4.18), (4.19), and (4.20) into (4.17), if x∗ > 1,
#ν ∗
∗
> Bc−m ecηG ,
#Bn1 :n2 (δ, η)
(4.21)
where the constant
√ Q
χ∗
P
s∗ 16i6m √ ∗i
1
xi +1
− 12 m
(m + 1)Γ(m/2)e−m/12
i=1 x∗ −1
i
B ,
e
m
√
√
√
√ m+1
m+1
2π 2
m + s2 + 2
−
m + s1
4.1
After some algebra, its derivative can be shown to be negative if s2 > s1 .
23
is 1. By (4.6), the scaling factor c to be applied to the original problem must be such
that the r.h.s. of (4.21) is > 1/ε, and also such that ν ∗ belongs to An1 :n2 (δ, η). The first
of these requirements translates into
cηG∗ − m ln c > − ln(εB),
(4.22)
If c1 is the largest of the two solutions of the equality version of (4.22)4.2 , the inequality
(4.22) will hold for all c > c1 .
The second requirement on c, that ν ∗ ∈ An1 :n2 (δ, η), which is really ν ∗ ∈ An∗ (δ, η),
has two parts. For the first part we need ν ∗ ∈ C(δ); by Proposition 3.1 this is ensured by
kν ∗ − cx∗ k∞ 6 δcϑ∞ , and since the l.h.s. is 6 1 by Proposition 3.4, this will hold if c > c2
where
1
c2 ,
.
(4.23)
δϑ∞
For the second part we need c to be s.t. G(ν ∗ ) > (1 − η)cG∗ . By Proposition 3.2 and (4.9),
this is ensured by
X
1
1 X
m
1
cG∗ −
ln ∗ −
−
> (1 − η)cG∗
χi
2
cx∗i − 1 cs∗ /m − 1
16i6m
16i6m
X
1 X
1
1
⇐
+
ln ∗ < cηG∗ ,
∗
2
cxi − 1
χi
16i6m
16i6m
X
1 X
1
1
⇐
(4.24)
+
ln ∗ 6 cηG∗ ,
∗
2c
xi − 1
χi
16i6m
16i6m
where the last implication follows from c > 1 and x∗ > 1. So we need c > c3 , the largest
solution of the (quadratic) equation version of (4.24).
Given tolerances δ, ε, η, we have now established how to compute a lower bound ĉ, the
concentration threshold , on the scaling factor required for concentration to occur around
the point ν ∗ or in the set An1 :n2 , to the extent specified by δ, ε, η. This is our second main
result, which establishes the statement GC in §1 concerning deviation from the value G∗ :
Theorem 4.2 With the conditions of Theorem 4.1, for any δ, ε, η > 0, define the concentration threshold
ĉ , max(c1 , c2 , c3 ),
where c1 , c2 , c3 have been defined in (4.22)-(4.24). Then when the data bE , bI is scaled by
a factor c > ĉ, the count vector ν ∗ of Definition 3.1 belongs to the set An1 :n2 (δ, η) and we
have
1
#An1 :n2 (δ, η)
#ν ∗
>
and
> 1 − ε,
#Bn1 :n2 (δ, η)
ε
#(Nn1 :n2 ∩ C(δ))
where n1 = dcs1 e, n2 = dcs2 e, and the sets An1 :n2 , Bn1 :n2 have been defined in (4.3).
4.2
An equation of this type generally has two roots, one small and one large. For example ex /x = 10 has
roots 0.1118 and 3.577.
24
Note that the constraint information AE , bE , AI , bI appears implicitly, via s1 , s2 , and ϑ∞ .
The various sets figuring in the theorem are depicted in Figure 4.1.
kν − x∗ k∞ 6 δϑ∞
Nn1 :n2 ∩ C(δ)
Bn1 :n2 (δ, η)
x∗
ν∗
G(ν) < (1 − η)G∗
An∗ (δ, η)
An1 :n2 (δ, η)
G(ν) > (1 − η)G∗
Figure 4.1: The outer ellipse, the set Nn1 :n2 ∩ C(δ) of count vectors that satisfy the constraints
to within tolerance δ, is partitioned into Bn1 :n2 , shown in gray, and An1 :n2 , the inner white ellipse.
The relationship shown between kν − x∗ k∞ 6 δϑ∞ and An1 :n2 (δ, η) is not the only one possible.
Likewise for x∗ and An∗ (δ, η).
4.3.1
Bounds on the concentration threshold
It is useful to know something about how the threshold ĉ depends on the solution x∗ , G∗ to
the MaxGEnt problem and on the parameters δ, ε, η, without having to solve equations.
We derive some bounds on ĉ with regard to convenience, not tightness4.3 .
If ci > Li , then ĉ = maxi ci > maxi Li . Hence we have the lower bound
ĉ > max
− ln(εB)
ηG∗
,
1
,
δϑ∞
(4.25)
since c1 must be bigger than the first term on the r.h.s., and c2 equals the second. As
intuitively expected, the bound says that the smaller δ, ε, or η are, the more scaling we
need. By looking at the expression for B after (4.21), we see that the same holds the
farther apart the bounds s1 , s2 on the possible sums are from each other; this accords with
intuition, and we discuss it further in Example 4.2.
Next, if ci 6 Ui , then maxi ci 6 maxi Ui . So
sP
m
∗
2m
m − ln(εB) ln(εB) 1
i=1 1/(xi − 1)
ĉ 6 max
ln
−
,
,
,
(4.26)
ηG∗
ηG∗
ηG∗ δϑ∞
2ηG∗
where the expressions on the r.h.s. are upper bounds on c1 , c2 , c3 , respectively, as shown
in the Appendix4.4 . The upper bound says that the larger G∗ is, the less scaling we need;
likewise for the elements of x∗ . Both of these implications agree with intuition. Further
illustrations of the bounds (4.25) and (4.26) are in Example 4.1.
4.3
4.4
The bounds still require knowing the solution x∗ to the MaxGEnt problem.
Concerning the last expression, recall our assumption x∗ > 1 and Remark 4.2.
25
4.4
Examples
We give two examples. The first continues Example 3.1, illustrates the bounds on the concentration threshold, and points out a, at first sight, surprising behavior of the threshold.
The second example illustrates an intuitively-expected relationship between concentration
and the bounds s1 , s2 .
Example 4.1 Returning to Example 3.1, we find
s1 = 21.5, s2 = 37.5, x∗ = (6.591, 5.326, 13.26, 1.120, 2.253, 2.789), s∗ = 31.34, G∗ = 47.53.
Thus ν ∗ = (7, 5, 14, 1, 2, 3) and n∗ = 32. Also, ϑ∞ = 2.9. Table 4.2 shows what happens
when the problem data b is scaled by the factor ĉ dictated by the given δ, ε, η. [We don’t
use a special notation for the quantities appearing in the unscaled vs. the scaled problem,
so whenever we write x∗ , ν ∗ , bE , etc. a scaling factor, which could be 1, is implied.]
η
0.05
0.02
0.01
ĉ
34.48
91.27
191.9
0.05
0.02
0.01
40.25
106.8
222.9
δ ∈ [0.01, 1], ε = 10−9
b
n1
n∗
(362.1,631.0,300.0,137.9)
880
1081
(958.3,1670,794.0,365.1)
2328 2861
(2015,3512,1670,767.7)
4894 6015
δ ∈ [0.01, 1], ε = 10−15
(422.7,736.6,350.2,161.0)
1027 1262
(1121.3,1954.3,929.1,427.2)
2724 3347
(2340.2,4078.6,1939.0,891.5) 5684 6985
n2
1294
3423
7197
ν∗
(227,184,457,39,78,96)
(602,486,1210,102,206,255)
(1265,1022,2545,215,433,535)
1510
4005
8358
(266,214,534,45,91,112)
(703,569,1416,120,241,298)
(1469,1187,2955,250,502,622)
Table 4.2: Scaling of the problem of Example 3.1 for the given δ, ε, η.
With respect to the discrete solution, in the first row of Table 4.2 for example, we
have kx∗ − ν ∗ k∞ = 0.370. Further, ν ∗ satisfies the equality constraints with tolerance
kAE ν ∗ − bE k∞ / min |bE | = 0.0033 and the inequality constraints with tolerance 0. We
see that the scaling factor ĉ is quite sensitive to η and rather insensitive to ε; this can
be surmised from (4.25). One way to interpret the scaling is as a change in the scale of
measurement of the data b, e.g. a change in the units. Then scaling by a larger factor
means choosing more refined units, and the above results show that the concentration
increases, as intuitively expected.
With respect to the bounds (4.25) and (4.26) on the threshold ĉ, for the first row of
the table with δ = 0.01, they yield ĉ ∈ [34.48, 41.87]. For δ ∈ [0.02, 0.05] they yield ĉ ∈
[25.1, 41.87]. For the second row, the bounds give ĉ ∈ [62.8, 116.2] for any δ ∈ [0.01, 0.05].
Now suppose that the problem data is pre-scaled by 34.5. Then for the first row the
bounds say that ĉ ∈ [1.0, 1.0], i.e. no further scaling is needed. For the second row,
Theorem 4.2 gives ĉ = 2.39 and the bounds give ĉ ∈ [2.23, 2.55]. So the original problem
had a threshold ĉ = 91.27, but when scaled by 34.5, the threshold becomes only ĉ = 2.39 <
91.27
34.5 = 2.64. Apparently, unlike the rest of the problem (Proposition 3.2), the concentration
26
threshold does not behave linearly with scaling: ĉ (34.5 × problem) < 34.5ĉ (problem). The
explanation for this at first sight disconcerting behavior is two-fold: first, Theorem 4.2 does
not say that ĉ is the minimum required scaling factor for a given problem; second, there
are many approximations involved in the derivation of ĉ, and many get better as the size
of the problem increases.
Example 4.2 Intuition says that the bounds s1 , s2 on the possible sums of the admissible
count vectors have something to do with concentration: if they are wide, concentration
should be more difficult to achieve. Suppose that, somehow, the MaxGEnt vector x∗
from which ν ∗ is derived remains fixed; then the wider the range s1 , s2 allowed by the
constraints, the larger should be the scaling factor required for ν ∗ to dominate. The bound
(4.25) agrees with this, due to the expression for B after (4.21). We now give a simple
situation in which the difference between s1 and s2 can increase while x∗ remains fixed.
Consider a 2-dimensional problem with box constraints b1 6 x1 6 b2 , b3 6 x2 6 b4 ,
depicted in Fig. 4.2. Then s1 = b1 + b3 , s2 = b2 + b4 and G is maximum at the upper right
corner of the box (Proposition 2.3). If we reduce b1 , b3 to b01 , b03 , the lower left corner of
the box moves down and to the left while the upper right corner remains fixed, as shown
in the figure. Thus we widen the bounds s1 , s2 while leaving s∗ , G∗ unchanged, and the
x2
kx − x∗ k 6 δϑ∞
kx − x∗ k 6 δϑ0∞
(b2 , b4 ) = x∗
(b1 , b3 )
(b01 , b03 )
x1
Figure 4.2: Reducing s1 while leaving s2 and x∗ unchanged.
problem with the new box constraints requires more scaling than the original problem.
The construction generalizes immediately to m dimensions, see §2.3.
5
Concentration with respect to distance from the MaxGEnt vector
In this section we provide results analogous to those of §4, but with the sets A, B formulated
in terms of the distance of their elements from the optimal vector x∗ , as measured by the
`1 norm. This is a more intuitive measure than difference in entropy. There are three main
results: Theorems 5.1 and 5.2, analogues of Theorems 4.1 and 4.2, and Theorem 5.3, an
27
optimized version of Theorem 5.2 that does not require specifying a δ. In various places
we reuse results and methods from §4, so the presentation here is more succinct.
For given n and δ > 0, we want to consider the count vectors in Nn that lie in C(δ)
and whose distance from x∗ is no more than ϑ > 0 in `1 norm, and those that lie in C(δ)
but are farther from x∗ than ϑ in `1 norm. The situation is less straightforward than with
frequency/density vectors. First, given two real m-vectors, the norm of their difference can
never be smaller than the difference of their norms, so it does not make sense to require
that this norm be too small5.1 . Second, we will be considering norms that can be large
numbers, especially after scaling of the problem, so it will not do to consider a fixed-size
region around x∗ . For these reasons, we define for ϑ > 0
An (δ, ϑ) , {ν ∈ Nn ∩ C(δ), kν − x∗ k1 6 |n − s∗ | + min(n, s∗ )ϑ},
Bn (δ, ϑ) , {ν ∈ Nn ∩ C(δ), kν − x∗ k1 > |n − s∗ | + min(n, s∗ )ϑ}.
(5.1)
This is more complicated that the definition for frequency vectors in [OG16], but here ϑ is
again a small number < 1. If n were equal to s∗ , (5.1) would say that the density vectors
f and χ∗ are such that kf − χ∗ k1 is 6 ϑ in An and > ϑ in Bn . In general, (5.1) says that
the norm of ν − x∗ is close to |n − s∗ |: if n 6 s∗ , the bound is s∗ − (1 − ϑ)n, and if n > s∗
it is n − (1 − ϑ)s∗ .
We will consider the (disjoint) unions of the sets (5.1) over n ∈ {n1 , . . . , n2 }, with n1 , n2
given by (4.2):
X
An1 :n2 (δ, ϑ) , ν |
νi = n, n1 6 n 6 n2 , ν ∈ C(δ), kν − x∗ k1 6 |n − s∗ | + min(n, s∗ )ϑ ,
i
X
Bn1 :n2 (δ, ϑ) , ν |
νi = n, n1 6 n 6 n2 , ν ∈ C(δ), kν − x∗ k1 > |n − s∗ | + min(n, s∗ )ϑ .
i
(5.2)
∩ C(δ), the set of count vectors that sum to a
For any δ, ϑ, these two sets partition Nn1 :n2
number between n1 and n2 and lie in C(δ).
With these definitions, we will establish an analogue of (4.6) in §4: given δ, ε, ϑ > 0,
there is a concentration threshold ĉ = ĉ(δ, ε, ϑ) s.t. if the problem data bE , bI is scaled by
any factor c > ĉ, then the MaxGEnt count vector ν ∗ is in the set An1 :n2 (δ, ϑ) and has at
least 1/ε times the realizations of all vectors in the set Bn1 :n2 (δ, ϑ):
ν ∗ ∈ An1 :n2 (δ, ϑ)
and
#ν ∗
1
> .
#Bn1 :n2 (δ, ϑ)
ε
(5.3)
There is one important difference with §4, that here the tolerances δ and ϑ cannot be
chosen independently of one another, they must obey a certain restriction.
5.1
In the case of frequency vectors, this lower bound is 0. See Proposition 5.1 for more details.
28
Remark 5.1 G∗ is the maximum of G over the domain C(0), with no tolerances on the
constraints. As we said in §3.1, a tolerance δ > 0 widens this domain to C(δ), may move
the vector that maximizes G from x∗ (0) to x∗ (δ), and may change the maximum value
from G∗ (0) to G∗ (δ). Here we are looking for concentration in a region of size ϑ around the
point x∗ . If δ is too large, we cannot expect such a region to dominate the count vectors
in C(δ) w.r.t. the number of realizations, since x∗ (δ) may even lie inside the set B(δ, ϑ);
by Proposition 2.3, it already lies on the ‘boundary’ of C(0). If ϑ is given, concentration
in A(δ, ϑ) requires an upper bound on the allowable δ; see (5.8) below.
In the setting of §4 there is no limitation on the magnitude of δ with respect to that of
η. It is perfectly fine if the set An (δ, η) contains ν with G(ν) > G∗ (0), but not if Bn (δ, η)
does. But Bn (δ, η) can’t contain any such ν by its definition (4.1): if there are any such ν,
all of them have to be in An (δ, η).
5.1
Realizations of the sets far from the MaxGEnt vector
To bound the number of realizations of Bn1 :n2 (δ, ϑ) we need to show that if ν is far from
x∗ , in the kν − x∗ k1 sense, then G(ν) is far from G(x∗ ). To simplify the notation, in this
section we denote x∗ (0), χ∗ (0), G∗ (0) simply by x∗ , χ∗ , G∗ .
We first need an auxiliary relationship between the norm of the difference of two real
vectors and the norm of the difference of their normalized versions:
Proposition 5.1 Let k · k be any vector norm, such as k · k1 , k · k2 , k · k∞ etc. Then for
any x, y ∈ Rm and ϑ > 0,
kx − yk > |kxk − kyk| + ϑ
x
ϑ
y
>
−
.
kxk kyk
min(kxk, kyk)
⇒
What we want to show about G(ν) and G∗ follows by taking Lemma 3.1, bounding the
divergence term D(·k·) in terms of the `1 norm, and then using Proposition 5.1 with the
`1 norm and min(kνk, kx∗ k)ϑ in place of ϑ:
Lemma 5.1 Given δ > 0 and ϑ > 0, with the notation of Lemma 3.1, for any count vector
ν ∈ C(δ) with sum n,
kν − x∗ k1 > |n − s∗ | + min(n, s∗ )ϑ
where
γ∗ ,
In general, γ ∗ >
1
1 − β∗
ln
,
4(1 − 2β ∗ )
β∗
1
2
and
1−χ∗max
2
β∗ ,
⇒
max
G(ν) 6 G∗ + Λ∗ δ − γ ∗ ϑ2 n
I⊂{1,...,m}
X
X
min
χ∗i , 1 −
χ∗i .
i∈I
6 β ∗ 6 12 . If β ∗ = 1/2, γ ∗ , 1/2.
29
i∈I
The bound on the divergence that we used above, D(pkq) > γ(q)kp − qk21 , is due to
[OW05]. The closeness of the number β(q) to 1/2 can be thought of as measuring how far
away the density vector q is from having a partition5.2 . [BHK14] is also relevant here, as
the authors study inf p D(pkq) subject to kp − qk1 > `. They refer to 1 − β > 1/2, where
β is as in Lemma 5.1, as the “balance coefficient”. Their Theorem 1b provides an exact
value for inf p D(pkq) as a function of 1 − β, q, and `, valid for ` 6 4(1/2 − β); this could
be used in Lemma 5.1, at the expense of an additional condition between, in our notation,
ϑ and β ∗ . They also show that β > 1/2 − qmax /2, where qmax is the largest element of q,
a result which we have incorporated into Lemma 5.1.
We can now proceed to find an upper bound on #Bn1 :n2 (δ, ϑ). Beginning with #Bn (δ, ϑ),
by (5.1) and (4.7)
X
#Bn (δ, ϑ) 6
S(ν)eG(ν) .
ν ∈ Nn ∩ C(δ)
kν − x∗ k1 > |n − s∗ | + min(n, s∗ )ϑ
Applying Lemma 5.1 to G(ν) and, similarly to what we did in §4.2, ignoring the condition
involving the norm in the sum as well as the intersection with C(δ),
X
∗
∗
∗ 2
S(ν).
#Bn (δ, ϑ) 6 eG +Λ δ−γ ϑ n
ν∈Nn
The sum above is identical to that in the expression for #Bn (δ, η) given at the beginning
of §4.2, so following the development that led to (4.15),
#Bn (δ, ϑ) 6
p
p
m ∗ ∗ ∗ 2
(n/2)m/2
2π/n
1 + m/n eG +Λ δ−γ ϑ n .
Γ(m/2)
Compare with (4.15). Consequently,
X
#Bn1 :n2 (δ, ϑ) =
#Bn (δ, ϑ)
√
n1 6n6n2
X
√ m
1 √
2π
∗ 2
G∗ +Λ∗ δ
√
e
m + n e−γ ϑ n
m/2
n
2
Γ(m/2)
n1 6n6n2
√
2π
∗
∗
6 m/2
eG +Λ δ
2
Γ(m/2)
√
√
√ m+1 −γ ∗ ϑ2 (s∗ +1)
√ m+1 −γ ∗ ϑ2 s1
2
e
+
e
s2 + 2 + m
s∗ + 2 + m
(m + 1)
(5.4)
where the inequality implied in the last line is derived in the Appendix. This bound on
#Bn1 :n2 (δ, ϑ) is to be compared with the bound (4.16) on #Bn1 :n2 (δ, η).
6
5.2
In the sense of the NP-complete problem Partition.
30
Combining (4.11) with (5.4) we obtain a lower bound on the ratio of numbers of realizations analogous to that of Theorem 4.1:
Theorem 5.1 Given structure matrices AE , AI and data vectors bE , bI , let (x∗ , s1 , s2 ) be
the optimal solution of problem (1.1). Assume that x∗ > 1; recall Remark 4.2. Then for
any δ, ε, ϑ > 0,
(m + 1)Γ(m/2)e−m/12 C2 (x∗ )C4 (x∗ ) γ ∗ ϑ2 s1 −Λ∗ δ
#ν ∗
>
e
,
#Bn1 :n2 (δ, ϑ)
C30 (s∗ , s1 , s2 )
2π m/2
where the constants C2 (x∗ ), C4 (x∗ ) are the same as in (4.17),
√
√
√ m+1 −γ ∗ ϑ2 (s∗ +1)
√ m+1 −γ ∗ ϑ2 s1
C30 (s∗ , s1 , s2 ) =
s2 + 2 + m
e
+
s∗ + 2 + m
e
,
and Λ∗ , γ ∗ have been defined in Lemmas 3.1 and 5.1 respectively.
The lower bound will not be useful if the exponent γ ∗ ϑ2 s1 − Λ∗ δ is not positive. We
elaborate on this in §5.2. Also, like Theorem 4.1, the theorem says nothing about how
large the bound is for a given problem. This is the job of Theorem 5.2.
5.2
Scaling and concentration around the MaxGEnt count vector
As we did in §4.3, we now investigate what happens to the lower bound of Theorem 5.1
when the problem data b is scaled by a factor c > 1. The end results are the concentration
Theorems 5.2 and 5.3 below.
Table 4.1 described how scaling the data affects the quantities appearing in the bound,
except for Λ∗ , which is new to §5. Scaling b has the effect x∗ 7→ cx∗ , and from (2.4) in
§2.4 we see that the Lagrange multipliers remain unchanged5.3 . Then the definition of Λ∗
in Lemma 3.1 shows that the end result of scaling is Λ∗ 7→ cΛ∗ . This and s1 7→ cs1 imply
that scaling by c multiplies the exponent γ ∗ ϑ2 s1 − Λ∗ δ in Theorem 5.1 by c. The effect of
scaling on C2 and C4 is given by (4.18) and (4.20), and finally, since c > 1,
C30 (cs∗ , cs1 , cs2 ) <
√
√
√
√
m+1
∗ 2
∗ 2 ∗
∗ 2
c 2 ( s2 + 2 + m)m+1 e−γ ϑ e−cγ ϑ s + ( s∗ + 2 + m)m+1 e−cγ ϑ s1
√
√
√
√
m+1
∗ 2
∗ 2 ∗
∗ 2
6 c 2 e−cγ ϑ s1 ( s2 + 2 + m)m+1 e−γ ϑ e−γ ϑ (s −s1 ) + ( s∗ + 2 + m)m+1
m+1
∗ 2
, c 2 e−cγ ϑ s1 C300 .
(5.5)
In conclusion, when the data b is scaled by the factor c > 1, Theorem 5.1 says that if
x∗ > 1, then
#ν ∗
B0
∗ 2
∗
> 00 c−m e(2γ ϑ s1 −Λ δ)c ,
(5.6)
#Bn1 :n2 (δ, ϑ)
C3
This also follows from expression (A.8) in the proof of Lemma 3.1, for G∗ in terms of the multipliers
and G∗ 7→ cG∗ .
5.3
31
where C300 is defined in (5.5) and
B0 ,
(m + 1)Γ(m/2)e−m/12 √ ∗ − 12
s e
2π m/2
Pm
1
i=1 x∗ −1
i
Y
p
16i6m
χ∗i
.
x∗i + 1
(5.7)
(5.6) and (5.7) are to be compared with (4.21).
Recalling Remark 5.1, an important consequence of (5.6) is that if concentration is to
occur the tolerances δ and ϑ must satisfy
ϑ2 >
Λ∗
δ.
2γ ∗ s1
(5.8)
This can be ensured by choosing small enough δ for the given ϑ, or large enough ϑ for the
given δ. (The results of this paper do not immediately translate to the frequency vector
case, but (5.8) can be compared with the similar condition in Theorem IV.2 of [OG16].)
By (5.6), the concentration statement (5.3) will hold if the scaling factor c is such that
(2γ ∗ ϑ2 s1 − Λ∗ δ)c − m ln c > ln
C300
.
εB 0
(5.9)
This inequality is of the same form as (4.22), and will hold for all c greater than the larger
of the two roots of the equality version of it.
As in §4.3, we also need ν ∗ to be in the set An1 :n2 (δ, ϑ) of (5.2), more specifically in
An∗ (δ, ϑ). For this, we must first have ν ∗ ∈ C(δ); this is ensured by c > c2 , with c2 as
in (4.23). Second, by the definition (5.1) of An (δ, ϑ), we need kν ∗ − x∗ k1 6 |n∗ − s∗ | +
min(n∗ , s∗ )ϑ; by Proposition 3.4 this will hold if ϑ > (3m/4 + 1)/(cs∗ ).
We have now established the desired analogue of Theorem 4.2, and proved the statement
GC of §1, in terms of distance from the MaxGEnt vector x∗ :
Theorem 5.2 With the same conditions as in Theorem 5.1, suppose that the tolerances
δ, ϑ satisfy (5.8), where Λ∗ , γ ∗ have been defined in Lemmas 3.1 and 5.1. Let
c1 ,
3m/4 + 1
,
ϑs∗
c2 ,
1
,
δϑ∞
and given ε > 0, let c3 be the largest root c of the equality version of (5.9). Finally, define
the concentration threshold
ĉ , max(c1 , c2 , c3 ).
Then when the data bE , bI is scaled by any c > ĉ, the MaxGEnt count vector ν ∗ of
Definition 3.1 belongs to the set An1 :n2 (δ, ϑ) of (5.2), specifically to An∗ (δ, ϑ), and is such
that
1
#An1 :n2 (δ, ϑ)
#ν ∗
>
and
> 1 − ε.
#Bn1 :n2 (δ, ϑ)
ε
#(Nn1 :n2 ∩ C(δ))
32
The second inequality in the claim of the theorem follows from the first by (4.5) in §4,
which holds whether the sets An1 :n2 and Bn1 :n2 are defined as they were in §4 or as they
were defined here. As in Theorem 4.2, the constraint information AE , bE , AI , bI appears
implicitly in Theorem 5.2, via s1 , s2 , and ϑ∞ . Bounds on the concentration threshold can
be derived similarly to §4.3.1.
Finally, Fig. 5.1 depicts the various sets involved in the definition of the threshold ĉ
appearing in the theorem.
Nn1 :n2 ∩ C(δ)
kν − x∗ k∞ 6 δϑ∞
Bn1 :n2 (δ, ϑ)
kν − x k1 > |n − s∗ | + min(n, s∗ )ϑ
∗
ν∗
x∗
An∗ (δ, ϑ)
An1 :n2 (δ, ϑ)
kν − x∗ k1 6 |n − s∗ | + min(n, s∗ )ϑ
Figure 5.1: Concentration around ν ∗ w.r.t. `1 norm. The MaxGEnt vector ν ∗ has 1/ε times
more realizations than the entire set Bn1 :n2 (δ, ϑ), shown in gray. The relationship we show between
kν − x∗ k∞ 6 δϑ∞ and An1 :n2 (δ, ϑ) is not the only one possible; likewise for x∗ and An∗ (δ, ϑ).
From the definition of ĉ in Theorem 5.2 we see that as δ increases, the constants c2
and c3 behave in opposite ways: c2 decreases but c3 increases. If one cares only about the
tolerances ε and ϑ, and does not care to specify a particular δ, this opens the possibility
of reducing ĉ by choosing δ so as to minimize the largest of c2 , c3 :
Theorem 5.3 Given ε, ϑ, suppose that
Λ > mϑ∞
∗
2
ϑ <
and
Λ∗
p
s∗ /m + 1 1
,
γ ∗ ϑ∞ s1
ε1/m
where the various quantities are as in Theorem 5.2. If so, the equation for δ
2γ ∗ ϑ2 s1 1
C 00
Λ∗
+ m ln δ = ln 3 0 +
− m ln ϑ∞
ϑ∞ δ
εB
ϑ∞
has a root δ0 ∈ 0, 2γ ∗ ϑ2 s1 /Λ∗ , and we define
ĉ , max
1
3m/4 + 1
,
.
δ 0 ϑ∞
ϑs∗
Then when the data bE , bI is scaled by any c > ĉ, the MaxGEnt count vector ν ∗ of
Definition 3.1 belongs to the set An∗ (δ0 , ϑ) of (5.1), and is such that
#ν ∗
1
>
#Bn1 :n2 (δ0 , ϑ)
ε
and
#An1 :n2 (δ0 , ϑ)
> 1 − ε.
#(Nn1 :n2 ∩ C(δ0 ))
33
In this situation a simple lower bound on the concentration threshold ĉ is
3m
H(χ∗ ) 1
ĉ > max
,
2γ ∗ ϑ∞ ϑ2 4s∗ ϑ
(5.10)
where for the first expression we used the upper bound on δ0 and Λ∗ > s∗ H(χ∗ ). The ratio
H(χ∗ )/γ ∗ is small for imbalanced distributions χ∗ , e.g. with a single dominant element,
in which case γ ∗ is large, and approaches 2 ln m for perfectly balanced ones. The bound
(5.10) says that ĉ increases with ϑ−2 , and this can be seen in Example 5.2 below.
5.3
Examples
The first two examples illustrate Theorems 5.2 and 5.3, while the third illustrates the
removal of 0s from the solution mentioned in §2.4 and the ‘boundary’ case in which the
MaxGEnt vector x∗ sums to the maximum allowable s∗ = s2 .
Example 5.1 We return to Example 4.1. Recall that
s1 = 21.5, s2 = 37.5, x∗ = (6.591, 5.326, 13.26, 1.120, 2.253, 2.789), s∗ = 31.34, G∗ = 47.53.
We have ϑ∞ = 2.9, γ ∗ = 0.5, and Λ∗ = G∗ = 47.53. The constraint (5.8) on δ and ϑ is
ϑ2 > 1.864δ. This means that if we want small ϑ, we must have a correspondingly small
δ, as we commented after (5.8). Table 5.1 lists various values of ĉ(δ, ε, ϑ) obtained from
Theorem 5.2.
ĉ
δ
0.001
10−4
10−5
0.001
10−4
10−5
0.001
10−4
10−5
10−4
10−5
10−5
ϑ
0.08
0.07
0.06
0.05
0.03
0.01
0.008
ε = 10−9
862.7
3448
34483
1322
3448
34483
2392
3448
34483
3448
34483
34483
60376
111472
ε = 10−15
989.2
3448
34483
1511
3448
34483
2722
3448
34483
3448
34483
34483
67351
123967
Table 5.1: Scaling of the problem of Example 4.1 for the given δ, ε, ϑ. The threshold ĉ does not
behave smoothly because of the max() in Theorem 5.2.
34
Example 5.2 Consider the same data as in Table 5.1, but with only ε, ϑ specified; we
don’t care about a particular δ, as long as it ensures that ν ∗ ∈ An∗ (δ, ϑ). With δ chosen
automatically by Theorem 5.3, Table 5.2 below shows that the concentration threshold ĉ
is significantly reduced.
ĉ
ϑ
0.08
0.07
0.06
0.05
0.04
0.03
0.01
0.008
ε = 10−9
704.4
933.5
1292
1896
3032
5548
55345
88189
ε = 10−15
793.4
1050
1450
2124
3387
6178
60991
97004
Table 5.2: The threshold ĉ for given ε, ϑ with optimal selection of δ = δ0 . Compare with Table
5.1.
The variation of ĉ with ϑ−2 implied by the lower bound (5.10) is evident.
Example 5.3 Fig. 5.2 shows four cities connected by road segments. We assume that
vehicles travelling from one city to another follow the most direct route, and that there is
no traffic from a city to itself.
4
1
3
2
Figure 5.2: Four cities connected by (bidirectional) road segments. Arrows indicate the constrained
directions.
The number of vehicles in city i is known, ui , which puts upper bounds on the number
that leaves each city; also, from observations we have lower bounds lij on the number of
vehicles on the road segments 2 → 3, 3 → 1, and 3 → 4. From this information we want
to infer how many vehicles travel from city i to city j, i.e. infer the 4 × 4 matrix of counts
0 v12 v13 v14
v21 0 v23 v24
v=
v31 v32 0 v34 .
v41 v42 v43 0
35
So suppose the constraints on v are
X
vii = 0,
vij 6 100, 120, 80, 90, v23 +v24 > 80,
v31 +v41 > 59,
v14 +v24 +v34 > 70,
j
where the last three reflect the “direct route” assumption. Then we have s1 = 139, s2 = 390.
We define the 12-element vector x for the MaxGEnt method as (v12 , v13 , v14 , v21 , v23 , v24 ,
. . . , v43 ). [Note that if we knew that all vehicles in a city leave the city, then we could
define a frequency matrix by dividing the matrix v by u1 + · · · + u4 and thus formulate a
MaxEnt problem.]
The MaxGEnt solution in matrix form is
0
33.333 33.333 33.333
40.0
0
40.0
40.0
v∗ =
27.765 26.118
0
26.118
31.235 29.382 29.382
0
with sum s∗ = s2 = 390 and maximum generalized entropy G∗ = 964.62 = Λ∗ , γ ∗ = 0.5.
So here we have the boundary case in which the sum of x∗ is the maximum possible.
(Problems involving matrices subject to constraints of the above type, for which analytical
solutions are possible, were studied in [Oik12].)
Applying Theorem 5.3 with ϑ = 0.04, ε = 10−15 the ‘optimal’ δ is δ0 ≈ 4.36 · 10−5 and
yields the threshold ĉ = 1166.45. Using a scaling factor c = 1167.0 results in the integral
matrix
0
38900 38900 38900
46681
0
46680 46680
ν∗ =
32401 30479
0
30479
36452 34289 34289
0
with sum n∗ = 455130 ∈ [162213, 455130]. This matrix has at least 1015 times the number
of realizations of the entire set B166213:455130 (4.36·10−5 , 0.04) defined in (5.2). To gain some
appreciation of what this means, it is not easy to determine the size of this set, but just
the particular subset of it
B455129 (0, 0.04) = {ν ∈ C(0), kν − x∗ k1 > 18206}
contains at least 2.768 · 1038 elements5.4 . For comparison, the whole of C(0) contains 1.274 ·
1056 count vectors. (We compute these numbers with the barvinok software, [VWBC05].
For B455129 we get a lower bound by using the stronger constraint |ν1 − x∗1 | > 18205 in
place of kν − x∗ k1 > 18206, which is hard to express.)
5.4
We have |455129 − 1167 · 390| + min(455129, 1167390) · 0.04 = 18206.16.
36
6
Conclusion
We demonstrated an extension of the phenomenon of entropy concentration, hitherto
known to apply to probability or frequency vectors, to the realm of count vectors, whose
elements are natural numbers. This required introducing a new entropy function in which
the sum of the count vector plays a role. Still, like the Shannon entropy, this generalized
entropy can be viewed combinatorially as an approximation to the log of a multinomial
coefficient. Our derivations are carried out in a fully discrete, finite, non-asymptotic framework, do not involve any probabilities, and all of the objects about which we make any
claims are fully constructible. This discrete, combinatorial setting is an attempt to reduce
the phenomenon of entropy concentration to its essence. We believe that this concentration
phenomenon supports viewing the maximization of our generalized entropy as a compatible
extension of the well-known MaxEnt method of inference.
Acknowledgments
Thanks to Peter Grünwald for his comments on a previous version of the manuscript, and
for many useful discussions on the subject.
A
Proofs
Proof of Proposition 2.1
Given a y > x, y can be reached from x by a sequence of steps each of which increases a
single coordinate, and the value of G increases at each step because all its partial derivatives
are positive. (The derivatives are 0 only at points x that consist of a single non-zero element;
a direct proof can be given for that case.)
0
For a more formal proof, we note that the directional derivative
u) of G at any
P G (ξ;
0
m
point ξ is > 0 in any direction u > 0: G (ξ; u) = ∇G(ξ) · u = i ui ln ξ1 +···+ξ
. So any
ξi
move away from ξ in a direction u > 0 will increase G. More precisely, by the mean value
theorem, for any y that can be written as x + u for some u > 0, there is a ξ on the line
segment from x to x + u s.t. G(x + u) − G(x) = ∇G(ξ) · u > 0. Finally, if some element of
u is strictly positive, then ∇G(ξ) · u > 0.
Proof of Proposition 2.2
1. To establish concavity it suffices to show that ∇2 G(x), the Hessian of G, is negative
semi-definite. We find
1
1
1
∇2 G(x) =
Um − diag
,...,
,
(A.1)
x1 + · · · + xm
x1
xm
37
where Um is a m × m matrix all of whose entries are 1. Given x, for an arbitrary
y = (y1 , . . . , ym ) we must have y T ∇2 G(x)y 6 0. To show this, first write ∇2 G(x) as
∇2 G(x) =
x + · · · + x
1
x1 + · · · + xm
1
m
,...,
Um − diag
.
x1 + · · · + xm
x1
xm
Now define ξi = xi /(x1 + · · · + xm ). Then y T ∇2 G(x)y 6 0 is equivalent to
2
(y1 + · · · + ym )2 6 y12 /ξ1 + · · · + ym
/ξm ,
(A.2)
2 /ξ is a convex
where the ξi are > 0 and sum to 1. But for fixed y, y12 /ξ1 + · · · + ym
m
function of ξ = (ξ1 , . . . , ξm ) over the domain ξ 0, and its minimum under the
constraint ξ1 + · · · + ξm = 1 occurs at ξi = yi /(y1 + · · · + ym ). So the least value of
the r.h.s. of (A.2) as a function of ξ1 , . . . , ξm is (y1 + · · · + ym )2 , and this establishes
(A.2).
T 2
For P
a given x we
P see that y ∇ G(x)y is 0 exactly at points y such that for all i,
xi / j xj = yi / j yj , i.e. iff y = cx for some c ∈ R.
2. The fact that the Hessian fails to be negative definite does not imply that G is not
strictly concave; negative definiteness is a sufficient, but not a necessary condition
for strict concavity.
It can be seen that G is not strictly concave because of the scaling or homogeneity
property 2.1 in §2.1: consider the distinct points x and y = 2x; strict concavity would
require G((x + y)/2) > G(x)/2 + G(y)/2, which is not true.
3. Proposition 1.1.2 in Chapter IV of [HUL96] says that a function F (x) is strongly
convex on a convex set C with modulus γ > 0 iff the modified function F (x)− 21 γkxk22
is convex on C. Applying this to our function G, by the proof carried out in part 1,
m
we would have to show that given any x ∈ Rm
+ , for all y ∈ R+
2
2
(y1 + · · · + ym )2 − (y12 /ξ1 + · · · + ym
/ξm ) + γ(y12 + · · · + ym
) 6 0
for the chosen modulus γ > 0. But for any x and any γ > 0, this condition is false
at the point y = γx.
4. By Definition 1.1.1 in [HUL96] Ch. V, §1.1, a convex and positively homogeneous
function F defined over the extended real numbers R ∪ {±∞} is sublinear. If we
define G(·) over all of Rm by setting G(x1 , . . . , xm ) = −∞ if any xi is negative, the
above statement applies to F = −G. Finally, a sublinear function has the property
F (αx + βy) 6 αF (x) + βF (y).
38
Proof of Lemma 2.1
By (2.2), if kx − yk∞ 6 ζ we have G(y) > G(x − ζ). Now we expand G(x − ζ) in a Taylor
series around x. Since G(·) is a twice-differentiable function on the open set x > ζ, if x, x0
are two points in this set, then there is a x̃ = (1 − α)x + αx0 with α ∈ [0, 1], such that
1
G(x0 ) = G(x) + ∇G(x) · (x0 − x) + (x0 − x)T · ∇2 G(x̃) · (x0 − x)
2
(Theorem 12.14 of [Apo74]). Set x0 = x − ζ, so x̃ = x − αζ. Noting that
x + ··· + x
x1 + · · · + xm
1
m
, . . . , ln
,
∇G(x) = ln
x1
xm
1
1
1
∇2 G(x̃) =
Um − diag
,...,
,
x̃1 + · · · + x̃m
x̃1
x̃m
X
m
1
(x0 − x)T · ∇2 G(x̃) · (x0 − x) = ζ 2
,
−
x̃1 + · · · + x̃m x̃i
i
where the second equality is (A.1) in the proof of Proposition 2.2, we find that for any
x>ζ
G(x − ζ) = G(x) − ζ
X
ln
1
x 1 + · · · + x m 1 2 X
m
− ζ
−
, (A.3)
xi
2
xi − αζ
kxk1 /m − αζ
i
i
where we know that the sum of the ζ and the ζ 2 terms on the right is negative. [We
chose to expand around the point x − ζ because then the sign of the terms ∇G(x) · ζ and
ζ T · ∇2 G(x̃) · ζ is known.] Now for fixed x define the function
g(α, ζ) ,
X
16i6m
m
1
−
,
xi − αζ
kxk1 /m − αζ
α ∈ [0, 1], ζ > 0, x > ζ.
(A.4)
This function is > 0 and increasing with α. To see that g(α, ζ) > 0, set ui = xi − αζ
so that kxk1 /m − αζ becomes the arithmetic mean ū of the ui ; then use a fundamental
property of the power means: for any u > 0, and any weights wi summing to 1,
X
wi u−k
i
−1/k
6
i
X
wi ui ,
k>1
(A.5)
i
(see [HLP97], Theorem 16). The desired result follows by choosing all wi = 1/m. To show
that g(α, ζ) increases with α,
X
ζ
∂g
mζ
=
−
2
∂α
(xi − αζ)
(kxk1 /m − αζ)2
i
39
and this is always > 0 by the same power means technique (A.5). [Similarly, ∂ 2 g/∂α2 > 0,
so g(α, ζ) is a convex function of α.] We therefore see that for any ζ > 0
min g(α, ζ) = g(0, ζ)
α∈[0,1]
and
max g(α, ζ) = g(1, ζ).
α∈[0,1]
(A.6)
It now follows from G(y) > G(x − ζ), (A.3), and (A.6) that for any x > ζ and any y s.t.
ky − xk∞ 6 ζ
G(y) > G(x) − ζ
X
i
ln
kxk1 1 2 X 1
m
− ζ
−
.
xi
2
xi − ζ
kxk1 /m − ζ
i
This establishes the lemma. The coefficient of ζ 2 above is > 0 and equals 0 iff all elements
of x are equal ([HLP97], Theorem 16).
Proof of Proposition 2.3
1. Suppose there is a ball around x∗ contained in C(0); then this ball will contain
points x∗ + u for sufficiently small u > 0, and by Proposition 2.1 we will have
G(x∗ + u) > G(x∗ ). But x∗ maximizes G over C(0), so there can be no such x∗ + u;
in other words, C(0) cannot contain any x > x∗ with any strict inequalities.
2. Let z be another point in C(0) such that G(z) = G(x∗ ); by part 1 above, at least one
element of z must be strictly less than the corresponding element of x∗ . But then by
Proposition 2.1 we must have G(z) < G(x∗ ).
Proof of Proposition 3.1
Consider the equality constraints first. Writing them as |AE y −bE | 6 δ|bE |, we see that this
E
E
E
will be satisfied if maxi |AE y − bE |i 6 δ mini |bE
i |, or kA y − b k∞ 6 δ|b |min . Now for any
m
E
E
E
E
E
y ∈ R , A y − b = A (y − x), since x ∈ C(0). Thus kA y − b k∞ = kAE (y − x)k∞ . But
kAE (y − x)k∞ 6 9AE 9∞ ky − xk∞ , where the (rectangular) matrix norm 9 · 9∞ is defined
as the largest of the `1 norms of the rowsA.1 . Therefore, to ensure kAE y − bE k∞ 6 δ|bE |min
it suffices to require that ky − xk∞ 6 δ|bE |min / 9 AE 9∞ , as claimed.
Turning to the inequality constraints, write them as AI (x + y − x) 6 bI + δ|bI |, or
I
A x−bI 6 AI (x−y)+δ|bI |. Since AI x−bI 6 0, this inequality will be satisfied if AI (y−x) 6
δ|bI |. This will certainly hold if maxi (AI (y − x))i 6 δ mini |bIi |, which is equivalent to
kAI (y − x)k∞ 6 δ|bI |min . In turn, this will hold if we require 9AI 9∞ ky − xk∞ 6 |bI |min .
For both types of constraints the final condition is stronger than necessary, but more
so in the case of inequalities. Finally, part 2 of the proposition follows from part 1 since
k[x] − xk∞ 6 1/2.
For any rectangular matrixPA and compatible vector x, kAxk∞ 6 9A 9∞ kxk∞ holds because the l.h.s.
is maxi |Ai. x|. This is 6 maxi j |aij xj | 6 maxi kxk∞ kAi. k1 = kxk∞ 9 A9∞ .
A.1
40
Proof of Proposition 3.2
P
From (2.4) we can write the elements of x∗ in the form x∗j = ( i x∗i ) Ej ,where Ej is an
expression involving the vectors λE , λBI and the matrices AE , ABI . The elements of λE , λBI
are determined by substituting the x∗j into the constraints. Thus the kth equality constraint
leads to an equation of the form
X
x∗i (expression involving the Ej ) = bE
(A.7)
k
i
and similarly for each binding inequality constraint. But the solution of a system of equations of the form (A.7) is unchanged if the x∗i on the l.h.s. and the bE and bBI on the r.h.s.
are both multiplied by the same constant c > 0. This establishes the first claim. The claim
about the maximum of G follows from property 2.1 of G in the list of §2.
Coming to the bounds on x1 + · · · + xm , the fact that they scale with b is just a
property P
of general linear programs. That is, if y is the solution to the
P linear program
m
m
minx∈R
i αi xi subject to Ax 6 b, then cy is the solution to minx∈R
i αi xi subject to
Ax 6 cb. Similarly for the maximum.
Proof of Proposition 3.3
For part 1, given AE x = bE , we have kAE xk1 = kbE k1 . Now, omitting the superscript to
simplify the notation,
kAxk1 = |a11 x1 + · · · + a1m xm | + |a21 x1 + · · · + a2m xm | + · · · + |a`1 x1 + · · · + a`m xm |
6 |a11 + a21 + · · · + a`1 ||x1 | + |a12 + a22 + · · · + a`2 ||x2 | + · · ·
6 9AT 9∞ kxk1 .
Hence 9(AE )T 9∞ kxk1 > kbE k1 , and since x > 0, kxk1 is simply the sum of the xi .
For part 2, any x ∈ Rm satisfying AE x = bE , AI x 6 bI will satisfy AE x 6 bE , AI x 6 bI
as well. Divide each inequality in this system by the smallest non-0 element of the l.h.s.,
if that element is < 1, otherwise leave the inequality as is. Since each xi appears in
some constraint, if we add all the above
the resulting l.h.s. will be
P inequalities
PbyI sides
E
E
I
> x1 + · · · + xm , and the r.h.s. will be i bi /αi + i bi /αi , where the αi are defined as
in the Proposition.
Proof of Proposition 3.4
First, the adjustment performed on ν̃ is always possible: if d < 0 there must be at least |d|
elements of n∗ χ∗ that were rounded to their floors, and if d > 0 to their ceilings. It is clear
that the adjustment makes ν ∗ sum to n∗ . Now suppose that k ∈ N and χ is an m-element
density vector; then kχ sums to k, and the sum of the rounded version [kχ] differs by no
more than m/2 from k. Thus d 6 m/2.
41
For the bound on kν ∗ − x∗ k1 , we first show that kν ∗ − n∗ χ∗ k1 6 3m/4. The adjustment
of ν̃ causes d of the elements of ν ∗ to differ from the corresponding elements of n∗ χ∗ by
< 1, and the rest to differ by 6 1/2, so kν ∗ − n∗ χ∗ k1 6 maxd (d + (m − d)/2) 6 3m/4.
Next,
kν ∗ − x∗ k1 = kν ∗ − s∗ χ∗ k1 6 kν ∗ − n∗ χ∗ k1 + kn∗ χ∗ − s∗ χ∗ k1 6 3m/4 + |n∗ − s∗ |,
since χ∗ sums to 1, and lastly |n∗ − s∗ | < 1 by (3.2).
That kν ∗ − x∗ k∞ 6 1 follows from this last statement and the fact that ν ∗ sums to n∗ .
Finally, the bound on kf ∗ − χ∗ k1 follows from that on kν ∗ − n∗ χ∗ k1 .
Proof of Lemma 3.1
For brevity, in this proof we denote G∗ (0), x∗ (0), χ∗ (0) simply by G∗ , x∗ , χ∗ .
E
E
BI
BI
Given the vector x∗ , set s∗ = x∗1 + · · · + x∗m . Then from (2.4), x∗j = s∗ e−(λ ·A.j +λ ·A.j ) .
Therefore
X
X
BI
x∗i ln x∗i =
x∗i ln s∗ − (λE · AE
· ABI
.i + λ
.i )
i
i
∗
= s ln s∗ −
X
BI
x∗i (λE · AE
· ABI
.i + λ
.i )
i
∗
∗
= s ln s − (λE · bE + λBI · bBI ),
since x∗ satisfies the equalities and the binding inequalities. Substituting the above in (2.1),
the maximum generalized entropy can be expressed in terms of the Lagrange multipliers
and the data as
G∗ = λE · bE + λBI · bBI .
(A.8)
This implies that the quantity Λ∗ is at least as large as G∗ , as claimed.
Now if σ is an arbitrary sequence with count vector ν, its probability under χ∗ is
Prχ∗ (σ) = (χ∗1 )ν1 · · · (χ∗m )νm
where χ∗j = e−(λ
E ·AE +λBI ·ABI )
.j
.j
Prχ∗ (σ) = e−ξ(ν) ,
. Therefore
where
ξ(ν) =
X
i
E
λE
i (Ai. · ν) +
X
BI
λBI
i (Ai. · ν).
(A.9)
i
The rest of the proof is analogous to that of Proposition II.2 in [OG16]. If ν is in C(δ),
then
E
E
E
E
BI
BI
bE
ABI
i − δ|bi | 6 Ai. · ν 6 bi + δ|bi |,
i. · ν 6 bi + δ|bi |.
Therefore from (A.9), noting that λBI > 0 but the λE
i can be positive or negative,
maxν∈C(δ) ξ(ν) 6 λE · bE + (|λE | · |bE |)δ + λBI · (bBI + δ|bBI |),
P
BI
minν∈C(δ) ξ(ν) > λE · bE − (|λE | · |bE |)δ + minν∈C(δ) i λBI
i (Ai. · ν).
42
(The | · | around λE cannot be removed.) Using (A.8) in the above,
maxν∈C(δ) ξ(ν) 6 G∗ + (|λE | · |bE | + λBI · |bBI |)δ,
P
BI
BI
minν∈C(δ) ξ(ν) > G∗ − (|λE | · |bE |)δ + minν∈C(δ) i λBI
i (Ai. · ν − bi )
= G∗ − (|λE | · |bE |)δ − ∆(C(δ)),
where
∆(C(δ)) , max
ν∈C(δ)
X
(A.10)
BI
BI
λBI
i (bi − Ai. · ν).
i
Finally, for any p.d. p and any n-sequence σ with count vector ν, Prp (σ) is given by the
expression in property 2.1 in §2.1. Comparing that with (A.9), ξ(ν) = G(ν) + nD(f kχ∗ ),
so by using (A.10)
G∗ − (|λE | · |bE |)δ − ∆(C(δ)) 6 G(ν) + nD(f | χ∗ ) 6 G∗ + (|λE | · |bE | + λBI · |bBI |)δ,
where f = ν/n, and the claim of the lemma follows.
Proof of inequality (4.15)
p
P
m k
Let y = n/2. The sum m
k=1 k y /Γ(k/2) can be found in closed form by noticing
that if it is split over even and odd k, each of the sums is hypergeometric. However, the
resulting expression is too complicated for our purposes. We will obtain a tractable bound
that matches the highest power of y in the sum, i.e. y m /Γ(m/2).
We need an auxiliary fact, relating Γ(k/2) for k < m to Γ(m/2). From Gautschi’s
inequality
p for the gamma function (see [OLBC10], 5.6.4) it follows that Γ((µ − 1)/2) >
Γ(µ/2)/ µ/2, for any µ > 1. Applying this recursively we find that for k > 1
m − k
2k/2 Γ(m/2)
Γ
>
1/2
2
m(m − 1) · · · (m − k + 1)
(A.11)
2k/2 Γ(m/2)
> k/2 −k(k−1)/(4m)
m e
where the 2nd line follows by using 1 − z < e−z , for z < 1, in the denominator of the first
line.
Now pulling out the last term of our sum, reversing the order of the other terms, and
43
applying (A.11) to each term, we get
m
m−1
X
X m m k/2
k(k−1)
m k 1
ym
1
y
y m−k e− 4m
<
+
k
Γ(k/2)
Γ(m/2) Γ(m/2)
m−k
2
k=1
k=1
m−1
m − k−1 k/2
ym X m
ym
e 2m
+
=
Γ(m/2) Γ(m/2)
k
2y 2
k=1
p
m
ym
ym
2
<
+
1 + m/(2y ) − 1
Γ(m/2) Γ(m/2)
m
p
m
(n/2) 2
1 + m/n ,
=
Γ(m/2)
where in going from the 2nd to
pthe 3d line
p last
m we ignored the exponential factor and the
term in the expansion of 1 + m/(2y 2 ) , and in the last line we substituted y = n/2.
The ratio of the sum and this last expression tends to 1 as n → ∞.
Proofs of inequality (4.26)
The first term is an upper bound on c1 . (4.22) is an inequality of the type x > α ln x + β,
with α, β > 0. We will show that if α + β > 1, this inequality is satisfied by x = 2α ln(α +
β) + β. [This expression is motivated by the method of successive substitutions: with
x0 = β, we get x2 = α ln(a ln β + β) + β; but this satisfies the inequality only if β < 1.]
Substituting into the inequality we get
(α + β)2 > 2α ln(α + β) + β
⇔
α+β >
α
β
2 ln(α + β) +
.
α+β
α+β
Therefore this will hold if α+β > max(2 ln(α+β), 1). Now we have assumed that α+β > 1,
and x > 2 ln x is always true for x > 0, so our claim is established. Turning to the case
α + β < 1, we can suppose that α < 1, otherwise we fall into the case α + β > 1. Then it
suffices to find a x that satisfies x > ln x + β, and that is so for x = 1.5β + ln β.
The third term in (4.26) is an upper bound on c3 . Write (4.24) as 21 Σ1 − cΣ2 6 c2 ηG∗ .
p
This will hold if c >
Σ22 + 2Σ1 ηG∗ − Σ2 /(2ηG∗ ), so the r.h.s. can be taken to be c3 . If
√
√
√
a, b > 0, which is guaranteed
by our assumption that x∗ > 1, then a + b < a + b, so
q
Pm
∗
√
i=1 1/(xi −1)
2Σ1 ηG∗ /(2ηG∗ ) =
is an upper bound on c3 .
2ηG∗
Proof of Proposition 5.1
To ease the notation, let kxk = s, kyk = t. First we show that
x y
−
6ϑ
s
t
⇒
|kx − yk − |s − t|| 6 min(s, t)ϑ.
44
(A.12)
We have
x y y y
x y
−
6ϑ⇔
−
−
6ϑ
+
s
t
s
s
t
s
1
1 1
⇔ kx − yk −
y 6ϑ
−
s
s
t
⇔ |kx − yk − |s − t|| 6 sϑ.
x y
y y
−
−
−
6ϑ
s
s
s
t
1
1 1
⇔ kx − yk − − t 6 ϑ
s
s
t
⇒
Exchanging x with y and s with t in this derivation, it also follows that
x y
6 ϑ ⇒ |kx − yk − |s − t|| 6 tϑ,
−
s
t
and this establishes (A.12). Now (A.12) implies that
x
y
6ϑ
−
kxk kyk
⇒
kx − yk 6 min(kxk, kyk)ϑ + |kxk − kyk|
and taking the contrapositive of this
kx − yk > min(kxk, kyk)ϑ + |kxk − kyk|
x
y
−
> ϑ,
kxk kyk
⇒
from which the claim of the proposition follows.
Proof of the inequality in (5.4)
This is an improvement over bounding the sum in the second line of (5.4) by simply pulling
∗ 2
out e−γ ϑ n1 and then bounding the rest by an integral. Splitting the sum around the point
n∗ ,
√ m
√
n2
X
( n + m) −γ ∗ ϑ2 n
√
e
6
n
n=n1
√ m
√ m
√
√
n2
n∗
X
X
( n + m)
( n + m)
−γ ∗ ϑ2 (n∗ +1)
−γ ∗ ϑ2 n1
√
√
+e
6
e
n
n
n=n1
n=n∗ +1
Z √n∗ +1
Z √s2 +2
√ m
√ m
−γ ∗ ϑ2 s1
−γ ∗ ϑ2 (s∗ +1)
2e
u
+
m
du
+
2e
u
+
m du,
√
√
n∗ +1
s1
since the summand is an increasing function of n. The last line can be written as
√
√ m+1 −γ ∗ ϑ2 s1
2
∗ 2 ∗
(e
− e−γ ϑ (s +1) )+
n∗ + 1 + m
m+1
√ m+1 −γ ∗ ϑ2 (s∗ +1)
√ m+1 −γ ∗ ϑ2 s1
√
2 √
s2 + 2 + m
e
−
s1 + m
e
m+1
and the desired result follows by neglecting the second exponential from each of the two
summands.
45
Proof of Theorem 5.3
We minimize the max of c2 (δ), c3 (δ) by setting them equal to each other. Substituting c2
for c into (5.9) which defines c3 , we get the equation for δ in the theorem:
2γ ∗ ϑ2 s1 1
Λ∗
C 00
− m ln ϑ∞ .
+ m ln δ = ln 3 0 +
ϑ∞ δ
εB
ϑ∞
(A.13)
Let f (δ) stand for the function of δ on the l.h.s. This function decreases for δ < 2γ ∗ ϑ2 s1 /
(mϑ∞ ). From the condition between ϑ and δ of Theorem 5.2, we must have δ < δmax =
2γ ∗ ϑ2 s1 /Λ∗ . So if 2γ ∗ ϑ2 s1 /(mϑ∞ ) > δmax , which will hold if Λ∗ > mϑ∞ , then f (δ) will
decrease with δ ∈ (0, δmax ). If f (δmax ) is less than the r.h.s. of (A.13) then (A.13) will
have a root δ0 ∈ (0, δmax ]. This condition on f (δmax ) boils down to
2γ ∗ ϑ∞ ϑ2 s1
Λ∗
m
C300
<
,
εB 0
or
ε
Λ∗
ϑ <
2γ ∗ ϑ∞ s1
1/m 2
C300
B0
1/m
.
(A.14)
To arrive at the condition of the theorem we find a simple lower bound on (C300 /B 0 )1/m .
From (5.5),
√
√
m+1
√ m+1
s∗ + 2 + m
>
s∗ + m + 2
.
C300 >
Therefore from (5.7)
m+1
√ ∗
2π m/2 em/12
s +m+2
C300
√
>
B0
(m + 1)Γ(m/2) s∗
√
m
2π m/2 em/12
>
s∗ + m + 2
(m + 1)Γ(m/2)
where in the first line we used the fact that the product of the last two factors in the
expression (5.7) for B 0 is < 1. It follows that
C300
B0
1/m
√
√
21/m πe1/12
s∗ + m + 2
>
((m + 1)Γ(m/2))1/m
√
√
21/m πe1/12 m p ∗
=
s /m + 1 + 2/m
((m + 1)Γ(m/2))1/m
p
> 2 s∗ /m + 1.
[To go from the 2nd to the 3d line, it can be shown that the first factor on the 2nd line is
an increasing function of m; its minimum occurs at m = 2 and is ≈ 2.22.] It follows that
condition (A.14) for the existence of the root δ0 will be satisfied if
ε1/m ϑ2 6
Λ∗ p ∗
s /m + 1,
γ ∗ ϑ∞ s1
46
as stated in the
theorem. Now since we have ensured c2 (δ0 ) = c3 (δ0 ), we can take ĉ =
max c2 (δ0 ), c1 , where c1 is as in Theorem 5.2.
Finally, it is quite likely that c2 (δ0 ) > c1 so that ĉ = c2 (δ0 ). Given that δ0 < δmax =
2γ ∗ ϑ2 s1 /Λ∗ and Λ∗ > mϑ∞ , it can be seen that this will be so if if ϑ < s∗ /(2γ ∗ s1 ).
References
[Apo74]
T.M. Apostol. Mathematical Analysis, 2nd Ed. Addison-Wesley, 1974.
[BHK14]
D. Berend, P. Harremoës, and A. Kontorovich. Minimum KL-divergence
on complements of L1 balls. IEEE Transactions on Information Theory,
60(6):3172–3177, 2014. Also http://arxiv.org/abs/1206.6544v8.
[BLM13]
S. Boucheron, G. Lugosi, and P. Massart. Concentration Inequalities: A
Nonasymptotic Theory of Independence. Oxford University Press, 2013.
[BV04]
S. Boyd and L. Vandenberghe. Convex Optimization. Cambridge, 2004.
[Cat12]
A. Caticha. Entropic Inference and the Foundations of Physics. In EBEB2012, the 11th Brazilian Meeting on Bayesian Statistics, 2012. Also http:
//arxiv.org/abs/1212.6967.
[CCA11]
A. Cichocki, S. Cruces, and S-I. Amari. Generalized Alpha-Beta Divergences
and Their Application to Robust Nonnegative Matrix Factorization. Entropy,
13:134–170, 2011.
[CK11]
I. Csiszár and J. Körner. Information Theory: Coding Theorems for Discrete
Memoryless Systems. Cambridge, 2nd edition, 2011.
[Csi91]
I. Csiszár. Why Least Squares and Maximum Entropy? An Axiomatic Approach
to Inference for Linear Inverse Problems. The Annals of Statistics, 19(4):2032–
2066, 1991.
[Csi96]
I. Csiszár. Maxent, Mathematics, and Information Theory. In K.M. Hanson
and R.N. Silver, editors, Maximum Entropy and Bayesian Methods, 15th Int’l
Workshop, Santa Fe, New Mexico, U.S.A., 1996. Kluwer Academic.
[CT06]
T.M. Cover and J.A. Thomas. Elements of Information Theory. J. Wiley, 2nd
edition, 2006.
[GC07]
A. Giffin and A. Caticha. Updating probabilities with data and moments. In
K.H. Knuth et al, editor, Bayesian Inference and Maximum Entropy Methods
in Science and Engineering, 28. AIP Conf. Proc. 954, 2007.
47
[Gr8]
P.D. Grünwald. Entropy Concentration and the Empirical Coding Game. Statistica Neerlandica, 62(3):374–392, 2008. Also http://arxiv.org/abs/0809.
1017.
[HLP97]
G.H. Hardy, J.E. Littlewood, and G. Pólya. Inequalities, 2nd Ed. Cambridge
University Press, 1997.
[HUL96]
J.B. Hiriart-Urruty and C. Lemaréchal. Convex Analysis and Minimization
Algorithms I. Springer-Verlag, 1996.
[Jay83]
E.T. Jaynes. Concentration of Distributions at Entropy Maxima. In R.D.
Rosenkrantz, editor, E.T. Jaynes: Papers on Probability, Statistics, and Statistical Physics. D. Reidel, 1983.
[Jay03]
E.T. Jaynes. Probability Theory: The Logic of Science. Cambridge University
Press, 2003.
[OG16]
K.N. Oikonomou and P.D. Grünwald. Explicit Bounds for Entropy Concentration under Linear Constraints. IEEE Transactions on Information Theory,
62:1206–1230, March 2016. Also http://arxiv.org/abs/1107.6004.
[Oik12]
K.N. Oikonomou. Analytical Forms for Most Likely Matrices Derived from
Incomplete Information. International Journal of Systems Science, 43:443–458,
March 2012. Also http://arxiv.org/abs/1110.0819.
[OLBC10] F.W. Olver, D.W. Lozier, R.F. Boisvert, and C.W. Clark, editors. NIST Handbook of Mathematical Functions. Cambridge University Press, 2010.
[OS06]
K.N. Oikonomou and R.K. Sinha. Network Design and Cost Analysis of Optical
VPNs. In Proceedings of the OFC, Anaheim, CA, U.S.A., March 2006. Optical
Society of America.
[OW05]
E. Ordentlich and M.J. Weinberger. A Distribution-Dependent Refinement of
Pinsker’s Inequality. IEEE Transactions on Information Theory, 51(5):1836–
1840, May 2005.
[PP02]
A. Papoulis and S.U Pillai. Probability, Random Variables, and Stochastic Processes, 4th Ed. Mc. Graw Hill, 2002.
[Sas13]
I. Sason. Entropy Bounds for Discrete Random Variables via Maximal Coupling.
IEEE Transactions on Information Theory, 59(11):7118–7131, 2013.
[SJ80]
J.E Shore and R.W Johnson. Axiomatic derivation of the principle of maximum
entropy and the principle of minimum cross-entropy. IEEE Transactions on
Information Theory, 26:26–37, 1980.
48
[Ski89]
J. Skilling. Classic Maximum Entropy. In J. Skilling, editor, Maximum Entropy
and Bayesian Methods. Kluwer Academic, 1989.
[VWBC05] S. Verdoolaege, K. Woods, M. Bruynooghe, and R. Cools. Computation and
Manipulation of Enumerators of Integer Projections of Parametric Polytopes.
Technical Report Report CW 392, K.U. Leuven, March 2005.
[Zha07]
Z. Zhang. Estimating mutual information via Kolmogorov distance. IEEE
Transactions on Information Theory, 53:3280–3282, 2007.
49
| 10math.ST
|
An integral-transform approach to the bioheat transfer problems in
magnetic hyperthermia
Kenya Murase
Department of Medical Physics and Engineering, Division of Medical
Technology and Science, Faculty of Health Science, Graduate School of
Medicine, Osaka University
1-7 Yamadaoka, Suita, Osaka 565-0871, Japan
Short title:
An integral-transform approach to magnetic hyperthermia
Address correspondence to:
Kenya Murase, Dr. Med. Sci., Dr. Eng.
Department of Medical Physics and Engineering, Division of Medical
Technology and Science, Faculty of Health Science, Graduate School of
Medicine, Osaka University
1-7 Yamadaoka, Suita, Osaka 565-0871, Japan
Tel & Fax: (81)-6-6879-2571,
E-mail: [email protected]
1
Abstract
Our purpose in this study was to present an integral-transform approach
to the analytical solutions of the Pennes' bioheat transfer equation and to apply it
to the calculation of temperature distribution in tissues in hyperthermia with
magnetic nanoparticles (magnetic hyperthermia).
The validity of our method was investigated by comparison with the
analytical solutions obtained by the Green's function method for point and shell
heat sources and the numerical solutions obtained by the finite-difference
method for Gaussian-distributed and step-function sources.
There was good agreement between the radial profiles of temperature
calculated by our method and those obtained by the Green's function method.
There was also good agreement between our method and the finite-difference
method except for the central temperature for a step-function source that had
approximately a 0.3% difference. We also found that the equations describing
the steady-state solutions for point and shell sources obtained by our method
agreed with those obtained by the Green’s function method. These results
appear to indicate the validity of our method.
In conclusion, we presented an integral-transform approach to the
bioheat transfer problems in magnetic hyperthermia, and this study
demonstrated the validity of our method. The analytical solutions presented in
this study will be useful for gaining some insight into the heat diffusion process
during magnetic hyperthermia, for testing numerical codes and/or more
2
complicated approaches, and for performing sensitivity analysis and
optimization of the parameters that affect the thermal diffusion process in
magnetic hyperthermia.
Keywords: Magnetic hyperthermia, magnetic nanoparticle, Pennes' bioheat
transfer equation, integral-transform method, Green’s function
method
3
1 Introduction
Hyperthermia is one of the promising approaches to cancer therapy. The
most commonly used heating method in the clinical setting is capacitive heating
by use of a radiofrequency (RF) electric field [1]. However, a major technical
problem with hyperthermia is the difficulty of heating the targeted tumor to the
desired temperature without damaging the surrounding tissues, as the
electromagnetic energy must be directed from an external source and penetrate
normal tissue. Other hyperthermia modalities including RF ablation and
ultrasound hyperthermia have been reported [2, 3], but the efficacies of these
modalities depend on the size and depth of the tumor, and disadvantages include
a limited ability to target the tumor and control the exposure.
Hyperthermia
using
magnetic
nanoparticles
(MNPs)
(magnetic
hyperthermia) was developed in the 1950s [4] and is still under development for
overcoming the above disadvantages [5, 6]. MNPs generate heat in an
alternating magnetic field as a result of hysteresis and relaxational losses,
resulting in heating of the tissue in which MNPs accumulate [7]. With the
development of precise methods for synthesizing functionalized MNPs [8],
MNPs with functionalized surfaces, which have high specificity for a tumor
tissue, have been developed as heating elements for magnetic hyperthermia [9].
Furthermore, there is renewed interest in magnetic hyperthermia as a treatment
modality for cancer, especially when it is combined with other, more traditional
therapeutic approaches such as the co-delivery of anticancer drugs or
4
photodynamic therapy [10]. From these aspects, magnetic hyperthermia has
received much recent attention.
The bioheat transfer equation proposed by Pennes [11] is the basis for
understanding the kinetics of the tumor and tissue heating. The solution of this
equation is important both for treatment planning and for the design of new
clinical heating systems [12].
Various investigations have attempted to obtain analytical solutions to
the Pennes’ bioheat transfer equation. Durkee and Antich [13] solved it in
one-dimensional multi-region Cartesian and spherical geometry, based on the
method of separation of variables and Green’s function method. Vyas and
Rustgi [14] obtained an analytical solution by using the Green’s function
method to describe the temperature distribution due to a laser beam with a
Gaussian profile. Andra et al. [15] solved it for a constant heat source embedded
in an infinite medium without blood perfusion by using the Laplace transform.
Deng and Liu [16] derived analytical solutions to the bioheat transfer problems
with generalized spatial or transient heating both on the skin surface and inside
biological bodies by using the Green’s function method. Bagaria and Johnson
[17] modeled diseased and healthy tissues as two finite concentric spherical
regions and included the blood perfusion effect in both regions. They obtained
analytical solutions to the model by separation of variables. Recently, Giordano
et al. [18] derived fundamental solutions of the Pennes’ bioheat transfer
equation in rectangular, cylindrical, and spherical coordinates.
5
Although the Green's function method is a convenient way to describe
thermal problems [19, 20] and has often been applied to solving the bioheat
transfer equation as described above [12, 14], it is not rare for its handling to
become complicated. Besides the Green’s function method, analytical solutions
to the Pennes’ bioheat transfer equation can be obtained by use of the
integral-transform method [19, 20], which is considered to be easier to
implement than the Green's function method. To the best of our knowledge,
however, there are few studies that have used this approach.
Our purpose in this study was to present an integral-transform approach
to the analytical solutions of the Pennes' bioheat transfer equation for the
calculation of the temperature distribution in tissues in magnetic hyperthermia
and to investigate its validity by comparison with the Green's function method
and the finite-difference method for several heat source models.
2 Materials and methods
2.1 Pennes' bioheat transfer equation
To estimate the temperature distribution in vivo, we solved the Pennes' bioheat
transfer equation [11] given by
c p
T
b c pbb Ta T Qmet P ,
t
(1)
where T is the temperature of tissue, the thermal conductivity of tissue, b the
density of blood, cpb the specific heat of blood, b the blood perfusion rate, Ta
6
the temperature of arterial blood, Qmet the rate of metabolic heat generation, and
P the energy dissipation. and cp are the density and specific heat of tissue,
respectively. In this study, it was assumed that the volume flow of blood per
unit volume is constant and uniform throughout tissue, which means that b is
constant. Furthermore, the above thermo-physical properties such as and cp
and Qmet were assumed to be constant. Therefore, Eq. (1) is reduced to
c p
T
b c pbb Tc T P ,
t
(2)
where
Tc Ta
Qmet
b c pbb .
(3)
Tc is considered to be the temperature of tissue in the steady state prior to
heating or the core body temperature maintained by the balance between
metabolic heat generation and blood perfusion. It should be noted that, when
Qmet
Ta , Tc can be assumed to be equal to Ta, as is often seen in the
b c pbb
literature [12, 18]. When we describe Eq. (1) in spherical coordinates, Eq. (1)
becomes
c p
T 2 T
r
b c pbb Tc T P .
t r 2 r r
2.2 Integral-transform method
7
(4)
Applying the integral transform (Fourier sine transform) to Eq. (4) yields (see
Appendix A)
2 1
T Tc
r
where K
0
F ( )
1 e
2 2
2
2
t
K
sin( r )d ,
(5)
b c pbb
c p
2
and
, and F ( ) is given by Eq. (A7).
When r=0, using the formula lim sin x 1 , Eq. (5) is reduced to
x
x 0
T Tc
2 1
0
F ( )
1 e
2 2
In the steady state, i.e., when
T Tc
When r=0 and
2
2
t
K
d .
(6)
t , Eq. (5) is reduced to
2 1 F ( )
sin( r )d .
r 0 2 2
(7)
t , Eq. (6) is reduced to
T Tc
2 1
0
F ( )
d .
2 2
(8)
As illustrative examples, we considered four heat sources (point, shell,
Gaussian-distributed, and step-function sources).
2.2.1 Point source
In this case, P is given by
P
P0
(r ) ,
4r 2
(9)
8
where (r ) is a Dirac's delta function and P0 is the point heating energy. For
this source, F ( ) given by Eq. (A7) becomes
F ( )
2 P0
.
4
(10)
Substituting Eq. (10) into Eq. (5) and using the formula
0
x sin(ax)
dx e ab ,
2
2
2
b x
we obtain
r
T Tc
e
e 0 2
2 2r 2
2
P0
In the steady state, i.e., when
T Tc
P0
4r
2
2
t
K
sin( r )d .
(11)
t , Eq. (11) is reduced to
e r .
(12)
It should be noted that Eq. (12) is also obtained from Eq. (7), and that Eqs. (11)
and (12) have a singularity at r=0, which is represented by the factor 1/r in the
equations and reveals the highly localized effect of a point source.
2.2.2 Shell source
In this case, P is given by
P
P0
(r r0 ) ,
4r 2
(13)
and F ( ) given by Eq. (A7) becomes
9
F ( )
Substituting
2 P0
sin r0 .
4r0
Eq.
(14)
into
(14)
Eq.
(5)
1
sin(ax) sin(bx) [cos(a b) cos(a b)] and
2
and
0
using
formulae
cos(ax)
ab
, we obtain
dx
e
2
2
2b
b x
sin( r )
r r0
r r0
0
T Tc
e
e
2
e
0 2
2 2rr0
4
P0
the
2
2
t
K
sin( r )d .
(15)
When r=0, substituting Eq. (14 ) into Eq. (6) yields
r
sin( r )
0
0
T Tc
e
e 0
2 2r0 2
2 2
P0
2
2
t
K
d .
(16)
In the steady state, Eqs. (15) and (16) become
T Tc
P0
r r0
r r0
e
e
8rr0
(17)
and
T Tc
P0
4r0
e r0 ,
(18)
respectively. Note that Eqs. (17) and (18) are also obtained from Eqs. (7) and (8),
respectively.
2.2.3 Gaussian-distributed source
In this case, P is given by
10
P P0 e
r2
r02
,
(19)
where P0 is the maximum value of the energy dissipation at the center and r0 is a
radius that is associated with how far from the center the heating is affecting the
tissue. For this source, F ( ) given by Eq. (A7) becomes
2
F ( )
P0 r03 e
4
2r02
4
.
(20)
Substituting Eq. (20) into Eq. (5) yields
T Tc
P0 r03
2 r 0
e r 4
2 2
2 2
0
In the steady state, i.e., when
T Tc
P0 r03
2 r 0
1 e
2
2
t
K
sin( r )d .
(21)
t , Eq. (21) is reduced to
e r 4
sin( r )d ,
2 2
2 2
0
(22)
When r=0, Eqs. (21) and (22) become
P0 r03
T Tc
2
2 e r 4
2 2
2 2
0
0
1 e
2
2
t
K
d
(23)
and
T Tc
P0 r03
2
0
2 e r 4
d ,
2 2
2 2
0
respectively.
2.2.4 Step-function source
11
(24)
In this case, P is given by
for 0 r r0
P
P 0
0
for r0 r
,
(25)
and F ( ) given by Eq. (A7) becomes
F ( )
1
r
P0 2 sin( r0 ) 0 cos(r0 ) .
2
(26)
Substituting Eq. (26) into Eq. (5) yields
2P
T Tc 0
r
0
sin( r0 ) r0 cos( r0 )
1 e
2 ( 2 2 )
2
2
t
K
sin( r )d . (27)
When r=0, Eq. (27) becomes
T Tc
2 P0
0
sin( r0 ) r0 cos(r0 )
1 e
( 2 2 )
2
2
t
K
d .
(28)
2.3 Green’s function method
2.3.1 Point source
The Green’s function of the Pennes’ bioheat transfer equation for radial flow in
an infinite domain in spherical coordinates has been given by Giordano et al.
[18]. When using this function, we obtain the temperature for a point source as
(see Appendix B)
b ( t )
T Tc
aP0
r2
4 a ( t )
e
d ,
8 3 2 0 [a(t )]3 2
t
12
(29)
where a
b c pbb
and b
. It should be noted that, when r=0, the
c p
c p
integral in Eq. (29) diverges to infinity.
In the steady state, i.e., when
2
e
analytical solution:
ar
b
r
a
t , the integral in Eq. (29) has an
. Thus, the steady-state solution obtained by the
Greens' function method for a point source becomes
T Tc
P0
4r
b
r
a
e
.
(30)
2.3.2 Shell source
When using the Green's function given by Giordano et al. [18], we obtain the
temperature for a shell source as (see Appendix B)
( r r0 )
( r r0 )
e b (t ) 4 a (t ) 4 a (t )
e
d .
e
a (t )
2
aP0
T Tc
8rr0
t
0
2
(31)
When r=0, we obtain from Eq. (B8)
b ( t )
T Tc
aP0
r02
4 a ( t )
e
d .
8 3 2 0 [a(t )]3 2
t
13
(32)
In the steady state, i.e., when
1
[e
ab
solution:
b
r r0
a
e
t , the integral in Eq. (31) has an analytical
b
( r r0 )
a
] . Thus, the steady-state solution obtained by
the Greens' function method for a shell source becomes
a
[e
b
P0
T Tc
8rr0
Similarly, the integral at
2
e
ar0
b
r0
a
b
r r0
a
e
b
( r r0 )
a
].
(33)
t in Eq. (32) has an analytical solution:
. Thus, the steady-state solution for a shell source at r=0 becomes
T Tc
P0
4r0
e
b
r0
a
.
(34)
2.4 Finite-difference method
We
also
solved
Eq.
(4)
by
using
the
finite-difference
method
(forward-difference scheme) (see Appendix C) for Gaussian-distributed and
step-function sources for comparison. When we used the finite-difference
method (Appendix C), the outer radius of the domain for analysis was taken as
15 cm, and the spatial and time intervals ( r and t ) were taken as 0.3 mm
c p r 2
and
, respectively.
2
2.5 Energy dissipation of magnetic nanoparticles
14
Rosensweig [7] developed analytical relationships and computations of the
energy dissipation of MNPs subjected to an alternating magnetic field (AMF).
From this theory, P in Eq. (4) can be given by [6, 7]
P 0 0 H 02 f
2f
,
1 (2f ) 2
(35)
where 0 is the permeability of free space, 0 the equilibrium susceptibility, and
H0 and f the amplitude and frequency of the AMF, respectively. is the
effective relaxation time given by
1
1
N
1
B ,
(36)
where N and B are the Neel relaxation and Brownian relaxation time,
respectively [6, 7]. N and B are given by the following relationships [6, 7]:
N 0
3VH
and B
,
k BT
2
e
(37)
where 0 is the average relaxation time in response to a thermal fluctuation,
the viscosity of medium, kB the Boltzmann constant, T the temperature, and
KVM / k BT , with K being the anisotropy constant of MNP. VH is taken as
the hydrodynamic volume of MNP that is larger than the magnetic volume
VM D 3 / 6 for MNP of diameter D. As a model for VH, it is assumed that
VH (1 2 / D) 3VM , where is the thickness of a sorbed surfactant layer.
Because the actual equilibrium susceptibility 0 is dependent on the magnetic
15
field, 0 is assumed to be the chord susceptibility corresponding to the Langevin
equation, given by
0 i
3
1
(coth ) ,
(38)
where i 0M d2VM 3k BT , 0 M d HVM k BT , H H 0 cos(2ft ) , Md is the
domain magnetization of a suspended particle, and is the volume fraction of
MNPs.
In this study, we considered magnetite (Fe3O4) as MNPs. The above
parameters for magnetite were taken to be as follows: M d 446 kA/m ,
K 9 kJ/m 3 , c p 670 J/kg/K , and 5180 kg/m 3 [21]. was taken as 0.003,
which is close to the typical magnetite dosage of ~10 mg Fe per gram of tumor
that has been reported in clinical studies [22].
Figure 1(a) shows the relationship between P and D for magnetite, in
which H0 was fixed at 5 mT and f was varied from 100 kHz to 1000 kHz with an
interval of 100 kHz, whereas Fig. 1(b) shows the case when f was fixed at 500
kHz and H0 was varied from 1 mT to 10 mT with an interval of 1 mT. It should
be noted that the unit of mT can be converted to kA/m by use of the relationship
1 mT 0.796 kA/m . As shown in Fig. 1, P largely depends on D and its
maximum value increases with increasing f and H0.
As an illustrative example, we considered the case with D 19 nm ,
f 500 kHz , and H 0 5 mT . In this case, P 2.28 106 W/m 3 . For a point
16
source, we assumed that MNPs were located within a sphere with a radius of 1
mm. From the relationship P P0 /V , where V is the volume of the region
where MNPs are located, P0 in Eq. (9) was taken as 0.0096 W. For a shell
source, r0 and the width of the shell were assumed to be 5 mm and 1 mm,
respectively, resulting in V 315.2 mm 3 . Thus, P0 in Eq. (13) was assumed to
be
0.72
W.
For
Gaussian-distributed
and
step-function
sources,
P0 P 2.28 106 W/m 3 was used in Eqs. (19) and (25).
2.6 Numerical studies
Numerical studies were performed under the following conditions: The values
for the thermo-physical properties of blood and tissue were assumed to be as
follows [21]: = 0.502 W/m/K, = 1060 kg/m3, cp = 3600 J/kg/K, b = 1000
kg/m3, cpb = 4180 J/kg/K, b = 6.4×10-3 s-1, and Tc = 310 K. In this study, the r0
values in Eqs. (13), (19), and (25) were all taken as 5 mm.
3 Results
Figure 2 shows a comparison of the radial profiles of temperature calculated by
our method and those calculated by the Green's function method for a point
source at three time points (5, 10, and 100 s). As shown in Fig. 2, there was
good agreement between them.
17
Figure 3 shows a comparison of the radial profiles of temperature
calculated by our method and those calculated by the Green's function method
for a shell source at four time points (10, 50, 100, and 1000 s). As shown in Fig.
3, there was good agreement between them.
Figure 4 shows a comparison of the radial profiles of temperature
calculated by our method and those calculated by the finite-difference method
for a Gaussian-distributed source at four time points (10, 50, 100, and 500 s). As
shown in Fig. 4, there was good agreement between them.
Figure 5 shows a comparison of the radial profiles of temperature
calculated by our method and those calculated by the finite-difference method
for a step-function source at four time points (10, 50, 100, and 500 s). As shown
in Fig. 5, although some difference (approximately 0.3%) was observed at r=0,
there was good agreement between them except for the central temperature.
4 Discussion
In this study, we presented an integral-transform approach to the bioheat
transfer problems in magnetic hyperthermia and derived the transient and
steady-state analytical solutions to the Pennes' bioheat transfer equation for
several heat source models by using this approach. Furthermore, we investigated
the validity of this approach by comparison with the analytical solutions
obtained by the Green’s function method for point and shell sources and the
numerical
solutions
obtained
by
the
18
finite-difference
method
for
Gaussian-distributed and step-function sources. To the best of our knowledge,
these analytical solutions obtained by the integral-transform approach have not
been reported previously. The largest difference was observed between the
central temperature obtained by our method and that obtained by the
finite-difference method for a step-function source (Fig. 5), but the difference
was approximately 0.3% at most. Excluding this case, there was good
agreement between our method and the Green’s function method or the
finite-difference method (Figs. 2-5), indicating the validity of our method.
As previously described, the steady-state solutions obtained by the
Greens' function method for point and shell sources are given by Eqs. (30) and
(33), respectively. Because
b
, Eqs. (30) and (33) agree with Eqs. (12)
a
and (17) derived from our method, respectively. Furthermore, the steady-state
solution for a shell source at r=0 obtained by the Greens' function method [Eq.
(34)] also agrees with that obtained by our method [Eq. (18)]. These results also
appear to indicate the validity of our method.
The shell source used in this study is a model consisting of a thin shell of
MNPs in the outer surface of a spherical solid tumor whose outer region extends
to infinity and represents the normal tissue. As pointed out by Giordano et al.
[18], this model is a realistic model distribution that provides an approximately
constant therapeutic temperature inside the tumor. For this model, there was
also good agreement between our method and the Green's function method.
19
The Green's function method is a convenient way of solving differential
equations such as the Pennes’ bioheat transfer equation [12, 14]. Mathematically,
the Green’s function is the solution to a differential equation with an
instantaneous point source. When the temperature distribution for various heat
sources is calculated by use of the Green’s function method, it is necessary to
compute the integral of the product of the Green’s function and the function
describing the heat source as shown in Eqs. (B4) and (B7). In general, this
integral becomes a double integral with respect to the temporal and spatial
variables. For point and shell sources that can be described by a Dirac’s delta
function as shown in Eqs. (9) and (13), it is relatively easy to compute the
double integral. However, it is not always easy to compute the double integral
for heat sources whose function cannot be described by a Dirac’s delta function,
such as Guassian-distributed and step-function sources. On the other hand, the
integral-transform method presented in this study appears much easier to
implement than the Green's function method.
In the integral-transform method presented in this study, the kernel for
the integral transform was taken to be
2 sin( r ) . In general, the kernel
should be chosen depending on the boundary conditions at r 0 [19]. When
the boundary condition at r 0 is of the first kind, the kernel should be
2 sin( r ) , whereas it should be
2 cos(r ) for the boundary condition
of the second kind [19]. In this study, the parameter [ r (see Appendix
20
A)] is always zero at r 0 , that is, the boundary condition at r 0 is of the
first kind. Thus, we used
2 sin( r ) as the kernel for the integral transform
in this study.
The analytical solutions presented in this study were based on several
assumptions. First, the domain for analysis was assumed to be infinite. Although
this assumption is considered to be valid for deep tumors surrounded by normal
tissue, our method cannot be applied to the case of relatively superficial tumors.
Second, the thermo-physical properties of blood and tissue were assumed to be
the same in both the tumor and normal tissue. Third, the shape of tumors and the
distribution of MNPs were assumed to be spherically symmetric. Although the
analytical solutions derived in this study cannot be applied to cases with
complex geometries and/or a heterogeneous medium, they will provide useful
tools for testing of numerical codes and/or more complicated approaches, and
for performing sensitivity analysis of the parameters involved in a problem [18].
In conclusion, we presented an integral-transform approach to the
bioheat transfer problems in magnetic hyperthermia, and this study
demonstrated the validity of our method. The analytical solutions presented in
this study will be useful for gaining some insight into the heat-diffusion process
during magnetic hyperthermia, for testing of numerical codes and/or more
complicated approaches, and for performing sensitivity analysis and
optimization of the parameters that affect the thermal diffusion process in
21
magnetic hyperthermia.
22
Appendix A
When the following parameter is introduced:
T Tc ,
(A1)
Eq. (4) is reduced to
c p
2
r
b c pbb P .
t r 2 r r
(A2)
Furthermore, if we perform the following variable transformation: r , Eq.
(A2) becomes
2
rP
K
2 2
t r
,
(A3)
where
K
b c pbb
c p
2
and
.
(A4)
If we apply the integral transform (Fourier sine transform) [19, 20] to Eq. (A3),
we obtain
K
F ( )
( 2 2 )
t
,
(A5)
where is defined by [20]
2
0
sin( r )dr ,
(A6)
and
23
2
F ( )
0
rP(r ) sin( r )dr .
(A7)
denotes the Fourier-transform variable, which is assumed to take all values
from 0 to infinity continuously. It should be noted that and
at
r
r
were taken as zero to obtain Eq. (A5).
Solving Eq. (A5) with respect to t yields
e
2 2
K
t
F ( )
(0)
1 e
( 2 2 )
2
2
t
K
,
(A8)
where (0) is the value of at t 0 . If we assume that the temperature (T)
at t 0 is equal to Tc, we obtain (0) 0 . Using the following inverse
Fourier transformation [20]:
2
0
( ) sin( r)d ,
(A9)
we obtain
2 1
0
F ( )
2 2
1 e
2
2
t
K
sin( r )d .
(A10)
Finally, by use of and Eqs. (A1) and (A4), the temperature (T) can be
r
obtained by Eq. (9).
24
Appendix B
The Green's function of Eq. (A2) in an infinite domain is given by [18]
( r r ')
( r r ')
e
4 a ( t )
4 a ( t )
e
,
G ( r , t ; r ' , )
e
2rr' a (t )
2
b ( t )
2
(B1)
where
a
1
c p K
(B2)
and
b c pbb 2
b
c p
K .
(B3)
Point source
For a point source model, P is given by Eq. (12). In this case, the
solution to Eq. (A2) is given by
P0 (r ' )
dr ' d
0 r '0
4r '2
( r r ') 2
( r r ') 2
aP0 t e b (t ) (r ' ) 4 a (t ) 4 a (t )
. (B4)
e
e
dr
'
d
8 0 r '0 rr ' a (t )
a
t
r '2 G ( r , t ; r ' , )
Using the following relationship:
e
( r r ')2
4 a ( t )
e
( r r ')2
4 a ( t )
4 a(t )
0
e a (t ) sin(r ) sin(r ' )d
2
25
(B5)
and the formula
0
e
a 2 x 2
cos(bx)dx
b ( t )
aP0
2a
e
b2
4a2
, we obtain
r2
4 a ( t )
e
d .
8 3 2 0 [a(t )]3 2
t
(B6)
Thus, we obtain Eq. (29).
Shell source
In this case, P is given by Eq. (16). In this case, the solution to Eq. (A2)
is given by
a
t
0 r '0
aP0
8rr0
P0 (r 'r0 )
dr ' d
2
4r '
( r r0 ) 2
( r r0 ) 2
b ( t )
e
.
e 4 a (t ) e 4 a (t ) d
a (t )
r '2 G ( r , t ; r ' , )
t
0
(B7)
Thus, we obtain Eq. (31).
When r=0, using Eq. (B5) and the formula lim sin x 1 yields
x
x 0
b ( t )
aP0
r02
4 a ( t )
e
d .
8 0 [a(t )]3 2
t
32
Thus, we obtain Eq. (32).
26
(B8)
Appendix C
To solve Eq. (4), we used the following finite-difference method
(forward-difference scheme). First, we divide the spatial and time domains into
r and t such that
small intervals
r (i 1) r (i 1,2,, M ) and
t ( j 1) t ( j 1,2,, N ) , and we denote the temperature at the nodal point
i r at the time j t by Ti , j . For r 0 , i.e., i 1 , Eq. (4) is reduced to
c p
Ti , j 1 Ti , j
t
2 Ti 1, j Ti , j Ti 1, j 2Ti , j Ti 1, j
2
i
1
r
r 2
b c pbb (Tc Ti , j ) Pi , j
,
(C1)
where Pi , j denotes the energy dissipation at the nodal point i r at the time
j t . Thus, Ti , j 1 can be computed from
Ti , j 1 Ti , j
t
2
(1
)(Ti 1, j Ti , j ) (Ti , j Ti 1, j )
i 1
c p r
2
b c pbb t
t
(Tc Ti , j )
P
c p
c p i , j
(C2)
for i=2, 3, …, M and j=1, 2, …, N.
For r 0 , i.e., i 1 , we used the following L'Hopital's rule [23] to
avoid dividing by zero:
1 T
2T
lim
lim 2 .
r 0 r r
r 0 r
(C3)
Then, we obtain
c p
T1, j 1 T1, j
t
6
T2, j T1, j
r 2
b c pbb (Tc T1, j ) P1, j
27
(C4)
or
T1, j 1 T1, j
b c pbb t
6t
t
(T2, j T1, j )
(Tc T1, j )
P1, j
2
c p
c p
c p r
(C5)
for j=1, 2, …, N. For numerical stability, the following condition should be
satisfied [24]:
t
c p r 2
0.5 .
As boundary conditions,
(C6)
T
was taken as zero at the center and outer
r
boundary, i.e., T2, j T1, j and TM , j TM 1, j for j=1, 2, ..., N. As initial conditions,
the temperature at t=0 was assumed to be Tc, i.e., Ti ,1 Tc for i=1, 2, ..., M.
28
References
1.
Abe M, Hiraoka M, Takahashi M, Egawa S, Matsuda C, Onoyama Y,
Morita K, Kakehi M, Sugahara T. Multi-institutional studies on
hyperthermia using an 8-MHz radiofrequency capacitive heating device
(Thermotron RF-8) in combination with radiation for cancer therapy.
Cancer. 1986; 58: 1589-95.
2.
Oura S, Tamaki T, Hirai I, Yoshimasu T, Ohta F, Nakamura R,
Okamura Y. Radiofrequency ablation therapy in patients with breast
cancers two centimeters or less in size. Breast Cancer. 2007; 14: 48-54.
3.
Seip R, Ebbini ES. Noninvasive estimation of tissue temperature
response to heating fields using diagnostic ultrasound. IEEE Trans
Biomed Eng. 1995; 42: 828-39.
4.
Gilchrist RK, Medal R, Shorey WD, Hanselman RC, Parrott JC, Taylor
CB. Selective inductive heating of lymph nodes. Ann Surg. 1957; 146:
596-606.
5.
Jordan A, Scholz R, Maier-Hauff K, Johannsen M, Wust P, Nodobny J,
Schirra H, Schmidt H, Deger S, Loening S, Lanksch W, Felix R.
Presentation of a new magnetic field therapy system for the treatment of
human solid tumors with magnetic fluid hyperthermia. J Magn Magn
Mat. 2001; 225: 118-26.
6.
Murase K, Oonoki J, Takata H, Song R, Angraini A, Ausanai P,
Matsushita T. Simulation and experimental studies on magnetic
29
hyperthermia with use of superparamagnetic iron oxide nanoparticles.
Radiol Phys Technol. 2011; 4: 194-202.
7.
Rosensweig RE. Heating magnetic fluid with alternating magnetic field.
J Magn Magn Mat. 2002; 252: 370-4.
8.
Neuberger T, Schopf B, Hofmann H, Hofmann M, von Rechenberga B.
Superparamagnetic
nanoparticles
for
biomedical
applications:
possibilities and limitations of a new drugdelivery system. J Magn Magn
Mat. 2005; 293: 483-96.
9.
Ito A, Shinkai M, Honda H, Kobayashi T. Medical applications of
functionalized magnetic nanoparticles. J Biosci Bioeng. 2005; 100: 1-11.
10.
Balivada S, Rachakatla RS, Wang H, Samarakoon TN, Dani RK, Pyle M,
Kroh FO, Walker B, Leaym X, Koper OB, Tamura M, Chikan V,
Bossmann SH, Troyer DL. A/C magnetic hyperthermia of melanoma
mediated by iron(0)/iron oxide core/shell magnetic nanoparticles: a
mouse study. BMC Cancer. 2010; 10: 119-27.
11.
Pennes HH. Analysis of tissue and arterial blood temperatures in the
resting human forearm. J Appl Physiol. 1948; 1:93-122.
12.
Gao B, Langer S, Corry PM. Application of the time-dependent Green's
function and Fourier transforms to the solution of the bioheat equation.
Int J Hyperthermia. 1995; 11: 267-85.
13.
Durkee JW, Antich PP, Lee CE. Exact solutions to the multiregion
time-dependent bioheat equation. I: solution development. Phys Med
30
Bio. 1990; 35: 847-67.
14.
Vyas R, Rustgi ML. Green's function solution to the tissue bioheat
equation. Med Phys. 1992; 19: 1319-24.
15.
Andra W, d’Ambly CG, Hergt R, Hilger I, Kaiser WA. Temperature
distribution as function of time around a small spherical heat source of
local magnetic hyperthermia. J Magn Magn Mat. 1999; 194: 197-203.
16.
Deng Z-S, Liu J. Analytical study on bioheat transfer problems with
spatial or transient heating on skin surface or inside biological bodies. J
Biomech Eng. 2002; 124: 638-49.
17.
Bagaria HG, Johnson DT. Transient solution to the bioheat equation and
optimization for magnetic fluid hyperthermia treatment. Int J
Hyperthermia. 2005; 21: 57-75.
18.
Giordano MA, Gutierrez G, Rinaldi C. Fundamental solutions to the
bioheat equation and their application to magnetic fluid hyperthermia.
Int J Hyperthermia. 2010; 26: 475-84.
19.
Ozisik MN. 'Boundary Value Problems of Heat Conduction',
International Textbook Company, Scranton, Pennsylvania, 1968, pp.
43-124.
20.
Carslaw HS, Jaeger JC. 'Conduction of Heat in Solids', Oxford at the
Clarendon Press, Oxford, 1959, pp. 455-465.
21.
Maenosono S, Saita S. Theoretical assessment of FePt nanoparticles as
heating elements for magnetic hyperthermia. IEEE Trans Magn. 2006;
31
42: 1638-42.
22.
Jordan A, Scholz R, Wust P, Fahling H, Krause J, Wlodarczyk W,
Sander B, Vogl T, Felix R. Effects of magnetic fluid hyperthermia
(MFH) on C3H mammary carcinoma in vivo. Int J Hyperthermia. 1997;
13: 587-605.
23.
Spivak M. 'Calculus', Publish or Perish, Houston, 1994, pp. 201-202.
24.
Smith GD. 'Numerical Solution of Partial Differential Equations with
Exercises and Worked Solutions', Oxford University Press, London,
1965, p. 93.
32
Figure Legends
Fig. 1
(a) Relationship between the energy dissipation (P) and the diameter
of magnetic nanoparticles (MNPs) (D) for magnetite, in which the
amplitude of the alternating magnetic field (H0) was fixed at 5 mT and
the frequency (f) was varied from 100 kHz to 1000 kHz with an
interval of 100 kHz.
(b) Relationship between P and D for magnetite, in which f was fixed
at 500 kHz and H0 was varied from 1 mT to 10 mT with an interval of
1 mT. The unit of mT can be converted to kA/m by use of the
relationship 1 mT 0.796 kA/m .
Fig. 2
Comparison of the radial profiles of temperature calculated by our
method and those obtained by the Green's function method for a point
source. The solid, dashed, and dotted lines show the results calculated
by our method at t=5 s, 10 s, and 100 s, respectively, whereas the
closed circles, squares, and triangles show the results obtained by the
Green's function method at t=5 s, 10 s, and 100 s, respectively.
Fig. 3
Comparison of the radial profiles of temperature calculated by our
method and those obtained by the Green's function method for a shell
source. The solid, long dashed, dashed, and dotted lines show the
results calculated by our method at t=10 s, 50 s, 100 s, and 1000 s,
respectively, whereas the closed circles, squares, triangles, and
33
diamonds show the results obtained by the Green's function method at
t=10 s, 50 s, 100 s, and 1000 s, respectively.
Fig. 4
Comparison of the radial profiles of temperature calculated by our
method and those obtained by the finite-difference method for a
Gaussian-distributed source. The solid, long dashed, dashed, and
dotted lines show the results calculated by our method at t=10 s, 50 s,
100 s, and 500 s, respectively, whereas the closed circles, squares,
triangles, and diamonds show the results obtained by the
finite-difference method at t=10 s, 50 s, 100 s, and 500 s, respectively.
Fig. 5
Comparison of the radial profiles of temperature calculated by our
method and those obtained by the finite-difference method for a
step-function source. The solid, long dashed, dashed, and dotted lines
show the results calculated by our method at t=10 s, 50 s, 100 s, and
500 s, respectively, whereas the closed circles, squares, triangles, and
diamonds show the results obtained by the finite-difference method at
t=10 s, 50 s, 100 s, and 500 s, respectively.
34
Fig. 1(a)
Fig. 1(b)
35
Fig. 2
Fig. 3
36
Fig. 4
Fig. 5
37
| 5cs.CE
|
LaSalle Invariance Principle for Discrete-time Dynamical Systems:
A Concise and Self-contained Tutorial
arXiv:1710.03710v2 [math.DS] 24 Oct 2017
Wenjun Mei and Francesco Bullo
Center for Control, Dynamical-system, and Computation
University of California at Santa Barbara
Summary. As a method to establish the Lyapunov stability of differential/difference equations systems, the LaSalle invariance
principle was originally proposed in the 1950’s and has become a fundamental mathematical tool in the area of dynamical systems
and control. In both theoretical research and engineering practice, discrete-time dynamical systems have been at least as extensively
studied as continuous-time systems. For example, model predictive control is typically studied in discrete-time via Lyapunov
methods. However, there is a peculiar absence in the standard literature of standard treatments of Lyapunov functions and LaSalle
invariance principle for discrete-time nonlinear systems. Most of the textbooks on nonlinear dynamical systems focus only on
continuous-time systems. For example, the classic textbook by Khalil on nonlinear systems [10] relegates discrete-time systems
to a few exercises at the end of Chapter 4. The textbook by Vidyasagar [14] does not present the discrete-time LaSalle invariance
principle. In Chapter 1 of the book by LaSalle [11], the author establishes the LaSalle invariance principle for difference equation
systems. However, all the useful lemmas in [11] are given in the form of exercises with no proof provided. In this document,
we provide the proofs of all the lemmas proposed in [11] that are needed to derive the main theorem on the LaSalle invariance
principle for discrete-time dynamical systems. We organize all the materials in a self-contained manner. We first introduce some
basic concepts and definitions in Section 1, such as dynamical systems, invariant sets, and limit sets. In Section 2 we present and
prove some useful lemmas on the properties of invariant sets and limit sets. Finally, we establish the original LaSalle invariance
principle for discrete-time dynamical systems and a simple extension in Section 3. In Section 4, we provide some references on
extensions of LaSalle invariance principles for further reading. This document is intended for educational and tutorial purposes and
contains lemmas that might be useful as a reference for researchers.
Key words: LaSalle invariance principle, difference equations, discrete-time nonlinear dynamics, limit set, Lyapunov function
1 Basic Concepts: Dynamical System, Motion, Limit Set, and Invariant Set
Before reviewing the basic concepts in discrete-time dynamical systems, we first introduce some frequently used notations. Let N
be the set of natural numbers, i.e, {0, 1, 2, . . . }. Denote by Z and Z+ the set of integers and positive integers respectively. The set of
real numbers is denoted by R and the m-dimension Euclidean space is denoted by Rm . Let 0m be the all-zeros m × 1 column vector
and let 1m be the all-ones m × 1 column vector. We use φ to denote the empty set. For any sequence {xk }k∈N , by {xk } → y we mean
xk → y as k → ∞. Without causing any confusion, sometimes we omit the subscript k ∈ N when we refer to a sequence {xk }k∈N .
1.1 Discrete dynamical system
Given a map T : Rm → Rm , the following equations system:
x(n + 1) = T x(n) ,
for any n ∈ N,
(1)
is referred to as a m-dimension first-order difference equations system. Equation (1) together with an additional condition x(0) =
x0 ∈ Rm defines an initial-value problem for the m-dimension first-order difference equations system. A sequence {x(n)}n∈N is the
solution to the initial-value problem if x(n) = T n (x0 ) for any n ∈ N. Similarly, for any k ∈ Z+ , a map g : Rm × · · · × Rm → Rm
{z
}
|
k
defines a m-dimension k-th order difference equations system, and the corresponding initial-value problem is of the following form:
2
x(n + 1)
x(k − 1)
x(0)
= g x(n), . . . , x(n − k + 1) ,
= xk−1 ,
...
= x0 .
Lemma 1 (Equivalence to first-order system). Any one-dimension m-th order difference equations system
u(n + 1) = g u(n), . . . , u(n − m + 1)
is equivalent to an m-dimension first-order difference equations system.
Proof: For any n ≥ m, let xm (n) = u(n − m + 1), xm−1 (n) = u(n − m + 2), . . . , x2 (n) = u(n − 1), and x1 (n) = u(n). Define x(n) ∈ Rm
>
as x(n) = x1 (n), . . . , xm (n) . We thereby have:
x1 (n + 1) = g x1 (n), . . . , xm (n) ,
x2 (n + 1) = x1 (n),
...
xm (n + 1) = xm−1 (n).
Define T : Rm → Rm as
g x1 (n), . . . , xm (n)
x1 (n)
.
T x(n) =
...
xm−1 (n)
We obtain an m-dimension first order difference equations system x(n + 1) = T x(n) . This concludes the proof.
t
u
For simplicity, in the rest of this document, whenever we refer to a difference equations system, we assume it is m-dimension
and first-order, unless specified. In addition, no matter whether it is emphasized, the map T : Rm → Rm is always assumed to be
continuous in this document.
Definition 1 (discrete semi-dynamical system and dynamical system). A map π : N × Rm → Rm is a discrete semi-dynamical
system on Rm if, for any n, k ∈ N and any x ∈ Rm ,
1) π(0, x) = x;
2) π n, π(k, x) = π(n + k, x) (semi-group property);
3) π is continuous.
The map π is a discrete dynamical system if 2) above holds for any n, k ∈ Z (group property).
Remark 1. The semi-group property implies the uniqueness of the solution to equations x(n + 1) = π x(n) , with the initial condition x(0) = x0 , in the forward direction, i.e., for any n ∈ N. The group property leads to the uniqueness of the solution in both
direction, i.e., for any n ∈ Z.
1.2 Limit set and invariant set
Invariant set and limit set are two important concepts in dynamical systems. Limit set characterizes the asymptotic behavior of a
difference equations system, i.e., the limit behavior of T n (x0 ), as n → ∞. A compact invariant set implies the existence of limit sets.
In this subsection we present the definitions of invariant set and limit set.
Definition 2 (Invariant sets). Given a map T : Rm → Rm and a set H ⊂ Rm , define the set T (H) = {y ∈ Rm | y = T (x) for some x ∈
H}. The set H is positively invariant if T (H) ⊂ H, negatively invariant if T (H) ⊃ H, and invariant if T (H) = H. A set H ⊂ Rm is
invariantly connected if
1) H is closed and invariant;
3
2) H is not a union of two non-empty disjoint closed invariant sets.
For any E ⊂ Rm , a set M is the largest invariant set in E, if M ⊂ E, T (M) = M, and T (A ∪ M) 6= A ∪ M for any set A such that
A ⊂ E and A ∩ M = φ .
Remark 2. The following statements can be inferred from Definition 2: 1) Any set of countably many (more than one) isolated fixed
points is not invariantly connected; 2) If M is the largest invariant set in E, then, for any A ⊂ E, T (A ∪ M) = A ∪ M implies A ⊂ M.
Before presenting the definition of limit set, we first introduce some preliminary notions.
Definition 3 (Motion, periodicity, fixed point, and extension of motion). Given a map T : Rm → Rm and a vector x ∈ Rm , the
motion from x refers to the sequence {T n (x)}n∈N and is denoted by T n x. A motion T n x is periodic if there exists some k ∈ Z+ such
that T k (x) = x. The least such k is referred to as the period of the motion T n . A point x is called a fixed point of T if the motion
T n x has period k = 1, i.e., T (x) = x. A set Tn x = {Tn (x)}n∈Z ⊂ Rm is referred to as an extension of the motion T n x if T0 x = x and
T (Tn x) = Tn+1 x for any n ∈ Z.
Remark 3. The extension of a motion T n x is not unique if the map T is non-invertible.
Definition 4 (Distance and convergence). For any point x ∈ Rm and set S ⊂ Rm , define the distance between
x and S as ρ(x, S) =
inf kx − yk, where k·k is some norm defined in Rm . A motion T n x converges to the set S if lim ρ T n (x), S = 0.
y∈S
n→∞
Definition5 (Interior, closure, and boundary). For any x ∈ Rm and r > 0, define the open ball around x with radius r as the set
B(x, r) = y ∈ Rm ky − xk < r . For any set S ⊂ Rm , x ∈ S is an interior point of S is there exists
ε > 0 such that B(x, ε) ⊂ S.
Denote by int S the set of all the interior points of S. Define the closure of S as the set S = x ∈ Rm ρ(x, S) = 0 . Define the
boundary of S as the set ∂ S = S \ int S.
Now we present the definitions of limit point and limit set.
Definition 6 (Limit point and limit set). Given a motion T n x, y ∈ Rm is a limit point of the motion T n x if there exists a subsequence
{nk }k∈N such that nk → ∞ and T nk (x) → y as k → ∞. When there is no ambiguity about the map T , we also refer to y as a limit
point of x. The set of all the limit points of x is referred to as the limit set of x, denoted by Ω (x). That is,
n
o
Ω (x) = y ∈ Rm There exists sequence {nk } ⊂ N such that nk → ∞ and T nk (x) → y as k → ∞ .
Given a set H ⊂ Rm , the limit set of the set H is denoted by Ω (H) and defined as
n
o
Ω (H) = y ∈ Rm There exists sequence {nk } ⊂ N and {yk } ⊂ H such that nk → ∞ and T nk (yk ) → y as k → ∞ .
2 Properties of Invariant Sets and Limit Sets
In this section we present and prove some important properties of the limit sets and the invariant sets of difference equations
systems. These properties will be used in the proof of the LaSalle invariant principle.
2.1 Properties of invariant sets
We first present some lemmas on the properties of invariant sets.
Lemma 2 (Invariantly connected set and periodic motion). For any given continuous map T : Rm → Rm , suppose H is an
invariant set with finite elements. The set H is invariantly connected if and only if H is a periodic motion T n x.
4
Proof: Suppose H is a periodic motion with period K. By definition, H = {x, T (x), . . . , T K−1 (x)} is invariant and closed. It is also
straightforward to check that H = {x, T (x), . . . , T K−1 (x)} cannot be a union of any two non-empty disjoint closed invariant set.
Therefore, H is invariantly connected.
Now suppose H is invariantly connected. As a consequence, any x ∈ H cannot be a fixed point of the map T , otherwise either
T (H) ⊂ H or H is a union of two disjoint closed invariant sets: {x} and H \ {x}. Since x is not a fixed point and H is invariant,
there must exists at least one positive integer k > 1 such that T k(x) (x) = x. Denote the least such integer as k(x). Since H is a set of
finite elements, the least common multiple of all the k(x) such that x ∈ H is a finite positive integer, denoted by K. Therefore, for
any x ∈ H, T K (x) = x, which implies that H is a periodic motion. This conclude the proof.
t
u
Lemma 3 (Closures of invariant sets). For any continuous map T : Rm → Rm , the following statements hold:
1) The closure of any positively invariant set of T is positively invariant;
2) The closure of any bounded invariant set of T is invariant.
Proof: Suppose H is a positively invariant set of map T . Due to the continuity of T , if T (x) ∈
/ H for some x ∈ ∂ H, then there exists
y ∈ int(H) such that T (y) ∈
/ H. This implies that H is not positively invariant, which leads to a contradiction. Therefore, T (∂ H) ⊂ H
and thus T (H) ⊂ H. This concludes the proof for statement 1).
According to statement 1), the closure of a bounded invariant set is positively invariant. Suppose H is bounded and invariant. We
have T (H) ⊃ H, which leads to the following result: For any x ∈ H, there exists y ∈ H such that T (y) = x. Since H is bounded,
∂ H is well-defined and bounded. For any x∗ ∈ ∂ H, there exists a sequence {xn } ⊂ H such that {xn } → x∗ . For any xn ∈ H, there
exists yn ∈ H such that T (yn ) = xn . Now we obtain a sequence {yn } ⊂ H ⊂ H. Since H is a compact set, there exists a sequence
{nk } → ∞ such that the subsequence {ynk } converges to some y∗ ∈ H. Moreover, since map T is continuous,
T (y∗ ) = T lim ynk = lim T (ynk ) = lim xnk = x∗ ∈ H.
k→∞
Therefore, for any x∗
∈ H, there exists y∗
k→∞
k→∞
such that T (y∗ ) = x∗
∈H
∈ T (H). Now we have obtained both T (H) ⊂ H and T (H) ⊃ H.
Therefore, T (H) = H, which concludes the proof of statement 2).
t
u
Lemma 4 (Invariant set and extension of motion). For any continuous map T : Rm → Rm , a set H is an invariant set of T if and
only if each motion T n x starting in H has an extension in H.
Proof: Suppose H is an invariant set. Since H is positively invariant, for any x ∈ H, we have T n (x) ∈ H for any n ∈ N, which leads
to T n ⊂ H. On the other hand, since H is also negatively invariant, for any x ∈ H, there exists x−1 ∈ H such that T (x−1 ) = x. Let
T−1 (x) = x−1 . Since x−1 ∈ H, there exists x−2 ∈ H such that T (x−2 ) ∈ H. Following this argument and let Tn (x) = T n (x) for any
n ∈ N, we construct an extension Tn x = {Tn (x)}n∈Z of the motion T n x and the extension Tn x is in H.
Now suppose that each motion T n x starting in H has an extension Tn x in H. Since x ∈ H leads to Tn x ⊂ H for any x ∈ H, we have
T (x) ∈ H, which implies T (H) ⊂ H. In addition, for any x ∈ H, since there exists y = T−1 (x) ∈ H such that T (y) = x, we have
T (H) ⊃ H. Therefore, H is an invariant set of T . This concludes the proof.
t
u
Lemma 5 (Properties of the largest invariant set). For any continuous map T ∈ Rm → Rm and any set E ⊂ Rm , if M is the largest
invariant set in E, then the following statements hold:
1) M is the union all the extensions of motions that remain in E for all n ∈ Z;
2) x ∈ M if and only if there exists an extension of motion Tn x such that Tn x ⊂ E;
3) If E is compact, then M is compact.
Proof: For any extension of motion staring at x, denoted by Tn x, one can easily check that the set Tn x = {Tn (x)}n∈Z is invariant,
i.e., T (Tn x) = Tn x. If Tn x ∈ E, then, according to Remark 2, T (M ∪ Tn x) = T (M) ∪ T (Tn x) = M ∪ Tn x implies that Tn x ⊂ M. On the
other hand, for any x ∈ M, since M is invariant, we have T (x) ∈ M and there exists x−1 ∈ M such that T (x−1 ) = x. Then we further
have T 2 (x) ∈ M and there exists x−2 ∈ M such that T (x−2 ) = x−1 . Following this argument, we conclude that any x ∈ M is in some
extension of motion in M. This concludes the proof of statement 1).
Statement 2) is a straightforward result of statement 1).
5
Now we proceed to prove statement 3). For any sequence {xn } ⊂ M such that {xn } → x∗ , since E is compact, we have x∗ ∈ E.
Moreover, since xn ∈ M leads to T k (xn ) ∈ M for any k ∈ N, due to the continuity of T , we have
lim T k (xn ) = T k lim xn = T k (x∗ ).
n→∞
n→∞
Therefore, the motion T n x∗ satisfies T n x∗ ⊂ E. Moreover, since M is invariant and {xn } ⊂ M, for any n ∈ N, there exists yn ∈ M
such that T (yn ) = xn . Now we obtain a sequence {yn } ⊂ M ⊂ E. Since E is compact, there exists a subsequence {ynk } such that
{nk } → ∞ and {ynk } → y∗ ∈ E as k → ∞. Due to the continuity of map T , we have
T (y∗ ) = T lim ynk = lim T (ynk ) = lim xnk = x∗ .
k→∞
(x∗ )
y∗
k→∞
x∗
k→∞
y∗ ,
Let T−1
= ∈ E. Applying the same argument above for to
we obtain T−2 (x∗ ) ∈ E such that T (T−2 (x∗ )) = T−1 (x∗ ).
∗
n
∗
Continue this argument, we get an extension Tn x of the motion T x such that Tn x∗ ⊂ E.According to statement 1), we have
x∗ ∈ M. Now we have proved that any {xn } ⊂ M such that {xn } → x∗ leads to x∗ ∈ M. Therefore, M is a compact set.
t
u
2.2 Properties of limit sets
Lemma 6 (Closed forms of limit sets). Given a continuous map T : Rm → Rm , for any x ∈ Rm , the limit set of x given by Definition 6 satisfies
n
(2)
Ω (x) = ∩∞j=0 ∪∞
n= j {T (x)};
Similarly, for any set H ⊂ Rm , the limit set of H, given by Definition 6, satisfies
n
Ω (H) = ∩∞j=0 ∪∞
n= j T (H).
(3)
Proof: We first prove equation (2). Suppose y ∈ Ω (x). For any j ∈ N, since
(i there exists {nk }k∈N such that nk → ∞ and T nk (x) → y as k → ∞;
n
nk
(ii ρ(y, ∪∞
n= j {T (x)}) ≤ ρ(y, T (y)) for any k such that nk > j,
n
∞
n
by letting k → ∞, we have ρ(y, ∪∞
n= j {T (x)}) = 0, which implies that y ∈ ∪n= j {T (x)}. Since the argument above holds for any
∞
∞
∞
n
n
n
j ∈ N, we have y ∈ ∩∞j=1 ∪∞
n= j {T (x)}. On the other hand, for any y ∈ ∩ j=1 ∪n= j {T (x)}, since y ∈ ∪n= j {T (x)} for any j ∈ N,
∞
n
we have ρ(y, ∪n= j {T (x)}) = 0, that is,
inf
ρ(y,
z)
=
0,
for
any
j
∈
N.
Let
0
<
ε
<
1
and
j
=
1.
There
must exist some
∞
z∈∪n= j {T n (x)}
n1 ≥ 1 such that
Then let j = n1 + 1. There must exist some n2 ≥ j > n1 such that ρ(y, T n2 (x)) < ε 2 . Following
this argument, we construct a subsequence {nk }k∈Z+ such that {nk } → ∞ and ρ(y, T nk (x)) < ε k for any k ∈ Z+ , which implies that
T nk → y as k → ∞. Therefore, according to Definition 6, y ∈ Ω (x). This concludes the proof for equation (2).
ρ(y, T n1 (x)) < ε.
Similarly, equation (3) is proved by the following argument:
y ∈ Ω (H) ⇐⇒ ∃ {nk } → ∞ and {yk } ⊂ H, s.t. T nk (yk ) → y as k → ∞,
⇐⇒ ∀ j ∈ N, ∀ k ∈ N, ∃ nk ≥ j and yk ∈ H s.t. T nk (yk ) ∈ B(y, ε k ), for some 0 < ε < 1,
⇐⇒ ∀ j ∈ N,
⇐⇒ ∀ j ∈ N,
inf ky − T n (x)k = 0,
n≥ j, x∈H
n
ρ(y, ∪∞
n= j T (H)) = 0.
t
u
Lemma 7 (Invariance and asymptotic properties of limit set Ω (x)). For any continuous map T : Rm → Rm and any x ∈ Rm , the
following statements hold:
1) The limit set Ω (x) is closed and positively invariant;
2) If the motion T n x is a bounded set, then Ω (x) is
a) nonempty;
b) compact;
c) invariant;
d) invariantly connected;
e) the smallest set that T n (x) approaches as n → ∞.
6
n
Proof: The sketch of tis proof can be found on Page 4 of [11]. Let A j (x) = ∪∞
n= j {T (x)}. According to Lemma 6, we have
∞
Ω (x) = ∩ j=0 A j (x). Each A j (x) is a closed set since it is the closure of a set of countably many points in Rm . Therefore, as the
intersection of countably many closed sets A j (x)’s, Ω (x) is closed. Moreover, for any y ∈ Ω (x), by definition, there exists asequence
{nk } → ∞ such that T nk (x) → y as k → ∞. Let `k = nk + 1. Due to the continuity of map T , we haveT `k (x) = T T nk (x) → T (y),
which implies that T (y) is also a limit point of x, i.e., T (y) ∈ Ω (x). Therefore, we obtain T Ω (x) ⊂ Ω (x). This concludes the
proof of statement 1).
Now we prove statement 2). Since T n x is bounded, there exists a sequence {nk } → ∞ such that T nk (x) converges. By definition,
limk→∞ T nk (x) ∈ Ω (x). Therefore, Ω (x) is non-empty. This concludes the proof of statement 2)a).
n
∞
n
n
By definition, Ω (x) ⊂ ∪∞
n=0 {T (x)}. If T x is bounded, then ∪n=0 {T (x)} is bounded, which in turn implied that Ω (x) is bounded.
According to statement 1), Ω 9x) is closed. Therefore, Ω (x) ⊂ Rm is compact. This concludes the proof of statement 2)b).
For any y ∈ Ω (x), there exists {nk } → ∞ such that T nk (x) → y. Let `k = nk − 1, then T T `k (x) → y as k → ∞. Since {T `k (x)}k∈N ⊂
T n x is bounded, there exists a sequence {kr } → ∞ such that T `kr (x) converges to some z ∈ Ω (x) as r → ∞. Due to the continuity of
T , we have
T (z) = T lim T `kr (x) = lim T `kr +1 (x) = lim T nkr (x) = y.
r→∞
r→∞
r→∞
Now wehave shown that, for any y ∈ Ω (x), there exists z ∈ Ω (x) such that T (z) = y. Therefore, T Ω (x) ⊃ Ω (x). We already have
T Ω (x) ⊂ Ω (x) according to statement 1). Therefore, Ω (x) is invariant. This concludes the proof of statement 2)c).
We prove statement 2)d) by contradiction. Suppose Ω (x) is a union
of two disjoint sets Ω1 (x) and Ω2 (x), which
are both closed,
non-empty, and invariant. As a consequence, d = ρ Ω1 (x), Ω2 (x) > 0. Due to the
continuity of T and T Ω1 (x) = Ω1 (x), for any
0 < δ1 < d/2, there exists ε1 satisfying 0 < ε1 < δ1 such that T B(Ω1 (x), ε1 ) ⊂ B(Ω1 (x), δ1 ). Here we adopt the generalized
definition of an open ball around a set. That is, for any set S, B(S, ε) = {x ∈ Rm | ρ(x, S) < ε}. Similar to the argument above, we
have that, for any 0 < δ2 < d/2, there exists 0 < ε2 < δ2 such that T B(Ω2 (x), ε2 ) ⊂ B(Ω2 (x), δ2 ). Moreover, since Ω1 (x) ⊂
Ω (x), there must exist a sequence {nk } → ∞ such that T nk (x) enters B Ω1 (x), ε1 for infinite times. For any k, there must exist a
positive integer `k > nk such that T `k (x) ∈ B Ω2 (x), ε2 , otherwise Ω2 (x) cannot be a subset of the limit set of x. However, since
T nk (x) ∈ B Ω1 (x), ε1 , T nk +1 (x) cannot be in B Ω2 (x), ε2 . Therefore, for each k ∈ N, there exists `˜k satisfying nk < `˜k < `k such
˜
˜
that T `k (x) ∈
/ B Ω1 (x), ε1 and T `k (x) ∈
/ B Ω2 (x), ε2 . That is, for any k ∈ N,
˜
T `k (x) ∈ T n x \ B Ω1 (x), ε1 ∪ B Ω2 (x), ε2 ,
˜
which is a bounded and closed set. Since there are infinitely many `˜k ’s such that T `k (x) is in the compact set T n x \ B Ω1 (x), ε1 ∪
B Ω2 (x), ε2 , this compact set must contain at least one limit point z ∈ Ω (x), which contradicts the assumption that Ω (x) =
Ω1 (x) ∪ Ω2 (x) since z ∈
/ Ω1 (x) and z ∈
/ Ω2 (x). This concludes the proof of statement 2)d).
n
To prove statement 2)e), we first
Ω (x). We point out that T n (x) approaches Ω (x)
prove by contradiction that nT (x) approaches
n
if and only if ρ T (x), Ω (x) → 0 as n → ∞. Suppose ρ T (x),
Ω (x) does not converges to 0. Then there exists ε > 0 such
that, for any k ∈ N, there exists n ≥ k such that ρ T n (x), Ω (x) ≥ ε. By letting k = 1, 2, . . . , we obtain a subsequence {nk } → ∞
such that ρ T nk (x), Ω (x) ≥ ε for any k. However, since {T nk (x)}k∈N is bounded, there exists a sequence {kr } → ∞ such that
T nkr → y ∈ Ω (x), which implies
ρ T nkr (x), y ≥ ρ T nkr (x), Ω (x) → 0
and contradicts with ρ T nkr (x), Ω (x) ≥ ε for any r. Therefore ρ T n (x), Ω (x) → 0.
Now we proceed to prove that Ω (x) is the smallest set that T n (x) approaches. For any set A, if T n (x) approaches A, then T n (x) also
n
approaches A. Therefore, we only need to discuss
the case when A is a closed set. Suppose T (x) → A as n → ∞. Then we have
n
k
that, for any sequence {nk } → ∞, ρ T (x), A → 0. In addition, for any y ∈ Ω (x), there exists a sequence {nk } → ∞ such that
nk
T nk → y as k → ∞. Suppose y ∈
/ A. SinceA is closed, we have ρ(A, y) > 0. For
such sequence
{nk } that T (x) → y, we already
obtain ρ T nk (x), A → 0 and ρ T nk (x), y → 0. Since ρ(A, y) ≤ ρ T nk (x), A + ρ T nk (x), y for any k ∈ N, we have ρ(A, y) = 0,
which contradicts ρ(A, y) > 0. Therefore, y ∈ A and thus Ω (x) ⊂ A. This concludes the proof of statement 2)e).
t
u
The following lemma presents some important properties of the limit set of any set H, i.e., Ω (H). The proof follows the same line
of argument in the proof of Lemma 7.
Lemma 8 (Invariance and asymptotic properties of limit set Ω (H)). For any continuous map T : Rm → Rm and any set H ⊂ Rm ,
the following statements for the limit set Ω (H) hold:
7
1) For any x ∈ H, Ω (x) ⊂ Ω (H);
2) Ω (H) is closed and positively invariant;
n
3) If ∪∞
n=0 T (H) is bounded, then
a) Ω (H) is non-empty, compact, and invariant;
b) for any x ∈ H, T n (x) approaches Ω (H);
c) Ω (H) is the smallest set that T n (H) approaches as n → ∞.
n
Remark 4. Unlike the limit set of a point, Ω (H) is not necessarily invariantly connected, even if ∪∞
n=0 T (H) is bounded. For
example, consider the following one-dimension first-order difference equation system:
x(n + 1) = T x(n) = εx(n)2 + (1 − ε)x(n),
where x(n) ∈ R for any n ∈ N and 0 < ε < 1. One can easily check that the set of fixed points is {0, 1} and Ω ([0, 1]) = {0, 1}, which
is a union of two disjoint, non-empty, and closed invariant sets: {0} and {1}.
Lemma 9 (Limit set of compact & positively invariant set). For any continuous map T : Rm → Rm , suppose E ⊂ Rm is a compact
and positively invariant set. The following statements hold:
n
1) Ω (E) = ∩∞
n=0 T (E);
2) Ω (E) is non-empty, compact, and invariant;
3) Ω (E) is the largest invariant set in E.
Proof: Since E is compact and T is continuous, T n (E) is compact for any n ∈ N. Since E is positively invariant, T (E) ⊂ E and
T n+1 (E) ⊂ T n (E) for any n ∈ N. Therefore, by definition,
∞
∞
j
n
j
Ω (E) = ∩∞j=0 ∪∞
n= j T (E) = ∩ j=0 T (E) = ∩ j=0 T (E).
This concludes the proof for statement 1).
n
0
Since ∪∞
n=0 T (E) = T (E) = E is bounded, according to statement 3)a) in Lemma 8, Ω (E) is non-empty, compact, and invariant.
This proves statement 2).
Now we prove by contradiction that Ω (E) is the largest invariant set in E. Suppose there exists a non-empty set A ⊂ E such that
A ∩ Ω (E) = φ , and T A ∪ Ω (E) = A ∪ Ω (E).
Since T A ∪ Ω (E) = T (A) ∪ T Ω (E) = T (A) ∪ Ω (E), we have T (E) ⊃ T (A) ⊃ A. In addition,
n
T A ∪ Ω (E) = A ∪ Ω (E) ⇒ T n A ∪ Ω (E) = A ∪ Ω (E), for any n ∈ N. ⇒ ∩∞
n=0 T A ∪ Ω (E) = A ∪ Ω (E).
In the meanwhile,
T A ∪ Ω (E) = T (A) ∪ Ω (E)
⇒
T n A ∪ Ω (E) = T n (A) ∪ Ω (E) ⊂ T n (E) ∪ Ω (E)
∞
n
∞
n
n
∩∞
= ∩n=0 T n (E) ∪ Ω (E) = Ω (E)
n=0 T A ∪ Ω (E) ⊂ ∩n=0 T (E) ∪ T Ω (E)
⇒
A ∪ Ω (E) = Ω (E)
⇒
A ⊂ Ω (E),
⇒
which contradicts A ∩ Ω (E) = φ . This concludes the proof for statement 3).
t
u
3 LaSalle Invariance Principle and Its Extension
With all the preparation work in Section 1 and Section 2, now we are ready to present the main theorem on the original LaSalle
invariance principle for discrete-time dynamical systems. The proof can be found on Page 6 of [11].
Theorem 1 (Discrete-time LaSalle invariance principle). Let G be any set in Rm . Consider a difference equations system defined
by a map T : Rm → Rm that is well-defined for any x ∈ G and continuous at any x ∈ G. Suppose there exists a scalar map V : Rm → R
satisfying
8
i) V (x) is continuous at any x ∈ G;
ii) V T (x) −V (x) ≤ 0 for any x ∈ G.
For any x0 ∈ G, if the solution to the following initial-value problem
(
x(n + 1) = T x(n) ,
x(0)
= x0
−1
satisfies that ∪∞
n=0 {x(n)} is bounded and x(n) ∈ G for any n ∈ N, then there exists
x ∈ R such that x(n) → M ∩V (c) as n → ∞,
−1
m
where V (c) = {x ∈ R |V (x) = c} and M is the largest invariant set in E = x ∈ G V T (x) −V (x) = 0 .
Proof: Let X = ∪∞
n=0 {x(n)}. We have that X ⊂ G is compact. Since V (x) is continuous on G,
V (x) is lower bounded on X. Moreover,
since V x(n) is non-increasing with n for any n ∈ N, there exists c ∈ R such that V x(n) → c as n → ∞.
nk
For any
y ∈ Ω (x0 ), since there exists {nk } → ∞ such that x(nk ) = T (x0 ) → y as k → ∞ and due to the continuity of V , we have
V xnk → V (y). Therefore,
V (y) = lim V x(nk ) = lim V x(n) = c, for any y ∈ Ω (x0 ),
k→∞
which leads to Ω (x0
n→∞
) ∈ V −1 (c).
Moreover, for any y∈ Ω (x0 ), since X is bounded,
according to Lemma 7, Ω (x0 ) is invariant. Therefore, T (y) ∈ Ω (x0 ), which
implies that V T (y) = c and thus V T (y) −V (y) = 0 for any y ∈ Ω (x0 ). Now we obtain Ω (x0 ) ⊂ E. Since Ω (x0 ) ⊂ E and M is
the largest invariant set of E, we have Ω (x0 ) ⊂ M ∩V −1 (c). Finally, since T n (x) approaches Ω (x0 ) as n → ∞, x(n) → M ∩V −1 (c)
as n → ∞.
t
u
The classic LaSalle invariance principle stated in Theorem 1 requires that both T and V are well-defined on G. Below we present a
simple extension of the classic LaSalle invariance principle. This extension establish the converge of the solution x(n) when T and
V are not defined on ∂ G but x(n) is uniformly bounded from ∂ G after some finite time N.
Theorem 2 (Extension of LaSalle invariance principle). Consider the following difference equations system:
x(n + 1) = T x(n) ,
(4)
where T : Rm → Rm is continuous
on some set G ⊂ Rm . Suppose there exists a map V : Rm → R satisfying: i) V (x) is continuous
at any x ∈ G; ii) V T (x) − V (x) ≤ 0 for any x ∈ G. For any x0 ∈ G, if there exists a compact set Gc and N ∈ N such that the
−1
solution x(n) to equation (4) with x(0) = x0 satisfies x(n) ∈ Gc for any n ≥ N, then there exists
c ∈ R such that
x(n) → M ∩V (c)
as n → ∞, where V −1 (c) = {x ∈ Rm |V (x) = c} and M is the largest invariant set in E = x ∈ Gc |V T (x) −V (x) = 0 .
Proof: For any such x0 ∈ G, since x(n) is the solution, we have x(n) = T n (x0 ) for any n ∈ N. According to Lemma 6,
∞
n
n
Ω (x0 ) = ∩∞j=0 ∪∞
n= j {T (x0 )} ⊂ ∪n=N {T (x0 )} ⊂ Gc .
For any n ≥ N, since x(n) ∈ ∪∞j=N {x( j)} ⊂ Gc and V is continuous on Gc , V x(n) is uniformly lower bounded for all n ≥ N. In
addition, since V x(n) is non-increasing, there exists c ∈ R such that limn→∞ V x(t) = c.
For any y ∈ Ω (x0 ), there exists a sequence {nk } → ∞ such that {x(nk )} → y as k → ∞. Since V is continuous on G, we have
V x(nk ) → V (y). Moreover, limn→∞ V (n) = c leads to V (y) = c. Therefore, Ω (x0 ) ⊂ V −1 (c).
According to Lemma 7, Ω (x0 ) is invariant. Therefore, T (y) ∈ Ω (x0 ) for any y ∈ Ω (x0 ), which in turn implies that V T (y) −V (y) =
0 for any y ∈ Ω (x0 ) and thereby Ω (x0 ) ⊂ E. Moreover, since Ω (x0 ) is invariant, Ω (x0 ) ⊂ M. Therefore, Ω (x0 ) ⊂ M ∩ V −1 (c).
Since x(n) = T n (x) approaches Ω (x0 ), x(n) → M ∩V −1 (c) as n → ∞. This concludes the proof.
t
u
4 Advanced Versions of LaSalle Invariance Principle
In this section we provide an incomplete list of references on the extensions and more advanced versions of LaSalle invariance
principle for the interest of further reading. In Section 8, Chapter 1 of [11], the author discusses the vector Lyapunov functions;
9
Cortés et al. [5] propose a sufficient condition for the convergence of discrete-time systems to the fixed points. Hale [7] extends the
LaSalle invariance principles to autonomous systems with infinite dimensions; Shevitz and Paden [13] discusses LaSalle invariance
principle in non-smooth systems; Extensions of LaSalle’s results to switched systems are provided by Hespanha et al. [8], Bacciotti
et al. [2], and Mancilla et al. [12]; Alberto et al. [1] consider the invariance principle for discrete-time dynamical systems with
generalized Lyapunov functions of which the first difference are positive in some bounded regions; Results on Lyapunov functions
and invariance principles for difference inclusions systems can be found in the research articles by Kellett and Teel [9] and Bullo et
al. [3] (see Lemma 4.1), as well as in the book by Bullo et al. [4] (see Theorem 1.21); We refer to the book by Goebel et al. [6] for
a systematic treatment of hybrid dynamical systems.
References
1. L. F. C. Alberto, T. R. Calliero, and A. C. P. Martins. An invariance principle for nonlinear discrete autonomous dynamical
systems. IEEE Transactions on Automatic Control, 52:692–697, 2007. doi:10.1109/TAC.2007.894532.
2. A. Bacciotti and L. Mazzi. An invariance principle for nonlinear switched systems. Systems & Control Letters, 54(11):1109–
1119, 2005. doi:10.1016/j.sysconle.2005.04.003.
3. F. Bullo, R. Carli, and P. Frasca. Gossip coverage control for robotic networks: Dynamical systems on the space of partitions.
SIAM Journal on Control and Optimization, 50(1):419–447, 2012. doi:10.1137/100806370.
4. F. Bullo, J. Cortés, and S. Martı́nez. Distributed Control of Robotic Networks. Princeton University Press, 2009. URL:
http://www.coordinationbook.info.
5. J. Cortés, S. Martı́nez, T. Karatas, and F. Bullo. Coverage control for mobile sensing networks. IEEE Transactions on Robotics
and Automation, 20(2):243–255, 2004. doi:10.1109/TRA.2004.824698.
6. R. Goebel, R. G. Sanfelice, and A. R. Teel. Hybrid Dynamical Systems: Modeling, Stability, and Robustness. Princeton
University Press, 2012.
7. J. K. Hale. Dynamical systems and stability. Journal of Mathematical Analysis and Applications, 26:39–59, 1969. doi:
10.1016/0022-247X(69)90175-9.
8. J. Hespanha, D. Liberzon, D. Angeli, and E. D. Sontag. Nonlinear norm-observability notions and stability of switched systems.
IEEE Transactions on Automatic Control, 50(2):154–168, 2005. doi:10.1109/TAC.2004.841937.
9. C. M. Kellett and A. R. Teel. Smooth Lyapunov functions and robustness of stability for difference inclusions. Systems &
Control Letters, 52:395–405, 2004. doi:10.1016/j.sysconle.2004.02.015.
10. H. K. Khalil. Nonlinear Systems. Prentice Hall, 3 edition, 2002.
11. J. P. LaSalle. The Stability of Dynamical Systems. SIAM, 1976. doi:10.1137/1.9781611970432.
12. J. L. Mancilla-Aguilar and R. A. Garcı́a. An extension of LaSalle’s invariance principle for switched systems. Systems &
Control Letters, 55:376–384, 2006. doi:10.1016/j.sysconle.2005.07.009.
13. D. Shevitz and B. Paden. Lyapunov stability theory of nonsmooth systems. IEEE Transactions on Automatic Control,
39(9):1910–1914, 1994.
14. M. Vidyasagar. Nonlinear Systems Analysis. SIAM, 2002. doi:10.1137/1.9780898719185.
| 3cs.SY
|
1
Distributed Fusion of Labeled Multi-Object
Densities Via Label Spaces Matching
arXiv:1603.08336v1 [cs.SY] 28 Mar 2016
Bailu Wang, Wei Yi, Suqi Li, Lingjiang Kong and Xiaobo Yang
University of Electronic Science and Technology of China, School of Electronic Engineering, Chengdu City,
China
Email: [email protected]
Abstract—In this paper, we address the problem of the
distributed multi-target tracking with labeled set filters in the
framework of Generalized Covariance Intersection (GCI). Our
analyses show that the label space mismatching (LS-DM) phenomenon, which means the same realization drawn from label
spaces of different sensors does not have the same implication,
is quite common in practical scenarios and may bring serious
problems. Our contributions are two-fold. Firstly, we provide a
principled mathematical definition of “label spaces matching (LSDM)” based on information divergence, which is also referred
to as LS-M criterion. Then, to handle the LS-DM, we propose a
novel two-step distributed fusion algorithm, named as GCI fusion
via label spaces matching (GCI-LSM). The first step is to match
the label spaces from different sensors. To this end, we build a
ranked assignment problem and design a cost function consistent
with LS-M criterion to seek the optimal solution of matching
correspondence between label spaces of different sensors. The
second step is to perform the GCI fusion on the matched label
space. We also derive the GCI fusion with generic labeled multiobject (LMO) densities based on LS-M, which is the foundation
of labeled distributed fusion algorithms. Simulation results for
Gaussian mixture implementation highlight the performance of
the proposed GCI-LSM algorithm in two different tracking
scenarios.
I. I NTRODUCTION
Compared with centralized multi-object tracking methods,
distributed multi-sensor multi-object tracking (DMMT) methods generally benefit from lower communication cost and
higher fault tolerance. As such, they have increasingly attracted interest from tracing community. When the correlations
between the estimates from different sensors are not known,
devising DMMT solutions becomes particularly challenging.
The optimal fusion to this problem was developed in [1], but
the computational cost of calculating the common information
can make the solution intractable in practical applications.
An alternative is to use suboptimal fusion technique, namely,
Generalized Covariance Intersection (GCI) or exponential
mixture Densities (EMDs) [2] pioneered by Mahler [3]. The
highlight of GCI is that it is capable to fuse both Gaussian and
non-Gaussian formed multi-object distributions from different
sensors with completely unknown correlation.
Based on GCI fusion rule, distributed fusion with the
probability hypothesis density [4], [5] (PHD)/cardinalized
PHD [6], [7] and multi-Bernoulli [8]–[14] filters has been
explored in [3], [15]–[20]. However, the aforementioned filters
on one hand are not multi-object trackers as target states
are indistinguishable, and on the other hand are almost not
the closed-form solution to the optimal Bayssian filter even
though a special observation model, i.e., standard observation
model [19] is assumed. Recently, the notion of labeled random
finite set (RFS) is introduced to address target trajectories and
their uniqueness in [21]–[27]. Vo et al. proposed a class of
generalized labeled multi-Bernoulli (GLMB) 1 densities which
is a conjugate prior and also closed under the ChapmanKolmogorov equation for the standard observation model in
Bayesian inference. Moreover, the relevant stronger results,
δ-GLMB filter, which can be directly used to multi-target
tracking, can not only produce trajectories formally but also
outperform the aforementioned filters. Except for the standard
observation model, the labeled set filter also has achieved
some good results for generic observation model. In [27],
Papi et al. proposed a δ-GLMB density approximation of the
labeled multi-object (LMO) density and developed an efficient
δ-GLMB filter for the generic observation model. [27] also
provides a further detailed expression for the universal LMO
density, which is the product of the joint existence probability
of the label set and the joint probability density of states
conditional on their corresponding labels.
Due to the advantages of labeled set filters, it is meaningful
to investigate their generalization to the distributed environment. In [28], Fantacci et al. derived the closed-form solutions
of GCI fusion with marginalized δ-GLMB (Mδ-GLMB) and
labeled multi-Bernoulli (LMB) posteriors, and highlight the
performance of the relevant DMMT algorithms based on the
assumption that different sensors share the same label space.
However, our analyses show that this assumption is hard to
be satisfied in many real world applications. In other word,
the label spaces of each sensors always mismatch in the sense
that the same realization drawn from label spaces of different sensors does not have the same implication in practical
scenarios, which is referred to as “label space mismatching
(LS-DM)”2. When LS-DM happens, the direct fusion with the
labeled posteriors from different sensors will exhibit a counterintuitive behavior: the fusion will be performed between
objects with different labels, making the fusion performance
poor. Therefore, there is a lack of robustness in practice if one
perform fusion with labeled posteriors from different sensors
directly.
1 GLMB distribution is also simply named as Vo-Vo distribution by Malher
in his book [30] first time.
2 The letter “D” in the abbreviation of label space mismatching means
double “M”, i.e., “miss” and “matching”.
2
To get rid of the bad influences of LS-DM, two promising
thoughts can be employed: one is to perform GCI fusion with
unlabeled version of posteriors from different sensors, which
is firstly proposed in [29], and the other is to match the label
spaces of different sensors and then perform GCI fusion on
the matched label space. This paper focuses on the latter and
our contributions are two-fold:
i) We provide a principled mathematical definition for “label space matching” based on information divergence.
This definition also provides a criterion to judge whether
the label spaces are matching or not. Moreover to make
this criterion have practicality, we derive the specified
expression of set marginal density for single-object case.
ii) We proposed a two-step distributed fusion algorithm,
namely, GCI fusion with LMO densities via label spaces
matching (GCI-LSM for short). First step is to match the
label spaces from different sensors. To this end, the ranked
assignment problem is built to seek the optimal solution of
the matching correspondence with the cost function based
on LS-M criterion. Then, perform GCI fusion with LMO
densities on matched label space. In addition, we derive
the GCI fusion with the generic LMO density based on
the assumption that label spaces are matching, which is
the foundation of many labeled DMMT..
In numerical results, the performance of the proposed fusion
algorithm with Gaussian mixture (GM) implementation is
verified.
II. BACKGROUND
A. Notation
In this paper, we inhere the convention that single-target
states are denoted by the small letter “x”, e.g., x, x and
the multi-target states are denoted by capital letter “X”, e.g.,
X, X. To distinguish labeled states and distributions from the
unlabeled ones, bold face letters are adopted for the labeled
ones, e.g., x, X, π. Observations generated by single-target
states are denoted by the small letter “z”, i.e., z, and the multitarget observations are denoted by capital letter “Z”, i.e., Z.
Moreover, blackboard bold letters represent spaces, e.g., the
state space is represented by X, the label space by L, and the
observation space by Z. The collection of all finite sets of X
is denoted by F (X) and Fn (X) denotes all finite subsets with
n elements.
The labeled single target state x is constructed by augmenting a state x ∈ X with an label ℓ ∈ L. The labels are usually
drawn form a discrete label space, L = {αi : i ∈ N}, where
all αi are distinct and the index space N is the set of positive
integers.
The multi-target state X, the labeled multi-target state X
and the multi-target observation Z are modelled by the finite
set of single-target states, the finite set of labeled single-target
states, and the finite set of observations generated by singletarget states, respectively, i.e.,
X ={x1 , · · · , xn } ⊂ X
X ={x1 , · · · , xn } ⊂ X × L
Z ={z1 , · · · , zm } ⊂ Z
(1)
We use the multi-object exponential notation
Y
hX ,
h(x)
(2)
x∈X
for real-valued function h, with h∅ = 1 by convention. To
admit arbitrary arguments like sets, vectors and integers, the
generalized Kronecker delta function is given by
1, if X = Y
δY (X) ,
(3)
0, otherwise
and the inclusion function is given by
1, ifX ⊆ Y
1Y (X) ,
0, otherwise
(4)
If X is a singleton, i.e., X = {x}, the notation 1Y (X) is used
instead of 1Y ({x}).
Also notice that the labeled multi-target state is an RFS on
X × L with distinct labels. The set of labels of an labeled RFS
X is given by L(X) = {L(x) : x ∈ X}, where L : X×L → L
is the projection defined by L((x, ℓ)) = ℓ. The distinct label
indicator
△ (X) = δ|X| (|L(X)|)
(5)
B. Labeled Multi-Object Density
For an arbitrary labeled RFS, its LMO density can be
represented as the expression given in Lemma 1 [27].
Lemma 1. Given an labeled multi-object density π on F (X×
L), and for any positive integer n, we define the joint existence
probability of the label set {ℓ1 , ℓ2 , · · · , ℓn } by
Z
w({ℓ1 , · · · , ℓn }) = π({(x1 , ℓ1 ),· · · ,(xn , ℓn )})d(x1 ,· · ·, xn )
(6)
and the joint probability density on Xn of the states x1 , · · · , xn
conditional on their corresponding labels ℓ1 , · · · , ℓn by
π({(x1 , ℓ1 ), · · · , (xn , ℓn )})
w({ℓn , · · · , ℓn })
(7)
Thus, the LMO density can be expressed as
P ({(x1 , ℓ1 ), · · · , (xn , ℓn )}) =
π(X) = w(L(X))P (X).
(8)
C. Multi-target Bayesian filter
Finite Set Statistics (FISST) proposed by Mahler, has provided a rigorous and elegant mathematical framework for the
multi-target detection, tracking and classification problem in
an unified Bayesian paradigm.
In the FISST framework, the optimal multi-target Bayesian
filter 1 propagates RFS based posterior density πk (Xk |Z 1:k )
conditioned on the sets of observations up to time k, Z 1:k , in
time with the following recursion [19]:
πk|k−1 (Xk |Z 1:k−1 )
Z
= fk|k−1 (Xk |Xk−1 )πk−1 (Xk−1 |Z 1:k−1 )δXk−1 ,
(9)
1 Note that the multi-object Bayesian filter in (9) and (10) is also appropriate
for the labeled set posterior, and the labeled set integrals defined as [21] are
involving.
3
πk (Xk |Z 1:k ) = R
gk (Zk |Xk )πk|k−1 (Xk |Z 1:k−1 )
(10)
gk (Zk |Xk )πk|k−1 (Xk |Z 1:k−1 )δXk
where fk|k−1 (Xk |Xk−1 ) is the multi-target Markov transition
function andR gk (Zk |Xk ) is the multi-target likelihood function
of Zk , and ·δX denotes the set integral [19] defined by
Z
Z
∞
X
1
f ({x1 , · · · , xn })dx1 · · · dxn . (11)
f (X)δX =
n!
n=0
D. GCI Fusion Rule
The GCI was proposed by Mahler specifically to extend
FISST to distributed environments [9]. Consider two nodes 1
and 2 in the sensor network. At time k, each nodes maintain
its own local posteriors π1 (X|Z1 ) and π2 (X|Z2 ) which are
both the RFS based densities. Under the GCI 2 proposed by
Mahler, the fused distribution is the geometric mean, or the
exponential mixture of the local posteriors [3],
πω (X|Z1 , Z2 ) = R
π1 (X|Z1 )ω1 π2 (X|Z2 )ω2
π1 (X|Z1 )ω1 π2 (X|Z2 )ω2 δX
(12)
where ω1 , ω2 (ω1 + ω2 = 1) are the parameters determining
the relative fusion weight of each distributions.
Eq. (12) is derived by following that the distribution that
minimizes the weighted sum of its Kullback-Leibler divergence (KLD) with respect to a given set of distributions is
an EMD [3],
πω = arg min(ω1 DKL (π k π1 ) + ω2 DKL (π k π2 ))
π
where DKL denotes the KLD with
Z
f (X)
DKL (f ||g) , f (X) log
dX.
g(X)
(13)
(14)
Note the integral in (14) must be interpreted as a set integral.
III. L ABEL S PACE M ISMATCHING P HENOMENON AND
P ROMISING S OLUTIONS
The GCI formula in (12) is generally computationally
intractable for the set integrals need to integrate over all
joint state spaces, considering each cardinality (number of
objects). Fortunately, it is tractable to derive the closedform solutions for GCI fusion with many simplistic labeled
densities including LMB and Mδ-GLMB densities, which can
simplify the G-CI formula largely. However, these closedform solutions are derived based on the assumption that the
label spaces of different local labeled set filters are matching,
and this assumption is really harsh in practice making these
solutions restrictive in realworld DMMT.
In this section, we firstly analyze the causes of label spaces
mismatching (LS-DM) phenomenon in terms of two popular
birth procedures, and then provide two novel methods to solve
this challenge problem.
2 Note that GCI fusion rule in (12) is also appropriate for the labeled set
posterior, and the labeled set integrals defined as [21] are involving.
A. LS-DM Phenomenon
The essential meaning of LS-DM is that the same realization
drawn from label spaces of different sensors does not have the
same implication. The underlying implication LS-DM is that
the posterior spatial distributions of the same object in different
sensors only have a tiny discrepancy. This phenomenon is quite
common in labeled DMMT. It may originate from any time
steps during the recursion of multi-object filtering and fusing,
and will last during the subsequent time steps in many cases.
Naturally, the birth procedure has a decisive influence on the
matching of label spaces of different sensors. Hence, in the
following, we analyze the causes of LS-DM in terms of two
popular birth procedures.
(1) Adaptive birth procedure (ABP) [22]. This birth procedure
is widely used, in which new-born targets are based on the
observations not associated to the persisting targets. Due
to the randomness of the observations, it is really difficult
to guarantee that the same births of different local set
filters are labeled using the same object label. In addition,
the observation sets provided by different sensors incorporating noisy observations of objects, stochastic missdetections, and stochastic clutters are also contributed to
the LS-DM of persisting objects. For instance, if sensor 1
loses a object due to miss-detection and re-initiate it later,
while sensor 2 keep locking on this object always, then
the mismatching of the label of this object will arise.
(2) Priori knowledge based on birth procedure (PBP) [8].
This birth procedure is often used in some well-known
scenarios with the priori of positions of object births, e.g.,
entrance of marketplace, airport etc. Generally, the object
label has two dimension, ℓ = (k, i), where k is the time of
birth, and i is a unique index to distinguish objects. The
priori of the born positions for PBP can provide reference
for the object index ℓ, but contribute little to the birth
time k, hence there still exists a chance of mismatching
for the births since it is easily effected by the uncertain of
measurement noise, clutter and the variance of the prior of
the born position. In addition, due to that persisting objects
may be wrongly dominated by clutters, or be truncated due
to miss-detection in the following time steps, the LS-DM
for persisting objects also happen sometimes.
The above analyses suggest that for both ABP and PBP,
it is difficult to ensure different sensors share the same label
space. Note that PBP suffer less from LS-MM than ABP for
it can use the prior information as a reference. In a word,
to ensure the matching of label spaces of each sensors, an
ideal detecting environment, in which each sensor dose not
have miss-detections and clutters, and the estimate accuracy
of each sensor is enough high, is required.
B. Promising Solutions for LS-DM
To break away the bad influence of LS-MM, we propose
two solutions:
• The first method [29] is that the GCI fusion is performed
on unlabeled state space via transforming the labeled RFS
densities to their unlabeled versions. Therefore, this fusion
method has robustness. For the GLMB family, we had
4
proved that their unlabeled versions is the generalized multiBernoulli (GMB) distributions [29], and the GCI fusion with
GMB distributions (GCI-GMB) is also proposed in [29].
• The second method is that firstly match the label spaces
from different sensors, then perform GCI fusion with labeled densities on macthed labeled state space as shown in
Fig 1. This approach is referred to as GCI fusion with label
space matching (GCI-LSM).
This paper mainly focuses on the GCI-LSM fusion method.
Labeled RFS
Density 1
Labeled RFS
Density 2
Label Space
Matching
share the same
label space
GCI
Fusion
Fused
Density
Fig. 1. GCI-LSM: the label spaces of different sensors are matched through
some means each time firstly, then perform GCI fusion on labeled state space.
IV. GCI F USION
VIA
L ABEL S PACE M ATCHING
Based on the second solution of LS-DM, label spaces
matching and the closed-form solution of GCI fusion with
LMOs are the two key points need to be addressed. To clearly
describe the concept of label space matching (LS-M), we
firstly give the mathematical definition of label spaces matching based on information divergence, also referred to as LS-M
criterion, which is the foundation of GCI-LMS fusion method.
Then by solving the built ranked assignment problem about
the matching relationship of objects between different sensors,
we then get matched label spaces. Finally with this condition
different label spaces are matched, the closed-form solution of
GCI fusion with universal LMO densities is derived.
A. The Mathematical Description of Label Space Matching
In order to clearly describe “label space matching”, we
formulate it in a rigorous mathematical model shown in
Definition 1. Definition 1 also provides a criterion to judge
whether the label spaces from different sensors are matching
or not, and we call this criterion as LS-M criterion.
Definition 1. Consider a scenario that sensor 1 and sensor
2 observe the same spatial region. Suppose that π1 (·) and
π 2 (·) with state space X and label space Li are the multiobject posteriors of sensor 1 and sensor 2 respectively. The
RFS Ψi , i = 1, 2 with the probability density πi (·) can be
represented as the union
] (ℓ)
Ψi =
(15)
ψi
ℓ∈L
(ℓ)
ψi
with the state space X × {ℓ} is the random finite
where
subset of Ψ.
Then L1 and L2 are said to be matching only if
(ℓ)
(ℓ)
L1 = L2 and ∀ ℓ ∈ L1 , D( π 1 || π 2 ) ≤ Γm
(ℓ)
(16)
where π s (·) is the probability density of ψ (ℓ)
s , ℓ ∈ Ls , s =
(ℓ)
(ℓ)
1, 2, Γm is a given threshold, and D( π 1 (·)|| π2 (·)) describes the “distance” between two distributions.
The condition that L1 = L2 demands that both the cardinalities and each elements of the label spaces of sensor 1
and sensor 2 have the same values. Note ψ (ℓ)
s is the random
(ℓ)
finite subset related the object with label ℓ, and π s is
the probability density for object ℓ in sensor s. Hence, the
(ℓ)
(ℓ)
condition D( π 1 || π2 ) < Γm demands that the densities
of object ℓ in sensors 1 and 2 have a slight difference,
which ensures that the object label ℓ of sensors 1 and 2 are
(ℓ)
matching. As π s incorporates all the statistical information
about object ℓ, and thus it is reasonable to judge the matching
relationship of label ℓ based on its probability densities. In
a word, to match the label spaces L1 and L2 , one-to-one
object matching constrain should be satisfied between different
sensors.
Remark 1. The parameter Γm in (16) is a given threshold,
and the slighter its values is, the harsher the LS-M criterion is.
In ideal case, Γ0 which means the objects of different sensors
share the same density. The “distance” D(f ||g) in (16) usually
chooses information-based divergences including KLD, Rényi,
Csiszár-Morimoto (AliSilvey), and Cauchy-Schwarz, etc., to
measure the similarlies/differences of different multi-object
density.
A key point of using the LS-M criterion is to compute
(ℓ)
the probability density πs (·) from the global multi-object
(ℓ)
density π s (·). π s (·) is also called as set marginal density
(ℓ)
of π s (·) with respective to π s (·). In [31], we preliminarily
give the concept of the set marginal density as shown in
Definition 3, its generalized computing method as shown
in Lemma 1, and its specified computing method for joint
multi-Bernoulli RFS. In [32], the set marginal density is
extened to labeled multi-object density. In this section, we
derive the specified expression for the set marginal density of
(ℓ)
labeled random finite subset π s with respective to π s in
Proposition 1. Proposition 1 guarantees the practicability of
the LS-M criterion.
Definition 2. Let Ψ be an RFS. Then for any random finite
subset of Ψ, denoted by ψ, its set density function fψ (X), is
called set marginal density of ψ with respect to Ψ.
Lemma 2. Let Ψ be an RFS. Then for any random finite
subset of Ψ, denoted by ψ, its set marginal density of ψ with
respect to Ψ, denoted by fψ (X) can be derived as
fψ (X) =
δ Pr(ψ ⊆ S, Ψ/ψ ⊆ X)
δX
(17)
S=∅
where Ψ/ψ , {x|x ∈ Ψ and x ∈
/ ψ} and “δ/δX” denotes a
set derivative [19].
Remark 2. Eq. (17) (Lemma 2) makes us convenient get a
set marginal density of a random finite subset of an labeled
RFS Ψ. Indeed, the local statistical properties of an labeled
RFS can be learned by the set marginal density. Also, the
relations of label spaces or correlations among different RFSs
densities can be known via analyzing the relevances of their
corresponding set marginal densities.
According Proposition 2 in [32], the set marginal density
5
with single object space is derived in the following,
Proposition 1. Given π s (·) = ws (L(·))Ps (·) be the multiobject posterior of sensor s. For any ℓ ∈ Ls , the set marginal
density of its corresponding subset ψ (ℓ)
on space X × {ℓ}
s
(ℓ)
is an labeled Bernoulli distribution with parameters π s =
(ℓ) (ℓ)
{(rs , ps )} are shown as
X
1I (ℓ)ws (∪I),
(18)
rs(ℓ) =
I∈F (Ls )
p(ℓ)
s
=
1
r(ℓ)
X
1I (ℓ)ws (∪I)pI−{ℓ} ({x, ℓ})
(19)
I∈F (Ls )
where
p{ℓ1 ,··· ,ℓ} ({x, ℓ})
(20)
Z
= Ps ({(x, ℓ), (x1 , ℓ1 ), · · · , (xn , ℓn )})dx1 , · · · , dxn .
(21)
Remark 3. Proposition 1 indicates that the set marginal density of each ψ (ℓ)
s , ℓ ∈ Ls is an labeled Bernoulli distribution.
The class of Bernoulli densities own a congenital advantage
that it can get tractable results for information divergence
(ℓ)
(ℓ)
generally making the computation of D( π1 || π 2 ) < Γm
simplistic, thus enhance the practicability of the LS-M criterion largely.
B. Label Space Matching via Ranked Assignment Problem
Section III-B showed that LS-DM phenomenon is quite
common in practical scenarios. Actually, for different sensors
observing the same spatial region, the tracks of a sensor have
only one definite correspondence with the tracks of another
sensor in ideal case, consistent with Γm = 0 in (16). However, due to the influence of the stochastic noise, there exist
great uncertainty for the matching correspondence. Then the
problem of seeking the solution of matching correspondence
is essentially a optimization problem.
In this section, we firstly provide the mathematical representation of the matching correspondence between different
sensors using a mapping function. Then based on the LS-M
criterion given in Definition 1, we build a ranked assignment
problem and design a principle cost function to seek the
solution of optimal matching correspondence, where the information divergence employs the Rényi Divergence (RD) which
is the generalized form of the KLD with the free parameter
α → 1.
Definition 3. A fusion map is a function τ : L1 → {0} ∪ L2
′
′
such that τ (i) = τ (i ) > 0 implies i = i . The set of all such
fusion maps is called the fusion map space denoted by T .
label space. This can be accomplished by solving the following
ranked assignment problem.
Enumerating L1 and L2 , each fusion map τ ∈ T (L1 ) can be
represented by an |L1 | × |L2 | assignment matrix S consisting
of 0 or 1 entries with every row and column summing to either
1 or 0. For i ∈ {1, . . . , |L1 |}, j ∈ {1, . . . , |L2 |}, Si,j = 1 if
(i)
(j)
and only if track ℓ1 of sensor 1 is assigned to track ℓ2
(i)
(j)
of sensor 2, i.e. τ (ℓ1 ) = ℓ2 . An all-zero row i means that
(i)
track ℓ1 of sensor 1 is a false track or the corresponding track
of sensor 2 is misdetected while all-zero column j means that
(j)
track ℓ2 of sensor 2 is a false track or the corresponding track
of sensor 1 is misdetedted. Conversion from the assignment
P|L1 | (j)
(i)
ℓ2 δ1 (Si,j ).
(matrix) S to τ is given by τ (ℓ1 ) = j=1
The cost matrix of an optimal assignment problem is the
|L1 | × |L2 | matrix:
C1,1
· · · C1,|L1 |
..
..
..
CL1 ,L2 =
.
.
.
C|L1 |,1
· · · C|L1 |,|L2 |
where for i ∈ {1, . . . , |L1 |}, j ∈ {1, . . . , |L2 |}, Ci,j is the cost
(j)
(i)
of the assigning the ℓ2 th track of sensor 2 to ℓ1 th track of
sensor 1.
According the Definition 1, if two label spaces L1 and
L2 are matched, the distance between arbitrary two single
object densities (Bernoulli density) indicating the same true
object from the two sensors respectively is tiny enough. RD,
specifically, for α = 0.5, equals the Hellinger affinity, and thus
the cost selection criterion becomes the equality of Hellinger
distance, which can be used to describe the distance between
two densities, which is also consistent with the LS-M criterion.
The Proposition 1 shows that single object density follows
labeled Bernoulli distribution, thus using the formula for Renyi
divergence between two Bernoulli distributions, it can easily
be shown that
(ℓ′ )
(ℓ)
Ci,j =
Rα ( π 1 (X)|| π2 (X))
Z
1
(ℓ)
(ℓ′ )
π 1 (Xn )(1−α) π 2 (Xn )α dX
log
=
α−1
X
Z
∞
X
1
1
(ℓ)
=
log
π 1 ({x1 , · · · , x2 })α
α−1
n!
n=0
(ℓ′ )
π 2 ({x1 , · · · , x2 })1−α dx1 · · · dxn
=
1
(ℓ)
(ℓ′ )
log((1 − r1 )α (1 − r2 )1−α +
α−1
Z
(ℓ) α (ℓ′ ) 1−α
r2
r1
(ℓ)
(ℓ′ )
p1 (x)α p2 (x)1−α dx).
(23)
(ℓ)
Each fusion map τ ∈ T describes one possible (hypothesis)
matching relationship of different label spaces,
where π s (X), s = 1, 2, is the set marginal density provided
in Proposition 1.
{(ℓ, τ (ℓ))}ℓ∈L1
The cost of S is the combined costs of every true track
of sensor 1 to the track of sensor 2, which can be succinctly
written as the Frobenius inner product
(22)
and the number of fusion maps grows exponentially with the
number of objects.
Due to the uncertainty of τ ∗ , we need to seek the optimal
estimation of τ ∗ in order to perform GCI fusion on matching
T
J(S) = tr(S CL1 ,L2 ) =
|L1 | |L2 |
X
X
i=1 j=1
Ci,j Si,j .
6
The optimal assignment problem seeks an assignment matrix S∗ (τ ∗ ) that minimizes the cost function J(S):
S∗ = arg min J(S)
S
(24)
where S∗ (τ ∗ ) denotes the assignment matrix for the best
matching hypothesis or mapping case.
By solving the equation (24) using Murty’s algorithm [33],
the true matching hypothesis τ ∗ is specified, then the consensual label space is given by
Lc = {(ℓ1 , τ ∗ (ℓ1 ))|τ ∗ (ℓ1 ) > 0}ℓ1 ∈L1 .
The tracks in one sensor with no corresponding matched tracks
in another sensor are leaved out considering the uncertainty of
them.
Remark 4. The optimal τ ∗ establishes the optimal solution
of one-to-one matching correspondence between two label
spaces, hence the consensual label space Lc is obtained, which
makes the assumption that different sensors share the same
label space come true.
C. GCI Fusion with Labeled Multi-Object Density
When fusing LMO densities via the GCI rule (12), the
main challenge is that the GCI formula is computationally
intractable due to the set-integral that integrates over all joint
target-spaces. However, when the condition of different label
spaces matching is hold, the problem of GCI fusion with LMO
densities (GCI-LMO) is great simplified, for it doesn’t need
to consider all possible matching correspondence between
different label spaces [29].
In Proposition 2, we derived the GCI-fusion for generic
LMO density based on the matching of label spaces.
Proposition 2. Let πs (X) = ws (L(·))Ps (·) be the labeled
multi-object posterior of sensor s, s = 1, 2, and their label
spaces L1 and L2 are matching. Then the distributed fusion
with π 1 (X) and π2 (X) via GCI rule in (12) is given by
πω (X) = wω (L(X))pω (X)
(25)
where
w1ω1 (I)w2ω2 (I)ηω (I)
,
ω1
ω2
I∈F (L1 ) w1 (I)w2 (I)ηω (I)
wω (I) = P
pω (X) =
ω2
1
pω
1 (X)p2 (X)
ηω (I)
(26)
(27)
LMB and Mδ-GLMB respectively (GCI-LMB and GCI-MδGLMB).
D. Pseudo-Code
A pseudo-code of the proposed GCI-LSM fusion algorithm
is given in Algorithm 1.
Algorithm 1: The proposed GCI-LSM fusion.
Inputs: Receive posteriors π s from nodes s = 1 : Ns ;
(ℓ)
Step 1: Calculate the set marginal density of πs with
respect to πs according to Proposition 1;
Step 2: Perform GCI-LSM fusion by adopting iteration
method:
Initial: π ω = π1 ;
for s=2:NS do
1) Obtain the consensual label space Lc of π s and
πw according to (24);
2) Perform GCI-LSM fusion with πω and πs
according to (25), then output the fused posterior
πω ;
end
Return: the fused posterior π ω ({x1 , . . . , xn }) in the
form of (8).
V. G AUSSIAN M IXTURE I MPLEMENT
We now detail the computation of the cost function Ci,j
in (23) for the ranked assignment problem of the GCI-LSM
fusion for special formed LMO densities (e.g., LMB and
Mδ-GLMB). In the present work, each single-object density
(ℓ)
conditional on its existence ps (x) of sensor s is represented
by a GM of the form
(ℓ)
p(ℓ)
s (x) =
j=1
ws(ℓ,j) N x; ms(ℓ,j) , Ps(ℓ,j) .
where
(i)
K=
(j)
J1 J2
X
X
wω ,
(31)
m=1 n=1
(28)
2
pω
2 ({(x1 , ℓ1 ), · · · , (xn , ℓn )})d(x1 , · · · , xn ).
Especially, for special formed LMO densities (e.g., LMB
[23] and Mδ-GLMB [26] densities), their closed-form solutions had been shown in [28] under the assumption that
different label spaces share the same birth space, and their
corresponding GCI fusion is referred as GCI fusion with
(29)
Since the calculation of cost function C involves exponentiation of GMs which, in general, do not provide a GM. To
preserve the GM form, a suitable approximation of the GM
exponentiation proposed in [17] is adopted. Thus, Eq. (23)
turns out to be
1
(i)
(j)
(i)
(j)
C i,j = − log (q1 )α (q2 )β + (r1 )α (r2 )β K
(30)
β
with
ηω ({ℓ1 , · · · , ℓn })
Z
1
= pω
1 ({(x1 , ℓ1 ), · · · , (xn , ℓn )})
Js
X
wω = w
eω N
(i,m)
P
(i,m)
(j,n)
m1
−m2 ; 0, 1
ω1
(i,m) ω1
w
eω = (w1
(j,n) ω2
) (w2
(i)
,
(32)
,ω2 )
(33)
(i,m)
(j,n)
(j)
(j)
) ρ(P1
(i)
!
(j,n)
P
+ 2
ω2
,ω1 )ρ(P2
and β = 1 − α, q1 = 1 − r1 , q2 = 1 − r2 , ρ(P, ω) =
p
det[2πP ω −1 ](det[2πP ])−ω .
Moreover, the GM implementation of the GCI fusion for
special formed LMO densities (e.g., LMB and Mδ-GLMB)
7
under the assumption that different sensors share the same
label space can refer to (55) in [17].
600
400
where In and 0n denote the n × n identity and zero matrices,
∆ = 1 second (s) is the sampling period, and σν = 5m/s2
is the standard deviation of the process noise. The probability
of target survival is PS,k = 0.99; The probability of target
detection in each sensor is independent of the probability of
detection at all sensors and is PD = 0.99. The single-target
observation model is also a linear Gaussian with
Hk = I2 02 , Rk = σε2 I2 ,
where σε = 1.4m, is the standard deviation of the measurement noise. The number of clutter reports in each scan is
Poisson distributed with λ = 10. Each clutter report is sampled
uniformly over the whole surveillance region.
The parameters of GM implementation have chosen as
follows: the truncation threshold is γt = 10−4 ; the prune
threshold is γp = 10−5 ; the merging threshold is γm = 4; the
maximum number of Gaussian components is Nmax = 10.
All performance metrics are given in term of the optimal subpattern assignment (OSPA) error [34].
200
T2: born at 20s, dies at 60s
0
T1: born at 0s, dies at 40s
−200
−400
Communication line
−600
Sensor 1
−800
−800 −600
Sensor 2
−400 −200
0
200
400
600
800
X coordinate (m)
Fig. 2. The scenario of simple distributed sensor network with two sensors
tracking two targets.
of the Bernoulli birth distribution at time k + 1 depending on
the measurement zk is proportional to the probability that zk
is not assigned to any target during the updated at time k:
!
1 − rU,k (z)
rB,k+1 (z) = min rB,max , P
· λB,k+1
ξ∈Zk 1 − rU,k (ξ)
(34)
where
X
rU,k =
I ,θ
1θ (z)wk+
(35)
(I+ ,θ)∈F (L+)×ΘI+
I ,θ
with wk+ is given by (59) in [23], and λB,k+1 is the expected
number of target birth at time k + 1 and rB,max ∈ [0, 1] is the
maximum existence probability of a new born target.
100
GCI−LSM
GCI−LMB
80
OSPA [m]
The performance of the proposed GCI-LSM fusion is evaluated in two 2-dimensional multi-object tracking scenarios. The
GCI-LSM is implemented using the GM approach proposed
in Section V. Since this paper does not focus on the problem
of weight selection, we choose the Metropolis weights for
convenience (notice that this may have an impact on the fusion
performance). The LMB filter is adopted by local filters. The
efficiency of LMB filter has been demonstrated in [23].
All targets travel in straight paths and with different but
constant velocities. The number of targets is time varying due
to births and deaths. The following target and observation
models are used. The target state variable is a vector of plannar
position and velocity xk = [px,k , ṗx,k , py,k , ṗy,k ]⊤ , where
“⊤ ” denotes the matrix transpose. The single-target transition
model is linear Gaussian specified by
1
I2 12 ∆I2
I2 ∆I2
2
4
, Qk = σv 1
Fk =
02 I2
I2
3 02
Y coordinate (m)
VI. P ERFORMANCE A SSESSMENT
60
40
20
A. Scenario 1
To demonstrate the effectiveness of GCI-LSM fusion, the
performance of GCI-LSM fusion is compared with GCI-LMB
[28] (under the assumption that different sensors share the
same label space) in two experiments with ABP and PBP used
respectively For this purpose, an simple scenario involving two
sensors and two objects is considered as shown in Fig 2. The
duration of this scenario is Ts = 60s.
1) Experiment 1: The preceding analyses show that the LSDM phenomenon arises frequently when the ABP is adopted
by local filters. To prove this and the effectiveness of the
proposed GCI-LSM fusion, the GCI-LSM fusion is compared
with GCI-LMB fusion under the ABP situation.
The adaptive birth procedure proposed in [23] is employed
for this scenario. More specifically, the existence probability
0
10
20
30
Time k
40
50
60
Fig. 3. ABP: OSPA errors of GCI-LSM and GCI-LMB fusion algorithms
with order p = 1 and cut-off c = 100 with adaptive birth (200 MC runs).
Fig. 3 illustrates that the performance of GCI-LSM fusion
is significant better than GCI-LMB fusion. Since the method
of the ABP depends on the observations with randomness, the
labels of the birth targets each time are also randomness with
their corresponding observations. This result of GCI-LMB
fusion shows that the ABP leads to the LS-DM frequently, and
it is necessity to match the label spaces from different sensors
to ensure the consensual between them, or the performance
of the GCI fusion will collapse. The result of GCI-LSM also
evidences this viewpoint. It can seen that once the LS-DM is
8
removed, the GCI-fusion perform really excellent, exactly as
the GCI-LSM fusion. The outstanding performance of GCILSM also gets benefit from the well-designed cost function in
ranked assignment problems.
600
Y coordinate (m)
400
2) Experiment 2: This experiment analyzes the problem of
the LS-DM under PBP situation. The preceding analyses show
that the PBP also suffers from the LS-DM even though it can
obtain some priors about the births. In this experiment, the
performance of GCI-LSM and GCI-LMB fusion is compared
using PBP [23].
T2
T1
0
−200
T3
−400
Communication line
Sensor 2
Sensor 3
−600
Sensor 1
600
600
True
Estimated Tracks of Sensor 1
400
Y coordinate (m)
200
400
600
800
Birth with label (1,1)
200
Fig. 5. The scenario of distributed sensor network with three sensors tracking
five targets. T1 born at 0s, dies at 55s; T2 born at 0s, dies at 55s; T3 born at
10s, dies at 65s, T4 born at 25s, dies at 65s; T5 born at 40s, dies at 65s.
0
−200
Birth with label (1,1)
−400
−600
−800 −600 −400 −200
0
200 400
X coordinate (m)
600
800
−600
−800 −600 −400 −200
0
200 400
X coordinate (m)
600
B. Scenario 2
800
To further test the performance of the proposed GCI-LSM
fusion in challenging scenarios, a sensor network scenario
involving five targets is considered as shown in Fig. 5. In
the experiment, the proposed GCI-LSM fusion is compared to
the GCI-GMB fusion mentioned in Section III-B [29] and the
GCI fusion with PHD filter (GCI-PHD) [16]. Both GCI-LSM
and GCI-GMB fusion use ABP introduced in scenario 1 and
the adaptive birth distribution of GCI-PHD is introduced in
[5]. The duration of this scenario is Ts = 65s.
(b)
(a)
100
True
Estimated Tracks of GCI−LMB
400
GCI−LSM
GCI−LMB
80
OSPA [m]
200
0
60
40
−200
20
−400
−600
−800 −600 −400 −200
0
200 400
X coordinate (m)
600
800
0
10
20
30
Time k
40
50
60
6
GCI−LSM
GCI−GMB
GCI−PHD
50
(d)
40
Fig. 4. PBP procedure: (a) multi-object state estimation of sensor 1 (single
MC run), (b) multi-object state estimation of sensor 2 (single MC run), (c)
multi-object state estimation of GCI-LMB fusion (single MC run),(d) OSPA
errors of GCI-LSM and GCI-LMB fusion algorithms with order p = 1 and
cut-off c = 100 (200 MC runs).
30
20
10
0
Figs. 4 (a)-(c) show the multi-object estimations of local
filters and GCI-LMB fusion respectively for single MC run.
It can be seen that in this run, the GCI-LMB fusion fails
to perform fusing for the 2th track while both local filters
accurately estimate this track. Due to that the prior information
for births only provide the initial positions, but fail to provide
the initial time, 2th object is initialized at different time
step in different local filters. Hence, the labels of the 2th
object of different local filters are mismatching obviously,
leading to that the GCI-LMB fusion algorithm completely
lose the 2th object. The performance comparison between
GCI-LSM fusion and GCI-LMB is also shown in Fig. 4
(d). As expected, the performance of the GCI-LSM fusion
has remarkable advantages towards GCI-LMB fusion, and the
GCI-LMB fusion is getting worse with target births and deaths.
This result is consistent with the single Monte Carlo (MC)
run’s. The above results confirm that the GCI-LSM fusion is
able to handle the LS-DM, while the GCI-LMB fusion cannot.
5
Estimated Cardinality
(c)
OSPA [m]
Y coordinate (m)
0
−400
Y coordinate (m)
0
X coordinate (m)
Birth with label (20,2)
200
600
−400 −200
400
Birth with label (21,2)
−200
−800
−800 −600
True Tracks
Estimated Tracks of Sensor 2
T5
T4
200
True Cardinality
GCI−GMB
GCI−LSM
GCI−PHD
4
3
2
1
10
20
30
40
Time k
(a)
50
60
0
10
20
30
40
Time k
50
60
(b)
Fig. 6. (a) OSPA distance of order p = 1 and cut-off c = 100 for the
GM implementation with adaptive birth, (b) cardinality estimation, (200 MC
runs).
Both the OSPA distance and the cardinality estimation in
Fig. 6 illustrate the performance differences among the three
fusion methods. It can be seen that the performance of GCILSM is almost the same as GCI-GMB after the performances
converge. Also the GCI-LSM performs slightly worse than
GCI-GMB when objects are born, and the explanation here
is that GCI-GMB fusion considered all possible matching
correspondences between label spaces of different sensors
jointly, while GCI-LSM fusion utilizes an optimal estimation
of the matching correspondence. Moreover the tiny performance loss of GCI-LMS fusion toward GCI-GMB fusion
also demonstrates the superiority of the optimal estimation
9
of matching correspondence. In other words, the ranked assignment problem built in Section IV-B can match the label
spaces from different sensors accurately and consistently. In
addition, Fig. 6 also reveals that both the GCI-LSM and GCIGMB fusion outperform the GCI-PHD fusion for both OSPA
error and the cardinality. This result also demonstrates the
effectiveness GCI-LSM fusion.
VII. C ONCLUSION
This paper investigates the problem of distributed multitarget tracking (DMMT) with labeled multi-object density
based on generalized covariance intersection. Firstly, we provided a principled mathematical definition of label spaces
matching (LS-M) based on information divergence, referred
to as LS-M criterion. Then we proposed a novel two-step
distributed fusion algorithm. Firstly, to match the label spaces
from different sensors, we build a ranked assignment problem
to seek the optimal solution of matching correspondence
between objects of different sensors based on LS-M criterion. Then, GCI fusion is performed on the matched label
space. Moreover, we derive the GCI fusion with generic
labeled multi-object (LMO) densities. A Gaussian mixture
implementation of the proposed GCI-LSM is also given, and
its effectiveness and better performance are demonstrated in
numerical results. At the present stage, the impact of objects
closely spaced on the fusion is not very clearly, thus further
work will study the GCI-LSM fusion considering objects in
proximity.
R EFERENCES
[1] C. Y. Chong, S. Mori, and K. C. Chang, “Distributed multitarget multisensor tracking,” Multitarget-Multisensor Tracking: Advanced Applications;
Y. Bar-Shalom (ed.); Artech House Chapter 8, 1990.
[2] S. J. Julier, T. Bailey, and J. K. Uhlmann, “Using exponential mixture
models for suboptimal distributed data fusion,” in Proc. IEEE Nonlinear
Stat. Signal Proc. Workshop, pp. 160-163, Sep. 2006.
[3] R. Mahler, “Optimal/Robust distributed data fusion: a unified approach,”
in Proc. SPIE Defense Sec. Symp., 2000.
[4] B. N. Vo and W. K. Ma, “The Gaussian mixture probability hypothesis
density filter,” IEEE Trans. on Signal Process., vol. 54, no. 11, pp. 40914104, Nov. 2006.
[5] B. Ristic, D. Clark, B. N. Vo, and B. T. Vo, “Adaptive target birth intensity
for PHD and CPHD filters,” IEEE Trans. Aerosp. Electron. Syst., vol. 48,
no. 2, pp. 1656-1668, 2012.
[6] B. T. Vo, B. N. Vo, and A. Cantoni, “Analytic implementations of the
cardinalized probability hypothesis density filter,” IEEE Trans. on Signal
Process., vol. 55, no. 7, pp. 3553-3567, Jul. 2007.
[7] D. Fränken, M. Schmidt, and M.Ulmke, ““Spooky action at a distanc” in
the cardinalized probability hypothesis density filter,” IEEE Trans. Aerosp.
Electron. Syst., vol. 45, no. 4, pp. 1657-1664, 2009.
[8] B. T. Vo, B. N. Vo, and A. Cantoni, “The cardinality balanced multitarget multi-Bernoulli filter and its implementations,” IEEE Trans. on
Signal Process., vol. 57, no. 2, pp. 409-423, Oct. 2009.
[9] B. T. Vo, B. N. Vo, N. T. Pham and D. Suter, “Joint detection and
estimation of multiple Objects from image observation,” IEEE Trans. on
Signal Process., vol. 58, no. 10, pp. 5129-5141, Oct. 2010.
[10] B. T. Vo, B. N. Vo and R. Hoseinnezhad, “Multi-Bernoulli based trackbefore-detect with road constraints,” in Proc. IEEE Int. Fusion Conf., pp.
840-846, Jul. 2012.
[11] K.G. Amirali, R. Hoseinnezhad and B.H. Alireza, “Robust multiBernoulli sensor selection for multi-target tracking in sensor networks,”
IEEE Signal Process. Lett., vol. 20, no. 12, pp.1167-1170, Dec. 2013
[12] K.G. Amirali, R. Hoseinnezhad and B.H. Alireza, “Multi-bernoulli
sensor control via minimization of expected estimation errors,” IEEE
Trans. Aerosp. Electron. Syst., vol. 51, no. 3, pp. 1762-1773, Jul. 2015.
[13] R. Hoseinnezhad, B. N. Vo, B. T. Vo, and D. Suter, “Bayesian integration
of audio and visual information for multi-target tracking using a CBMEMBER filter,” in Proc. Int. Conf. Acoust., Speech, Signal Process.
(ICASSP), Prague, Czech Republic, pp. 2300-2303, May 2011.
[14] R. Hoseinnezhad, B. N. Vo and B. T. Vo, “Visual tracking in background
subtracted image sequences via multi-Bernoulli filtering,” IEEE Trans. on
Signal Process., pp: 392-397,vol. 61, no. 2, Jan. 2013.
[15] D. Clark, S. Julier, R. Mahler, and B. Ristić, “Robust multi-object sensor
fusion with unknown correlations” in Proc. Sens. Signal Process. Defence
(SSPD 10), Sep. 2010.
[16] M. Üney, D. Clark, and S. Julier, “Distributed fusion of PHD filters via
exponential mixture densities,” IEEE J. Sel. Topics Signal Process., vol.
7, no. 3, pp. 521-531, Apr. 2013.
[17] G. Battistelli, L. Chisci, C. Fantacci, A. Farina, and A. Graziano,
“Consensus CPHD filter for distributed multitarget tracking,” IEEE J.
Sel. Topics Signal Process., vol. 7, no. 3, pp. 508-520, Mar. 2013.
[18] M. B. Guldogan, “Consensus Bernoulli filter for distributed detection
and tracking using multi-static doppler shifts,” IEEE Signal Process. Lett.,
vol. 21, no. 6, pp. 672-676, Jun. 2014.
[19] R. P. S. Mahler, Statistical Multisource-Multitarget Information Fusion.
Norwell, MA, USA: Artech House, 2007.
[20] B. L. Wang, W. Yi, R. Hoseinnezhad, S. Q. Li, L. J. Kong and
X. B. Yang, “Distributed fusion with multi-Bernoulli filter based on
generalized Covariance Intersection,” under review for IEEE Trans. on
Signal Process., Jun. 2016.
[21] B. N. Vo, B. T. Vo, “Labeled random finite sets and multi-object
conjugate priors.” IEEE Trans. on Signal Process., vol. 61, no. 10, pp.
3460-3475, Jul. 2013.
[22] B. N. Vo, B. T. Vo, and D. Phung, “Labeled random finite sets and
the Bayes multi-target tracking filter,” IEEE Trans. on Signal Process.,
vol.PP, no.99, pp.1, Oct. 2014.
[23] S. Reuter, B. T. Vo, B. N. Vo, and K. Dietmayer, “The labeled multiBernoulli filter,” IEEE Trans. on Signal Process., vol. 62, no. 12, pp.32463260, Jun. 2014.
[24] M. Beard, B. T. Vo, and B. N. Vo, “Bayesian multi-target tracking with
merged measurements using labelled random finite sets,” IEEE Trans. on
Signal Process., 2015.
[25] F. Papi and D. Y. Kim, “A particle multi-target tracker for superpositional measurements using labeled random finite sets,” arXiv preprint
arXiv:1501.02248, 2014.
[26] C. Fantacci, B. T. Vo, F. Papi and B. N. Vo, “The marginalized δ-GLMB
filter,” http://arxiv.org/abs/1501.01579. Accessed Jan. 2015.
[27] F. Papi, B. N. Vo, B. T. Vo, C. Fantacci, and M. Beard, “Generalized
labeled multi-Bernoulli approximation of multi-object densities,” arXiv
preprint, 2014, arXiv:1412.5294.
[28] C. Fantacci, B. T. Vo and B. N. Vo, “Consensus labeled
random finite set filtering for distributed multi-object tracking,”
http://arxiv.org/abs/1501.00926. Accessed Jan. 2015.
[29] B. L. Wang, W. Yi, S. Q. Li, L. J. Kong and X. B. Yang, “Distributed
multi-target tracking via generalized multi-Bernoulli random finite sets,”
in Proc. 18th Int. Conf. Inf. Fusion, pp. 253-361, Jul. 2015.
[30] R. P. Mahler, Advances in Statistical Multisource-Multitarget Information Fusion. Artech House, 2014.
[31] S. Q. Li, W. Yi, B. L. Wang, and L. J. Kong, “Joint multi-Bernoulli
random finite set for two-target scenario,”, under review in IEEE Trans.
on Signal Process..
[32] S. Q. Li, W. Yi and L. J. Kong, “Enhanced approximation of labeled
multi-object density based on correlation analysiss,” submmitted in Proc.
19th Int. Conf. Inf. Fusion, 2016.
[33] K. G. Murty,“An Algorithm for Ranking all the Assignments in Order of
Increasing Cost” Operations Research, vol. 16, no. 3, pp. 682-687,1968.
[34] D. Schumacher, B. T. Vo, B. N. Vo, “A consistent metric for performance
evaluation of multi-object filters,” IEEE Trans. on Signal Process., vol.56,
no. 8, pp. 3447-3457, Aug. 2008.
| 3cs.SY
|
arXiv:1504.08014v3 [math.AC] 29 Dec 2015
TESTING FOR THE GORENSTEIN PROPERTY
OLGUR CELIKBAS AND SEAN SATHER-WAGSTAFF
Abstract. We answer a question of Celikbas, Dao, and Takahashi by establishing the following characterization of Gorenstein rings: a commutative
noetherian local ring (R, m) is Gorenstein if and only if it admits an integrally
closed m-primary ideal of finite Gorenstein dimension. This is accomplished
through a detailed study of certain test complexes. Along the way we construct such a test complex that detect finiteness of Gorenstein dimension, but
not that of projective dimension.
1. Introduction
Throughout this paper R denotes a commutative noetherian local ring with
unique maximal ideal m and residue field k.
A celebrated theorem of Auslander, Buchsbaum, and Serre [3, 33] tells us that
R is regular if and only if k has finite projective dimension. Burch [8, p. 947,
Corollary 3] extended this by proving that R is regular if and only if pd(R/I) < ∞
for some integrally closed m-primary ideal I of R.
Auslander and Bridger [1, 2] introduced the G-dimension as a generalization of
projective dimension. (See 2.3 for the definition.) Analogous to the regular setting,
the finiteness of G-dimR (k) characterizes the Gorensteinness of R. In our local
setting, Goto and Hayasaka [21] studied Gorenstein dimension of integrally closed
m-primary ideals and, analogous to Burch’s result, established the following; see
the question of K. Yoshida stated in the discussion following [21, (1.1)].
1.1 ([21, (1.1)]). Let I be an integrally closed m-primary ideal of R. Assume I
contains a non-zerodivisor of R, or R satisfies Serre’s condition (S1 ). Then R is
Gorenstein if and only if G-dimR (R/I) < ∞.
Our aim in this paper is to remove the hypothesis “I contains a non-zerodivisor
of R, or R satisfies Serre’s condition (S1 )” from 1.1. We accomplish this in the following result and hence obtain a complete generalization of Burch’s aforementioned
result; see also Corollary 4.7 for a further generalization.
Theorem 4.8. Let I ⊆ R be an integrally closed ideal with depth(R/I) = 0, e.g.,
such that I is m-primary. Then R is Gorenstein if and only if G-dimR (R/I) < ∞.
Date: January 5, 2018.
2010 Mathematics Subject Classification. 13B22, 13D02,13D07, 13D09, 13H10.
Key words and phrases. Integrally closed ideals, G-dimension, projective dimension, semidualizing complexes, test complexes.
Sean Sather-Wagstaff was supported in part by a grant from the NSA.
1
2
OLGUR CELIKBAS AND SEAN SATHER-WAGSTAFF
Our argument is quite different from that of Goto and Hayasaka [21] since it
uses G-dim-test complexes. For this part of the introduction, we focus on the case
of H-dim-test modules, defined next. Note that the pd-test modules (i.e., the case
where H-dim = pd) are from [9].
Definition 1.2. Let H-dim denote either projective dimension pd or G-dimension
G-dim. Let M be a finitely generated R-module. Then M is an H-dim-test module
over R if the following condition holds for all finitely generated R-modules N : If
TorR
i (M, N ) = 0 for all i ≫ 0, then H-dimR (N ) < ∞.
It is straightforward to show that if M is a pd-test R-module, then it is also
G-dim-test. Example 3.14 shows that the converse of this statement fails in general.
As part of our proof of Theorem 4.8, we also answer the following questions; see
Corollaries 3.11(c) and 3.12.
Question 1.3. Let M be a pd-test module over R.
c be a pd-test module over R?
b
(a) Must M
(b) ([9, (3.5)]) If G-dimR (M ) < ∞, must R be Gorenstein?
Affirmative answers to Question 1.3(b) under additional hypotheses are in [9,
(1.3)] and [10, (2.15)]. Also, Majadas [28] gives an affirmative answer to a version
of Question 1.3(a) that uses a more restrictive version of test modules.
Theorem 4.8 follows from the next, significantly stronger result.
Theorem 4.4. Let M be a G-dim-test R-module such that ExtiR (M, R) = 0 for
i ≫ 0. Then R is Gorenstein.
In turn, this follows from the much more general Theorem 4.1 and Corollary 4.2,
which are results for detecting dualizing complexes.
We conclude this introduction by summarizing the contents of this paper. Section 2 consists of background material for use throughout the paper, and contains
some technical lemmas for later use. In Section 3, we develop foundational properties of various H-dim-test objects, and answer Question 1.3. And Section 4 contains
the theorems highlighted above.
2. Derived Categories and Semidualizing Complexes
2.1. Throughout this paper we work in the derived category D(R) whose objects
are the chain complexes of R-modules, i.e., the R-complexes X with homological
differential ∂iX : Xi → Xi−1 . References for this include [13, 23, 36, 37]. Our
notation is consistent with [12]. In particular, RHomR (X, Y ) and X ⊗L
R Y are the
derived Hom-complex and derived tensor product of two R-complexes X and Y .
Isomorphisms in D(R) are identified by the symbol ≃. The projective dimension
and flat dimension of an R-complex X ∈ Db (R) are denoted pdR (X) and fdR (X).
The subcategory of D(R) consisting of homologically bounded R-complexes (i.e.,
complexes X such that Hi (X) = 0 for |i| ≫ 0) is Db (R). The subcategory of
D(R) consisting of homologically finite R-complexes (i.e., complexes X such that
H(X) := ⊕i∈Z Hi (X) is finitely generated) is denoted Dbf (R).
2.2. A homologically finite R-complex C is semidualzing if the natural morphism
R → RHomR (C, C) in D(R) is an isomorphism. For example, an R-module is
semidualizing if and only if HomR (C, C) ∼
= R and ExtiR (C, C) = 0 for i > 1. In
TESTING FOR THE GORENSTEIN PROPERTY
3
particular, R is a semidualizing R-module. A dualizing R-complex is a semidualizing R-complex of finite injective dimension.
2.2.1. If R is a homomorphic image of a local Gorenstein ring Q, then R has a
dualizing complex, by [23, V.10]. (The converse holds by work of Kawasaki [27].)
b has a
In particular, the Cohen Structure Theorem shows that the completion R
dualizing complex. When R has a dualizing complex D, and C is a semidualizing
R-complex, the dual RHomR (C, D) is also semidualizing over R, by [12, (2.12)].
2.2.2. Let ϕ : R → S be a flat local ring homomorphism, and let C be a semidualizing R-complex. Then the S-complex S ⊗L
R C is semidualizing, by [12, (5.6)].
If the closed fibre S/mS is Gorenstein and R has a dualizing complex DR , then
R
DS := S ⊗L
R D is dualizing for S by [5, (5.1)].
Dualizing complexes were introduced by Grothendieck and Harshorne [23]. The
more general semidualizing complexes originated in special cases, e.g., in [6, 16,
19, 35], with the general version premiering in [12]. The notion of G-dimension,
summarized next, started with the work of Auslander and Bridger [1, 2] for modules.
Foxby and Yassemi [38] recognized the connection with derived reflexivity, with the
general situation given in [12].
2.3. Let C be a semidualizing R-complex and X ∈ Dbf (R). Write GC -dimR (X) < ∞
when X is “derived C-reflexive”, i.e., when RHomR (X, C) ∈ Db (R) and the natural
morphism X → RHomR (RHomR (X, C), C) in D(R) is an isomorphism. In the case
C = R, we write G-dimR (X) < ∞ instead of GR -dimR (X) < ∞.
2.3.1. The complex C is dualizing if and only if every R-complex in Dbf (R) is
derived C-reflexive, by [12, (8.4)]. In particular, R is Gorenstein if and only if
every R-complex X ∈ Dbf (R) has G-dimR (X) < ∞.
2.3.2. Let R → S be a flat local ring homormorphism. Given an R-complex
X ∈ Dbf (R), one has GC -dimR (X) < ∞ if and only if GS⊗LR C -dimS (S ⊗L
R X) < ∞,
by [12, (5.10)]; see 2.2.2.
Auslander and Bass classes, defined next, arrived in special cases in [6, 16], again
with the general case described in [12].
2.4. Let C be a semidualizing R-complex. The Auslander class AC (R) consists of
the R-complexes X ∈ Db (R) such that C ⊗L
R X ∈ Db (R) and the natural morphism
C
γX
: X → RHomR (C, C ⊗L
X)
in
D(R)
is
an
isomorphism. The Bass class BC (R)
R
consists of all the R-complexes X ∈ Db (R) such that RHomR (C, X) ∈ Db (R) and
C
such that the natural morphism ξX
: C ⊗L
R RHomR (C, X) → X in D(R) is an
isomorphism.
2.4.1. When R has a dualizing complex D, given an R-complex X ∈ Dbf (R),
one has GC -dimR (X) < ∞ if and only if X ∈ ARHomR (C,D) (R), by [12, (4.7)];
this uses 2.2.1 and 2.3.1, which imply that RHomR (C, D) is semidualizing and
C ≃ RHomR (RHomR (C, D), D).
2.4.2. Let R → S be a flat local ring homormorphism. Given an S-complex X,
one has X ∈ AC (R) if and only if X ∈ AS⊗LR C (S), by [12, (5.3.a)].
The following two lemmas are proved like [17, (4.4)] and [25, (7.3)], respectively.
4
OLGUR CELIKBAS AND SEAN SATHER-WAGSTAFF
Lemma 2.5. Let X, P ∈ Dbf (R) such that P 6≃ 0 and pdR (P ) < ∞. Let C be a
semidualizing R-complex.
(a) The following conditions are equivalent:
(i) X ∈ AC (R),
(ii) P ⊗L
R X ∈ AC (R), and
(iii) RHomR (P, X) ∈ AC (R).
(b) The following conditions are equivalent:
(i) X ∈ BC (R),
(ii) P ⊗L
R X ∈ BC (R), and
(iii) RHomR (P, X) ∈ BC (R).
Lemma 2.6. Let R → S be a flat local ring homomorphism such that S/mS is
Gorenstein. Let X ∈ Dbf (S) such that each homology module Hi (X) is finitely
generated over R.
(a) One has GC -dimR (X) < ∞ if and only if GS⊗LR C -dimS (X) < ∞.
(b) One has G-dimR (X) < ∞ if and only if G-dimS (X) < ∞.
The next result, essentially from [8, Theorem 5(ii)], is key for Theorem 4.8.
Lemma 2.7. Let I be an integrally closed ideal such that depth(R/I) = 0, and let
R
M be a finitely generated R-module. If TorR
i (R/I, M ) = 0 = Tori+1 (R/I, M ) for
some i > 1, then pdR (M ) 6 i. In particular, R/I is a pd-test module over R.
R
Proof. Assume that TorR
i (R/I, M ) = 0 = Tori+1 (R/I, M ), and suppose that
pdR (M ) > i. The Auslander-Buchsbaum-Serre Theorem states that k is a pdtest R-module, so we assume without loss of generality that I ( m. Hence, we have
I : m 6= R so I : m ⊆ m. From [8, Theorem 5(ii)], we conclude that mI = m(I : m).
Claim: I : m = I. One containment (⊇) is standard. For the reverse containment, let r ∈ I : m ⊆ m. To show that r is in I, it suffices to show that r is integral
over I, since I is integrally closed. To this end, we use the “determinantal trick”
from [24, (1.1.8)]: it suffices to show that (1) we have rm ⊆ Im, and (2) whenever
am = 0 for some a ∈ R, we have ar = 0. For (1), since r is in I : m, we have
rm ⊆ (I : m)m = Im, as desired. For (2), if am = 0, then the fact that r is in m
implies that ar = 0, as desired. This completes the proof of the claim.
Now, the fact that depth(R/I) = 0 implies that there is an element x ∈ R r I
such that xm ⊆ I. In other words, x ∈ (I : m)rI, contradicting the above claim.
2.8. Let I be an integrally closed ideal of R. If one assumes that I is m-primary
(stronger than the assumption depth(R/I) = 0 from Lemma 2.7) then one gets
the following very strong conclusion. Given a finitely generated R-module M , if
TorR
i (R/I, M ) = 0 for some i > 1, then pdR (M ) < i, by [14, (3.3)].
3. H-dim-Test Complexes
In this section, let C be a semidualizing R-complex.
We now introduce the main object of study for this paper.
Definition 3.1. Let M ∈ Dbf (R), and let H-dim denote either projective dimension
pd or GC -dimension GC -dim. Then M is an H-dim-test complex over R if the
following condition holds for all N ∈ Dbf (R): If TorR
i (M, N ) = 0 for all i ≫ 0, i.e.,
if M ⊗L
N
∈
D
(R),
then
H-dim
(N
)
<
∞.
b
R
R
TESTING FOR THE GORENSTEIN PROPERTY
5
3.2. Let M be an R-module. A standard truncation argument shows that M is a
H-dim-test module if and only if it is a H-dim-test complex; see [9, Proof of (3.2)].
3.3. Examples of pd-test modules are given in 2.8 and Lemma 2.7. Note that this
includes the standard example k = R/m. See also [10, Appendix A].
3.3.1. Given an R-complex X ∈ Dbf (R), if pdR (X) is finite, then so is GC -dimR (X),
by [12, (2.9)]. Thus, if M is a pd-test complex, then it is also a GC -dim-test, in
particular, M is a G-dim-test complex.
3.3.2. If R is G-regular (i.e., if every R-module of finite G-dimension has finite
projective dimension), then the pd-test complexes and G-dim-test complexes over
R are the same. Examples of G-regular rings include regular rings and CohenMacaulay rings of minimal multiplicity; see [34].
3.3.3. Examples of GC -dim test modules, e.g., of G-dim test modules, that are not
pd test modules are more mysterious. See Example 3.14 for a non-trivial example.
3.3.4. Assume that R has a dualizing complex D. A natural candidate for a
GC -dim-test complex is C † = RHomR (C, D). Indeed, if GC -dimR (X) < ∞, then
X ∈ AC † (R) by 2.4.1, so by definition we have C † ⊗L
R X ∈ Db (R). In particular, a
natural candidate for a G-dim-test complex is D; see, e.g., Corollary 4.5.
However, D can fail to be a G-dim-test complex. Indeed, Jorgensen and Şega [26,
(1.7)] construct an artinian local ring R with a finitely generated module L that
satisfies ExtiR (L, R) = 0 for all i > 1 and G-dimR (L) = ∞. Since R is local and
artinian, it has a dualizing complex, namely D = ER (k) the injective hull of the
residue field k. We claim that TorR
i (D, L) = 0 for i > 1. (This shows that D is not
G-dim-test over R.) To this end, recall the following for i > 1:
HomR (TorR (D, L), D) ∼
= Exti (L, R) = 0.
i
R
The fact that D is faithfully injective implies that TorR
i (D, L) = 0 for i > 1.
3.4. The ring R is regular if and only if every X ∈ Dbf (R) has pdR (X) < ∞. Hence,
the trivial complex 0 is a pd-test complex if and only if R is regular, equivalently,
if and only if R has a pd-test complex of finite projective dimension. Similarly, if
C is a semidualizing R-complex, then 0 is a GC -dim-test complex if and only if
C is dualizing, equivalently, if and only if R has a GC -dim-test complex of finite
projective dimension; see 2.3.1. In particular, 0 is a G-dim-test complex if and only
if R is Gorenstein, equivalently, if and only if R has a G-dim-test complex of finite
projective dimension.
We continue with a discussion of ascent and descent of test complexes.
ϕ
Theorem 3.5. Let R −
→ S be a flat local ring homomorphism, and let M ∈ Dbf (R).
L
(a) If S ⊗R M is GS⊗LR C -dim-test over S, then M is GC -dim-test over R.
(b) If S ⊗L
R M is G-dim-test over S, then M is G-dim-test over R.
(c) If S ⊗L
R M is pd-test over S, then M is pd-test over R.
-dim-test complex over S. To show that
Proof. (a) Assume that S ⊗L
R M is a GS⊗L
RC
M is a GC -dim-test complex over R, let X ∈ Dbf (R) such that M ⊗L
R X ∈ Db (R).
L
L
L
X)
are
all in Dbf (S).
(M
⊗
M
,
and
S
⊗
X,
S
⊗
By flatness, the complexes S ⊗L
R
R
R
R
Moreover, we have the following isomorphisms in D(S):
L
L
L
L
L
L
(S ⊗L
R M ) ⊗S (S ⊗R X) ≃ (S ⊗R M ) ⊗R X ≃ S ⊗R (M ⊗R X).
6
OLGUR CELIKBAS AND SEAN SATHER-WAGSTAFF
As S ⊗L
-dim-test complex over S, we have GS⊗LR C -dimS (S ⊗L
R M is a GS⊗L
R X) <
RC
∞. Using 2.3.2, we conclude that GC -dimR (X) < ∞, as desired.
(b) This is the special case C = R of part (a).
(c) Argue as in part (a), using [6, (1.5.3)] in place of 2.3.2.
Note that the conditions on ϕ in the following three items hold for the natural
b or to its henselization Rh .
maps from R to its completion R
Remark 3.6. Let ϕ : R → S be a flat local ring homomorphism, and assume that
the closed fibre S/mS is module-finite over k. Let M ∈ Dbf (R) and X ∈ Dbf (S)
L
such that (S ⊗L
R M ) ⊗S X ∈ Db (S). Let x = x1 , . . . , xn ∈ m be a generating
sequence for m, and set K := K S (x), the Koszul complex on x over S. It follows
L
L
that K ⊗L
S ((S ⊗R M ) ⊗S X) ∈ Db (S). From the following isomorphisms
L
L
L
L
L
L
L
K ⊗L
S ((S ⊗R M ) ⊗S X) ≃ (K ⊗S X) ⊗S (S ⊗R M ) ≃ (K ⊗S X) ⊗R M
L
we conclude that (K ⊗L
S X) ⊗R M ∈ Db (R).
L
f
Note that K ⊗S X ∈ Db (R). Indeed, we already have K ⊗L
S X ∈ Db (R), so
it suffices to show that every homology module Hi (K ⊗L
X)
is
finitely generated
S
over R. We know that Hi (K ⊗L
X)
is
finitely
generated
over
S.
Moreover, it is
S
annihilated by (x)S = mS. Thus, it is a finitely generated S/mS-module; since
S/mS is module finite over k, each Hi (K ⊗L
S X) is finitely generated over k, so it is
finitely generated over R.
Theorem 3.7. Let ϕ : R → S be a flat local ring homomorphism, and let M ∈
Dbf (R). Assume that the closed fibre S/mS is Gorenstein and module-finite over k.
(a) The R-complex M is GC -dim-test if and only if S ⊗L
-dim-test
R M is GS⊗L
RC
over S.
(b) The R-complex M is G-dim-test if and only if S ⊗L
R M is G-dim-test over S.
Proof. (a) One implication is covered by Theorem 3.5(a). For the reverse implication, assume that M is a GC -dim-test complex over R. To show that S ⊗L
R M is a
L
GS⊗LR C -dim-test complex over S, let X ∈ Dbf (S) such that (S ⊗L
R M )⊗S X ∈ Db (S).
Let x = x1 , . . . , xn ∈ m be a generating sequence for m, and set K := K S (x). By
L
L
f
Remark 3.6 we have (K ⊗L
S X) ⊗R M ∈ Db (R) and K ⊗S X ∈ Db (R). Since M
L
is an GC -dim-test complex over R, one has GC -dimR (K ⊗S X) < ∞. It follows
from Lemma 2.6 that GS⊗LR C -dimS (K ⊗L
S X) < ∞. We deduce from [17, (4.4)] that
GS⊗LR C -dimS (X) < ∞, as desired.
(b) This is the special case C = R of part (a).
Here is one of our main results; see also Corollary 3.12 and Theorem 4.4.
Theorem 3.8. Let ϕ : (R, m) → (S, n) be a flat local ring homomorphism, and let
M ∈ Dbf (R). Assume the induced map R/m → S/mS is a finite field extension,
i.e., we have mS = n and the induced map R/m → S/mS is finite. Then M is a
pd-test complex over R if and only if S ⊗L
R M is a pd-test complex over S.
Proof. One implication is covered by Theorem 3.5(c). For the reverse implication,
assume that M is a pd-test complex over R.
Case 1: S is complete. To show that S ⊗L
R M is a pd-test complex over S, let X ∈
f
L
Db (S) such that (S ⊗L
M
)
⊗
X
∈
D
(S).
Let x = x1 , . . . , xn ∈ m be a generating
b
R
S
L
L
sequence for m, and set K := K S (x). It follows that K⊗L
S ((S⊗R M )⊗S X) ∈ Db (S).
TESTING FOR THE GORENSTEIN PROPERTY
7
L
L
f
By Remark 3.6 we have (K ⊗L
S X) ⊗R M ∈ Db (R) and K ⊗S X ∈ Db (R). As M is
L
an pd-test complex over R, we have pdR (K ⊗S X) < ∞. It follows from [7, (2.5)]
that pdS (K ⊗L
S X) < ∞, and [6, (1.5.3)] implies that pdS (X) < ∞.
Case 2: the general case. Case 1 implies that Sb ⊗L
R M is a pd-test complex over
L
L
b
b
b
S, i.e., S ⊗S (S ⊗R M ) is a pd-test complex over S. So, S ⊗L
R M is a pd-test complex
over S, by Theorem 3.5(c), as desired.
The next example, from discussions with Ryo Takahashi, shows that the hypothesis mS = n is necessary for the conclusion of Theorem 3.8.
Example 3.9. Let k be a field, R = k and S = k[[y]]/(y 2 ). Then the natural map
R → S is a finite free map since S is free over R with R-basis {1, y}. Let M = R.
Then, since R is regular, M is a pd-test module over R. However N = M ⊗R S = S
is not a pd-test module over S since S is not regular; see 3.4.
On the other hand, we do not know whether or not having a regular closed fibre
in Theorem 3.8 is sufficient, as we note next.
Question 3.10. Let ϕ : (R, m) → (S, n) be a flat local ring homomorphism, and
let M ∈ Dbf (R). Assume that S/mS is regular. If M is a pd-test complex over R,
then must S ⊗L
R M be a pd-test complex over S?
The next corollary answers Question 1.3(a).
b := R
b ⊗L C.
Corollary 3.11. Let M be an R-module, and set C
R
c
b
(a) The module M is GC -dim-test over R if and only if M is GCb -dim-test over R.
c is G-dim-test over R.
b
(b) The module M is G-dim-test over R if and only if M
c
b
(c) The module M is pd-test over R if and only if M is pd-test over R.
b ⊗L M ≃ M
c in Df (R),
b the desired conclusions follow from TheoProof. Since R
R
b
rems 3.7 and 3.8.
The next corollary answers Question 1.3(b). We are able to improve this result
significantly in the next section; see Theorem 4.4 and the subsequent paragraph.
Corollary 3.12. Let M be a pd-test module over R. If G-dimR (M ) < ∞, then R
is Gorenstein.
c is a pd-test module for R,
b with G-dim b (M
c) <
Proof. Corollary 3.11(c) says that M
R
b
∞ by 2.3.2. Using [9, (1.3)], we conclude that R is Gorenstein, hence so is R.
We end this section by building a module that is G-dim-test but not pd-test; see
Example 3.14.
Proposition 3.13. Let ϕ : (A, n, F ) → R be a flat local ring homomorphism, and
set N := R/nR ≃ R ⊗L
A F.
(a) The R-module N is Tor-rigid, i.e., for any finitely generated R-module M , if
R
TorR
i (M, N ) = 0 for some i > 1, then Torj (M, N ) = 0 for all j > i.
(b) Let B be a semidualizing A-complex, and set C := R ⊗L
A B. If R/nR is Gorenstein, then N is a GC -dim-test complex over R.
(c) If R/nR is Gorenstein, then N is a G-dim-test complex over R.
8
OLGUR CELIKBAS AND SEAN SATHER-WAGSTAFF
Proof. First, note that we have N := R/nR ∼
= R ⊗A (A/n) = R ⊗A F ≃ R ⊗L
A F
since R is flat over A. Furthermore, for every R-complex M , there are isomorphisms
L
L
L
M ⊗L
R N ≃ M ⊗R (R ⊗A F ) ≃ M ⊗A F.
(3.13.1)
A
∼
In particular, one has TorR
i (M, N ) = Tori (M, F ) for all i.
(a) Let M be a finitely generated R-module. From [29, (22.3)], if TorA
1 (M, F ) =
0, then M is flat over A, so we have TorA
(M,
F
)
=
0
for
all
j
>
1.
More
generally,
by
j
A
A
dimension-shifting, if Tori (M, F ) = 0 for some i > 1, then we have Torj (M, F ) = 0
for all j > i. Thus, the isomorphism from the previous paragraph implies the desired
Tor-rigidity.
b is a G b L -dim-test
(b) Corollary 3.11(a) shows that it suffices to show that N
R⊗R C
b Note that the induced map ϕ
b → R
b is flat and local with
complex over R.
b: A
\ Also, there are isomorphisms in D(R):
b
Gorenstein closed fibre R/nR.
L
b ⊗Lb (A
b ⊗L
b L
b L
b L
R
A B) ≃ R ⊗A B ≃ R ⊗R (R ⊗A B) ≃ R ⊗R C.
A
Thus, we may replace ϕ with the induced map ϕ
b to assume for the rest of the proof
that A and R are complete. Let DA be a dualizing A-complex; see 2.2.1. Then the
A
†
A
R-complex DR := R ⊗L
A D is dualizing for R, by 2.2.2. Set B := RHomA (B, D )
†
R
†
L
†
and C := RHomR (C, D ), noting that C ≃ R ⊗A B by [12, proof of (5.10)(*)].
Let M ∈ Dbf (R) such that M ⊗L
R N ∈ Db (R). We need to show GC -dimR (M ) <
∞ i.e., that M ∈ AC † (R); see 2.4.1. By (3.13.1), the complex M ⊗L
A F is in Db (R).
Since M is in Dbf (R), we conclude that fdA (M ) < ∞ by [4, (5.5.F)]. It follows
from [12, (4.4)] that M ∈ AB † (A), so M ∈ AR⊗LA B † (R) = AC † (R) by [12, (5.3.a)].
(c) This is the special case B = A, hence C = R, of part (b).
Example 3.14. Let k be a field. Consider the finite-dimensional local k-algebras
A := k[y, z]/(y, z)2 and
R := k[x, y, z]/(x2 , y 2 , z 2 , yz) ∼
= A[x]/(x2 ).
Notice that R is free over A, hence flat. Also, the natural map A → R is local
with Gorenstein closed fibre R/nR ∼
= k[x]/(x2 ); here, as in Proposition 3.13, we let
n denote the maximal ideal of A. Since the assumptions of Proposition 3.13 are
satisfied, the R-module
N = R ⊗A k = R ⊗A (A/(y, z)A) ∼
= R/(y, z)R
is Tor-rigid and G-dim-test over R. Furthermore, from [9, (4.1)], we know that N
is not pd-test.
Since A is artinian and local, the injective hull DA = ER (k) is a dualizing AA
module. Thus, the R-module DR := R ⊗A DA ≃ R ⊗L
is dualizing for R,
A D
R
by 2.2.2. We conclude by showing that D is also a G-dim-test module that is not
pd-test and, moreover, is not Tor-rigid.
Note that A has length 3 and type 2. From this, we construct an exact sequence
over A of the following form:
0 → k 3 → A2 → DA → 0.
(3.14.1)
TESTING FOR THE GORENSTEIN PROPERTY
9
Indeed, the condition type(A) = 2 says that DA is minimally generated by 2 elep
ments. Let A2 −
→ DA → 0 be a minimal presentation, and consider the corresponding short exact sequence
p
0 → Ker(p) → A2 −
→ DA → 0.
From the minimality of the presentation, it follows that Ker(p) ⊆ nA2 . Since
n2 = 0, we conclude that Ker(p) is a k-vector space, so we need only verify that
lenA (Ker(p)) = 3. This equality follows from the additivity of length, via the
condition lenA (DA ) = len(A) = 3.
Since R is flat over A, we apply the base-change functor R ⊗A − to the sequence (3.14.1) to obtain the next exact sequence over R:
0 → N 3 → R2 → DR → 0.
For any R-module M , the associate long exact in TorR
i (M, −) shows that we have
R
R
3
R ∼
Tori (M, D ) = Tori−1 (M, N ) for all i > 2. In particular, we have
R
R
TorR
i (M, D ) = 0 if and only if Tori−1 (M, N ) = 0, for i > 2.
(3.14.2)
Claim: DR is G-dim-test over R. To show this, let M be a finitely generated
R
R-module such that TorR
i (M, D ) = 0 for i ≫ 0. The display (3.14.2) implies that
R
Tori (M, N ) = 0 for i ≫ 0. Since N is G-dim-test over R, we have G-dimR (M ) <
∞, as desired.
Claim: DR is not pd-test over R. To show this, suppose by way of contradiction
that DR is pd-test over R. We show that N is pd-test, contradicting [9, (4.1)]. Let
M be a finitely generated R-module such that TorR
i (M, N ) = 0 for i ≫ 0. The
R
display (3.14.2) implies that TorR
(M,
D
)
=
0
for
i
≫ 0. Since DR is pd-test, we
i
have pdR (M ) < ∞. Thus, N is pd-test, giving the advertised contradiction, and
establishing the claim.
R
Claim: If M is a finitely generated R-module such that TorR
i (M, D ) = 0 for
R
R
R
some i > 2, then Torj (M, D ) = 0 for all j > i. (This shows that D is almost
Tor-rigid.) Since N is Tor-rigid by Proposition 3.13(a), this follows from (3.14.2).
Claim: DR is not Tor-rigid over R. To this end, we follow a construction
R
of [15, Chapter 3] and build an R-module L such that TorR
1 (L, D ) = 0 and
R
R
Tori (L, D ) 6= 0 for all i > 2. Let f1 , f2 be a minimal generating sequence for
HomA (k, A) ∼
= k 2 . For instance, f1 (1) = y and f2 (1) = z will work here. Define
2
u : k → A by the formula a 7→ (f1 (a), f2 (a)). Since k is simple, the non-zero map
u is a monomorphism. Let M := Coker(u). The long exact sequence in ExtA (−, A)
associated to the sequence
u
0→k−
→ A2 → M → 0
(3.14.3)
shows that Ext1A (M, A) = 0.
Set L := R ⊗A M . To make things concrete, if one uses the specific functions
f1 , f2 suggested in the previous paragraph, then M has the following minimal free
presentation over A
( yz )
A −−−→ A2 → M → 0
so L has the following minimal free presentation over R
( yz )
R −−−→ R2 → L → 0.
10
OLGUR CELIKBAS AND SEAN SATHER-WAGSTAFF
Now, flat base-change implies that
Ext1 (L, R) ∼
= R ⊗A Ext1 (M, A) = 0.
A
R
Thus, we have
1
R
R ∼
HomR (TorR
1 (D , L), D ) = ExtR (L, R) = 0.
R
The fact that DR is faithfully injective over R implies that TorR
1 (D , L) = 0.
A
Since A is not regular, we have pdA (k) = ∞ and Tori (k, k) 6= 0 for all i > 0.
Therefore, by (3.14.3), we conclude that pdA (M ) = ∞. In particular, this implies
that TorA
1 (k, M ) 6= 0. So it follows from (3.14.1) and (3.14.3) that
A
A
Tor (D , M ) ∼
= TorA (k 3 , M ) ∼
= TorA (k 3 , k) ∼
= (TorA (k, k))3 6= 0 for all i > 2
i
i−1
i−2
i−2
and
A 3
A
A
3
∼
∼
TorA
2 (D , M ) = Tor1 (k , M ) = (Tor1 (k, M )) 6= 0.
Thus flat base-change implies that
TorR (DR , L) ∼
= R ⊗A TorA (DA , M ) 6= 0 for all i > 2.
i
i
This completes the claim and the example.
4. Detecting the Dualizing and Gorenstein Properties
Our next result yields both Theorems 4.4 and 4.8 highlighted in the introduction. Note that condition (2) in this result does not assume a priori that R has
a dualizing complex; however, the result shows that this condition implies that R
has a dualizing complex.
Theorem 4.1. Let B, C be semidualizing R-complexes. Let M 6≃ 0 be a GB -dimtest R-complex such that RHomR (M, C) ∈ Db (R). Assume that one of the following
conditions holds:
(1) The ring R has a dualizing complex D, and GB † -dimR (C) < ∞ where B † :=
RHomR (B, D), or
(2) One has C ∈ AB (R).
Then B ⊗L
R C is dualizing for R.
Proof. (1) Assume that R has a dualizing complex D, and GB † -dimR (C) < ∞. Set
C † := RHomR (C, D) which is semidualizing by 2.2.1. Let x = x1 , . . . , xn ∈ m be
a generating sequence for m, and consider the Koszul complex K := K R (x). Set
X := K ⊗L
R RHomR (C, E) where E = ER (k) is the injective hull of k.
We note that X is in Dbf (R). Indeed, the complex RHomR (K, C) is homologically
finite since C is. The total homology module H(RHomR (K, C)) is annihilated by
(x)R = m, so it is a finite dimensional vector space over k. By Matlis duality, the
total homology module of RHomR (RHomR (K, C), E) is also a finite dimensional
vector space over k, so we have
f
X = K ⊗L
R RHomR (C, E) ≃ RHomR (RHomR (K, C), E) ∈ Db (R)
(4.1.1)
by Hom-evaluation [4, (4.4)].
The assumption RHomR (M, C) ∈ Db (R) implies that
M ⊗L
R RHomR (C, E) ≃ RHomR (RHomR (M, C), E) ∈ Db (R)
again by Hom-evaluation [4, (4.4)]. From this, we conclude that
L
L
L
L
M ⊗L
R X = M ⊗R (K ⊗R RHomR (C, E)) ≃ K ⊗R (M ⊗R RHomR (C, E)) ∈ Db (R).
TESTING FOR THE GORENSTEIN PROPERTY
11
Since M is a GB -dim-test complex, this implies that GB -dimR (X) < ∞. From 2.4.1
we conclude that X ∈ AB † (R), i.e., we have RHomR (RHomR (K, C), E) ∈ AB † (R)
by (4.1.1). Since E is faithfully injective, argue as in the proof of [11, (3.2.9)] to
conclude that RHomR (K, C) ∈ BB † (R); see also [32, 4.14]. By assumption, we
have C ∈ Dbf (R), so Lemma 2.5(b) shows that C ∈ BB † (R).
By assumption, we have GB † -dimR (C) < ∞, so [18, (1.3)] implies that B † ∈
BC (R). We conclude from [18, (1.4) and (4.10.4)] that C and B † are isomorphic
up to a shift in D(R). Apply a shift to C to assume that C ≃ B † . From [12, (4.4)]
†
L
we have D ≃ B ⊗L
R B ≃ B ⊗R C, as desired.
b has a dualizing complex
(2) Assume now that C ∈ AB (R). The completion R
b
L
R
L
b
b
b
D , by 2.2.1, and the complexes R ⊗R B and R ⊗R C are semidualizing over R,
L
L
b ⊗ M 6≃ 0 by faithful flatness of R,
b and the complex R
b⊗ M
by 2.2.2. We have R
R
R
is GR⊗
-dim-test
by
Theorem
3.7(a).
Also,
by
faithful
flatness,
the
condition
L
b
B
R
RHomR (M, C) ∈ Db (R) implies that
b ⊗L
b L
b L
b
RHomRb (R
R M, R ⊗R C) ≃ R ⊗R RHomR (M, C) ∈ Db (R)
by [17, (1.9.a)].
b
b ⊗L B ≃ (R
b ⊗L B)††
With (−)† := RHomRb (−, DR ), we have an isomorphism R
R
R
by 2.3.1. In addition, from [12, (5.8)], the assumption C ∈ AB (R) implies that
b ⊗L C ∈ A b L (R)
b = A b L †† (R).
b
we have R
We conclude from 2.4.1 that
R
R⊗R B
(R⊗R B)
b L
G(R⊗
b L B)† -dimR
b (R ⊗R C) < ∞.
R
b Thus, the R-complex
b
It follows that condition (1) is satisfied over R.
b ⊗L B) ⊗L (R
b ⊗L C) ≃ (R
b ⊗L B) ⊗L C ≃ R
b ⊗L (B ⊗L C)
(R
R
b
R
R
R
R
R
R
b Note that the condition C ∈ AB (R) implies by definition that
is dualizing for R.
f
B ⊗L
C
∈
D
(R).
Thus, the condition B, C ∈ Dbf (R) implies that B ⊗L
b
R
R C ∈ Db (R).
b ⊗L (B ⊗L C) is dualizing for R
b implies that B ⊗L C is
From this, the fact that R
R
R
R
dualizing for R, by [5, (5.1)], as desired.
We now give several consequences of Theorem 4.1. Compare the next result
to [9, (3.4)].
Corollary 4.2. Let M be a G-dim-test R-complex. Let C be a semidualizing Rcomplex such that that RHomR (M, C) ∈ Db (R). Then C is dualizing for R.
Proof. By 3.4, we assume that M 6≃ 0. The desired conclusion follows from Theorem 4.1 with B = R, once we note that C ∈ Db (R) = AR (R).
Corollary 4.3. Let M be a G-dim-test R-complex such that RHomR (M, R) ∈
Db (R). Then R is Gorenstein.
Proof. Use C = R in Corollary 4.2.
Theorem 4.4. Let M be a G-dim-test R-module such that
i ≫ 0, e.g., with G-dimR (M ) < ∞. Then R is Gorenstein.
Proof. This is immediate from Corollary 4.3.
ExtiR (M, R)
= 0 for
We note that the hypotheses of Theorem 4.4 are weaker than those in Corollary 3.12. Indeed, Example 3.14 above exhibits a G-dim-test module that is not a
12
OLGUR CELIKBAS AND SEAN SATHER-WAGSTAFF
pd-test module. Furthermore, as we noted in 3.3.4, there exist examples of finitely
generated modules L such that ExtiR (L, R) = 0 for all i > 1 and G-dimR (L) = ∞.
Corollary 4.5. Let C be a semidualizing R-complex. If C is G-dim-test over R,
then C is dualizing for R.
Proof. This follows from Corollary 4.2 since RHomR (C, C) ≃ R ∈ Db (R).
Remark 4.6. In light of Corollary 4.5, it is worth noting that there are rings with
semidualizing complexes that are not dualizing and that have infinite projective dimension. (In particular, these complexes are neither pd-test nor G-dim-test by 3.3.1
and Corollary 4.5.) The first examples were constructed (though not published) by
Foxby. See also [12, (7.8)] and [30, 31].
It is also worth noting that the converse of Corollary 4.5 fails in general by 3.3.4.
Corollary 4.7. Let I ⊆ R be an integrally closed ideal such that depth(R/I) = 0,
e.g., such that I is m-primary, and let C be a semidualizing R-complex. Then C is
dualizing for R if and only if GC -dimR (R/I) < ∞.
Proof. Note that I is a pd-test by Lemma 2.7, and apply 2.3.1 and Corollary 4.2.
Recall that the next result has been initially obtained by Goto and Hayasaka [21,
(1.1)] under some extra conditions; see also [22, (2.2)].
Theorem 4.8. Let I ⊆ R be an integrally closed ideal with depth(R/I) = 0, e.g.,
such that I is m-primary. Then R is Gorenstein if and only if G-dimR (R/I) < ∞.
Proof. Apply Corollary 4.7 with C = R, or use Theorem 4.4 with Lemma 2.7.
We finish this section by giving two examples that show the integrally closed and
depth hypotheses of Theorem 4.8 are necessary:
Example 4.9. Let k be a field and let R = k[[x, y, z]]/(x2 , y 2 , z 2 , yz), as in Example
3.14. Then, since R is Artinian, each proper ideal of R is m-primary but is not integrally closed; see [24, (1.1.3)(3)]. In particular the principal ideal I of R generated
by x is m-primary but not integrally closed. Note that R is not Gorenstein. Also,
we have G-dim(I) = 0 because the fact that R is of the form A[x]/(x2 ) implies that
x
x
x
I has a complete resolution · · · −
→R−
→R−
→ ···.
Example 4.10. Let k be a field, set S := k[[x1 , x2 , x3 , y1 , y2 , y3 ]], and let I be
the ideal of S generated by x1 y2 − x2 y1 , x1 y3 − x3 y1 , and x2 y3 − y2 x3 . Set R :=
S/I. Then R is a four-dimensional normal Cohen-Macaulay domain that is not
Gorenstein; see [20, Theorem (a)]. Let 0 6= f ∈ m. Then the ideal f R of R
generated by f is integrally closed; see [24, (1.5.2)]. Furthermore pdR (R/f R) =
G-dimR (R/f R) = 1 and depth(R/f R) = 3.
Acknowledgments
Parts of this work were completed when Celikbas visited North Dakota State
University in November 2013, and when Sather-Wagstaff visited the University of
Connecticut in April 2015. We are grateful for the kind hospitality and the generous
support of the NDSU and UConn Mathematics Departments. We are also grateful
to Jerzy Weyman for supporting Sather-Wagstaff’s visit, and to Irena Swanson and
Ryo Takahashi for helpful feedback on this work. We thank Naoki Taniguchi and
Shiro Goto for pointing out Example 4.10 to us. We also thank the referee for
his/her valuable corrections and suggestions on the manuscript.
TESTING FOR THE GORENSTEIN PROPERTY
13
References
1. M. Auslander, Anneaux de Gorenstein, et torsion en algèbre commutative, Séminaire
d’Algèbre Commutative dirigé par Pierre Samuel, vol. 1966/67, Secrétariat mathématique,
Paris, 1967. MR 37 #1435
2. M. Auslander and M. Bridger, Stable module theory, Memoirs of the American Mathematical
Society, No. 94, American Mathematical Society, Providence, R.I., 1969. MR MR0269685 (42
#4580)
3. M. Auslander and D. A. Buchsbaum, Homological dimension in local rings, Trans. Amer.
Math. Soc. 85 (1957), 390–405. MR 0086822 (19,249d)
4. L. L. Avramov and H.-B. Foxby, Homological dimensions of unbounded complexes, J. Pure
Appl. Algebra 71 (1991), 129–155. MR 93g:18017
5.
, Locally Gorenstein homomorphisms, Amer. J. Math. 114 (1992), no. 5, 1007–1047.
MR 1183530 (93i:13019)
, Ring homomorphisms and finite Gorenstein dimension, Proc. London Math. Soc. (3)
6.
75 (1997), no. 2, 241–270. MR 98d:13014
7. L. L. Avramov, S. Iyengar, and C. Miller, Homology over local homomorphisms, Amer. J.
Math. 128 (2006), no. 1, 23–90. MR 2197067
8. L. Burch, On ideals of finite homological dimension in local rings, Proc. Cambridge Philos.
Soc. 64 (1968), 941–948. MR 0229634 (37 #5208)
9. O. Celikbas, H. Dao, and R. Takahashi, Modules that detect finite homological dimensions,
Kyoto J. Math. 54 (2014), no. 2, 295–310. MR 3215569
10. O. Celikbas, M. Gheibi, A. Sadeghi, and M. R. Zargar, Homological dimensions of rigid
modules, preprint (2014), arXiv:1405.5188.
11. L. W. Christensen, Gorenstein dimensions, Lecture Notes in Mathematics, vol. 1747, SpringerVerlag, Berlin, 2000. MR MR1799866 (2002e:13032)
12.
, Semi-dualizing complexes and their Auslander categories, Trans. Amer. Math. Soc.
353 (2001), no. 5, 1839–1883 (electronic). MR 1813596 (2002a:13017)
13. L. W. Christensen, H.-B. Foxby, and H. Holm, Derived category methods in commutative
algebra, Preprint, 2012.
14. A. Corso, C. Huneke, D. Katz, and W. V. Vasconcelos, Integral closure of ideals and annihilators of homology, Commutative algebra, Lect. Notes Pure Appl. Math., vol. 244, Chapman
& Hall/CRC, Boca Raton, FL, 2006, pp. 33–48. MR 2184788 (2006h:13015)
15. E. G. Evans and P. Griffith, Syzygies, London Mathematical Society Lecture Note Series, vol.
106, Cambridge University Press, Cambridge, 1985. MR MR811636 (87b:13001)
16. H.-B. Foxby, Gorenstein modules and related modules, Math. Scand. 31 (1972), 267–284
(1973). MR 48 #6094
17. A. Frankild and S. Sather-Wagstaff, Reflexivity and ring homomorphisms of finite flat dimension, Comm. Algebra 35 (2007), no. 2, 461–500. MR 2294611
18. A. J. Frankild, S. Sather-Wagstaff, and A. Taylor, Relations between semidualizing complexes,
J. Commut. Algebra 1 (2009), no. 3, 393–436. MR 2524860
19. E. S. Golod, G-dimension and generalized perfect ideals, Trudy Mat. Inst. Steklov. 165 (1984),
62–66, Algebraic geometry and its applications. MR 752933 (85m:13011)
20. S. Goto, When do the determinantal ideals define Gorenstein rings?, Sci. Rep. Tokyo Kyoiku
Daigaku Sect. A, 12, (1974), 129–145. MR 0360567 (50 #13015)
21. S. Goto and F. Hayasaka, Finite homological dimension and primes associated to integrally
closed ideals, Proc. Amer. Math. Soc. 130 (2002), no. 11, 3159–3164 (electronic). MR 1912992
(2003g:13014)
22. S. Goto and F. Hayasaka, Finite homological dimension and primes associated to integrally
closed ideals II, J. Math. Kyoto Univ. 42 (2002), no. 4, 631–639. MR 1967051 (2004e:13035)
23. R. Hartshorne, Residues and duality, Lecture notes of a seminar on the work of A.
Grothendieck, given at Harvard 1963/64. With an appendix by P. Deligne. Lecture Notes
in Mathematics, No. 20, Springer-Verlag, Berlin, 1966. MR 0222093 (36 #5145)
24. C. Huneke and I. Swanson, Integral closure of ideals, rings, and modules, London Mathematical Society Lecture Note Series, vol. 336, Cambridge University Press, Cambridge, 2006.
MR 2266432 (2008m:13013)
14
OLGUR CELIKBAS AND SEAN SATHER-WAGSTAFF
25. S. Iyengar and S. Sather-Wagstaff, G-dimension over local homomorphisms. Applications
to the Frobenius endomorphism, Illinois J. Math. 48 (2004), no. 1, 241–272. MR 2048224
(2005c:13016)
26. David A. Jorgensen and Liana M. Şega, Independence of the total reflexivity conditions for
modules, Algebr. Represent. Theory 9 (2006), no. 2, 217–226. MR 2238367 (2007c:13022)
27. Takesi Kawasaki, On Macaulayfication of Noetherian schemes, Trans. Amer. Math. Soc. 352
(2000), no. 6, 2517–2552. MR 1707481 (2000j:14077)
28. J. Majadas, On test modules for flat dimension, J. Algebra Appl. 13 (2014), no. 3, 1350107,
6. MR 3125875
29. H. Matsumura, Commutative ring theory, second ed., Cambridge Studies in Advanced Mathematics, vol. 8, Cambridge University Press, Cambridge, 1989, Translated from the Japanese
by M. Reid. MR MR1011461 (90i:13001)
30. S. Sather-Wagstaff, Semidualizing modules and the divisor class group, Illinois J. Math. 51
(2007), no. 1, 255–285. MR 2346197
31.
, Lower bounds for the number of semidualizing complexes over a local ring, Math.
Scand. 110 (2012), no. 1, 5–17. MR 2900066
32. S. Sather-Wagstaff and R. Wicklein, Adic Foxby classes, in preparation.
33. J.-P. Serre, Sur la dimension homologique des anneaux et des modules noethériens, Proceedings of the international symposium on algebraic number theory, Tokyo & Nikko, 1955
(Tokyo), Science Council of Japan, 1956, pp. 175–189. MR 19,119a
34. R. Takahashi, On G-regular local rings, Comm. Algebra 36 (2008), no. 12, 4472–4491.
MR 2473342 (2009i:13040)
35. W. V. Vasconcelos, Divisor theory in module categories, North-Holland Publishing Co., Amsterdam, 1974, North-Holland Mathematics Studies, No. 14, Notas de Matemática No. 53.
[Notes on Mathematics, No. 53]. MR 0498530 (58 #16637)
36. J.-L. Verdier, Catégories dérivées, SGA 4 12 , Springer-Verlag, Berlin, 1977, Lecture Notes in
Mathematics, Vol. 569, pp. 262–311. MR 57 #3132
, Des catégories dérivées des catégories abéliennes, Astérisque (1996), no. 239, xii+253
37.
pp. (1997), With a preface by Luc Illusie, Edited and with a note by Georges Maltsiniotis.
MR 98c:18007
38. S. Yassemi, G-dimension, Math. Scand. 77 (1995), no. 2, 161–174. MR 97d:13017
University of Connecticut, Department of Mathematics, Storrs, CT 06269–3009 USA
E-mail address: [email protected]
NDSU Department of Mathematics # 2750, PO Box 6050, Fargo, ND 58108-6050 USA
Current address: Department of Mathematical Sciences, Clemson University, O-110 Martin
Hall, Box 340975, Clemson, S.C. 29634 USA
E-mail address: [email protected]
URL: http://people.clemson.edu/~ssather/
| 0math.AC
|
1
arXiv:1709.08385v1 [cs.CR] 25 Sep 2017
Deep Learning Based Cryptographic Primitive Classification
Gregory D. Hill
Xavier J. A. Bellekens
Division of Computing and Mathematics
Abertay University
Dundee, Scotland
Email: [email protected]
Division of Computing and Mathematics
Abertay University
Dundee, Scotland
Email: [email protected]
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation
of crypto-ransomware has had widespread consequences for consumers and organisations alike. Established preventive measures
perform well, however, the problem has not ceased. Reverse
engineering potentially malicious software is a cumbersome task
due to platform eccentricities and obfuscated transmutation
mechanisms, hence requiring smarter, more efficient detection
strategies. The following manuscript presents a novel approach
for the classification of cryptographic primitives in compiled
binary executables using deep learning. The model blueprint,
a Dynamic Convolutional Neural Network (DCNN), is fittingly
configured to learn from variable-length control flow diagnostics
output from a dynamic trace. To rival the size and variability
of contemporary data compendiums, hence feeding the model
cognition, a methodology for the procedural generation of synthetic cryptographic binaries is defined, utilising core primitives
from OpenSSL with multivariate obfuscation, to draw a vastly
scalable distribution. The library, CryptoKnight, rendered an
algorithmic pool of AES, RC4, Blowfish, MD5 and RSA to
synthesis combinable variants which are automatically fed in
its core model. Converging at 91% accuracy, CryptoKnight is
successfully able to classify the sample algorithms with minimal
loss.
Index Terms—Deep Learning, Convolutional Neural Network,
Cryptovirology, Ransomware, Binary Analysis
I. I NTRODUCTION
T
HE idea of cryptovirology was first introduced by [1]
to describe the offensive nature of cryptography for
extortion-based security threats. It comprises a set of revolutionary attacks that combine strong (symmetric and asymmetric) cryptographic techniques with unique viral technology.
The fierce proliferation of ‘crypto-ransomware’ is rather troubling for a number of reasons. Designed to infect, encrypt
and lock-down available hosts, this category of malware has
had disastrous consequences for many [2] [3]. For those who
can afford to reclaim their private data, the financial loss is
typically quite substantial, despite the fact that there is no
guaranteed recovery. Ultimately, without a backup, there is
little that can be done. Preventative frameworks have been
proven to effectively halt unusual activity [4] [5] by closely
monitoring the file system’s input / output, but administrators
are not always likely to follow best practices [6]. In any
case, unknown weaknesses can still be exploited to further
an attacker’s goal.
The cryptovirological landscape has evolved in recent years.
A distinct growth has been noted in the overall number
of targeted attacks and variants [7]. A long-term study of
1,359 ransomware samples [4] observed between 2006 and
2014 found a distinct number of variants with cryptographic
capabilities. During analysis, these instances were found to
utilise both standard and customised cryptography with generational enhancements, specifically in terms of key generation and management. Tailored cryptosystems particularly
limit the scale of effective analysis [8]. Infamous variants
are known to have employed well-established documented
algorithms [8] [9], but a number of deviations are significant. In some instances, malware variants have employed
custom ‘cryptography’, lesser-known algorithms (such as the
Soviet/Russian symmetric block cipher GOST [10]), common
substitution-ciphers, or exclusively, encoding mechanisms.
The field of malware analysis seeks to determine the
potential impact of malicious software by examining it in
a controlled environment. Investigators find flaws otherwise
unknown to current identification technologies - sourcing keys
and blocking further infection [2]. When reverse engineering
a potentially malicious executable, several issues should be
addressed. Possible problems include the accuracy of analysis,
quality of the application’s obfuscation, and the lifetime of
findings. The analysis of a binary can typically be considered
from two viewpoints: static or dynamic. Static analysis is performed in a non-runtime environment, therefore examination
is relatively safe; however potential morphism restricts the
accuracy of results [11] [12]. Alternatively, dynamic analysis [13] sequentially assesses a binary throughout its execution, which can provide significantly more accurate results
and contend with obfuscatory measures [14] [15], but if not
properly handled, samples could prove somewhat hazardous.
This manuscript focuses on the latter methodology.
Cryptographic algorithm identification facilitates malware
analysis in a number of ways, but in this case, when assessing
ransomware strains, it yields a starting point for investigation.
This is essential when analytical time is restricted. With the uncertainty surrounding an application’s custom, undocumented
or established cryptosystem, analysts struggle to maintain
complete awareness of the field - which makes this task ideal
for automation. To effectively model cryptographic execution,
previous research has relied on a number of assumptions and
observations. These features do not necessarily always depict
cryptographic code, but provide a baseline for analysis. For
instance, cryptographic algorithms naturally involve the use
of bitwise integer arithmetic and logical operations. These
activities frequently reside in loops, for example, block ciphers
2
typically loop over an input buffer to decrypt it block-by-block.
[8] also postulated that any encrypted data is likely to have a
higher information entropy than decrypted data.
Deep learning studies intricate Artificial Neural Networks
(ANNs) with multiple hidden computational layers [16] that
effectively model representations of data with multiple layers
of abstraction, in which the high-level representations can
amplify aspects of the input that are important for discrimination. These techniques have been used amongst others
to identify network threats [17] or encrypted traffic on a
network [18] [19]. A Convolutional Neural Network (CNN), is
a specialised architecture of ANN that employs a convolution
operation in at least one of its layers [20] [21]. A variety of
substantiated CNN architectures have been used to great effect
in computer vision [22] and even Natural Language Processing
(NLP), with empirically distinguished superiority in semantic
matching [23], compared to other models.
CryptoKnight is developed in coordination with this
methodology. We introduce a scalable learning system that
can easily incorporate new samples through the scalable synthesis of customisable cryptographic algorithms. Its entirely
automated core architecture is aimed to minimise human
interaction, thus allowing the composition of an effective
model. We tested the framework on a number of externally
sourced applications utilising non-library linked functionality.
Our experimental analysis indicates that CryptoKnight is a
flexible solution that can quickly learn from new cryptographic execution patterns to classify unknown software. This
manuscript presents the following contributions:
• Our unique convolutional neural network architecture
fits variable-length data to map an application’s timeinvariant cryptographic execution.
• Complimented by procedural synthesis, we address the
issue of this task’s disproportionate latent feature space.
• The realised framework, CryptoKnight, has demonstrably
faster results compared to that of previous methodologies,
and is extensively re-trainable.
II. R ELATED W ORK
The cryptovirological threat model has rapidly evolved over
the last decade. A number of notable individuals and research
groups have attempted to address the problem of cryptographic
primitive identification. We will discuss the consequences of
their findings here and address intrinsic problems.
A. Heuristics
Heuristical methods [24] are often utilised to locate an
optimal strategy for capturing the most appropriate solution.
These measures have previously shown great success in cryptographic primitive identification. A joint project from ETH
Zürich and Google, Inc. [8] detailed the automated decryption
of encrypted network communication in memory, to identify
the location and time a subject binary interacted with decrypted input. From an execution trace which dynamically
extracted memory access patterns and control flow data [8],
was able to identify the necessary factors required to retrieve
the relevant data in a new process. His implementation was
successfully able to identify the location of several decrypted
webpages in memory fetched using cURL and OpenSSL, and
successfully extracted the decrypted output from a Kraken
malware binary. The entropy metric was found to negatively
affect the recognition of simple substitution ciphers as they do
not typically effect the information entropy, which was also
found to affect the analysis of GnuPG.
Gröbert at al. [25] [9] utilised fine-grained dynamic binary
analysis to generate a high-level control flow graph for evaluation using three heuristics. The chains heuristic measured
the ordered concatenation of all mnemonics in a basic block,
comparing known signatures; the mnemonic-const heuristic
extent the former method by assessing the combination of
instructions and constants; and the verifier heuristic confirmed
a relationship between the input and output (I/O) of a permutation block. Trialled on cURL, the tool detected both RivestShamir-Adleman (RSA) and Advanced Encryption Standard
(AES) in a traced Secure Sockets Layer (SSL) session. When
tested on a real-world malware sample,GpCode, the operation
successfully detected the cryptosystem and extracted its keys.
However, the trace took fourteen hours with an extra eight
hours for analysis.
The Crypto Intelligence System [26] conglomerates a number of these heuristical measures to counter the problem of
situational dependencies. As cryptography can be reduced
to Rice’s Theorem, it is suggested that different heuristics
can provide more accurate readings. Evaluating the detection
methods used by [8] and [25], Matenaar et al. found that [27]
presented the least false positives in their tests. However, in
presenting these comparisons, the problem with heuristics is
shown as in that they do not always generalise suitably.
B. Machine Learning
Attempting to address a difficulty with past methodologies,
one thesis [28] studied the suitability of machine learning.
While automated and highly efficient, thresholds [9] [11] [14]
often require manual adjustment to manage the identification
of new algorithmic samples. Hosfelt sought to emphasise the
ease of model retraining by analysing the performance of:
Support Vector Machine, Kernels, Naive Bayes, Decision Tree
and K-means Clustering. The study was met with varying
success, but ultimately suffered from a limited sampling of
the latent feature space, preventing adequate scaling for more
complex data - i.e. multi-purpose applications that may use
cryptography in addition to other functions that may unintentionally obfuscate the control flow. EldeRan [29] similarly
assessed the suitability of automated dynamic analysis for
ransomware. A regularized logistic regression classifier was
utilised in conjuncture with a dataset of 582 ransomware and
942 ‘good’ applications - thus producing an Area Under Curve
(AUC) of 0.995. While the results in this case were positive,
the methodology required a large number of malicious samples
to have been run to generate a sufficient distribution.
C. Obfuscation
A tool by the name of CryptoHunt [14] was recently developed to identify cryptographic implementations in binary code
3
Fig. 1: Framework Architecture
despite advanced obfuscation. The implementation tracked the
dynamic execution of a reference binary at instruction level,
to further identify and transform loop bodies into boolean
formulas. Each formula was designed to successfully abstract
the particular primitive, but remain compact to describe the
most emblematic features. Unlike sole I/O verification, performed by [9], this semantic depth more prominently revealed
distinguishable features regardless of obfuscation. Aligot [30]
was also designed for obfuscatory resilience, but instead chose
to focus on I/O. Both tools performed well on a variety of
samples, but required pre-existing reference implementations
and manual integration.
D. Data Flow Analysis
Two papers studied representational patterns of cryptographic data through dynamic analysis [31] [32]. By closely
monitoring an application’s I/O each methodology aimed to
pinpoint a cryptographic algorithm that matched a similar
pattern. [15] alternatively assessed the ‘avalanche effect’ as
a unique discriminatory feature, where a small change in the
input would dramatically alter the output. Although effective,
none of the methods would likely adapt to unique obfuscations.
A unique and fairly effective approach for the identification
of symmetric algorithms in binary code was based on subgraph isomorphism and static analysis [11]. Lestringant et al.
resolved each cryptographic algorithm to a Data Flow Graph
(DFG), normalising their structure without breaking semantics.
The proposed subgraph isomorphism step then assessed which
signatures were contained within the normalised DFG. For the
targeted sample pool (XTEA, Message Digest 5 (MD5), AES),
their implementation reached 100% accuracy. Unfortunately,
the formula relied on the manual selection of appropriate
signatures which distinguish the applicable algorithms. For
these three instances, generation was elementary, but would
not realistically scale to the dimensions sought in this paper.
III. OVERVIEW
With any given subject application, this methodology aims
to automatically verify the existence of pre-determined cryptographic signatures in unknown binary code. The intention is
to provide a solution that can easily generalise when presented
with new conditions, without manually adjusting a number of
thresholds. The full system, as in Figure 1, is comprised of
three higher-level stages.
1) Procedural generation guides the synthesis of unique
cryptographic binaries with variable obfuscation and
alternate compilation.
2) Assumptions of cryptographic code aid the discrimination of diagnostics from the dynamic analysis of
synthetic or reference binaries, to build an ‘image’ of
execution.
3) A DCNN fits variable-length matrices for ease of training and the immediate classification of new samples.
IV. S YNTHESIS
To construct a reasonably sized dataset with enough variation to satisfy the abstraction of cryptographic primitives,
it is not enough to simply hand-write a small number of
applications with little diversity in terms of operational outliers. For example, extracting features from the execution
of a manually implemented single-purpose binary may give
an appropriate feature vector, but re-running the extraction
process will not provide any variation for repeating labels,
outside of environmental setup. This methodology leverages
procedural generation to include elements that provide some
obfuscation without directly altering the intended control flow.
For the three main algorithmic categories - symmetric, asymmetric and hashing - interpretation should correlate the related
components to dynamically construct a unique executable.
A. Artefacts
OpenSSL is an open source cryptographic library that provides an Application Programming Interface (API) for accessing its algorithmic definitions. Review of its documentation revealed a number of similarities in the intended implementation
of the each function. These specificities are either: variable,
differ for each primitive; or constant, true for each category.
This approach exclusively examined C in experimentation, but
C++ can also be integrated.
4
Via appropriate headers, an application first imports the
libraries which provide the expectant functionality when later
compiled. In this case, from either OpenSSL or the C Standard Library. Each primitive naturally requires contrastive
functionality, so this is variable. Within the scope of an
application’s main body however, each symmetric algorithm
requires the specification of a key and Initialization Vector
(IV), asymmetric algorithms require a certificate declaration
whereas hashing definitions do not expect either. These rules
are categorically constant, therefore, their definitions can be
specified by type. Next, a plaintext sequence is loaded into
memory - directly or from a file - and ciphertext memory
is allocated, also constant. Each sample will then employ its
unique algorithm through differing declarations, reading in the
plaintext, key or IV.
code will dramatically fluctuate. Real-world instances are
rarely compiled identically so multivariate output can provide
further assurance for generalisation.
V. F EATURE E XTRACTION
Cryptographic execution is time-invariant. Therefore, a reference binary may employ its associated functions at any point
within a trace. Unintentional obfuscation of the control flow
will negatively affect discriminatory performance, so granularity needs to be high. An underlying problem of previous
work [28]. This following approach opts to draw appropriate
features from a reference binary using dynamic instrumentation via Intel’s Pin API. Through the disassembly of runtime instruction data, this section’s outlined measurements
principally assess the activity’s importance in relation to the
assumptions of cryptographic code.
B. Obfuscation
Two primary transformation mechanisms were highlighted
by [14]. The first technique discusses the abstraction of
relevant data groups to decrease their perceptible mapping. For
example, a multidimensional array may be concatenated into
a single column and either expanded or accessed as necessary.
The second technique concerns itself with the splitting of
variables [33] to disguise their representation. Colloquially
known as ‘data aggregation’ and ‘data splitting’, these methods
partially obfuscate the data flow without subtracting from a
application’s distinct activity.
Outside of such distinct obfuscation, the inclusion of structured loops, arithmetical or bitwise operations create discriminatory irregularity in an otherwise translucent process.
Analogously, many ‘training’ images for computer vision will
contain noise that suitably detract from the trivial classification
of its subject. This process aims to replicate such uncertainty.
C. Interpretation
Formatting each respective variable artefact to allow ease
of parsing in a similarly structured markup tree will allow
the interpretation of unique cryptographic applications with
alternate obfuscation. Stochastically generated keys, IVs and
plaintext will add additional variation into each image. Algorithm 1 outlines the pseudo-code for this procedure.
Algorithm 1 Cryptographic Synthesis
Input: cryptographic constants & variables
Output: application code
New Sample :
1: select obfuscation - (aggregation, split, normal)
2: write to file:
import statements
abstracted keys
encryption routines
3: inject randomised arithmetic
4: return relative location
When compiling the resultant collection of cryptographic
applications, data variability can be further increased. With
alternate compilers or optimisation options, the resultant object
A. Basic Blocks & Loops
A Basic Block (BBL) is a sequential series of instructions
executed in a particular order, exclusively defined when there
is one branch in (entry) and one branch out (exit). A BBL
ends with one of the following conditions.
• unconditional or conditional branch - direct / indirect.
• return to caller.
Each instruction is evaluated in a linear trace, if any criteria
are met, it is marked as a tail. The following instruction is
delimited as the head of the subsequent sequence, but can
similarly be identified as a tail. The ‘stack’ of execution
stores relevant data from each instruction, and two boolean
expressions indicate the predetermined blocks. As each BBL
is dynamically revealed, non-executed instructions will unfortunately not be observed [9], but we can monitor indirect
branches.
Many high level languages share a distinctly strict definition
of a loop, contrarily, common interpretations of amorphous
code are loose. Extending previous definitions [34] [35] we
hence delineate a loop upon the immediate re-iteration of any
BBL, as output from Algorithm 2.
Algorithm 2 Instruction Sequencing, BBL Detection
Input: run-time hooks
Output: path of execution
Callback :
1: head = false
2: if (last instruction is tail) then
3:
head = true
4: end if
5: if (instruction is branch, call or return) then
6:
tail = true
7: else
8:
tail = false
9: end if
10: if (write) then
11:
get entropy (memory write)
12: end if
13: return stack
5
8,000
B. Instructions
Conventional architectures use a common instruction format, interpretable as: opcode operand (destination/source). In
x86, there are zero to three operands (separated by commas),
two of which specify the destination and source. For example, when AES performs a single round of an encryption
flow it calls the instruction 66 0f 38 dc d1 which can be
disassembled as aesenc xmm2, xmm1. Directly operating on
the first operand, in this case xmm2, it performs a round of
AES encryption using the 128-bit round key from xmm1. Although this is a interesting example, the Advanced Encryption
Standard New Instructions (AES-NI) architecture presents a
problem for later generalisation as cryptographic acceleration
prevents detailed analysis.
Alternate object code is typically quite distinctive, especially in cryptographic code. A primitive may employ a number of operations, in any order, and it is important not to dwell
on specificities - i.e. exact semantics. For each instruction
in the ‘carved’ linear trace we weight its ratio of bitwise
operations upon the cross-correlation of prominent operators
from a pool of cryptographic routines for discriminatory
emphasis.
8,000
Blowfish
6,000
6,000
4,000
4,000
2,000
2,000
0
RC4
0
0
8,000
1,000
2,000
0
1,000
8,000
MD5
6,000
6,000
4,000
4,000
2,000
2,000
0
2,000
RSA
0
0
1,000
2,000
0
1,000 2,000 3,000 4,000 5,000
·104
6
AES
4
2
0
0
1,000 2,000 3,000 4,000 5,000
C. Entropy
As characterized by [36], the associated uncertainty of a
finite discrete probability distribution p = (p1 , p2 , . . . , pn ) can
be measured using
PnShannon’s Entropy. Suppose pk > 0(k =
1, 2, . . . , n) and k=1 pk = 1, distribution p is measured by
quantity H[p] = H(p1 , p2 , . . . , pn ) hence defined as:
H(p1 , p2 , . . . , pn ) =
n
X
k=1
pk log2
1
pk
(1)
Upon detecting a memory write, the respective location’s
contents can be replicated. Casting its value to distribution p
will allow the immediate calculation of H[p]. Related memory
can then be deleted to prevent unnecessary exhaustion. Each
BBLs absolute entropy increase / decrease can then be scored
by its relation to prior activations over opposing registers and
then summated as in Figure 2 where each BBL is ∈ W.
VI. M ODEL
Founded in earlier research [37], this proposed definition
of DCNN treats the input in a manner similar to that of a
sentence. For each word, embeddings are defined as d, where
di corresponds to the total weight of a particular operation,
multiplied by its entropic score. Feature vector wi ∈ Wd is a
therefore a column in sentence matrix s such that s ∈ Wd×s .
Let’s say w = 128, exclusively assessing pure arithmetic
impact would make d = 12, so s would equal 12 × 128.
The model itself combines a number of one wide convolutions
with (dynamic) k-max pooling and folding to map variablelength input. Topologically presented in Figure 3, the model
combines a number of one wide convolutions with (dynamic)
k-max pooling and folding to map variable-length input.
Mathematically, convolution is an operation on two functions of a real-valued argument, in this case a vector of weights
Fig. 2: Entropy Scoring
The relative entropy scoring (y) of each BBL (x) within a trace
from a sample set of algorithms.
m ∈ Wm and a vector of inputs s ∈ Ws , to yield a new
sequence c. With kernel m, the convolved sequence in a onewide convolution takes the form c ∈ Rs+m−1 , thus preserving
the number of defined embeddings.
Equation 2 describes the selection of k, a distinct subset of s
that most relevantly depicts an l-th orders progression. Based
on the total number of convolutional layers L, the current
layer l, the projected sentence length s and the predefined
final pooling parameter ktop , any particular layer’s selection
is delimited as:
kl = max(ktop , [
L−l
s])
L
(2)
With value k and sequence p ∈ Rp of length p ≥ k the base
k-max pooling operation selects the subsequence pkmax of the
k most active features. Completely unreactive to positional
variation, it not only preserves the original perspective, but
can also distinguish repetitious features. Since identifiable
cryptographic routines may execute at any point in a sequential
trace, this operation fits perfectly.
Another significant phase in this procedure simplifies
the way the model perceives complex dependencies over
rows. Veritable feature independence is removed through
component-wise summation of every two rows, shrinking d/2.
Nested between a convolutional layer and (dynamic) k-max
pooling, a folding layer halves the respective matrix.
While the model itself can automatically scale with new
variants, a number of hyper-parameters may need to be ad-
6
80
Accuracy
justed to better suit the sample pool. Manual tuning is an
inefficient, costly process that frequently offers no advantage.
[38] empirically show that randomly chosen trials are more
efficient for hyper-parameter optimization than manual or
grid search over the same domain - calculating the most
viable constants in a fraction of the time. Taking the shuffled
Cartesian product of all hyper-parameter subsets allows the
ambiguated selection of distinct constants for trial on a small
number of epochs.
60
40
20
0
50
100
150
200
Epoch
Fig. 4: Accuracy
with more tanh non-linear activations and k-max pooling further reduced the feature space. Due to the number of embeddings the model utilised two folding operations simultaneously
prior to the penultimate pooling layer, after its convolution.
The final convolution built two additional feature maps and
then pooled on the stipulated topmost magnitude of 56. A
linear transformation, of output size 8, was then applied
with softmax to fully connect the model. Filter widths were
specified for the first and last convolutional layers of 20 and 12
respectfully, the remaining hidden layers shared a width of 10.
In total, the model employed 14 convolutions.
Category
Symmetric
Asymmetric
Hashing
Convolution
k-Max Pooling
Folding
Fully Connected
Fig. 3: Dynamic Convolutional Neural Network (DCNN)
The architecture of a DCNN as illustrated by [37]. In this case, the
model is intended for a seven word input sentence of embedding
d = 4 with two convolutional layers (m = 3 and m = 2), two
(dynamic) k-max pooling layers (k = 5 and k = 3) within two
feature maps.
VII. E XPERIMENTATION
Table I presents a range of popular algorithms which were
selected for experimental analysis. These primitives are widely
utilised for both legitimate and fraudulent purposes.
CryptoKnight was configured to build two feature maps
from its first convolution, with a dropout probability of 0.6,
through a round of k-max pooling and non-linear activation.
Eleven hidden one-dimensional wide convolutions interspersed
Algorithm
AES
RC4
Blowfish
RSA
MD5
TABLE I: Cryptographic Algorithms
Based on a frequency analysis of simplified opcodes within
the sample pool, the mnemonics add, sub, inc, dec, shr, shl,
and, or, xor, pxor, test & lea were selected for weighting.
Therefore the final design matrix, of embedding 12, contained
a variable number of vectors corresponding to the numeration and associated weightings of each basic block in a
subject binary. A distribution of size n = 750 was drawn
in which 75% was used for training and 25% remained for
testing. After 200 epochs, the model successfully converged
at 91.3% accuracy with a minimal loss of 0.29. Figure 4 shows
the test accuracy over 200 epochs, and Figure 5 displays its
simultaneous loss. An additional collection was then drawn
for validation. Table II diagnoses the pre-trained model’s
associated confusion on an additional n = 300 samples.
We collected five open source implementations, presented
in Table III, from GitHub 1 for Rivest Cipher 4 (RC4) and
1 https://github.com
7
AES
RC4
BLF
MD5
RSA
R/A
10
Loss
8
6
AES
37
0
0
0
19
0
RC4
0
50
8
2
0
0
BLF
0
0
42
7
0
0
MD5
0
0
0
41
0
0
RSA
13
0
0
0
30
0
R/A
0
0
0
0
1
50
TABLE II: Validation Results
4
x = predicted, y = actual
2
0
0
50
100
150
200
Epoch
No representational RSA or MD5 instances were identified at time of testing. AES was overlooked due to the
model having been trained on cryptographically accelerated
binaries. The classification rate varied with hyper-parameter
optimisations and distribution sizes, but was able to correctly
classify 4/5 RC4 and 4/5 Blowfish samples in our tests.
Algorithm
Fig. 5: Loss
RC4
80
Accuracy
Blowfish
70
60
Source
github.com/ogay/rc4
github.com/tomaslu/rc4
github.com/Maihj/RC4
github.com/anthonywei/rc4/tree/master/c
github.com/shiffthq/rc4
github.com/jdiez17/blowfish
github.com/Rupan/blowfish
github.com/rkhullar/cipher-c
github.com/genterist/simpleBlowFishX
github.com/JaseP88/Blowfish-Algorithm
TABLE III: Open Source Implementations
50
0
50
100
150
200
Epoch
Fig. 6: No Entropy
Blowfish. The resultant collection of binaries leveraged pure
(non-library linked) cryptographic functionality to assess our
method.
Analysing GnuPG 1.4.20, the software was directed to
encrypt an empty text document using 256-bit AES. With a
trace time of 1 minute 40 seconds, CryptoKnight predicted the
utilisation of RSA with AES.
VIII. D ISCUSSION
Traditional cryptographic identification techniques are inherently expensive [8] [9] [11] [14] and heavily rely on human
intuition. CryptoKnight was built to reduce this associated
error-prone interaction. With refined sampling of the latent
feature space, a procedurally synthesised distribution allowed
our DCNN to map proportional linear sequences with a finer
granularity than that of conventional architectures without
overfitting, CryptoKnight converged at 91% accuracy without
extensive hyper-parameter optimisation. The model ultimately
fit the synthetic distribution with veritable ease, with performance on par to that of [37].
The impediment of dynamic binary instrumentation was
made clear by [9] who highlighted an extensive twenty two
hour trace and analysis time. CryptoKnight’s analysis time also
varied, but not quite to this extent. Hence, for the sample
binaries, analysis took up to a maximum of around one
minute. Consequently, large collections saw exponential draw
times of indefinable length. Since manual analysis often takes
invariably longer than an adequate draw time, this footprint
is arguably marginal. Once trained, the proposed framework
would be most beneficial as part of an analyst’s toolkit - to
quickly verify any cryptographic instances.
8
The DCNN was intended to map time-invariant cryptographic execution despite control or data flow obfuscation.
An intrinsic problem of initial work and the approach by
used [28]. While successful, this formulation still has a
few preliminary issues to address. The predefined operator
embeddings explicitly define the entire feature set, therefore
new samples which perhaps deviate from traditional operation
may be unidentifiable. Should the framework not immediately
generalise to an additional algorithm, correlating its most predominant operators by interchanging embeddings or enlarging
the scope should enhance cognition.
A fundamental part of CryptoKnight’s supervised design is
that it can only classify known samples. New cryptographic
algorithms must be added to the generation pool - a process
this framework has strived to simplify, but an unavoidable
limitation of the proposed architecture. This also makes custom cryptography more difficult to classify, as no high-level
reference implementations would feasibly exist to import. Integrating an unsupervised component into the core model could
facilitate the detection of non-cryptographic signatures. This,
or alternatively advanced synthesis could negate the need for
procedural generation entirely, to further reduce the presently
expensive time requirement and/or aid in the classification of
customised cryptography. A multi-class element that learns
application invariant primitives would also be prove beneficial
as CryptoKnight was exclusively trained on pre-combined
functions. A similar model could be re-purposed to decompile
binaries with more accuracy than traditional methods - which
typically only manage simplistic control flow.
The entropy metric assumes that a cryptographic function’s
associated uncertainty is higher than that of conventional interaction. In the case of [8], this negatively affected the recognition of simple substitution ciphers, however it is unlikely
to affect CryptoKnight in the same way due to its scoring
mechanics and demonstrably high accuracy in subjective tests
without the metric. Figure 6 proves that the entropy metric
does not impact classification rate, converging at 83.3% - 8̃%
difference.
Problems with cryptographic acceleration played an important role in the detection of native AES implementations.
Intel’s AES-NI extension was proposed in 2008 for boosting
the relative speed of encryption and decryption on microprocessors from Intel and AMD. [39] describe the instruction set
with regard to its breakthrough performance increase. The six
instructions, prefixed by AES, directly perform each of the
cipher’s operations on the Streaming SIMD Extensions (SSE)
XMM registers, however, the natural progression of the cipher
could not be fully observed.
IX. C ONCLUSION
Despite advanced countermeasures, the cryptovirological
threat has significantly increased over the last decade, incentivising the aforementioned research. Our research demonstrated that cryptographic primitive classification in compiled
binary executables could be achieved successfully using a dynamic convolutional neural network. We also demonstrated our
implementation and achieved 91% accuracy without extensive
hyper-parameter optimisation. Moreover, our implementation
is fundamentally more flexible than that of previous work,
marginalising the error prone human element. The framework
successfully detected every implementation of RC4 and Blowfish (including externally sourced, native (non-library) written
compositions) and maintained a distinctively high accuracy on
synthetic implementations. Future work includes the detection
of cryptographic functions in parallel with the execution of a
subject binary.
R EFERENCES
[1] A. Young and M. Yung, “Cryptovirology: extortion-based security
threats and countermeasures,” in Proceedings 1996 IEEE Symposium
on Security and Privacy, May 1996, pp. 129–140.
[2] J. Snow, “Cryptxxx ransomware,” Apr 2016. [Online]. Available:
https://blog.kaspersky.com/cryptxxx-ransomware/11939/
[3] A.
Chiu,
“Player
3
has
entered
the
game:
Say
hello
to
’wannacry’,”
May
2017.
[Online].
Available:
http://blog.talosintelligence.com/2017/05/wannacry.html
[4] A. Kharraz, W. Robertson, D. Balzarotti, L. Bilge, and E. Kirda, “Cutting
the gordian knot: A look under the hood of ransomware attacks,” in
International Conference on Detection of Intrusions and Malware, and
Vulnerability Assessment. Springer, 2015, pp. 3–24.
[5] N. Scaife, H. Carter, P. Traynor, and K. R. Butler, “Cryptolock (and drop
it): stopping ransomware attacks on user data,” in Distributed Computing
Systems (ICDCS), 2016 IEEE 36th International Conference on. IEEE,
2016, pp. 303–312.
[6] C. Deane-McKenna, “Nhs ransomware cyber-attack was preventable,”
May 2017. [Online]. Available: https://theconversation.com/nhsransomware-cyber-attack-was-preventable-77674
[7] C. Beek, “Mcafee labs threats report,” Intel Security, Sep 2016.
[Online]. Available: https://www.mcafee.com/us/resources/reports/rpquarterly-threats-sep-2016.pdf
[8] N. Lutz, “Towards revealing attackers’ intent by automatically decrypting network traffic,” Master’s thesis, ETH Zürich, Switzerland, 7 2008,
a joint project between the ETH Zurich and Google, Inc.
[9] F. Gröbert, C. Willems, and T. Holz, Automated Identification of
Cryptographic Primitives in Binary Programs. Berlin, Heidelberg:
Springer Berlin Heidelberg, 2011, pp. 41–60. [Online]. Available:
http://dx.doi.org/10.1007/978-3-642-23644-0 3
[10] IBM.
(2016)
Bucbi
ransomware.
[Online].
Available:
https://exchange.xforce.ibmcloud.com/collection/Bucbi-Ransomware16eef23d3b7ea484ed69ecd78b6c1232
[11] P. Lestringant, F. Guihéry, and P.-A. Fouque, “Automated identification
of cryptographic primitives in binary code with data flow graph
isomorphism,” in Proceedings of the 10th ACM Symposium on
Information, Computer and Communications Security, ser. ASIA CCS
’15. New York, NY, USA: ACM, 2015, pp. 203–214. [Online].
Available: http://doi.acm.org/10.1145/2714576.2714639
[12] A. Moser, C. Kruegel, and E. Kirda, “Limits of static analysis for
malware detection,” in Computer security applications conference, 2007.
ACSAC 2007. Twenty-third annual. IEEE, 2007, pp. 421–430.
[13] C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney,
S. Wallace, V. J. Reddi, and K. Hazelwood, “Pin: building customized
program analysis tools with dynamic instrumentation,” in Acm sigplan
notices, vol. 40. ACM, 2005, pp. 190–200.
[14] D. Xu, J. Ming, and D. Wu, “Cryptographic function detection in obfuscated binaries via bit-precise symbolic loop mapping,” in In Proceedings
of the 38th IEEE Symposium on Security and Privacy, 2017.
[15] X. Li, X. Wang, and W. Chang, “Cipherxray: Exposing cryptographic
operations and transient secrets from monitored binary execution,” IEEE
transactions on dependable and secure computing, vol. 11, no. 2, pp.
101–114, 2014.
[16] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521,
no. 7553, pp. 436–444, 2015.
[17] E. Hodo, X. Bellekens, A. Hamilton, P. L. Dubouilh, E. Iorkyase,
C. Tachtatzis, and R. Atkinson, “Threat analysis of iot networks using artificial neural network intrusion detection system,” in 2016 International
Symposium on Networks, Computers and Communications (ISNCC),
May 2016, pp. 1–6.
9
[18] E. Hodo, X. Bellekens, E. Iorkyase, A. Hamilton, C. Tachtatzis,
and R. Atkinson, “Machine learning approach for detection of
nontor traffic,” in Proceedings of the 12th International Conference
on Availability, Reliability and Security, ser. ARES ’17. New
York, NY, USA: ACM, 2017, pp. 85:1–85:6. [Online]. Available:
http://doi.acm.org/10.1145/3098954.3106068
[19] P. Fruehwirt, S. Schrittwieser, and E. Weippl, “Using machine learning
techniques for traffic classification and preliminary surveying of an
attackers profile,” in Proc. of Int. Conf. on Privacy, Security, Risk and
Trust, 2014.
[20] Y. LeCun et al., “Generalization and network design strategies,” Connectionism in perspective, pp. 143–155, 1989.
[21] E. Hodo, X. J. A. Bellekens, A. Hamilton, C. Tachtatzis, and R. C.
Atkinson, “Shallow and deep networks intrusion detection system: A
taxonomy and survey,” CoRR, vol. abs/1701.02145, 2017. [Online].
Available: http://arxiv.org/abs/1701.02145
[22] Y. LeCun, K. Kavukcuoglu, and C. Farabet, “Convolutional networks
and applications in vision,” in Circuits and Systems (ISCAS), Proceedings of 2010 IEEE International Symposium on. IEEE, 2010, pp. 253–
256.
[23] B. Hu, Z. Lu, H. Li, and Q. Chen, “Convolutional neural network
architectures for matching natural language sentences,” in Advances in
neural information processing systems, 2014, pp. 2042–2050.
[24] J. Pearl, “Heuristics: intelligent search strategies for computer problem
solving,” 1984.
[25] F. Grbert, “Automatic identification of cryptographic primitives in software,” 2010.
[26] F. Matenaar, A. Wichmann, F. Leder, and E. Gerhards-Padilla, “Cis:
The crypto intelligence system for automatic detection and localization
of cryptographic functions in current malware.”
[27] J. Caballero, P. Poosankam, C. Kreibich, and D. Song, “Dispatcher:
Enabling active botnet infiltration using automatic protocol reverseengineering,” 2009.
[28] D. D. Hosfelt, “Automated detection and classification of
cryptographic algorithms in binary programs through machine
learning,” CoRR, vol. abs/1503.01186, 2015. [Online]. Available:
http://arxiv.org/abs/1503.01186
[29] D. Sgandurra, L. Muñoz-González, R. Mohsen, and E. C. Lupu, “Automated dynamic analysis of ransomware: Benefits, limitations and use
for detection,” arXiv preprint arXiv:1609.03020, 2016.
[30] J. Calvet, J. M. Fernandez, and J.-Y. Marion, “Aligot: cryptographic
function identification in obfuscated binary programs,” in Proceedings
of the 2012 ACM conference on Computer and communications security.
ACM, 2012, pp. 169–182.
[31] Z. Puhan, W. Jianxiong, W. Xin, and W. Zehui, “Decrypted data
detection algorithm based on dynamic dataflow analysis,” in 2014 International Conference on Computer, Information and Telecommunication
Systems (CITS), July 2014, pp. 1–4.
[32] R. Zhao, D. Gu, J. Li, and R. Yu, Detection and Analysis
of Cryptographic Data Inside Software.
Berlin, Heidelberg:
Springer Berlin Heidelberg, 2011, pp. 182–196. [Online]. Available:
http://dx.doi.org/10.1007/978-3-642-24861-0 13
[33] S. Drape, “Intellectual property protection using obfuscation,” 2009.
[34] J. Tubella and A. Gonzalez, “Control speculation in multithreaded
processors through dynamic loop detection,” in Proceedings 1998 Fourth
International Symposium on High-Performance Computer Architecture,
Feb 1998, pp. 14–23.
[35] T. Moseley, D. Grunwald, D. A. Connors, R. Ramanujam, V. Tovinkere,
and R. Peri, “Loopprof: Dynamic techniques for loop detection and profiling,” in Proceedings of the 2006 Workshop on Binary Instrumentation
and Applications (WBIA), 2006.
[36] A. Rényi et al., “On measures of entropy and information,” in Proceedings of the fourth Berkeley symposium on mathematical statistics and
probability, vol. 1, 1961, pp. 547–561.
[37] N. Kalchbrenner, E. Grefenstette, and P. Blunsom, “A convolutional
neural network for modelling sentences,” CoRR, vol. abs/1404.2188,
2014. [Online]. Available: http://arxiv.org/abs/1404.2188
[38] J. Bergstra and Y. Bengio, “Random search for hyper-parameter optimization,” Journal of Machine Learning Research, vol. 13, no. Feb, pp.
281–305, 2012.
[39] K. Akdemir, M. Dixon, W. Feghali, P. Fay, V. Gopal, J. Guilford,
E. Ozturk, G. Wolrich, and R. Zohar, “Breakthrough aes performance
with intel aes new instructions,” White paper, June, 2010.
| 9cs.NE
|
Heuristic Online Goal Recognition in Continuous Domains
arXiv:1709.09839v1 [cs.AI] 28 Sep 2017
Mor Vered
Bar Ilan University, Ramat-Gan, Israel
[email protected]
Abstract
Goal recognition is the problem of inferring the
goal of an agent, based on its observed actions. An
inspiring approach—plan recognition by planning
(PRP)—uses off-the-shelf planners to dynamically
generate plans for given goals, eliminating the need
for the traditional plan library. However, existing
PRP formulation is inherently inefficient in online
recognition, and cannot be used with motion planners for continuous spaces. In this paper, we utilize a different PRP formulation which allows for
online goal recognition, and for application in continuous spaces. We present an online recognition
algorithm, where two heuristic decision points may
be used to improve run-time significantly over existing work. We specify heuristics for continuous
domains, prove guarantees on their use, and empirically evaluate the algorithm over n hundreds of
experiments in both a 3D navigational environment
and a cooperative robotic team task.
1
Introduction
Goal recognition is the problem of inferring the (unobserved)
goal of an agent, based on a sequence of its observed actions [Hong, 2001; Blaylock and Allen, 2006; Baker et al.,
2007; Lesh and Etzioni, 1995]. It is a fundamental research
problem in artificial intelligence, closely related to plan, activity, and intent recognition [Sukthankar et al., 2014]. The
traditional approach to plan recognition is through the use
of a plan-library, a pre-calculated library of known plans to
achieve known goals [Sukthankar et al., 2014]. Ramirez and
Geffner [2010] introduced a seminal recognition approach
which avoids the use of a plan library completely. Given a
set of goals G, the Plan Recognition by Planning (PRP) approach uses off-the-shelf planners in a blackbox fashion, to
dynamically generate recognition hypotheses as needed.
The use of PRP in continuous domains, and in an online fashion (i.e., when observations are made incrementally)
raises new challenges. The original [2010] formulation, relies on synthesizing two optimal plans for every goal g ∈ G:
(i) a plan to reach goal g in a manner compatible with the observations O; and (ii) a plan to reach goal g while (at least
partially) deviating from O, i.e. complying with O. The likelihood of each goal is computed from the difference in costs
Gal A. Kaminka
Bar Ilan University, Ramat-Gan, Israel
[email protected]
of optimal solutions to the two plans. Overall, 2|G| planning
problems are solved, two for each goal.
However, in online recognition the set O is incrementally
revealed, and O changes with it. Thus two new planning
problems are solved with every new observation, for a total
of 2|G||O| calls to the planner instead of 2|G|. In addition,
using an off-the-shelf continuous-space planner to generate a
plan that may partially go through previous observations, but
must not go through all of them, is currently impossible given
the state of the art.
We present a general heuristic algorithm for online recognition in continuous domains that solves at most |G|(|O| + 1)
planning problems, and at best, |G|. The algorithm relies on
an alternative formulation, that does not use O. It has two
key decision points where appropriate heuristics reduce the
number of calls to the planner: for each new observation, the
first decision is whether to generate and solve a new planning problem for each g, or remain with the former calculated
plans. In the best case, this may reduce the number of overall calls to the planner to only |G| calls. A second decision
is whether to prune unlikely goal candidates, incrementally
reducing |G|, thus making fewer calls to the planner.
We describe the algorithm in detail, and examine several heuristic variants. Utilizing off-the-shelf continuousspace planners, without any modification, we evaluate the
different variants in hundreds of recognition problems, in
two continuous-environment tasks: a standard motion planning benchmark, and simulated ROS-enabled robots utilizing
goal-recognition for coordination.
2
Related Work
Sukthankar et al. [2014] provide a survey of recent work in
goal and plan recognition, most of it assuming a library of
plans for recognition of goals. Though successful in many
applications, library-based methods are limited to recognizing known plans. Alternative methods have been sought.
Geib [2015], and Sadeghipour et al. [2011] offer methods that utilize the same library for both planning and planrecognition. Hong [2001] presents an online method, with
no use of a library, but lacking the ranking of the recognized
goals. Baker et.al [2005] present a Bayesian framework to
calculate goal likelihoods, marginalizing over possible actions. Keren et al. [Keren et al., 2015] investigate ways to
ease goal recognition by modifying the domain.
Ramirez and Geffner [2010] proposed the PRP formulation (which plans for g twice: with O and with O), for offline
recognition. We build on their earlier formulation [2009], in
which they did not probabilistically rank the hypotheses, as
we do here. This allows us to more efficiently compute the
likelihood of different goals, given incrementally revealed observations. We embed this formulation in a definition of plan
recognition for continuous spaces, which also varies from the
original in that the recognizer observes effects, rather than
actions.
Other investigations of PRP exist. [Masters and Sardina,
2017] provided a simpler formula than that of [2010] achieving identical results in half the time, still in discrete environments. Sohrabi et. al [2016] also observe effects, though
in discrete environments, and have also sought to eliminate
planner calls, by using a k-best planner in an offline manner to sample the plans explaining the observations. Ramirez
and Geffner [2011] extend the model to include POMDP settings with partially observable states. Martin et. al [2015] and
Pereira et al. [2017] refrain from using a planner at all, instead
using pre-computed information (cost estimates and landmarks, resp.) to significantly speed up the recognition. These
approaches complement ours. Vered and Kaminka [2016]
present an online recognizer, which we prove is a special case
of the algorithm we present here. We go a significant step beyond by introducing heuristics to significantly improve both
run-time and accuracy.
3
Goal Recognition in Continuous Spaces
We begin by giving a general definition of the goal recognition problem in continuous spaces ( Section 3.1). We proceed
to develop an efficient online recognizer, which can utilize
heuristics to further improve the efficiency ( Section 3.2). We
then discuss such heuristics in detail ( Section 3.3).
3.1
Problem Formulation
We define R, the online goal recognition problem in continuous spaces as a quintuple R = hW, I, G, O, M i. W ⊆ Rn
is the world in which the observed motion takes place, as defined in standard motion planning [LaValle, 2006]. I ∈ W ,
the initial pose of the agent. G, a set of goals; each goal
g ∈ W , i.e., a point. O, a discrete set of observations, where
for all o ∈ O, o ⊂ W , i.e., each observation a specific subset
of the work area i.e., a point or trajectory. M , a (potentially
infinite) set of plan trajectories, each beginning in I, and ending in one of the goal positions g ∈ G. For each goal g, there
exists at least one plan mg ∈ M that has it as its end point.
Intuitively, given the problem R, a solution to the goal
recognition problem is a specific goal v ∈ G that best
matches the observations O. For each goal g, trajectories mg
(ending with g) are matched against the observations O.
Formally, we seek to determine v ≡ argmaxg∈G P r(g|O).
Ramirez and Geffner [2009, Thm. 7] have shown that necessarily, a goal g is a solution to the goal recognition problem
iff the cost of an optimal plan to achieve g (denoted here ig ,
for ideal plan) is equal to the cost of an optimal plan that
achieves g, while including all the observations (a plan we
refer to as mg ). Vered and Kaminka [2016] build on this
to establish a ranking over the goals. They define the ratio
cost(i )
score(g) ≡ cost(mgg ) , and rank goals higher as score(g) gets
closer to 1. They show experimentally that the ratio works
well in continuous domains, and thus we use it here (ignoring priors on P r(g) for simplicity): P P
r(g|O) ≡ ηscore(g),
where the normalizing constant η is 1/ g∈G score(g).
The next step is to compute the plans ig (ideal plan, from
initial pose I to goal g) and mg (an optimal plan that includes
the observations). As described in [Vered et al., 2016], computing ig is a straightforward application of a planner. The
synthesis of mg is a bit more complex, as mg candidates must
minimize the error in matching the observations.
To do this, we take advantage of the opportunity afforded
by the equal footing of observations O and plans in M in
continuous environments. Each observation is a trajectory or
point in continuous space. Each plan is likewise a trajectory
in the same space, as plans are modeled by their effects. Thus
generating a plan mg that perfectly matches the observations
is done by composing it from two parts:
• A plan prefix, (denoted m−
g ) is built by concatenating
all observations in O into a single trajectory ( [Masters
and Sardina, 2017] have shown that the same plan prefix
may be generated for all possible trajectories ).
• A plan suffix (denoted m+
g ) is generated by calling the
planner, to generate a trajectory from the last observed
point in the prefix m−
g (the ending point of the last observation in O) to the goal g.
Using ⊕ to denote trajectory concatenation, a plan mg ≡
+
m−
g ⊕ mg is a trajectory from the first observed point in O,
to g. Notice that mg necessarily perfectly matches the observations O, since it incorporates them.
Given a goal g and a sequence of observations O, the planner is called twice: to generate ig and to generate m+
g , used
to construct mg . The cost of ig and mg is contrasted using
a scoring procedure, denoted match(mg , ig ), which uses the
ratio as described above. As ig does not depend on O, it can
be generated once for every goal, while mg needs to be resynthesized from its component parts as O is incrementally
revealed. This establishes the baseline of (1 + |O|)|G| calls
to the planner [Vered et al., 2016]. We now generalize this
procedure to further improve on this baseline.
3.2
Heuristic Online Recognition Algorithm
We identify two key decision points in the baseline recognition process described above, that can be used to improve its
efficiency:
• Recompute plans only if necessary, i.e., if the new
observation may change the ranking (captured by a
RECOM P U T E function);
• Prune (eliminate) goals which are impossible or extremely unlikely (as they deviate too much from the ideal
plan ig ), (captured by the P RU N E function).
A good RECOM P U T E heuristic reduces calls to the planner by avoiding unnecessary computation of m+
g for new observations. A good P RU N E heuristic reduces calls to the
planner by eliminating goals from being considered for future observations. Using appropriate heuristics in these functions, we can reduce the number of calls made to the planner
and consequently overall recognition run-time. This section
presents the algorithm. The next section will examine candidate heuristics.
Algorithm 1 begins (lines 3–5) by computing the ideal plan
ig for all goals, once. It also sets ig as a default plan suffix
m+
g . This suffix guarantees that valid (though not necessarily
optimal plans) mg can be created from m+
g , even in the ex+
treme case where no computation of mg is ever done. Then,
the main loop begins (line 6), iterating over observations as
they are made available. We then reach the first decision:
should we recompute the suffix m+
g (line 7).
We will begin by giving a general outline.
The
RECOM P U T E function takes the current winning trajectory mυ (υ is the current top-ranked goal) and the latest observation o. It matches the observation to mυ and heuristically
determines (see next section) whether o may cause a change
in the ranking of the top goal υ. If so, then the suffixes m+
g
of all goals (lines 8–12) will be recomputed (lines 11–12),
unless pruned (lines 9–10). Otherwise (lines 13–15) the current suffix m+
g of all goals will be modified based on o, but
without calling the planner.
Algorithm 1 O NLINE G OAL R ECOGNITION (R, planner)
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
∀g : mg , m−
g ←∅
υ←∅
B the top-ranked goal
for all g ∈ G do
ig ← planner(I, g)
B default value for plan suffix
m+
g ← ig
while new o ∈ O available do
if RECOM P U T E(mυ , o) then
for all g ∈ G do
if P RU N E(m+
g , o, g) then
G ← G − {g}
else
m+
g ← planner(o, g)
else
for all g ∈ G do
+
prefix(o, m+
m+
g)
g ← mg
for all g ∈ G do
−
m−
g ← mg ⊕ o
−
mg ← mg ⊕ m+
g
for all g ∈ G do
P r(g|O) ← η · score(g)
υ ← argmaxg∈G P (g|O)
Recomputing m+
g . Here a straightforward call to the planner is made per the discussion in section 3.1, to generate an
optimal trajectory. From the initial point (the last point in o,
as o might contain more than a single point), to the goal g.
Modifying m+
g . When no recomputation of the suffix is
deemed necessary, o will be added to the prefix m−
g , and the
+
existing mg must be updated so that it continues m−
g and
leads towards g. The baseline algorithm calls a planner to do
this, but the point of this step is to approximate the planner
call so as to avoid its run-time cost. This is done by removing
(denoted by ) any parts that are inconsistent with respect to
the observation from the beginning of the old suffix m+
g .
−
The old m+
begins
where
the
old
m
(without
o)
ended.
g
g
should
ideally
begin
with
the
last
point
of the
The new m+
g
−
new mg (which is the new observation o), and continue as
much as possible with the old m+
g . Thus a prefix of the old
+
m+
,
denoted
(pref
ix(o,
m
),
line
15) is made redundant by
g
g
o and needs to be removed. If o is directly on m+
g , then
pref ix(o, m+
)
is
exactly
the
trajectory
from
the
beginning
g
point of m+
g to o. But in general, we cannot expect o to be
directly on m+
g . We thus define the ending point for the prefix
to be oe, the geometrically closest point to o on m+
g.
Pruning. Intuitively, when the newest observation o leads
away from a goal g, we may want to eliminate the goal from
being considered further, by permanently removing it from G.
This is a risky decision, as a mistake will cause the algorithm
to become unsound (will not return the correct result, even
given all the observations). On the other hand, a series of
correct decisions here can incrementally reduce G down to a
singleton (|G| = 1), which will mean that the number of calls
to the planner in the best case will approximate (|O| + 1).
Finally, when the algorithm reaches line 16, a valid suffix
m+
g is available for all goals in G. For all of them, it then
concatenates the latest observation to the prefix m−
g (line 17),
and creates a new plan mg by concatenating the prefix and
suffix (line 18). This means that a new score(g) can be used
to estimate P r(g|O) (lines 19–20), and a (potentially new)
top-ranked goal υ to be selected (line 21).
3.3
Recognition Heuristics
Algorithm 1 is a generalization of the algorithm described
in [Vered et al., 2016]. By varying the heuristic functions
used, we can specialize its behavior to be exactly the same
(Thm. 1), or change its behavior in different ways.
Theorem 1. If RECOM P U T E = > and P RU N E = ⊥
then Algorithm 1 will generate exactly the same number of
planner calls as the algorithm in [Vered et al., 2016].
Proof. (Sketch) By setting RECOM P U T E to be always
true, and P RU N E to be always false, initially a single call
to the planner will be made to calculate ig , and then a new
call to generate m+
g will be made for all goals and every observation (since no calls will be skipped and no goals would
be pruned). This is in accordance with the behavior of the
algorithm reported in [Vered et al., 2016].
Let us now turn to examine how to avoid unnecessary planner calls. An ideal scenario would be for Alg. 1 to never
compute a new suffix m+
g , for any goal. In line 5 of Alg. 1
the initial suffixes m+
g are set to the ideal plans, ig . If
RECOM P U T E is always false, then no new planner calls
will be made and m+
g will be incrementally modified (Alg. 1,
line 15) to accommodate the observations.
This approach offers significant savings (Thm. 2), and in
the best case, when the observations closely match the originally calculated paths, can produce good recognition results.
However, realistically, the observations may contain a certain
amount of noise or the observed agent may not be perfectly
rational. Moreover, it could be that the observed agent is perfectly rational and there is no noise in the observations and
yet the approach will fail. This is due to cases where there
are multiple perfectly-rational (optimal) plans, which differ
from each other but have the exact same optimal cost. In
such cases, it is possible that the planner used by the recognizer will generate an ideal plan ig which differs from an
equivalent—but different—ideal plan mg carried out by the
observed agent.
Theorem 2. If RECOM P U T E = ⊥ there will be exactly
|G| calls to the planner.
Proof. Straightforward, omitted for space.
RECOMPUTE. As we cannot realistically expect the
observations to perfectly match the predictions, we need a
heuristic that evaluates to false when the new observation o
does not alter the top ranked goal υ (saving a redundant |G|
calls to the planner), and evaluates to true otherwise.
A suggestion for such a heuristic in continuous domains is
to measure the shortest distance dist(o, mg ) between o and
all plans mg . If dist(o, mυ ) is shortest we can assume the
observed agent is still heading towards the same goal and do
not need to re-call the planner, keeping the current rankings.
PRUNE. Finally, we introduce a pruning heuristic for observing rational agents in continuous domains. It is inspired
by studies of human estimates of intentionality and intended
action [Bonchek-Dokow and Kaminka, 2014]. Such studies
have shown a strong bias on part of humans to prefer hypotheses that interpret motions as continuing in straight lines,
i.e., without deviations from, or corrections to, the heading of
movements. Once a rational agent is moving away or past a
goal point g, it is considered an unlikely target.
Figure 1: Illustration of goal angles used in pruning heuristic.
To capture this, the P RU N E heuristic takes a geometric
approach. We calculate αg , the angle created between the
end-point of the old m−
g , the newly received observation o
and the previously calculated plan mg . αg is calculated using
the cosine formula, cos(α) = (~u · ~v )/(||~u||||~v ||), where ~u is
the vector created by the previous and new observation and ~v ,
the vector created by the previously calculated plan and the
new observation.
Figure 1 presents an illustration of the heuristic approach
in 2D. For the new observation, o2 , we measure the angle αi
created by the new observation o2 , the previous observation
o1 (which ends m−
g ) and the previous plans m1,2 (shown as
the dashed lines). If the angle is bigger than a given threshold
we deduce that the previous path is heading in the wrong direction and prune the goal. By defining different sized threshold angles we can relax or strengthen the pruning process as
needed.
4
Evaluation
We empirically evaluated our online recognition approach
and the suggested heuristics over hundreds of goal recognition problems while measuring both the efficiency of the approach in terms of run-time and overall number of calls to
the planner, and the performance of the approach in terms
of convergence and correct ranking of the chosen goal. We
additionally implemented our approach on simulated ROSenabled robots while measuring the efficiency of the algorithm as compared to two separate approaches, one containing full knowledge of the observed agents’ intentions and the
other containing no knowledge and no reasoning mechanism.
4.1
Online Goal Recognition In A 3D Navigation
Domain
We implemented our approach and the proposed heuristics
to recognize the goals of navigation in 3D worlds. We used
TRRT (Transition-based Rapidly-exploring Random Trees),
an off-the-shelf planner that guarantees asymptotic nearoptimality , available as part of the Open Motion Planning
Library (OMPL [Şucan et al., 2012]) along with the OMPL
cubicles environment and default robot. Each call to the planner was given a time limit of 1 sec. The cost measure being
the length of the path. For the Pruning heuristic we used a
threshold angle of 120◦ .
We set 11 points spread through the cubicles environments.
We then generated two observed paths from each point to all
others, for a total of 110 × 2 goal recognition problems. The
observations were obtained by running an RRT* planner on
each pair of points, with a time limit of 5 minutes per run.
RRT* was chosen because it is an optimized planner that
guarantees asymptotic optimality. The longer the run-time
the more optimal the path. Each problem contained between
20-76 observed points.
Performance Measures We use two measures of recognition performance : (1) the time (measured by number of observations from the end) in which the recognizer converged to
the correct hypothesis (including 0 if it failed). Higher values
indicate earlier convergence and are therefore better; and (2)
the number of times they ranked the correct hypothesis at the
top (i.e., rank 1), which indicates their general accuracy. The
more frequently the recognizer ranked the correct hypothesis
at the top, the more reliable it is, hence a larger value is better.
Efficiency Measures In order to evaluate the overall efficiency of each approach we also used two separate measures:
(1) the number of times the planner was called within the
recognition process; and (2) the overall time (in sec.) spent
planning. Though these two parameters are closely linked,
they are not wholly dependant. While a reduction in overall number of calls to the planner will also necessarily result
in a reduction in planner run-time, the total amount of time
allowed for each planner run may vary according to the difficulty of the planning problem and therefore create considerable differences.
4.2
Effects of the different heuristic approaches
We ran the TRRT based recognizer on the above-mentioned
220 problems, comparing the different approaches. The results are displayed in Table 1, columns 1–4. Baseline, refers
to the algorithm of Vered et al. [2016], making (O + 1)|G|
planner calls. The second approach, No Recomp, refers to
the method of no recomputation at all, meaning the planner is
only utilized once in the beginning of the process, to calculate
ig , the ideal path, for all of the goals. The third approach, Recompute, measures the effect of RECOMPUTE which aims
to reduce overall number of calls to the planner (Section 3.2).
The fourth approach, Prune, measures the effect of PRUNE
which aims to reduce the overall number of goals by eliminating unlikely goal candidates (Section 3.2). And the last
approach, Both, measures the effects of utilizing a combination of both the Pruning and Recompute Heuristics.
Efficiency Table 1, column 1, displays the average of the
results of each approach as the mean of total planner run-time
measured in seconds. When only calling the planner once in
the recognition process the No Recompute approach takes an
average of only 7.1 sec.
Baseline has a time average of 105 sec.
The Pruning heuristic reduces the average time to only
74.9 sec. And the Recompute heuristic further reduces the
average time to 49.9 sec. When utilizing both heuristics we
achieved a reduction to 36.5 sec. an improvement of a substantial
65.25% from the Baseline approach.
The second column displays the average of the results in
terms of number of calls made by the recognizer to the planner. The No Recompute approach had an average of an extremely efficient 9 calls, i.e. the number of goals. Baseline
had an average of 265.05 calls while the Recomputation and
Pruning heuristics had similar success with a further reduction to 148.9 and 151.4 calls each. Using both heuristics the
number of calls was reduced to an average of only 90.6 calls,
a reduction of 63.3% from the Baseline approach.
In conclusion we see that employing the heuristics makes a
big impact on run-time and successfully reduces overall number of calls to the planner. While the recomputation heuristic outperformed the pruning heuristic, both in run-time and
overall number of calls, utilizing both heuristics can reduce
both run-time and number of calls made to the planner by over
60% from the baseline approach. The most efficient method
proved to be the No Recompute approach, only calculating
|G| plans. We will now show that this improvement in efficiency costs considerably in performance.
Performance Table 1, column 3, measures the average
convergence to the correct result percent, higher values are
better. As we can see with no reuse of the planner at all,
No Recompute only produces 6.7% convergence. As this approach does not make use of the incrementally revealed observations within the recognition process, any deviation from
the initially calculated path, ig , will have considerable impact
on recognition results.
By converting to the online Baseline algorithm, we were
able to more than double the convergence percent to 21.8%.
Each incremental observation was now taken into account
during the reuse of the planner and therefore had greater
weight on the ranking of the goals. Applying both the Pruning and Recomputation heuristics further improve the overall convergence. By eliminating goals the ranking process
now proved to be easier, as there were less goals to compare to. Furthermore, the early elimination of goals in the
pruning process was able to also eliminate the further noise
these goals might introduce to the ranking process, when their
paths deviated from the optimal. The Recomputation heuristic increases it to 25.4% and the Pruning to 42.2%, an improvement of 20.4% from the Baseline approach. When utilizing both heuristics we see that the high convergence level
obtained by the Pruning heuristic is maintained.
Column 4, measures the percent of times the correct goal
was ranked first. Here too a higher value is better and will
reflect on overall reliability of the ranking procedure. The
results mostly agree with the convergence results. With no
planner reuse at all, No Recompute, performs poorly with a
low 9.5%. Baseline more than doubles the success here as
well, to 20.2%. The Recomputation heuristic achieves 33.9%
and the Pruning heuristic increases the results to 40.5%, an
improvement of 20.3% from the Baseline approach. Again,
when applying both heuristics the success level of the Pruning method is obtained.
Employing the heuristics has made a big impact on overall
performance successfully increasing convergence and overall
correct rankings. The Pruning heuristic outperformed the Recomputation heuristic in both measures and a combination of
both heuristics maintains the high success rate leading to an
improvement of over 20% in both measures.
4.3
Sensitivity to recognition difficulty
In online, continuous domains, the hardness of the recognition problem could possibly effect recognizer performance
and efficiency. We wanted to evaluate the sensitivity of the
results shown above to the hardness of the recognition problems. We therefore added another 9 goal points (e.g., 19 potential goals in each recognition problem), for a total of 380
recognition problems. These extra points were specifically
added in close proximity to some of the preexisting 10 points,
such that navigating towards any one of them appears (to human eyes) to be just as possible as any other.
Table 1, columns 5–6, examines the efficiency of the different online recognition approaches over the harder clustered goals problems. We omitted the No Recompute heuristic in these instances as the behavior of this heuristic is very
straightforward. The results are consistent with the results
from the original scenario. The Baseline approach is the least
Baseline
Recompute
Prune
Both
No Recompute
10 goals
Efficiency
Run-Time
PlannerCalls
105.02
265.05
49.98
148.94
74.90
151.46
36.49
90.68
7.10
9.00
Performance
Conv.
Rank.
21.82
20.24
25.44
33.91
42.16
40.50
42.41
40.21
6.77
9.54
19 goals
Efficiency
Run-Time
PlannerCalls
194.65
516.57
126.75
397.85
160.29
386.53
97.63
287.36
-
Performance
Conv.
Rank.
16.37
19.54
18.7
22.76
23.18
24.03
20.98
25.82
-
Table 1: Comparison of all approaches across scattered and clustered goal scenarios.
efficient, having a higher run-time and larger number of calls
to the planner, than the rest. The most efficient approach is
still the approach of utilizing both the Pruning heuristic and
the Recompute heuristic together. In run-time the Recompute
heuristic is still more efficient than the Pruning however for
the measure of number of calls made to the planner we see
that, for more clustered goals scenarios, the Pruning heuristic
slightly outperforms the Recompute heuristic.
Table 1, columns 7–8, examines the performance of the
different online recognition approaches over the harder clustered goals problems. For the harder problems the best performance achieved, in terms of convergence, was by the Pruning heuristic with a convergence of 23.18% from the end. In
terms of the amount of times the correct goal was ranked first
the Both approach, combining both Pruning and Recompute
heuristics, only slightly outperformed the Pruning approach.
The worst performance was achieved by the Baseline approach, in terms of both criteria measured; convergence and
ranked first, in congruence with the performance results of
the scattered goal scenario.
Table 2 measures the deterioration in efficiency and performance with comparison to the scattered goal scenario. The
deterioration is measured in terms of deterioration percent,
hence a 100% deterioration in run-time means the planner
took twice as long on average, on the harder problems. Therefore lower values are better. In terms of efficiency, we can
clearly see that the least deterioration, both in run-time and
number of calls to the planner, occurred for the Baseline approach proving this approach to be very reliable with a deterioration of 85.35% and 94.90% respectively. The biggest
deterioration in terms of run-time occurred for the combination of both heuristics with a deterioration of 167.58%. This
was considerably caused by the substantial deterioration of
the Recompute approach which deteriorated by 153.58%. The
Pruning heuristic deteriorated considerable less in terms of
run-time with only 114% deterioration.
In terms of number of calls made to the planner, again,
the worst deterioration occurred for the Both approach, with
a deterioration of 216.9% while the deterioration for each of
the heuristics was considerably less; 155.2% for the Pruning
heuristic and 153.6% for the Recomputation heuristic.
In terms of performance deterioration we again see that the
most resilient approach in terms of performance, as well as
efficiency, proved to be the Baseline both in terms of Convergence and Ranked first with a deterioration of 25.98% in
convergence and only 3.46% in ranked first. The biggest deterioration in convergence occurred for the Both approach, as
was in the efficiency results. However, in terms of ranked first
the biggest deterioration occurred for the Pruning heuristic.
This was, in part, due to the fact that clustered goals make the
pruning process considerably less efficient as the goals are
too close to be pruned.
4.4
Online Goal Recognition on Robots
As a final set of experiments, and to show the applicability of
our approach, we implemented Alg. 1 in a cooperative robotic
team task. We used ROS [Quigley et al., 2009] to control simulated robots in Gazebo, using the default ROS motion planner, move_base, in the recognition process. We simulated
a soccer field, with two robots operating as members of the
same team (Figure 2). The observed robot was given an initial
goal to travel to, proceeding to execute the plan in a straightforward manner, and the observing robot had to strategically
place itself in a pre-chosen position to assist the other robot
team member. If the observed robot navigated to goal 4 the
strategic place to assist it on the offense would be to navigate
to goal 3 and vice versa. Likewise also with goals 1 and 2.
The observed robot always started at the same initial point
in the middle of the field, while we experimented with 3 different starting points for the observing robot; two points behind the observed robots position and on parallel sides (Figure 2, init points 1 and 2) and one point past the observed
robot in the middle of the field (init point 3). We ran 10–20
runs from each initial position to each of the goals for a total
of 193 problems.
We compared our online goal recognizer (OGR) in its baseline form, to two different approaches: (a) giving full knowledge (FK) of the intended goal to the observing robot, ahead
of time, allowing the observing robot to navigate directly towards it; and (b) giving no (zero) knowledge (ZK) of intended
goal, thus forcing the observing robot to wait for its team
member to reach its desired goal, before it can navigate towards the complementary location.
To evaluate the different approaches we measured the overall time (in seconds) the simulated robot ran until reaching its
target goal. The lower the time the more efficient the robot.
The results are displayed in Table 3.
The results show that the goal recognition approach substantially improves on the zero knowledge approach, while
requiring no precalculations; all needed plans are generated
on-the-fly via the planner. Understandably our approach falls
short of the full knowledge approach as it generates hypotheses on the fly following observations, which leads to some
deviations from the optimal, direct route.
5
Summary
We presented an efficient, heuristic, online goal recognition
approach which utilizes a planner in the recognition process
Baseline
Recompute
Prune
Both
Deterioration
Efficiency
Performance
Run-Time
PlannerCalls
Conv.
Rank.
85.35%
94.90%
24.98%
3.46%
153.58%
167.11%
26.49%
32.88%
114.01%
155.20%
45.02%
40.67%
167.58%
216.90%
50.53%
35.79%
Table 2: Deterioration of performance and efficiency between scattered and clustered goal scenarios.
Figure 2: Experiment setup (via RVIZ)
I1
I2
I3
G1
G2
G3
G4
G1
G2
G3
G4
G1
G2
G3
G4
FK
10.00
5.80
9.10
5.80
5.80
9.10
10.00
12.35
12.41
10.10
9.24
5.72
OGR
17.35
12.31
16.19
17.10
14.09
19.56
15.89
15.32
17.36
18.65
10.62
13.40
ZK
21.50
17.18
20.43
26.03
17.67
24.45
25.45
32.62
20.88
24.26
20.66
20.40
Table 3: Online goal recognizer vs. full and zero knowledge
to generate recognition hypotheses. We identified key decision points which effect both overall run-time and the number of calls made to the planner and introduced a generic
online goal recognition algorithm along with two heuristics
to improve planner performance and efficiency in navigation
goal recognition. We evaluated the approach in a challenging
navigational goals domain over hundreds of experiments and
varying levels of problem complexity. The results demonstrate the power of our proposed heuristics and show that,
while powerful by themselves, a combination of them leads
to a reduction of a substantial 63% of the calls the recognizer
makes to the planner and planner run-time in comparison with
previous work. This, while showing an increase of over 20%
in recognition measures. We further demonstrated the algorithm in a realistic simulation of a simple robotic team task,
and showed that it is capable of recognizing goals using standard robotics motion planners.
References
[Baker et al., 2005] Chris Baker, Rebecca Saxe, and
Joshua B Tenenbaum.
Bayesian models of human
action understanding. In Advances in neural information
processing systems, pages 99–106, 2005.
[Baker et al., 2007] Chris L Baker, Joshua B Tenenbaum,
and Rebecca R Saxe. Goal inference as inverse planning.
In Proceedings of the 29th Annual Meeting of the Cognitive Science Society, 2007.
[Blaylock and Allen, 2006] Nate Blaylock and James Allen.
Fast hierarchical goal schema recognition. In Proceedings
of the Twenty-First National Conference on Artificial Intelligence (AAAI-06), pages 796–801, 2006.
[Bonchek-Dokow and Kaminka, 2014] Elisheva BonchekDokow and Gal A Kaminka. Towards computational
models of intention detection and intention prediction.
Cognitive Systems Research, 28:44–79, 2014.
[Geib, 2015] Christopher Geib. Lexicalized reasoning. In
Proceedings of the Third Annual Conference on Advances
in Cognitive Systems, 2015.
[Hong, 2001] Jun Hong. Goal recognition through goal
graph analysis. Journal of Artificial Intelligence Research,
15:1–30, 2001.
[Keren et al., 2015] Sarah Keren, Avigdor Gal, and Erez
Karpas. Goal recognition design for non-optimal agents.
pages 3298–3304, 2015.
[LaValle, 2006] Steven M. LaValle. Planning Algorithms.
Cambridge University Press, 2006.
[Lesh and Etzioni, 1995] Neal Lesh and Oren Etzioni. A
sound and fast goal recognizer. In Proceedings of the
International Joint Conference on Artificial Intelligence
(IJCAI-95), 1995.
[Martin et al., 2015] Yolanda E. Martin, Maria D. R.
Moreno, David E Smith, et al. A fast goal recognition technique based on interaction estimates. In Twenty-Fourth
International Joint Conference on Artificial Intelligence,
pages 761–768, 2015.
[Masters and Sardina, 2017] Peta Masters and Sebastian
Sardina. Cost-based goal recognition for path-planning.
In Proceedings of the 16th Conference on Autonomous
Agents and MultiAgent Systems, pages 750–758. International Foundation for Autonomous Agents and Multiagent
Systems, 2017.
[Pereira et al., 2017] Ramon Fraga Pereira, Nir Oren, and
Felipe Meneguzzi. Landmark-based heuristics for goal
recognition. 2017.
[Quigley et al., 2009] Morgan Quigley, Ken Conley, Brian
Gerkey, Josh Faust, Tully Foote, Jeremy Leibs, Rob
Wheeler, and Andrew Y Ng. Ros: an open-source robot
operating system. In ICRA workshop on open source software, volume 3, page 5. Kobe, Japan, 2009.
[Ramırez and Geffner, 2009] Miquel Ramırez and Hector
Geffner. Plan recognition as planning. In International
Joint Conference on Artifical Intelligence, pages 1778–
1783, 2009.
[Ramırez and Geffner, 2010] Miquel Ramırez and Hector
Geffner. Probabilistic plan recognition using off-the-shelf
classical planners. In International Joint Conference on
Artificial Intelligence, 2010.
[Ramırez and Geffner, 2011] Miquel Ramırez and Hector
Geffner. Goal recognition over POMDPs: Inferring the
intention of a pomdp agent. In Proceedings of the International Joint Conference on Artificial Intelligence, pages
2009–2014, 2011.
[Sadeghipour and Kopp, 2011] Amir Sadeghipour and Stefan Kopp. Embodied gesture processing: Motor-based
integration of perception and action in social artificial
agents. Cognitive Computation, 3(3):419–435, 2011.
[Sohrabi et al., 2016] Shirin Sohrabi, Anton V. Riabov, and
Octavian Udrea. Plan recognition as planning revisited.
The Twenty-Fifth International Joint Conference on Artificial Intelligence, pages 3258–3264, 2016.
[Şucan et al., 2012] Ioan A. Şucan, Mark Moll, and Lydia E.
Kavraki. The Open Motion Planning Library. IEEE
Robotics & Automation Magazine, 19(4):72–82, December 2012.
[Sukthankar et al., 2014] Gita Sukthankar, Robert P. Goldman, Christopher Geib, David V. Pynadath, and Hung Bui,
editors. Plan, Activity, and Intent Recognition. Morgan
Kaufmann, 2014.
[Vered et al., 2016] Mor Vered, Gal A. Kaminka, and Sivan
Biham. Online goal recognition through mirroring: Humans and agents. In Proceedings of the Annual Conference on Advances in Cognitive Systems, 2016. A slightly
modified version appears in Proceedings of the IJCAI 2016
workshop on Human-Agent Interaction Design and Models (HAIDM).
| 2cs.AI
|
Tropical Land Use Land Cover Mapping in Pará (Brazil) using
Discriminative Markov Random Fields and Multi-temporal TerraSAR-X
Data
Ron Hagensiekera,∗, Ribana Roscherb , Johannes Rosentretera , Benjamin Jakimowc , Björn Waskea
a Freie
Universität Berlin, Institute of Geographical Sciences, Malteserstr. 74-100, 12249 Berlin, Germany
Friedrich-Wilhelms-Universität Bonn, Institute of Geodesy and Geoinformation, Nussallee 15, 53115 Bonn,
Germany
c Humboldt-Universität zu Berlin, Geography Department, Unter den Linden 6, 10099 Berlin, Germany
arXiv:1709.07794v1 [cs.CV] 22 Sep 2017
b Rheinische
Abstract
Remote sensing satellite data offer the unique possibility to map land use land cover transformations by
providing spatially explicit information. However, detection of short-term processes and land use patterns
of high spatial-temporal variability is a challenging task.
We present a novel framework using multi-temporal TerraSAR-X data and machine learning techniques,
namely Discriminative Markov Random Fields with spatio-temporal priors, and Import Vector Machines, in
order to advance the mapping of land cover characterized by short-term changes. Our study region covers
a current deforestation frontier in the Brazilian state Pará with land cover dominated by primary forests,
different types of pasture land and secondary vegetation, and land use dominated by short-term processes
such as slash-and-burn activities. The data set comprises multi-temporal TerraSAR-X imagery acquired
over the course of the 2014 dry season, as well as optical data (RapidEye, Landsat) for reference. Results
show that land use land cover is reliably mapped, resulting in spatially adjusted overall accuracies of up to
79% in a five class setting, yet limitations for the differentiation of different pasture types remain.
The proposed method is applicable on multi-temporal data sets, and constitutes a feasible approach to map
land use land cover in regions that are affected by high-frequent temporal changes.
Keywords: Markov Random Fields (MRF), Import Vector Machines (IVM), Multi-temporal LULC
mapping, Deforestation, Amazon, SAR
∗ Corresponding
author. Tel.: (+49 30) 838- 458 683
Email addresses: [email protected] (Ron Hagensieker), [email protected] (Ribana Roscher),
[email protected] (Johannes Rosentreter), [email protected] (Benjamin Jakimow),
[email protected] (Björn Waske)
Preprint submitted to International Journal of Applied Earth Observation and Geoinformation
September 25, 2017
1. Introduction
The Brazilian Amazon is the largest area of tropical rain forest shared by a single country. In the
last decades it has become increasingly threatened by large scale deforestation, forest degradation, and the
expansion of agriculture (Davidson et al., 2012; Lapola et al., 2014). They affect the Earth’s ecosystems and
ecosystem services far beyond the boundaries of the original region, and can influence the climate directly
at local and even regional scales (Foley, 2005; Vitousek, 1997). Thus, detailed knowledge and information
on land use and land cover (LULC) offers valuable input for decision support and environmental monitoring
systems.
Remote sensing satellite data offers the unique possibility to generate consistent LULC maps over large
areas at a temporally high resolution. Mapping of LULC change in the Amazon is predominantly achieved
by analyzing multi-spectral remote sensing data (INPE, 2015; Wulder et al., 2012; Hansen et al., 2013).
However, a limitation of the analysis of multi-spectral remote sensing data is imposed by its dependency
on cloud-free conditions. These are rare in tropical regions and in general not met during wet season (e.g.
Rufin et al., 2015; Müller et al., 2015). Synthetic aperture radar (SAR) data can overcome these problems
and various studies demonstrate the potential for mapping LULC and their changes (Pfeifer et al., 2016; Qi
et al., 2012; Bovolo and Bruzzone, 2005), also in the context of deforestation and related processes (Sarker
et al., 2013; Reiche et al., 2015; Englhart et al., 2011; Almeida-Filho et al., 2009). Such mapping approaches
become even more attractive due to recent missions with increased repetition rates, higher spatial resolution
(e.g. TerraSAR-X and Sentinel-1), as well as better data availability, e.g., by virtue of the Copernicus data
policy (Aschbacher and Milagro-Pérez, 2012). TerraSAR-X and the Sentinel-1 constellation guarantee cloud
free coverage within 11 and 6 days respectively, while the repetition rate of the Sentinel-2 constellation (5
days) and Landsat-8 (16 days) might be affected by clouds.
Although the classification accuracy of SAR data can be limited in direct comparison to multi-spectral
data, various approaches exist to increase the mapping accuracy. These include the integration of one-pass
interferometry (Schlund et al., 2013), contextual spatial information derived from texture parameters or
segmentation (Cutler et al., 2012; Sarker et al., 2013; Schlund et al., 2013; Waske and van der Linden,
2008), or the utilization of multi-temporal or multi-sensoral data (Reiche et al., 2013; Stefanski et al.,
2014a; Waske and Braun, 2009). Although limitations of short wavelength SAR data for the classification
of dense vegetation are well documented (e.g. Kumar and Patnaik, 2013), various studies have highlighted
the potentials of this data for LULC mapping (e.g. Schlund et al., 2013; Qi et al., 2015; Uhlmann and
Kiranyaz, 2014; Qi et al., 2012; Khatami et al., 2016; Sonobe et al., 2014), e.g. by utilization of multi2
temporal data, modern classification algorithms, or spatial context. Multi-temporal data sets are generally
more adequate when classes can be characterized by clearly defined temporal signatures, e.g. caused by
differences in the phenology of crops, land use management, or seasonal cycles (Blaes et al., 2005; McNairn
et al., 2009). While the single classification of a multitemporal data set might be useful for study sites
without or long-term changes (Waske and Braun, 2009; Stefanski et al., 2014b), it might be limited for
study sites with temporally high-frequent changes in land cover, e.g. slash-and-burn activities, at arbitrary
points in time. Recent studies have shown great potentials to tackle these problems by time series analysis
of multispectral data (Zhu and Woodcock, 2014), but SAR speckle and quick succession processes still pose
difficult challenges using such methods, especially if very long time series are often not available.
In the context of multi-temporal data analysis, a main drawback is often the assumption of non changing
land cover during the investigation period. Consequently, temporally dynamic LULC, such as slash-and-burn
activities or transitions between clean and shrubby pasture, are neglected. Various studies emphasize the
usage of an adequate classification approach to ensure a high mapping accuracy (Liu et al., 2006; Waske and
Benediktsson, 2007; Waske and Braun, 2009). Especially the integration of spatial information by means of
region-based classification or spatial features such as texture lead to a gain in accuracy. In addition, Markov
Random Fields (MRFs) are a promising approach to integrate spatial context (Moser et al., 2013; Moser
and Serpico, 2013; Liu et al., 2006). MRFs are employed to model prior knowledge about neighborhood
relations within the image, called spatial relations, but can also be extended to describe relations of the
same area but at different acquisition dates (temporal relations). Since the early 1990s, approaches based
on MRFs have been utilized in remote sensing for various purposes (Bouman and Shapiro, 1994; Xie et al.,
2002; Tran et al., 2005; Solberg et al., 1996). Liu et al. (2008) use locally variant transition models to
account for spatial heterogeneity and have applied the model on subsets of two Landsat scenes from 1990
and 2001. More recently, Wehmann and Liu (2015) have adapted an integrated kernel as proposed by Moser
and Serpico (2013), and used Iterative Conditional Modes (ICM) as optimization technique with spatiallyvariant transitions for classifying Landsat data. Hoberg et al. (2015) apply multi-temporal Conditional
Random Fields to regularize annual remote sensing imagery from different high resolution scales (IKONOS,
RapidEye, Landsat) over the course of five years.
With the emergence of efficient probabilistic classifiers over the last decade, standard MRFs have been
extended to discriminative MRFs (Kumar and Hebert, 2003), and turn out to be increasingly useful to
optimize land cover classifications (Moser and Serpico, 2010; Tarabalka et al., 2010; Voisin et al., 2013). Liu
et al. (2006) highlight the advantages of utilizing non-parametric, probabilistic Support Vector Machines
3
(SVMs, Platt (1999)) over a maximum likelihood classifier. However, although many remote sensing studies
highlight the positive capabilities of MRFs, only few studies aim on using MRFs for landscape-scale mapping
with multi-temporal data sets (e.g. Cai et al., 2014; Wehmann and Liu, 2015; Olding et al., 2015), for example,
to map forest cover change (Liu et al., 2008, 2006). If multi-temporal data sets are available, MRFs can also
be used to optimize the corresponding maps by considering predefined spatial-temporal inter-dependencies
between neighboring pixels, which are stored in transition matrices.
We present a novel framework for classification of a TS-X time series using discriminative MRFs and Import
Vector Machine (IVM), a probabilistic, discriminative, non-parametric classifier. Each scene is separately
classified using IVM, afterwards MRFs are utilized in an independent step to post-regularize the classification
map. We chose IVMs over commonly used probabilistic SVMs, since they have proven to offer a more reliable
probabilistic output (Zhu and Hastie, 2005; Roscher et al., 2012a,b). For MRF optimization we choose Loopy
Belief Propagation (LBP) over ICM as this method has been shown repeatedly to yield higher accuracies
(Szeliski et al., 2006; Andres et al., 2010a). Few studies have utilized LBP in the field of remote sensing (Li
et al., 2013), and as a novelty we integrate LBP into a multi-temporal setting.
The presented framework aims on the classification of each individual acquisition, and thus enables mapping
of high frequency spatial-temporal LULC patterns. In contrast to related studies, we use a multi-temporal
MRF model on SAR data to detect short-term transitions within one season and Loopy Belief Propagation
(LBP) for inference.
The overall goal of this research is focused on two objectives: (i) to map LULC in a tropical setting with
short-term processes, by adapting recent MRF methods, and (ii) to assess the potential for LULC mapping
using time-series image data of short wavelength SAR. The specific objective is to map LULC in Pará, Brazil,
where transformations of forest to pasture are the major driver of deforestation. Pasture management in the
study region tends to fall into one of two categories: long-term processes of intensively managed pasture land
(pasto limpo), or short-term processes of episodically managed pasture land with a high degree of successive
dynamics (pasto sujo). Pasture management in general is characterized by slash-and-burn processes resulting
in sudden changes in LULC.
2. Study Area & Data
2.1. Study Area
The study area lies in the Northern part of the Novo Progresso municipality (southern Pará state,
Brazil), and is intersected by the BR-163 highway in the Southwest 1. The BR-163 is accompanied by
4
Figure 1: Composite of three TerraSAR-X acquisitions (Red: VV June 8, Green: HH September 4, Blue: VV November 9 of
2014). True color ETM (L8, 12 September 2014) in the background shows the diverse LULC properties.
5
Table 1: Scenes utilized in this study. All scenes were collected over the same area using the same incidence angle.
Date
2014-06-08
2014-06-30
2014-07-22
2014-08-24
2014-09-04
Polarization
VV-VH
HH-HV
VV-VH
VV-VH
HH-HV
fishbone structures indicative of deforestation (Ahmed et al., 2013; Coy and Klingler, 2014). A major driver
of deforestation in the study area is the transformation of forests into pasture land. The climate in the study
region is characterized by a wet and a dry season. While the dry season, between June and September, sees
abrupt land cover changes in the form of large scale burning and clear cuts, the wet season is defined by
gradual regrowth, yet deforestation rates over the wet season are on the rise.
Figure 2: Photograph illustrating the fluent transitions and interactions of different land cover types in the study region.
6
2.2. Remote Sensing Data
The data base for the study consists of five TS-X strip map scenes with 5m × 5m spatial resolution
(Table 1). All images are ordered in single-look complex format, comprising different VV-VH and HH-HV
polarization at an incidence angle of 37.75◦ , and cover a swath of roughly 50km × 15km (5663 × 11856
pixels). Data is calibrated and processed according to common procedures (see Section 2.2). Preprocessing
in the context of this study includes all necessary steps before random sampling of training and test data
is performed. After random sampling, training of IVM, and MRF regularization are taken out, land cover
maps are generated and validated, and average measures are calculated.
Preprocessing of the TS-X scenes is conducted using the Sentinel 1-Toolbox and the Geospatial Data Abstraction Library (GDAL Development Team, 2015). All scenes were processed separately in the following
order:
Multilooking: 3 range looks, 2 azimuth looks, yielding a ground resolution of ∼ 4.7m × 4.7m.
Terrain & Radiometric Correction: Range-Doppler terrain correction (SRTM 3Sec) and resampling to
5m × 5m pixel spacing. The data is projected into UTM Zone 21S. γ 0 radiometric normalization is
applied using an SRTM.
GLCM-Texture Texture measurements are widely used to increase the mapping accuracy of SAR data
(Sarker et al., 2012; Dekker, 2003; Cutler et al., 2012). Gray Level Co-occurence Matrices (GLCM) are
calculated with 11 × 11 moving window size into all symmetric directions with offset one. Probabilistic
quantization is conducted into 64 levels. Ten texture parameters are separately derived for any available
polarization and any available scene: contrast, dissimilarity, homogeneity, angular second moment
(ASM), energy, maximum probability, entropy, GLCM mean, GLCM variance, and GLCM correlation.
These will be included as additional features to improve the IVM classification. For more information
on GLCM-based texture parameters see Haralick et al. (1973); Sarker et al. (2012). In respect to
findings by Sarker et al. (2013); Nyoungui et al. (2002), and our own experiments, we abstain from
combining texture metrics with speckle filtering. Since we use 10 texture measures per layer, we have
a total of 22 features per scene for the classification process.
2.3. Reference Data
Reference data includes multispectral RapidEye and Landsat data, in situ data, as well as land cover
data from various Brazilian agencies (e.g. PRODES, TerraClass). PRODES (Programa de Cálculo do
7
Table 2: Number of sample points available for training distinguished by class, extracted from polygons.
Date
Class
Burnt Pasture
Clean Pasture
Shrubby Pasture
Water
Forest
06-08
06-30
07-22
08-24
09-04
15
487
749
28
799
55
444
783
28
701
139
375
789
28
704
469
384
438
28
616
434
420
428
28
516
Desflorestamento da Amazônia) is an effort by the Brazilian space agency (INPE) to generate annual maps
documenting deforestation of primary forests inside the Legal Amazon with a minimum mapping unit of
6.25ha (INPE, 2015). Targeting only the sites that PRODES considers deforested, TerraClass is an effort
to determine LULC classes of the affected areas (Almeida et al., 2016). The overall coverage of all available
TS-X swaths constitutes the study area (Figure 1), and is sufficiently covered by reference information.
While forests as well as clean and shrubby pasture are present in the study area, occurrence of water and
burnt pasture is overall scarce. To address this issue, polygons are manually distributed over the entire area.
Afterwards, each polygon is assigned one class label for each date covered by TS-X to address changes of
LULC. If necessary, polygons are split to avoid class ambiguity within different temporal instances. E.g., if
a coherent pasture area is only partially burnt, the polygon gets split. The generation of reference data is
supported by visual interpretation of RapidEye as well as Landsat 7 ETM+ and Landsat 8 OLI data of the
same time period. In addition to Landsat and RapidEye imagery, fire products derived from MODIS are
also considered. Moreover, photographs from a field campaign conducted in August 2014 are available.
Sampling is conducted by two of the authors in close cooperation and was harmonized with classification
schemes by INPE (Instituto Nacional de Pesquisas Espaciais). The following LULC classes are considered:
clean pasture, shrubby pasture, burnt pasture, water, and forest. Clean pasture, also called
pasto limpo, describes pasture land that is intensively worked. This includes regular tillage and burning of
land to support cattle ranching. Shrubby pasture, also called pasto sujo, is not intensively managed and
thus affected by bush encroachment. The coarser appearence of shrubby pasture generally allows a visual
separation from clean pasture in high resolution images. Burnt pasture includes clean as well as shrubby
pasture areas which were recently burned, and are characterized by open soil and vegetation residues. Such
areas can be easily identified using false color composites. Forest, beside primary forests, includes areas
of secondary vegetation and regeneration as these are usually non-separable by X-band SAR. Forests have
a very characteristic appearance in TS-X images and high resolution multispectral imagery. Table 2 gives
8
Figure 3: Classification scheme.
In-Situ
Multispectral (RE, LS)
Water
Forest
Pasto Burnt
Pasto Limpo
Pasto Sujo
Class
9
an overview of the number of available training samples for each class and date. It should be underlined
that the burning season usually starts around end of July. Hence only few burned pasture areas could be
identified before that period. Water bodies are also very scarce and only two lakes over the entire study area
are included. Figure 3 visualizes the classes considered in our classification scheme. The considered LULC
classes match comparable studies using TS-X data in Brazilian, or tropical settings, respectively (Garcia
et al., 2011; Schlund et al., 2013). As the time period of our study falls into the dry season between June
and September, corresponding multispectral remote sensing data could be interpreted sufficiently well. Yet,
some challenges remain:
• For the study region two dominating pasture types can be identified: pasto sujo, i.e., shrubby pasture,
and pasto limpo, i.e., clean pasture (Almeida and Vieira, 2008; Adami et al., 2015). While both
types are generally used for cattle ranching in this region, pasto sujo is characterized by bushes and
occasional early stages of succession. However, the transition between these types can be gradual and
consequently hard to interpret from remote sensing imagery alone; even at 5m ground resolution as
offered by RapidEye.
• Transitions from pasto sujo into early stages of secondary vegetation are hard to distinguish, due to the
gradual nature of this process. However, it is not as relevant in our study site since significantly less
areas are affected. To allow a solid separation of these classes, we consider multi-annual time series to
identify pasture management. In addition, we include information offered by TerraClass which reliably
separate different types of secondary vegetation and pasture land.
• Primary and secondary forests, as well as secondary vegetation, are combined into one class, as various
studies and own preliminary tests indicate the limitation of X-band for separating these two classes.
3. Methods
The proposed framework consists of four steps: (i) preprocessing, (ii) random sampling, (iii) classification
of each single scene using IVM, and (iv) optimization of the MRF model. Final validation is performed on
averages over 10 independent runs, using a random sampling (50:50) into spatially disjoint train and test
polygons. As pixels sampled from training polygons are solely used for IVM parameterization (grid search)
and model training, pixels sampled from test polygons enable an independent validation.
Throughout the paper we use the following notation: Let there be a training set (xn , yn ) ∈ T comprising
N feature vectors {x1 , . . . , xn , . . . , xN } and corresponding class labels yn ∈ {1, ..., K}, distributed over an
10
t+1
t
t−1
Figure 4: Temporal (green) and spatial (yellow) neighbors of a given pixel (blue).
image lattice I . We later address image samples at any given coordinate as xi , and probability estimates as
pi = [p1 , ..., pnk , ..., pnK ] with pnk = p(yn = k | xn ).
3.1. Import Vector Machines
IVM is a discriminative and probabilistic classifier based on kernel logistic regression and has first been
introduced by Zhu and Hastie (2005). Roscher et al. (2012b) have shown that IVMs provide more reliable
probabilities than probabilistic SVMs, since IVMs’ probabilities are more balanced, whereas SVMs generally
overestimate maximum probabilities. To account for complex decision boundaries between classes, IVM
generally benefit from integrating a kernel function. For this study, we utilize the radial basis function (rbf)
kernel parameterized by kernel width σ, which is a standard for remote sensing purposes. Parameterization
is achieved analogously to standard SVM practices using a grid search, to estimate the cost parameter C
and σ. For a more encompassing description of IVM see Zhu and Hastie (2005) and Roscher et al. (2012a).
3.2. Markov Random Field
In this study, we use post classification MRF with spatio-temporal neighborhood relations between
pixels, as illustrated in Figure 4. Parameterization is achieved through transition matrices, which are 5 × 5
matrices indicating spatial and temporal transition probabilities between the five classes. For our description
of MRF, we adapt a terminology similar to Moser et al. (2013); Melgani and Serpico (2003). Therefore, with
xi denoting pixel features and yi its corresponding class label, we reformulate the IVM-based probabilities
p(yi | xi ) as energy terms
UX = −
X
ln p(yi | xi ).
(1)
i∈I
As the energy UX are equivalent, minimization of UX is identical to maximization of P . Now consider
a function for the spatial neighborhood Usp , with i ∼sp j applying to any two pixels, which are direct,
11
4-connected, spatial neighbors, and a function δ(yi , yj ) to assign weights to neighboring classes:
Usp =
X
1 − δ(yi , yj )
(2)
i∼s j
In this case the function δ yields a K×K matrix which can be used to favor certain neighboring constellations.
The function δ is generally defined as Potts model to result in an identity matrix, which encourages the
generation of homogeneous areas. The standard mono-temporal MRF model is given by summation of (1)
and (2)
UX ,sp = −
X
ln p(yi | xi ) + β
X
1 − δ(yi , yj ) ,
(3)
i∼s j
i∈I
with weight parameter β to regulate importance of the spatial component. For the multi-temporal case
we consider co-registered images with the temporal neighbors being the spatially congruent cells at the
neighboring acquisition times t − 1 and t + 1. Only if pixel j is the temporal successor of i, i ∼t+1 j applies;
and only if pixel j is the temporal predecessor of i, i ∼t−1 j applies. Temporal energy is hence given by (4),
analogous to the spatial case.
Utemp =
X
1 − τ1 (yi , yj ) +
i∼t+1 j
X
1 − τ2 (yi , yj )
(4)
i∼t−1 j
Here, τ1 and τ2 are K × K matrices defining the temporal transitions as observed from land cover trajectories. In opposition to the spatial weighting δ, we require multiple, non symmetrical matrices τ to respect
trajectories with regard to the future, or the past. The overall energy function is defined by integrating the
temporal vicinity into (3), which yields
U =−
X
+βtemp
1 − δ(yi , yj )
i∼s j
i∈I
X
X
ln p(yi | xi ) + βsp
1 − τ1 (yi , yj ) +
i∼t+1 j
X
1 − τ2 (yi , yj ) .
(5)
i∼t−1 j
This function combines (3) and (4). Weight parameters β(·) can be used to adjust the importance of temporal
and spatial weights.
3.3. Passing scheme & transition matrices
LBP is an inference algorithm utilizing Message Passing (Pearl, 1982), and is shown to approximate
maximum values sufficiently well (Murphy et al., 1999). We choose LBP over graph-cut based methods for
12
Figure 5: Passing schedule as applied in this study. One pass over all layers corresponds to one iteration of LBP.
Action
Description
Step 1: Generation of a fallback copy of the
current energy layer (blue). Necessary for future
calculation of messages passed to the red layer.
Step 2: Messages are passed from the previous
fallback, the next energy layer, and the current
layer, also factoring in the unaries upon receiving. This procedure is performed using a set of
moving windows.
Step 3: Discarding of the previous fallback, and
backing up of the next energy layer (see Step 1).
Iterate over each layer.
their more general applicability, as graph-cuts are specifically defined for symmetrical binary factors (Boykov
et al., 2001), and can not be applied in non-symmetric environments (Kolmogorov and Zabin, 2004). ICM
(Iterated Conditional Modes) is another algorithm which is commonly used to achieve inference, especially
in remote sensing and using multi-temporal data sets (Liu et al., 2008, 2006; Wehmann and Liu, 2015).
While it has low computational cost, it is generally outperformed by LBP in terms of accuracy (Szeliski
et al., 2006; Andres et al., 2010b). For this reason we formulate an implementation of LBP using moving
windows, which can be applied to image stacks of arbitrarily large image stacks sufficiently well. Figure 6
illustrates the neighborhood of one pixel in a factor graph, analogous to the MRF neighborhood as described
in Section 3.2. Using the Potts function to define δ is common practice in remote sensing literature (Moser
et al., 2013), and since the focus of this study lies on the examination of MRF for a multi-temporal linking of
classifications, we follow this practice. The Potts function can be represented by an identity matrix, which
supports assignment of neighboring pixels to the same class. It is in general not sensible to formulate an
asymmetric message passing for the two spatial dimensions, as a pixel will assume the same properties of
its left as of its right neighbor. More specifically, the Potts model is a way to reflect Tobler’s assumption on
13
τ2
δ
I
τ1
δ
δ
τ1
δ
τ2
Figure 6: Factor-graph as implemented in this study. Variable nodes illustrated by yellow (spatial neighbor) and green nodes
(temporal). Circles mark the corresponding factor nodes and the unary IVM-based energy.
spatial autocorrelation, promoting the idea of close objects to be more alike than distant objects.
In contrast to the spatial transitions, utilization of the Potts model for temporal transitions can lead to
serious distortions and cause equalization of all subjected probability maps, i.e., it would prohibit any land
cover changes from occuring. While we can not assume any spatially directional patterns in the area, and
thus rely on the Potts model, a pixel will pass different messages to its temporal successor opposed to its
predecessor. Through adjustment of τ it is possible to assign probabilities for all possible types of class
transitions. We therefore express temporal transitions through two asymmetric transition matrices (τ1 and
τ2 ). While matrix τ1 illustrates the messages pixels pass from the scene at time t to its neighbor at t − 1,
τ2 defines the messages the pixels pass from t to t + 1. This differentiation is important, e.g. considering
that burnt pasture at t will prohibit primary forests at t + 1, yet it might endorse pasture at t − 1. We
integrate the user-defined transition matrices τ1 and τ2 as interface to inject a-priori expert knowledge into
our regularization model. While not empirically derived, these matrices are based on weak assumptions on
land cover trajectories.
The assumptions include that Water and Forest are regarded very consistent classes, yet that pasture
areas have some kind of interaction with each other. This especially concerns the transition of pasture land
to burnt pasture land, which is explicitly tolerated. Furthermore, forest does not explicitly prohibit
predecessing non-forest areas, which is due to forest including secondary vegetation and to offer the model
14
some tolerance with regard to misclassifications. Hence, the formalization of land cover trajectories is
relatively straight forward, and not necessarily based on elaborate a-priori knowledge. Previous tests showed
a very similar outcome concerning the modification of these parameters, yet using very strict transitions
could lead to undesired results and suppress dynamics entirely. In the scope of this study we utilize different
transition matrices due to the varying time gap between the five TS-X acqusitions. The revisit rate of TS-X
is eleven days, and the available imagery shows one gap of eleven days, two gaps of 22 days, as well as one
gap of 33 days in between neighboring acquisitions. We hence linearly modify the transitions to adjust to
the varying temporal resolution, since with increasing time, more change is expected to occur.
The following summarizes the most relevant assumptions we made for specification of the transition matrices.
• Pasture areas can potentially be burnt. After burning, likelihood is high to transition back into clean
pasture or shrubby pasture.
• Transitions from shrubby pasture to clean pasture are permitted.
• Clean pasture is considered stable, yet may transition into shrubby pasture or forest. Following
observations of TerraClass, for the study region we assume a slow shift from clean pasture into
shrubby pasture overall.
• Forest is the most consistent class. It can get removed, yet especially shrubby pasture can develop
into forest as the class also includes secondary vegetation.
• Water is used to describe bodies of water which are permanently filled within this dry season.
• For any class there is a small tolerance to evade to counteract inconsistent transitions which may be
caused by misclassifications.
3.4. Classification & Validation
Three different types of classification are compared: (i) the baseline IVM classification, (ii) the spatialonly MRF with βt = 0, from now on referred to as s-MRF, and (iii) the spatial-temporal MRF, referred to
as st-MRF. While many studies rely on supervised classification using SVM and Random Forest classifiers,
various studies show that IVM perform at least equally well in terms of accuracy ((Roscher et al., 2012b;
Braun et al., 2012)). Therefore the original IVM classification is considered as adequate baseline classification.
Reference polygons exclusively comprise either training or test samples to avoid spatial autocorrelation.
15
For training purposes, 15 samples per polygon are randomly selected, using a minimum sampling distance
of 30 meters. A systematic sampling ensures that an adequate number of training samples is selected for
all five classes; clean pasture, shrubby pasture, burnt pasture, water, and forest. Validation is
conducted considering the current terms of good practice as laid out by Olofsson et al. (2014). Samples
are clustered in polygons to improve on the spatial variability of both, training and test samples, with
pixels being the assessment unit. This sampling strategy is a necessary trade-off between ideal conditions
of independent random sampling and the difficulties of obtaining large scale, multi-temporal reference data
in a challenging environment (Olofsson et al., 2014). Error matrices are derived to serve as a basis for
the estimation of overall accuracies (OA), user accuracies (UA), producer accuracies (PA), and their corresponding confidence intervals (CI). In addition, we calculate area measures and their confidence intervals at
each acquisition date to estimate the development of burnt pasture land over the entire 2014’s dry season.
Classification and validation is conducted ten times using different training and test sets and the results are
averaged.
4. Results
We show that we can benefit from the high repetition rate and high ground resolution of TS-X, and
that the proposed framework outperforms common classification approaches in terms of area adjusted mapping accuracy (Olofsson et al., 2014). Table 3 illustrates the average area adjusted OA for the five TS-X
scenes, using the three different methods. Irrespective of the acquisition date, the accuracy was significantly
improved by the MRF, with the s-MRF consistently outperforming the IVM only results, and st-MRF consistently outperforming s-MRF to a lesser degree. The weakest classification of IVM (60%) and s-MRF
(69%) could be clearly improved by up to 19 and 10 percentage points compared to the classification results
achieved with st-MRF (79%). On average, OA could be improved by 8.6 percentage points using s-MRF,
and 12.2 percentage points using st-MRF when compared to the IVM classification. As recommended by
Olofsson et al. (2014), we additionally calculated variance measures for results, yet with confidence intervals
Table 3: Area adjusted overall accuracies for different dates. The shown values are means over 10 iterations.
Acquisition Date
2014-06-08
2014-06-30
2014-07-22
2014-08-24
2014-09-04
Polarization
IVM
s-MRF
st-MRF
VV-VH
HH-HV
VV-VH
VV-VH
HH-HV
0.65
0.60
0.66
0.69
0.68
0.75
0.69
0.76
0.74
0.77
0.77
0.79
0.78
0.76
0.78
16
2014-06-08
2014-06-30
2014-07-22
2014-08-24
2014-09-04
(%)
100
80
60
40
20
0
100
80
60
40
20
0
100
80
60
40
20
0
100
80
60
40
20
0
100
80
60
40
20
0
IVM
s-MRF
st-MRF
UA PA UA PA UA PA UA PA UA PA
Forest P. Burnt P. Clean P. Shrub Water
Figure 7: User’s and Producer’s Accuracy
for all the classes at each date.
17
generally falling well below 1 percentage point, we will not further address these measurements.
Figure 7 summarizes the average UA’s and PA’s of the three approaches (IVM, s-MRF, st-MRF). IVM
yields the lowest accuracies, while st-MRF generally shows the highest, and most balanced class-specific
accuracies. All approaches are especially reliable concerning the classification of forest areas, with st-MRF
achieving especially high PA’s for this class (≥ 90%). For any given approach, the three pasture classes
are classified with significantly lower accuracies than forest areas. Shrubby pasture and clean pasture
are overall underrepresented, with PA’s between 30% and 60% depending on the scene and method. Clean
pasture generally yields accuracies of approximately 50%, but also classification of this class is particularly
problematic concerning the PA of the last scene (around 40%). Weak classification results of the different
pasture classes are generally caused by confusion within the different pasture types, and reflects findings
of comparable studies which utilize X-band SAR data (Schlund et al., 2013). In general, st-MRF shows
higher accuracies, when compared to the classification results achieved by the other approaches, and is
capable of mapping burnt pasture starting from 2014-08-24. This is very notable, as a general concern
regarding multi-temporal MRF’s are its smoothing effects, which could cause the suppression of sporadic
events. Due to the low number of burnt pasture areas before the end of July, we are not able to reliably
calculate accuracies for burnt pasture areas at every date. Only up to two burnt fields exist for the first
two acquisitions, which do not allow for an adequate classification and validation. However, this is also
in accordance to the typical land management in the region, insofar slash-and-burn activities usually start
later in the season. Nevertheless, the class is kept as st-MRF utilizes any class for the scenes and to have
a consistent classification scheme over the entire period. Although some additional burnt pasture areas
occur in July (ten areas over the entire study area), the classification accuracy remains very low. Despite
consisting of few samples, possibly due to its temporal consistency and very distinct signature, water is
mapped especially well. As water encompasses just very few areas over the entire study site, yet yields
PAs of 85% and higher for the baseline approach. This weakness appears to get enhanced by the s-MRF
approach, which yields a remarkable drop in the PA of water at some dates, while the spatio-temporal
MRF appears to ensure its further designation. This behavior underlines capabilities of st-MRF to not only
increase mapping accuracy of temporally sporadic classes, such as burnt pasture, but, remarkably, also
proves the value of st-MRF regarding the mapping of classes which are static, yet spatially small scaled.
Contrastingly, using mono-temporal MRF such classes tend to get suppressed more frequently. Regarding
UA, water is mapped very convincingly with accuracies of over 95% using the MRF approaches, yet the
IVM classification shows much less reliable accuracies.
18
Figure 8: Comparison of different classifications inside the subsetted area of Figure 1.
Water
Pas. Clean
s-MRF
st-MRF
2014-09-04
2014-08-24
2014-07-22
2014-06-30
2014-06-08
IVM
Pas. Burnt
19
Pas. Scrub
Forest
Reference
3000
Area of Pasture Types in km2
2500
2000
1500
1000
500
Burnt
Clean
Shrubby
0
06-08
06-30
07-22
Date
08-24
09-04
Figure 9: Growth of burnt areas over the 2014 dry season. Error bars are indicative of the 95% confidence interval.
The visual assessment of the classification maps underlines the positive effect of the MRF-based approaches
(Figures 8 and 10). A large number of speckle induced misclassification can be attributed to any of the
maps classified using IVM with texture parameters. This effect is suppressed to some extent by s-MRF, yet
individual clusters of misclassification can still be located. While not entirely homogeneous, st-MRF suppresses the noise considerably, yet maintaining the general spatial patterns of LULC. Fine spatial structures
appear to not get suppressed by the st-MRF, despite conservative IVM estimates.
Using land cover maps derived from st-MRF, Figure 9 illustrates that clear trends can still be derived using
the proposed data and methods. The figure illustrates a high percentage of shrubby pasture land early in
the dry season. Over the course of the dry season, this amount is continuously shrinking, while the burning
of pasture starts growing exponentially at the end of July. At the end of the dry season, the area of clean
pasture land is comparable to that of shrubby pasture.
20
21
(a) 2014-06-08
(c) 2014-07-22
(d) 2014-08-24
Figure 10: Final classification results using the st-MRF approach.
(b) 2014-06-30
(e) 201409-04
5. Discussion
The main objective of this study, i.e., the adaptation of recent methods for the mapping of dynamic LULC
in a tropical setting, is shown to be generally positive in our study. The proposed approach of using spatialtemporal MRF with expert knowledge is generally able to capture short term LULC dynamics, which are
challenging to map using standard classification techniques. Although our validation confirms limitations of
short-wavelength SAR data (e.g., when differentiating different pasture types, especially mono-temporally),
the proposed approach enables the generation of a meaningful time series of homogeneous LULC maps using
only SAR data. Consequently, the reliable prompt mapping of LULC change can be achieved independent
of cloud cover and atmospheric inference.
The results show that the use of the proposed approach outperforms standard IVM classifications utilizing texture parameters only, as well as common spatial MRF, in terms of classification accuracy. Visual
inspection of burnt pasture areas of early dates shows bright and overall heterogeneous backscatter within
the class, and similarity to the other pasture classes at TS-X images, while Landsat and RapidEye images
unambiguously indicate burnt pasture. Possible reasons for this could be organic debris or wet conditions.
Contrary to that, many burnt areas of subsequent scenes, after the occurrence of large scale burning, can
be identified more clearly at X-band as areas of low backscatter.
Regarding X-band data the potential transfer of the approach to the wet season, which is characterized by
higher saturation of backscatter intensity, is another challenge. While separation of pasture types already
appears difficult in the dry season, the integration of temporal context via the MRF might allow for a reliable
separation of pasture and forest areas over the wet season. Additional testing showed furthermore that utilization of temporal trajectories alone, despite generally not as effective as utilization of the spatial context
(s-MRF), can be used to significantly elevate all accuracies above 70%. In particular the weak classification
of 2014-06-30 could benefit from this approach as the variance of classification outcomes is reduced between
different scenes.
Our findings are in accordance with the results of other recent studies, which were able to improve the
classification accuracy via implementation of multi-temporal MRF (Wehmann and Liu, 2015; Liu et al.,
2008). While Wehmann and Liu (2015) use regionally optimized transition matrices, and a state of the art
integrated kernel based on Moser and Serpico (2013) to achieve high classification accuracies over long time
periods, the proposed method aims on the detection of short term land cover change in SAR imagery, and
utilizes LBP for inference as well as IVM for classification. The visual assessment of the classification results
confirms the positive effect of the MRF on the classification accuracy. Although the maps provided by the
22
23
Figure 11: Difference map between 2014-06-30 classifications of st-MRF and IVM. Light colors indicate agreement between the
two maps. Dark colors indicate class ambiguities, while the class of the final st-MRF classification is presented.
conventional IVM classification show general land use patterns, the results are affected by typical SARinherent noise. Even homogeneous areas appear very noisy, despite texture parameters that were included
in the classification procedure. Boundaries between individual land cover and land use classes may appear
blurred and are hard to identify. This drawback is significantly reduced by both MRF-based methods. As
LBP tries to minimize the transition energy by homogenizing adjacent pixels, areas become overall more
concentrated and edges along different LULC classes can be more clearly identified. Benefits can also be
attributed to the classification of the interior of areas, as the application of MRF suppresses outliers. Thus,
the results confirm the edge preserving capabilities of MRF, even for challenging spatial class transitions
(e.g. forest to shrubby pasture).
With regard to class-specific accuracies, the spatio-temporal MRF offers preferable results over just IVM
and the spatial-only approach. Figure 11 illustrates the differences between a 2014-06-30 classification of
the IVM and the st-MRF approaches, underlining the potentials of solving confusion between forest and
shrubby pasture. It is colorized to highlight disagreements of the classifications, with pale colors signifying consenting classifications, and opaque colors indicating classes as assigned by st-MRF (for legend see
Figure 8). It is especially obvious that with increasing vegetation density confusion also rises, and that
clean pasture is classified congruently in both approaches. While the classification of clean pasture
and shrubby pasture remains challenging, TS-X data constitutes an adequate data source for forest /
non-forest mapping. The PA and UA for forest are higher compared to the accuracies achieved for the
other classes, and are in accordance with the accuracies of comparable studies (Schlund et al., 2013; Garcia
et al., 2011). While we did not perform specific analysis on the differences of HH-HV and VV-VH polarized
data sets, Table 3 shows the OA of the internal HH-HV polarized scenes (06-30) to especially benefit from
the multi-temporal integration, and also its neighboring scenes to benefit disproportionately. We can thus
assume synergetic effects to be transferable through a multi-temporal MRF, yielding a promising outlook
for the multi-sensoral integration of various data sources.
Regarding the low requirements concerning parameterization and the implementation through moving windows, we consider the introduced method to be transferable to other study regions. Adaptation of the
transition matrices allows the method to be fitted to more static environments, or also to address multiannual time series data. Despite the ambitious goals of this study, i.e. to perform land cover mapping in
a densely vegetated and dynamic tropical study region using TS-X data, and some documented limitations
concerning the separability of different pasture types, we were able to achieve improvements over standard
classifications. As the method incorporates adjacency information, potential shortcomings exist when the
24
ground resolution is coarse relative to the mapped land cover. In this case, fragmented structures might
get suppressed. Further adjustment would also be required if assumptions on land cover trajectories are
variant in a multi-temporal setup. For example, two scenes from the dry season carry a different transition
probability with regard to burning than two scenes from the wet season. While this can be easily solved
through different transition models, within this study we just included slight modifications of transition
matrices to account for the different intervals between TS-X acquisitions.
6. Conclusion
The results show clearly that the integration of spatial-temporal MRFs are advantageous to the baseline
classification approach and spatial MRF methods. Especially the classification of forest areas yields very
high accuracies. We were able to successfully implement an LBP optimization for the regularization of high
resolution, multi-temporal TS-X images of a tropical context. We were furthermore able to give adequate
estimates on the spatio-temporal pattern of land use dynamics such as burned pastures. Importantly, the
suggested approach is able to handle process of small spatio-temporal scale, and despite its smoothing effects does not suppress fine structures. Separation of different types of pasture (pasto sujo and pasto limpo)
remains a challenging task at the short wavelength. Classification of burnt pasture early in the season
highlights limitations of the MRF-based model, which arise when the underlying classification accuracy is
already limited. While the approach is well suited to regularize small classification errors using contextual
information, it is not able to sufficiently address misclassifications in complex, transitional environments
with weak classification accuracies. The sometimes relatively low class accuracies are not necessarily a limitation of the proposed method, but rather caused by the short-wave TS-X data as well as class-specific
characteristics.
Particularly for study sites which are characterized by land use patterns of high spatial-temporal variability,
the proposed approach (i.e., using spatial-temporal MRF with expert knowledge) appears feasible. Using
expert knowledge on land cover trajectories, we could positively influence model performance and bypass
computationally demanding techniques for the estimation of MRF parameters.
When derived from multiple classifications, change maps are generally strongly affected by weak initial classifications.
The proposed method is formalized to be transferable to large, possibly multi-sensoral, image stacks. For
future studies our aim is to integrate the regularization of short-term, intra-annual dynamics with long-term
dynamics such as deforestation and agricultural trends, using multi-sensoral imagery.
25
Acknowledgments
The study was carried out as part of the SenseCarbon research project funded by DLR/BMWi (50 EE
1255). SenseCarbon is part of GFOI-R&D (BRA-2). We thank the countless developers behind the freely
accessible software utilized in this study (i.e. Python, GDAL, S1TBX, and Q-GIS). For their supporting
efforts we direct further thanks to Niklas Potthoff, Paul Wagner, Rolf Rissiek, Bernd Melchers, Merry
Crowson, and Christian Lamparter, as well as the anonymous reviewers.
References
References
Adami, M., Gomes, A. R., Coutinho, A. C., Esquerdo, J. C. D. M., Venturieri, A., 2015. Dinâmica do uso e cobertura da terra
no estado do pará entre os anos de 2008 a 2012. XVII Simpósio Brasileiro de Sensoriamento Remoto.
Ahmed, S. E., Souza, C. M., Riberio, J., Ewers, R. M., Jan 2013. Temporal patterns of road network development in the
Brazilian amazon. Reg Environ Change 13 (5), 927–937.
URL http://dx.doi.org/10.1007/s10113-012-0397-z
Almeida, A. S. d., Vieira, I. C. G., 2008. Dinâmica da cobertura vegetal e uso da terra no municı́pio de são francisco do pará
(pará, brasil) com o uso da técnica de sensoriamento remoto. Boletim do Museu Paraense Emı́lio Goeldi Ciências Naturais
3 (1), 81–92.
Almeida, C. A. d., Coutinho, A. C., Esquerdo, J. C. D. M., Adami, M., Venturieri, A., Diniz, C. G., Dessay, N., Durieux, L.,
Gomes, A. R., Sep 2016. High spatial resolution land use and land cover mapping of the Brazilian legal amazon in 2008 using
landsat-5/tm and modis data. Acta Amaz. 46 (3), 291–302.
URL http://dx.doi.org/10.1590/1809-4392201505504
Almeida-Filho, R., Shimabukuro, Y. E., Rosenqvist, A., Sanchez, G. A., Jul 2009. Using dual-polarized alos PALSAR data for
detecting new fronts of deforestation in the Brazilian amaznia. International Journal of Remote Sensing 30 (14), 3735–3743.
URL http://dx.doi.org/10.1080/01431160902777175
Andres, B., Kappes, J. H., Köthe, U., Schnörr, C., Hamprecht, F. A., 2010a. An empirical comparison of inference algorithms
for graphical models with higher order factors using opengm. Pattern Recognition, 353–362.
URL http://dx.doi.org/10.1007/978-3-642-15986-2_36
Andres, B., Kappes, J. H., Köthe, U., Schnörr, C., Hamprecht, F. A., 2010b. An empirical comparison of inference algorithms
for graphical models with higher order factors using opengm. In: Pattern Recognition. Springer, pp. 353–362.
Aschbacher, J., Milagro-Pérez, M. P., May 2012. The European earth monitoring (GMes) programme: Status and perspectives.
Remote Sensing of Environment 120, 3–8.
URL http://dx.doi.org/10.1016/j.rse.2011.08.028
Blaes, X., Vanhalle, L., Defourny, P., 2005. Efficiency of crop identification based on optical and sar image time series. Remote
sensing of environment 96 (3), 352–365.
26
Bouman, C. A., Shapiro, M., 1994. A multiscale random field model for bayesian image segmentation. Image Processing, IEEE
Transactions on 3 (2), 162–177.
Bovolo, F., Bruzzone, L., Dec 2005. A detail-preserving scale-driven approach to change detection in multitemporal SAR
images. IEEE Transactions on Geoscience and Remote Sensing 43 (12), 2963–2972.
URL http://dx.doi.org/10.1109/TGRS.2005.857987
Boykov, Y., Veksler, O., Zabih, R., 2001. Fast approximate energy minimization via graph cuts. Pattern Analysis and Machine
Intelligence, IEEE Transactions on 23 (11), 1222–1239.
Braun, A. C., Weidner, U., Hinz, S., apr 2012. Classification in high-dimensional feature spaces assessment using SVM, IVM
and RVM with focus on simulated EnMAP data. IEEE Journal of Selected Topics in Applied Earth Observations and Remote
Sensing 5 (2), 436–443.
Cai, S., Liu, D., Sulla-Menashe, D., Friedl, M. A., May 2014. Enhancing modis land cover product with a spatial-temporal
modeling algorithm. Remote Sensing of Environment 147, 243–255.
URL http://dx.doi.org/10.1016/j.rse.2014.03.012
Coy, M., Klingler, M., 2014. Frentes pioneiras em transformação: o eixo da br-163 e os desafios socioambientais. Territórios e
Fronteiras 7 (1), 1–26.
Cutler, M., Boyd, D., Foody, G., Vetrivel, A., 2012. Estimating tropical forest biomass with a combination of sar image texture
and landsat tm data: An assessment of predictions between regions. ISPRS Journal of Photogrammetry and Remote Sensing
70, 66–77.
Davidson, E. A., de Araújo, A. C., Artaxo, P., Balch, J. K., Brown, I. F., Bustamante, M. M., Coe, M. T., DeFries, R. S.,
Keller, M., Longo, M., et al., 2012. The amazon basin in transition. Nature 481 (7381), 321–328.
Dekker, R. J., 2003. Texture analysis and classification of ers sar images for map updating of urban areas in the netherlands.
Geoscience and Remote Sensing, IEEE Transactions on 41 (9), 1950–1958.
Englhart, S., Keuck, V., Siegert, F., May 2011. Aboveground biomass retrieval in tropical forests – the potential of combined
x- and l-band SAR data use. Remote Sensing of Environment 115 (5), 1260–1271.
URL http://dx.doi.org/10.1016/j.rse.2011.01.008
Foley, J. A., Jul 2005. Global consequences of land use. Science 309 (5734), 570–574.
URL http://dx.doi.org/10.1126/science.1111772
Garcia, C. E., dos SANTOS, J. R., Mura, J. C., Kux, H. J. H., 2011. Análise do potencial de imagem terrasar-x para
mapeamento temático no sudoeste da amazônia brasileira. Acta Amazonica 42 (2).
GDAL Development Team, 2015. GDAL - Geospatial Data Abstraction Library, Version 2.0.1. Open Source Geospatial Foundation.
URL http://www.gdal.org
Hansen, M. C., Potapov, P. V., Moore, R., Hancher, M., Turubanova, S. A., Tyukavina, A., Thau, D., Stehman, S. V., Goetz,
S. J., Loveland, T. R., Kommareddy, A., Egorov, A., Chini, L., Justice, C. O., Townshend, J. R. G., 2013. High-resolution
global maps of 21st-century forest cover change. Science 342 (6160), 850–853.
URL http://science.sciencemag.org/content/342/6160/850
Haralick, R. M., Shanmugam, K., Dinstein, I. H., 1973. Textural features for image classification. Systems, Man and Cybernetics,
IEEE Transactions on (6), 610–621.
Hoberg, T., Rottensteiner, F., Queiroz Feitosa, R., Heipke, C., 2015. Conditional random fields for multitemporal and multiscale
27
classification of optical satellite imagery. Geoscience and Remote Sensing, IEEE Transactions on 53 (2), 659–673.
INPE, 2015. Projeto prodes - monitoramento da floresta amazonica brasileira por satelite.
Khatami, R., Mountrakis, G., Stehman, S. V., May 2016. A meta-analysis of remote sensing research on supervised pixelbased land-cover image classification processes: General guidelines for practitioners and future research. Remote Sensing of
Environment 177, 89–100.
URL http://dx.doi.org/10.1016/j.rse.2016.02.028
Kolmogorov, V., Zabin, R., 2004. What energy functions can be minimized via graph cuts? Pattern Analysis and Machine
Intelligence, IEEE Transactions on 26 (2), 147–159.
Kumar, S., Hebert, 2003. Discriminative random fields: a discriminative framework for contextual interaction in classification.
Proceedings Ninth IEEE International Conference on Computer Vision.
URL http://dx.doi.org/10.1109/ICCV.2003.1238478
Kumar, T., Patnaik, C., 2013. Discrimination of mangrove forests and characterization of adjoining land cover classes using temporal c-band synthetic aperture radar data: A case study of sundarbans. International Journal of Applied Earth
Observation and Geoinformation 23, 119–131.
Lapola, D. M., Martinelli, L. A., Peres, C. A., Ometto, J. P., Ferreira, M. E., Nobre, C. A., Aguiar, A. P. D., Bustamante,
M. M., Cardoso, M. F., Costa, M. H., et al., 2014. Pervasive transition of the brazilian land-use system. Nature climate
change 4 (1), 27–35.
Li, J., Bioucas-Dias, J. M., Plaza, A., feb 2013. Spectral spatial classification of hyperspectral data using loopy belief propagation
and active learning. IEEE Transactions on Geoscience and Remote Sensing 51 (2), 844–856.
Liu, D., Kelly, M., Gong, P., 2006. A spatial–temporal approach to monitoring forest disease spread using multi-temporal high
spatial resolution imagery. Remote sensing of environment 101 (2), 167–180.
Liu, D., Song, K., Townshend, J. R., Gong, P., 2008. Using local transition probability models in markov random fields for
forest change detection. Remote Sensing of Environment 112 (5), 2222–2231.
McNairn, H., Champagne, C., Shang, J., Holmstrom, D., Reichert, G., 2009. Integration of optical and synthetic aperture radar
(sar) imagery for delivering operational annual crop inventories. ISPRS Journal of Photogrammetry and Remote Sensing
64 (5), 434–449.
Melgani, F., Serpico, S. B., 2003. A markov random field approach to spatio-temporal contextual image classification. Geoscience
and Remote Sensing, IEEE Transactions on 41 (11), 2478–2487.
Moser, G., Serpico, S. B., 2010. Contextual remote-sensing image classification by support vector machines and markov random
fields. In: Geoscience and Remote Sensing Symposium (IGARSS), 2010 IEEE International. IEEE, pp. 3728–3731.
Moser, G., Serpico, S. B., 2013. Combining support vector machines and markov random fields in an integrated framework for
contextual image classification. Geoscience and Remote Sensing, IEEE Transactions on 51 (5), 2734–2752.
Moser, G., Serpico, S. B., Benediktsson, J. A., 2013. Land-cover mapping by markov modeling of spatial–contextual information
in very-high-resolution remote sensing images.
Müller, H., Rufin, P., Griffiths, P., Barros Siqueira, A. J., Hostert, P., Jan 2015. Mining dense landsat time series for separating
cropland and pasture in a heterogeneous Brazilian savanna landscape. Remote Sensing of Environment 156, 490–499.
URL http://dx.doi.org/10.1016/j.rse.2014.10.014
Murphy, K. P., Weiss, Y., Jordan, M. I., 1999. Loopy belief propagation for approximate inference: An empirical study. In:
Proceedings of the Fifteenth conference on Uncertainty in artificial intelligence. Morgan Kaufmann Publishers Inc., pp.
28
467–475.
Nyoungui, A. N., Tonye, E., Akono, A., Jan 2002. Evaluation of speckle filtering and texture analysis methods for land cover
classification from SAR images. International Journal of Remote Sensing 23 (9), 1895–1925.
URL http://dx.doi.org/10.1080/01431160110036157
Olding, W. C., Olivier, J. C., Salmon, B. P., Jul 2015. A Markov random field model for decision level fusion of multi-source
image segments. 2015 IEEE International Geoscience and Remote Sensing Symposium (IGARSS).
URL http://dx.doi.org/10.1109/IGARSS.2015.7326289
Olofsson, P., Foody, G. M., Herold, M., Stehman, S. V., Woodcock, C. E., Wulder, M. A., May 2014. Good practices for
estimating area and assessing accuracy of land change. Remote Sensing of Environment 148, 42–57.
URL http://dx.doi.org/10.1016/j.rse.2014.02.015
Pearl, J., 1982. Reverend bayes on inference engines: A distributed hierarchical approach. In: AAAI. pp. 133–136.
Pfeifer, M., Kor, L., Nilus, R., Turner, E., Cusack, J., Lysenko, I., Khoo, M., Chey, V., Chung, A., Ewers, R., Apr 2016.
Mapping the structure of borneos tropical forests across a degradation gradient. Remote Sensing of Environment 176, 84–97.
URL http://dx.doi.org/10.1016/j.rse.2016.01.014
Platt, J. C., 1999. Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods. In:
Advances in large margin classifiers. Citeseer.
Qi, Z., Yeh, A. G.-O., Li, X., Lin, Z., Mar 2012. A novel algorithm for land use and land cover classification using RADarsat-2
polarimetric SAR data. Remote Sensing of Environment 118, 21–39.
URL http://dx.doi.org/10.1016/j.rse.2011.11.001
Qi, Z., Yeh, A. G.-O., Li, X., Xian, S., Zhang, X., Jul 2015. Monthly short-term detection of land development using radarsat-2
polarimetric SAR imagery. Remote Sensing of Environment 164, 179–196.
URL http://dx.doi.org/10.1016/j.rse.2015.04.018
Reiche, J., Souzax, C. M., Hoekman, D. H., Verbesselt, J., Persaud, H., Herold, M., Oct 2013. Feature level fusion of multitemporal alos PALSAR and landsat data for mapping and monitoring of tropical deforestation and forest degradation. IEEE
J. Sel. Top. Appl. Earth Observations Remote Sensing 6 (5), 2159–2173.
URL http://dx.doi.org/10.1109/JSTARS.2013.2245101
Reiche, J., Verbesselt, J., Hoekman, D., Herold, M., 2015. Fusing landsat and sar time series to detect deforestation in the
tropics. Remote Sensing of Environment 156, 276–293.
Roscher, R., Förstner, W., Waske, B., 2012a. I2 vm: Incremental import vector machines. Image and Vision Computing 30 (4),
263–278.
Roscher, R., Waske, B., Förstner, W., 2012b. Incremental import vector machines for classifying hyperspectral data. Geoscience
and Remote Sensing, IEEE Transactions on 50 (9), 3463–3473.
Rufin, P., Müller, H., Pflugmacher, D., Hostert, P., Sep 2015. Land use intensity trajectories on amazonian pastures derived
from landsat time series. International Journal of Applied Earth Observation and Geoinformation 41, 1–10.
URL http://dx.doi.org/10.1016/j.jag.2015.04.010
Sarker, M. L. R., Nichol, J., Ahmad, B., Busu, I., Rahman, A. A., 2012. Potential of texture measurements of two-date dual
polarization palsar data for the improvement of forest biomass estimation. ISPRS Journal of Photogrammetry and Remote
Sensing 69, 146–166.
Sarker, M. L. R., Nichol, J., Iz, H. B., Ahmad, B., Rahman, A. A., 2013. Forest biomass estimation using texture measurements
29
of high-resolution dual-polarization c-band sar data.
Schlund, M., von Poncet, F., Hoekman, D. H., Kuntz, S., Schmullius, C., 2013. Importance of bistatic sar features from
tandem-x for forest mapping and monitoring. Remote Sensing of Environment.
Solberg, A. H. S., Taxt, T., Jain, A. K., 1996. A markov random field model for classification of multisource satellite imagery.
Geoscience and Remote Sensing, IEEE Transactions on 34 (1), 100–113.
Sonobe, R., Tani, H., Wang, X., Kobayashi, N., Shimamura, H., Feb 2014. Random forest classification of crop type using
multi-temporal terrasar-x dual-polarimetric data. Remote Sensing Letters 5 (2), 157–164.
URL http://dx.doi.org/10.1080/2150704X.2014.889863
Stefanski, J., Chaskovskyy, O., Waske, B., 2014a. Mapping and monitoring of land use changes in post-soviet western ukraine
using remote sensing data. Applied Geography 55, 155–164.
Stefanski, J., Chaskovskyy, O., Waske, B., Dec 2014b. Mapping and monitoring of land use changes in post-soviet western
Ukraine using remote sensing data. Applied Geography 55, 155–164.
URL http://dx.doi.org/10.1016/j.apgeog.2014.08.003
Szeliski, R., Zabih, R., Scharstein, D., Veksler, O., Kolmogorov, V., Agarwala, A., Tappen, M., Rother, C., 2006. A comparative
study of energy minimization methods for Markov random fields. Lecture Notes in Computer Science, 16–29.
URL http://dx.doi.org/10.1007/11744047_2
Tarabalka, Y., Fauvel, M., Chanussot, J., Benediktsson, J. A., 2010. Svm-and mrf-based method for accurate classification of
hyperspectral images. Geoscience and Remote Sensing Letters, IEEE 7 (4), 736–740.
Tran, T. N., Wehrens, R., Hoekman, D. H., Buydens, L. M., 2005. Initialization of markov random field clustering of large
remote sensing images. Geoscience and Remote Sensing, IEEE Transactions on 43 (8), 1912–1919.
Uhlmann, S., Kiranyaz, S., Apr 2014. Classification of dual- and single polarized SAR images by incorporating visual features.
ISPRS Journal of Photogrammetry and Remote Sensing 90, 10–22.
URL http://dx.doi.org/10.1016/j.isprsjprs.2014.01.005
Vitousek, P. M., Jul 1997. Human domination of earths ecosystems. Science 277 (5325), 494–499.
URL http://dx.doi.org/10.1126/science.277.5325.494
Voisin, A., Krylov, V. A., Moser, G., Serpico, S. B., Zerubia, J., 2013. classification of very high resolution sar images of urban
areas using copulas and texture in a hierarchical markov random field model. Geoscience and Remote Sensing Letters, IEEE
10 (1), 96–100.
Waske, B., Benediktsson, J. A., 2007. Fusion of support vector machines for classification of multisensor data. Geoscience and
Remote Sensing, IEEE Transactions on 45 (12), 3858–3866.
Waske, B., Braun, M., 2009. Classifier ensembles for land cover mapping using multitemporal sar imagery. ISPRS Journal of
Photogrammetry and Remote Sensing 64 (5), 450–457.
Waske, B., van der Linden, S., 2008. Classifying multilevel imagery from sar and optical sensors by decision fusion. Geoscience
and Remote Sensing, IEEE Transactions on 46 (5), 1457–1466.
Wehmann, A., Liu, D., 2015. A spatial–temporal contextual markovian kernel method for multi-temporal land cover mapping.
ISPRS Journal of Photogrammetry and Remote Sensing.
Wulder, M. A., Masek, J. G., Cohen, W. B., Loveland, T. R., Woodcock, C. E., 2012. Opening the archive: How free data has
enabled the science and monitoring promise of landsat. Remote Sensing of Environment 122, 2–10, landsat Legacy Special
Issue.
30
URL http://www.sciencedirect.com/science/article/pii/S003442571200034X
Xie, H., Pierce, L. E., Ulaby, F. T., 2002. Sar speckle reduction using wavelet denoising and markov random field modeling.
Geoscience and Remote Sensing, IEEE Transactions on 40 (10), 2196–2212.
Zhu, J., Hastie, T., 2005. Kernel logistic regression and the import vector machine. Journal of Computational and Graphical
Statistics 14 (1), 185–205.
Zhu, Z., Woodcock, C. E., 2014. Continuous change detection and classification of land cover using all available landsat data.
Remote sensing of Environment 144, 152–171.
References
31
| 1cs.CV
|
Separators in region intersection graphs
arXiv:1608.01612v3 [math.CO] 27 Jul 2017
James R. Lee∗
Abstract
For undirected graphs G (V, E) and G0 (V0 , E0 ), say that G is a region intersection
graph over G0 if there is a family of connected subsets {R u ⊆ V0 : u ∈ V } of G0 such that
{u, v} ∈ E ⇐⇒ R u ∩ R v , ∅.
We show if G0 excludes the complete graph K h as a minor for some h > 1, then every region
√
intersection graph G over G0 with m edges has a balanced separator with at most c h m nodes,
where c h is a constant depending only on h. If G additionally has uniformly bounded vertex
degrees, then such a separator is found by spectral partitioning.
A string graph is the intersection graph of continuous arcs in the plane. String graphs are
precisely region intersection graphs over planar graphs. Thus the preceding result implies that
√
every string graph with m edges has a balanced separator of size O( m). This bound is optimal,
as it generalizes the planar separator theorem. It confirms a conjecture of Fox and Pach (2010),
√
and improves over the O( m log m) bound of Matoušek (2013).
Contents
1
Introduction
1.1 Balanced separators and extremal spread
1.2 Eigenvalues and L2 -extremal spread . . .
1.3 Additional applications . . . . . . . . . . .
1.4 Preliminaries . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
2
3
7
7
7
2
Vertex separators and conformal graph metrics
8
2.1 Conformal graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2 Padded partitions and random separators . . . . . . . . . . . . . . . . . . . . . . . . . 10
3
Multi-flows, congestion, and crossings
12
3.1 Duality between conformal metrics and multi-flows . . . . . . . . . . . . . . . . . . . 13
3.2 Crossing congestion and excluded minors . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.3 Vertex congestion in rigs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4
Careful minors and random separators
4.1 Careful minors in rigs . . . . . . . . . . . . .
4.2 Chopping trees . . . . . . . . . . . . . . . . .
4.3 The random separator construction . . . . . .
4.4 A diameter bound for well-spaced subgraphs
5
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
15
15
16
19
20
Applications and discussion
24
5.1 Spectral bounds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
5.2 Weighted separators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
5.3 Bi-Lipschitz embedding problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
∗ University
of Washington. Partially supported by NSF CCF-1407779.
1
1
Introduction
Consider an undirected graph G0 (V0 , E0 ). A graph G (V, E) is said to be a region intersection
graph (rig) over G0 if the vertices of G correspond to connected subsets of G0 and there is an edge
between two vertices of G precisely when those subsets intersect. Concretely, there is a family of
connected subsets {R u ⊆ V0 : u ∈ V } such that {u, v} ∈ E ⇐⇒ R u ∩ R v , ∅. For succinctness, we
will often refer to G as a rig over G0 .
Let rig(G0 ) denote the family of all finite rigs over G0 . Prominent examples of such graphs
include the intersection graphs of pathwise-connected regions on a surface (which are intersection
graphs over graphs that can be drawn on that surface).
For instance, string graphs are the intersection graphs of continuous arcs in the plane. It is easy
to see that every finite string graph G is a rig over some planar graph: By a simple compactness
argument, we may assume that every two strings intersect a finite number of times. Now consider
the planar graph G0 whose vertices lie at the intersection points of strings and with edges between
two vertices that are adjacent on a string (see Figure 1). Then G ∈ rig(G0 ). It is not too difficult to
see that the converse is also true; see Lemma 1.4.
To illustrate the non-trivial nature of such objects, we recall that there are string graphs on n
strings that require 2Ω(n) intersections in any such representation [KM91]. The recognition problem
for string graphs is NP-hard [Kra91]. Decidability of the recognition problem was established in
[SŠ04], and membership in NP was proved in [SSŠ03]. We refer to the recent survey [Mat15] for
more of the background and history behind string graphs.
Even when G0 is planar, the rigs over G0 can be dense: Every complete graph is a rig over some
planar graph (in particular, every complete graph is a string graph). It has been conjectured
by Fox
√
and Pach [FP10] that every m-edge string graph has a balanced separator with O( m) nodes. Fox
√
and Pach proved that such graphs have separators of size O(m 3/4 log m) and presented a number
of applications
of their separator theorem. Matoušek [Mat14] obtained a near-optimal bound of
√
O( m log m). In the present work, we confirm the conjecture of Fox and Pach, and generalize the
result to include all rigs over graphs that exclude a fixed minor.
Theorem 1.1. If G ∈ rig(G0 ) and G0 excludes K h as a minor, then G has a 23 -balanced separator of size at
√
√
most c h m where m is the number of edges in G. Moreover, one has the estimate c h 6 O(h 3 log h).
In the preceding statement, an ε-balanced separator of G (V, E) is a subset S ⊆ V such that in
the induced graph G[V \ S], every connected component contains at most ε|V | vertices.
The proof of Theorem 1.1 is constructive, as it is based on solving and rounding a linear program;
it yields a polynomial-time algorithm for constructing the claimed separator. In the case when there
is a bound on the maximum degree of G, one can use the well-known spectral bisection algorithm
(see Section 1.2).
√Since planar graphs exclude K5 as a minor, Theorem 1.1 implies that m-edge string graphs have
O( m)-node balanced separators. Since
p the graphs that can be drawn on any compact surface of
genus 1 exclude a K h minor for h 6 O( 1 + 1), Theorem 1.1 also applies to string graphs over any
fixed compact surface.
In addition, it implies the Alon-Seymour-Thomas [AST90] separator theorem1 for graphs
excluding a fixed minor, for the following reason. Let us define the subdivision of a graph G to be the
graph GÛ obtained by subdividing every edge of G into a path of length two. Then every graph G is
Û and it is not hard to see that for h > 1, G has a K h minor if and only if GÛ has a K h minor.
a rig over G,
1Note that Theorem 1.1 is quantitatively weaker in the sense that [AST90] shows the existence of separators with
√
√
O(h 3/2 n) vertices. Since every K h -minor-free graph has at most O(nh log h) edges [Kos82, Tho84], our bound is
√
O(h 7/2 (log h)3/4 n).
2
Figure 1: A string graph as a rig over a planar graph.
Applications in topological graph theory. We mention two applications of Theorem 1.1 in graph
theory. In [FP14], the authors present some applications of separator theorems for string graphs. In
two cases, the tight bound for separators leads to tight bounds for other problems. The next two
theorems confirm conjectures of Fox and Pach; as proved in [FP14], they follow from Theorem 1.1.
Both results are tight up to a constant factor.
Theorem 1.2. There is a constant c > 0 such that for every t > 1, it holds that every K t,t -free string graph
on n vertices has at most cnt(log t) edges.
A topological graph is a graph drawn in the plane so that its vertices are represented by points
and its edges by curves connecting the corresponding pairs of points.
Theorem 1.3. In every topological graph with n vertices and m > 4n edges, there are two disjoint sets, each
of cardinality
m2
Ω 2
(1.1)
n log mn
so that every edge in one set crosses all edges in the other.
This improves over the bound of Ω
m2
n c
n 2 (log m
)
for some c > 0 proved in [FPT10], where the
authors also show that the bound (1.1) is tight. Before we conclude this section, let us justify the
observation made earlier.
Lemma 1.4. Finite string graphs are precisely finite region intersection graphs over planar graphs.
Proof. We have already argued that string graphs are planar rigs. Consider now a planar graph
G0 (V0 , E0 ) and a finite graph G (V, E) such that G ∈ rig(G0 ). Let {R u ⊆ V0 : u ∈ V } be a
representation of G as a rig over G0 .
Since G is finite, we may assume that each region R u is finite. To see this, for v ∈ V0 , let its type
be the set T(v) {u ∈ V : v ∈ R u }. Then since G is finite, there are only finitely many types. For
any region R u ⊆ V0 , let R̃ u be a finite set of vertices that exhausts every type in R u , and let R̂ u be a
finite spanning tree of R̃ u in the induced graph G0 [R u ]. Then the regions { R̂ u : u ∈ V } are finite
and connected, and also form a representation of G as a rig over G0 .
When each region R u is finite, we may assume also that G0 is finite. Now take a planar drawing
of G0 in 2 where the edges of G0 are drawn as continuous arcs, and for every u ∈ V, let Tu ⊆ 2
be the drawing of the spanning tree of R u . Each Tu can be represented by a string (simply trace the
tree using an in-order traversal that begins and ends at some fixed node), and thus G is a string
graph.
1.1
Balanced separators and extremal spread
Since complete graphs are string graphs, we do not have access to topological methods based on
the exclusion of minors. Instead, we highlight a more delicate structural theory. The following fact
is an exercise.
3
Fact. If GÛ is a string graph, then G is planar.
More generally, we recall that H is a minor of G if H can be obtained from G by a sequence
of edge contractions, edge deletions, and vertex deletions. If H can be obtained using only edge
contractions and vertex deletions, we say that H is a strict minor of G. The following lemma appears
in Section 4.
Lemma 1.5. If G ∈ rig(G0 ) and HÛ is a strict minor of G, then H is a minor of G0 .
This topological structure of (forbidden) strict minors in G interacts nicely with “conformal
geometry” on G, as we now explain. Consider the family of all pseudo-metric spaces that arise from
a finite graph G by assigning non-negative lengths to its edges and taking the induced shortest path
distance. Certainly if we add an edge to G, the family of such spaces can only grow (since by giving
the edge length equal to the diameter of the space, we effectively remove it from consideration). In
particular, if G K n is the complete graph on n vertices, then every n-point metric space is a path
metric on G.
The same phenomenon does not arise when one instead considers vertex-weighted path metrics
on G. A conformal graph is a pair (G, ω) such that G (V, E) is a graph, and ω : V → + . This
ω(u)+ω(v)
defines a pseudo-metric as follows: Assign to every {u, v} ∈ E a length equal to
and let
2
distω be the induced shortest path distance. We will refer to ω as a conformal metric on G (and
sometimes we abuse terminology and refer to distω as a conformal metric as well).
A significant tool will be the study of extremal conformal metrics on a graph G. Unlike
in the edge-weighted case, the family of path distances coming from conformal metrics can be
well-behaved even if G contains arbitrarily large complete graph minors. As a simple example,
let K denote the complete graph on countably many vertices. Every countable metric space is a
shortest-path metric on some edge-weighting of K , and yet every distance arising from a conformal
metric ω : VK → + is bi-Lipschitz to the ultrametric (u, v) 7→ max{ω(u), ω(v)}.
Vertex expansion and observable spread. Fix a graph G (VG , EG ) ∈ rig(G0 ) with n |VG | and
m |EG |. Since the family rig(G0 ) is closed under taking induced subgraphs, a standard
reduction
√
allows us to focus on finding a subset U ⊆ VG with small isoperimetric ratio:
|∂U |
|U |
.
m
n ,
where
∂U : {v ∈ U : EG (v, VG \ U) , ∅} ,
and EG (v, VG \ U) is the set of edges between v and vertices outside U. Also define the interior
U ◦ U \ ∂U.
Let us define the vertex expansion constant of G as
|∂U |
|VG |
φ G : min
: ∅ , U ⊆ VG , |U ◦ | 6
|U |
2
.
(1.2)
In [FHL08], it is shown that this quantity is related to the concentration of Lipschitz functions
on extremal conformal metrics on G. (The study of such properties has a rich history; consider, for
instance, the concentration function in the sense of Lévy and Milman (e.g., [MS86]) and Gromov’s
observable diameter [Gro07].)
For a finite metric space (X, dist), we define the spread of X as the quantity
s (X, dist) :
1 Õ
dist(x, y) .
|X| 2 x,y∈X
Define the observable spread of X by
1 Õ
sobs (X, dist) : sup
|
f
(x)
−
f
(y)|
:
f
is
1-Lipschitz
.
2
|X| x, y∈X
f :X→
4
(1.3)
Remark 1.6. We remark on the terminology: In general, it is difficult to “view” a large metric space
all at once; this holds both conceptually and from an algorithmic standpoint. If one thinks of
Lipschitz maps f : X → as “observations” then the observable spread captures how much of the
spread can be “seen.”
We then define the L1 -extremal observable spread of G as
s̄obs (G) :
sup
ω:VG →+
sobs (VG , distω ) : kωkL1 (VG ) 6 1 ,
(1.4)
where kωkL1 (VG ) : |V1G | v∈VG ω(v).
Such extremal quantities arise naturally in the study of linear programming relaxations of
discrete optimization problems (like finding the smallest balanced vertex separator in a graph).
Related extremal notions are often employed in conformal geometry and its discretizations; see, in
particular, the notions of extremal length employed by Duffin [Duf62] and Cannon [Can94].
In Section 2.1, we recall the proof of the following theorem from [FHL08] that relates expansion
to the observable spread.
Í
Theorem 1.7 ([FHL08]). For every finite graph G,
1
2 s̄obs (G)
1
6 3s̄obs (G) .
φG
6
Example 1.8. If G is the subgraph of the lattice d on the vertex set {0, 1, . . . , L} d , then φ G 1/L
and s̄ (G) L. This can be achieved by taking ω ≡ 1 and defining f : VG → by f (x) x 1 .
In light of Theorem 1.7, to prove Theorem 1.1, it suffices to give a lower bound on s̄obs (G). It is
natural to compare this quantity to the L 1 -extremal spread of G:
(
Õ
1
s̄ (G) : max
distω (u, v) : kωkL1 (VG ) 6 1
|VG | 2 u,v∈V
)
.
(1.5)
G
Let us examine these two notions for planar graphs using the theory of circle packings.
Example 1.9 (Circle packings). Suppose that G is a finite planar graph. The Koebe-AndreevThurston circle packing theorem asserts that G is the tangency graph of a family {Dv : v ∈ VG } of
circles on the unit sphere 2 ⊆ 3 . Let {c v : v ∈ VG } ⊆ 2 and {r v > 0 : v ∈ VG } be the centers
and radii of the circles, respectively. An argument of Spielman and Teng [ST07] (see also Hersch
Í
[Her70] for the analogous result for conformal mappings) shows that one can take v∈VG c v 0.
If we define ω(v) r v for v ∈ VG , then distω > dist2 > dist3 on the centers {c v : v ∈ VG }. (The
latter two distances are the geodesic distance on 2 and the Euclidean distance on 3 , respectively).
Í
Using the fact that v∈VG c v 0, we have
Õ
kc u − c v k22 2n
u,v∈VG
Õ
kc v k 2 2n 2 .
(1.6)
u∈VG
This yields
Õ
distω (u, v) >
u,v∈VG
Õ
kc u − c v k >
u,v∈VG
Moreover,
s
kωkL1 (VG ) 6 kωkL2 (VG )
1 Õ 2
rv 6
n
v∈VG
5
r
n2
.
2
vol(2 )
πn
r
4
.
n
√
n
It follows that s̄ (G) > 4 .
Observe that the three coordinate projections 3 → are all Lipschitz with respect to dist√ω ,
n
and one of them contributes at least a 1/3 fraction to the sum (1.6). We conclude that s̄obs (G) > 12 .
Combined with Theorem 1.7, this yields a proof of the Lipton-Tarjan separator theorem [LT79].
Similar proofs of the separator theorem based on circle packings are known (see [MTTV97]), and
this one is not new (certainly it was known to the authors of [ST07]).
√
We will prove Theorem 1.1 in two steps: By first giving a lower bound s̄ (G) & n/ m and then
establishing s̄obs (G) & s̄ (G).
For the first step, we follow [Mat14, FHL08, BLR10]. The optimization (1.5) is a linear program,
and the dual optimization is a maximum multi-flow problem in G. (See Section 3 for a detailed
discussion and statement of the duality theory.) Matoušek shows that if Ĝ is a string graph, then
a multi-flow with small vertex congestion in Ĝ can be used to construct a multi-flow in a related
planar graph G that has low vertex congestion in the ` 2 sense. This element of the proof is crucial and
ingenious; the reduction from a string graph Ĝ to a planar graph G does not preserve congestion in
the more standard `∞ sense.
Our work in [BLR10] shows that such a multi-flow with small `2 congestion cannot exist, and
thus one concludes that there is no low-congestion flow in Ĝ, providing a lower bound on s̄ (G) via
LP duality. In Section 3, we extend this argument to rigs over K h -minor-free graphs using the flow
crossing framework of [BLR10].
Spread vs. observable spread. Our major departure from [Mat14] comes in the second step:
Rounding a fractional separator to an integral separator by establishing that s̄obs (G) > C h · s̄ (G)
when G is a rig over a K h -minor-free graph. Matoušek used the following result that holds for any
finite metric space. It follows easily from the arguments of [Bou85] or [LR99] (see also [Mat02, Ch.
15]).
Theorem 1.10. For any finite metric space (X, d) with |X| > 2, it holds that
sobs (X, d) >
s (X, d)
.
O(log |X|)
In particular, for any graph G on n > 2 vertices,
s̄obs (G) >
s̄ (G)
O(log n)
.
Instead of using the preceding result, we employ the graph partitioning method of Klein, Plotkin,
and Rao [KPR93]. Those authors present an iterative process for repeatedly partitioning a metric
graph G until the diameter of the remaining components is bounded. If the partitioning process
fails, they construct a K h minor in G.
Since rigs over K h -minor-free graphs do not necessarily exclude any minors, we need to construct
a different sort of forbidden structure. This is the role that Lemma 1.5 plays in Section 4. In order
for the argument to work, it is essential that we construct induced partitions: We remove a subset of
the vertices which induces a partitioning of the remainder into connected components.
After constructing a suitable random partition of G, standard methods from metric embedding
theory allow us to conclude in Theorem 2.4 that if G is a rig over some K h -minor-free graph, then
s̄obs (G) >
6
s̄ (G)
.
O(h 2 )
1.2
Eigenvalues and L 2 -extremal spread
In Section 5.1, we show how the methods presented here can be used to control eigenvalues of the
discrete Laplacian on rigs. Consider the linear space VG { f : VG → }. Let L G : VG → VG be
the symmetric, positive semi-definite linear operator given by
L G f (v)
Õ
( f (v) − f (u)) .
u:{u,v}∈EG
Let 0 λ0 (G) 6 λ1 (G) 6 · · · 6 λ |VG |−1 (G) denote the spectrum of L G .
Define the L p -extremal spread of G as
(
s̄ p (G)
max
ω:VG →+
Õ
1
distω (u, v) : kωkL p (VG ) 6 1
|VG | 2 u,v∈V
)
.
(1.7)
G
In [BLR10], the L 2 -extremal spread is used to give upper bounds on the first non-trivial
eigenvalue of graphs that exclude a fixed minor. In [KLPT11], a stronger property of conformal
metrics is used to bound the higher eigenvalues as well. Roughly speaking, to control the kth
eigenvalue, one requires a conformal metric ω : VG → + such that the spread on every subset of
size > |VG |/k is large. Combining their main theorems with the methods of Section 2 and Section 3,
we prove the following theorem in Section 5.1.
Theorem 1.11. Suppose that G ∈ rig(G0 ) and G0 excludes K h as a minor for some h > 3. If dmax is the
maximum degree of G, then for any k 1, 2, . . . , |VG | − 1, it holds that
2
λ k (G) 6 O(dmax
h 6 log h)
k
.
|VG |
In particular, the bound on λ1√
(G) shows that if dmax (G) 6 O(1), then recursive spectral
partitioning (see [ST07]) finds an O( n)-vertex balanced separator in G.
1.3
Additional applications
Treewidth approximations. Bounding s̄obs (G) for rigs over K h -minor-free graphs leads to some
additional applications. Combined with the rounding algorithm implicit in Theorem 1.7 (and
explicit in [FHL08]), this yields an O(h 2 )-approximation algorithms for the vertex uniform Sparsest
Cut problem. In particular, it follows that if G ∈ rig(G0 ) and G0 excludes K h as a minor, then there is
a polynomial-time algorithm that constructs a tree decomposition of G with treewidth O(h 2 tw(G)),
where tw(G) is the treewidth of G. This result appears new even for string graphs. We refer to
[FHL08].
Lipschitz extension. The padded decomposability result of Section 2.2 combines with the Lipschitz
extension theory of [LN05] to show the following. Suppose that (G, ω) is a conformal graph, where
G is a rig over some K h -minor free graph. Then for every Banach space Z, subset S ⊆ VG , and
L-Lipschitz mapping f : S → Z, there is an O(h 2 L)-Lipschitz extension f˜ : VG → Z with f˜|S f .
See [MM16] for applications to flow and cut sparsifiers in such graphs.
1.4
Preliminaries
We use the notation + [0, ∞) and + ∩ + .
All graphs appearing in the paper are finite and undirected unless stated otherwise. If G is
a graph, we use VG and EG for its edge and vertex sets, respectively. If S ⊆ VG , then G[S] is the
7
induced subgraph on S. For A, B ⊆ VG , we use the notation EG (A, B) for the set of all edges with
one endpoint in A and the other in B. Let NG (A) A ∪ ∂A denote the neighborhood of A in G. We
write GÛ for the graph that arises from G by subdividing every edge of G into a path of length two.
If (X, dist) is a pseudo-metric space and S, T ⊆ X, we write dist(x, S) inf y∈S dist(x, y) and
dist(S, T) infx∈S, y∈T dist(x, y).
Finally, we employ the notation A . B to denote A 6 O(B), which means there exists a universal
(unspecified) constant C > 0 for which A 6 C · B.
2
Vertex separators and conformal graph metrics
The following result is standard. Recall the definition of the vertex expansion (1.2).
Lemma 2.1. Suppose that every induced subgraph H of G satisfies φ H 6
separator of size at most α.
α
|VH | .
Then G has a 23 -balanced
Thus in the remainder of this section, we focus on bounding φ G . We remark on one other basic
fact: Consider a graph G, a partition VG A ∪ B and a subset S ⊆ V. If EG (A \ S, B \ S) ∅, then
|S| > φ G
Indeed, suppose that |A| 6 |B|. Then, φ G 6
2.1
|A| · |B|
.
|VG |
|S|
|A∪S|
6
|S| |VG |
|A| |B|
(2.1)
.
Conformal graphs
A conformal graph is a pair (G, ω) where G is a connected graph and ω : VG → + . Associated
ω(u)+ω(v)
to (G, ω), we define a distance function distω as follows. Assign a length
to every
2
{u, v} ∈ EG ; then distω is the induced shortest-path metric. For U ⊆ VG , we define diamω (U)
supu,v∈U distω (u, v).
The extremal L 1 -spread is a linear programming relaxation of the optimization (1.2) defining
φ G (up to universal constant factors). In Section 3.3, we establish the following result.
Theorem 2.2. If Ĝ is a connected graph and Ĝ ∈ rig(G) for some graph G that excludes a K h minor, then
s̄1 (Ĝ) & p
n
h m log h
,
(2.2)
where n |VĜ | and m |EĜ |.
Recall that Theorem 2.2 completes the first step of our program for exhibiting small separators.
For the second step, we need to relate s̄1 (G) to s̄obs (G). Before that, we restate the proof of Theorem 1.7
from [FHL08] in our language. (The proof presented below is also somewhat simpler, as it does not
employ Menger’s theorem as in [FHL08].)
Theorem 2.3 (Restatement of Theorem 1.7). For any connected graph G, it holds that
1
2 s̄obs (G)
6
1
6 3 s̄obs (G) .
φG
(2.3)
Proof. The right-hand inequality is straightforward: Suppose that U ⊆ VG witnesses φ G |∂U |/|U |.
Let Ū VG \ U and U ◦ U \ ∂U. Let n |VG | and s |∂U |. Partition ∂U S1 ∪ S2 so that
|S1 | ds/2e and S2 bs/2c.
8
Now let ω 1∂U and define two maps
−1
2
−1
2
v ∈ U◦
v ∈ ∂U
v ∈ Ū
f1 (v) 0
1
2
v ∈ S1
v < ∂U
v ∈ S2 .
f2 (v) 0
1
2
Since ∂U separates U ◦ from Ū, the maps f1 , f2 : (VG , distω ) → are 1-Lipschitz, and
Õ
| f1 (u) − f1 (v)| 2|U ◦ | · | Ū | + |∂U |(|U ◦ | + | Ū |)
u,v∈VG
Õ
| f2 (u) − f2 (v)| 2|S1 | · |S2 | + |∂U | |U ◦ | + | Ū | .
u,v∈VG
If |∂U | > |U ◦ |, then the map f2 satisfies
satisfies
1
|VG | 2
Í
x, y∈VG
1
|VG | 2
1
2φ G .
| f1 (x) − f1 (y)| >
Í
x, y∈VG
| f2 (x) − f2 (y)| >
1
3φ G .
Otherwise, the map f1
In either case, we have shown that s̄obs (G) >
1
3φ G .
Left-hand inequality. Now we establish the more interesting bound. Suppose that (G, ω) is a
conformal metric with kωkL1 (VG ) 6 1 and f : (VG , distω ) → is a 1-Lipschitz mapping with
Õ
1
| f (x) − f (y)| s̄obs (G) .
|VG | 2 x, y∈V
G
For θ ∈ , define the three sets
A θ v ∈ VG : f (v) 6 θ
1
S θ v ∈ VG : | f (v) − θ| 6 ω(v)
2
B θ v ∈ VG : f (v) > θ .
Observe that if u ∈ A θ \ S θ and v ∈ B θ \ S θ , then f (u) 6 θ − 21 ω(u) and f (v) > θ + 12 ω(v),
ω(u)+ω(v)
therefore | f (u) − f (v)| >
. But if {u, v} ∈ EG , then since f is 1-Lipschitz, it should hold
2
ω(u)+ω(v)
that | f (u) − f (v)| 6 distω (u, v)
. We conclude that EG (A θ \ S θ , B θ \ S θ ) ∅. Therefore
2
(2.1) yields
φG
|S θ | dθ >
|V
G|
∫
∫
|A θ | · |B θ | dθ
φG Õ
φ G |VG |
| f (x) − f (y)|
s̄obs (G) .
2|VG |
2
x,y∈VG
On the other hand,
∫
|S θ | dθ 6
Õ∫
v∈VG
1B( f (v),ω(v)/2) (θ) dθ
Õ
ω(v) |VG | · kωkL1 (VG ) ,
v∈VG
where we have used the notation B(x, r) { y ∈ : |x − y| 6 r}.
In the next section, we prove the following theorem (though the main technical arguments
appear in Section 4).
Theorem 2.4. If Ĝ ∈ rig(G) and G excludes a K h minor, then
s̄1 (Ĝ) 6 O(h 2 ) s̄obs (Ĝ) .
9
(2.4)
Combining Lemma 2.1 with Theorem 2.2, Theorem 2.3, and Theorem 2.4 yields a proof of
Theorem 1.1. Indeed, suppose that Ĝ ∈ rig(G) and G excludes a K h minor. Let n |VĜ | and
m |EĜ |. Then,
√
(2.3)
(2.4) h 2 (2.2) h 3 m log h
2
φ Ĝ 6
.
.
,
n
s̄obs (Ĝ)
s̄1 (Ĝ)
completing the proof in light of Lemma 2.1.
2.2
Padded partitions and random separators
Let (X, d) be a finite metric space. For x ∈ X and R > 0, define the closed ball
B d (x, R) { y ∈ X : d(x, y) 6 R} .
If P is a partition of X and x ∈ X, we write P(x) for the set of P containing x.
Say that a partition P is ∆-bounded if S ∈ P ⇒ diam(S) 6 ∆.
Definition 2.5. A random partition P of X is (α, ∆)-padded if it is almost surely ∆-bounded and for
every x ∈ X,
B d x, ∆α ⊆ P(x) > 12 .
The following result is essentially contained in [Rab08] (see also [BLR10, Thm 4.4]). We recall
the argument here since the exact statement we need has not appeared.
Lemma 2.6. Let (X, d) be a finite metric space. If (X, d) admits an (α, s (X, d)/4)-padded partition, then
s (X, d) 6 16α · sobs (X, d) .
The proof breaks into two cases whose conjunction yields Lemma 2.6.
Lemma 2.7. If there is an x 0 ∈ X such that |B d (x 0 , s (X, d)/4)| > 21 |X|, then sobs (X, d) > 14 s (X, d).
Proof. Let B B d (x 0 , s (X, d)/4). Define f : X → by f (x) d(x, B). This map is 1-Lipschitz, and
moreover
Õ
| f (x) − f (y)| >
x,y∈X
Õ
x∈B
y <B
|X| Õ
|X| Õ
s (X, d)
d(y, B) >
d(y, B) >
d(y, x 0 ) −
.
2
2
4
y∈X
y∈X
On the other hand,
Õ
x, y∈X
d(x, y) 6
Õ
d(x, x0 ) + d(y, x 0 ) 2|X|
x, y∈X
Õ
d(y, x 0 ) .
y∈X
Combining the two preceding inequalities yields
sobs (X, d) >
Õ
s (X, d)
s (X, d)
1 Õ
1
+
.
|
f
(x)
−
f
(y)|
>
−
d(x, y)
2
2
8
4
|X| x,y∈X
4|X| x, y∈X
Lemma 2.8. If |B d (x, s (X, d)/4)| < 12 |X| for all x ∈ X, then sobs (X, d) >
10
1
16α s (X, d).
Proof. Let P be an (α, s (X, d)/4)-padded partition. Let σ : P → {0, 1} be a map chosen uniformly
at random conditioned on P. Define S {x ∈ X : σ(P(x)) 1} and F : X → by F(x) d(x, S).
Note that F is almost surely 1-Lipschitz. Moreover, observe that
B d (x, s (X, d)/4α) ⊆ P(x) ∧ σ(x) 0 ⇒ d(x, S) >
s (X, d)
4α
.
(2.5)
Therefore if x, y ∈ X satisfy d(x, y) > s (X, d)/4, then (2.5) and independence yields
By assumption,
|F(x) − F(y)| > [σ(P(x)) , σ(P(y))] ·
(x, y) : d(x, y) > s (X, d)/4
sobs (X, d) >
1 s (X, d)
.
2 4α
> 12 |X| 2 , hence
1 Õ
|X| 2 x,y∈X
|F(x) − F(y)| >
s (X, d)
16α
.
In order to produce a padded partition, we will construct an auxiliary random object. Let (G, ω)
be a conformal graph. Define the skinny ball: For c ∈ VG and R > 0,
1
Bω (c, R) v ∈ VG : distω (c, v) < R − ω(v) ,
2
Say that a random subset S ⊆ V is an (α, ∆)-random separator if the following two conditions
hold:
1. For all v ∈ VG and R > 0,
[Bω (v, R) ∩ S ∅] > 1 − α
R
.
∆
2. Almost surely every connected component of G[V \ S] has diameter at most ∆ (in the metric
distω ).
Lemma 2.9. If (G, ω) admits an (α, ∆)-random separator, then (VG , distω ) admits an (8α, ∆)-padded
partition.
Proof. The random partition P is defined by taking all the connected components of G[V \ S], along
with the single sets {{x} : x ∈ S}. The fact that P is almost surely ∆-bounded is immediate.
∆
Set R 2α
and observe that for every v ∈ VG , Bω (v, R) ∩ S ∅ ⇒ Bω (v, R) ⊆ P(x), since
Bω (v, R) is a connected set in G.
Moreover, Bdistω (v, R/4) ⊆ Bω (v, R). To see this, observe that
max
x∈Bdistω (v,R/4)\{v}
and thus
ω(x) 6
R
2
,
x ∈ Bdistω (v, R/4) ⇒ distω (v, x) < R − 12 ω(x) ⇒ x ∈ Bω (v, R) .
It follows that for every v ∈ VG , we have
∆
Bdistω (v G , 8α
) ⊆ P(x) >
1
2
,
completing the proof that P is (8α, ∆)-padded.
This following result is proved in Section 4 (see Corollary 4.3).
11
Theorem 2.10. If Ĝ ∈ rig(G) and G excludes K h as a minor, then for every ∆ > 0, every conformal metric
(G, ω) admits an (α, ∆)-random separator with α 6 O(h 2 ).
We can now prove Theorem 2.4.
Proof of Theorem 2.4. Suppose that Ĝ ∈ rig(G) and G excludes a K h minor. Let (Ĝ, ω) be a conformal
metric such that s (VĜ , distω ) s̄1 (Ĝ). Combining Theorem 2.10 and Lemma 2.9 shows that
(VĜ , distĜ ) admits an (α, s̄1 (Ĝ)/4)-random separator for some α 6 O(h 2 ). Now Lemma 2.6 shows
that s̄obs (Ĝ) > sobs (VĜ , distω ) & h12 s (VĜ , distω ) h12 s̄1 (Ĝ), completing the proof.
Remark 2.11. One advantage to introducing the auxiliary random separator S is that it can be used
to directly relate φ G and s̄ (G) without going through padded partitions. Indeed, this can be done
using the weaker property that for every v ∈ VG ,
[v ∈ S] 6 α
ω(v)
.
∆
(The stronger padding property has a number of additional applications; see Section 5 and
Section 1.3.)
We present the argument. Suppose that (G, ω) is a conformal graph with kωkL1 (VG ) 6 1 and let
s : s (VG , distω ). If there is some vertex v0 ∈ VG for which |Bdistω (v0 , s /4)| > 12 |VG |, then one can
apply Lemma 2.7 and Theorem 2.3 to obtain
φG 6
2
s̄obs (G)
6
2
sobs (VG , distω )
6
8
s
.
Suppose that no such v 0 exists. In that case, every subset U ⊆ VG with diamω (U) 6 s /4 has
|U | < |VG |/2. Let S be an (α, s /4)-random separator. Then every connected component of G[V \ S]
has at most |VG |/2 vertices. (In particular, S is a 23 -balanced separator with probability 1.) Therefore
by linearity of expectation,
8kωkL1 (VG )
8α v∈VG ω(v)
[|S|]
8α
φG 6
6
α
6
.
|VG |/2
|VG |s
s
s
Í
3
Multi-flows, congestion, and crossings
Let G be an undirected graph, and let PG denote the the set of all paths in G. Note that we allow
length-0 paths consisting of a single vertex. For vertices u, v ∈ VG , we use PGuv ⊆ PG for the
subcollection of u-v paths. A multi-flow in G is a map Λ : PG → + . We will use the terms “flow”
and “multi-flow” interchangeably.
Define the congestion map cΛ : VG → + by
Õ
cΛ (v)
Λ(γ) .
γ∈PG :v∈γ
For u, v ∈ VG , we denote the total flow sent between u and v by
Λ[u, v]
Õ
Λ(γ) .
γ∈PGuv
For an undirected graph H, an H-flow in G is a pair (Λ, ϕ) that satisfies the following conditions:
1. Λ is a flow in G
12
2. ϕ : VH → VG
3. For every u, v ∈ VG ,
Λ[u, v] # {x, y} ∈ EH : {ϕ(x), ϕ(y)} {u, v} .
If the map ϕ is injective, we say that (Λ, ϕ) is proper. Say that (Λ, ϕ) is integral if {Λ(γ) : γ ∈ PG } ⊆ + .
3.1
Duality between conformal metrics and multi-flows
For p ∈ [1, ∞], define the ` p -vertex congestion of G by
vp (G) min kcΛ k` p (VG )
Λ
VG
: Λ[u, v] 1 ∀{u, v} ∈
2
,
where the minimum is over all flows in G.
The next theorem follows from the strong duality of convex optimization; see [BLR10, Thm. 2.2]
which employs Slater’s condition for strong duality (see, e.g., [BV04, Ch. 5]).
Theorem 3.1 (Duality theorem). For every G, it holds that if (p, q) is a pair of dual exponents, then
1
vp (G) |VG | 2− q · s̄ q (G) .
We will only require the case p ∞, q 1, except in Section 5.1 where the p q 2 case is
central.
3.2
Crossing congestion and excluded minors
Now we define the crossing congestion of a flow: If (Λ, ϕ) is an H-flow in G, denote
χG (Λ, ϕ)
Õ
Õ
{u,v},{u 0 ,v 0 }∈EH
|{u,v,u 0 ,v 0 }|4
Õ
ϕ(u)ϕ(v)
γ∈PG
Λ(γ)Λ(γ0)1{γ∩γ0,∅} .
ϕ(u0 )ϕ(v 0 )
γ0 ∈PG
It provides a lower bound on the ` 2 congestion of Λ, as clearly
Õ
v∈VG
Define
cΛ (v)2
Õ
Õ
Õ
Λ(γ)Λ(γ0) >
Λ(γ)Λ(γ0)1{γ∩γ0,∅} > χG (Λ, ϕ) .
γ,γ0 ∈PG
v∈VG γ,γ0 ∈PG :
v∈γ∩γ0
∗
χG
(H) inf χG (Λ, ϕ) ,
(Λ,ϕ)
where the infimum is over all H-flows in G. Define also
†
χG
(H) min χG (Λ, ϕ) ,
(Λ,ϕ)
where the infimum is over all integral H-flows in G. The next lemma offers a nice property of
crossing congestion: The infimum is always achieved by integral flows.
Lemma 3.2. For every graph H, it holds that
∗
†
χG
(H) χG
(H) .
13
Proof. Given any H-flow (Λ, ϕ), define a random integral flow Λ† as follows: For every edge
ϕ(u)ϕ(v)
Λ(γ)
{u, v} ∈ EH , independently choose a path γ ∈ PG
with probability Λ[ϕ(u),ϕ(v)] and let Λ† (γ)
be equal to the number of edges of EH that choose the path γ. (For all paths γ not selected in such a
manner, Λ† (γ) 0.) Independence and linearity of expectation yield [χG (Λ† , ϕ)] χG (Λ, ϕ).
The next result relates the topology of a graph to crossing congestion; it appears as [BLR10, Lem
3.2].
Lemma 3.3. If H is a bipartite graph with minimum degree 2 and (Λ, ϕ) is an H-flow in G with χG (Λ, ϕ) 0,
then G has an H-minor.
The preceding lemma allows one to use standard crossing number machinery to arrive at the
following result (see [BLR10, Thm 3.9–3.10]).
Theorem 3.4. For every h > 2, the following holds: If G excludes K h as a minor, then for any N > 4h,
N4
.
h3
√
Moreover, there is a constant K > 0 such that if N > Kh log h, then
∗
χG
(K N ) &
∗
(K N ) &
χG
3.3
N4
.
h 2 log h
Vertex congestion in rigs
We now generalize Matoušek’s argument to prove the following theorem.
Theorem 3.5. For any graph G and Ĝ ∈ rig(G),
∗
χG
(K |VĜ | ) 6 (4|EĜ | + |VĜ |) v∞ (Ĝ)2 .
Before moving to the proof, we state the main result of this section. It follows immediately from
the conjunction of Theorem 3.5 and Theorem 3.4. (One does not require a lower bound on n as in
Theorem 3.4 because the bound v∞ (Ĝ) > |VĜ | always holds.)
Corollary 3.6. Suppose Ĝ is a connected graph and Ĝ ∈ rig(G) for some graph G that excludes K h as a
minor. If n |VĜ | and m |EĜ |, then
r
v∞ (Ĝ) &
∗
(K n )
χG
m
In particular, Theorem 3.1 yields
s̄1 (Ĝ) & p
& p
n2
h m log h
n
h m log h
.
.
Proof of Theorem 3.5. Let {R u : u ∈ VĜ } be a set of regions realizing Ĝ over G. For every path γ in Ĝ,
we specify a path γ̌ in G. For each v ∈ VĜ , fix some distinguished vertex v̌ ∈ R v .
Suppose that γ (v1 , v 2 , . . . , v k ). Let γ̌ be any path γ̌ γ̌1 ◦ γ̌2 ◦ · · · ◦ γ̌k which starts at vˇ1 , ends
at vˇk , and where for each i 1, . . . , k, the entire subpath γ̌i is contained in R v i . This is possible
because each R v i is connected and {v i , v i+1 } ∈ EĜ implies that R v i and R v i+1 share at least one vertex
of G. We describe the path γ̌ as “visiting” the regions R v1 , R v2 , · · · , R v k in order.
Let n |VĜ | and m |EĜ |. Let (Λ, ϕ) be a proper K n -flow in Ĝ achieving kcΛ k∞ v∞ (Ĝ). The
path mapping γ 7→ γ̌ sends (Λ, ϕ) to a (possibly improper) K n -flow (Λ̌, ϕ̌) in G. Establishing the
following claim will complete the proof of Theorem 3.5.
14
Claim 3.7. It holds that
χG (Λ̌, ϕ̌) 6
Õ
cΛ (u)2 +
u∈VĜ
Õ
2
(cΛ (u) + cΛ (v))2 6 (4m + n)kcΛ k∞
.
(3.1)
{u,v}∈EĜ
We prove the claim as follows: If γˇ1 and γˇ2 intersect in G, we charge weight Λ(γ1 )Λ(γ2 ) to
some element in VĜ ∪ EĜ . If γˇ1 visits the regions R u1 , R u2 , · · · , R u k1 and γˇ2 visits the regions
R v1 , R v2 , · · · , R v k2 and γˇ1 ∩ γˇ2 , ∅, then they meet at some vertex x ∈ R u i ∩ R v j . If u i v j , we
charge this crossing to u i ∈ VĜ . Otherwise we charge this crossing to the edge {u i , v j } ∈ EĜ .
If u ∈ VĜ is charged by (γ1 , γ2 ), then u ∈ γ1 ∩ γ2 . Thus the total weight charged to u is at most
Õ
Λ(γ)Λ(γ0) 6 cΛ (u)2 .
γ , γ0 ∈PĜ :u∈γ
Similarly, if {u, v} ∈ EĜ is charged by (γ1 , γ2 ), then {u, v} ⊆ γ1 ∪ γ2 , thus the total weight charged
to {u, v} at most (cΛ (u) + cΛ (v))2 . Since all of the weight contributing to χG (Λ̌, ϕ̌) has been charged,
this yields the desired claim.
4
Careful minors and random separators
For graphs H and G, one says that H is a minor of G if there are pairwise-disjoint connected
subsets {A u ⊆ VG : u ∈ VH } such that {u, v} ∈ EH ⇒ EG (A u , A v ) , ∅. We will sometimes
refer to the sets {A u } as supernodes. Say that H is a strict minor of G if the stronger condition
{u, v} ∈ EH ⇐⇒ EG (A u , A v ) , ∅ holds. Finally, we say that H is a careful minor of G if HÛ is a strict
minor of G.
The next result explains the significance of careful minors for region intersection graphs. We
prove it in the next section.
Lemma 4.1. If Ĝ ∈ rig(G) and Ĝ has a careful H-minor, then G has an H-minor.
We now state the main result of this section; its proof occupies Sections 4.2–4.4.
Theorem 4.2. For any h > 1, the following holds. Suppose that G excludes a careful K h minor. Then there
is a number α 6 O(h 2 ) such that for any ω : VG → + and ∆ > 0, the conformal graph (G, ω) admits an
(α, ∆)-random separator.
Applying Lemma 4.1 immediately yields the following.
Corollary 4.3. Suppose that G excludes a K h minor and Ĝ ∈ rig(G). Then there is a number α 6 O(h 2 )
such that for any ω : VĜ → + and ∆ > 0, the conformal graph (Ĝ, ω) admits an (α, ∆)-random separator.
The proof of Theorem 4.2 is based on a procedure that iteratively removes random sets of
vertices from the graph in rounds. It is modeled after the argument of [FT03] which is itself based
on [KPR93]. For an exposition of the latter argument, one can consult the book [Ost13, Ch. 3].
4.1
Careful minors in rigs
The next lemma clarifies slightly the structure of careful minors.
Lemma 4.4. G has a careful H-minor if and only if there exist pairwise-disjoint connected subsets
Ð
{B u ⊆ VG : u ∈ VH } and distinct vertices W w x y ∈ VG \ u∈VH B u : {x, y} ∈ EH such that
1. EG (B u , B v ) ∅ for u, v ∈ VH with u , v.
15
2. W is an independent set.
3. For every {x, y} ∈ EH , it holds that
EG (w x y , B u ) , ∅ ⇐⇒ u ∈ {x, y} .
(4.1)
Proof. The “only if” direction is straightforward. We now argue the other direction.
Û
Let {A u ⊆ VG : u ∈ VHÛ } witness a strict H-minor
in G. For every {x, y} ∈ EH , there exists a
simple path γx y with one endpoint in A x , one endpoint in A y , and whose internal vertices satisfy
γx◦ y ⊆ A m x y and γx◦ y , ∅, where m x y ∈ VHÛ is the vertex subdividing the edge {x, y}.
Choose some vertex w x y ∈ γx◦ y . Removal of w x y breaks the graph G[A x ∪ A y ∪ γx y ] into two
connected components; define these as B x and B y (so that A x ⊆ B x and A y ⊆ B y ). Property
(1) is verified by strictness of the HÛ minor and the fact that the the non-subdivision vertices
Û Similarly, properties (2) and (3) follow
VHÛ \ m x y : {x, y} ∈ VH form an independent set in H.
Û
from strictness of the H minor and the fact that NHÛ (m x y ) {x, y} for {x, y} ∈ EH .
We now prove that if Ĝ ∈ rig(G), then careful minors in Ĝ yield minors in G.
Proof of Lemma 4.1. Let {R v ⊆ VG : v ∈ VĜ } be a set of regions realizing Ĝ. Assume that Ĝ has a
careful H-minor and let {B u ⊆ VĜ : u ∈ VH } and W {w x y : {x, y} ∈ EH } be the sets guaranteed
by Lemma 4.4.
For u ∈ VH , define
Ø
Au
Rv .
v∈B u
Since B u is connected in Ĝ and the regions {R v : v ∈ VĜ } are each connected in G, it follows that A u
is connected in G.
Let us verify that the sets {A u : u ∈ VH } are pairwise disjoint. If x ∈ A u ∩ A v for u , v, then
there must be regions R a and R b with a ∈ B u , b ∈ B v and x ∈ R a ∩ R b . This would imply {a, b} ∈ EĜ ,
but Lemma 4.4(1) asserts that EĜ (B u , B v ) ∅.
We will show that there exist pairwise vertex-disjoint paths γuv ⊆ VG : {u, v} ∈ EH with
!
γuv ∩
Ø
Ax ⊆ Au ∪ Av ,
(4.2)
x∈VH
and such that γuv connects A u to A v . This will yield the desired H-minor in G.
Fix {u, v} ∈ EH . From Lemma 4.4(3), we know that the connected set R w uv shares a vertex with
A u and also shares a (different) vertex with A v . Thus we can choose γuv as above with γuv ⊆ R w uv .
Note that Lemma 4.4(2) (in particular, (4.1)) also yields R w uv ∩ A x ∅ for any x ∈ VH \ {u, v},
verifying (4.2).
Thus we are left to verify that the sets {R w uv : {u, v} ∈ EH } are pairwise vertex-disjoint. But this
also follows from (4.1), specifically the fact that W {w uv : {u, v} ∈ EH } is an independent set in
Ĝ.
4.2
Chopping trees
Observe that by a trivial approximation argument, it suffices to prove Theorem 4.2 for any conformal
metric ω : VG → (0, ∞), i.e., one that satisfies
ω(v) > 0
∀v ∈ VG
(4.3)
Let us now fix such a conformal metric ω : VG → (0, ∞) on G and a number ∆ > 0. Fix an
arbitrary ordering v 1 , v 2 , . . . , v |VG | of VG in order to break ties in the argument that follows.
16
(a) Illustration of a fat sphere
(b) Chopping a graph into subgraphs
Figure 2: The chopping procedure
We will use I(G) to denote the collection of all connected, induced subgraphs of G. For such a
subgraph H ∈ I(G), we use distH
ω to denote the induced distance coming from the conformal metric
(H, ω|VH ). For c ∈ VH and R > 0, let us define the skinny ball, fat ball, and fat sphere, respectively:
BωH (c, R)
BH
ω (c, R)
v ∈ VH :
v ∈ VH :
distH
ω (c, v)
1
< R − ω(v) ,
2
distH
ω (c, v)
1
6 R + ω(v) ,
2
H
H
1
1
SH
ω (c, R) v ∈ VH : R ∈ distω (c, v) − 2 ω(v), distω (c, v) + 2 ω(v)
H
BH
ω (c, R) \ Bω (c, R) .
See Figure 2(a) for a useful (but non-mathematical) illustration where one imagines a vertex v ∈ VH
as a disk of radius 12 ω(v). Note that BωH (c, R) is the connected component of c in the graph
H[VH \ SH
ω (c, R)]. The next fact requires our assumption (4.3).
Fact 4.5. If γ ⊆ VH is a distH
ω -shortest path emanating from c ∈ VH , then for every R > 0, it holds that
|γ ∩ SH
(c,
R)|
6
1.
ω
For c ∈ VH and τ ∈ [0, ∆], let cut∆ (H, c; τ) k∈+ SH
ω (c, τ + k∆). We define chop∆ (H, c; τ) as
the collection of connected components of the graph H [VH \ cut∆ (H, c; τ)]. See Figure 2(b).
The next lemma is straightforward.
Ð
Lemma 4.6. If τ ∈ [0, ∆] is chosen uniformly at random, then for every v ∈ VH and R > 0,
[BωH (v, R) ∩ cut∆ (H, c; τ) ∅] > 1 −
2R
.
∆
A ∆-chopping tree of (G, ω) is a rooted, graph-theoretic tree T (σ) for some σ : I(G) → [0, ∆]. The
nodes of T (σ) are triples (H, c, j) where H ∈ I(G), c ∈ VH , and j ∈ + . We refer to c as the center of
the node and j as its depth. We now define T (σ) inductively (by depth) as follows.
The root of T T (σ) is (G, v 1 , 0). For a node λ (H, c, j) of T , we let c®T (λ) denote the
sequence of centers encountered on the path from λ to the root of T , not including λ itself. If
chop∆ (H, c; σ(H)) ∅, then λ has no children.
17
Otherwise, if chop∆ (H, c; σ(H)) {Hi : i ∈ I}, the children of (H, c, j) are {(Hi , c i , j + 1)}, where
®T (λ) ∪ {c}) .
c i argmaxx∈VH distG
ω (x, c
i
(4.4)
In other words, c i is chosen as the point of VHi that is furthest from the centers of its ancestors in
the ambient metric distG
ω . For concreteness, if the maximum in (4.4) is not unique, we choose the first
vertex (according to the ordering of VG ) that achieves the maximum.
A final definition: We say that a node λ (H, c, j) of a chopping tree T is β-spaced if the value
of the maximum in (4.4) is at least β, i.e.,
®T (λ)) > β .
distG
ω (c, c
Note that the nodes in each level of T (σ) correspond to the connected components that result
after removing a subset of nodes from G. We state the following consequence.
Lemma 4.7. Suppose that T (σ) is a ∆-chopping tree for some ∆ > 0. Consider an integer k > 0, and let
{Hi : i ∈ I} ⊆ I(G) denote the collection of induced subgraphs occuring
Ð in the
depth-k nodes of T (σ). Then
each Hi is a unique connected component in the induced graph G
i∈I VHi .
We now state the main technical lemma on chopping trees. The proof appears in Section 4.4.
Lemma 4.8. Consider any h > 1 and ∆ > 0. Assume the following conditions hold:
1. maxv∈VG ω(v) 6 ∆
2. T is a ∆-chopping tree of (G, ω).
3. There exists a 21h∆-spaced node of T at depth h − 1.
Then G contains a careful K h minor.
Finally, we have the following analysis of a random chopping tree.
Lemma 4.9. For any k > 1, the following holds. Suppose that σ : I(G) → [0, ∆] is chosen uniformly at
random. Let {Hi : i ∈ I} ⊆ I(G) denote the collection of induced subgraphs occurring in the depth-k nodes of
T (σ). For any v ∈ VG ,
"
#
BωG (v, R) ⊆
Ø
VHi > 1 − 2k
i∈I
R
.
∆
Proof. Note that since BωG (v, R) is a connected set and there are no edges between Hi and H j for
i , j (cf. Lemma 4.7), we have
BωG (v, R) ⊆
Ø
VHi ⇐⇒ ∃i ∈ I s.t. BωG (v, R) ⊆ VHi .
i∈I
The set BωG (v, R) experiences at most k random chops, and the probability it gets removed in any
one of them is bounded in Lemma 4.6. The desired result follows by observing that if H ∈ I(G)
satisfies BωG (v, R) ⊆ VH , then BωH (v, R) BωG (v, R).
18
4.3
The random separator construction
We require an additional tool before proving Theorem 4.2. For nodes that are not well-spaced, we
need to apply one further operation.
If H ∈ I(G) and c® (c 1 , c2 , . . . , c k ) ∈ VGk and τ® (τ1 , τ2 , . . . , τk ) ∈ k+ , we define a subset
®) ⊆ I(G) as follows. Define
shatter∆ (H, c®, τ
®) VH ∩
shards∆ (H, c®, τ
k
Ø
SGω (c i , ∆ + τi ) ,
i1
and let shatter∆ (H, c®, τ®) be the collection of connected components of H[VH \ shards(H, c®, τ®)]. The
next two lemmas are straightforward consequences of this construction.
0
Lemma 4.10. If every v ∈ VH satisfies min{distG
ω (v, c i ) : i 1, . . . , k} 6 ∆, then for every H ∈
®), it holds that
shatter∆ (H, c®, τ
®) .
diamG
ω (VH 0 ) 6 2(∆ + max τ
Lemma 4.11. For any c® ∈ VGk and any ∆0 > 0, if τ® ∈ [0, ∆0]k is chosen uniformly at random, then for any
v ∈ VH and R > 0,
R
[BωH (v, R) ∩ shards∆ (H, c®, τ®) ∅] > 1 − 2k 0 .
∆
Proof of Theorem 4.2. We may assume that if v ∈ VG has ω(v) > ∆, then v ∈ S. Indeed, denote
Q {v ∈ VG : ω(v) > ∆} .
If we can produce an (α, ∆)-separator for each of the connected components of G[VG \ Q], then
taking the union of those separators together with Q yields a (2α, ∆)-separator of G. We may
therefore assume that maxv∈VG ω(v) 6 ∆.
Assume now that G excludes a careful K h minor. Let T T (σ) be the ∆-chopping tree of (G, ω)
with σ : I(G) → [0, ∆] chosen uniformly at random.
Let Dh−1 {λ i (Hi , c i , h) : i ∈ I} be the collection of depth-(h − 1) nodes of T (σ). Let
Ð
S1 VG \ i∈I VHi . By construction, the graphs {Hi } are precisely the connected components of
G[V \ S1 ] (and they occur without repetition, i.e., Hi , H j for i , j).
By Lemma 4.9, for any v ∈ VG and R > 0, we have
[BωG (v, R) ∩ S1 ∅] > 1 − 2h
Define
S2
Ø
R
.
∆
(4.5)
®) ,
shards21h∆ (Hi , c®T (λ i ); τ
i∈I
where τ® ∈ [0, ∆]h is chosen uniformly at random. From Lemma 4.11, for any i ∈ I, v ∈ VHi , and
R > 0, we have
R
[BωHi (v, R) ∩ S2 ∅] > 1 − 2h .
(4.6)
∆
So consider v ∈ VG and R > 0. If BωG (v, R) ∩ S1 ∅, then BωG (v, R) ⊆ VHi for some i ∈ I, and in
that case BωG (v, R) BωHi (v, R). Therefore (4.5) and (4.6) together yield
[BωG (v, R) ∩ (S1 ∪ S2 ) ∅] > 1 − 4h
Moreover, the collection of induced subgraphs
H
Ø
®)
shatter21h∆ (Hi , c®T (λ i ); τ
i∈I
19
R
.
∆
(4.7)
is precisely the set of connected components of G[V \ (S1 ∪ S2 )].
We are thus left to bound diamG
ω (VH ) for every H ∈ H . Consider a node λ i ∈ Dh−1 . Since G
excludes a careful K h minor, Lemma 4.8 implies that λ i is not 21h∆-spaced. It follows that
®T (λ i )) 6 distG
®T (λ i )) 6 21h∆ ,
max distG
ω (v, c
ω (c i , c
v∈VHi
based on how c i is chosen in (4.4). Therefore Lemma 4.10 implies that for every H ∈
®), we have diamG
shatter21h∆ (Hi , c®T (λ i ); τ
ω (VH ) 6 2(21h + 1)∆.
We conclude that every connected component H of G[V \ (S1 ∪ S2 )] has diamG
ω (VH ) 6 (42h + 2)∆.
Combining this with (4.7) shows that S1 ∪S2 is a (4h(42h + 2), (42h + 2)∆)-random separator, yielding
the desired conclusion. (Note that establishing the existence of a (cα, c∆)-random separator for every
∆ > 0 implies the existence of an (α, ∆)-random separator for every ∆ > 0 by homogeneity.)
4.4
A diameter bound for well-spaced subgraphs
Our goal now is to prove Lemma 4.8.
Lemma 4.12 (Restatement of Lemma 4.8). Consider any h > 1 and ∆ > 0. Assume the following
conditions hold:
(A1) maxv∈VG ω(v) 6 ∆
(A2) T is a ∆-chopping tree of (G, ω).
(A3) There is a 21h∆-spaced node of T at depth h − 1.
Then G contains a careful K h minor.
In order to enforce the properties of a careful minor, we will need a way to ensure that there are
no edges between certain vertices. The following simple fact will be the primary mechanism.
Lemma 4.13. Suppose H ∈ I(G) and maxv∈VH ω(v) 6 ∆. If u, v ∈ VH satisfy distH
ω (u, v) > ∆, then
{u, v} < EG .
Proof. Since H is an induced subgraph, {u, v} ∈ EG
ω(u)+ω(v)
distH
6 ∆.
ω (u, v)
2
⇒
{u, v} ∈ EH . And then clearly
Proof of Lemma 4.12. We will construct a careful K h minor inductively. Recall that a careful K h minor
is a strict minor of the subdivision KÛ h . We use the notation {A u } for the supernodes corresponding
to original vertices of K h . The supernodes corresponding to subdivision vertices will be single
nodes of VG which we denote {w uv : {u, v} ∈ EK h }.
Let λ (H, c, h − 1) be a 21h∆-spaced node in T , and denote by λ λ1 , λ2 , . . . , λ h the sequence
of nodes of T on the path from λ to the root of T . For each t 1, . . . , h, write λ t (Ht , c t , h − t).
Observe that since λ is 21h∆-spaced, it also holds that λ t is 21h∆-spaced for each t 1, . . . , h.
(The property only becomes stronger for children in T .) Hence,
distG
ω (c i , c j ) > 21h∆ for all i, j ∈ {1, . . . , h} with i , j.
(4.8)
We will show, by induction on t, that Ht contains a careful K t minor for t 1, . . . , h.
For the sake of the induction, we will need to maintain some additional properties that we now
describe. The first three properties simply ensure that we have found a strict KÛ t minor. Let us use the
numbers {1,
2, . . . , t} to index the vertices of VK t . We will show there exist sets {A tu ⊆ VHt : u ∈ VK t }
and W t w uv ∈ VHt : {u, v} ∈ EK t ⊆ VHt with the following properties:
20
Figure 3: Construction of a careful K h minor.
P1. The sets {A tu : u ∈ VK t } are connected and mutually disjoint, and EG (A tu , A tv ) ∅ for u , v.
P2. The set W t is an independent set in G.
P3. For all {u, v} ∈ EK t it holds that EG (w uv , A tx ) , ∅ ⇐⇒ x ∈ {u, v}.
t
P4. For every u ∈ VK t , there is a representative r ut ∈ A tu such that distG
ω (r u , c u ) 6 10t∆.
t
t
P5. For all u , v ∈ VK t , we have distG
ω (r u , r v ) > 21(h − t)∆ .
P6. For every u ∈ VK t , it holds that
!
t
t
t
distH
ω ru , W ∪
Ø
A tv > 3∆ .
v ,u
In the base case t 1, take A11 {c1 } and r11 c 1 , and W 1 ∅. It is easily checked that these
choices satisfy (P1)–(P6). So now suppose that for some t ∈ {1, 2, . . . , h − 1}, we have objects
satisfying (P1)–(P6). We will establish the existence of objects satisfying (P1)–(P6) for t + 1.
It may help to consult Figure 3 for the inductive step. Recall that, by construction, Ht ∈
chop∆ (Ht+1 , c t+1 ; r) for some r > 0. Note that since λ t is 21h∆-spaced, it holds that distG
ω (c t , c t+1 ) >
21h∆ (cf. (4.8)), and therefore (recalling that maxv∈VG ω(v) 6 ∆)
r > 20h∆ .
(4.9)
t
t+1
t+1
For each i 1, 2, . . . , t, let γi denote a distH
denote
ω -shortest-path from r i to c t+1 . Let r i
Ht+1
the unique element in γi ∩ Sω (c t+1 , r − 4∆), and let w i,t+1 denote the unique element in γi ∩
t+1
SH
ω (c t+1 , r − 8∆). (Recall Fact 4.5.) Define:
t+1
A t+1
A ti ∪ γi \ BH
ω (c t+1 , r − 8∆),
i
A t+1
t+1
BωHt+1 (c t+1 , r
− 8∆) .
21
16i6t
Lemma 4.14. For every i, j ∈ {1, 2, . . . , t} with i , j, the following holds: γi ∩ A tj ∅, γi ∩ W t ∅, and
EG (γi , A tj ) EG (γi , W t ) ∅.
Proof. Observe that lenω (γi ∩ VHt ) 6 ∆ and γi emanates from r it . (P6) implies that
t
t
t
t
distH
ω (r i , A j ∪ W ) > 3∆ ,
and thus γi ∩ (A tj ∪ W t ) ∅ for i , j.
t+1
Note furthermore that SH
ω (c t+1 , r) separates γi \ VHt from VHt in H t+1 . Thus we need only
prove that EG (γi \ BωHt+1 (c t+1 , r), A tj ∪ W t ) ∅. But we have
Ht+1
Ht t
t
t
t
t
t+1
distH
ω (γi \ Bω (c t+1 , r), A j ∪ W ) > distω (r i , A j ∪ W ) − lenω (γi ∩ VHt ) −
1
2
max
H
v∈Sω t+1 (c t+1 ,r)
ω(v)
(A1)
t
t
t
t
> distH
ω (r i , A j ∪ W ) − 3∆/2
(P6)
> ∆.
Therefore Lemma 4.13 yields EG (γi \ BωHt+1 (c t+1 , r), A tj ∪ W t ) ∅, and this suffices to prove
EG (γi , A tj ∪ W t ) ∅ for i , j.
Let us verify the six properties (P1)–(P6) above in order.
1. Consider first the sets A t+1
for i 1, 2, . . . , t. For i , j, we have γi ∩ A tj ∅ and EG (γi , A tj ) ∅
i
from Lemma 4.14. Next consider the sets γi ∩ A t+1
and γ j ∩ A t+1
for i , j and i, j 6 t. By (P5),
i
j
G
t t
t+1
t+1
we have distG
ω (r i , r j ) > 14(h − t)∆, and thus distω (γi ∩ A i , γ j ∩ A j ) > 21(h − t)∆ − 2 · 9∆ > ∆.
Hence γi ∩ A t+1
and γ j ∩ A t+1
are disjoint and by Lemma 4.13, EG (γi ∩ A t+1
, γ j ∩ A t+1
) ∅.
i
j
i
j
t+1
Finally, observe that A t+1
∩A t+1
∅ and EG (A t+1
, A t+1
) ∅ for i 6 t because SH
ω (c t+1 , r −8∆)
t+1
t+1
i
i
Ð
separates A t+1
from i 6 t A t+1
in Ht+1 .
t+1
i
Ht+1
t+1
2. Observe that SH
ω (c t+1 , r −4∆) and S ω (c t+1 , r −8∆) are disjoint because maxv∈VHt+1 ω(v) 6 ∆
t+1
t+1 \ W t from W t in H
by assumption (A1). It follows that SH
t+1 .
ω (c t+1 , r − 4∆) separates W
t+1
t
We thus need only verify that W
\ W is an independent set.
To this end, observe that
t
distG
ω (w i,t+1 , r i ) 6 9∆ + ∆/2 6 9.5∆ ,
(4.10)
where we have again employed (A1). This implies that for i , j,
(P5)
G t t
distG
ω (w i,t+1 , w j,t+1 ) > distω (r i , r j ) − 2 · 9.5∆ > 21(h − t)∆ − 19∆ > ∆ ,
hence Lemma 4.13 implies that Wt+1 \ Wt is indeed an independent set.
, w i,t+1 ) , ∅ and EG (A t+1
, w i,t+1 ) , ∅ for i 6 t both follow immediately
3. The facts that EG (A t+1
t+1
i
from the construction (w i,t+1 is a separator vertex on the path γi connecting r it to c t+1 ).
We are left to verify that for every {u, v} ∈ VK t+1 and x < {u, v}, we have EG (w uv , A t+1
x ) ∅.
We argue this using three cases:
22
• For i 6 t, EG (w i,t+1 , A tx ) ∅:
t+1
This follows because EG (w i,t+1 , VHt ) ∅ since SH
ω (c t+1 , r) separates w i,t+1 from VHt in
Ht+1 .
• For i, j 6 t with i , j: EG (w i,t+1 , γ j ∩ A t+1
) ∅:
j
We have
(4.10)
G t t
t+1
t+1
t+1
distH
ω (w i,t+1 , γ j ∩ A j ) > distω (r i , r j ) − 9.5∆ − lenω (γ j ∩ A j )
> distGω (r it , r tj ) − 18.5∆
(P5)
> 21(h − t)∆ − 18.5∆ > ∆ ,
which implies the desired bound using Lemma 4.13.
• EG (W t ,
Ð
i 6t
γi ∩ A t+1
) ∅: This follows from Lemma 4.14.
i
4. For i 6 t, we have
G t
G t t+1
t+1
distG
ω (r i , c i ) 6 distω (r i , c i ) + distω (r i , r i ) 6 10t∆ + 9.5∆ 6 10(t + 1)∆.
t+1
Moreover, r t+1
c t+1 .
5. Similarly, for i, j 6 t and i , j,
(P5)
G t t
t+1 t+1
distG
ω (r i , r j ) > distω (r i , r j ) − 2 · 9.5∆ > 21(h − t − 1)∆ .
One also has
(P4)
(4.8)
G
G
t+1 t+1
t+1
distG
ω (r t+1 , r i ) distω (c t+1 , r i ) > distω (c t+1 , c i ) − 10t∆ > 21(h − t − 1)∆ .
t+1
6. First, note that if i 6 t, then r it+1 ∈ SH
ω (c t+1 , r − 4∆), so using (A1) gives
t+1
t+1
distH
ω (c t+1 , r i ) 6 r − 4∆ + ∆/2 .
On the other hand, (W t ∪
Ð
j 6t
t+1
A tj ) ∩ BH
ω (c t+1 , r) ∅, hence
t+1
distH
c t+1 , W t ∪
ω
Ð
t
j 6t A j > r .
t+1
t+1
t
It follows from the triangle inequality that distH
ω (r i , W ∪
Ð
j 6t
A tj ) > 3∆.
Next, we have, for i, j 6 t and i , j,
G t+1
t+1
t+1
t+1
t+1
distH
ω (r i , γ j ∩ A j ) > distω (r i , γ j ∩ A j )
> distGω (r it , r tj ) − distGω (r it , r it+1 ) − lenω (γ j ∩ A t+1
j )
> 21(h − t)∆ − 9.5∆ − 5∆ > 3∆ .
t+1
t+1 \ W ⊆ SHt+1 (c
Also note that distH
t
t+1 , r − 8∆)
ω (c t+1 , Wt+1 \ Wt ) 6 r − 8∆ + ∆/2 because W
ω
Ht+1
t+1
t+1
t+1
and distH
(c
,
r
)
>
r
−
4∆
−
∆/2
because
r
∈
S
(c
,
r
−
4∆).
It
follows
that
t+1
t+1
ω
ω
i
i
t+1
t+1
t+1
distH
\ W t ) > 3∆ .
ω (r i , W
23
t+1
t+1
t+1 ∪
We have thus verified that for i 6 t, it holds that distH
ω (r i , W
Ð
j 6 t, j , i
A t+1
) > 3∆.
j
Ht+1
t+1
t+1
t+1
t+1
The fact that distH
ω (r i , A t+1 ) > 3∆ for i 6 t follows similarly since A t+1 Bω (c t+1 , r −8∆)
t+1
and r it+1 ∈ SH
ω (c t+1 , r − 4∆).
t+1
t+1
t+1 ∪
We are left to verify the last case: distH
ω (r t+1 , W
two facts: W t+1 ∪
Ð
Ð
i 6t
i 6t
A t+1
) > 3∆. This follows from the
i
A t+1
∩ BωHt+1 (c t+1 , r − 8∆) ∅ and r > 20∆ from (4.9).
i
We have completed verification of the inductive step, and thus by induction there exists a careful
K h minor in G, completing the proof.
5
5.1
Applications and discussion
Spectral bounds
Say that a conformal graph (G, ω) is (r, ε)-spreading if it holds that for every subset S ⊆ VG with
|S| r, one has
1 Õ
distω (u, v) > εkωk`2 (VG ) .
|S| 2
u,v∈S
Let ε r (G, ω) be the smallest value ε for which (G, ω) is (r, ε)-spreading. The next theorem appears
as [KLPT11, Thm 2.3].
Theorem 5.1. If G is an n-vertex graph with maximum degree dmax , then for k 1, 2, . . . , n − 1, the
following holds: If ω : VG → + satisfies kωk`2 (VG ) 1, and (VG , distω ) admits an (α, ε/2)-padded
partition with ε ε bn/8kc (G, ω), then
λ k (G) . dmax
α2
.
ε2 n
The methods of [KLPT11] also give a way of producing (r, ε)-spreading weights. Consider a
graph G and let µ be a probability measure on subsets of VG . A flow Λ : PG → + is called a µ-flow
if
Λ[u, v] > µ({S : u, v ∈ S}) .
For a number r 6 |VG |, let Fr (G) denote the set of all µ-flows in G with supp(µ) ⊆ VrG (i.e., µ is
supported on subsets of size exactly r). The following is a consequence of the duality theory of
convex programs (see [KLPT11, Thm 2.4]).
Theorem 5.2. For every graph G and r 6 |VG |, it holds that
max
ω:VG →+
ε r (G, ω) : kωk`2 (VG ) 6 1
1
min kcΛ k`2 (VG ) : Λ ∈ Fr (G) .
2
r
We need to extend the notion of H-flows to weighted graphs. Suppose that H is equipped with
a non-negative weight on edges D : EH → + . Then an (H, D)-flow in G is a pair (Λ, ϕ) that satisfies
properties (1) and (2) of an H-flow, but property (3) is replaced by: For every u, v ∈ VG ,
Õ
Λ[u, v]
D({x, y}) .
{x,y}∈EH :{ϕ(x),ϕ(y)}{u,v}
∗
We define the crossing congestion χG
(H, D) as the infimum of χG (Λ, ϕ) over all (H, D)-flows (Λ, f )
V
in G. Given a measure µ on 2 H , let Dµ be defined by
Dµ ({x, y}) µ
S ⊆ VH : x, y ∈ S
24
.
We need the following result which is an immediate consequence of Corollary 3.6 and Corollary 4.2
in [KLPT11].
Theorem 5.3. There is a constant θ0 > 0 such that for every h > 3 and r > θ0 h 2 log h, the following holds.
If G excludes K h as a minor, then for any graph H and any measure µ supported on VrH , it holds that
∗
χG
(H, Dµ ) &
r5
.
|VH |h 2 log h
We can use the preceding theorem combined with the method of Section 3.3 to reach a conclusion
for rigs over K h -minor-free graphs.
Corollary 5.4. Suppose that Ĝ ∈ rig(G) and G excludes K h as a minor for some h > 3. Then for every
r > θ0 h 2 log h and Λ ∈ Fr (Ĝ), it holds that
kcΛ k`22 (V
Ĝ )
&
r5
dmax (Ĝ)|VĜ |h 2 log h
.
Proof. Suppose that Λ ∈ Fr (Ĝ). Let (Λ̌, ϕ̌) be the flow induced in G from the mapping described in
the proof of Theorem 3.5. By Claim 3.7, it holds that
χG (Λ̌, ϕ̌) 6 4dmax (Ĝ)kcΛ k`22 (V ) .
Ĝ
But from Theorem 5.3, we know that
χG (Λ̌, ϕ̌) &
r5
.
|VĜ |
We are now in position to prove Theorem 1.11.
Theorem 5.5 (Restatement of Theorem 1.11). Suppose that G ∈ rig(G0 ) and G0 excludes K h as a minor
for some h > 3. If dmax is the maximum degree of G, then for any k 1, 2, . . . , |VG | − 1, it holds that
2
λ k (G) 6 O(dmax
h 6 log h)
k
.
|VG |
Proof. Let r bn/8kc. We may assume that r > θ0 h 2 log h since the bound λ k (G) 6 2dmax (G)
always holds. From the conjunction of Corollary 5.4 and Theorem 5.2, we know there exists a
conformal metric ω : VG → + with kωk`2 (VG ) 1 and such that
1
ε r (G, ω) & 2
r
s
r5
.
dmax h 2 log h|VĜ |
From Theorem 2.10, we know that (VG , distω ) admits an (α, ∆)-padded partition for every ∆ > 0
with α 6 O(h 2 ). Now applying Theorem 5.1 yields the claimed eigenvalue bound.
5.2
Weighted separators
Throughout the paper, we have equipped graphs with the uniform measure over their vertices.
There are natural extensions to the setting where a graph G is equipped with a non-negative
measure on vertices µ : VG → + . The corresponding definitions naturally replace L p (VG ) by the
weighted space L p (VG , µ). The methods of Section 2 and Section 3 extend in a straightforward way
to this setting (see [FHL08] and, in particular, Section 3.6 there for extensions to a more general
setting with pairs of weights).
As an illustration, we state a weighted version of Theorem 1.1. Suppose that µ is a probability
measure on VG . A 23 -balanced separator in (G, µ) is a subset of nodes S ⊆ VG such that every
connected component of G[V \ S] has µ-measure at most 32 .
25
Theorem 5.6. If G ∈ rig(G0 ) and G0 excludes K h√ as a minor, then for any probability measure µ on VG ,
there is a 23 -balanced separator of weight at most c h
c h 6 O(h 3 log h).
5.3
m
n ,
where m |EG | and n |VG |. One has the estimate
Bi-Lipschitz embedding problems
We state two interesting open metric embedding problems. We state them here only for string
graphs, but the extension to rigs over K h -minor-free graphs is straightforward.
Random embeddings into planar graphs. Let G be a graph and consider a random variable
(F , G0 , len), where F : VG → VG0 , G0 is a (random) planar graph, and len : EG0 → + is an
assignment of lengths to the edges of G0 . We use dist(G0 ,len) denote the induced shortest-path
distance in G0 .
Question 5.7. Is there a constant K > 0 so that the following holds for every finite string graph G?
For every ω : VG → + , there exists a triple (F , G0 , len) such that:
1. (Non-contracting) Almost surely, for every u, v ∈ VG ,
dist(G0 ,len) (F(u), F(v)) > distω (u, v) .
2. (Lipschitz in expectation) For every u, v ∈ VG ,
dist(G0 ,len) (F(u), F(v)) 6 K · distω (u, v) .
A positive answer would clarify the geometry of the conformal metrics on string graphs. In
[CJLV08], the lower bound method of [GNRS04] is generalized to rule out the existence of non-trivial
reductions in the topology of graphs under random embeddings of the above form. But that method
relies on the initial family of graphs being closed under 2-sums, a property which is manifestly
violated for string graphs (since, in particular, string graphs are not closed under subdivision).
Bi-Lipschitz embeddings into L 1 . A well-known open question is whether every planar graph
metric admits an embedding into L 1 ([0, 1]) with bi-Lipschitz distortion at most C (for some
universal constant C); see [GNRS04] for a discussion of the conjecture and its extension to general
excluded-minor families. The following generalization is also natural.
Question 5.8. Do conformal string metrics admit bi-Lipschitz embeddings into L1 ? More precisely,
is there a constant K > 0 such that the following holds for every string graph G? For every
ω : VG → + , there is a mapping ϕ : VG → L 1 ([0, 1]) such that for all u, v ∈ VG ,
distω (u, v) 6 kϕ(u) − ϕ(v)kL1 6 K · distω (u, v) .
Note that, unlike in the case of edge-capacitated flows, a positive resolution does not imply an
O(1) vertex-capacitated multi-flow min/cut theorem for string graphs. See [FHL08] for a discussion
and [LMM15] for stronger types of embeddings that do yield this implication. If Question 5.7 has a
positive resolution, it implies that Question 5.8 is equivalent to the same question for planar graphs.
Acknowledgements
The author thanks Noga Alon, Nati Linial, and Laci Lovász for helpful discussions, Janos Pach for
emphasizing Jirka’s near-optimal bound for separators in string graphs, and the organizers of the
“Mathematics of Jiří Matoušek” conference, where this work was initiated.
26
References
[AST90]
Noga Alon, Paul Seymour, and Robin Thomas. A separator theorem for nonplanar
graphs. J. Amer. Math. Soc., 3(4):801–808, 1990. 2
[BLR10]
Punyashloka Biswal, James R. Lee, and Satish Rao. Eigenvalue bounds, spectral
partitioning, and metrical deformations via flows. J. ACM, 57(3):Art. 13, 23, 2010. Prelim.
version in FOCS 2008. 6, 7, 10, 13, 14
[Bou85]
J. Bourgain. On Lipschitz embedding of finite metric spaces in Hilbert space. Israel J.
Math., 52(1-2):46–52, 1985. 6
[BV04]
Stephen Boyd and Lieven Vandenberghe. Convex optimization. Cambridge University
Press, Cambridge, 2004. 13
[Can94]
James W. Cannon. The combinatorial Riemann mapping theorem. Acta Math., 173(2):155–
234, 1994. 5
[CJLV08]
Amit Chakrabarti, Alexander Jaffe, James R. Lee, and Justin Vincent. Embeddings of
topological graphs: Lossy invariants, linearization, and 2-sums. In IEEE Symposium on
Foundations of Computer Science, 2008. 26
[Duf62]
R. J. Duffin. The extremal length of a network. J. Math. Anal. Appl., 5:200–215, 1962. 5
[FHL08]
Uriel Feige, MohammadTaghi Hajiaghayi, and James R. Lee. Improved approximation
algorithms for minimum weight vertex separators. SIAM J. Comput., 38(2):629–657, 2008.
4, 5, 6, 7, 8, 25, 26
[FP10]
Jacob Fox and János Pach. A separator theorem for string graphs and its applications.
Combin. Probab. Comput., 19(3):371–390, 2010. 2
[FP14]
Jacob Fox and János Pach. Applications of a new separator theorem for string graphs.
Combin. Probab. Comput., 23(1):66–74, 2014. 3
[FPT10]
Jacob Fox, János Pach, and Csaba D. Tóth. A bipartite strengthening of the crossing
lemma. J. Combin. Theory Ser. B, 100(1):23–35, 2010. 3
[FT03]
J. Fakcharoenphol and K. Talwar. An improved decomposition theorem for graphs
excluding a fixed minor. In Proceedings of 6th Workshop on Approximation, Randomization,
and Combinatorial Optimization, volume 2764 of Lecture Notes in Computer Science, pages
36–46. Springer, 2003. 15
[GNRS04] Anupam Gupta, Ilan Newman, Yuri Rabinovich, and Alistair Sinclair. Cuts, trees and
l1 -embeddings of graphs. Combinatorica, 24(2):233–269, 2004. 26
[Gro07]
Misha Gromov. Metric structures for Riemannian and non-Riemannian spaces. Modern
Birkhäuser Classics. Birkhäuser Boston, Inc., Boston, MA, english edition, 2007. Based
on the 1981 French original, With appendices by M. Katz, P. Pansu and S. Semmes,
Translated from the French by Sean Michael Bates. 4
[Her70]
Joseph Hersch. Quatre propriétés isopérimétriques de membranes sphériques homogènes. C. R. Acad. Sci. Paris Sér. A-B, 270:A1645–A1648, 1970. 5
[KLPT11] J. Kelner, J. R. Lee, G. Price, and S.-H. Teng. Metric uniformization and spectral bounds
for graphs. Geom. Funct. Anal., 21(5):1117–1143, 2011. Prelim. version in STOC 2009. 7,
24, 25
27
[KM91]
Jan Kratochvíl and Jiří Matoušek. String graphs requiring exponential representations.
J. Combin. Theory Ser. B, 53(1):1–4, 1991. 2
[Kos82]
A. V. Kostochka. The minimum Hadwiger number for graphs with a given mean degree
of vertices. Metody Diskret. Analiz., (38):37–58, 1982. 2
[KPR93]
Philip N. Klein, Serge A. Plotkin, and Satish Rao. Excluded minors, network decomposition, and multicommodity flow. In Proceedings of the 25th Annual ACM Symposium on
Theory of Computing, pages 682–690, 1993. 6, 15
[Kra91]
Jan Kratochvíl. String graphs. II. Recognizing string graphs is NP-hard. J. Combin.
Theory Ser. B, 52(1):67–78, 1991. 2
[LMM15] James R. Lee, Manor Mendel, and Mohammad Moharrami. A node-capacitated
Okamura-Seymour theorem. Math. Program., 153(2, Ser. A):381–415, 2015. 26
[LN05]
James R. Lee and Assaf Naor. Extending Lipschitz functions via random metric partitions.
Invent. Math., 160(1):59–95, 2005. 7
[LR99]
Tom Leighton and Satish Rao. Multicommodity max-flow min-cut theorems and their
use in designing approximation algorithms. J. ACM, 46(6):787–832, 1999. 6
[LT79]
Richard J. Lipton and Robert Endre Tarjan. A separator theorem for planar graphs.
SIAM J. Appl. Math., 36(2):177–189, 1979. 6
[Mat02]
J. Matoušek. Lectures on discrete geometry, volume 212 of Graduate Texts in Mathematics.
Springer-Verlag, New York, 2002. 6
[Mat14]
Jiří Matoušek. Near-optimal separators in string graphs. Combin. Probab. Comput.,
23(1):135–139, 2014. 2, 6
[Mat15]
Jiří Matoušek. String graphs and separators. In Geometry, structure and randomness in
combinatorics, volume 18 of CRM Series, pages 61–97. Ed. Norm., Pisa, 2015. 2
[MM16]
Konstantin Makarychev and Yury Makarychev. Metric extension operators, vertex
sparsifiers and Lipschitz extendability. Israel J. Math., 212(2):913–959, 2016. 7
[MS86]
Vitali D. Milman and Gideon Schechtman. Asymptotic theory of finite-dimensional normed
spaces, volume 1200 of Lecture Notes in Mathematics. Springer-Verlag, Berlin, 1986. With
an appendix by M. Gromov. 4
[MTTV97] Gary L. Miller, Shang-Hua Teng, William Thurston, and Stephen A. Vavasis. Separators
for sphere-packings and nearest neighbor graphs. J. ACM, 44(1):1–29, 1997. 6
[Ost13]
Mikhail I. Ostrovskii. Metric embeddings, volume 49 of De Gruyter Studies in Mathematics.
De Gruyter, Berlin, 2013. Bilipschitz and coarse embeddings into Banach spaces. 15
[Rab08]
Yuri Rabinovich. On average distortion of embedding metrics into the line. Discrete
Comput. Geom., 39(4):720–733, 2008. 10
[SŠ04]
Marcus Schaefer and Daniel Štefankovič. Decidability of string graphs. J. Comput. System
Sci., 68(2):319–334, 2004. 2
[SSŠ03]
Marcus Schaefer, Eric Sedgwick, and Daniel Štefankovič. Recognizing string graphs in
NP. J. Comput. System Sci., 67(2):365–380, 2003. Special issue on STOC2002 (Montreal,
QC). 2
28
[ST07]
Daniel A. Spielman and Shang-Hua Teng. Spectral partitioning works: Planar graphs
and finite element meshes. Linear Algebra and its Applications: Special Issue in honor of
Miroslav Fiedler, 421(2–3):284–305, March 2007. 5, 6, 7
[Tho84]
Andrew Thomason. An extremal function for contractions of graphs. Math. Proc.
Cambridge Philos. Soc., 95(2):261–265, 1984. 2
29
| 8cs.DS
|
arXiv:1107.1171v2 [math.AC] 9 Feb 2014
A NOTE ON THE COMPUTATION OF THE
FROBENIUS NUMBER OF A NUMERICAL SEMIGROUP
JULIO JOSÉ MOYANO-FERNÁNDEZ
A BSTRACT. In this note we observe that the Frobenius number and therefore the conductor of a numerical semigroup can be obtained from the maximal socle degree of the
quotient of the corresponding semigroup algebra by the ideal generated by the biggest
generator of the semigroup.
1. I NTRODUCTION
AND
R EVIEW
Numerical semigroups occur often in many branches of Mathematics. One of the most
challenging problems in this area is the computation of the Frobenius number of the semigroup, i.e., the biggest integer not being an element of the numerical semigroup. In this
paper we describe a method to calculate it based on some fundamental concepts in commutative algebra. For further details and as a general reference on numerical semigroups,
the reader should refer to the works of Rosales and García Sánchez [2], and Ramírez Alfonsín [3]. Much of the notation we will use comes originally from the (in many respects
seminal) work of Herzog and Kunz [1]. Let N denote the set of nonnegative integers.
Let k be an arbitrary field. Let n1 , . . ., nd be positive integer numbers with gcd(n1 , . . ., nd ) =
1. Consider the numerical semigroup
Γ := Nn1 + . . . + Nnd
minimally generated by n1 , . . ., nd . It is well-known the existence of an element c ∈ N
minimal such that c + N ⊆ Γ. This number is called the conductor of Γ, and we will
denote it by c(Γ). The number f (Γ) := c(Γ) − 1 is then the biggest integer not belonging
to Γ, and it is called the Frobenius number of Γ.
Let n be a nonzero element of Γ. The set
Ap(Γ, n) := {h ∈ Γ | h − n ∈
/ Γ}
is called the Apéry set of n in Γ. It is easily checked that (cf. [4])
f (Γ) = max Ap(Γ, n) − n.
(†)
Let I 6= ∅ be a subset of Z satisfying I 6= Z and I + Γ ⊆ I. Such an I is said to be a
fractional Γ-ideal (sometimes also called Γ-semigroup). The Γ-ideal M := {s ∈ Γ | s 6= 0}
2010 Mathematics Subject Classification. Primary: 11D07; Secondary: 14Q05.
Key words and phrases. numerical semigroup; Frobenius problem; graded polynomial ring.
The author was partially supported by the Spanish Government Ministerio de Educación y Ciencia
(MEC) grant MTM2007-64704 in cooperation with the European Union in the framework of the founds
“FEDER”, and by the Deutsche Forschungsgemeinschaft (DFG).
1
2
JULIO JOSÉ MOYANO-FERNÁNDEZ
is the (uniquely determined) maximal ideal of Γ. It will be important in the sequel to
consider also the Γ-ideal
M − := {z ∈ Z | z + M ⊆ Γ}.
Note that M − ⊇ Γ, and since f (Γ) ∈ M − one has indeed M − ) Γ. The inclusion N ⊇ M −
holds precisely when Γ = N, and in this case −1 ∈ M − . The cardinality of the set of
elements in M − \ Γ will be denoted by r(Γ). Note also that
f (Γ) = max{m | m ∈ M − \ Γ}.
Let R := k[X1 , . . ., Xd ] (resp. k[t]) be the polynomial ring over k graded by deg(Xi ) = ni for
every i ∈ {1, . . ., d} (resp. deg(t) = 1). Let π be the graded homomorphism of k-algebras
π : R → k[t] given by Xi 7→ t ni for every i ∈ {1, . . ., d}. The image of π is the semigroup
ring associated with Γ, and it is denoted by k[Γ]. The homogeneous prime ideal p := ker π
is said to be the presentation ideal of k[Γ] (cf. [5]).
Let us consider p′ := πd−1 (p) the image in k[X1, . . . , Xd−1 ] by the epimorphism mapping
Xd onto 0, where πd−1 stands for the projection onto the first d − 1 coordinates, and define
the quotient ring
R′ := k[Γ]/(t nd ).
The following ring isomorphisms are easily checked:
R′ ∼
= k[X1 , . . ., Xd−1 ]/p′ ∼
= k[X 1 , . . . , X d−1 ],
where X i denotes the class of Xi modulo p′ for every i ∈ {1, . . ., d − 1}. Furthermore, the
ring R′ is *local, i.e., it has a unique maximal graded ideal mR′ .
2. T HE M AIN R ESULT
Let us define the trivial submodule (or socle) of R′ as the set of elements in R′ which are
annihilated by the homogeneous maximal ideal mR′ of R′ , namely
Triv(R′ ) := {x ∈ R′ | x · mR′ = (0)}.
This is the largest subspace of R′ having a R′ -module structure of vector space, and can
be identified as Hom(k, R′ ).
Note that the set
∆(Γ) := {λ ∈ N | λ + M ⊆ nd + Γ} \ (nd + Γ),
which is in fact a subset of the semigroup Γ, yields an isomorphism, say ϕ , between the
trivial submodule Triv(R′ ) and the set of formal power series
n
o
ν
r
t
|
r
∈
k
,
∑ ν ν
ν ∈∆(Γ)
whose elements are indeed polynomials. Furthermore, we have a bijection between the
sets ∆(Γ) and M − \ Γ given by mapping every ν ∈ ∆(Γ) to ν − nd ∈ M − \ Γ. This together
with the isomorphism ϕ leads to the equality between the cardinality of M − \ Γ and the
dimension of the socle:
r(Γ) = dimk Triv(R′ ).
A NOTE ON THE COMPUTATION OF THE
FROBENIUS NUMBER OF A NUMERICAL SEMIGROUP 3
This means in particular that the trivial submodule Triv(R′ ) is a finite dimensional vector
space over the field k. Let us then choose a basis B := {b1 , . . ., br(Γ) } and take the element
β ∈ B such that
deg(β ) = max{deg(bi ) | i = 1, 2, . . ., r(Γ)}.
Now it is a simple matter to realise:
Lemma 2.1. The degree deg(β ) is independent of the choice of the basis B of the trivial
submodule of the ring R′ .
We are thus led to the following result:
Theorem 2.2. We have:
f (Γ) = c(Γ) − 1 = deg(β ) − nd .
Proof. The proof is straightforward from the bijection ϕ .
Corollary 2.3. We have:
max Ap(Γ, nd ) = deg(β ).
Proof. The result follows straightforward from the equality (†) at the beginning of the
paper.
Example 2.4. Let us take the monomial curve C given by t 7→ (t 6,t 8 ,t 9). The corresponding numerical semigroup is ΓC = N · 6 + N · 8 + N · 9. The presentation ideal associated
with C is
p = (X13 − X32 , X23 − X1 X32 ),
so we have R′ = k[X1, X2 ]/p′ ∼
= k[X 1 , X 2 ] with p′ = (X13 , X23) and X i ≡ Xi mod p′ for i =
2 2
2 2
1, 2. Therefore we get Triv(R′ ) = k·X 1 X 2 , and it is clearly seen that f (ΓC ) = deg(X 1 X 2 )−
9 = 12 + 16 − 9 = 19; hence c(ΓC ) = 20, as one might have also checked—easily in this
example—straight from the semigroup ΓC .
R EFERENCES
[1] J. Herzog and E. Kunz, Die Wertehalbgruppe eines lokalen Rings der Dimension 1. Sitz. ber. Heidelberg. Akad. Wiss. (1971) 27–67.
[2] J. C. Rosales and P. A. García Sánchez, Numerical semigroups. Developments in Mathematics, Vol. 20.
(Springer, Berlin-Heidelberg-New York, 2010).
[3] J. L. Ramírez Alfonsín, The Diophantine Frobenius Problem. Oxford Lect. Series in Math. and its
Applicat., Vol. 30. (Oxford U.P., New York, 2005).
[4] E. S. Selmer, On a linear Diophantine problem of Frobenius. J. Reine Angew. Math. 293/294 (1977),
1–17.
[5] R. H. Villarreal, Monomial Algebras. (Marcel Dekker, New York–Basel, 2001).
U NIVERSITÄT O SNABRÜCK , FB M ATHEMATIK /I NFORMATIK , 49069 O SNABRÜCK , G ERMANY
E-mail address: [email protected]
| 0math.AC
|
1
Directional Cell Search Delay Analysis for
Cellular Networks with Static Users
arXiv:1709.00779v1 [cs.IT] 4 Sep 2017
Yingzhe Li, François Baccelli, Jeffrey G. Andrews, Jianzhong Charlie Zhang
Abstract
Cell search is the process for a user to detect its neighboring base stations (BSs) and make a
cell selection decision. Due to the importance of beamforming gain in millimeter wave (mmWave)
and massive MIMO cellular networks, the directional cell search delay performance is investigated. A
cellular network with fixed BS and user locations is considered, so that strong temporal correlations
exist for the SINR experienced at each BS and user. For Poisson cellular networks with Rayleigh fading
channels, a closed-form expression for the spatially averaged mean cell search delay of all users is
derived. This mean cell search delay for a noise-limited network (e.g., mmWave network) is proved to
be infinite whenever the non-line-of-sight (NLOS) path loss exponent is larger than 2. For interferencelimited networks, a phase transition for the mean cell search delay is shown to exist in terms of the
number of BS antennas/beams M : the mean cell search delay is infinite when M is smaller than a
threshold and finite otherwise. Beam-sweeping is also demonstrated to be effective in decreasing the
cell search delay, especially for the cell edge users.
I. I NTRODUCTION
Cell search is a critical prerequisite to establish an initial connection between a cellular
user and the cellular network. Specifically, the users will detect their neighboring BSs and
make the cell selection decision during a downlink cell search phase, after which the users
can acquire connections with the network by initiating an uplink random access phase. The
transmissions and receptions during cell search are performed omni-directionally in LTE [1],
but this is unsuitable for mmWave communication [2]–[5] or massive MIMO [6]–[9] due to the
lack of enough directivity gain. By contrast, directional cell search schemes that leverage BS
Y. Li, J. G. Andrews and F. Baccelli are with the Wireless Networking and Communications Group (WNCG), The University
of Texas at Austin (email: [email protected], [email protected], [email protected]). J. Zhang is with
Samsung Research America-Dallas (email: [email protected]). Date revised: September 5, 2017.
2
and/or user beam-sweeping to achieve extra directivity gains, can ensure reasonable cell search
performance [9]–[15]. In this paper, we leverage stochastic geometry [16]–[18] to develop an
analytical framework for the directional cell search delay performance of a fixed cellular network,
where the BS and user locations are fixed over a long period of time (e.g., more than several
minutes). We believe the analytical tools developed in this paper can provide useful insights
into practical fixed cellular networks such as fixed mmWave or massive MIMO broadband
networks [7], [19], [20], or mmWave backhauling networks [2], [21].
A. Related Work
Beam-sweeping is a useful method to improve cell search performance compared to conventional omni-directional cell search for both mmWave and massive MIMO networks. Specifically,
mmWave links generally require high directionality with large antenna gains to overcome the
high isotropic path loss of mmWave propagation. As a result, in mmWave networks, applying
beam-sweeping for cell search not only provides sufficient signal-to-noise ratio (SNR) to create
viable communications, but also facilitates beam alignment between the BS and users [11]–
[13], [22]–[24]. The directional cell search delay performance of mmWave systems has been
investigated in [12], [22], [23] from a link level perspective, and in [13], [24] from a system level
perspective. In particular, [13] and [24] consider the user and mmWave BS locations are fixed
within an initial access cycle, but independently reshuffled across cycles. This block coherent
scenario is fundamentally different from that of a fixed network. For a massive MIMO system,
the BSs can achieve an effective power gain that scales with the number of antennas if the
channel state information (CSI) is known at the BSs [9]. However, since such an array gain is
unavailable for cell search operations due to the lack of CSI, the new users may be unable to join
the system using the traditional omnidirectional cell search [9], [14], [15]. In order to overcome
this issue, [15] has proposed open-loop beamforming to exhaustively sweep through BS beams
for cell search. This design has been implemented and verified on a sub-6 GHz massive MIMO
prototype [15], but the analytical directional cell search performance has not been investigated
for fixed cellular networks from a system level perspective.
Due its analytical tractability for cellular networks [16]–[18], stochastic geometry is a natural
candidate for analyzing the directional cell search delay in such fixed cellular networks. In
particular, stochastic geometry has already been widely used to investigate fixed Poisson network
3
performance through the local delay metric [16], [25]–[28], which characterizes the number of
time slots needed for the SINR to exceed a certain SINR level. In [16], [25], the local delay for
fixed ad hoc networks was found to be infinite under several standard scenarios such as Rayleigh
fading with constant noise. A new phase transition was identified for the interference-limited
case in terms of the mean local delay: the latter is finite when certain parameters are above a
threshold, and infinite otherwise. The local delay for noise-limited and interference-limited fixed
Poisson networks was also investigated in [26]–[28], where it is shown that power control is an
efficient method to ensure a finite mean local delay. These previous works mainly focused on
omni-directional communications.
B. Contributions
In this work, we analyze the cell search delay in fixed cellular networks with a directional cell
search protocol. We consider a time-division duplex (TDD) cellular system, where system time
is divided into different initial access (IA) cycles. Each cycle starts with the cell search period,
wherein BSs apply a synchronous beam-sweeping pattern to broadcast the synchronization
signals. A mathematical framework is developed to derive the exact expression for the mean
cell search delay, which quantifies the spatial average of the individual mean cell search delays
perceived by all users. The main contributions of this paper are summarized as follows.
Beam-sweeping is shown to reduce the number of IA cycles needed to succeed in cell
search. For any arbitrary BS locations and fading distribution, the mean number of initial access
cycles required to succeed in cell search is proved to be decreasing when the number of BS
antennas/beams is multiplied by a factor m > 1.
An exact expression for the mean cell search delay is derived for Poisson point process
(PPP) distributed BSs and Rayleigh fading channels. This expression is given by an infinite
series, based on which the following observations are obtained:
•
Under the noise limited scenario (e.g., mmWave networks), we prove that as long as the
path loss exponent for NLOS path is larger than 2, the mean cell search delay is infinite,
irrespective of the BS transmit power and the BS antenna/beam number.
•
Under the interference limited scenario (e.g., massive MIMO networks in sub-6 GHz bands),
there exists a phase transition for mean cell search delay in terms of the BS antenna/beam
number M. Specifically, the mean cell search delay is infinite when M is smaller than a
4
critical value and finite otherwise. This fact was never observed in the literature to the best
of our knowledge.
Cell search delay distribution is numerically evaluated. The conditional mean cell search
delay of a typical user given its nearest BS distance is derived for PPP distributed BSs and
Rayleigh fading channels. The distribution of this conditional mean cell search delay is also
numerically evaluated, and we observe that the cell search delay distribution is heavy-tailed. We
also show that increasing the number of BS antennas/beams can significantly reduce the cell
search delay for cell edge users.
Overall, this paper has shown that in fixed networks the mean cell search delay could be very
large due to the temporal correlations induced by common randomness. As a result, for fixed
cellular networks, system parameters including the number of BS antennas and/or BS intensity
need to be carefully designed for reasonable cell search delay performance to be achieved.
II. S YSTEM M ODEL
In this work, we consider a cellular system that has carrier frequency fc and total system
bandwidth W . The BS transmit power is denoted by Pb , and the total thermal noise power
is denoted by σ 2 . In the rest of this section, we present the proposed directional cell search
protocol, location models, propagation assumptions, and the performance metrics.
A. Directional Cell Search Protocol
We consider a TDD cellular system as shown in Fig. 1, where system time is divided into
different initial access cycles with period T , and where τ denotes the OFDM symbol period.
Initial access refers to the procedures that establish an initial connection between a user and the
cellular network. It consists of two main steps: cell search on the downlink and random access
(RA) on the uplink. Specifically, by detecting the synchronization signals broadcasted by BSs
during cell search, a user can determine the presence of its neighboring BSs and make the cell
selection decision. Then the user can initiate the random access process to its desired serving BS
by transmitting a RA preamble through the shared random access channel, and it is successfully
connected to the network if the BS can decode the RA preamble without any collision. The
main focus of this work is the cell search performance, while the random access performance
will be incorporated in our future work.
5
Each BS is equipped with a large dimensional antenna array with M to support highly
directional communications. For analytical tractability, the actual antenna pattern is approximated
by a sectorized beam pattern, where the antenna gain is constant within the main lobe. In addition,
we assume a 0 side lobe gain for the BS, which is a reasonable approximation because the BS
uses a large dimensional antenna array with narrow beams, possibly with a front-to-back ratio
larger than 30 dB [29]. Each BS supports analog beamforming with a maximum of M possible
BF vectors, where the m-th (1 ≤ m ≤ M) beamforming (BF) vector corresponds to the mainm
lobe, which has antenna gain M, and covers a sector area with angle [2π m−1
, 2π M
) [30]. Each
M
user is assumed to have a single omni-directional antenna with unit antenna gain [15], [31].
In the cell search phase, each BS sweeps through all M transmit beamforming directions to
broadcast the synchronization signals, and each user is able to detect a BS with sufficiently small
miss detection probability (such as 1%) if the signal-to-interference-plus-noise ratio (SINR) of
the synchronization signal from that BS exceeds Γcs . All BSs transmit synchronously using the
same beam direction during every symbol, and the cell search delay within each IA cycle is
therefore Tcs = M × τ . When every BS transmits using the m-th (1 ≤ m ≤ M) BF direction,
the typical user can only receive from the BSs located inside the “BS sector”
2πm
2π(m − 1)
+ π,
+π ,
S o,
M
M
(1)
where we define the infinite sector domain centered at u ∈ R2 by:
S(u, θ1 , θ2 ) = {x ∈ R2 , s.t., ∠(x − u) ∈ [θ1 , θ2 )}.
(2)
There are M such non-overlapping BS sectors during cell search, with the j-th (1 ≤ j ≤ M)
sector being S(o, 2π(j−1)
, 2πj
). We say a BS sector is detected during cell search if the typical
M
M
user is able to detect the BS that provides the smallest path loss (i.e., the closest BS) inside
this sector, where the path loss can be estimated from the beam reference signals [19]. After
cell search, the typical user selects the BS with the smallest path loss among all the detected
BS sectors as its serving BS. For simplicity, we neglect the scenario where the BS providing
the smallest path loss inside a BS sector is in deep fade and unable to be detected, while some
other BSs can be detected in the same sector. Such a scenario does not change the fundamental
trends regarding the finiteness of the mean cell search that will be detailed in Section III (e.g.
Theorem 3), but the corresponding analysis is significantly more complicated.
6
Initial access cycle n
Initial access cycle n+1
time
......
......
CS period RA period
Data transmission period
CS period RA period
DL beam
pair 2
DL beam
pair 2
...
...
...
...
DL beam
pair 1
τ
Data transmission period
...
...
...
...
DL beam
pair M
DL beam
pair 1
τ
DL beam
pair M
Fig. 1: Illustration of two initial access cycles and the timing structure.
TABLE I: Notation and Simulation Parameters
Symbol
Φ, λ
Φu , λu
Pb , Pu
fc , B
W
M
αL , αN
CL , CN
Rc
Γcs , Γra
τ
T
SM (i)
{xi0 }M
i=1
R0
Lcs (M, λ)
Lcs (R0 .M, λ)
Dcs (M, λ)
B(x, r) (B o (x, r))
Definition
BS PPP and intensity
User PPP and intensity
BS and user transmit power
Carrier frequency and system bandwidth
Total thermal noise power
Number of BS antennas and BF directions supported at each BS
Path loss exponents for dual-slope model
Path loss at close-in reference distance for dual-slope model
Critical distance for dual-slope path loss model
SINR threshold to detect synchronization signal and RA preamble
OFDM symbol period
Initial access cycle period
, 2π Mi )}
i-th BS sector, i.e., SM (i) = {x ∈ R2 , s.t., ∠x ∈ [2π (i−1)
M
BS providing the smallest path loss to the typical user inside SM (i)
Distance from typical user to its nearest BS
Number of IA cycles to succeed in cell search
Mean number of IA cycles to succeed in cell search conditionally on R0
Cell search delay
Closed (open) ball with center x and radius r
Simulation Value
λ = 100 BS/km2
λu = 1000 users/km2
Pb = 30 dBm, Pu = 23 dBm
(fc , B) = (73, 1) GHz, (2, 0.2) GHz
−174 dBm/Hz + 10 log10 (B)
(αL , αN ) = (2.1, 3.3), (2.5, 2.5)
(CL , CN ) = (69.71, 69.71) dB,
(38.46, 38.46) dB
50m
(Γcs , Γra ) = (−4, −4) dB
14.3 µs, 71.4 µs
20 ms, 100 ms
B. Spatial Locations and Propagation Models
The BS locations are assumed to be a realization of a stationary point process Φ = {xi }i with
intensity λ. The user locations are modeled as a realization of a homogeneous PPP with intensity
λu , which is denoted by Φu = {ui }i . In this paper, a fixed network scenario is investigated where
the BS locations are fixed, and the users are either fixed or move with very slow speed such as
a pedestrian speed (e.g., less than 1 km/h) . As a result, the BS and user locations appear to be
fixed across different initial access cycles. This is fundamentally different from the high mobility
scenario investigated in [13], [24], which assumes the BS and user PPPs are independently re-
7
shuffled across every initial access cycles.
Without loss of generality, we can analyze the performance of a typical user u0 located at
the origin. This is guaranteed by Slivnyak’s theorem, which states that the property observed by
′
the typical point of a PPP Φ is the same as that observed by the point at origin in the process
′
Φ ∪ {o} [32], [33].
A dual-slope, non-decreasing path loss function [34] is adopted, where the path loss for a link
with distance r is given by:
C r αL , if r < R ,
L
C
l (r) =
CN r αN , if r ≥ RC .
(3)
The dual slope path loss model captures the dependency of the path loss exponent on the link
distance for various network scenarios, such as ultra-dense [34] and mmWave networks [35].
In particular, (3) is referred to as the LOS ball blockage model for mmWave networks [34],
wherein αL and αN represent the LOS and NLOS path loss exponents, and CL and CN represent
the path loss at a close-in reference distance (e.g., 1 meter). We focus on the scenario where
αN ≥ max(αL , 2). If αL = αN = α and CL = CN = C, the dual slope path loss model reverts
to the standard single-slope path loss model.
Due to the adopted antenna pattern for BSs, the directivity gain between BS and user is M
when the BS beam is aligned with the user, and 0 otherwise. The fading effect for every BSuser link is modeled by an i.i.d. random variable, whose complementary cumulative distribution
function (CCDF) is a decreasing function G(·) with support [0, ∞). In addition, we assume the
IA cycle length is such that the fading random variables for a given link are also i.i.d. across
different cycles.
C. Performance Metrics
The main performance metrics investigated in this work are the number of IA cycles, and
the corresponding cell search delay for the typical user to discover its neighboring BSs and
determine a potential serving BS. Without loss of generality, the IA cycle 1 in Fig. 1 represents
the first IA cycle of the typical user. Denote by eM (n) the success indicator for cell search of
IA cycle n. The number of IA cycles for the typical user to succeed in cell search is therefore:
Lcs (M, λ) = inf{n ≥ 1 : eM (n) = 1}.
(4)
8
Since analog beamforming is adopted at each BS, the cell search delay is defined as follows:
Dcs (M, λ) = (Lcs (M, λ) − 1)T + Mτ.
(5)
Finally, Table I summarizes the notation, the definitions and the system parameters that will
be used in the rest of this paper1 .
III. A NALYSIS
FOR
M EAN C ELL S EARCH D ELAY
In this section, the mean cell search delay performance for the typical user is investigated,
which corresponds to the cell search delay under the Palm expectation with respect to the user
PPP Φu (i.e., E0Φu [Dcs (M, λ)]). In fact, the Palm expectation can also be understood from its
ergodic interpretation, which states that for any user u ∈ Φu with cell search delay Dcs (u, M, λ),
the following relation is true:
X
1
1u∈B(0,n) Dcs (u, M, λ).
n→∞ Φu (B(0, n))
k
E0Φu [Dcs (M, λ)] = lim
(6)
Therefore, the mean cell search delay of the typical user can also be understood as the spatial
average of the individual cell search delays among all the users. For notational simplicity, we
will use E in the rest of this paper to denote the Palm expectation under the user PPP Φu .
A. Cell Search Delay Under General BS Deployment and Fading Assumptions
In this part, we first investigate the cell search delay under a general BS location model (not
necessarily PPP) and fading distribution. According to Section II, the BS and user locations
are fixed, and the fading variables for every link are i.i.d. across IA cycles. Therefore, given
the BS process Φ, the cell search success indicators for different IA cycles {eM (n)} form an
i.i.d. Bernoulli sequence of random variables. The cell search success probability is denoted by
πM (Φ) = E [eM (1)|Φ].
Since each BS sector can be independently detected given Φ, and cell search is successful if
at least one BS sector is detected. Conditionally on Φ, the cell search success probability for
1
For the symbols with two simulation values, the first one is for the noise limited scenario, and the second one is for the
interference limited scenario, which will be detailed in Section IV.
9
every IA cycle is therefore:
πM (Φ) = 1 −
M
Y
[1 − E [êM (i)|Φ]] ,
(7)
i=1
where êM (i) denotes the indicator that the BS providing the smallest path loss inside BS sector
i is detected. Specifically, if we denote by SM (i) , S(o, 2π(i−1)
, 2πi
) the BS sector i, xi0 the
M
M
BS providing the smallest path loss to the typical user in Φ ∩ SM (i), and by {Fji } the fading
random variables from BSs in SM (i) to the typical user, we have:
F0i /l (kxi0 k)
P
> Γcs Φ
E [êM (i)|Φ] = P
Fji /l (kxij k) + W/P M
xij ∈Φ∩SM (i)\{xi0 }
= E G Γcs l (kxi0 k)(
X
Fji /l (kxij k)
+ W/P M)
xij ∈Φ∩SM (i)\{xi0 }
Φ ,
(8)
where the expectation in (8) is taken with respect to the i.i.d. fading random variables {Fji }.
In the following theorem, we derive the mean number of IA cycles for the typical user to
succeed in the cell search under the Palm expectation of the user process.
Theorem 1: The mean number of IA cycles needed for the typical user to succeed in cell
search is given by:
E[Lcs (M, λ)|Φ] =
1
1−
"
E[Lcs (M, λ)] = EΦ
QM
1−
i=1
[1 − E [êM (i)|Φ]]
,
1
QM
i=1
[1 − E [êM (i)|Φ]]
(9)
#
.
(10)
Proof: The first part can be proved by the fact that given Φ, Lcs (M, λ) has a geometric distribution with success probability πM (Φ); while the second part follows by taking the expectation
of (9) with respect to Φ.
Remark 1: Since E [êM (i)|Φ] > 0 according to (8), the conditional mean cell search delay
E[Lcs (M, λ)|Φ] will be finite almost surely. However, the overall spatial averaged mean cell
search delay with respect to (w.r.t.) the BS PPP Φ (i.e. E[Lcs (M, λ)]) could be infinite under
certain network settings. This will be detailed in the next subsection.
A lower bound and an upper bound to E[Lcs (M, λ)] can be immediately obtained from (10),
which are provided in the following remarks.
Remark 2: By applying Jensen’s inequality to the positive random variable X and the function
10
f (x) = x1 , we get that E[ X1 ] ≥
1
.
E[X]
Thus
E[Lcs (M, λ)] ≥
1
1−E
i,
i=1 [1 − E [êM (i)|Φ]]
hQ
M
(11)
where the equality holds when the BS PPP is independently re-shuffled across different IA cycles
from the typical user’s perspective, which coincides with the high mobility scenario considered
in [13], [24].
Remark 3: If we denote by x0 the BS providing the smallest path loss to the typical user, and
Q
∗
i∗ the index for the BS sector that contains x0 , then M
j=1 [1 − E [êM (j)|Φ]] ≤ 1 − E [êM (i )|Φ].
Therefore, an upper bound to E[Lcs (M, λ)] is given by:
1
E[Lcs (M, λ)] ≤ E
.
E [êM (i∗ )|Φ]
(12)
Based on Theorem 1, we can prove the following relation between the BS antenna/beam
number M and the mean cell search delay.
Lemma 1: Given a realization of BS locations Φ, the mean number of IA cycles to succeed
in cell search is such that E[Lcs (M2 , λ)|Φ] < E[Lcs (M1 , λ)|Φ], if M2 = mM1 with m being an
integer larger than 1.
Proof: Since M2 = mM1 , we know that SM1 (i) =
Sm
j=1 SM2 ((i − 1)m + j)
for 1 ≤ i ≤ M1 .
Denote by xi0 the BS providing the smallest path loss to the typical user inside Φ ∩ SM1 (i), and
assume xi0 ∈ Φ ∩ SM2 ((i − 1)m + j0 ) for some j0 ∈ [1, m]. Due to the facts that M2 > M1 ,
SM2 ((i − 1)m + j0 ) ( SM1 (i), and since G(·) is a decreasing function, we get from (8) that
E [êM1 (i)|Φ] < E [êM2 ((i − 1)m + j0 )|Φ]. Also note that E [êM2 ((i − 1)m + j)|Φ] > 0 for ∀j 6=
j0 according to (8), we hence have:
m
Y
[1 − E [êM2 ((i − 1)m + j) |Φ]] < 1 − E [êM2 (i)|Φ] .
j=1
Thus the cell search success probability for the typical IA cycle satisfies:
πM2 (Φ) = 1 −
M2
Y
[1 − E [êM2 (i)|Φ]]
i=1
=1−
M1
m
Y
Y
i=1
j=1
!
1 − E êM2 ((i − 1)m + j) Φ
(13)
11
>1−
M1
Y
[1 − E [êM1 (i)|Φ]] = πM1 (Φ).
(14)
i=1
Finally the proof is concluded by applying Theorem 1.
Lemma 1 shows that for all BS location models and fading distributions, the conditional
number of IA cycles for cell search to succeed decreases when the number of BS antenna/beams
is multiplied by an integer m > 1, or equivalently when the BS beamwidth is divided by m.
This result also implies that E[Lcs (M2 , λ)] ≤ E[Lcs (M1 , λ)] if M2 = mM1 .
Remark 4: In fact, Lemma 1 cannot be further extended. If M2 > M1 but M2 /M1 is not an integer, there will always exist special constructions of BS deployments such that E[Lcs (M2 , λ)|Φ] >
E[Lcs (M1 , λ)|Φ].
For the rest of this section, we investigate the mean cell search delay under several specific
network scenarios.
B. Mean Cell Search Delay in Poisson Networks with Rayleigh Fading
In this part, the BS locations are assumed to form a homogeneous PPP with intensity λ, and
the fading random variables are exponentially distributed with unit mean (i.e., G(x) = exp(−x)).
Due to its high analytical tractability, this network setting has been widely adopted to obtain the
fundamental design insights for conventional macro cellular networks [17], ultra-dense cellular
networks [34], and even mmWave cellular networks2 [35], [36].
Due to the PPP assumption for BSs, and the fact that different BS sectors are non-overlapping,
every BS sector can therefore be detected independently with the same probability. Since the
path loss function l (r) is non-decreasing, the BS that provides the minimum path loss to the
typical user inside the i-th BS sector Φ ∩ SM (i) (i.e., xi0 ) is the closest BS to the origin. The
angle of xi0 is uniformly distributed within [2π(i − 1)/M, 2πi/M), and the CCDF for the norm
of xi0 can be derived as follows:
P(kxi0 k
≥ r) = P
min
x∈Φ∩SM (i)
kxk ≥ r
= exp(−
λπr 2
),
M
(15)
where the second equality follows from the void probability for PPPs. Therefore, the probability
2
The SINR and rate trends for mmWave networks under Rayleigh fading and PPP configured BSs have been shown to be
close to more realistic fading assumptions, such as the Nakagami fading or log-normal shadowing [11].
12
distribution function (PDF) for kxi0 k is given by:
fkxi0 k (r) =
λπr 2
2λπr
exp(−
).
M
M
(16)
By applying Φ ∼ PPP(λ) and G(x) = exp(−x) into (8), the conditional detection probability
for the i-th BS sector is given by:
i
E [êM (i)|Φ] = E exp −Γcs l (kx0 k)
X
Fji /l (kxij k)
+ W/P M
xij ∈Φ∩SM (i)\{xi0 }
W Γcs l (kxi0 k)
= exp −
E
PM
W Γcs l (kxi0 k)
= exp −
PM
Y
exp
xij ∈Φ∩SM (i)\{xi0 }
(a)
Y
xij ∈Φ∩SM (i)\{xi0 }
Φ
−Γcs l (kxi0 k)Fji /l (kxij k)
1
, FM (i, Φ), (17)
1 + Γcs l (kxi0 k)/l (kxij k)
where step (a) is obtained by taking the expectation w.r.t. the fading random variables.
Theorem 2: If Φ ∼ PPP(λ), and the fading variables are exponentially distributed with unit
mean, the mean number of cycles for cell search to succeed is:
E[Lcs (M, λ)] =
∞
X
AM
j ,
(18)
j=0
where Aj = E[(1 − FM (1, Φ))j ] is given by:
Aj =
Z
0
×
j
∞ X
Z
2πλ ∞
1
W kΓcs l (r1 )
j
exp −
1−
rdr
exp −
(−1)
k
P
M
M
(1
+
Γ
k
cs l (r1 )/l (r))
r
1
k=0
k
2λπr1
λπr12
exp(−
)dr1 .
M
M
(19)
Proof: By substituting (17) into Theorem 1, we obtain:
1
E[Lcs (M, λ)] = E
Q
1− M
i=1 [1 − FM (i, Φ)]
X
j
∞
M
Y
(a)
=E
[1 − FM (i, Φ)]
j=0
i=1
Y
j
∞
M
(b) X
=
E
[1 − FM (i, Φ)]
j=0
i=1
13
j M
∞
X
=
E 1 − FM (1, Φ)
,
(c)
(20)
j=0
where step (a) is derived from the fact that
1
1−x
=
P∞
j
j=0 x
for 0 ≤ x < 1, step (b) follows
from the monotone convergence theorem, and step (c) is because the events for BS sectors to
be detected are i.i.d. for PPP distributed BSs. Furthermore, we can compute Aj as follows:
j
E 1 − FM (1, Φ)
j
2λπr1
λπr12
1
=
E 1 − FM (1, Φ) x0 = (r1 , 0)
exp(−
)dr
M
M
0
Z ∞X
j
2λπr1
λπr12
(a)
x10
k
k j
EΦ (FM (1, Φ)) Φ ∩ SM (1) ∩ B(o, r1 ) = 0
=
(−1)
exp(−
)dr
k
M
M
0
k=0
Z ∞X
j
Y
1
W kΓcs l (r1 )
(b)
k j
E exp −
=
(−1)
PM
(1 + Γcs l (r1 )/l (kxij k))k
k
0
i
c
k=0
Z
∞
xj ∈Φ∩SM (i)∩B (o,r1 )
×
2λπr1
λπr12
exp(−
)dr,
M
M
(21)
x1
where EΦ0 [·] in (a) denotes the expectation under the Palm distribution at BS x10 ; and step (b) is
derived from Slivnyak’s theorem. Finally the proof can be concluded by applying the probability
generating functional (PGFL) of PPPs [32] to (21).
Remark 5: Theorem 2 can be interpreted as E[Lcs (M, λ)] =
P∞
j=0
P(Lcs (M, λ) > j), with
AM
j in (18) representing the probability that the BS sectors are not detected within j IA cycles,
i.e., P(Lcs (M, λ) > j).
Theorem 2 provides a series representation of the expected number of IA cycles to succeed
cell search. However, it is unclear from Theorem 2 whether E[Lcs (M)] is finite or not. In the
following, we will investigate the finiteness of E[Lcs (M, λ)] under two representative network
scenarios, namely the noise limited scenario and the interference limited scenario.
1) Noise limited Scenario: In the noise limited scenario, we assume the noise power dominates
the interference power (or interference power is perfectly canceled), such that only noise power
needs to be taken into account. Compared to conventional micro-wave cellular networks that
operate in sub-6 GHz bands, mmWave networks have much higher noise power due to the wider
bandwidth, and the interference power is much smaller due to the high isotropic path loss in
mmWave. As a result, mmWave cellular networks are typically noise limited, especially when
14
the carrier frequency and system bandwidth are high enough (e.g. 73 GHz carrier frequency with
2 GHz bandwidth) [35], [37].
Since the interference power is zero under the noise limited scenario, Theorem 2 becomes:
j
M
∞ Z ∞
X
W Γcs l (r1 )
2λπr1
λπr12
E[Lcs (M, λ)] =
1 − exp −
exp(−
)dr1
.
(22)
PM
M
M
0
j=0
Through the change of variable (v = λr 2 ), (22) becomes
!
p
M
∞ Z ∞
j
X
W Γcs l ( (v/λ))
2π
πv
exp(− )dv
,
1 − exp −
E[Lcs (M, λ)] =
P
M
M
M
0
j=0
(23)
which shows that E[Lcs (M, λ)] is non-increasing as the BS intensity λ increases, i.e., network
densification helps in reducing the number of IA cycles to succeed in cell search.
In the next two lemmas, we prove that the finiteness of E[Lcs (M, λ)] depends on the NLOS
path loss exponent αN , and that a phase transition for E[Lcs (M, λ)] happens when αN = 2.
Theorem 3: Under the noise limited scenario, for any finite number of BS antennas/beams
M and BS intensity λ, E[Lcs (M, λ)] = ∞ whenever the NLOS path loss exponent αN > 2.
Proof: Given the number of BS antennas/beams M and for any arbitrarily large positive
value v0 with v0 > Rc , we can re-write (22) to obtain the following lower bound on E[Lcs (M)]:
j
M
∞ Z ∞
X
2λπr1
λπr12
W Γcs l (r1 )
exp(−
)dr1
1 − exp −
PM
M
M
0
j=0
j
M
∞ Z ∞
(a) X
W Γcs CN r1αN
2λπr1
λπr12
≥
1 − exp −
exp(−
)dr1
P
M
M
M
v
0
j=0
j Z ∞
M
∞
X
λπr12
2λπr1
W Γcs CN v0αN
exp(−
)dr1
>
1 − exp −
PM
M
M
v0
j=0
jM
∞
X
W Γcs CN v0αN
exp(−λπv02 )
=
1 − exp −
P
M
j=0
exp(−λπv02 )
1 − (1 − exp(−W Γcs CN v0αN /P M))M
(b) 1
v0 →∞
≥ exp W Γcs CN v0αN /P M − λπv02 −→
∞,
M
=
(24)
where l (r1 ) = CN r1αN in step (a) because r1 ≥ v0 > Rc . Step (b) follows from the fact that for
any 0 ≤ x ≤ 1 and M ∈ N+ , we have: (1 − x)M + xM ≥ 1, thus
1
1−(1−x)M
≥
1
.
xM
Note that
15
since αN > 2, (24) goes to infinity when v0 goes to infinity, which completes the proof.
According to Lemma 3, the expected cell search delay is infinity whenever αN > 2, which
cannot be alleviated by BS densification (i.e., increase λ), or using a higher number of BS
antennas (i.e., increase M). The reason can be explained from (24), which shows that due to
the PPP-configured BS deployment, the typical user could be located at the “cell edge” with
its closest BS inside every BS sector farther than some arbitrarily large distance v. There is a
exp(−λπv 2 ) fraction of such cell edge users, and the corresponding number of IA cycles required
for them to succeed in cell search is at least exp(Cv αN ) for some C > 0. Therefore, the expected
cell search delay averaged over all the users will ultimately be infinite when αN > 2. From a
system level perspective, this indicates that for noise limited networks with αN > 2, there will
always be a significant fraction of cell edge users requiring a very large number of IA cycle to
succeed cell search, so that the spatial averaged cell search delay perceived by all users will be
determined largely by these cell edge users, which explains why an infinite mean cell search
delay is observed.
Theorem 4: Under the noise limited scenario with NLOS path loss exponent αN = 2, the
expected number of IA cycles to succeed in cell search E[Lcs (M, λ)] = ∞ if the BS density λ
and the BS antenna/beam number M satisfy λM <
Γcs CN W
,
Pπ
Γcs CN W
,
Pπ
and E[Lcs (M, λ)] < ∞ if λM >
Γcs CN W
.
Pπ
Γcs CN W
. In
Pπ
i.e., the phase transition for E[Lcs (M, λ)] happens at (λ∗ , M ∗ ) with λ∗ M ∗ =
Proof: If αN = 2, it is clear from (24) that E[Lcs (M, λ)] = ∞ if λM <
addition, we can simplify the upper bound to E[Lcs (M, λ)] from Remark 3 under the noise
limited scenario, which is given as follows:
E[Lcs (M, λ)]
Z ∞
(a)
W Γcs l (r0 )
λ2πr0 exp(−λπr02 )dr0
≤
exp
PM
0
Z ∞
Z Rc
W Γcs CN r0αN
W Γcs CL r0αL
2
exp
λ2πr0 exp(−λπr0 )dr0 +
λ2πr0 exp(−λπr02 )dr0
exp
=
P
M
P
M
Rc
0
Z ∞
αL
W Γcs CL Rc
W Γcs CN r0αN
2
< exp
exp
1 − exp(−λπRc ) +
λ2πr0 exp(−λπr02 )dr0 ,
PM
P
M
Rc
(25)
where (a) is obtained by applying the noise limited assumption to (17), and noting that the BS
providing the smallest path loss among all the BSs is the closest BS of Φ to the origin. Since
16
αN = 2, it can be observed from (25) that E[Lcs (M)] is guaranteed to have a finite mean if
λM >
Γcs CN W
.
Pπ
We can observe from the proof of Lemma 4 that for any arbitrarily large distance r0 , there
is a fraction exp(−λπr02 ) of cell edge users whose nearest BSs are farther than r0 , and the
number of IA cycles for these edge users to succeed cell search scales as exp(
W Γcs CN r02
).
PM
As
a result, if the BS deployment is too sparse or the number of BS antennas/beams is such that
λM <
Γcs CN W
,
Pπ
the cell search delay averaged over all the users becomes infinity due to cell
edge users. By contrast, with network densification, the fraction of cell edge users with poor
signal power is reduced, and the average cell search delay can be reduced to a finite mean value
whenever λM >
Γcs CN W
Pπ
. A similar behavior happens when the BSs are using more antennas
to increase the SNR for the cell edge users.
To summarize, for the noise limited scenario such as a mmWave network, the mean cell search
delay is infinite whenever the NLOS path loss exponent αN > 2, which is typically the case.
However, for the special case with NLOS path loss exponent αN = 2, the mean cell search
delay could switch from infinity to a finite value through careful network design, such as BS
densification or adopting more BS antennas.
2) Interference limited Scenario: In the interference limited scenario, the noise power is
dominated by the interference power, so that we can assume W = 0. For example, a massive
MIMO network that operates in the sub-6 GHz bands is typically interference limited [6]. In
this part, we investigate the cell search delay in an interference-limited network with a standard
single slope path loss function l (r) = Cr α , which is suitable for networks with sparsely deployed
BSs as opposed to ultra-dense networks [34].
First, we prove that Theorem 2 can be greatly simplified under this interference limited
scenario.
Lemma 2: Under the interference limited scenario, the expected number of initial access
cycles required to succeed in cell search is given by:
E[Lcs (M)] =
j
∞ X
X
j=0
k=0
(−1)k
1+2
R +∞
1
j
k
(1 − (1 + Γcs /r α )−k )rdr
M
.
(26)
Proof: By substituting W = 0 and l (r) = Cr α into (19), Aj defined in (19) can be further
17
simplified as follows:
j
∞ X
Z
2πλ ∞
1
j
2λπr1
λπr12
exp −
1−
rdr
exp(−
)dr1
(−1)
Aj =
α
α k
k
M
(1
+
Γ
M
M
cs r1 /r )
r
0
1
k=0
Z ∞
Z
j
X
2πλr12 ∞
1
λπr12
2λπr1
k j
exp −
(−1)
=
rdr
1−
exp(−
)dr1
k
M
(1 + Γcs /r α )k
M
M
0
1
k=0
j
X
(−1)k kj
,
=
R +∞
α )−k )rdr
1
+
2
(1
−
(1
+
Γ
/r
cs
1
k=0
Z
k
which completes the proof.
Remark 6: We can observe from Lemma 2 that E[Lcs (M)] does not depend on the BS
intensity λ under the interference limited scenario. This is because the increase and decrease of
the signal power can be perfectly counter-effected by the corresponding increase and decrease
of the interference power [17]. Another immediate observation from Lemma 2 is that Aj is
independent of the number of BS antennas M for ∀j. Since Aj ≤ 1 according to its definition
in Theorem 2, E[Lcs (M)] is therefore monotonically non-increasing with respect to M, which
is a stronger observation than Lemma 1.
Remark 7: If the path loss exponent α = 2, it can be proved from Lemma 2 that E[Lcs (M)] =
∞ for ∀M. This is mainly because the interference power will dominate the signal power when
α = 2, so that the coverage probability is 0 for any SINR threshold Γcs .
If α > 2, we can prove that there may exist a phase transition for E[Lcs (M)] in terms of the
BS beam number M. In order to show that, we first apply Remark 3 and obtain a sufficient
condition to guarantee the finiteness for E[Lcs (M)].
Lemma 3: Under the interference limited scenario with path loss exponent α > 2, the expected
number of IA cycles to succeed cell search is such that E[Lcs (M)] < ∞ if the number of BS
beams is such that M >
2Γcs
,
α−2
where Γcs denotes the detection threshold for a BS. In particular,
when M = 1, i.e., the BS is omni-directional, E[Lcs (1)] is finite if and only if α > 2Γcs + 2.
Proof: Denote by x0 the closest BS to the origin among Φ, and SM (i∗ ) the BS sector
containing x0 , we can obtain an upper bound to E[Lcs (M)] by substituting (17) and W = 0 into
Remark 3 as follows:
E[Lcs (M)] ≤ E
Y
1 + Γcs l (kx0 k)/l (kxj k)
xj ∈Φ∩SM (i∗ )\{x0 }
18
(a)
=
Z
∞
0
E
∞
Y
1 + Γcs l (r0 )/l (kxj k)
xj ∈Φ∩SM (i∗ )∩B c (o,r0 )
2λπr0 exp(−λπr02 )dr0
Z
2πλΓcs ∞ l (r0 )r
=
exp
dr 2λπr0 exp(−λπr02 )dr0
M
l
(r)
0
r0
Z ∞
2Γcs
(c)
v dv
=
exp − 1 −
M(α − 2)
0
∞,
cs
if M ≤ 2Γ
,
α−2
=
M
(α−2)
, if M > 2Γcs ,
(b)
Z
M (α−2)−2Γcs
(27)
α−2
where (a) is obtained by noting that x0 is the closest BS to the origin, (b) follows from the
PGFL for the PPP3 , and (c) is derived through change of variables (i.e. v = λπr02 ). It can be
observed that (27) is finite whenever M >
2Γcs
,
α−2
which is a sufficient condition for the finiteness
of E[Lcs (M)]. In particular, the equality holds in the first step of (27) when M = 1. As a result,
E[Lcs (1)] is finite if and only if α > 2Γcs + 2.
According to Lemma 2 and Lemma 3, the number of IA cycles to succeed in cell search (i.e.,
E[Lcs (M)]) may have a phase transition in terms of the number of BS beams M, depending on
the relation between the path loss exponent α and the detection threshold Γcs . This is detailed
in the following theorem.
Theorem 5: The number of IA cycles to succeed in cell search for the interference limited
networks satisfy the following:
•
If α > 2 + 2Γcs , E[Lcs (M)] < ∞ for the omni-directional BS antenna case, i.e., M = 1.
By the monotonicity of E[Lcs (M)] with respect to M, E[Lcs (M)] is guaranteed to be finite
for any M ≥ 1.
•
If α ≤ 2 + 2Γcs , E[Lcs (M)] = ∞ for M = 1, and E[Lcs (M)] < ∞ if M >
2Γcs
.
α−2
Therefore,
cs
according to the monotonicity of E[Lcs (M)], there exists a phase transition at M ∗ ∈ [2, 2Γ
],
α−2
such that E[Lcs (M)] = ∞ for M ≤ M ∗ , and E[Lcs (M)] < ∞ for M > M ∗ . In particular,
E[Lcs (M)] = ∞ for ∀M if α = 2, which means M ∗ = ∞.
The path loss exponent α depends on the propagation environment, and α = 2 corresponds to
a free space LOS scenario; while α increases as the environment becomes relatively more lossy
and scatter-rich, such as urban and suburban areas. In addition, the SINR detection threshold Γcs
3
Note that [38, Theorem 4.9] does not directly apply to the PGFL calculation here since f (x) = 1+Γcs l (r0 )/l (x) is larger than
1. However, we can use dominated convergence theorem
to prove that for PPP Φ with
the PGFL result
R
R
Q intensity measure Λ(·),
still holds if function f (x) satisfies f (x) ≥ 1 and R2 (f (x) − 1)Λ(dx) < ∞, i.e. E[ xi ∈Φ f (xi )] = exp( R2 (f (x) − 1)Λ(dx).
19
depends on the receiver decoding capability, which is typically within −10 dB and 0 dB [12].
Theorem 5 shows that in a lossy environment with α > 2 + 2Γcs , the typical user can detect
a nearby BS in a finite number of IA cycles on average. This is mainly because the relative
strength of the useful signal with respect to the interfering signals is strong enough. However,
when α ≤ 2 + 2Γcs , E[Lcs (M)] could be infinite due to the significant fraction of cell edge
users that have poor SIR coverage and therefore require a very high number of IA cycles to
succeed in cell search. Specifically, when M is very small (e.g., M = 1), the edge user is subject
to many strong nearby interferers inside every BS sector, so that the corresponding cell search
delay averaged over all users becomes infinity. However, as M increases, the BS beam sweeping
will create enough angular separation so that the nearby BSs to the edge user could locate in
different BS sectors. As a result, Lcs (M) is significantly decreased for cell edge users as M
increases, and therefore the phase transition for E[Lcs (M)] happens.
In summary, for an interference-limited network, we can always ensure the network to be in a
desirable condition with finite mean cell search delay by tuning the number of BS beams/antennas
M appropriately.
C. Cell Search Delay Distribution in Poisson Networks with Rayleigh Fading
The previous part is mainly focused on the mean number of IA cycles to succeed in cell search
E[Lcs (M, λ)], or equivalently the mean cell search delay. However, as shown in Theorem 3,
Theorem 4 and Theorem 5, E[Lcs (M, λ)] could be infinite under various settings, and there are
large variations of the performance between cell edge user and cell center user. Therefore, it is
also important to analyze the cell search delay distribution for system design.
Since the cell search delay Dcs (M, λ) depends on the spatial point process model for BSs
and the fading random variables at each IA cycle, its distribution is intractable in general. In
this section, we evaluate the distribution of the conditional mean cell search delay given the
distance from the typical user to its closest BS R0 , which is a random variable with PDF
fR0 (r0 ) = 2πλr0 exp(−λπr02 ). Specifically, we first derive the expected number of IA cycles to
succeed in cell search given R0 , i.e., E[Lcs (M, λ)|R0 ], which is a function of random variable R0
with mean E[Lcs (M, λ)]. For notation simplicity, we denote by Lcs (R0 , M, λ) , E[Lcs (M, λ)|R0 ]
for the rest of the paper. According to (5), we will evaluate the distribution of the following
20
conditional mean cell search delay:
Dcs (R0 , M, λ) , (Lcs (R0 , M, λ) − 1)T + Mτ.
(28)
The main reason to investigate the cell search delay conditionally on R0 is because R0 captures
1
√
2 λ
the location and therefore the signal quality of the typical user. In particular, R0 ≪
corresponds to the cell center user, while R0 ≫
1
√
2 λ
1
√
2 λ
corresponds to the cell edge user, where
represents the mean distance from the typical user to its nearest BS on the PPP Φ.
In order to derive Lcs (R0 , M, λ) in (28), we will first derive E[Lcs (M, λ)|R1 , R2 , ..., RM ],
where Ri denotes the distance from the typical user to its closest BS in the i-th BS sector (i.e.,
Ri = kxi0 k) for 1 ≤ i ≤ M.
Lemma 4: Given the distances from the typical user to its nearest BSs inside every BS sector
R1 , ..., RM , the mean number of IA cycles for cell search is:
E[Lcs (M, λ)|R1 , R2 , ..., RM ] =
M
∞ Y
X
fj (Ri , M, λ),
(29)
j=0 i=1
where fj (Ri ) denotes the probability that xi0 is detected in the first j IA cycles, which is:
j
X
Z
2λπ ∞
1
W kΓcs l (Ri )
j
exp −
)rdr .
(1 −
exp −
(−1)
fj (Ri , M, λ) =
k
P
M
M
(1
+
Γ
k
cs l (Ri )/l (r))
R
i
k=0
k
Proof: We can first prove E[Lcs (M, λ)|R1 , R2 , ..., RM ] = E[E[Lcs (M, λ)|Φ]|R1 , R2 , ..., RM ],
which is due to the tower property for conditional expectations. The rest of the proof follows
steps similar to those of Theorem 2, and therefore we omit the details.
Next we prove the following corollary to derive Lcs (R0 , M, λ) from E[Lcs (M, λ)|R1 , R2 , ..., RM ].
Corollary 1: For all i.i.d. non-negative random variables R1 , R2 ,...,RM with CCDF G(r), and
all functions F : [0, ∞)M → [0, ∞) which are symmetric, the following relation holds true:
E[F (R1 , R2 , ..., RM )| min(R1 , R2 , ..., RM ) = r] =
E[F (r, R2 , ..., RM )1{Rj >r,∀j6=1}]
.
(G(r))M −1
Proof: Denote by R0 = min(R1 , R2 , ..., RM ), then we can obtain (30) as follows:
E[F (R1 , R2 , ..., RM )|R0 = r]
E[F (R1 , R2 , ..., RM ) × 1|R0 −r|<ǫ ]
ǫ→0
P(|R0 − r| < ǫ)
= lim
(30)
21
E[F (R1 , R2 , ..., RM ) × 1({|Ri −r|<ǫ}∩{Rj >Ri ,∀j6=i}) ]
PM
k=1 P({|Rk − r| < ǫ} ∩ {Rj > Rk , ∀j 6= k})
= lim
PM
= lim
PM
ǫ→0
ǫ→0
=
i=1
PM
i=1
E[F (R1 , R2 , ..., RM )1({Rj >Ri ,∀j6=i}) ||Ri − r| < ǫ]
PM
k=1 P({Rj > Rk , ∀j 6= k}||Rk − r| < ǫ)
1
i=1 E[F (R1 , R2 , ..., RM ) ({Rj >Ri ,∀j6=i}) |Ri
PM
k=1 P({Rj > Rk , ∀j 6= k}|Rk = r)
= r]
,
the proof is completed by noting F is symmetric.
By taking F (R1 , R2 , ..., RM ) = E[Lcs (M, λ)|R1 , R2 , ..., RM ] in Corollary 1, E[Lcs (M, λ)|R0 ]
can directly obtained as follows.
Lemma 5: Given the distance from the typical user to the nearest BS R0 , the mean number
of IA cycles to succeed cell search is:
Z ∞
M −1
∞
X
λ2πr
λπr 2
λπ(M − 1)R02
fj (r, M, λ)
Lcs (R0 , M, λ) =
fj (R0 , M, λ)
,
exp(−
)dr exp
M
M
M
R0
j=0
where the function fj (r, M, λ) is defined in Lemma 4.
Lemma 5 provides a method to evaluate the cell search delay distribution under a general
setting. For noise limited networks and interference limited networks, we can obtain the following
simplified results.
Corollary 2: For the noise limited network, Lcs (R0 , M, λ) is given by:
P
α
R∞
Γcs W CN R0 N
∞
Γcs W CN r αN
j
))
{
))j
(1
−
exp(−
(1
−
exp(−
j=0
P
M
PM
R
0
λ2πr
λπr 2
M −1
exp(λπ MM−1 R02 ),
if R0 ≥ Rc ,
× M exp(− M )dr}
α
P∞
α
Γcs W CL R0 L j R ∞
N
Lcs (R0 , M, λ) =
)) { RC (1 − exp(− Γcs WPCMN r ))j
j=0 (1 − exp(−
PM
RR
α
2
× λ2πr
exp(− λπr
)dr + R0C (1 − exp(− Γcs WPCML r L ))j
M
M
2
λ2πr
)dr}M −1 exp(λπ MM−1 R02 ),
if R0 < Rc .
× M exp(− λπr
M
(31)
Corollary 2 can be easily proved from Lemma 5 and the fact that interference power is 0.
Corollary 3: For the interference limited network and the standard single-slope path loss
model with path loss exponent α > 2, Lcs (R0 , M, λ) is given by:
Lcs (R0 , M, λ) =
j
∞ X
X
j=0
2πλR02 H(k, α, Γcs)
j
exp −
(−1)
M
k
k=0
k
22
×
X
j
(−1)k kj
R∞
1
(1 −
2πλR20 H(k,α,Γcs )
M −1
exp −
M
1 + 2H(k, α, Γcs)
k=0
where H(k, α, Γcs) =
,
(32)
1
)rdr.
(1+Γ/r α )k
Proof: Since W = 0 and l (r) = Cr α , fj (Ri , M, λ) in Lemma 5 can be simplified as:
j
X
2πλR02 H(k, α, Γcs)
j
exp −
(−1)
fj (Ri , M, λ) =
.
k
M
k=0
k
(33)
Therefore, we can further obtain that:
Z
∞
R0
j
λπ
2
X
λπr 2
λ2πr
k j exp(− M (1 + 2H(k, α, Γcs ))R0 )
(−1)
exp(−
)dr =
. (34)
fj (r, M, λ)
k
M
M
1 + 2H(k, α, Γcs)
k=0
The proof can be completed by substituting (33) and (34) into Lemma 5.
IV. N UMERICAL E VALUATIONS
In this section, the distribution of the conditional mean cell search delay (28) is numerically
evaluated for both the noise limited scenario and the interference limited scenario. Specifically,
for the noise limited scenario, we consider a cellular network operating in the mmWave band
with carrier frequency fc = 73 GHz, bandwidth B = 2 GHz, and BS intensity λ = 100 BS/km2 .
The path loss exponents for LOS and NLOS links are 2.1 and 3.3 respectively, and the critical
distance is Rc = 50m. In addition, the OFDM symbol period is τ = 14.3 µs, and the IA cycle
length is chosen as T = 20 ms [13], [19]. As for the interference limited scenario, we consider
a cellular network with carrier frequency fc = 2 GHz, BS intensity λ = 100 BS/km2 , and a
standard single slope path loss model with path loss exponent α = 2.5. The OFDM symbol
period is τ = 71.4 µs, and the IA cycle length is T = 100 ms.
A. Conditional Expected Number of Cycles to Succeed in Cell Search
In order to evaluate the distribution of the conditional mean cell search delay, we first illustrate
Lemma 5. Specifically, we have simulated the cellular network with the directional cell search
protocol proposed in Section II-A, given the distance from the user to its nearest BS R0 . As
shown in Lemma 3 and Remark 5, the cell edge users will require a large number of cycles to
succeed in cell search. Therefore, we have set an upper bound for the number of cycles that a
user can try cell search, which is equal to 1500 cycles for the noise limited scenario and 100
23
5
1500
°
M = 4, = 90
°
M = 8, = 45
°
M = 18, = 20
M = 36, = 10 °
4
f = 73 GHz, B = 2 GHz
c
2
= 100 BS/km , Rc = 50m
500
L
= 2.1,
N
M = 4, = 90
M = 8, = 45 °
M = 12, = 30 °
°
M = 18, = 20
4.5
E[Lcs (M, )|R0 ]
1000
cs
0
E[L (M, )|R ]
°
= 3.3
3.5
3
2
= 100 BS/km ,
2.5
= 2.5
2
Lines: theory
Markers: simulation
Lines: theory
Markers: simulation
1.5
0
1
0
50
100
150
0
50
R0 (m)
(a) Noise limited networks
100
150
R0 (m)
(b) Interference limited networks
Fig. 2: Conditional expected number of cycles to succeed in cell search.
cycles for the interference limited scenario. Specifically, the infinite summation in Lemma 3 is
computed up to the 1500-th (100-th) term, and the simulation will treat a user as in outage if it
cannot be connected within 1500 (100) cycles.
Fig. 2 shows a close match between the analytical results and simulation results for both the
noise and interference limited scenarios, which is in line with Lemma 5. In addition, we can also
observe from Fig. 2 that the conditional expected number of cycles to succeed in cell search is
monotonically decreasing as the number of BS antennas/beams M increases, or as the distance
to the nearest BS R0 decreases.
B. Cell Search Delay Distribution in Noise Limited Networks
The cell search delay distribution for noise limited networks is numerically evaluated in this
part. Fig. 3 plots the CCDF of the conditional mean cell search delay Dcs (R0 , M, λ), which is
obtained by generating 106 realizations of R0 and computing the corresponding Dcs (R0 , M, λ)
through Corollary 2. We can observe from Fig. 3 that under the log-log scale, the tail distribution
function of Dcs (R0 , M, λ), i.e., P(Dcs (R0 , M, λ) ≥ t), decreases almost linearly with respect to t.
This indicates that the cell search delay is actually heavy-tailed and of the Pareto type. It can also
be observed from Fig. 3 that the tail distribution function satisfies limt→∞
− log P(Dcs (R0 ,M,λ)≥t)
log t
<1
for M = 4, 8, 18, 36. Therefore, the expected cell search delay is always infinite, which is in
line with Lemma 3.
24
Fig. 3 also shows that as the number of BS antennas M increases, the tail of Dcs (R0 , M, λ)
becomes lighter and thus the cell search delay for edge users is significantly reduced. For
example, the cell search delay for the 10th percentile user is almost 10 times smaller when
M increases from 18 to 36. In fact, increasing M will increase the SNR of cell edge users,
such that the number of IA cycles required for the edge users to succeed in cell search (i.e.,
Lcs (R0 , M, λ)) can be shortened. Since Dcs (R0 , M, λ) , T (Lcs (R0 , M, λ) − 1) + Mτ , and the
IA cycle length T is much larger than the OFDM symbol period τ , the tail distribution of
Dcs (R0 , M, λ) therefore becomes lighter as M increases despite having a higher beam-sweeping
overhead within every IA cycle.
10 0
10 -1
CCDF
fc = 73 GHz, B = 2 GHz
10
-2
= 100 BS/km 2, Rc = 50m
L
10 -3
10 -4
10 -2
= 2.1,
N
M increases
= 3.3
F(x) = 1/x
M = 4, = 90 °
°
M = 8, = 45
°
M = 18, = 20
°
M = 36, = 10
10 -1
10 0
10 1
10 2
10 3
10 4
Cell Search Delay (ms)
Fig. 3: Cell search delay distribution for noise limited networks.
Due to the heavy-tailed nature for the cell search delay distribution, Fig. 3 shows that there
exists an extremely large variation of the cell search delay performance from cell center users
to cell edge users. Fig. 4 plots the cell search delay for the 95th percentile users, as the number
of BS antennas M increases. Since the 95th percentile users are located at the cell center, they
are typically LOS to their serving BSs with sufficiently high isotropic SNR, and thus they can
succeed cell search in the first cycle that they initiates IA. Therefore, Fig. 4 shows that as M
increases, the cell search delay for the 95th percentile users increases almost linearly due to the
increase of the beam-sweeping overhead.
The cell search delay performance for the 50th percentile users, or the median users, is plotted
in Fig. 5. We can observe that in contrast to the mean cell search delay which is infinite, the
median delay is less than 1 ms for various BS antenna number M. When M is small, median
users do not have high enough SNR and thus they will need more than 1 IA cycles to succeed
25
95-th Percentile Cell Search Delay (ms)
0.6
fc = 73 GHz, B = 2 GHz
= 100 BS/km 2, Rc = 50m
0.5
L
= 2.1,
N
= 3.3
0.4
0.3
0.2
0.1
0
5
10
15
20
25
30
35
Number of BS Beams
Fig. 4: 95th percentile cell search delay for noise limited network.
in cell search. As M increases, the cell search delay for median users first decreases due to the
improved SNR and cell search success probability, until the median users could succeed cell
search in the first cycle that they initiates IA. Then the cell search delay will increase as M is
further increased, which is because the beam sweeping overhead becomes more dominant. The
optimal BS antenna number M is 12 (or 30◦ beamwidth) in Fig. 5, which corresponds to a cell
search delay of 0.31 ms.
50-th Percentile Cell Search Delay (ms)
0.55
fc = 73 GHz, B = 2 GHz
0.5
= 100 BS/km 2, Rc = 50m
L
= 2.1,
N
= 3.3
0.45
0.4
0.35
0.3
5
10
15
20
25
30
35
Number of BS Beams
Fig. 5: 50th percentile cell search delay for noise limited network.
C. Cell Search Delay Distribution in Interference Limited Networks
Similar to the noise limited scenario, we have evaluated the CCDF of cell search delay for
the interference limited scenario in Fig. 6 by generating 106 realizations of R0 and computing
the corresponding Dcs (R0 , M, λ) through Corollary 3.
26
Fig. 6 shows that the tail distribution function of Dcs (R0 , M, λ) decreases almost linearly
under the log-log scale, which means the distribution of Dcs (R0 , M, λ) is also heavy-tailed
under the interference limited scenario. However, in contrast to the noise limited scenario where
the overall mean cell search delay is always infinite, the phase transition for mean cell search
delay of the interference limited scenario can be observed from Fig. 6. Specifically, when the
cell search is performed omni-directionally (i.e., M = 1), Fig. 6 shows that the decay rate of the
tail satisfies limt→∞
− log P(Dcs (R0 ,M,λ)≥t)
log t
< 1, which indicates an infinite mean cell search delay.
As M increases to 4, 8, 12, Fig. 6 shows that limt→∞
− log P(Dcs (R0 ,M,λ)≥t)
log t
> 1, which leads to
a finite mean cell search delay. This observation is consistent with Theorem 5, which shows
that for the considered interference limited scenario with path loss exponent α = 2.5 and SINR
detection threshold Γcs = −4 dB, the mean cell search delay is infinite when M = 1, and finite
as long as M > 1.59.
It can also be observed from Fig. 6 that BS beam-sweeping can significantly reduce the cell
search delay for both the median users and edge users in the interference limited networks. For
example, when the number of BS antennas/beams M is 1, 4, 8, and 12, the corresponding cell
search delay for the 50th percentile user is 200 ms, 8.98 ms, 1.18 ms, and 0.9123 ms respectively,
while the corresponding cell search delay for the 10th percentile user is 3720 ms, 53.84 ms, 5.14
ms and 1.35 ms respectively. The main reason for such a performance gain in the interferencelimited network is that as M increases, beam-sweeping creates more angular separations from
the nearby BSs to the user, so that the number of IA cycles to succeed in cell search can be
effectively reduced, especially for edge users.
10 0
CCDF
10
-1
10 -2
M = 1, omni
M = 4, = 90 °
M = 8, = 45 °
M = 12, = 30 °
10 -3
F(x) = 1/x
2
= 100 BS/km , = 2.5
T = 100ms, = 71.4 s
10
-4
10 -1
10 0
10 1
10 2
10 3
10 4
Cell Search Delay (ms)
Fig. 6: Cell search delay distribution for interference limited network.
27
V. C ONCLUSIONS
This paper has proposed a mathematical framework to analyze the directional cell search
delay for fixed cellular networks, where the BS and user locations are static. Conditioned on the
BS locations, we have first derived the conditional expected cell search delay under the Palm
distribution of the user process. By utilizing a Taylor series expansion, we have further derived
the exact expression for the overall mean cell search delay in a Poisson cellular network with
Rayleigh fading channels. Based on this expression, the expected cell search delay in noiselimited network was proved to be infinite when the NLOS path loss exponent is larger than
2. By contrast, a phase transition for the expected cell search delay in the interference-limited
network was identified: the delay is finite when the number of BS beams/antennas is greater than
a threshold, and infinite otherwise. Finally, by investigating the distribution of the conditional
cell search delay given the distance to the nearest BS, the cell search delay for the edge user
was shown to be significantly reduced as the number of BS beams/antennas increases, which
holds true for both the noise and interference limited networks.
The framework developed in this paper provides a tractable approach to handle the spatial
and temporal correlations of user’s SINR process in cellular networks with fixed BS and user
locations. Future work will leverage the proposed framework to derive the random access phase
performance, the overall expected initial access delay, as well as the downlink throughput
performance for such fixed cellular networks. In addition, we will also extend the framework to
incorporate user beamforming or power control.
ACKNOWLEDGMENTS
This work is supported in part by the National Science Foundation under Grant No. NSFCCF-1218338 and an award from the Simons Foundation (#197982), both to the University of
Texas at Austin.
R EFERENCES
[1] E. Dahlman, S. Parkvall, and J. Skold, 4G: LTE/LTE-advanced for mobile broadband. Elsevier Science, 2011.
[2] Z. Pi and F. Khan, “An introduction to millimeter-wave mobile broadband systems,” IEEE Communications Magazine,
vol. 49, pp. 101–107, Jun. 2011.
[3] T. S. Rappaport, S. Sun, R. Mayzus, H. Zhao, Y. Azar, K. Wang, G. N. Wong, J. K. Schulz, M. Samimi, and F. Gutierrez,
“Millimeter wave mobile communications for 5G cellular: It will work!,” IEEE Access, vol. 1, pp. 335–349, May 2013.
28
[4] W. Roh, J.-Y. Seol, J. Park, B. Lee, J. Lee, Y. Kim, J. Cho, K. Cheun, and F. Aryanfar, “Millimeter-wave beamforming as an
enabling technology for 5G cellular communications: theoretical feasibility and prototype results,” IEEE Communications
Magazine, vol. 52, pp. 106–113, Feb. 2014.
[5] A. Ghosh, T. Thomas, M. C. Cudak, R. Ratasuk, P. Moorut, F. W. Vook, T. S. Rappaport, G. R. MacCartney, S. Sun,
S. Nie, et al., “Millimeter-wave enhanced local area systems: A high-data-rate approach for future wireless networks,”
IEEE Journal on Selected Areas in Communications, vol. 32, pp. 1152–1163, Jul. 2014.
[6] T. L. Marzetta, “Noncooperative cellular wireless with unlimited numbers of base station antennas,” IEEE Transactions
on Wireless Communications, vol. 9, pp. 3590–3600, Nov. 2010.
[7] E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, “Massive MIMO for next generation wireless systems,” IEEE
Communications Magazine, vol. 52, pp. 186–195, Feb. 2014.
[8] F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L. Marzetta, O. Edfors, and F. Tufvesson, “Scaling up MIMO:
Opportunities and challenges with very large arrays,” IEEE Signal Processing Magazine, vol. 30, pp. 40–60, Jan 2013.
[9] E. Bjornson, E. G. Larsson, and T. L. Marzetta, “Massive MIMO: ten myths and one critical question,” IEEE
Communications Magazine, vol. 54, pp. 114–123, Feb. 2016.
[10] J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. Soong, and J. C. Zhang, “What will 5G be?,” IEEE
Journal on Selected Areas in Communications, vol. 32, pp. 1065–1082, Jun. 2014.
[11] J. G. Andrews, T. Bai, M. Kulkarni, A. Alkhateeb, A. Gupta, and R. W. Heath, “Modeling and analyzing millimeter wave
cellular systems,” IEEE Transactions on Communications, vol. 65, pp. 403–430, Jan. 2017.
[12] C. N. Barati, S. A. Hosseini, M. Mezzavilla, T. Korakis, S. S. Panwar, S. Rangan, and M. Zorzi, “Initial access in millimeter
wave cellular systems,” IEEE Transactions on Wireless Communications, vol. 15, pp. 7926–7940, Dec. 2016.
[13] Y. Li, J. G. Andrews, F. Baccelli, T. D. Novlan, and J. C. Zhang, “Design and analysis of initial access in millimeter wave
cellular networks,” IEEE Transactions on Wireless Communications, vol. PP, no. 99, pp. 1–1, 2017.
[14] M. Karlsson and E. G. Larsson, “On the operation of massive MIMO with and without transmitter CSI,” in 2014 IEEE
15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), pp. 1–5, Jun. 2014.
[15] C. Shepard, A. Javed, and L. Zhong, “Control channel design for many-antenna MU-MIMO,” in Proceedings of the 21st
Annual International Conference on Mobile Computing and Networking, pp. 578–591, Sept. 2015.
[16] F. Baccelli and B. Blaszczyszyn, Stochastic Geometry and Wireless Networks: Volume II-Applications. Now Publishers
Inc, 2010.
[17] J. Andrews, F. Baccelli, and R. Ganti, “A tractable approach to coverage and rate in cellular networks,” IEEE Transactions
on Communications, vol. 59, pp. 3122–3134, Nov. 2011.
[18] M. Haenggi, J. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, “Stochastic geometry and random graphs for the
analysis and design of wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 27, pp. 1029–1046,
Sept. 2009.
[19] TS V5G.213, “Verizon 5G radio access (V5G RA); physical layer procedures,” Jun. 2016.
[20] Z. Pi, J. Choi, and R. Heath, “Millimeter-wave gigabit broadband evolution toward 5G: fixed access and backhaul,” IEEE
Communications Magazine, vol. 54, pp. 138–144, Apr. 2016.
[21] S. Hur, T. Kim, D. J. Love, J. V. Krogmeier, T. A. Thomas, and A. Ghosh, “Millimeter wave beamforming for wireless
backhaul and access in small cell networks,” IEEE Transactions on Communications, vol. 61, pp. 4391–4403, Oct. 2013.
[22] M. Giordani, M. Mezzavilla, and M. Zorzi, “Initial access in 5G mmwave cellular networks,” IEEE Communications
Magazine, vol. 54, pp. 40–47, Nov. 2016.
29
[23] M. Giordani, M. Mezzavilla, C. Barati, S. Rangan, and M. Zorzi, “Comparative analysis of initial access techniques in 5G
mmWave cellular networks,” in 2016 Annual Conference on Information Science and Systems, pp. 268–273, Mar. 2016.
[24] Y. Li, J. G. Andrews, F. Baccelli, T. D. Novlan, and J. C. Zhang, “Performance analysis of millimeter-wave cellular
networks with two-stage beamforming initial access protocols,” in 2016 50th Asilomar Conference on Signals, Systems
and Computers, pp. 1171–1175, Nov. 2016.
[25] F. Baccelli and B. Blaszczyszyn, “A new phase transition for local delays in MANETs,” in INFOCOM, 2010 Proceedings
IEEE, pp. 1–9, Apr. 2010.
[26] M. Haenggi, “The local delay in Poisson networks,” IEEE Transactions on Information Theory, vol. 59, pp. 1788–1802,
Mar. 2013.
[27] X. Zhang and M. Haenggi, “Delay-optimal power control policies,” IEEE Transactions on Wireless Communications,
vol. 11, pp. 3518–3527, Oct. 2012.
[28] S. K. Iyer and R. Vaze, “Achieving non-zero information velocity in wireless networks,” in 2015 13th International
Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), pp. 584–590, May 2015.
[29] R. B. Waterhouse, D. Novak, A. Nirmalathas, and C. Lim, “Broadband printed sectorized coverage antennas for millimeterwave wireless applications,” IEEE Transactions on Antennas and Propagation, vol. 50, pp. 12–16, Aug. 2002.
[30] A. Alkhateeb, Y. H. Nam, M. S. Rahman, J. Zhang, and R. W. Heath, “Initial beam association in millimeter wave cellular
systems: Analysis and design insights,” IEEE Transactions on Wireless Communications, vol. 16, pp. 2807–2821, May
2017.
[31] M. Hussain and N. Michelusi, “Throughput optimal beam alignment in millimeter wave networks,” arXiv preprint
arXiv:1702.06152, Feb. 2017.
[32] S. N. Chiu, D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic geometry and its applications. John Wiley & Sons, 2013.
[33] F. Baccelli and B. Blaszczyszyn, Stochastic Geometry and Wireless Networks: Volume 1: THEORY. Now Publishers Inc,
2010.
[34] X. Zhang and J. G. Andrews, “Downlink cellular network analysis with multi-slope path loss models,” IEEE Transactions
on Communications, vol. 63, pp. 1881–1894, Mar. 2015.
[35] T. Bai and R. Heath, “Coverage and rate analysis for millimeter-wave cellular networks,” IEEE Transactions on Wireless
Communications, vol. 14, pp. 1100–1114, Feb. 2015.
[36] M. D. Renzo, “Stochastic geometry modeling and analysis of multi-tier millimeter wave cellular networks,” IEEE
Transactions on Wireless Communications, vol. 14, pp. 5038–5057, Sept. 2015.
[37] S. Singh, M. Kulkarni, A. Ghosh, and J. Andrews, “Tractable model for rate in self-backhauled millimeter wave cellular
networks,” IEEE Journal on Selected Areas in Communications, vol. 33, pp. 2196–2211, Oct. 2015.
[38] M. Haenggi, Stochastic geometry for wireless networks. Cambridge University Press, 2013.
| 7cs.IT
|
Gene Expression Time Course Clustering with Countably Infinite
Hidden Markov Models
Matthew J. Beal
Praveen Krishnamurthy
Department of Computer Science and Engineering
State University of New York (SUNY) at Buffalo
Buffalo, NY 14260-2000
{mbeal,pk35}@cse.buffalo.edu
1
Abstract
to learn not just co-expression, but causal relationships
that may help elucidate co-regulation as well.
Most existing approaches to clustering gene
expression time course data treat the different time points as independent dimensions
and are invariant to permutations, such as reversal, of the experimental time course. Approaches utilizing HMMs have been shown
to be helpful in this regard, but are hampered by having to choose model architectures with appropriate complexities. Here we
propose for a clustering application an HMM
with a countably infinite state space; inference in this model is possible by recasting it
in the hierarchical Dirichlet process (HDP)
framework (Teh et al. 2006), and hence we
call it the HDP-HMM. We show that the
infinite model outperforms model selection
methods over finite models, and traditional
time-independent methods, as measured by
a variety of external and internal indices for
clustering on two large publicly available data
sets. Moreover, we show that the infinite
models utilize more hidden states and employ richer architectures (e.g. state-to-state
transitions) without the damaging effects of
overfitting.
Two problematic issues hamper practical methods for
clustering gene expression time course data: first, if
deriving a model-based clustering metric, it is often
unclear what the appropriate model complexity should
be; second, the current clustering algorithms available
cannot handle, and therefore disregard, the temporal
information. This usually occurs when constructing
a metric for the distance between any two such genes.
The common practice for an experiment having T measurements of a gene’s expression over time is to consider the expression as positioned in a T -dimensional
space, and to perform (at worse spherical metric) clustering in that space. The result is that the clustering algorithm is invariant to arbitrary permutations
of the time points, which is highly undesirable since
we would like to take into account the correlations between all the genes’ expression at nearby or adjacent
time points.
Introduction
There are a large number of popular techniques for
clustering gene expression data, with the goal being to
elucidate the many different functional roles of genes
that are players in important biological processes. It is
said that genes that cluster with similar expression—
that is, are co-expressed—serve similar functional roles
in a process (see, for example, Eisen et al. 1998). Bioinformaticians have more recently had access to sets of
time-series measurements of genes’ expression over the
duration of an experiment, and have desired therefore
In i.i.d. data sets, the model complexity issue has been
recently and successfully tackled by using Dirichlet
process mixture models, and in particular countably
infinite Gaussian mixture models (examples can be
found in Rasmussen 2000, Wild et al. 2002, Medvedovic and Sivaganesan 2002, Dubey et al. 2004, Medvedovic et al. 2004). However, these models are not applicable to time series data unless ones uses the unsavory concatenation of time points mentioned above
(for example, in the work of Medvedovic and Sivaganesan (2002), an i.i.d. infinite mixture of Gaussians
is applied to Spellman’s time series data). To address this second issue of time-dependence, parametric models such as state-space models and differential
equation models have been employed, but the modelcomplexity issue still needs to be tackled either with
heuristic model selection criteria (Iyer et al. 1999), or
approximate Bayesian methods such as BIC (Ramoni
et al. 2002) or variational Bayes (Beal et al. 2005).
For continuous time series, modeling spline parame-
ters has been popular (Bar-Joseph et al. 2003, Heard
et al. 2006). For discrete time series, which we consider in this paper, random walk models (Wakefield
et al. 2003) have been proposed. The most advanced
analysis thus far is the mixture of HMMs approach of
Schliep et al. (2005), wherein BIC (Schwarz 1978) and
an entropic criterion are used for model selection. The
approach outlined in this paper also uses an HMM, but
we side-step the question of model selection by using
a flexible nonparametric Bayesian mixture modeling
framework, which allows the model to have a countably infinite number of hidden states (i.e. a countably
infinite by countably infinite transition matrix).
We present a simple but powerful temporal extension
to the recently introduced Hierarchical Dirichlet Process mixture model (HDP) of Teh, Jordan, Beal and
Blei (2004,2005), in the form of a model that is coined
the hierarchical Dirichlet process hidden Markov model
(HDP-HMM). As we describe below, this extension
allows us to address both of the issues noted above.
Moreover, we can still provide a measure of similarity
between any two genes’ time courses, by examining
the probabilistic degree of overlap in the hidden state
trajectories; this is possible despite these state spaces
being countably infinite.
The paper is arranged as follows. In Section 2 we
briefly review the HDP framework, then show how the
countably infinite HMM is a particular (though nontrivial) instantiation within this framework, then describe a straightforward similarity measure for pairs
of sequences. In Section 3 we present results of timecourse clustering experiments on two publicly available
gene data sets, for which ground truth labels are provided, measuring performance with respect to a variety
of so-called external and internal indices. We conclude
in Section 4 by suggesting directions for future work
and expansion of the HDP-HMM.
2
The infinite HDP-HMM
In this section we present a hidden Markov model with
a countably infinite state space, which we call the hierarchical Dirichlet process hidden Markov model (HDPHMM) by way of its relationship to the HDP framework of Teh et al. (2006). We begin with an overview
of the HDP according to this work, and then recast the
infinite HMM into this framework. Previous research
by the first author on infinite HMMs (Beal et al. 2002)
provided an approximate sampling scheme for inference and learning but was unable to prove its correctness. By recasting the infinite HMM as a constrained
HDP, we will show that we can have a functioning
sampling scheme at our disposal, as explained below.
2.1
Hierarchical Dirichlet Processes
The HDP considers problems involving groups of data,
where each observation within a group is a draw from
a mixture model, and where it is desirable to share
mixture components between groups. Consider first a
single group of data, (xi )ni=1 ; if the number of mixture
components is unknown a priori and is to be inferred
from the data, then it is natural to consider a Dirichlet
process mixture model, as depicted in Figure 1(a) (for
an exposition on DP mixtures see Neal 1998). Here,
the well known clustering property of the Dirichlet process provides a nonparametric prior for the number of
mixture components within each group, with the following generative model:
G | α0 , G0 ∼ DP(α0 , G0 )
θi | G ∼ G
xi | θi ∼ F (θi )
(1)
for each i,
for each i,
where G0 is a base measure of the DP, α0 ≥ 0 is a concentration parameter, DP(·, ·) is a Dirichlet process,
and θi is a parameter drawn from G. Each datum xi
is then drawn from a distribution F (·) parameterized
by θi . In our models and experiments hereafter, F (·)
is a Gaussian density. Ferguson (1973) showed that
draws from a DP are discrete with probability one,
and therefore, in a sufficiently large data set, there
will be several i for which the θi are identical; this
gives rise to the natural clustering phenomenon giving
DP mixtures their name.
Now, consider several groups, J, of data, denoted
nj J
((xji )i=1
)j=1 ; in such a setting it is natural to consider
sets of Dirichlet processes, one for each group, and we
still desire to tie the mixture models in the various
groups. We therefore consider a hierarchical model,
specifically one in which each of the child Dirichlet
processes in the set has a base measure that is itself distributed according to a Dirichlet process. Such a base
measure being again discrete with probability one, the
child Dirichlet processes necessarily share atoms, thus
ensuring that the the mixture models in the different groups necessarily share mixture components. The
generative model is given by:
G0 | γ, H
Gj | α0 , G0
θji | Gj
xji | θji
∼ DP(γ, H)
∼ DP(α0 , G0 )
∼ Gj
∼ F (θji )
(2)
for each j,
for each j and i,
for each j and i.
Figure 1(b) shows the graphical model, where there
is a plate not only over data, n, but also over the J
(non-overlapping) groups of data. In this model the
number of mixture components is unknown a priori
for each group, and also for the data as a whole.
H
γ
G0
γ
β
γ
β
G
α0
Gj
α0
πj
α0
πk
xi
θji
xji
n
(a) DP
nj
H
zji
φk
xji
H
nj
J
(b) HDP
v0
J
(c) HDP stick-break
φk
v1
v2
vT
y1
y2
yT
8
θi
8
α0
G0
(d) HMM-HDP stick-breaking
Figure 1: Graphical model descriptions of the HDP-HMM as it compares to the HDP: (a) a DP mixture model; (b) the
original HDP model; (c) the stick-breaking interpretation of the original HDP: mixing proportions for the jth group are
drawn from common weights β, themselves drawn from a stick-breaking process, and then each item xji is drawn from a
mixture model with mixing proportions π j . (d) An unraveled HDP graphical model, wherein the next-state distribution
is a current-state-dependent DP mixture model; each item y t is drawn from a mixture model (having mixture indicator
vt ) with mixing proportions π vt−1 determined by the previous hidden state.
2.2
Recasting the Hidden Markov Model
The most straightforward route to understanding the
connection between a hidden Markov model and the
HDP described above is to first realize the stickbreaking characterization (Sethuraman 1994) of the
HDP, given below and depicted in Figure 1(c),
β | γ ∼ Stick(γ)
(3)
π j | α0 , β ∼ DP(α0 , β)
zji | π j ∼ π j
φk | H ∼ H
xji | zji , (φk )∞
k=1 ∼ F (φzji ) ,
where the stick-breaking construction (Stick) gives rise
to weights β = (βk )∞
k=1 , with
βk0 ∼ Beta(1, γ)
βk = βk0
k−1
Y
(1 − βl0 ) .
(4)
l=1
The advantage of this representation is that it makes
explicit the generation of one (countably infinite) set
of parameters (φk )∞
k=1 ; the jth group has access to various of these parameters should it need them to model
nj
its data (xji )i=1
, depending on the sampled mixing
proportion π j .
Recall that a hidden Markov model (HMM) is a doubly
stochastic Markov chain in which a sequence of multinomial “state” variables (v1 , v2 , . . . , vT ) are linked via
a state transition matrix, and each element yt in a sequence of “observations” (y1 , y2 , . . . , yT ) is drawn independently of the other observations conditional on
vt (Rabiner 1989). This is essentially a dynamic variant of a finite mixture model, in which there is one
mixture component corresponding to each value of the
multinomial state. Note that the HMM involves not
a single mixture model, but rather a set of mixture
models: one for each value of the current state. That
is, the “current state” vt indexes a specific row of the
transition matrix, with the probabilities in this row
serving as the mixing proportions for the choice of the
“next state” vt+1 . Given the next state vt+1 , the observation yt+1 is drawn from the mixture component
indexed by vt+1 .
Thus, to consider a nonparametric variant of the HMM
which allows an unbounded set of states, we must consider a set of DPs, one for each value of the current
state. Moreover, these DPs must be linked, because
we want the same set of “next states” to be reachable
from each of the “current states.” This amounts to
the requirement that the atoms associated with the
state-conditional DPs should be shared—exactly the
framework of the hierarchical DP. Thus, we simply replace the set of conditional finite mixture models underlying the classical HMM with an HDP, and the resulting model, an HDP-HMM, provides an alternative
to methods that place an explicit parametric prior on
the number of states or make use of model selection
methods to select a fixed number of states (e.g. Stolcke
and Omohundro 1993).
While there exist two Gibbs sampling methods for
the HDP—one based on an extension of the Chinese
Restaurant Process (CRP Aldous 1985) called the Chinese Restaurant Franchise (CRF), and the other based
on an auxiliary variable method (both described in
Teh et al. 2006)—only the auxiliary variable method
is straightforward to implement for our HDP-HMM,
and is used in our experiments shown below. In
fact, in work that served as inspiration for the HDPHMM (Beal et al. 2002), a sampler was presented that
resembles the CRF scheme, but was necessarily ap-
proximate to reduce the time complexity of inference.1
The two-level urn model presented in that earlier work
can be related to the HDP framework, by describing
the latter using the stick-breaking formalism. In particular, consider the unraveled hierarchical Dirichlet
process representation shown in Figure 1(d). The parameters in this representation have the following distributions, c.f. (3):
β | γ ∼ Stick(γ)
(5)
∞
π k | α0 , β ∼ DP(α0 , β) vt | vt−1 , (π k )k=1 ∼ π vt−1
φk | H ∼ H
yt | vt , (φk )∞
k=1 ∼ F (φvt ) ,
where we assume for simplicity that there is a distinguished initial state v0 . If we now consider the
CRF representation of this model, it turns out that
the result is equivalent to the coupled urn model of
Beal et al. (2002). The advantage of this representation is that we can use an auxiliary variable sampling
scheme that was designed for the HDP. As described
above, the current instantiation, and most importantly
the order, of the state variables (v1 , . . . , vT ), defines a
grouping of the data (y1 , . . . , yT ) into groups indexed
by the previous-state. Given this grouping, the settings of β and α0 , the group-specific DP mixtures can
be sampled independently. On sampling, the indicators (v1 , . . . , vT ) change, and hence the grouping of
the data changes. Thus, given that we have access to a
countably infinite set of hidden states, the HDP-HMM
can be thought of as an HDP with an ever-shifting,
countably infinite number of groups (metaphor: countably infinite tables in each of countably infinite restaurants, all sharing choices of dishes).
Last, as in the HDP, the HDP-HMM has hyperpriors on the hyperparameters α0 and γ, both gamma
distributed with shape a· and inverse scale b· like so:
α0 ∼ Gamma(aα0 , bα0 ) ), γ ∼ Gamma(aγ , bγ ); we sample over α0 and γ during the auxiliary variable sampling scheme, so these are integrated out of the model.
3
Analysis of Experiments
3.1
Data & Sequence Similarity measure
We used two publicly available sets for the analysis:
i) (Iyer) the gene expression time course data of Iyer
et al. (1999), consisting of 517 genes’ expressions across
12 time points; the expressions are log-normalized and
1
There, bookkeeping for the CRF representation is very
difficult: Adopting the well used CRP metaphor of customers entering a restaurant, in the CRF representation
we have multiple restaurants, and sampling the table that
a customer y t sits at will influence the restaurant in which
the following customer y t+1 must dine, and so on, resulting
in a highly coupled system.
standardized to have log expression 1 at time t = 1 for
all genes. Each gene is labeled belonging to a cluster
1–10 and a further outlier cluster is denoted as cluster ‘-1’. We assume that these labels are the result
of biological expert modification following a preliminary Eisen (simple correlation in T dimensions) analysis (Eisen et al. 1998). ii) (Cho) the second data set is
the expression data described in Cho et al. (1998) consisting of 386 genes’ expression across 17 time points,
similarly normalized, with hand-labeled genes into one
of 5 clusters.
We compare our HDP-HMM model to the standard
HMM, referred to as finite HMM here after. For the
finite HMM, we ran experiments with 7 different seed
values and averaged over the various scores (explained
below), in order to minimize the effects of initialization in EM. We define the (probabilistic measure of)
dissimilarity between two genes’ time courses for finite HMM as the (c, d)th element of a matrix P (e.g.
of size 517×517 for Iyer), which is the probability that
the two time courses of each gene have identical hidden
state trajectories. This can be computed straightforwardly after an E step in the Baum-Welch algorithm.
Denoting the posterior over the hidden state at time
(c) (c)
t of the cth gene sequence by p(vt |y1:T , Θ), where Θ
are the current parameters of the HMM, then log Pcd
is straightforwardly given by
k
T
X
X
(d)
(d)
(c)
(c)
p(vt = r|y1:T , Θ)p(vt = r|y1:T , Θ), (6)
log
t=1
r=1
and therefore Pcd (= Pdc ) measures the probability of
two genes, c and d, having traversed similar entire hidden trajectories. We use − log Pcd as a measure of
divergence (to be thought of as clustering distance)
between genes c and d.2
An analogous measure of divergence, or dissimilarity,
can be computed for the HDP-HMM. In an infinite
model, the posterior distribution over hidden state trajectories is represented as a set of samples, and the
above quantity can be calculate simply from an empirical computation over the samples of trajectories
taken over very long MCMC runs. Since the posterior
samples always consist of represented hidden states, we
do not suffer from the countably infinite state space.
A similar method is used in the (i.i.d.) clustering using infinite mixture of Gaussians work of Rasmussen
(2000) and Wild et al. (2002), but here we have extended to be a measure of similarity over sequences.
2
More thoroughly one should compute a similarity that
involves pairwise marginals over time as well, which would
require a dynamic programming computation of similarity, which for the HDP-HMM is current research. However, we found the above approximation sufficient in our
(c)
experiments. Note that the marginals used in (6), p(vt =
(c)
r|y1:T , Θ), are still obtained using forward-backward.
3.2
Agreement with provided labels
We have used common external and internal indices
to assess the quality of clustering obtained by various
methods. Refer to the Appendix for more details on
the definition of these metrics (note that DB∗ is the
only score for which smaller values are better). We
also use a recently introduced index called purity, as
defined in Wild et al. (2002) which is a tree-based metric. Given a measure of dissimilarity between genes—
provided by simple Eisen correlation, finite HMMs or
HDP-HMMs—we can construct a dendrogram (we use
average linkage), and on this binary-tree based representation we can fix a number of clusters, C, by severing the tree at this point, and force a putative labeling
of each of the genes into each of C possible labels.
3.3
Results
We compare simple correlation (Eisen, no time depedence) analysis to both finite HMMs of sizes varying from k = 1, . . . , 40 and with the HDP-HMM with
several settings of its hyper-hyperparameters. For
the HDP-HMM, the auxiliary variable Gibbs sampling
consisted of 100,000 burnin samples, collecting 250
posterior samples thereafter having a spacing of 750
samples between each.
In Tables 1 and 2, we display a subset of the indices as
we vary C for the Iyer data set only. Here, bγ denotes
the hyper-hyperparameter setting over γ for the HDPHMM, and k denotes the number of hidden states used
in the finite HMM run. Noting the trade-off between
sensitivity and specificity, and also the indifference to
bγ , we decided that for comparative purposes we would
fix C = 11 for Iyer. For the Cho results (not shown here
for space), we used C = 5, for similar reasons.
Table 2 shows a comparison of Eisen, finite HMM and
HDP-HMM for various results of external and internal
indices. A better visualization is given in Figure 2 for
some of the Iyer results (Cho results are more impressive but are omitted due to space) in Figure 2. For
clarity, we highlight entries in each column that perform the best, and reiterate that for DB∗ index lower is
better (we do not consider the result of the finite HMM
with k = 1 since this degenerates to the case where all
genes are in the same class (− log Pcd = 0 ∀c, d).
We note several trends: First, the degree of variation of all indices for different settings of the hyperhyperparameter bγ is very small, suggesting that at
this level of the Bayesian hierarchy the setting of the
priors does not influence the learning of the model.
Moreover, for any index, the variation over k of the
finite HMM is much larger. Second, it is clear that
considering time in the HMM—especially in infinite
Table 1: Choice of number of clusters, C, for Iyer data.
bγ = 1, C = 1
5
10
11
15
20
bγ = 3, C = 1
5
10
11
15
20
rand crand jacc spec sens
0.16
0.00
0.16 0.16 1.00
0.72
0.35
0.33 0.35 0.89
0.73
0.36
0.34 0.36 0.88
0.73
0.36
0.34 0.36 0.88
0.80
0.41
0.36 0.42 0.70
0.82
0.38
0.33 0.43 0.57
0.16
0.00
0.16 0.16 1.00
0.66
0.28
0.29 0.30 0.90
0.73
0.35
0.33 0.35 0.83
0.75
0.36
0.33 0.36 0.82
0.80
0.39
0.35 0.41 0.69
0.80
0.39
0.35 0.42 0.67
models—is advantageous compared to the simple correlation analysis of Eisen (already established Schliep
et al. 2005). Third, there is evidence that the finite
HMM is overfitting in the Iyer data set according to
the Sil and DB indices, and for Cho according to several of the external indices; the HDP-HMM does not fit
any one particular model, but integrates over a countably infinite set of models. Fourth, it is clear from the
Table 2 that the vast majority of highlighted “winners”
are for the HDP-HMM (last 7 rows), which shows a
dramatic success over the finite HMM and Eisen (time
independent) analyses.
Inferred architecture: Generally speaking the finite
models show no improvement in performance beyond
around k = 10 hidden states. It is interesting, therefore, that in Figure 3(a) we find that for a wide range
of bγ settings the HDP-HMM uses in excess of k = 20
represented classes; the reason for this is that the architectures of the countably infinite and finite models
are quite different, as shown in the transition matrices
of Figures 3(b) and 3(c). The HDP-HMM has almost
three times as sparse connectivity as its finite counterpart, with many states having only one or two possible
destination states.
4
Conclusion and further directions
We have described the infinite HMM in the framework of the HDP, in which an auxiliary variable Gibbs
sampling scheme is feasible. The HDP-HMM is in
fact a CRF with a countably infinite number of tables in a countably infinite number of restaurants, all
potentially sharing common dishes. We have shown
for two time course gene expression data sets that the
HDP-HMM performs similarly and, for most scenarios, better than the best finite HMMs found by model
selection. We find that HMMs outperform the standard Eisen analysis based on simple correlation of the
T -dimensional sequence vector, which treats the time
points as independent. We used common measures of
external and internal indices, including a tree-based in-
Table 2: Effect of varying the complexity k of the finite models, and varying the hyper-hyperparameter bγ .
dataset
Iyer et al. (1999) (C = 11)
Cho et al. (1998) (C = 5)
index rand crand jacc sens spec sil dunn DB∗ puri rand crand jacc sens spec sil dunn DB∗ puri
Eisen 0.80
0.38
0.33 0.63 0.41 0.55 1.542 0.70 0.58 0.77
0.43
0.41 0.68 0.51 0.37 1.357 0.78 0.58
k=1
2
3
4
5
6
7
8
14
20
30
40
0.20
0.58
0.75
0.77
0.77
0.75
0.76
0.75
0.71
0.73
0.74
0.75
0.01
0.26
0.34
0.37
0.38
0.36
0.39
0.36
0.34
0.36
0.36
0.38
0.17
0.29
0.32
0.34
0.35
0.34
0.36
0.34
0.33
0.34
0.34
0.35
0.99
0.86
0.72
0.73
0.76
0.78
0.81
0.78
0.84
0.82
0.84
0.82
0.17
0.32
0.37
0.40
0.41
0.38
0.40
0.38
0.36
0.38
0.38
0.39
∞
0.27
0.49
0.53
0.50
0.51
0.54
0.53
0.59
0.57
0.54
0.55
∞
1.358
1.445
1.685
1.329
1.427
1.389
1.518
1.625
1.583
1.449
1.509
0.00
0.76
0.56
0.53
0.62
0.63
0.63
0.62
0.55
0.58
0.60
0.62
0.48
0.42
0.47
0.52
0.52
0.53
0.54
0.53
0.56
0.57
0.55
0.55
0.25
0.73
0.62
0.63
0.65
0.70
0.72
0.72
0.67
0.65
0.65
0.66
0.00
0.33
0.22
0.21
0.27
0.30
0.35
0.33
0.30
0.30
0.30
0.31
0.23
0.35
0.31
0.29
0.33
0.33
0.37
0.35
0.35
0.35
0.35
0.36
0.99
0.63
0.74
0.68
0.73
0.65
0.69
0.64
0.74
0.82
0.82
0.80
0.23
0.44
0.34
0.34
0.38
0.41
0.44
0.44
0.40
0.38
0.38
0.39
∞
0.22
0.44
0.40
0.40
0.41
0.44
0.50
0.56
0.61
0.60
0.63
∞
1.201
1.606
1.610
1.540
1.548
1.381
1.767
1.538
1.343
1.445
1.421
0.00
0.92
0.70
0.70
0.72
0.75
0.72
0.65
0.57
0.55
0.56
0.54
0.47
0.54
0.49
0.48
0.55
0.54
0.56
0.54
0.58
0.60
0.59
0.59
bγ = 0.25
0.5
1
2
3
4
5
0.77
0.78
0.73
0.77
0.75
0.80
0.78
0.37
0.40
0.36
0.38
0.36
0.42
0.40
0.34
0.36
0.34
0.35
0.33
0.37
0.36
0.74
0.80
0.88
0.80
0.82
0.76
0.80
0.38
0.39
0.36
0.38
0.36
0.42
0.39
0.53
0.54
0.62
0.55
0.59
0.54
0.51
1.511
1.510
1.436
1.525
1.788
1.878
1.374
0.57
0.58
0.47
0.55
0.54
0.60
0.63
0.54
0.60
0.52
0.58
0.54
0.56
0.60
0.74
0.80
0.73
0.79
0.73
0.71
0.72
0.40
0.46
0.39
0.46
0.40
0.36
0.38
0.41
0.42
0.40
0.42
0.40
0.38
0.39
0.77
0.63
0.77
0.66
0.78
0.76
0.79
0.46
0.56
0.45
0.54
0.46
0.43
0.44
0.61
0.44
0.62
0.51
0.63
0.46
0.63
1.885
1.578
1.948
1.512
1.853
1.574
2.189
0.59
0.68
0.59
0.60
0.50
0.71
0.51
0.60
0.60
0.61
0.62
0.60
0.59
0.61
0.45
1
0.45
finite
eisen
b=1
b=4
0.95
0.4
0.4
0.35
0.9
0.35
0.3
0.85
0.25
0.3
0.8
0.2
0.75
0.25
0.15
0.7
0.1
0.2
0.15
finite
eisen
b=1
b=4
1
2
3
4
5
6
7
8
9
0.65
10 11 12 13 14 15 16 17 18 19 20 25 30 35 40
1
2
3
4
5
6
7
8
(a) spec
9
10 11 12 13 14 15 16 17 18 19 20 25 30 35 40
0
1
2
3
4
5
6
7
8
(b) sens
9
10 11 12 13 14 15 16 17 18 19 20 25 30 35 40
(c) crand
0.8
0.65
0.7
0.6
0.6
0.55
0.55
0.5
0.45
0.45
0.35
0.5
0.5
0.4
0.3
0.4
0.2
finite
eisen
b=1
b=4
0.1
0
finite
eisen
b=1
b=4
0.05
1
2
3
4
5
6
7
8
9
10 11 12 13 14 15 16 17 18 19 20 25 30 35 40
(d) DB∗
finite
eisen
b=1
b=4
0.4
1
2
3
4
5
6
7
8
9
10 11 12 13 14 15 16 17 18 19 20 25 30 35 40
(e) purity
finite
eisen
b=1
b=4
0.3
0.25
1
2
3
4
5
6
7
8
9
10 11 12 13 14 15 16 17 18 19 20 25 30 35 40
(f) silhouette
Figure 2: Relative performance of finite (k = 1, . . . , 40, horizontal axis), infinite (bγ = 1, 4, horizontal solid and dashed
lines), and standard Eisen (correlation only, horizontal thick line) algorithms on a subset of the indices given in Table 2,
for a cluster number C = 11, for the Iyer data set.
dex, purity. We also find that the HDP-HMM models
are learning quite different architectures for the hidden state dynamics. In current work we are examining
more closely the prevalent paths through the hidden
states, which may elucidate interesting regulatory networks at play; we will report the biological significance
of these in a forthcoming article.
In this paper we have not considered a leave-one-out
analysis—either in terms of classification or in terms
of density estimation—of a single gene using a model
trained on the remainder. This is partly because sampling to calculate test likelihoods in the HDP-HMM is
very time-consuming. However, previous preliminary
work (Teh et al. 2005) on a simpler case of learning
450
0.25
0.5
1
2
3
4
5
400
350
300
250
200
150
100
50
0
20
21
22
23
24
25
26
27
28
29
30
(a) represented classes
31
32
(b) HDP-HMM transitions
(c) finite HMM transitions
Figure 3: Analysis of hidden states in HDP-HMM (for Iyer data). (a) Distribution of number of represented classes in the
HDP-HMM models. Shown are stacked values for various values of the (hyper-)hyperparameter bγ = (0.25, 0.5, 1, 2, 3, 4, 5),
demonstrating that the mass over number of represented classes does not shift dramatically even over orders of magnitude
of this high level hyperparameter; (b) Equivalent transition matrix for HDP-HMM (bγ = 0.25, 11.7% non-zero entries):
each row is a source state and its entries are transition probabilities that sum to 1, and brighter squares denote higher
probability; (c) Transition matrix of the same size for the finite model—evidently less sparse (29.4% non-zero entries).
sequences of letters forming sentences on the Alice’s
Adventures in Wonderland showed that perplexity of
test sentences was minimized using the HPD-HMM,
as compared to Maximum Likelihood trained HMMs,
Maximum A Posteriori trained HMMs, and variational
Bayesian HMMs (Beal 2003). Also, Medvedovic and
Sivaganesan (2002) show robustness of their infinite
i.i.d. mixtures of Gaussians model as compared to finite mixtures, which is another reason to expect our
time series analysis to perform well on such analyses.
Finally, there are a host of exciting variants to the
HDP-HMM. There are nested group models, which
may be useful for capturing ontological information,
and we are working on a countably infinite switching state-space model, as well as variants on the DP
mixture model formalism in terms of Pitman-Yor processes that may have attractive properties in the domain of time-series modeling.
Acknowledgements
We acknowledge support from NSF award 0524331,
Yee Whye Teh for HDP code and discussion, and the
helpful comments of anonymous reviewers.
References
D. Aldous. Exchangeability and related topics. In École
d’été de probabilités de Saint-Flour XIII–1983, pages 1–
198. Springer, Berlin, 1985.
Z. Bar-Joseph, G. Gerber, D. Gifford, T. Jaakkola, and
I. Simon. Continuous representations of time series gene
expression data. Journal of Computational Biology, 10
(3–4):241–256, 2003.
M. J. Beal. Variational Algorithms for Approximate
Bayesian Inference. PhD thesis, Gatsby Computational Neuroscience Unit, University College London,
UK, 2003.
M. J. Beal, Z. Ghahramani, and C. E. Rasmussen. The infinite hidden Markov model. In Advances in Neural In-
formation Processing Systems 14, Cambridge, MA, 2002.
MIT Press.
M. J. Beal, F. L. Falciani, Z. Ghahramani, C. Rangel, and
D. Wild. A Bayesian approach to reconstructing genetic
regulatory networks with hidden factors. Bioinformatics, 21:349–356, February 2005.
R. J. Cho, M. J. Campbell, E. A. Winzeler, L. Steinmetz, A. Conway, L. Wodicka, T. G. Wolfsberg, A. E.
Gabrielian, D. Landsman, D. J. Lockhart, and R. W.
Davis. A genome-wide transcriptional analysis of the
mitotic cell cycle. Molecular Cell, 2(1):65–73, 1998.
A. Dubey, S. Hwang, C. Rangel, C. E. Rasmussen,
Z. Ghahramani, and D. L. Wild. Clustering protein sequence and structure space with infinite Gaussian mixture models. In R. B. Altman, A. K. Dunker, L. Hunter,
and T.E. Klein, editors, Pacific Symposium in Biocomputing 2004, pages 399–410. World Scientific Publishing,
Singapore, 2004.
M. B. Eisen, P. T. Spellman, P. O. Brown, and D. Botstein.
Cluster analysis and display of genome-wide expression
patterns. Proceedings of the National Academy of Sciences of the USA, 95(25):14863–14868, December 1998.
T. S. Ferguson. A Bayesian analysis of some nonparametric
problems. Annals of Statistics, 1(2):209–230, 1973.
N. A. Heard, C. C. Holmes, and D. A. Stephens. A quantitative study of gene regulation involved in the immune
response of Anopheline mosquitoes: An application of
Bayesian hierarchical clustering of curves. Journal of the
American Statistical Association, 101(473):18–29, 2006.
V. R. Iyer, M. B. Eisen, D. T. Ross, G. Schuler, T. Moore,
J. C. F. Lee, J. M. Trent, L. M. Staudt, J. Hudson Jr.,
M. S. Boguski, D. Lashkari, D. Shalon, D. Botstein, and
P. O. Brown. The Transcriptional Program in the Response of Human Fibroblasts to Serum. Science, 283
(5398):83–87, 1999.
M. Medvedovic and S. Sivaganesan. Bayesian infinite mixture model based clustering of gene expression profiles.
Bioinformatics, 18(9):1194–1206, 2002.
M. Medvedovic, K. Y. Yeung, and R.E. Bumgarner.
Bayesian mixture model based clustering of replicated
microarray data. Bioinformatics, 20(8):1222–1232, 2004.
|SS|+|DD|
|SS|+|SD|+|DS|+|DD|
.
R. M. Neal. Markov chain sampling methods for Dirichlet
process mixture models. Technical Report 9815, Department of Statistics, University of Toronto, 1998.
1. Rand index: Rand =
L. R. Rabiner. A tutorial on hidden Markov models and
selected applications in speech recognition. Proceedings
of the IEEE, 77, 1989.
3. CRand index; (C)orrected for chance assignments:
CRand =
Pm Pn `nij ´ `N ´−1 Pm `ni ´ Pn `nj ´
− 2
j=1
i=1 2
i=1
j=1 2
2
hP
`nj ´i Pm `ni ´ Pn `nj ´
m `ni ´ Pn
1
−
i=1 2
i=1 2
j=1 2
j=1 2
2
M. F. Ramoni, P. Sebastiani, and I.S. Kohane. Cluster
analysis of gene expression dynamics. Proc. National
Academy of Sciences of the USA, 99(14):9121–6, 2002.
C. E. Rasmussen. The infinite Gaussian mixture model. In
Advances in Neural Information Processing Systems 12,
Cambridge, MA, 2000. MIT Press.
A. Schliep, I. G. Costa, C. Steinhoff, and A. Sch onhuth.
Analyzing gene expression time-courses. IEEE Trans.
Comp. Biology and Bioinformatics, 2(3), 2005.
2. Jaccard coefficient: Jaccard =
|SS|
|SS|+|SD|+|DS|
.
where nij is the number of points in Pi and Cj , ni is
the number of points in the Pi , and nj the number of
points in Cj .
4. The usual definitions for Sensitivity and Specificity:
|SS|
|SS|
Sens. =
,
Spec. =
.
|SS| + |SD|
|SS| + |DS|
G. Schwarz. Estimating the dimension of a model. The
Annals of Statistics, 6:461–464, 1978.
A.2
J. Sethuraman. A constructive definition of Dirichlet priors. Statistica Sinica, 4:639–650, 1994.
Internal indices are computed to quantitatively assess clustering in the absence of provided labels, and attempt to
evaluate cohesion (how similar are points in same clusters),
and separation (how dissimilar are points in different clusters). Usually these indices are computed with a Euclidean
distance metric, but to preserve the integrity of our analysis we used the − log Pcd dissimilarity given by (6).
A. Stolcke and S. Omohundro. Hidden Markov model induction by Bayesian model merging. In S. J. Hanson,
J. D. Cowan, and C. L. Giles, editors, Advances in Neural Information Processing Systems 5, pages 11–18, San
Francisco, CA, 1993. Morgan Kaufmann.
Y. W. Teh, M. I. Jordan, M. J. Beal, and D. M. Blei. Sharing clusters among related groups: Hierarchical Dirichlet Processes. In L. K. Saul, Y. Weiss, and L. Bottou,
editors, Advances in Neural Information Processing Systems 17, Cambridge, MA, 2005. MIT Press.
Y. W. Teh, M. I. Jordan, M. J. Beal, and D. M. Blei. Hierarchical Dirichlet processes. Journal of the American
Statistical Society, 2006. To appear.
J. Wakefield, C. Zhou, and S. Self. Modelling gene expression over time: curve clustering with informative prior
distributions. In J. M. Bernardo, M. J. Bayarri, J. O.
Berger, A. P. Dawid, D. Heckerman, A. F. M. Smith, and
M. West, editors, Bayesian Statistics 7, Proc. 7th Valencia International Meeting, pages 721–732. OUP, 2003.
D. L. Wild, C. E. Rasmussen, Z. Ghahramani, J. Cregg,
B. J. de la Cruz, C-C. Kan, and K. A. Scanlon. A
Bayesian approach to modelling uncertainty in gene expression clusters, 2002. Extended conference abstract in
3rd Int. Conf. on Systems Biology, Stockholm, Sweden.
Appendices
Cluster validation is usually done by computation of indices, which signiify the quality of clustering, based either
on a comparison with “ground-truth” labels (external) or
without such comparison and relying on inherent qualities
of the dendrogram or putative labels (internal).
A.1
External indices
Let n be the number of data points, F 0 = {F1 , ..., Fm }
be the possible labels, let C 0 = {C1 , ..., Cn } be the clustering obtained by a clustering algorithm. Define two
n × n incidence matrices, F and C, s.t. Fij = 1 if both
the ith point and the j th point belong to same cluster in
F 0 , 0 otherwise. And, Cij = 1, if both the ith point and
the j th point belong to same cluster in C 0 , 0 otherwise.
Defining the following categories: SS = δ(Cij , 1)δ(Fij , 1),
DD = δ(Cij , 0)δ(Fij , 0), SD = δ(Cij , 1)δ(Fij , 0), and
DS = δ(Cij = 0)δ(Fij , 1), we use the following indices:
Internal indices
Silhouette: For a given cluster, Cj (j = 1, ..., m), this
method assigns to each sample of Cj a quality measure,
s(i) (i = 1, ..., n), known as the Silhouette width. The Silhouette width is a confidence indicator on the membership
of the ith sample in cluster Cj , defined as
s(i) = (b(i) − a(i)) / max{a(i), b(i)}
where a(i) is the average distance between the ith sample and all of the samples in Cj , and b(i) is the minimum average distance between the ith sample and all samples in Ck (k = 1, ..., c; k 6= j). For a given cluster, Cj
(j = 1, ...,P
m), it is possible to calculate a cluster Silhouette
Sj = n−1 n
j=1 s(i), which characterizes the heterogeneity
and isolation properties of such
P a cluster, and a Global
Silhouette value, GSu = m−1 m
j=1 Sj .
Dunn’s: This index identifies sets of clusters that are
compact and well separated. For any partition, U, produced by a clustering algorithm, let Ci represent the ith
cluster, the Dunn’s validation index, D, is defined as:
8
9
ff=
<
∆0 (Ci , Cj )
,
D(U ) = min
min
1≤i≤m :1≤i≤m
max1≤k≤m {∆(Ck )} ;
j6=i
0
where ∆ (Ci , Cj ) defines the distance between clusters Ci
and Cj (intercluster distance); ∆(Ck ) represents the intracluster distance of cluster Ck , and m is the number of clusters of partition. The main goal of this measure is to maximize intercluster distances whilst minimizing intra-cluster
distances; large values of D correspond to good clusters.
Davies-Bouldin: This index is defined as:
DB(U ) =
ff
c
∆(Ci ) + ∆(Cj )
1 X
max
,
m i=1 j6=i
δ(Ci , Cj )
where U , δ(Ci , Cj ), ∆(Ci ), ∆(Cj ) and m are defined as in
equation (7). Small values of DB correspond to clusters
that are compact, and whose centers are far away from
each other. Therefore, smaller DB is preferred.
| 5cs.CE
|
POLISH MODELS AND SOFIC ENTROPY
arXiv:1411.1510v4 [math.DS] 31 Dec 2015
BEN HAYES
Abstract. We deduce properties of the Koopman representation of a positive entropy probability measurepreserving action of a countable, discrete, sofic group. Our main result may be regarded as a “representationtheoretic” version of Sinaı̌’s Factor Theorem. We show that probability measure-preserving actions with
completely positive entropy of an infinite sofic group must be mixing and, if the group is nonamenable,
have spectral gap. This implies that if Γ is a nonamenable group and Γ y (X, µ) is a probability measurepreserving action which is not strongly ergodic, then no action orbit equivalent to Γ y (X, µ) has completely
positive entropy. Crucial to these results is a formula for entropy in the presence of a Polish, but a priori
noncompact, model.
Contents
1. Introduction
2. Preliminaries
2.1. Notational Remarks
2.2. Preliminaries on Sofic Groups
3. Definition of Entropy in the Presence of a Polish Model
4. Spectral Consequences of Positive Entropy
4.1. Representation Theoretic Preliminaries
4.2. Proofs of the Main Applications
References
1
6
6
7
9
19
19
21
25
1. Introduction
This paper is concerned with the structural consequences of positive entropy of probability measurepreserving actions of groups. Measure-theoretic entropy for actions of Z is classical and goes back to the
work of Kolmogorov and Sinaı̌. Roughly speaking, it measures the randomness of the action of Z. It was
realized by Kieffer in [27] that one could replace Z with the weaker condition of amenability of the group.
Amenability requires a sequence of non-empty finite subsets of the group over which one can average in
an approximately translation invariant way. Abelian groups, nilpotent groups and solvable groups are all
amenable, whereas the free group on r letters is not if r ≥ 1. Entropy for amenable groups is well established
as a useful quantity in ergodic theory: it can be computed in many interesting cases (although it is not easy
in general), when it is positive it reveals interesting structure on the action, and it has some useful general
and intuitive properties.
The most fundamental examples in entropy theory are Bernoulli shifts. If Γ is a countable, discrete group
and (Ω, ω) is a standard probability space the Bernoulli shift over (Ω, ω) is the probability measure-preserving
action Γ y (Ω, ω)Γ defined by
(gx)(h) = x(g −1 h), x ∈ ΩΓ , g, h ∈ Γ.
Bernoulli shifts over amenable groups are completely classified by their entropy. If Γ is an infinite, amenable
group and Γ y (X, µ) is a free, ergodic, probability measure-preserving action with positive entropy, then
Γ y (X, µ) factors onto a Bernoulli shift. In fact, in this situation, Γ y (X, µ) factors onto any Bernoulli
shift of entropy at most that of Γ y (X, µ). This is known as Sinaı̌’s factor theorem and it was proved for
Γ = Z by Sinaı̌ in [42] and for general amenable groups by Ornstein-Weiss in [35]. Sinaı̌’s factor theorem
Date: January 5, 2016.
2010 Mathematics Subject Classification. 37A35,47A67, 37A55, 46L89,
Key words and phrases. Sofic entropy, Sinaı̌’s factor theorem, noncommutative harmonic analysis.
1
2
BEN HAYES
is a fundamental result in entropy theory, as it shows that Bernoulli factors “capture” all the entropy of a
probability measure-preserving action of an amenable group and in some sense shows that entropy is simply
a measure of the amount of “Bernoulli-like” behavior an action has.
In groundbreaking work, L. Bowen defined entropy for probability measure-preserving actions of sofic
groups assuming the existence of a finite generating partition (see [5]). This assumption was then removed
by Kerr-Li who also defined entropy for actions of sofic groups on compact, metrizable spaces (see [25]).
We refer the reader to see Section 2.2 for the precise definition. Sofic groups form a vastly larger class
of groups than amenable groups, it is known that amenable groups, free groups, residually finite groups
and linear groups are all sofic and soficity is closed under free products with amalgamation over amenable
subgroups (see [16],[15],[17],[36],[38]). Thus sofic entropy is a considerable extension of entropy for actions
of an amenable group defined by Kieffer. Roughly, a group is sofic if it has “almost actions” on finite
sets which are “almost free.” A sequence of such “almost actions” is called a sofic approximation. Entropy
for a probability measure-preserving action Γ y (X, µ) of a sofic group is then defined as the exponential
growth rate of the number of finitary models there are of the action which are compatible with the fixed
sofic approximation. Using sofic entropy, Bowen showed that if two Bernoulli shifts over a sofic group are
isomorphic, then their base entropies are the same. Kerr-Li reproved this result with a more direct proof
when the base space has infinite entropy in [24].
Since the subject is fairly young there are relatively few known structural consequences of positive measure
entropy for actions of arbitrary sofic groups. For example, Sinaı̌’s factor theorem is not known for sofic groups.
Previous consequences of entropy for actions of sofic groups have either been for topological actions or for
specific groups. In [26], Kerr-Li prove that actions with positive topological entropy must exhibit some
chaotic behavior (for example, they must be Li-Yorke chaotic). When the acting group is a free group one
can consider another form of measure entropy, defined by Bowen in [6], called f -invariant entropy. The
f -invariant entropy is roughly a “randomized” version of sofic entropy. Interesting consequences have been
given by Seward in [40] for the case of f -invariant entropy, but those only apply when the group is a free
group. After the appearance of our preprint, Meyerovitch showed in [33] that positive sofic entropy implies
that almost every stabilizer of the action is finite.
In this paper, we will deduce structural consequences of positive measure entropy for actions of arbitrary
sofic groups. Our applications are to spectral properties of such actions. To the best of our knowledge,
aside from the results in our paper, the results of Meyerovitch are the only ones which deduce properties
of an action of a general sofic group assuming only that the action has positive entropy. Recall that if
Γ y (X, µ) is a probability measure-preserving action of a countable discrete group Γ, we have an induced
unitary representation ρΓy(X,µ) : Γ → U(L2 (X, µ)) given by
(ρΓy(X,µ) (g)ξ)(x) = ξ(g −1 x).
We use ρ0Γy(X,µ) for the restriction of ρΓy(X,µ) to L2 (X, µ) ⊖ C1. The representation ρ0Γy(X,µ) is called the
Koopman representation of Γ y (X, µ). Properties of a probability-measure preserving action which only
depend upon the Koopman representation are called spectral properties. The Koopman representation has
played a significant role in ergodic theory since the early days of the subject, being the means to deduce von
Neumann’s Mean Ergodic Theorem which the Ergodic Theorem relies upon as a first step. Additionally,
many other fundamental properties such as compactness, weak mixing, mixing and ergodicity are all spectral
properties.
Our results show that one canonical representation of a group plays a special role in entropy theory. Recall
that the left regular representation of a group λ : Γ → U(ℓ2 (Γ)) is defined by (λ(g)f )(x) = f (g −1 x). We will
sometimes use λΓ to specify the group. We will also use λΓ,R (or λR if the group is clear) for the orthogonal
representation which is the restriction of λΓ to ℓ2 (Γ, R).
Let ρj : Γ → U(Hj ) be two unitary representations of a countable discrete group Γ. We say that ρ1 , ρ2
are singular and write ρ1 ⊥ ρ2 if no nonzero subrepresentation of ρ1 embeds into ρ2 . By subrepresentation,
we mean a restriction of ρj , j = 1, 2 to a closed, Γ-invariant, linear subspace. As is customary, we will often
call a closed, Γ-invariant, linear subspace a subrepresentation as well. The terminology of singularity comes
from the case Γ = Z. If µ is a Borel measure on T = R/Z, then we have a natural unitary representation
ρµ : Z → U(L2 (T, µ))
POLISH MODELS AND SOFIC ENTROPY
3
given by
(ρµ (n)ξ)(θ) = e2πinθ ξ(θ).
It is easy to check that ρµ ⊥ ρν if and only if µ ⊥ ν. Similar analysis can be done for any abelian group
(replacing T by the Pontryagin dual). Thus, singularity of representations is a natural generalization to
noncommutative groups of singularity of measures.
If Γ y (X, µ) is a probability measure-preserving action of a countable, discrete sofic group and Σ is
a sofic approximation of Γ (see Definition 2.1 for the precise definition of a sofic approximation) we use
hΣ,µ (X, Γ) for the entropy of Γ y (X, µ) with respect to Σ as defined by Bowen, Kerr-Li.
Theorem 1.1. Let Γ be a countably infinite discrete sofic group with sofic approximation Σ. Let Γ y
(X, M, µ) be a measure-preserving action where (X, M, µ) is a standard probability space. Suppose that
H ⊆ L2 (X, µ) is a subrepresentation such that M is generated (up to sets of measure zero) by
If ρ0Γy(X,µ)
{f −1 (A) : f ∈ H, A ⊆ C is Borel}.
H
is singular with respect to the left regular representation, then
hΣ,µ (X, Γ) ≤ 0.
It is well-known that if (Ω, ω) is a standard probability space, then for the Bernoulli action Γ y (Ω, ω)Γ
we have
(1)
ρ0Γy(Ω,ω)Γ ∼
= λ⊕∞
Γ .
We mentioned before that Sinaı̌’s factor theorem is not known for sofic groups. Note that if Γ y (X, µ) factors
embeds into ρ0Γy(X,µ) . In this manner, Theorem 1.1 may
onto a Bernoulli shift, then by (1) we have that λ⊕∞
Γ
be regarded as a weak version of Sinaı̌’s Factor Theorem for sofic groups. It shows that at the representationtheoretic level, an action of a sofic group with positive entropy must contain a subrepresentation of the
Koopman representation of a Bernoulli shift. We can thus think of this theorem as a “representationtheoretic version” of Sinaı̌’s Factor Theorem. It is also the first result which indicates that positive entropy
actions of sofic groups must behave in a manner “similar” to Bernoulli shifts.
We can say even more than Theorem 1.1 if we assume a stronger version of positive entropy. Recall that
an action Γ y (X, µ) has completely positive entropy with respect to a sofic approximation Σ if whenever
Γ y (Y, ν) is a factor of Γ y (X, µ) and (Y, ν) is not a one-atom space then hΣ,ν (Y, Γ) > 0. The following
is easy from Theorem 1.1.
Corollary 1.2. Let Γ be a countable discrete sofic group with sofic approximation Σ. Suppose that Γ y (X, µ)
has completely positive entropy with respect to Σ. Then the Koopman representation of Γ y (X, µ) is
embeddable into the infinite direct sum of the left regular representation.
Corollary 1.2 was proved for Γ amenable by Dooley and Golodets in [14]. Here we should mention that
Dooley-Golodets actually prove that if Γ y (X, µ) has completely positive entropy and Γ is amenable,
then the Koopman representation of Γ y (X, µ) is isomorphic to an infinite direct sum of the left regular
representation. This is an easy consequence of Corollary 1.2 and Sinaı̌’s factor theorem. Since Sinaı̌’s factor
theorem is not known for sofic groups, we do not know if ρ0Γy(X,µ) ∼
= λ⊕∞ (instead of just ρ0Γy(X,µ) embeds
⊕∞
into λ ) when Γ is sofic.
From Corollary 1.2, we automatically deduce other important structural properties of completely positive
entropy actions of a sofic group, specifically mixing and spectral gap. A probability measure-preserving
action Γ y (X, µ) is said to:
(i): be mixing if limg→∞ µ(gA ∩ B) = µ(A)µ(B) for all measurable A, B ⊆ X,
(ii): be strongly ergodic if for every sequence An of measurable subsets of X with µ(gAn ∆An ) → 0 for all
g ∈ Γ we have that µ(An )(1 − µ(An )) → 0,
(iii): have spectral gap if for every sequence ξn ∈ L2 (X, µ) with kgξn − ξn k2 → 0 for all g ∈ Γ, it is true
that kξn k2 → 0.
It is easy to see that spectral gap implies strong ergodicity.
4
BEN HAYES
Corollary 1.3. Let Γ be a countable discrete sofic group with sofic approximation Σ. Suppose that Γ y (X, µ)
has completely positive entropy with respect to Σ.
(i): If Γ is infinite, then Γ y (X, µ) is mixing.
(ii): If Λ is any nonamenable subgroup of Γ, then Λ y (X, µ) is strongly ergodic (in fact it has spectral
gap).
There is another approach to nonamenable entropy, called Rokhlin entropy, due to Seward in [41]. It
has the advantage of being easy to define and being defined for all groups, but the disadvantage of being
extremely difficult to compute. Rokhlin entropy is an upper bound for sofic entropy, but there are no known
cases where one can prove an action has positive Rokhlin entropy without using that is has positive sofic
entropy. We mention that completely positive Rokhlin entropy can be defined in a similar manner. After
the appearance of our preprint, Alpeev in [1] proved that actions with completely positive Rohklin entropy
are weakly mixing. His approach is completely elementary. It is easy to see that completely positive sofic
entropy implies completely positive Rokhlin entropy. Whether or not actions of a nonamenable group with
completely positive Rohklin entropy are mixing, strongly ergodic, or have spectral gap all appear to be
open. It seems to be very difficult to deduce properties of the Koopman representation of an action from
the assumption that the action has positive Rokhlin entropy.
Part (ii) of the above Corollary is rather special to nonamenable groups. Recall that two probability
measure-preserving actions Γ y (X, µ), Λ y (Y, ν) of countable discrete groups Γ, Λ are said to be orbit
equivalent if there is a measure space isomorphism θ : (X, µ) → (Y, ν) so that θ takes the Γ-orbits to Λ-orbits,
i.e. θ(Γx) = Λθ(x) for almost every x ∈ X. Orbit equivalence theory is an area of much current interest
relating to operator algebras, ergodic theory and group theory. Strong ergodicity is an invariant of the orbit
equivalence class of the action. Our corollary shows that if Γ y (X, µ) is a probability measure-preserving
action of a nonamenable group and if the action is not strongly ergodic, then no action orbit equivalent to
Γ y (X, µ) has completely positive entropy. Our result indicates that entropy for actions of nonamenable
groups may have nontrivial consequences for orbit equivalence theory. It is a celebrated, and deep, fact that
all ergodic actions of an amenable group are orbit equivalent. This is due to Connes-Feldman-Weiss and
Ornstein-Weiss (see [12],[34]). Thus entropy for actions of amenable groups cannot have any consequences
for orbit equivalence theory.
Spectral gap and strong ergodicity are important properties with many applications. Spectral gap has
connections to expander graphs (see [3],[2],[4], [31]), orbit equivalence rigidity (see [21],[37]) and number
theory (see [39]). Spectral gap is also related to the Banach-Ruziewicz problem which asks if Lebesgue
measure is the unique, finitely-additive, rotation-invariant, probability measure on the sphere defined on all
Lebesgue measurable sets (solved independently by Margulis [32] and Sullivan [43]). It is well known that
no action of an amenable group is strongly ergodic. The consequences entropy has for strong ergodicity,
spectral gap and orbit equivalence indicate that entropy for nonamenable groups may be used to deduce
phenomena not present in the realm of ergodic theory of amenable groups. This reveals the importance of
generalizing entropy to actions of nonamenable groups.
We briefly outline the key differences in our approach and the approach of Dooley-Golodets to prove
Corollary 1.2. Dooley-Golodets first prove Theorem 1.1 when Γ = Z. Fourier analysis reduces Theorem 1.1
for Γ = Z to the fact that if µ, ν are mutually singular, Borel, probability measures on the circle, then there
is a continuous function f on the circle with 0 ≤ f ≤ 1 so that f is “close” to the constant function 1 in
L2 (µ), but is “close” to zero in L2 (ν). This fact is a simple exercise in measure theory. Dooley-Golodets
then deduce Corollary 1.2 for Γ amenable from the case Γ = Z by using that all amenable groups are orbit
equivalent to the integers.
Our approach is to prove Theorem 1.1 for a general sofic group, by simply replacing the harmonic analysis
for Γ = Z with noncommutative harmonic analysis for a general group. The assumption about singularity of
measures is then replaced by singularity of representations of groups. The representation theory of a group
is captured by its universal C ∗ -algebra and so it is natural to replace the algebra of continuous functions on
T with the C ∗ -algebra of the group. One can then characterize singularity of representations of an arbitrary
group in a manner similar to the preceding paragraph. In short, we abstract the harmonic analysis for the
case Γ = Z to noncommutative harmonic analysis for a nonabelian group. This approach uses essentially no
structure of the group and removes the orbit equivalence techniques in the approach of [14], which are only
valid in the case of amenable groups.
POLISH MODELS AND SOFIC ENTROPY
5
Although this approach using noncommutative harmonic analysis may make our methods seem abstract
and esoteric, the proof of Theorem 1.1 is essentially self-contained. After the input of the aforementioned
noncommutative harmonic analysis techniques, as well as basic facts about Borel measures on Polish spaces,
the rest of the proof of Theorem 1.1 is elementary. It only relies on basic consequences of the finitedimensional spectral theorem and simple volume counting estimates. Additionally, the noncommutative
harmonic analysis techniques used lie at the basics of C ∗ -algebra theory. On the other hand, the fact that
every action is amenable groups is orbit equivalent to the integers is fairly deep. So in the amenable case we
have discovered a more direct and elementary proof of Corollary 1.2.
Intuitively, entropy should be some measure of randomness of the system. Theorem 1.1 shows indeed that
positive entropy actions must exhibit some randomness properties. For example, we can view the left regular
representation as the representation which exhibits the perfect amount of mixing. We can also use Theorem
1.1 to show that highly structured actions, like compact actions, must have nonpositive sofic entropy.
Corollary 1.4. Let Γ be a countable discrete sofic group with sofic approximation Σ. Suppose that α : Γ →
Aut(X, µ) has image contained in a compact (for the weak topology) subgroup of Aut(X, µ). Then for the
action given by α,
hΣ,µ (X, Γ) ≤ 0.
In a previous version of this article, we used our techniques to prove that distal measure-theoretic action
have entropy zero. After the appearance of this version, Alpeev proved in [1] that measure distal actions of
an arbitrary group have Rohklin entropy zero. Then, Burton proved in [10] that distal actions have naive
entropy zero if the group contains a copy of Z. Naive entropy zero implies Rohklin entropy zero which in
turn implies sofic entropy zero. These proofs are both elementary, whiles ours is arguably not. We have
elected to remove this section from the current version of this article, as we are actually going to prove more
general results in [19] which will give structural results of a probability measure-preserving action of a sofic
group relative to its Pinsker factor. The results in [1] imply that Rohklin entropy decreases for compact
extensions (and our results in [19] prove the same result for sofic entropy) and it appears that it is unknown
whether or not naive entropy decreases under compact extensions.
An important new tool we use to prove all of these theorems is Polish models. If Γ y (X, µ) is a
probability measure-preserving action of a countable discrete group, a topological model for the action is an
action Γ y (Y, ν) isomorphic to Γ y (X, µ) where Y is a separable, metrizable topological space, ν is a
Γ-invariant Borel probability measure on Y and the action is by homeomorphisms. Roughly one can think of
this as giving a topology on X so that the action is by homeomorphisms. For actions on standard probability
spaces compact models always exist. Moreover, Kerr-Li in [25] show that one can compute entropy in the
presence of a compact model in a manner which uses the topology. Many of the computations for sofic
entropy have used the compact model formalism (see [28],[25],[18]). To prove the above theorems, we give
a definition of sofic entropy in the presence of a Polish model (that is where Y is merely assumed to be
a Polish space, i.e. a completely metrizable separable topological space). We remark here that R. Bowen
defined (see [8]) topological entropy for uniformly continuous automorphisms of a metric space, proving that
it was invariant under uniformly continuous conjugacies. Our approach is slightly different here, we do not
require the homeomorphisms to be uniformly continuous and R. Bowen did not consider measure-preserving
actions.
Since compact models always exist, we should mention why we decided to consider the case of a Polish
model. For this, let us mention a natural way of obtaining Polish models. Given a probability measurepreserving action Γ y (X, M, µ), we say that a family F of measurable functions X → C is generating
if M is the smallest complete, Γ-invariant sigma-algebra of sets in X which makes all the elements of F
measurable. Associated to a family of generators, one can canonically produce a topological model in the
following manner. Define
Φ : X → CF ×Γ
by
Φ(x)(f, g) = f (g −1 x)
and let Γ y CF ×Γ be the shift action given by
(gx)(f, h) = x(f, g −1 h).
6
BEN HAYES
Setting ν = Φ∗ µ, we have that Γ y (CF ×Γ , ν) is a topological model of our action. We can thus think
of topological models as a “presentation-theoretic” approach to ergodic theory analogous to presentation
theory of groups. If F ⊆ L∞ (X, µ), then the topological model one produces above is a compact model. In
general the topological model is Polish. Thus Polish models are a canonical way of dealing with unbounded
generators. This is relevant because all of our assumptions are about functions in L2 (X, µ) and not L∞ (X, µ).
There are of course ways of turning a family of generators which are unbounded into family of generators
which are bounded. One can employ cut-off functions, or compose with injective continuous maps R →
[−1, 1]. We warn the reader that all of these attempts to reduce to a family of bounded generators destroy
our representation-theoretic hypotheses and so we will really need to deal with unbounded generators and,
as a consequence, Polish models.
We remark here that if we take the above topological model associated to family of generators in L∞ (X, µ)
then we essentially recover the operator algebraic approach to sofic entropy by Kerr-Li in [25]. Thus the
Polish model approach to sofic entropy may be regarded as a generalization of the operator algebra approach
given by Kerr-Li in [25] to a family of unbounded generators. The crucial aspect of Polish spaces which
allows us to equate our definition of entropy for a Polish model to that of Bowen and Kerr-Li is tightness
of a single probability measure on a Polish space. Tightness roughly asserts that, up to a small error, the
probability measure the probability measure is supported on a compact set. There are examples of separable
metrizable spaces where not every Borel probability measure is tight (e.g. see the remarks after Theorem 23
of [44]) and this is the reason we need our spaces to be Polish. The assumption of a topological model being
Polish is also natural since the canonical topological model associated to a family of generators is always
Polish.
Acknowledgments Much of this work was done while I was still a PhD student at UCLA. I am very
grateful to the kind hospitality and stimulating environment at UCLA. I would like to thank Lewis Bowen
for suggesting the problem of computing sofic entropy of Gaussian actions in the program “Von Neumann
algebras and ergodic theory of group actions” at Insitut Henri Poincaré in 2011. The solution to this problem
ultimately led to this work. I would like to thank Stephanie Lewkiewicz for many interesting discussion about
Polish models.
2. Preliminaries
2.1. Notational Remarks. We will use ρ for a representation. We will thus have to forego the usual
practice in sofic entropy of using ρ for a metric, and will instead use ∆.
If A, B are sets we use B A for all functions f : A → B. If A = {1, . . . , n} we will use B n instead of
{1,...,n}
B
. If C is another set and φ : B → C is a function, we use φn : B n → C n for the map
φn (f ) = f ◦ φ.
If X is a Polish space, and f ∈ Cb (X) we use kf k for the uniform norm of f. We will use kf kCb (X) if the
space X is not clear from the context.
Let (A, ∆) be a pseudometric space. For subsets C, B of A, and ε > 0 we say that C is ε-contained in
B and write C ⊆ε B if for all c ∈ C, there is a b ∈ B so that ∆(c, b) < ε. We say that S ⊆ A is ε-dense if
A ⊆ε S. We use Sε (A, ∆) for the smallest cardinality of a ε-dense subset of A. If C ⊆δ B are subsets of A,
then
S2(ε+δ) (C, ∆) ≤ Sε (B, ∆).
If A is a finite set we will use uA for the uniform probability measure on A. We will typically write un instead
of u{1,...,n} . For x ∈ Cn , kxk2 will denote the ℓ2 norm with respect to un unless otherwise stated. There are
certain times when we will have to use k · kℓ2 (n) , k · kℓ2 (n,un ) at the same time. In such an instance we will
use notation which specifies which ℓ2 -norm we are using. Additionally, we will use
h·, ·iℓ2 (n) ,
2
2
h·, ·iℓ2 (n,un )
for the inner products on ℓ (n), ℓ (n, un ) when there is potential confusion. If it is not otherwise specified,
then
h·, ·i
refers to the inner product with respect to ℓ2 (n, un ).
POLISH MODELS AND SOFIC ENTROPY
7
We say that N ⊆ A is ε-separated if for every n1 6= n2 in N we have ∆(n1 , n2 ) > ε. We use Nε (A, ∆) for
the smallest cardinality of a ε-separated subset of A. Note that
(2)
N2ε (A, ∆) ≤ Sε (A, ∆) ≤ Nε (A, ∆),
and that if A ⊆ B, then
Nε (A, ∆) ≤ Nε (B, ∆).
2.2. Preliminaries on Sofic Groups. We use Sn for the symmetric group on n letters. If A is a set, we
will use Sym(A) for the set of bijections of A.
Definition 2.1. Let Γ be a countable discrete group. A sofic approximation of Γ is a sequence Σ = (σi : Γ →
Sdi ) of functions (not assumed to be homomorphisms) so that
lim udi ({1 ≤ k ≤ di : σi (g)σi (h)(k) = σi (gh)(k)}) = 1, for all g, h ∈ Γ
i→∞
lim udi ({1 ≤ k ≤ di : σi (g)(k) 6= σi (h)(k)}) = 1, for all g 6= h in Γ.
i→∞
We will call Γ sofic if it has a sofic approximation.
It is known that all amenable groups and residually finite groups are sofic. Also, it is known that soficity
is closed under free products with amalgamation over amenable subgroups (see [17],[36],[16],[15], [38]). Also
graph products of sofic groups are sofic by [11]. Additionally, residually sofic groups and locally sofic groups
are sofic. Thus by Malcev’s Theorem we know all linear groups are sofic. Finally, if Λ is a subgroup of Γ,
and Λ is sofic and Γ y Γ/Λ is amenable (in the sense of having a Γ-invariant mean) then Γ is sofic (this
can be seen by a mild generalization of the argument in Theorem 1 of [17] using e.g. the observation after
Definition 12.2.12 of [9]).
We will need to extend a sofic approximation to certain algebras associated to Γ. Let C(Γ) be the ring of
finite formal linear combinations of elements of Γ with addition defined naturally and multiplication defined
by
!
!
X
X
X X
ag g
bh h =
ah bh−1 g g.
g∈Γ
h∈Γ
g∈Γ
h∈Γ
We will also define a conjugate-linear involution on C(Γ) by
∗
X
X
ag g =
ag−1 g.
g∈Γ
g∈Γ
P
Given a sofic approximation Σ = (σi : Γ → Sdi ) and α = g∈Γ αg g ∈ C(Γ) we define σi (α) ∈ Mdi (C) by
X
σi (α) =
αg σi (g).
g∈Γ
In order to talk about the asymptotic properties of this extended sofic approximation, we will need a more
analytic object associated to Γ.
Let λ : Γ → U(ℓ2 (Γ)) be the left regular representation defined by (λ(g)ξ)(h) = ξ(g −1 h). We will continue
to use λ for the linear extension to C(Γ) → B(ℓ2 (Γ)). The group von Neumann algebra of Γ is defined by
λ(C(Γ))
W OT
where WOT denotes the weak operator topology. We will use L(Γ) to denote the group von Neumann
algebra. Define τ : L(Γ) → C by
τ (x) = hxδe , δe i.
We leave it as an exercise to the reader to verify that τ has the following properties.
1: τ (1) = 1,
2: τ (x∗ x) ≥ 0, with equality if and only if x = 0,
3: τ (xy) = τ (yx), for all x, y ∈ M,
4: τ is weak operator topology continuous.
8
BEN HAYES
We call the third property the tracial property. We will typically view C(Γ) as a subset of L(Γ). In particular,
we will use τ as well for the functional on C(Γ) which is just the restriction of τ on L(Γ).
In order to state our extension of a sofic approximation properly, we shall give a general definition.
Recall that ∗-algebra is a complex algebra equipped with an involution ∗ which is conjugate linear and
antimultiplicative.
Definition 2.2. A tracial ∗-algebra is a pair (A, τ ) where A is a ∗-algebra equipped with a linear functional
τ : A → C so that
1: τ (1) = 1,
2: τ (x∗ x) ≥ 0, with equality if and only if x = 0,
3: τ (xy) = τ (yx), for all x, y ∈ M,
4: For all a ∈ A, there is a Ca > 0 so that for all x ∈ A, |τ (x∗ a∗ ax)| ≤ Ca τ (x∗ x).
For a, b ∈ A we let ha, bi = τ (b∗ a) and we let kak2 = τ (a∗ a)1/2 . We let L2 (A, τ ) be the Hilbert space
completion of A in this inner product. By condition 4 of the definition, we have a representation λ : A →
B(L2 (A, τ )) defined densely by λ(a)x = ax for x ∈ A. We let kak∞ = kλ(a)k.
We make Mn (C) into a tracial ∗-algebra using tr = n1 Tr where Tr is the usual trace. In particular, we
use kAk2 = tr(A∗ A)1/2 and kAk∞ will denote the operator norm.
We let C[X1 , . . . , Xn ] be the free ∗-algebra on n-generators X1 , . . . , Xn . We will call elements of C[X1 , . . . , Xn ]
∗-polynomials in n indeterminates. For a ∗-algebra A, for elements a1 , . . . , an ∈ A, and P ∈ C[X1 , . . . , Xn ]
we use P (a1 , . . . , an ) for the image of P under the unique ∗-homomorphism C[X1 , . . . , Xn ] → A sending Xj
to aj .
Definition 2.3. Let (A, τ ) be a tracial ∗-algebra. An embedding sequence is a sequence Σ = (σi : A →
Mdi (C)) such that
sup kσi (a)k∞ < ∞, for all a ∈ A
i
kP (σi (a1 ), . . . , σi (an )) − σi (P (a1 , . . . , an ))k2 → 0, for all a1 , . . . , an ∈ A and all P ∈ C[X1 , . . . , Xn ]
tr(σi (a)) → τ (a) for all a ∈ A.
We will frequently use the following fact: if x1 , . . . , xn ∈ A and P ∈ C[X1 , . . . , Xn ] then
(3)
kP (σi (x1 ), . . . , σi (xn ))k2 → kP (x1 , . . . , xn )k2 .
To prove this, first note that as
kP (σi (x1 ), . . . , σi (xn )) − σi (P (x1 , . . . , xn ))k2 → 0,
it suffices to handle the case n = 1 and P (X) = X. In this case,
kσi (x)k22 = tr(σi (x)∗ σi (x))
and since kσi (x)∗ σi (x) − σi (x∗ x)k2 → 0 we have
Since
| tr(σi (x)∗ σi (x)) − tr(σi (x∗ x))| → 0.
tr(σi (x∗ x)) → kxk22 ,
we have proved (3).
The proof of the next two propositions will be left to the reader.
Proposition 2.4. Let Γ be a countable discrete sofic group with sofic approximation Σ = (σi : Γ → Sdi ).
Extend Σ to maps σi : C(Γ) → Mdi (C) linearly. Then Σ is an embedding sequence of (C(Γ), τ ).
Proposition 2.5. Let (A, τ ) be a tracial ∗-algebra and Σ = (σi : A → Mdi (C)) be an embedding sequence.
If Σ′ = (σi′ : A → Mdi (C)) is another sequence of functions so that
sup kσi′ (a)k∞ < ∞, for all a ∈ A,
i
then Σ′ is an embedding sequence.
kσi (a) − σi′ (a)k2 → 0, for all a ∈ A,
POLISH MODELS AND SOFIC ENTROPY
9
We will in fact need to extend our sofic approximation to the group von Neumann algebra. For this, we
use the following.
Lemma 2.6 (Lemma 5.5 in [20]). Let Γ be a countable discrete group. Then any embedding sequence for
C(Γ) extends to one for L(Γ).
We will use the preceding lemma when Γ is sofic, in combination with Proposition 2.4. We will often need
the following volume-packing estimate.
Lemma 2.7. Let n ∈ N, and p ∈ B(ℓ2 (n, un )) an orthogonal projection. For any M, ε > 0 we have
2 tr(p)n
3M + ε
.
Sε (M p Ball(ℓ2 (n, un ))) ≤
3
Proof. Let A ⊆ M p Ball(ℓ2 (n, un )) be a maximal ε-separated subset of M p Ball(ℓ2 (n, un )). Thus A is ε-dense.
Further,
[
(M + ε/3)p Ball(ℓ2 (n, un )) ⊇
x + (ε/3)p Ball(ℓ2 (n, un )),
x∈A
and the right-hand side is a disjoint union. By linear algebra, the real dimension of the image of p is 2 tr(p)n.
Thus computing volumes:
(M + ε/3)2 tr(p)n vol(p Ball(ℓ2 (n, un )) ≥ |A|(ε/3)2 tr(p)n vol(p Ball(ℓ2 (n, un ))).
Thus
|A| ≤
3M + ε
ε
2 tr(p)n
.
3. Definition of Entropy in the Presence of a Polish Model
Our definition will follow the ideas in [23] and will use dynamically generating pseudometrics. We need
to state the definition so that it works for actions on Polish spaces. We will need to assume that the
pseudometrics are bounded as this is no longer automatic in the noncompact case.
Definition 3.1. Let Γ be a countable discrete group and X a Polish space with Γ y X by homeomorphisms.
A bounded continuous pseudometric ∆ on X is said to be dynamically generating if for any x ∈ X and any
open neighborhood U of x in X, there is a δ > 0 and a F ⊆ Γ finite so that if x ∈ X and maxg∈F d(gx, gy) < δ,
then y ∈ U.
Recall that if X is compact, and Γ is a countable discrete group acting on X by homeomorphisms and ∆
is a continuous pseudometric on X, then ∆ is said to be dynamically generating if
sup ∆(gx, gy) > 0 whenever x 6= y in X
g∈Γ
(see e.g. [29] Section 4). The fact that this is equivalent to our definition is an easy exercise using compactness
of X.
When X is Polish, as we shall see in the proof of Lemma 3.9 it really is necessary to require the existence
of U, δ, F as in the preceding definition instead of just
sup ∆(gx, gy) > 0 whenever x 6= y in X.
g∈Γ
One way to realize why this is the correct definition is as follows: let (X, ∆, Γ) be as in the preceding
definition and let Y be X modded out by the equivalence relation of a ∼ b if ∆(a, b) = 0. Give Y the metric
∆([a], [b]) = ∆(a, b).
Consider the continuous map
given by
Φ: X → Y Γ
Φ(x)(g) = [gx],
10
BEN HAYES
where we use [a] for the equivalence class of a ∈ X. The existence of U, δ as in the definition is the precise
requirement one needs to guarantee that Φ is a homeomorphism onto its image. This will be explicitly
proven in Lemma 3.9.
If (X, ∆) is a pseudometric space, we let ∆2 be the pseudometric on X n defined by
n
1X
∆(x(j), y(j))2 .
∆2 (x, y) =
n j=1
2
Definition 3.2. Let Γ be a countable discrete group and X a Polish space with Γ y X by homeomorphisms.
Let ∆ be a bounded pseudometric on X. For a function σ : Γ → Sd , for some d ∈ N, a finite F ⊆ Γ, and a
δ > 0 we let Map(∆, F, δ, σ) be all functions φ : {1, . . . , d} → X so that
max ∆2 (φ ◦ σ(g), gφ) < δ,
g∈F
We caution the reader that though we shall typically require X to be Polish, we will not require our
pseudometrics to be complete. We will typically only need to care about the topological consequences of
being Polish and not any metric properties. Note that Map(∆, F, δ, σ) does not account for the measuretheoretic structure of X. Given a Polish space X, a finite L ⊆ Cb (X), a δ > 0, and µ ∈ Prob(X) let
Z
Z
\
UL,δ (µ) =
ν ∈ Prob(X) :
f dν − f dµ < δ .
f ∈L
Then UL,δ (µ) form a basis of neighborhoods of µ for the weak topology. Here Cb (X) is the space of bounded
continuous functions on X. Recall that ud denotes the uniform probability measure on {1, . . . , d}.
Definition 3.3. Suppose that µ is a Γ-invariant Borel probability measure on X. For F ⊆ Γ finite, δ > 0
and L ⊆ Cb (X) finite, and σ : Γ → Sd for some d ∈ N we let Mapµ (∆, F, δ, L, σ) be the set of all φ ∈
Map(∆, F, δ, σ) so that
φ∗ (ud ) ∈ UL,δ (µ).
for all f ∈ L.
Definition 3.4. Let Γ be a countable discrete sofic group with sofic approximation Σ = (σi : Γ → Sdi ). Let
X be a Polish space with Γ y X by homeomorphisms and µ a Γ-invariant, Borel, probability measure on
X. We define the entropy of Γ y (X, µ) by
hΣ,µ (∆, ε, F, δ, L) = lim sup
i→∞
hΣ,µ (∆, ε) =
1
log Nε (Mapµ (∆, F, δ, L, σi ), ∆2 )
di
inf
F ⊆Γfinite,
δ>0,
L⊆Cb (X)finite
hΣ,µ (∆, F, δ, L, ε)
hΣ,µ (∆) = sup hΣ,µ (∆, ε).
ε>0
By (2) we know that hΣ,µ (∆) is unchanged if we replace Nε with Sε . Because we use Nε instead of Sε ,
we have hΣ,µ (∆, ε, F, δ, L) ≤ hΣ,µ (∆, ε, F ′ , δ ′ , L′ ) if F ⊇ F ′ , δ ≤ δ ′ , L ⊇ L′ .
The reader may be concerned about finiteness of the expression Nε (Mapµ (∆, F, δ, L, σi ), ∆2 ), since X is
not compact. We note that if ε > 0 is given, there is a finite L ⊆ Cb (X), and δ > 0 so that for any finite
F ⊆ Γ we have
Nε (Mapµ (∆, F, δ, L, σi ), ∆2 ) < ∞.
To see this, note that by Prokhorov’s Theorem we may choose a K ⊆ X compact so that
µ(K) ≥ 1 − ε.
It is not hard to see that if L ⊆ Cb (X) is sufficiently large and δ > 0 is sufficiently small, then for any
φ ∈ Mapµ (∆, F, δ, L, σi ),
1
|{j : φ(j) ∈
/ K}| = φ∗ (ud )(K c ) ≤ 2ε.
d
POLISH MODELS AND SOFIC ENTROPY
11
Suppose that S is a finite ε-dense subset of K. Let M be the diameter of (X, ∆) and fix x0 ∈ X. If we
set A = φ−1 (K), then we find that udi (A) ≥ 1 − ε. We can find a ψ ∈ S A so that if ψe : {1, . . . , di } → X is
defined by
(
e = ψ(j), if j ∈ A,
ψ(j)
x0 ,
if j ∈ {1, . . . , di } \ A.
Then
e 2 ≤ 2M 2 ε + ε2 .
∆2 (φ, ψ)
Thus
N2(2M 2 ε+ε2 )1/2 (Mapµ (∆, F, δ, L, σi ), ∆2 ) ≤ S(2M 2 ε+ε2 )1/2 (Mapµ (∆, F, δ, L, σi ), ∆2 ) ≤ Sε (K) < ∞.
The main goal of this section is to show that hΣ,µ (∆) is the same as the measure entropy of Γ y (X, µ)
as defined by Bowen and extended by Kerr-Li. Throughout we use hΣ,µ (X, Γ) for sofic measure entropy as
defined by [5],[25]. We will use the formulation of sofic entropy in terms of partitions due to Kerr in [22].
However, we will use the terminology of observables as Bowen did in [6].
Definition 3.5. Let (X, M, µ) be a standard probability space. Let S be a subalgebra of M (here S is
not necessarily a σ-algebra). A finite S-measurable observable is a measurable map α : X → A where A
is a finite set and α−1 ({a}) ∈ S for all a ∈ A. If S = M we simply call α a finite observable. Another
finite S-measurable observable β : X → B is said to refine α, written α ≤ β, if there is a π : B → A so that
π(β(x)) = α(x) for almost every x ∈ X. If Γ is a countable discrete group and Γ y (X, M, µ) by measurepreserving transformations we say that S is generating if M is the σ-algebra generated by {gA : A ∈ S} (up
to sets of measure zero).
For the next definition we need to set up some notation. Given a standard probability space (X, M, µ),
a countable discrete group with Γ y (X, M, µ) by measure-preserving transformations, a finite observable
α : X → A and F ⊆ Γ finite, we let
α
eF : X → AF
be defined by
α
eF (x)(g) = α(g −1 x).
Definition 3.6. Let Γ be a countable discrete group and σ ∈ SdΓ for some d ∈ N. Let (X, M, µ) be a standard
probability space and let S ⊆ M be a subalgebra. Let α : X → A be a finite S measurable-observable. Given
F ⊆ Γ finite, and δ > 0, we let AP(α, F, δ, σ) be the set of all φ : {1, . . . , d} → AF so that
X
ud ((φ−1 ({a})) − µ((e
αF )−1 ({a})) < δ.
a∈AF
udi ({j : φ(j)(g) = φ(σi (g)−1 (j))(e)}) < δ, for all g ∈ F.
We now give Kerr’s definition of sofic measure entropy in [22].
Definition 3.7. Let Γ be a countable discrete sofic group with sofic approximation Σ = (σi : Γ → Sdi ). Let
(X, M, µ) be a standard probability space and Γ y (X, M, µ) by measure-preserving transformations. Let
S be a subalgebra of M. Let α : X → A be a finite S-measurable observable, and let β : X → B refine α,
and π : B → A as in the definition of α ≤ β. For any F ⊆ Γ finite, we use
π∗ : B F → A
for
π ∗ (b) = π(b(e)).
We set
1
log (π ∗ )di (AP(β, F, δ, σi ))
di
hΣ,µ (α; β, F, δ).
inf
hΣ,µ (α; β, F, δ) = lim sup
i→∞
hΣ,µ (α; β) =
F ⊆Γ finite,
δ>0
We then set
hΣ,µ (α; S) = inf hΣ,µ (α; β)
α≤β
12
BEN HAYES
hΣ,µ (S) = sup hΣ,µ (α; β)
α
where the last infimum and supremum are over all S-measurable observables.
We need the following result of Kerr.
Theorem 3.8. Let Γ be a countable discrete sofic group with sofic approximation Σ. Let (X, M, µ) be a
standard probability space with Γ y (X, M, µ) by measure-preserving transformations. Let S ⊆ M be a
generating subalgebra. Then
hΣ,µ (S) = hΣ,µ (X, Γ).
Additionally, one can show that
hΣ,µ (α; S)
is independent of S if S generates M (up to sets of measure zero). In this case, we set
hΣ,µ (α; S) = hΣ,µ (α; X, Γ).
We now proceed to prove that our definition of sofic entropy with respect to a Polish model recovers
measure-theoretic entropy with respect to a sofic approximation. Let us briefly outline the proof. First we
show that for any dynamically generating pseudometric ∆ on X, there is a compatible metric ∆′ so that
hΣ,µ (∆) = hΣ,µ (∆′ )
(see Lemma 3.9). Thus we may assume that our metrics our compatible. We then use Kerr’s version of
measure entropy, using the subalgebra of sets which from the point of view of the measure “appear” to be
open and closed (in a sense to be made precise later). We then show that both the topological version and
the observable version of microstates produce roughly the same space (see Lemma 3.11). The essential fact
for proving the last step will be tightness of a single probability measure on a Polish space. The theorem
will follow without too much difficulty from these preliminary lemmas. The following proof is a minor
modification of the argument in Lemma 4.4 of [30], as well as Lemma 6.12 of [7]. We have decided to include
the proof to alleviate any concerns that may arise from working in the noncompact case, as well as address
the necessary modifications that occur in the definition of a dynamically generating pseudometric in the
Polish case.
Lemma 3.9. Let Γ be a countable discrete sofic group with sofic approximation Σ = (σi : Γ → Sdi ). Let
X be a Polish space with Γ y X by homeomorphisms and µ a Γ-invariant probability measure. Given a
dynamically generating pseudometric ∆ on X, there is a bounded compatible metric ∆′ on X so that
hΣ,µ (∆) = hΣ,µ (∆′ ).
Proof. Let M be the diameter of (X, ∆). Since Γ is countable, we may find positive real numbers {αg : g ∈ Γ}
with αe ≥ 1/2 and
X
αg = 1.
g
Set
∆′ (x, y) =
X
αg ∆(gx, gy).
g∈Γ
We prove the lemma with this ∆′ . The lemma is proved in several steps.
Step 1: We show that ∆′ is a compatible metric. For this let Y be X modded out by the equivalence
relation a ∼ b if ∆(a, b) = 0. For a ∈ X, let [a] be the equivalence class of a. Make Y a metric space with
metric ∆ given by
∆([a], [b]) = ∆(a, b).
Observe that ∆ is well-defined because ∆ satisfies the triangle inequality. Then Y Γ has a compatible metric
given by
X
∆Γ (a, b) =
αg ∆(a(g), b(g)).
g∈Γ
Moreover we have an injective map Φ : X → Y Γ by
Φ(x)(g) = [gx],
POLISH MODELS AND SOFIC ENTROPY
13
as
∆Γ (Φ(x), Φ(y)) = ∆′ (x, y),
it is enough to show that Φ is a homeomorphism onto its image. It is clear that Φ is continuous. Suppose
that x ∈ X and U is a neighborhood of x ∈ X. By the definition of dynamically generating, we may choose
a finite F ⊆ Γ and a δ > 0 so that if y ∈ X and
max ∆(gx, gy) < δ,
g∈F
then y ∈ U. If we let
V = {y ∈ Y Γ : ∆([gx], y(g)) < δ for all g ∈ F },
then V is a neighborhood of Φ(x) in Y Γ and if y ∈ X has Φ(y) ∈ V, then y ∈ U. Thus Φ is a homeomorphism
onto its image.
Step 2: We show that hΣ,µ (∆′ ) ≤ hΣ,µ (∆). Let ε > 0 and choose a finite E ⊆ Γ sufficiently large so that
X
αg < ε.
g∈Γ\E
Let F ⊆ Γ finite, δ > 0 and L ⊆ Cb (X) finite be given. We will assume that F ⊇ E. We will choose δ
sufficiently small in a manner depending upon ε to be determined later. Since αe ≥ 1/2 we have
∆(x, y) ≤ 2∆′ (x, y).
So by Minkowski’s inequality
Mapµ (∆′ , F, δ, L, σi ) ⊆ Mapµ (∆, F, 4δ, L, σi ).
For φ, ψ ∈ Mapµ (∆, F, 2δ, L, σi ) we have by Minkowski’s inequality,
X
∆′2 (φ, ψ) ≤
αg ∆2 (gφ, gψ)
g∈Γ
≤ εM +
X
αg ∆2 (gφ, gψ)
g∈E
≤ εM + 2δ +
X
g∈E
αg ∆2 (φ ◦ σi (g), ∆ ◦ σi (g))
≤ εM + 2δ + ∆2 (φ, ψ)
where in the last line we use that ∆2 (φ ◦ σi (g), ψ ◦ σi (g)) = ∆2 (φ, ψ). Thus for all sufficiently small δ
S3ε(M+2) (Mapµ (∆′ , F, δ, L, σi ), ∆′2 ) ≤ Sε (Mapµ (∆, F, 4δ, L, σi )).
Thus by (2) we have
hΣ,µ (∆′ , 6ε(M + 2)) ≤ hΣ,µ (∆, ε, F, 4δ, L).
As hΣ,µ (∆, ε, F, 4δ, L) is monotone in (F, 4δ, L) we let F, L increase to Γ, Cb (X) and take δ → 0 to find that
hΣ,µ (∆′ , 6ε(M + 2)) ≤ hΣ,µ (∆′ , ε) ≤ hΣ,µ (∆).
Now letting ε → 0 completes the proof of Step 2.
Step 3: We show that hΣ,µ (∆) ≤ hΣ,µ (∆′ ). Let ε > 0. Suppose we are given finite F ′ ⊆ Γ, L′ ⊆ Cb (X)
and δ ′ > 0. Set L = L′ and let F ⊆ Γ be a sufficiently large finite set depending upon F ′ , δ ′ in a manner to
determined later and set δ = δ ′ . Choose a finite E ⊆ Γ so that
X
αg < δ ′ .
g∈Γ\E
14
BEN HAYES
If φ ∈ Mapµ (Γ, F, δ, L, σi ) and h ∈ F ′ , we have by Minkowski’s inequality
X
∆′2 (hφ, φ ◦ σi (h)) ≤
αg ∆2 (ghφ, gφ ◦ σi (h))
g∈Γ
≤ δ′ +
+
X
g∈F
X
g∈F
g∈F
αg ∆2 (ghφ, φ ◦ σi (gh)) +
X
g∈F
αg ∆2 (φ ◦ σi (gh), φ ◦ σi (g)σi (h))
αg ∆2 (φ ◦ σi (g)σi (h), gφ ◦ σi (h))
= δ′ +
+
X
X
g∈F
αg ∆2 (ghφ, φ ◦ σi (gh)) +
X
g∈F
αg ∆2 (φ ◦ σi (gh), φ ◦ σi (g)σi (h))
αg ∆2 (φ ◦ σi (g), gφ)
< δ ′ + 2δ +
X
g∈E
αg ∆2 (φ ◦ σi (g)σi (h), φ ◦ σi (gh)),
if we force F ⊇ EF ′ ∪ E. Set δ = δ ′ , as
∆2 (φ ◦ σi (g)σi (h), φ ◦ σi (gh))2 ≤ M udi ({1 ≤ j ≤ di : σi (g)σi (h)(j) 6= σi (gh)(j)}) → 0
for g, h ∈ Γ we find that
for all large i. As
we find that
Mapµ (∆, F, δ, L, σi ) ⊆ Mapµ (∆′ , F ′ , 4δ ′ , σi ),
∆2 (φ, ψ) ≤ 2∆′2 (φ, ψ),
hΣ,µ (∆, 6ε) ≤ hΣ,µ (∆, 6ε, F, δ, L) ≤ hΣ,µ (∆′ , ε, F ′ , δ ′ , L′ ).
Taking the infimum over F ′ , δ ′ , L′ we find that
hΣ,µ (∆, 6ε) ≤ hΣ,µ (∆′ , ε) ≤ hΣ,µ (∆′ ).
Letting ε → 0 proves Step 3.
To prove the theorem, we need to single out a nice subalgebra of measurable sets. Let X be a Polish
space and µ a Borel probability measure on X. We let COµ be the set of Borel sets E so that
µ(int E) = µ(E).
Note that COµ is an algebra of sets. These sets are often called continuity sets in the literature.
For the next lemma we need some notation. Given a metric space (X, ∆), E ⊆ X and ε > 0 we let
Eε = {x ∈ E : ∆(x, E c ) ≥ ε}
Oε (E) = {x ∈ X : ∆(x, E) < ε}.
Lemma 3.10. Let X be a Polish space and µ a Borel probability measure on X. Let ∆ be a compatible
metric on X. Given E ∈ COµ , and η > 0 there is a neighborhood U of µ in the weak topology and a κ > 0
so that if ν ∈ U ∩ Prob(X) then
|ν(E) − µ(E)| < η
ν(Oκ (E) \ Eκ ) < η.
Proof. It is a consequence of the Portmanteau Theorem that a sequence of probability measure µn on X
converges weakly to µ if and only if µn (A) → µ(A) for every continuity set A of µ. Thus we can choose a
neighborhood U1 of µ so that
|ν(E) − µ(E)| < η
for all ν ∈ U1 . To obtain the second estimate, again by the Portmanteau Theorem we can choose a neighborhood U2 of µ so that
η
ν(O2κ (E) \ E2κ ) ≤ µ(O2κ (E) \ E2κ ) +
2
POLISH MODELS AND SOFIC ENTROPY
15
for all ν ∈ U2 . We have Oκ (E) \ Eκ ⊆ O2κ (E) \ E2κ , so
η
ν(Oκ (E) \ Eκ ) ≤ µ(O2κ (E) \ E2κ ) + .
2
Since E is a continuity set of µ we can choose κ small enough so that
η
µ(O2κ (E) \ E2κ ) < .
2
The lemma is now completed by setting U = U1 ∩ U2 .
d
F
F
Given σ : Γ → Sd for some d ∈ N, and φ ∈ A we shall define φ : {1, . . . , d} → A
φF
σ (j)(g)
−1
= φ(σ(g)
by’
(j)), for g ∈ F
Lemma 3.11. Let Γ be a countable discrete sofic group with sofic approximation Σ = (σi : Γ → Sdi ). Let X
be a Polish space with Γ y X by homeomorphisms and µ a Γ-invariant Borel probability measure on X. Let
∆ be a bounded compatible metric on X.
(i): Let β : X → B a finite COµ -measurable observable. Given F ⊆ Γ finite, δ > 0 there are finite
F ′ ⊆ Γ, L′ ⊆ Cb (X), and δ ′ > 0 so that if φ ∈ Mapµ (∆, F ′ , δ ′ , L′ , σi ) then (β ◦ φ)F
σi ∈ AP(β, F, δ, σi ).
(ii): Given finite F ′ ⊆ Γ, L′ ⊆ Cb (X) and δ ′ > 0, there are finite F ⊆ Γ and a δ > 0 and a finite
COµ -measurable observable β : X → B so that if βeF ◦ φ ∈ AP(β, F, δ, σi ) then φ ∈ Mapµ (∆, F ′ , δ ′ , L′ , σi ).
Proof. (i): Let η > 0 be sufficiently small depending upon δ in a manner to be determined later. By the
preceding lemma, we may find a L′ ⊆ Cb (X) finite, and a δ ′ > 0 so that if ν ∈ Prob(X) and
Z
Z
f dν < δ ′ for all f ∈ L′
f dµ −
X
X
then for all E ⊆ F and for all b ∈ B E ,
|µ((βeE )−1 ({b})) − ν((βeE )−1 ({b}))| < η,
ν(O√δ′ (βeE )−1 ({b})) \ (βeE )−1 ({b})√δ′ ) ≤ η.
Set F = F. Suppose that φ ∈ Mapµ (∆, F ′ , δ ′ , L′ , σi ). Note that if we choose η sufficiently small, then we
have forced
X
−1
({b}))| < δ
|µ((βeF )−1 ({b})) − udi (((β ◦ φ)F
σi )
′
b∈B F
, L′ , σi ).
F
−1
(j))(e), this means (β ◦ φ)F
for all φ ∈ Map(∆, F , δ
Since (β ◦ φ)F
σi ∈
σi (j)(g) = (β ◦ φ) (σi (g)
AP(β, F, δ, σi ).
(ii): Let M > 0 be the diameter of (X, ∆). Let κ > 0 be sufficiently small depending upon F ′ , δ ′ in a
manner to be determined later. Since X is Polish, Prokhorov’s Theorem applied to {µ} implies that we can
find a compact set K ⊆ X so that
µ(X \ K) ≤ κ.
Since K is compact, we can find points x1 , . . . , xn ∈ K, and numbers δj ∈ (0, κ), j = 1, . . . , n so that if
B(x, α) is the ball in X of radius α with respect to ∆ then
′
′
sup
µ(B(xj , δj ) \ B(xj , δj )) = 0,
x,y∈B(xj ,δj )
|f (x) − f (y)| < δ ′ for all f ∈ L′ ,
K⊆
Let
n
[
E=X\
and define β : X → {0, 1}n+1 by
β(x)(k) =
(
B(xj , δj ).
j=1
n
[
B(xj , δj )
j=1
χB(xk ,δk ) (x),
χE (x),
if 1 ≤ k ≤ n
if k = n + 1.
16
BEN HAYES
Note that β is COµ - measurable. Set F = F ′ ∪ {e} ∪ (F ′ )−1 , and let δ > 0 be sufficiently small in a manner
to depend upon L′ , δ ′ , F ′ to be determined later. We will assume that
δ < min{δj : j = 1, . . . , n}.
Suppose that βeF ◦ φ ∈ AP(β, F, δ, σi ). Given g ∈ F, let
Cg = {j : β(gφ(j)) = β(φ(σi (g)(j)))}.
Since
β(gφ(j)) = (βeF ◦ φ)(j)(g −1 ),
β(φ(σi (g)(j))) = (βeF ◦ φ)(σi (g))(j)(e),
and
udi ({j : σi (g −1 )−1 (j) = σi (g)(j)}) →i→∞ 1
we see that for all large i,
udi (Cg ) ≥ 1 − 2δ.
For j ∈ Cg , we necessarily have
∆(φ(σi (g)(j)), gφ(j)) < κ.
Thus
∆2 (φ ◦ σi (g), gφ)2 ≤ κ2 + M 2 δ.
So if we choose κ < δ, and then δ sufficiently small, we have forced
∆2 (φ ◦ σi (g), gφ) < 2δ ′ .
We will want to force κ, δ ′ to be even smaller later. Using kf k for the uniform norm of f ∈ Cb (X), we have
for all f ∈ L′ ,
Z
Z
Z
n Z
X
f dφ∗ (udi )
f dµ −
f dφ∗ (udi ) ≤ κkf k + udi (φ−1 (E))kf k +
f dµ −
X
X
j=1
≤ κkf k + 2κkf k + δ ′ +
n
X
+
n
X
j=1
f (xj )µ(B(xj , δj )) −
j=1
≤ κkf k + 2κkf k + δ ′ + δ ′
n
X
j=1
f (xj )µ(B(xj , δj )) −
≤ κkf k + 2κkf k + 2δ ′ +
B(xj ,δj )
B(xj ,δj )
1
di
n
X
j=1
1
di
X
f (φ(k))
k:φ(k)∈B(xj ,δj )
φ∗ (udi )(B(xj , δj ))
X
f (xj )
k:φ(k)∈B(xj ,δj )
|f (xj )||µ(B(xj , δj ) − φ∗ (udi )(B(xj , δj ))|
≤ κkf k + 2κkf k + 2δ ′ + nkf kδ.
′
We may choose κ < kfδ k . This forces n on us, but we may then choose δ sufficiently small so that φ ∈
Mapµ (∆, F ′ , 6δ ′ , L′ , σi ). As δ ′ is arbitrary this completes the proof.
We are now ready to show that our definition of entropy in the case of a Polish model agrees with the
usual measure entropy.
Theorem 3.12. Let Γ be a countable discrete sofic group with sofic approximation Σ. Let X be a Polish space
with Γ y X by homeomorphisms and µ a Γ-invariant, Borel, probability measure on X. For any dynamically
generating pseudometric ∆ on X we have
hΣ,µ (∆) = hΣ,µ (X, Γ).
POLISH MODELS AND SOFIC ENTROPY
17
Proof. Let Σ = (σi : Γ → Sdi ). By Lemma 3.9 we may assume that ∆ is a bounded compatible metric on X.
Let M be the diameter of (X, ρ). We will apply Theorem 3.8 with S = COµ . We leave it as an exercise to
show that for all x ∈ X we have
µ(B(x, r)) = µ(B(x, r))
for all but countably many r ∈ (0, ∞). Thus COµ generates the σ-algebra of Borel subsets of X. We first
show that
hΣ,µ (∆) ≤ hΣ,µ (COµ ).
Let ε > 0. Since X is Polish, we may apply Prokhorov’s Theorem to find a compact K ⊆ X so that
µ(X \ K) < ε.
By compactness of K, we find x1 , . . . , xn ∈ K, and ε > δ1 , . . . , δn > 0 so that
n
[
B(xj , δj ),
K⊆
j=1
B(xj , δj ) ∈ COµ .
Set
E=X\
Define
n
[
B(xj , δj ).
j=1
α : X → {0, 1}n+1
by
α(x)(k) =
(
χB(xk ,δk ) (x),
χE (x),
if 1 ≤ k ≤ n
if k = n + 1.
Let β : X → B be any finite COµ -measurable observable refining α and let π : B → A be as in the definition
of β ≥ α. Suppose we are given a finite F ⊆ Γ and a δ > 0. By the preceding Lemma, we may find a finite
F ′ ⊆ Γ, L′ ⊆ Cb (X), and a δ ′ > 0 so that
βσFi (Mapµ (∆, F ′ , δ ′ , L′ , σi )) ⊆ AP(β, F, δ, σi ).
By Lemma 3.10, we may assume that L′ is sufficiently large so that
φ∗ (udi )(X \ E) ≤ 2ε
for all φ ∈ Mapµ (∆, F ′ , δ ′ , L′ , σi ). Choose elements {φs }s∈S with φs ∈ Mapµ (∆′ , F ′ , L′ , δ ′ , σi ) where S is
some index set so that
{α ◦ φs : s ∈ S} = αdi (Mapµ (∆, F ′ , δ ′ , L′ , σi ))
and so that
α ◦ φs 6= α ◦ φs′ for s 6= s′ in S.
Then
|S| ≤ |(π ∗ )di (AP(β, F, δ, σi ))|.
Let φ ∈ Mapµ (∆, F ′ , δ ′ , L′ , σi ) and let s ∈ S be such that α ◦ φ = α ◦ φs . Then
X
1
∆2 (φ, φs )2 ≤ 4M 2 ε +
∆(φ(j), φs (j))2 .
di
j:φ(j),φs (j)∈E
/
If φ(j) and φs (j) are not in E, then the fact that α(φ(j)) = α(φs (j)) implies ∆(φ(j), φs (j)) < ε, so
∆2 (φ, φs )2 < 4M 2 ε + ε2 .
Thus by (2),
hΣ,µ (∆, 2(4M ε + ε2 )1/2 ) ≤ hΣ,µ (α; β, F, δ).
Taking the infimum over all β, F, δ we find that
hΣ,µ (∆, 2(4M ε + ε2 )1/2 ) ≤ hΣ,µ (α) ≤ hΣ,µ (X, Γ),
and letting ε → 0 implies that
hΣ,µ (∆) ≤ hΣ,µ (X, Γ).
18
BEN HAYES
For the reverse inequality, let α : X → A be a COµ -measurable finite observable. Fix κ > 0, and let κ′ > 0
depend upon κ in a manner to be determined later. By Lemma 3.10 we may choose η > 0 and L0 ⊆ Cb (X)
finite so that if ν ∈ Prob(X) and
Z
Z
f dν < η,
f dµ −
X
for all f ∈ L0 then
X
ν(α−1 ({a})) − µ(α−1 ({a})) < κ′ ,
ν(Oη (α−1 ({a}) \ α−1 ({a})η ) < κ′ .
Let F ′ ⊆ Γ, L′ ⊆ Cb (X) be given finite sets and δ ′ > 0 be given. We may assume that L′ ⊇ L0 . By the
preceding Lemma, we may choose a refinement β : X → B of α, a finite F ⊆ Γ, and a δ > 0 so that if
φ ∈ X di and βeF ◦ φ ∈ AP(β, F, δ, σi ), then φ ∈ Mapµ (∆, F ′ , δ ′ , L′ , σi ). Choose π : B → A so that α = π ◦ β
and choose a map s : B F → X so that Id = βeF ◦ s. By construction if φ ∈ AP(β, F ′ , δ ′ , σi ) we have
s ◦ φ ∈ Mapµ (∆, F ′ , δ ′ , L′ , σi ).
Let ε > 0 be sufficiently small depending upon η to be determined later. Let {φt : t ∈ T } be such that
φt ∈ AP(β, F, δ, σi ) for all t ∈ T ,
{s ◦ φt : t ∈ T } is ε-dense in{s ◦ φ : φ ∈ AP(β, F, δ, σi )},
We may (and will) choose T so that
Note that
φt 6= φt′ for t 6= t′ .
|T | ≤ Sε/2 (Mapµ (∆, F ′ , δ ′ , L′ , σi )) ≤ Nε/2 (Mapµ (∆, F ′ , δ ′ , L′ , σi )).
(π ∗ )di (AP(β, F, δ, σi )) ⊆
[
t∈T
αdi (B∆2 (s ◦ φt , ε) ∩ Mapµ (∆, F ′ , δ ′ , L′ , σi )).
We thus have to bound |α (B∆2 (φt , ε) ∩ Mapµ (∆, F ′ , δ ′ , L′ , σi ))| from above. Fix t ∈ T, Suppose that
φ ∈ Mapµ (∆, F ′ , δ ′ , L′ , σi ) and that
∆2 (φ, s ◦ φt ) < ε.
Let
[
C=
{1 ≤ j ≤ di : φ(j) ∈ Oη (α−1 ({a}))\α−1 ({a})η }∪{1 ≤ j ≤ di : s◦φt (j) ∈ Oη (α−1 ({a}))\α−1 ({a})η }.
di
a∈A
By choosing κ′ sufficiently small, we may assume that
udi (C) ≤ κ.
Let
D = {1 ≤ j ≤ di : ∆(φ(j), s ◦ φt (j)) ≥
Thus
√
ε}.
√
udi (D) ≤ ε.
For j ∈ {1, . . . , di } \ (C ∪ D), and a = α(φ(j)), we have that s ◦ φt (j) ∈ O√ε (α−1 ({a})). If we choose
√
ε < η, then√α(s ◦√φt (j)) = a for all j ∈ {1, . . . , di } \ (C ∪ D). Thus we can find V ⊆ {1, . . . , di } with
udi (V ) ≥ 1 − κ − ε and α(φ(j)) = α(s ◦ φt (j)) for j ∈ V. Thus
X
|αdi (B∆2 (s ◦ φt , ε) ∩ Mapµ (∆, F ′ , δ ′ , L′ , σi ))| ≤
|A||V|
≤
If κ +
√
ε < 1/2 then for all large i we have
di
di
p
≤
.
⌊κ + ε⌋di
l
V⊆{1,...,d
√ i },
|V|≤(κ+ ε)di
√
⌊(κ+ ε)di ⌋
X
l=1
di
|A|l .
l
POLISH MODELS AND SOFIC ENTROPY
19
So by Stirling’s Formula the above sum is at most
√
√
R(κ + ε)di exp(di H(κ + ε))|A|κdi
for some constant R > 0, where
H(t) = −t log t − (1 − t) log(1 − t) for 0 ≤ t ≤ 1.
Thus
hΣ,µ (α) ≤ hΣ,µ (α; β, F, δ, σi ) ≤ H(κ +
√
ε) + κ log |A| + hΣ,µ (∆, ε/2, F ′ , δ ′ , L′ ).
Taking the infimum over all F ′ , δ ′ , L′ and let κ → 0 we have
√
hΣ,µ (α) ≤ hΣ,µ (∆, ε/2) + H( ε).
Letting ε → 0 and then taking the supremum over all α we have
hΣ,µ (X, Γ) ≤ hΣ,µ (∆).
4. Spectral Consequences of Positive Entropy
Let Γ y (X, µ) be a probability measure-preserving action of a countable discrete group. Associated to
this action we have a natural representation
ρΓy(X,µ) : Γ → U (L2 (X, µ))
by
(ρΓy(X,µ) (g)f )(x) = f (g −1 x).
The space C1 inside L2 (X, µ) is clearly Γ-invariant, so we can consider the representation ρ0Γy(X,µ) obtained
by restricting ρΓy(X,µ) to L2 (X, µ) ⊖ C1. The representation ρ0Γy(X,µ) is called the Koopman representation.
Properties of a probability measure-preserving action are called spectral when they only depend upon the
Koopman representation. In this section, we deduce spectral properties of an action from assumptions of
positive entropy.
4.1. Representation Theoretic Preliminaries. We will need to apply the theory of representations of
∗-algebras. For this paper, we will only need unitary representations of groups, but later work will need this
generality. For notation, if A is a ∗-algebra and ρ : A → B(H) is a ∗-representation and E is a set we use
ρ⊕E for the ∗-representation of A on ℓ2 (E, H) given by
(ρ⊕E (a)ξ)(x) = ρ(a)ξ(x).
Let us mention how the theory for ∗-algebras generalizes
P that of groups. If Γ is a countable discrete group
and ρ : Γ → U(H) is a unitary representation, for f = g∈Γ fg g ∈ C(Γ) we define
X
ρ(f ) =
fg ρ(g).
g∈Γ
We use the conjugate linear, antimultiplicative map ∗ on C(Γ) given by
X
fg−1 g.
f∗ =
g∈Γ
∗
Under these operations C(Γ) is ∗-algebra and ρ(f ) = ρ(f )∗ for any unitary representation of Γ.
If A is a ∗-algebra and ρj : Γ → U(Hj ) are two ∗-representations we write
HomA (ρ1 , ρ2 )
for the space of bounded linear A-equivariant maps H1 → H2 .
Definition 4.1. Let A be a ∗-algebra and ρj : A → B(Hj ), j = 1, 2 be ∗-representations. We say that ρ1
and ρ2 are mutually singular, written ρ1 ⊥ ρ2 if for every pair of nonzero subrepresentations ρ′j of ρj we
have that ρ′1 is not isomorphic to ρ′2 . We say that ρ1 is absolutely continuous with respect to ρ2 , and write
ρ1 ≪ ρ2 if ρ1 is embeddable in ρ⊕E
for some set E.
2
20
BEN HAYES
The terminology is motivated by measure theory. For intuition, suppose that A = C(X) and that
ρj : A → B(Hj ), j = 1, 2 are ∗-homomorphisms. Then we can find spectral measures (in the sense of [13]
IX.1) Ej on X so that
Z
ρj (f ) =
f (x) dEj (x).
X
We leave it as an exercise to the reader to check that ρ1 ⊥ ρ2 if and only if E1 ⊥ E2 , and similarly that
ρ1 ≪ ρ2 if and only if E1 ≪ E2 (the definitions of absolute continuity and singularity of spectral measures
is the same as for usual measures).
We will need the following equivalent conditions on singularity of representations. The following must be
well known, but we include a proof for completeness. Throughout the proof, we shall use functional calculus.
See [13] Chapter VII, IX for background on functional calculus.
Proposition 4.2. Let A be a unital ∗-algebra and ρj : A → B(Hj ) be two unitary representations and
suppose that H1 , H2 are separable. The following are equivalent:
(i): ρ1 ⊥ ρ2
(ii): HomA (ρ1 , ρ2 ) = {0}
(iii): HomA (ρ2 , ρ1 ) = {0}
(iv): There is a sequence xn ∈ A so that max(kρ1 (xn )k, kρ2 (xn )k) ≤ 1 and
ρ1 (x∗n xn ) → IdH1 in the strong operator topology
ρ2 (x∗n xn ) → 0 in the strong operator topology.
Proof. The equivalence of (ii) and (iii) is proved by taking adjoints. To prove that (ii) implies (i) suppose
that Kj , j = 1, 2 are closed, A-invariant, linear subspaces of Hj , j = 1, 2 and that φ : K1 → K2 is an
isomorphism. Define T : H1 → H2 by
T (ξ) = Φ(projK1 (ξ)).
By (ii) we know that T = 0 which implies that Kj , j = 1, 2 are zero.
To see that (i) implies (ii) suppose that T ∈ HomA (ρ1 , ρ2 ). Let T = U |T | be the polar decomposition (see
[13] VIII.3.11) . The fact that T is equivariant implies that T ∗ T is equivariant, and hence that |T | = (T ∗ T )1/2
is, by approximating the square root function by polynomials. Since
U = SOT − lim T (|T | + ε)−1
ε→0
we see that U is equivariant. Thus U gives an A-equivariant isomorphism (ker T )⊥ → im T . Since ρ1 ⊥ ρ2
we find that (ker T )⊥ = 0, and hence that T = 0.
To prove that (iv) implies (ii) let T ∈ HomA (ρ1 , ρ2 ). Let xn be as in (iv). Then, for any ξ ∈ H1
T (ξ) = lim T (ρ1 (x∗n xn )ξ) = lim ρ2 (x∗n xn )T (ξ) = 0,
n→∞
n→∞
so T = 0.
Suppose that (iii) and (ii) hold, we wish to prove (iv). Recall that if H is a Hilbert space and E ⊆ B(H)
then E ′ denotes the commutant of E, i.e. E ′ = {T ∈ B(H) : T S = ST for all S ∈ E}. Suppose that
T ∈ (ρ1 ⊕ ρ2 )(A)′ ,
Then we can regard T as a matrix
T
T = 11
T21
T12
T22
where Tij ∈ B(Hi , Hj ). Since T ∈ (ρ1 ⊕ ρ2 )(A)′ we see that Tij ∈ HomA (ρi , ρj ). Thus T12 , T21 are 0. We
thus see that
SOT
IdH1 0
∈ (ρ1 ⊕ ρ2 )(A)′′ = (ρ1 ⊕ ρ2 )(A)
0
0
where the last equality follows from von Neumann’s Double Commutant Theorem. We now prove (iv) by
using Kaplansky’s Density Theorem.
We need an analogue of the Lebesgue decomposition.
POLISH MODELS AND SOFIC ENTROPY
21
Proposition 4.3. Let A be a unital ∗-algebra and ρj : A → B(Hj ), j = 1, 2 be two ∗-representations. Then
ρ1 = ρ1,s ⊕ ρ1,c
where ρ1,s ⊥ ρ2 , and ρ1,c ≪ ρ2 .
Proof. By Zorn’s Lemma, we can find a maximal family (Kβ )β∈B of pairwise orthogonal, A-invariant, closed,
linear subspaces of H1 so that ρ1 K embeds into ρ2 . Let
β
⊥
M
H1,s = H1 ∩
Kβ .
β∈B
By maximality ρ1
H1,s
is singular with respect to ρ2 . Setting
M
H1,c =
Kβ
β∈B
and defining ρ1,s , ρ1,c by restricting ρ1 to H1,s , H1,c completes the proof.
4.2. Proofs of the Main Applications.
Theorem 4.4. Let Γ be a countable discrete sofic group with sofic approximation Σ. Let (X, M, µ) be a
standard probability space with Γ y (X, M, µ) by measure-preserving transformations. Let H ⊆ L2 (X, µ) be
a closed, linear, Γ-invariant subspace such that M is generated by
Suppose that
{gf −1 (A) : g ∈ Γ, f ∈ H, A ⊆ C is Borel}.
ρΓy(X,µ)
Then
H
⊥ λΓ .
hΣ,µ (X, Γ) ≤ 0.
Proof. Let (fn )∞
n=1 be a k · k2 -dense subset of H. Let
Φ : X → CN×Γ
be defined by
Φ(x)(n, g) = fn (g −1 x)
and let
ν = Φ∗ (µ).
Let Γ y CN×Γ by shifts. Since {gfn−1 (A) : g ∈ Γ, n ∈ N, A ⊆ C is Borel} generates M we see that Φ induces
a Γ-invariant isomorphism (X, µ) ∼
= (CN×Γ , ν). Thus
hΣ,µ (X, Γ) = hΣ,ν (CN×Γ , Γ).
For n ∈ N let Zn : CN×Γ → C be defined by
then Zn ◦ Φ = fn . Thus
ρΓy(CN×Γ ,ν)
Zn (y) = z(n, e),
Span{gZn :g∈Γ,n∈N}
∼
= ρΓy(X,µ)
H
⊥ λΓ .
To simplify notation, we will use ρ for ρΓy(CN×Γ ,ν) . Let ∆ be the dynamically generating pseudometric on
CN×Γ defined by
∞
X
|z(n, e) − w(n, e)|
∆(z, w) =
2−n
.
1
+
|z(n, e) − w(n, e)|
n=1
As CN×Γ is clearly Polish, we can use CN×Γ , ∆, ν to do our computation. Let ε > 0 be arbitrary, and let
0 < η < ε be arbitrary. Let δ > 0 be sufficiently small and F ⊆ Γ be a sufficiently large finite set which will
depend upon ε, η in a manner to be determined later. Given φ ∈ Map(∆, F, δ, σi ) for n ∈ N define zφ,n ∈ Cdi
by
zφ,n (j) = φ(j)(n)(e)
22
BEN HAYES
and define zφ ∈ (CN )di by
zφ (j)(n) = zφ,n (j).
N di
Conversely, given z ∈ (C )
define ψz : {1, . . . , di } → CN×Γ by
ψz (j)(n, g) = z(σi (g)−1 (j))(n)
If F, δ are chosen carefully, then for all sufficiently large i we have that
∆2 (ψzφ , φ) < ε.
Choose N ∈ N so that
2−N < ε.
Since
Γ y Span{gZn : g ∈ Γ, n ∈ N}} ⊥ λΓ ,
by Proposition 4.2 we may find a α ∈ C(Γ) so that max(kλ(α∗ α)k, kρ(α∗ α)k) ≤ 1 and
kρ(α∗ α)Zn − Zn k2 < η, 1 ≤ n ≤ N
kλ(α∗ α)δe k2 < η.
Let M > 0 be sufficiently large depending upon ε in a manner to be determined later. We will assume that
M is large enough so that there exists G ∈ Cc (C) with kGk∞ ≤ M and G(z) = z for |z| ≤ M and
kG ◦ Zn − Zn k2 < ε for 1 ≤ n ≤ N .
Note that G may be chosen independent of η. As
kρ(α∗ α)k ≤ 1
we then have
kρ(α∗ α)G ◦ Zn − G ◦ Zn k2 < 3ε, for 1 ≤ n ≤ N .
(4)
Let L ⊆ Cb (CN×Γ ) be sufficiently large in a manner to be determined later. We will assume that
L ⊇ {G ◦ Z1 , . . . , G ◦ ZN }.
We will use k · k2 for the ℓ2 norm on {1, . . . , di } with respect to the uniform probability measure. By (4) if
F ⊆ Γ, L ⊆ Cb (CN×Γ ) are sufficiently large and δ > 0 is sufficiently small then
kσi (α)∗ σi (α)G ◦ zφ,n − G ◦ zφ,n k2 < 6ε for 1 ≤ n ≤ N ,
for all φ ∈ Mapµ (ρ, F, L, δ, σi ) (with the notational conventions introduced after Definition 2.1). Let p =
χ[1−√ε,1+√ε] (σi (α)∗ σi (α)) (this expression should be interpreted in the sense of functional calculus) then for
all φ ∈ Mapµ (ρ, F, L, δ, σi ),
kpG ◦ zφ,n − G ◦ zφ,n k22 = kχ(√ε,∞) (|σi (α)∗ σi (α) − 1|)G ◦ zφ,n k22
= hχ(√ε,∞) (|σi (α)∗ σi (α) − 1|)G ◦ zφ,n , G ◦ zφ,n i
1
≤ h(σi (α)∗ σi (α) − 1)2 G ◦ zφ,n , G ◦ zφ,n i
ε
1
= k(σi (α)∗ σi (α) − 1)(G ◦ zφ,n )k22
ε
< 36ε
and
tr(p) ≤
Since
1
√ tr(σi (α)∗ σi (α)).
1− ε
lim tr(σi (α)∗ σi (α)2 ) = τ (λ(α)∗ λ(α)) = hλ(α)∗ λ(α)δe , δe i ≤ kλ(α)∗ λ(α)δe k2 < η
i→∞
we see that for all large i we have
tr(p) < 2η
POLISH MODELS AND SOFIC ENTROPY
23
1
provided ε < (2015)!
. Since p is an orthogonal projection, we know by Lemma 2.7 we may choose an ε-dense
subset S of M p Ball(ℓ2 (di , udi )) with
4ηdi
3M + ε
.
|S| ≤
ε
If L and M are sufficiently large, then
Ci = {1 ≤ j ≤ di : |zφ,n (j)| ≤ M for 1 ≤ n ≤ N }
has
|Ci | ≥ (1 − ε)di .
Define wφ ∈ (CN )di by
wφ (j)(n) = G(zφ,n (j)).
For these values of F, δ, L, M we have
2
∆2 (φ, ψwφ ) ≤ ε +
≤ 2ε
di X
N
X
j=1 n=1
2−n
|zφ (n, j) − wφ (n, j)|
1 + |zφ (n, j) − wφ (n, j)|
as wφ (n, j) = zφ (n, j) for j ∈ {1, . . . , di } \ Ci . For 1 ≤ n ≤ N choose ξφ,n ∈ S so that
N di
and define ξφ ∈ (C )
kpG ◦ zφ,n − ξφ,n k2 < ε
by
ξφ (j)(n) = χ{1,...,N } (n)ξφ,n (j).
Then
∆2 (ψwφ , ψξφ )2 ≤ ε +
di
N
X
2−n X
|G(zφ,n (j)) − ξφ,n (j)|
di j=1
n=1
≤ ε + max kG ◦ zφ,n − ξφ,n k2
1≤n≤N
√
≤ 2ε + 6 ε
the second line following from the Cauchy-Schwartz inequality.
Thus
√ √
√
∆2 (φ, ψξφ ) ≤ 2 ε + (2ε + 6 ε)1/2 ,
Hence for all large i,
S2√2√ε+2(2ε+6√ε)1/2 (Mapµ (∆, F, δ, L, σi ), ∆2 ) ≤ |S|N ≤
Thus
√ √
√
hΣ,µ (∆, 4 2 ε + 4(ε + 6 ε)1/2 ) ≤ 4N η log
3M + ε
ε
3M + ε
ε
Note that η can be any number in (0, ε). Thus we can let η → 0 to find that
√ √
√
hΣ,µ (∆, 4 2 ε + 4(ε + 6 ε)1/2 ) ≤ 0
4N ηdi
.
.
since ε > 0 is arbitrary we find that
hΣ,µ (X, Γ) ≤ 0.
The space H can be much smaller than L2 (X, µ). For example consider the case that (X, µ) = (B, η)Γ
and the action is Bernoulli. For f ∈ L2 (B, η) and g ∈ Γ, let fg ∈ L2 (X, µ) be defined by
fg (x) = f (x(g)).
Then we can take
and one can show that
H = Span{fg : g ∈ Γ, f ∈ L2 (B, η)}
Γ y L2 (X, µ) ⊖ H ∼
= ℓ2 (Γ)⊕∞ .
24
BEN HAYES
So indeed the space H is much smaller than L2 (X, µ).
For the next application, recall that the weak topology on Aut(X, µ) is defined by saying that a basic
neighborhood of α is given by UA1 ,...,An ,ε (α) where A1 , . . . , An are measurable subsets of X and ε > 0 and
UA1 ,...,An ,ε (α) =
n
\
j=1
{β ∈ Aut(X, µ) : |µ(β −1 (Aj )∆α−1 (Aj ))| < ε}.
An action Γ y (X, µ) is compact if there is a compact subgroup K ⊆ Aut(X, µ) (for the weak topology) and
a homomorphism π : Γ → K so that
gx = π(g)(x)
for almost every x ∈ X.
Corollary 4.5. Let Γ be a countably infinite discrete sofic group with sofic approximation Σ. Suppose that
Γ y (X, µ) is a compact action. Then hΣ,µ (X, Γ) ≤ 0.
Proof. Recall that a unitary representation ρ : Γ → U (H) is called weakly mixing if
0 ∈ ρ(Γ)
and is compact if
W OT
,
W OT
ρ(Γ)
⊆ U (H).
It is clear that a compact representation has no nontrivial weakly mixing subrepresentations. It is also
well-known that the left regular representation is weakly mixing. Thus if Γ y (X, µ) is compact, then
ρ0Γy(X,µ) ⊥ λΓ
and we may apply Theorem 4.4.
In particular, note that if K is a compact group and φ : Γ → K is a homomorphism, then the action α of
Γ on K given by
α(g)(x) = φ(g) · x
has entropy at most zero with respect to any sofic approximation.
Definition 4.6. Let Γ be a countable discrete sofic group with sofic approximation Σ. We say that a
probability measure-preserving action Γ y (X, µ) has completely positive entropy (with respect to Σ) if
whenever Γ y (Y, ν) is a factor of Γ y (X, µ) and Y is not a one-atom space then hΣ,ν (Y, Γ) > 0.
Corollary 4.7. Let Γ be a countable discrete sofic group with sofic approximation Σ. Suppose that Γ y (X, µ)
is a probability measure-preserving action which has completely positive entropy with respect to Σ. Then
ρ0Γy(X,µ) ≪ λΓ .
Proof. By Proposition 4.3, we can write
where ρΓy(X,µ)
H1
L2 (X, µ) = H1 ⊕ H2
⊥ λΓ and
ρΓy(X,µ)
Suppose that f ∈ H1 . Define
H2
≪ λΓ .
Φ : X → CΓ
by
Φ(x)(g) = f (g −1 x)
and let ν = Φ∗ µ, and let Γ y C be the Bernoulli action. Then Γ y (CΓ , ν) is a factor of Γ y (X, µ). Set
Γ
K = Span{g(f ◦ Φ) : g ∈ Γ}
then
{gξ −1 (A) : ξ ∈ K, BorelA ⊆ C, g ∈ Γ}
generates the Borel subsets of C up to ν-measure zero. Tautologically,
K∼
= Span{gf : g ∈ Γ} ⊥ λΓ .
Γ
POLISH MODELS AND SOFIC ENTROPY
25
Hence by Theorem 4.4 we know that
hΣ,ν (CΓ , Γ) ≤ 0.
Since Γ y (X, µ) has completely positive entropy this implies that (CΓ , Γ) is a one-atom space. But this is
only possible if f is constant. Thus H1 = C1 and
ρ0Γy(X,µ) = ρ
H2
≪ λΓ .
Again the above corollary illustrates the utility in not assuming that H = L2 (X, µ) in Theorem 4.4 but
instead just assuming that H generates (X, µ). If (CΓ , ν) is as in the above proof we do not a priori know
that
Γ y L2 (CΓ , ν) ⊖ C1 ⊥ λΓ .
References
[1] A. Alpeev. On Pinsker factors for Rokhlin entropy. In Representation theory, dynamical systems, combinatorial methods.
Part XXIV, volume 432 of Zap. Nauchn. Sem. POMI, pages 30–35, St. Petersburg, 2015. POMI.
[2] J. Bourgain and A. Gamburd. On the spectral gap for finitely-generated subgroups of SU(2). Invent. Math, 171(1):83–121,
2008.
[3] J. Bourgain and A. Gamburd. Uniform expansion bounds for cayley graphs of SL2 (Fp ). Ann. of Math., 167(2):625–642,
2008.
[4] J. Bourgain and A. Yehudayof. Expansion in SL2 (R) and monotone expanders. Geom. Funct. Anal., 23(1):1–41, 2013.
[5] L. Bowen. Measure conjugacy invariants for actions of countable sofic groups. J. Amer. Math. Soc, 23:217–245, 2010.
[6] L. Bowen. A new measure conjugacy invariant for actions of free groups. Ann. of Math., 171(2):1387–1400, 2010.
[7] L. Bowen. Entropy theory for sofic groupoids I: the foundations. J. Anal. Math., 124(1):149–233, 2014.
[8] R. Bowen. Entropy for group endomorphisms. Trans. Amer. Math. Soc., 153(401-414), 1971.
[9] N. Brown and N. Ozawa. C ∗ -Algebras and Finite-Dimensional Approximations. Cambridge University Press, 1994.
[10] P. Burton. Naive entropy of dynamical systems. arXiv:1503.06360.
[11] L. Ciobanu, D. Holt, and S. Rees. Sofic groups: graph products and graphs of groups. Pacific Journal of Mathematics,
271(1):53–64, November 2014.
[12] A. Connes, J. Feldman, and B. Weiss. An amenable equivalence relations is generated by a single transformation. Ergodic
Theory Dynam. Systems, 10(4):431–450, 1983.
[13] J. Conway. A Course in Functional Analysis. Graduate Texts in Mathematics. Springer, New York, NY, second edition,
2000.
[14] A. Dooley and V. Golodets. The spectrum of completely positive entropy actions of countable amenable groups. J. Funct.
Anal., 196(1):1–18, 2002.
[15] K. Dykema, D. Kerr, and M. Pichot. Orbit equivalence and sofic approximation. arXiv:1102.2556.
[16] K. Dykema, D. Kerr, and M. Pichot. Sofic dimension for discrete measurable groupoids. Trans. Amer. Math. Soc,
366(2):707–748, 2013.
[17] G. Elek and E. Szabo. On sofic groups. J. Group Theory, 9(2):161–171, 2006.
[18] B. Hayes. Fuglede-Kadison determinants and sofic entropy. arXiv:1402.1135.
[19] B. Hayes. Mixing and spectral gap relative to pinkser factors for sofic groups. arXiv:1509.07839
[20] B. Hayes. An lp -version of von neumann dimension for Banach space representations of sofic groups. J. Funct. Anal.,
266(2):989–1040, 2014.
[21] A. Ioana. Orbit equivalence and borel reducibility rigidity for profinite actions with spectral gap. arXiv:1309.3026.
[22] D. Kerr. Sofic measure entropy via finite partitions. Groups Geom. Dyn, 7(617-632), 2013.
[23] D. Kerr and H.Li. Soficity, amenability, and dynamical entropy. Amer. J. Math, 135(3):721–761, 2013.
[24] D. Kerr and H. Li. Bernoulli actions and infinite entropy. Groups Geom. Dyn., 5:663–672, 2011.
[25] D. Kerr and H. Li. Topological entropy and the variational principle for actions of sofic groups. Invent. Math, 186:501–558,
2011.
[26] D. Kerr and H. Li. Combinatorial independence and sofic entropy. Comm. Math. Stat., 1(2):213–257, 2014.
[27] J. Kieffer. A generalized Shannon-McMillan theorem for the action of an amenable group on a probability space. Ann.Prob,
3(6):1031–1037, 1975.
[28] L.Bowen and H.Li. Harmonic models and spanning forests of residually finite groups. J. Funct. Anal., 263(7):1769–1808,
2012.
[29] H. Li. Compact group automorphisms, addition formulas and Fuglede-Kadison determinants. Ann. of Math., 176(1):303–
347, 2012.
[30] H. Li. Sofic mean dimension. Adv. Math, 244:570–604, 2014.
[31] A. Lubotzky, R. Phillips, and P. Sarnak. Ramanujan graphs. Combinatorica, 8(3):261–277, 1988.
[32] G. Margulis. Some remarks on invariant means. Monatsh. Math., 90(3):233–234, 1980.
[33] T. Meyerovitch. Positive sofic entropy implies finite stabilizer. arXiv:1504.08137.
[34] D. Ornstein and B. Weiss. Ergodic theory of amenable groups I. The Rokhlin lemma. Bull. Amer. Math. Soc.(N.S.),
2(1):161–165, 1980.
26
BEN HAYES
[35] D. Ornstein and B. Weiss. Entropy and isomorphism theorems for actions of amenable groups. J. Anal. Math, 48:1–141,
1987.
[36] L. Paunescu. On sofic actions and equivalence relations. J. Funct. Anal., 261(9):2461–2485, November 2011.
[37] S. Popa. On the superrigidity of malleable actions with spectral gap. J. Amer. Math. Soc., 21(4):981–1000, 2008.
[38] S. Popa. Independence properties in sublagebras of ultraproduct II1 factors. J. Funct. Anal., 266(9):5818–5846, 2014.
[39] A. Selberg. On the estimation of Fourier coefficients of modular forms. In Proc. Sympos. Pure Math, volume 8, pages 1–15,
Providence, RI, 1965. American Mathematical Society.
[40] B. Seward. Finite entropy actions of free groups, rigidity of stabilizers, and a Howe–Moore type phenomenon. To appear
in J. Anal. Math.
[41] B. Seward. Krieger’s finite generator theorem for ergodic actions of countable groups I. arXiv:1405.3604.
[42] J. Sinaı̌. On a weak isomorphism of transformations with invariant measure. Mat. Sb. (N.S.), 63(105):23–42, 1964.
[43] D. Sullivan. For n > 3 there is only one finitely additive rotationally invariant measure on the n-sphere on all Lebesgue
measurable sets. Bull. of the AMS, 4(1):121–123, 1981.
[44] V. Varadarajan. Measure on topological spaces. Mat. Sb. (N.S)., 55(97):35–100, 1961.
Stevenson Center, Nashville, TN 37240
E-mail address: [email protected]
| 4math.GR
|
Eliminating Network Protocol Vulnerabilities
Through Abstraction and Systems Language Design
C. Jasson Casey∗ , Andrew Sutton† , Gabriel Dos Reis† , Alex Sprintson∗
∗ Department
of Electrical and Computer Engineering, Texas A&M University
of Computer Science, Texas A&M University
arXiv:1311.3336v1 [cs.NI] 13 Nov 2013
† Department
Abstract—Incorrect implementations of network protocol message specifications affect the stability, security, and cost of
network system development. Most implementation defects fall
into one of three categories of well defined message constraints.
However, the general process of constructing network protocol
stacks and systems does not capture these categorical constraints. We introduce a systems programming language with
new abstractions that capture these constraints. Safe and efficient
implementations of standard message handling operations are
synthesized by our compiler, and whole-program analysis is used
to ensure constraints are never violated. We present language
examples using the OpenFlow protocol.
I. I NTRODUCTION
The message handling layer of any network protocol is
notoriously difficult to implement correctly. Common errors
include: accepting or allowing the creation of malformed
messages, using incorrect byte ordering or byte alignment,
using undefined values, etc. (§ II). These defects lead to problems in stability, security, performance, and cost for network
systems. Table I, the result of a survey of the US-CERT
Vulnerability Database [7], demonstrates that sophisticated
organizations implementing mature protocols commit these
errors. The persistent introduction of these defects is not the
sign of an engineering problem, but a failure to use the correct
levels of abstraction when working with network protocols.
Message handling has been the focus of several research
efforts. When the wire-format of the message is not important,
serialization solutions can be used [15], [6]. However, with
network protocols, because of interoperability requirements,
adherence to the specific wire-format is necessary. As a result,
a series of Domain Specific Languages (DSLs) that allow
programmer control over the wire-format have been designed.
These approaches synthesize data structures to hold messages
and the typical operations necessary to manipulate them using
correct by construction techniques [10], [2], [12]. Language
researchers have improved upon these DSLs with rich type
systems that can prove certain safety properties, and address
some of the problems mentioned previously [4], [5]. Other
work developed static analysis techniques, that require no
domain knowledge, to survey existing code bases and find
occurrences of some of the previously mentioned defects [3].
This material is based upon work partially supported by by the AFOSR
under contract No. FA9550-13-1-0008, and by the NSF under grants CCF1150055 and ASI-1148461.
978-1-4799-1270-4/13/$31.00 c 2013 IEEE
Systematically eliminating the categories of message related
defects requires rich type systems and whole program analysis, which is not supported by existing declarative DSLs.
Invariants and semantic information produced by the DSL is
not incorporated or used in program analysis by the target
language. Furthermore, finding all occurrences of message
related defects require some level of domain knowledge during
static analysis. This must either be built in to the language or
programmer specified in a way that resembles existing network
protocol specifications. Analysis by formal methods should
be a by-product of compiling the network program, and not
require any specialized knowledge by the programmer. Our
work-in-progress develops a systems programming language
to address these issues. This allows for full program analysis,
providing stronger safety guarantees and offering domain
specific optimization that is exceedingly difficult to accomplish
by hand or impossible with a DSL.
In this paper we clearly identify categories of message
related vulnerabilities by their structural and semantic constraints. We show that these categories are responsible for
known vulnerabilities, and using our tools we show that even
some live Internet traffic violates these constraints. We then
introduce a systems programming language that allows programmers to capture network protocol message structure and
constraints. The constraints allow the compiler to reason over
entire programs, identifying and eliminating the categories of
vulnerabilities mentioned before. Additionally, the choice of
a systems programming language allows for efficient code
generation. Throughout the paper we use OpenFlow [11] as
our reference protocol. Our contributions are:
• the identificaiton of three categories of network protocol vulnerabilities common in network programs and in
network traffic (in § II),
• the development of abstractions that prevent the construction of messages that lead to these vulnerabilities, and
unsafe access of conditional fields (in § II and § III),
TABLE I
M ESSAGE R ELATED V ULNERABILITIES
Proto.
802.11i
OSPFv2
NTPD
ICMP
VTP
Bootp
Age
2004
1998
1985
1981
1996
1985
Bug Date
2012
2012
2009
2007
2006
2006
Vendor
Broadcom
Quagga
GNU
Cisco
Cisco
Apple
Error
semantic
struct
struct
both
semantic
struct
CERT #
160027
551715
853097
341288
821420
776628
•
•
the design of a systems programming language that
eliminates unsafe protocol implementations through type
checking (in § III, § IV, and § V), and
the implementation of a compiler and library supporting
the language (in § VI).
II. M ESSAGE V ULNERABILITIES
There are three categories of message vulnerabilities that we
address: structural constraint violation, semantic constraint violation, and unsafe access of conditional fields. In this section
we describe these categories in detail with examples using
the OpenFlow v1.0 protocol [11]. We first briefly describe the
protocol and then show vulnerability examples.
Version(s)
1 - 1.0
2 - 1.1
3 - 1.2
4 - 1.3
0x00
0x04
0x08
...
version
Type(s)
0 - HELLO
…
14 - FLOW_MOD
...
32 bits
type
xid
length
Payload(type)
Fig. 1.
HELLO
0
14
...
FLOW_MOD
...
OpenFlow Message Format
Figure 1 summarizes the message format, or representation,
of an OpenFlow message. A message consists of a fixed
8 byte header followed by a variable sized payload. The
header indicates the version of the OpenFlow protocol, the
type of the payload, the length of the entire message, and a
transaction identifier used to match response messages to their
requests. The payload can be one of 22 types in version 1.0.
This protocol was designed to operate over stream-oriented
transports, which are more difficult to handle than datagram
or message oriented transports. Streams have no concept of
message boundaries and can give the program anything from
a single byte to several messages in a single read. It is the
programmer’s responsibility, not the transport’s, to determine
where the payload ends and the next message begins.
Semantic constraints ensure that a message field’s value
has a defined meaning in the protocol. For instance, in OpenFlow 1.0 the domain of the version field is [1, 1], the domain
of the type field is [0, 21], the domain of the length field is
[8, 216 − 1], and the domain of the xid field is [0, 232 − 1].
Any value that is not in the domain of its field is semantically
invalid; it has no meaning in the protocol definition. Violating
a semantic constraint is similar to using undefined behavior
in a programming language. As Table I shows, constraint
violations lead to vulnerabilities.
Structural constraints address how messages are constructed and used by a program. Messages are constructed
in two ways: either by a program to send over a network, or
from the network to send to the program. In both cases it is
important to construct only structurally valid messages.
These constraints deal with the number of bytes a message
occupies in buffers used to communicate with the network.
Structural constraint testing is the process of ensuring there
are enough bytes to complete the operation of constructing a
message from a buffer, or filling a buffer with a well-formed
message. For example, any buffer containing less than 8 bytes
cannot possibly represent a valid OpenFlow message and any
attempt to interpret that buffer as a message, would be an error.
Semantic constraint violations can lead to structural constraint violations. Reading from a stream can produce a buffer
containing several messages. The header of the first message
must be contained in the first 8 bytes, and the payload must
end at the position where the header’s length field indicates.
In the header, the length field can be semantically invalid, but
because it is used to constrain the payload’s size, it becomes a
structural constraint violation as well. A similar problem arises
with a semantically invalid type field that is used to choose
the payload.
Safe access ensures that fields with run-time dependency
are always validated before use. Many fields in OpenFlow are
dependent; their meaning is determined by the values of previously encountered fields. For example, there is a dependency
between the payload of a message and the header’s type field.
A structurally and semantically valid Hello message cannot
have its payload treated as the FlowMod type without invoking
undesired behavior.
III. L ANGUAGE
This work builds on fundamental notions from system programming [8], [14], from structured generic programming, and
mathematical programming languages such as AXIOM [9],
and Liz [13]. This work, heavily inspired by the Liz language,
aims to support simple, safe, and efficient handling of network
protocol messages. The core of our language supports values,
references, constants, functions, records, a minimal set of
expressions, and follows Call-By-Value semantics. We do not
expose pointers to the users of the language and drastically
restrict heap allocation to certain language built-in types.
Figure 2 shows the abstract syntax of the language. The
dependent types ω, are a primary contribution of this paper.
Our language captures the structural and semantic constraints of a message with user-defined type and variable declarations. We then enforce these constraints through the process
of object and symbolic construction. If object construction
completes successfully, then structural constraints are upheld,
if symbolic construction completes successfully, then semantic
constraints hold. Using construction to establish invariants is
a common way to reason about program behavior.
An object, or instance of a type, must be constructed before
use. The process of object construction involves allocating
space where the object will live, and initializing its values to
establish its invariant. Symbolic construction extends object
construction to include ensuring the value of the object is
consistent with its symbolic constructor. Upon completion of
construction, an object is well-formed and its invariant has
been established.
The ω types, see Figure 2, allow user definition of
precise structural and semantic constraints. Structural constraints can be explicitly stated by the specifiers: bits(e), and
constraint(e). Structural constraints are otherwise implicit
in the type, which will be explained below. Semantic con-
τ := unit | bool | byte | char | int
| uint | string | const(τ)
| ref(τ) | τ → τ | type | Buffer | View | ω
spec := bits(e) | constraint(e)
xform := msbf | lsbf
ω := uint(spec[, xform]) | array(τ, e)
| vector(τ) | record{decl}
| variant{τ if e}
e := c | x | e.x | e‘[’e‘]’ | x(e)) | return(e)
| if(e)then(e)else(e) | while(e)e | block
block := {decl|e}
define Hdr:type = record {
vrsn: uint(bits(8));
type: uint(bits(8));
len: uint(bits(16), msbf);
xid: uint(bits(32), msbf);
}
define Pld(x:uint):type = variant {
Hello if x == 0;
...
FlowMod if x == 14;
...
}
define valid_hdr(h:cref(Hdr)):bool = {
return h.vrsn == 1
and h.len >= bytes(h);
}
define Msg:type = record {
hdr: Hdr | valid_hdr;
pld: Pld(hdr.type,
constraint(hdr.len - bytes(hdr)));
}
func := x(decl) : τ = block
decl := x : τ[‘|’e][= e]
toplevel := decl|func
Fig. 2.
Core Language Syntax
straints are introduced through the declaration syntax. Any
declaration can impose a semantic constraint through the
use of the bar, |, followed by a guard expression. These
declarations provide constraint information to the compiler
that is used in full program analysis. This allows the compiler
to reason about both constraint satisfaction and safe usage.
The following is a short summary of the ω types:
• uint(spec[, xform]) defines an unsigned integer that has
a precise bit width specified by its structural constraint
(spec). Optionally, the type also takes a transform parameter (xform) that allows for non-native representation
of the data. For instance, a protocol may specify that
a value’s representation is Most Significant Byte First
(MSBF) and 1’s complement.
• array(τ, e) and vector(τ) types allow for sequences of
objects of type τ. The array is statically sized to contain
e elements, while the vector has a dynamic size.
• record{decl} is a sequence of declarations, whose objects can be accessed by field name. There is no padding,
alignment, or meta-data applied to the object by the
compiler. If padding, alignment, or meta-data is desired,
the programmer can explicitly declare them as fields.
Additionally, the order of fields is preserved.
• variant{τ if e} is a union of types where each type is
guarded by a predicate. A variant is constructed by evaluating the predicate set and invoking the constructor of
the corresponding true predicate. A variant is uninitialized
until evaluation of the predicate set.
Figure 3 demonstrates how to declare types corresponding
to the OpenFlow header, payload, and message. The header is
a simple record of four fields, all of which have constant specifiers, and follow MSBF ordering. The payload type is a unique
choice of types based on a type parameter. For the values in
the header to have semantic meaning in version 1.0 of the
Fig. 3.
OpenFlow v1.0 Message Declaration
OpenFlow protocol we have to constrain their values. This is
achieved with the semantic constraint valid_hdr, which must
first be defined as a function that takes a constant reference
to a header and returns bool. Message is defined as a record
including a header with version 1.0 semantic constraints, and a
payload that is parameterized over the header’s type field and
constraint. All type constructors, with the exception of uint
and array allow for an optional specifier constraint. In this
particular case, construction of Pld is not to exceed the result
of the constraint hdr.len − bytes(hdr).
Buffer & View are abstractions over the underlying machine architecture that help the compiler ensure structural constraints are never violated. Reading from a file or socket results
in a buffer with begin and end boundaries surrounding the
bytes received. View is a mechanism that restricts visibility
into a Buffer. The set of operations defined for Buffer and
View are:
• view: returns a view of an entire buffer
• available: returns the byte size of a view
• advance: returns a view with an advanced head
• constrain: returns a view with a constrained tail
• put: writes a value to a view
• get: reads a value from a view
View
View
msg
msg
Buffer
msg
constrain
Fig. 4.
Constraining a View limits the number of bytes available for access
Figure 4 illustrates a buffer returned from a read system call
against a TCP socket. A single read has resulted in more than
one protocol message. The initial view wraps all of the data;
however, the first few bytes of the view contain a protocol
header, which provides the length of the first message. This
length is then used to constrain the visibility to precisely one
message. The constrain operation supports use of datagram
and stream oriented transports, while also providing safety
boundaries for object construction.
IV. C OMPILER S YNTHESIS
Programmers continue to make mistakes implementing message operations that are necessary in all protocols such as those
mentioned in § I and § VI. Our strategy is to eliminate the
need to write these common operations by having the compiler
synthesize safe and efficient versions. All user-defined type
definitions contain structural and semantic constraints. This
information is sufficient to synthesize the following operations:
• construction: constructs an object from expressions
• copy_construction: constructs an object from another
• assignment: copies an object’s state into another
• bytes: returns the number of bytes of an object
• to_view: writes an object to a view
• from_view: constructs an object from a view
• equal, not_equal: compare objects for equivalence
• to_string: returns a string representation of the object
The remainder of this section will describe the synthesis
process for a small subset of the above operations focusing on
synthesis and constraint validation for bytes and from_view.
Bytes is the name of the operation for determining the byte
size of any object. The operation bytes is synthesized for each
declared ω type in a program. For uint it returns the number
of bytes indicated by the specifier. For array it returns the
result of sizeof(T )∗elements, where T is the type contained
by the array. For objects of type Vector, bytes is not a
constant expression. It has run-time dependencies and returns
the accumulation of calling bytes over its elements. Record
returns the sum of calling bytes over its constituent fields,
and is only a constant if all of its fields are also constant.
Calling bytes over a variant returns 0 if the variant is
uninitialized, or it proxies the call to the contained object.
Figure 5 illustrates the process just described in pseudo code.
Several other synthesized operations depend on bytes.
Structural constraint violations must be prevented during
object construction. There are only three ways to violate a
structural constraint: overflowing a view, underflowing a view,
or constructing an invalid variant. Overflowing a view involves
advancing the view beyond the number of bytes contained.
Underflowing a view involves constraining a view by more
bytes than contained. Constructing an invalid variant is caused
when none of the variant’s contained type predicates evaluate
to true.
In order to construct the OpenFlow header the size of
the view must be at least as large as the number of bytes
of the header, or 8 bytes. During object construction the
view is always advanced by the size in bytes of the object.
Constructing the message object from a view of 7 or less bytes
would result in a view overflow.
The OpenFlow protocol indicates the length of a message
with the header length field. This value is used to constrain the
view for payload construction. It is possible, through accident
or malicious intent, for the length field to be inconsistent with
define bytes(u : uint(bits(v), f)) : uint = {
return v/8;
}
define bytes(a : cref array(T,x)) : uint = {
return sizeof(T) * x;
}
define bytes(v : cref vector(T) : uint = {
accum : uint = 0;
foreach(item in v) {
accum += bytes(v);
}
return accum;
}
define bytes(r : cref record) : uint = {
return bytes(r.x1)+bytes(r.x2)+...+bytes(r.xN);
}
define bytes(v : cref variant) : uint = {
if(not init(v))
return 0;
switch(v.kind) {
case variant::K1 => return bytes(T1(v.value));
case variant::K2 => return bytes(T2(v.value));
...
case variant::KN => return bytes(TN(v.value));
}
}
Fig. 5.
Synthesis rules for the bytes operation
the amount of data actually sent. If the field indicated less than
8 bytes of payload it could be possible to underflow the view.
The value used to construct the variant payload is in the
header. Again, either through accident or malicious intent, it is
possible for the header to indicate a type which will not result
in valid variant construction. Using a variant in an invalid way
will result in undefined behavior.
Object construction is possible with either a constructor that operates over expressions or using the from_view
operation. Figure 6 illustrates pseudo code for synthesizing
from_view. The operation returns false when a structural
constraint has been violated. Failure indicates a partially
constructed object. For simple types, such as uint and array,
the structural constraints are always checked. If there are
not enough bytes in the view to complete the operation, the
operation fails. Otherwise, the object’s value is constructed by
reading from the view. If a xform is present the object’s value
is updated using the specified transform. Finally, the view is
advanced by the size of the object just constructed.
The vector version of from_view operates in a greedy
fashion, it will consume the entire view. If this behavior is
not desired the view must be constrained before construction.
As long as there are bytes in the view the vector will attempt to
construct an object. Upon success, the object is inserted into
the vector and the process repeats. The record version will
attempt to construct its constituent fields and either return at
the first failure or succeed. The variant must guard against
the third type of structural constraint; it must be initialized
to a valid type. If this is not true then from_view will fail,
otherwise from_view is called over the appropriate type.
Symbolic construction ensures that all run-time type dependencies must be propagated and semantic constraints are
inserted into synthesized code. The OpenFlow message from
Figure 3 has semantic constraints, a run-time type dependency,
and a constrained view. The semantic constraint turns into a
predicate check immediately after the call to from_view of
the header. If the check fails, the operation immediately returns
define from_view(v:ref(view), u:uint(bits(v),f)):bool={
if (available(v) < bytes(u))
return false;
get(v, u);
u = f(u);
advance(v, bytes(u));
return true;
}
define from_view(v:ref(view), a:ref(array(T,e))):bool={
if (available(v) < bytes(a))
return false;
foreach(x in a) {
from_view(v, x);
}
return true;
}
define from_view(v:ref(view), vc:ref(vector(T))):bool={
while(available(v) > 0) {
t:T;
if (not from_view(v, t))
return false;
push(vc, t);
}
return true;
}
define from_view(v:ref(view), r:ref(record)):bool={
if (not from_view(v, r.x1))
return false;
if (not from_view(v, r.x2))
return false;
...
return from_view(v, r.xN);
}
define from_view(v:ref(view), vr:ref(variant)):bool={
if(not init(vr))
return false;
switch(vr.kind) {
case vr::K1 => return from_view(v, T1(vr.value));
case vr::K2 => return from_view(v, T2(vr.value));
...
case vr::KN => return from_view(v, TN(vr.value));
}
}
Fig. 6.
Synthesis rules for the from_view operation
define from_view(v:ref(view), m:Msg):bool = {
if(not from_view(v,m.hdr))
return false;
if(not valid_hdr(m.hdr))
return false;
if(not construct(m.pld, m.hdr)) return false;
return from_view(constrain(v,m.hdr.len-bytes(m.hdr)),
m.pld);
}
Fig. 7.
the compilation of the program with useful error messages.
The goal of the compiler is to synthesize safe and efficient
code. The synthesis algorithm described previously will produce safe but inefficient code. The operations to_view and
from_view contain fine-grained guards that protect against
view underflow and overflow. These fine-grained guards are
the source of inefficiency. For example, it is better to have a
single guard over a sequence of objects of constant size, then
to have a guard over each object. We call this guard fusing, it
is analogous to fusing basic blocks to form larger basic blocks.
It is also useful to lift guards from inside the called function
to the call site. By lifting guards to the call site, potential
guard fusing optimization becomes possible. The optimization
strategy that we follow is a set of fusing and lifting rounds
that reduce the number of guards and form the largest possible
object construction basic blocks for to_view and from_view.
All synthesized operations have a similar Call Sequence
Graph (CSG). Figure 8 illustrates the generalized CSG for a
Flow Modification message. Each node represents a function
in the call sequence, the function types are indicated by
the node shape in the figure. This CSG is used to both
synthesize operation definitions and analyze safe usage of
messages. Guards start at the leaves of the graph and are lifted
to their parent nodes. If all guards can be fused within an
interior node, then the new guard is lifted and the process
is repeated. This process ensures guards covering the largest
possible constant sized objects are performed, additionally this
process is unaware of protocols and will optimize across layer
boundaries. Sometimes a node can have more than one parent
node, where the parents have differing behaviors. In this case,
we split the node into two versions where we lift the guard
when it is contained within a constant structure, or leave it in
place otherwise.
Message
Header
record
variant
vector
uint
Synthesis of from_view for Msg
Flow_Mod
with failure. Next, the type parameter must be checked and
initialized before the call to from_view over the payload. The
check ensures that failure happens if the value is undefined,
and if upon success initializes the payload’s kind. Finally, the
constrained view operation is propagated. The result of this
final step is shown in Figure 7.
Match
Action
Action_Hdr
V. S AFETY A ND O PTIMIZATION
Action_Payload
There are only three ways to violate structural constraints:
view underflow, view overflow, and reading or writing from
an uninitialized variant. These three categories of mistakes
can be identified with two simple invariants. If the bytes
of a view are always non-negative then it is impossible to
underflow or overflow the view. If a read or write of a variant is
always preceded by a valid initialization then the third category
is also impossible. The compiler uses a dataflow analysis
framework to prove that these invariants always hold or fail
Fig. 8.
Flow Modification Control Flow Graph
Code generation takes place after the optimization phase.
We currently support C++11 as our target language. All
message related type definitions and synthesized operations
will be written to a single set of .cpp and .hpp files, the
program itself is written to main.cpp.
VI. I MPLEMENTATION AND E VALUATION
Protocol implementations that send messages that are either
structurally or semantically invalid exist. Applying this work
we were able to discover structural constraint violations in
packet traces from core Internet routers. Furthermore, we
were able to define three categories of message constraints,
and show violation of these constraints can lead to high
profile vulnerabilities. Network programs must always handle
messages in a safe manner. To this aim, we developed a
systems programming language and library for writing safe
efficient network programs.
The language implementation was originally developed
as a C++11 library. The library was used to test ideas and
guide the language design. However, in order to enforce safety
guarantees with optimization a compiler was necessary. We
experimented with the language using two types of network
programs: a protocol analyzer, and an OpenFlow stack. This
set of applications provided good coverage over the diversity
of protocol formats and their constraints.
Core Internet traces were obtained from Caida [1] as test
data for packet analyzers written in our new language facilities.
The traffic was recorded from high speed interfaces, OC-192
(up to 10Gbps). Only the Layer 3 and Layer 4 headers, timing,
and summary information are present. The layer 3 addresses
were randomized and the layer 4 payloads were removed for
anonymization purposes. Each trace has between 500 MB and
1 GB of data and was timestamped in minute intervals. We
analyzed a 10 minute segment of traces from October of 2012.
We focused on looking for structural and value constraints
violations within IPv4, IPv6, TCP, and UDP. Table II shows
that we found structural constraint violations in all but one
protocol; no semantic constraint violations were found. IPv4
violated its structural constraint with regards to IPv4 Options.
The values in the Internet Header Length (IHL) field indicated
a number of Options that should be constructed; however, this
packet would overflow its view, the received block of data was
too small. The TCP and UDP structural constraint violations
were of the same nature; they violated the basic constraint of
a minimum sized header.
TABLE II
C AIDA T RACES
Desc.
Count
CDF
Struct
IPv4
247,849,217
99.95%
16
IPv6
130,760
0.05%
0
TCP
221,243,574
89.22%
84,274
UDP #
23,633,921
9.53%
86,123
The source of these structural constraint violations is not
currently known. It could be evidence of unintentional errors
in sending devices, it could be maliciously crafted packets,
or it could be due to the collection process of the trace data.
However, regardless of the source, structural constraints have
been violated and these packets should not be admitted to safe
network programs.
VII. C ONCLUSION A ND F UTURE W ORK
Incorrect implementations of protocol message specifications affect the stability of network systems and potentially
lead to vulnerabilities. In this paper we identified three categories of constraints that can be used either to test whether a
message is well-formed or to generate safe code. We developed
a systems programming language that allowed user-defined
types to capture these constraints as well as a reasoning framework to ensure these constraints are always upheld within the
users program. We presented example type definitions and
compiler synthesized code using the OpenFlow 1.0 protocol.
The next steps for this work fall into two categories:
extending the ω types and formalizing the meta-system.
Extending the type system will allow for the support of more
protocols. Vectors will be extended to support termination
predicates as a structural constraint parameter, this will allow for self-terminating sequences such as null-terminated
character strings. Generalized enumerations will be added as
an easier mechanism for restricting values used in message
construction. Finally, work on the meta-system is focused on
generating proof certificates that can be used for mechanical
verification of safety.
R EFERENCES
[1] The CAIDA Anonymized 2012 Internet Traces - 20120119-125903, kc
claffy, Dan Andersen, Paul Hick.
[2] G. Back. Datascript- a specification and scripting language for binary
data, 2002.
[3] J. Condit, M. Harren, Z. Anderson, D. Gay, and G. Necula. Dependent
types for low-level programming. Programming Languages and Systems,
pages 520–535, 2007.
[4] K. Fisher and R. Gruber. PADS: a domain-specific language for
processing ad hoc data. SIGPLAN Not., 40(6):295–304, June 2005.
[5] K. Fisher, Y. Mandelbaum, and D. Walker. The next 700 data description
languages. SIGPLAN Not., 41(1):2–15, January 2006.
[6] Google. Protocol buffers, 2012. http://code.google.com/p/protobuf/.
[7] US Government. United States Computer Emergency Readiness Team,
2012.
[8] International Organization for Standards.
International Standard
ISO/IEC 14882. Programming Languages — C++, 2nd edition, 2003.
[9] R. D. Jenks and R. S. Sutor. AXIOM: The Scientific Computation System.
Springer-Verlag, 1992.
[10] P. J. McCann and S. Chandra. Packet types: abstract specification
of network protocol messages. In Proceedings of the conference on
Applications, Technologies, Architectures, and Protocols for Computer
Communication, SIGCOMM ’00, pages 321–333, New York, NY, USA,
2000. ACM.
[11] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson,
J. Rexford, S. Shenker, and J. Turner. Openflow: enabling innovation
in campus networks. SIGCOMM Comput. Commun. Rev., 38(2):69–74,
March 2008.
[12] R. Pang, V. Paxson, R. Sommer, and L. Peterson. binpac: a yacc for
writing application protocol parsers. In Proceedings of the 6th ACM
SIGCOMM conference on Internet measurement, IMC ’06, pages 289–
300, New York, NY, USA, 2006. ACM.
[13] G. Dos Reis. A System for Axiomatic Programming. In AISC/MKM/Calculemus, pages 295–309, 2012.
[14] Alexander A Stepanov and Paul McJones. Elements of programming.
Addison-Wesley Professional, 2009.
[15] International Telecommunication Union.
Abstract syntax
notation one (ASN.1). Technical report, 2002. Available from:
http://www.itu.int/ITU-T/studygroups/com17/languages/X.6800207.pdf.
| 6cs.PL
|
Ping-pong configurations and circular orders on free groups
arXiv:1709.02348v2 [math.GR] 14 Nov 2017
Dominique Malicet
∗
Kathryn Mann
†
Cristóbal Rivas
‡
Michele Triestino
§
Abstract
We discuss actions of free groups on the circle with “ping-pong” dynamics; these are dynamics
determined by a finite amount of combinatorial data, analogous to Schottky domains or Markov
partitions. Using this, we show that the free group Fn admits an isolated circular order if and
only if n is even, in stark contrast with the case for linear orders. This answers a question from
[21]. Inspired by work in [2], we also exhibit examples of “exotic” isolated points in the space of
all circular orders on F2 . Analogous results are obtained for linear orders on the groups Fn × Z.1
1
Introduction
Let G be a group. A (left-invariant) linear order, often called a left order on G is a total order
invariant under left multiplication. Left-invariance directly implies that the order is determined by
the set of elements greater than the identity, called the positive cone. It is often far from obvious
whether a given order can be determined by only finitely many inequalities, or whether a given
group admits such a finitely-determined order. This latter question turns out to be quite natural
from an algebraic perspective, and can be traced back to Arora and McCleary [3] for the special
case of free groups. McCleary answered this question for free groups shortly afterwards, showing
that Fn has no finitely determined orders [25].
The question of finite determination gained a topological interpretation following Sikora’s
definition of the space of linear orders on G in [29]. This space, denoted LO(G), is the set of all
linear orders on G endowed with the topology generated by open sets
U(,X) := {0 | x 0 y iff x y for all x, y ∈ X}
as X ranges over all finite sets of G. Finitely determined linear orders on G are precisely the isolated
points of LO(G); going forward, we will refer to these as isolated orders. This correspondence between
isolated points and finitely determined orders is perhaps the simplest instance of the general theme
that topological properties of LO(G) should reflect algebraic properties of G.
Presently, several families of groups are known to either admit or fail to admit isolated orders,
with proofs that use both purely algebraic and dynamical methods. Some examples of groups that
do not admit isolated orders include free abelian groups [29], free groups [25, 26], free products of
arbitrary linearly orderable groups [28], and some amalgamated free products such as fundamental
groups of orientable closed surfaces [1]. Large families of groups which do have isolated orders
∗
LAMA, Université Paris-Est Marne-la-Vallée, CNRS UMR 8050, 5 bd. Descartes, 77454 Champs sur Marne,
France.
†
Dept. Mathematics, Brown University, 151 Thayer Street, Providence, RI 02912.
‡
Dpto. Matemática y C.C. Universidad de Santiago de Chile, Alameda 3363, Estación Central, Santiago, Chile.
§
IMB, Université Bourgogne Franche-Comté, CNRS UMR 5584, 9 av. Alain Savary, 21000 Dijon, France.
1
MSC2010: Primary 20F60, 57M60. Secondary 20E05, 37C85, 37E05, 37E10, 57M60.
1
include braid groups [11, 15], groups of the form hx, y | xn = y m i (n, m ∈ Z) [19, 27], and groups
with triangular presentations [10]. (In fact, all of these latter examples have orders for which the
positive cone is finitely generated as a semi-group, a strictly stronger condition.) As a consequence
of our work here, we give a family of groups where, interestingly, both behaviors occur.
Theorem 1.1. Let Fn denote the free group of n generators. The group Fn × Z has isolated linear
orders if and only if n is even.
This result appears to give the first examples of any group G with a finite index subgroup H (in
this case Fn × Z ⊂ Fm × Z, for n odd and m even) such that LO(G) and LO(H) are both infinite,
but only G contains isolated points.
Theorem 1.1 also has an interesting consequence regarding the space of marked groups. As shown
in [8, Prop. 2.13], the set of left-orderable groups is a closed subset of the space of marked groups
on n generators. However, Theorem 1.1 implies that this is not the case either for the subset of
groups admitting isolated linear orders (or its complement): one may take a sequence of markings of
F2 × Z so as to approach F3 × Z, and similarly, a sequence of markings on F3 × Z can be chosen to
approach F4 × Z (see [8, §2.4]). Thus, Theorem 1.1 immediately gives the following.
Corollary 1.2. In the space of finitely generated marked groups, having an isolated linear order is
neither a closed, nor an open property.
The main tool for Theorem 1.1, and main focus of this work, is the study of circular orders on Fn
and the dynamics of their corresponding actions of Fn on S1 . It is well known that, for countable G,
admitting a linear order is equivalent to acting faithfully by orientation-preserving homeomorphisms
on the line. In the same vein, a circular order on G is an algebraic condition which, for countable
groups, is equivalent to acting faithfully by orientation-preserving homeomorphisms on S1 . We recall
the definition and basic properties in Section 3. Any action of G on S1 lifts to an action of a central
extension of G by Z on the line, giving us a way to pass between circular and linear orders on these
groups, and giving us many dynamical tools for their study.
Analogous to LO(G), one can define a space of circular orders CO(G). In [21], the second and
third authors showed that a circular order on Fn is isolated if and only if the corresponding action
on the circle has what they called ping-pong dynamics. They gave examples of isolated circular
orders on free groups of even rank, but the odd rank case was left as an open problem. Here we
answer this question in the negative:
Theorem 1.3. Fn admits an isolated circular order if and only if n is even.
Similarly to Corollary 1.2, one can also prove that the set of groups admitting isolated circular
orders is neither closed nor open in the space of marked groups.
We prove Theorem 1.3 by developing a combinatorial tool for the study of actions on S1 with
ping-pong dynamics (similar to actions admitting Markov partitions), inspired by the work in [13]
and [2]. We expect these to have applications beyond the study of linear and circular orders; one
such statement is given in Theorem 3.9. The notion of ping-pong dynamics is defined and motivated
in the next section. Sections 3 and 4 give the application to the study of circular and linear orders,
respectively, and the proofs of Theorems 1.1 and 1.3.
2
Ping-pong actions and configurations
Definition 2.1. Let G = Fn be the free group of rank n, freely generated by S = {a1 , . . . , an }.
A ping-pong action of (G, S) on S1 is a representation ρ : G → Homeo+ (S1 ) such that there exist
2
D(b)
ρ(a) S1 \ D(a−1 )
D(a)
D(a−1 )
D(b−1 )
Figure 2.1: Classical ping-pong on two generators
pairwise disjoint open sets D(a) ⊂ S1 , a ∈ S
∪ S −1 , each of which has finitely many connected
components, and such that ρ(a) S1 \ D(a−1 ) ⊂ D(a). We further assume that if I and J are any
connected components of D(a), then I¯ ∩ J¯ = ∅.
We call the sets D(a) the ping-pong domains for ρ.
A similar definition is given in [21], with the additional requirement that ping-pong domains be
closed. The above, more general definition is more natural for our purposes, although we will later
introduce Convention 3.7 to reconcile the two. The reader may notice that, for a given ping-pong
action ρ of (G, S), there can be many choices of sets D(a) satisfying the property in Definition 2.1.
S
For instance, if ρ is a ping-pong action such that a∈S∪S −1 D(a) 6= S1 , then one may choose an
S
arbitrary open set I disjoint from a∈S∪S −1 D(a) and replace D(a1 ) withD(a1 ) ∪ I, leaving the
other domains unchanged. These new domains still satisfy ρ(a) S1 \ D(a−1 ) ⊂ D(a). Later we will
adopt a convention to avoid this kind of ambiguity.
Motivation: why ping-pong actions? The classical ping-pong lemma implies that ping-pong
actions are always faithful, and a little more work shows that the action is determined up to
semi-conjugacy by a finite amount of combinatorial data coming from the cyclic ordering and the
images of the connected components of the sets D(a) (see Definition 2.4 and Lemma 3.4 below, or
[23, Thm. 4.7]). In particular, one can think of ping-pong actions as the family of “simplest possible”
faithful actions of Fn on S1 , and it is very easy to produce a diverse array of examples. Perhaps
the best-known examples are the actions of discrete, free subgroups of PSL(2, R) on RP1 . For these
actions, one can choose domains D(a) with a single connected component. Figure 2.1 shows an
example of the dynamics of such an action of F2 = ha, bi.
Despite their simplicity, ping-pong actions are quite useful. For instance, in [2] ping-pong
actions were used to construct the first known examples of discrete groups of real-analytic circle
diffeomorphisms acting minimally, but not conjugate to a subgroup of a finite central extension of
PSL(2, R). This was a by-product of a series of papers concerning longstanding open conjectures of
Hector, Ghys and Sullivan on the relationship between minimality and ergodicity of a codimensionone foliation (see for instance [12, 13, 16]). In general, it is quite tractable to study the dynamic and
ergodic properties of a ping-pong action (or a Markov system), and this program has been carried
out by many authors [6, 7, 18, 20, 22].
3
2.1
Basic properties
Lemma 2.2. Given a ping-pong
action of (G, S), there exists a choice of ping-pong domains D(a)
1
such that ρ(a) S \ D(a−1 ) = D(a) holds for all a ∈ S ∪ S −1 .
Proof. Let ρ be a ping-pong action with sets D(a) given. We will modify these domains to satisfy
the requirements of the lemma. For each generator a ∈ S (recall this
is the free,not the symmetric,
0
generating set), we shrink the domain D(a), setting D (a) := ρ(a) S1 \ D(a−1 ) . Applying a−1 to
both sides of the above expression gives ρ(a−1 )(D0 (a)) = S1 \ D(a−1 ). Moreover, since the connected
components of D(a)have disjoint
closures, and the same holds for D(a−1 ), hence
also for D0 (a),
we also have ρ(a−1 ) D0 (a) = S1 \ D(a−1 ); or equivalently ρ(a−1 ) S1 \ D0 (a) = D(a−1 ). This is
what we needed to show.
Convention 2.3. From now on, we assume all choices of domains D(a) for every ping-pong action
are as in Lemma 2.2. In particular, this means that, for each a ∈ S, the sets of connected components
π0 (D(a)) and π0 (D(a−1 )) have the same cardinality, and ρ(a) induces a bijection between the
connected components of S1 \ D(a−1 ) and connected components of D(a).
Definition 2.4. Let ρ be a ping-pong action of (G, S). The ping-pong configuration of ρ is the data
consisting of
1. the cyclic order of the connected components of
S
a∈S∪S −1
D(a) in S1 , and
2. for each a ∈ S ∪ S −1 , the assignment of connected components
λa : π0
[
D(b) → π0 (D(a))
b∈S∪S −1 \{a−1 }
induced by the action.
Note that not every abstract assignment λa as in the definition above can be realized by an
action F2 → Homeo+ (S1 ). The following construction gives one way to produce some large families
of examples.
Example 2.5 (An easy construction of ping-pong actions). For a ∈ S, let Xa and Ya ⊂ S1 be disjoint
sets each of cardinality k(a), for some integer k(a) ≥ 1, such that every two points of Xa are
separated by exactly one point of Ya . Choose these so that all the sets Xa ∪ Ya are pairwise disjoint
as a ranges over S. Let D(a) and D(a−1 ) be neighborhoods of Xa and Ya , respectively, chosen small
enough so that all these sets remain pairwise disjoint. Now one can easily construct a piecewise
linear homeomorphism (or even a smooth diffeomorphism) ρ(a) with Xa as its set of attracting
periodic points, and Ya as the set of repelling periodic points such that ρ(a) S1 \ D(a−1 ) = D(a).
The assignments λa are now dictated by the period of ρ(a) and the cyclic order of the sets Xa and
Ya .
While the reader should keep the construction above in mind as a source of examples, we will
show in Example 3.10 that not every ping-pong configuration can be obtained in this manner.
However, the regularity (PL or smooth) in the construction is attainable in general. The following
construction gives one possibility for a PL realization that will be useful later in the text. We leave
the modifications for the smooth case as an easy exercise.
4
Lemma 2.6. Given a ping-pong action ρ0 of (G, S) with domains {D0 (a)}a∈S∪S −1 following Convention 2.3, one can find another ping-pong action ρ of (G, S) with domains {D(a)}a∈S∪S −1 such
that:
1. the action ρ is piecewise linear,
2. there exists µ > 1 such that for any a ∈ S ∪ S −1 , one has ρ(a)0 |D(a−1 ) ≥ µ, and
3. the actions ρ0 and ρ have the same ping-pong configuration.
Proof. Let ρ0 be as in the statement of the Lemma. For each a ∈ S ∪ S −1 , replace the original
domains by smaller domains D(a) ⊂ D0 (a), chosen small enough so that the largest connected
component of D(a) is at most half the length of the smallest connected component of S1 \ D(a−1 ).
We require also that D(a) has exactly one connected component in each connected component of
D0 (a). Now define ρ(a) as a piecewise linear homeomorphism that maps connected components of
S1 \ D(a−1 ) onto connected components of D(a) linearly following the assignment λa .
The next definition and proposition give a further means of encoding the combinatorial data of a
ping-pong action. This will be used later in the proof of Theorem 1.3.
Definition 2.7. Let ρ be a ping-pong action of (G, S) with domains D(a). For each a ∈ S, we
define an oriented bipartite graph Γa with vertex set equal to π0 (D(a)) ∪ π0 (D(a−1 )), and edges
defined as follows:
• For I + ∈ π0 (D(a)), let J + denote the connected component of S1 \ D(a) adjacent to I +
on the right. Put an oriented edge from I + to an interval I − ∈ π0 (D(a−1 )) if and only if
ρ(a−1 )(J + ) = I − .
• Similarly, for I − ∈ π0 (D(a)), with J − the adjacent interval of S1 \ D(a−1 ) on the right, put
an oriented edge from I − ∈ π0 (D(a−1 )) to I + ∈ π0 (D(a)) if and only if ρ(a)(J − ) = I + .
Proposition 2.8. Let ρ : G → Homeo+ (S1 ) be a ping-pong action of a free group (G, S). Then, for
each generator a ∈ S, there exists k(a) ∈ N such that the graph Γa is an oriented 2k(a)-cycle.
Proof. First, the construction of the graph ensures that it is bipartite, and that each vertex has at
most one outgoing edge. As a consequence of Convention 2.3, for any s ∈ S ∪ S −1 and connected
component J of S1 \ D(s−1 ), there exists I ∈ π0 (D(s)) such that ρ(s)(J) = I, so each vertex
does indeed have an outgoing edge. Moreover, if J 0 6= J is a different connected component, then
ρ(s)(J) ∩ ρ(s)(J 0 ) = ∅, so each vertex I has a unique incoming edge. This shows that Γa is a union
of disjoint cycles, and it remains only to prove that the graph is connected.
To show connectivity, let I − be a connected component of D(a−1 ) and consider the connected
component J + of S1 \ D(a) such that ρ(a−1 )(J + ) = I − . Let I1+ and I2+ be the connected components
of D(a) (possibly the same) which are adjacent to J + on either side. By definition of the graph Γa ,
the intervals I1+ , I − , I2+ are consecutive vertices in the same cycle of the graph. And vice versa: if
three intervals I1+ , I − , I2+ are consecutive vertices, then J + := ρ(a)(I − ) is the connected component
of S1 \ D(a) adjacent to both I1+ and I2+ .
This proves that if I1+ and I2+ are consecutive connected components of D(a) in S1 , then they
belong to the same cycle in Γa . Hence we easily deduce that all connected components of D(a)
are in the same cycle in Γa . The same also holds for the components of D(a−1 ), and the graph is
connected.
5
3
Left-invariant circular orders
We begin by quickly recalling standard definitions and properties. A reader familiar with circular
orders may skip to Section 3.1.
Definition 3.1. Let G be a group. A left-invariant circular order is a function c : G × G × G →
{0, ±1} such that
1. c is homogeneous: c(γg0 , γg1 , γg2 ) = c(g0 , g1 , g2 ) for any γ, g0 , g1 , g2 ∈ G;
2. c is a 2-cocycle on G:
c(g1 , g2 , g3 ) − c(g0 , g2 , g3 ) + c(g0 , g1 , g3 ) − c(g0 , g1 , g2 ) = 0 for any g0 , g1 , g2 , g3 ∈ G;
3. c is non-degenerate: c(g0 , g1 , g2 ) = 0 if and only if gi = gj for some i 6= j.
The space of all left-invariant circular orders on G, denoted CO(G), is the set of all such functions,
endowed with the subset topology from {0, ±1}G×G×G (with the natural product topology).
Although spaces of left-invariant linear orders have been well-studied, there are very few cases
where the topology of CO(G) is completely understood. Other than a few sporadic examples, the only
complete description of spaces of circular orders known to the authors comes from [9], which gives a
classification of all groups such that CO(G) is finite, and also a proof that CO(A) is homeomorphic
to a Cantor set for any Abelian group A.
Given that left-orders on free groups are well understood, a natural next case of circular orders
to study is CO(Fn ). Our main tool for this purpose is the following classical relationship between
circular orders and actions on S1 (see [5, 21]).
Proposition 3.2. Given a left-invariant circular order c on a countable group G, there is an action
ρc : G → Homeo+ (S1 ) such that c(g0 , g1 , g2 ) = ord (ρc (g0 )(x), ρc (g1 )(x), ρc (g2 )(x)) for some x ∈ S1 ,
where ord denotes cyclic orientation.
Moreover, there is a canonical procedure for producing ρc which gives a well-defined conjugacy
class of action. This conjugacy class is called the dynamical realization of c with basepoint x.
A description of this procedure is given in [21], modeled on the analogous linear case (see
e.g. [17]). Note that modifying a dynamical realization by blowing up the orbit of some point
y ∈
/ ρ(G)(x) may result in a non-conjugate action that still satisfies the property c(g0 , g1 , g2 ) =
ord (ρc (g0 )(x), ρc (g1 )(x), ρc (g2 )(x)). However, this non-conjugate action cannot be obtained through
the canonical procedure.
Remark 3.3. The converse to the above proposition is also true: if G is a countable subgroup of
Homeo+ (S1 ), then G admits a circular order. A proof is given in [5, Thm. 2.2.14]2 . As a special
case, if ρ : G → Homeo+ (S1 ) is such that some point x has trivial stabilizer, then we may define an
induced order on G by
c(g1 , g2 , g3 ) := ord(ρ(g1 )(x), ρ(g2 )(x), ρ(g3 )(x)).
2
In [4, Prop. 2.4] the authors propose an alternative way of inducing an ordering of G, different from that in [5].
However their method is incorrect, as the following example shows: suppose to have three distinct homeomorphisms
f, g, h, with f coinciding with g on one half circle and with h on the other half. Then for any point x ∈ S1 , there are
always two equal points in the triple (f (x), g(x), h(x)).
6
While one cannot expect in general to find a point with trivial stabilizer, this does hold for
ping-pong actions by the following lemma.
Lemma 3.4. Suppose that ρ is a ping-pong action of (G, S) with domains D(a). If x0 ∈ S1 \
a∈S∪S −1 D(a), then the orbitSof x0 is free and its cyclic order is completely determined by the cyclic
order of the elements of {π0 ( a∈S∪S −1 D(a)) , {x0 }} and the assignments λa .
S
The proof is obtained by a careful reading of the standard proof of the classical ping-pong lemma.
Details are given in [21, Lemma 4.2].
3.1
Isolated circular orders on free groups
In this section we will use ping-pong actions to prove Theorem 1.3 from the introduction. As
this builds on the framework of [21], we start by introducing two results obtained there.
Let G be any group, and ρ : G → Homeo+ (S1 ). Recall that, if ρ(G) does not have a finite
orbit, then there is a unique closed, ρ(G)-invariant set contained in the closure of every orbit, called
the minimal set of ρ(G). We denote this set by Λ(ρ). If Λ(ρ) = S1 , the action is called minimal.
Otherwise, Λ(ρ) is homeomorphic to a Cantor set and ρ permutes the connected components of
S1 \ Λ(ρ). While, for many examples of actions, the permutation will have many disjoint cycles, the
next lemma states that this is not the case for dynamical realizations.
Lemma 3.5 ([21] Lemma 3.21 and Cor. 3.24). Let ρ : G → Homeo+ (S1 ) be a dynamical realization of
a circular order c. Suppose that ρ has a minimal invariant Cantor set Λ(ρ). Then ρ acts transitively
on the set of connected components of S1 \ Λ(ρ).
Since a ping-pong action of a free group of rank at least 2 cannot have finite orbits, invariance
S
of the minimal set immediately implies that Λ(ρ) ⊂ a∈S∪S −1 D(a). If additionally, for each
s 6= t ∈ S ∪ S −1 , one has D(s) ∩ D(t) = ∅, then invariance of Λ(ρ) and the definition of ping-pong
S
implies that in fact Λ(ρ) ⊂ a∈S∪S −1 D(a). Going forward, it will be convenient to have the this
stronger condition, which is given by following lemma.
Lemma 3.6. Let ρ0 be a ping-pong action of (G, S) with domains D0 (a) for a ∈ S ∪ S −1 . Then
there exists an action ρ with the same ping-pong configuration as ρ0 and with domains D(a) satisfying
D(s) ∩ D(t) = ∅ whenever s 6= t.
Proof. Let ρ0 be a ping-pong action. There are only finitely many points x contained in sets of the
form D0 (s) ∩ D0 (t) for t 6= s ∈ S ∪ S −1 . For each such point x, blow up its orbit, replacing each
point y ∈ ρ0 (G)(x) with an interval Iy ; if lengths of the Iy are chosen so their sum converges, then
we obtain a new circle, say Ŝ1 , with a natural continuous, degree one map h : Ŝ1 → S1 given by
collapsing each Iy to the point y. For each s ∈ S ∪ S −1 , let D1 (s) ⊂ Ŝ1 be the preimage of D0 (S)
under h.
Since x has trivial stabilizer and G is free, we may extend the action of G to this new circle by
allowing a ∈ S to act as any orientation-preserving map from Iy to Ia(y) . We now show that we may
choose maps in such a way as to achieve a ping-pong action with the desired properties.
For each inserted interval I = [p, q] that is adjacent to a set of the form D1 (s) on the left and
D1 (t) on the right (where s, t ∈ S ∪ S −1 ), fix points ps < pt in the interior of I and extend D1 (s)
into I to include [p, ps ) and D1 (t) to include (pt , q]. Having done this on each such interval, let
D(s) denote the new extended domains, and note that these have disjoint closures. Now for a ∈ S,
define the action of a on such an interval I = Iy as follows. If ρ0 (a)(y) ∈ D0 (a), the restriction
of ρ to I may be any orientation-preserving homomorphism between Iy and Ia(y) . Otherwise, Iy
7
is adjacent to D1 (a−1 ) either on the right or the left, and we define ρ(a) on Iy to map the chosen
point pa−1 ∈ Iy to the point pa in Ia(y) . This ensures that ρ(a)(S 1 \ D(a−1 )) = D(a), so that these
are indeed ping-pong domains for the action. Finally, note that by construction, the ping-pong
configuration has not changed.
Convention 3.7. In a ping-pong action of (G, S), we assume from now on that the domains D(s)
satisfy D(s) ∩ D(t) = ∅ whenever s 6= t ∈ S ∪ S −1 .
It follows easily from invariance of Λ(ρ) and the definition of ping-pong that, for actions as in
S
Convention 3.7, we have the inclusion Λ(ρ) ⊆ a∈S∪S −1 D(a). The following theorem from [21]
relates circular orders and ping-pong actions.
Theorem 3.8 ([21] Thm. 1.5). Let G = Fn be a free group. A circular order c ∈ CO(G) is isolated
if and only if its dynamical realization ρc : G → Homeo+ (S1 ) is a ping-pong action satisfying
Convention 3.7.
With these tools, we proceed to the main goal of this section.
Proof of Theorem 1.3. The case where n is even is covered in [21]. As explained there, the representation of G into PSL(2, R) coming from a hyperbolic structure on a genus n/2 surface with one
boundary component gives an isolated circular order. (In fact, by taking lifts to cyclic covers, one
can obtain infinitely many isolated circular orders in distinct equivalence classes under the action of
Aut(Fn ) on CO(G).)
To show that Fn does not admit an isolated circular order when n is odd, we need more work.
We begin with some generalities, applicable to free groups of any rank (even or odd). Suppose
that ρ : Fn → Homeo+ (S1 ) is a dynamical realization of an isolated circular order, and fix a free
generating set S = {a1 , . . . , an } for Fn . By Theorem 3.8 and Lemma 3.5, ρ is a ping-pong action
with domains satisfying Convention 3.7 and the connected components of S1 \ Λ(ρ) form a unique
orbit. Let c0 , . . . , cr be the (finitely many) connected components of S1 \ Λ(ρ) that are not contained
in any domain D(s).
Suppose that ci has endpoints in D(s) and D(t), for some s 6= t. Then, for any generator
u∈
/ {s−1 , t−1 }, we have that ρ(u)(ci ) ∈ D(u). In addition, we have that ρ(s−1 )(ci ) and ρ(t−1 )(ci )
belong to {c0 , . . . , cr }: indeed, the intersection ci ∩D(s) is nonempty; its image by ρ(s−1 ) is contained
in S1 \ (Λ ∪ D(s−1 )) and is adjacent to D(s−1 ) because of Convention 2.3; moreover, it has to intersect
some cj because of Convention 3.7. Then we must have ρ(s−1 )(ci ) = cj . The same holds for t−1 . This
implies that ci and cj are in the same orbit if and only if they are equivalent under the equivalence
relation ∼ on {c0 , . . . , cr } generated by
ci ∼ cj
if there exists t ∈ S ∪ S −1 such that ci = ρ(t)(cj ) and ci ∩ D(t) 6= ∅
We will now argue that the number of equivalence classes under this relation can be 1 only if n is
even. This is done by using the combinatorial data of the graphs from Definition 2.7 to build a
surface with boundary using the disc, and then making an Euler characteristic argument.
For each generator a ∈ S, let k(a) be the integer given by Proposition 2.8. Let Pa be a 4k(a)-gon
(topologically a disc) with cyclically ordered vertices v1 , v2 , . . . , v4k(a) . Choose a connected component
I = [x1 , y1 ] of D(a) and glue the oriented edge v1 v2 to I so as to agree with the orientation of
I ⊂ S1 . Then glue the edge v3 v4 to the connected component of D(a−1 ) containing ρ(a−1 )(x1 ),
according to the orientation in S1 . Let y2 denote the other endpoint of this connected component,
and glue v5 v6 to the connected component of D(a) containing ρ(a)(y2 ). Iterate this process until all
edges v2j−1 v2j have been glued to S1 = ∂D. Our convention to follow the orientation of S1 implies
8
that the resulting surface with boundary is orientable. Note that the remaining (unglued) edges of
Pa correspond exactly to the edges of the graph Γa from Definition 2.7; precisely, collapsing each
connected component of D(a) and of D(a−1 ) to a point representing a vertex recovers the cycle Γa .
Now repeat this procedure for each generator in S, to obtain an orientable surface with boundary,
which we will denote by Σ. A cartoon of the result of this procedure for the ping-pong action of
Example 3.10 is shown in Figure 3.1, and may be helpful to the reader.
We claim that the number of boundary components of the surface Σ is exactly the number
of equivalence classes of the relation ∼. To see this, we proceed as follows. By construction, the
connected components of ∂Σ ∩ {c0 , . . . , cr } are exactly the intervals ci . If some interval ci has
endpoints in D(s) and D(t), then ∂Σ ∩ ci is joined to ρ(t−1 )ci ∩ ∂Σ and ρ(s−1 )ci ∩ ∂Σ by edges of
Ps and Pt respectively. Thus, ci ∼ cj implies that ci and cj lie in the same boundary component of
Σ, and the intersection of that boundary component with {c0 , . . . , cr } defines an equivalence class.
This proves the claim.
We now compute the Euler characteristic of Σ and conclude the proof. Proposition 2.8 implies
that the gluing of Pa described in our procedure adds one face and 2k(a) edges to the existing
surface. Therefore after all the polygons Pa (as a ranges over elements of S) have been glued, the
surface Σ obtained has χ(Σ) ≡ n + 1 mod 2. Since Σ is orientable, χ(Σ) agrees mod 2 with the
number of boundary components of Σ, which, by our claim proved above, agrees with the number of
equivalence classes of ci . As discussed above, if ρ is the dynamical realization of an isolated order
then this number is equal to 1, hence n + 1 ≡ 1 mod 2, and n must be even.
The proof above can be improved to give a statement about general ping-pong actions:
Theorem 3.9. Let G = Fn be the free group of rank n with free generating set S. Consider a
ping-pong action ρ of (G, S) satisfying Conventions 2.3 and 3.7. Let Λ(ρ) be the minimal invariant
Cantor set for the action. Then the number of orbits of connected components of the complement
S1 \ Λ(ρ) is congruent to n + 1 mod 2.
Proof. As in the previous proof, let c0 , c1 , . . . , cr be the connected components of S1 \ Λ(ρ) that
are not contained in any domain D(s), and recall that G permutes the connected components of
S1 \ Λ(ρ). We claim that each cycle of this permutation contains at least one of the ci . Given this
claim, we may construct an orientable surface Σ as in the proof of Theorem 1.3, whose boundary
components count the number of cycles. Computing Euler characteristic as above shows that the
number of cycles is congruent to n + 1 mod 2.
We now prove the claim. Suppose that I is a connected component of S1 \ Λ(ρ) contained in
some D(s). By Lemma 2.6, we can take ρ(s) to be piecewise linear, and such that each ρ(s−1 )
expands D(s) uniformly, increasing the length of each connected component by a factor of some
µ > 1, independent of s. Iteratively, assuming that ρ(sk sk−1 · · · s1 )(I) ⊂ D(s−1
k+1 ), then the length
k+1
of ρ(sk+1 sk · · · s1 )(I) is at least µ
length(I). This process cannot continue indefinitely, so some
image of I is not contained in a ping-pong domain.
3.2
Exotic examples
To indicate some of the potential difficulty of the problem of classifying all isolated orders on Fn ,
we give an example of a ping-pong configuration for F2 that, even after applying an automorphism
of F2 , cannot arise from the construction in Example 2.5.
Example 3.10. Let F2 = ha, bi and consider a ping-pong action where ρ(b) is as defined by the graph
in Figure 3.2, and ρ(a) is a hyperbolic element of SL(2, R) chosen so that the connected components
9
Pb
Pa
D
Figure 3.1: The surface associated with the exotic example (left), and its boundary component
(right).
ρ(b) S1 \ D(b−1 )
D(b−1 )
D(b)
D(b−1 )
ρ(b) S1 \ D(b−1 )
D(b)
D(b)
−1
D(b
)
D(b)
D(b−1 )
D(b)
D(b)
D(b−1 )
D(b−1 )
Figure 3.2: The ping-pong domains for ρ(b) (left) and its graph (right). The circle is oriented
counterclockwise.
10
of the domains for the ping-pong action are in cyclic order as follows:
D(b−1 ), D(a−1 ), D(b−1 ), D(a), D(b), D(a−1 ), D(b), D(a)
(we are abusing notation slightly here, using each appearance of D(s) to stand for a connected
component of D(s)). See Figure 3.1 (left) for an illustration of the domains and the surface Σ
constructed in the proof of Theorem 1.3.
Since ρ(b) has two hyperbolic fixed points, and ρ(a) has four, this example is not realized by a
ping-pong action in PSL(2, R), nor in any finite extension of it. In fact, the ping-pong configuration
for ρ(b) alone is atypical, in the sense that it is not the classical ping-pong configuration for a
hyperbolic element in PSL(2, R) – ρ(b) has a “slow” contraction on the left half of the circle, as two
iterations of ρ(b) are needed in order to bring the external gaps of D(b) ∪ D(b−1 ) into the component
of D(b) with the attracting fixed point.
However, the surface Σ from this construction has one boundary component, as shown in
Figure 3.1 (right), so it corresponds to an isolated circular order in CO(F2 ).
Observe that one can create several examples of this kind, by choosing ρ(b) to have two hyperbolic
fixed points, but with an arbitrarily slow contraction (i.e. with N connected components for D(b),
N ∈ N arbitrary) and then choosing ρ(a) to be a N -fold lift of a hyperbolic element in PSL(2, R).
4
Left-invariant linear orders on Fn × Z
The purpose of this section is to prove Theorem 1.1, stating that Fn × Z admits an isolated
linear order if and only if n is even.
4.1
Preliminaries on linear orders
Before proceeding to the proof of Theorem 1.1, we recall some standard tools. As for circular orders, linear orders on countable groups have a dynamical realization (see for instance [14, Prop. 1.1.8]).
One quick way of seeing this given what we have already described, is by thinking of a linear order
as a special case of a circular order. Indeed, given a linear order on a group G, one defines the
cocycle c by setting, for distinct g1 , g2 , g3 ∈ G
c (g1 , g2 , g3 ) = sign(σ),
where σ is the permutation of the indices such that gσ(1) ≺ gσ(2) ≺ gσ(3) . Thus, the construction
of the dynamical realization sketched in the proof of Proposition 3.2 may be performed also for a
linear order. The result is an action on the circle with a single one global fixed point, which one can
view as an action on the line with no global fixed point. Conversely, a faithful action on the real line
ρ : G → Homeo+ (R) can be viewed as a faithful action on the circle with a single fixed point, and
the circular orders produced as in Remark 3.3 will be linear orders on G.
Next, we recall the notion of convex subgroups, their dynamical interpretation, and their
relationship to isolated orders.
Definition 4.1. A subgroup C in a linearly-ordered group (G, ) is convex if for any two elements
h, k ∈ C, and for any g ∈ G, the condition h g k implies g ∈ C.
Lemma 4.2 (see [14], Prop. 2.1.3). Let G be a countable left-ordered group and consider a dynamical
realization ρ of (G, ) with basepoint x such that C is a convex subgroup. Let I be the interval
bounded by inf h∈C ρ(h)(x) and suph∈C ρ(h)(x). Then I has the following property:
for any g ∈ G, either ρ(g)(I) = I, or ρ(g)(I) ∩ I = ∅.
11
(4.1)
Moreover, the stabilizer of I is precisely C.
Conversely, given a faithful action on the real line ρ : G → Homeo+ (R), if an interval I has the
property (4.1), then the stabilizer C = StabG (I) is convex in any induced order with basepoint x ∈ I.
It is easy to see that the family of convex subgroups of a linearly ordered group (G, ) forms a
chain: if C1 , C2 are two convex subgroups of (G, ), then either C1 ⊂ C2 or C2 ⊂ C1 . Moreover,
for any convex subgroup C ⊂ G, the group G acts on the ordered coset space (G/C, C ) by orderpreserving transformation. (The induced order on the coset space is given by f C <C gC if and only
if f c < gc0 for every c, c0 ∈ C, which makes sense because C is convex.) In particular, this implies
that if C is convex in (G, ), then any linear order C on C may be extended to a (new) order 0
on G by declaring
(
C C gC if g ∈
/ C,
id 0 g ⇔
0
id g
if g ∈ C.
Elaborating on this, one can show the following lemma (see [14, Prop. 3.2.53] or [24, Thm. 2] for
details).
Lemma 4.3. If (G, ) has an infinite chain of convex subgroups, then is non-isolated in LO(G).
Let us also introduce a dynamical property that implies that an order is non-isolated. Recall
that two representations ρ1 and ρ2 : G → Homeo+ (R) are semi-conjugate if there is a proper,
non-decreasing map f : R → R such that f ◦ ρ1 = ρ2 ◦ f .
Definition 4.4. Let G be a discrete group. Let Rep(G, Homeo+ (R)) denote the space of representations (homomorphisms) G → Homeo+ (R), endowed with the compact-open topology; let
Rep# (G, Homeo+ (R)) be the subspace of representations with no global fixed points.
A representation ρ ∈ Rep# (G, Homeo+ (R)) is said to be flexible if every open neighborhood of ρ
in Rep# (G, Homeo+ (R)) contains a representation that is not semi-conjugate to ρ.
The following lemma is implicit in work of Navas [26] as well as in [28]. An explicit proof can be
found in [1, Prop. 2.8].
Lemma 4.5. Let G be a discrete, countable group and let ρ0 be the dynamical realization of an
order with basepoint x ∈ R. If ρ0 is flexible, then is non-isolated in LO(G).
Remark 4.6. Though not needed for our work here, we note that a precise characterization of isolated
circular and linear orders in terms of a strong form of rigidity (i.e. strong non-flexibility) of their
dynamical realizations is given in [21].
As mentioned in the introduction, in order to prove Theorem 1.1 we use the relationship between
circular orders on groups and linear orders on their central extensions by Z. For this purpose, we
need the notion of cofinal elements.
Definition 4.7. An element h in a linearly-ordered group (G, ) is called cofinal if
for all g ∈ G, there exist m, n ∈ Z such that hm g hn .
(4.2)
Remark 4.8. Cofinal elements also have a characterization in terms of the dynamical realization: If
ρ is a dynamical realization of with basepoint x, then h ∈ G is cofinal if and only if ρ(h) has no
fixed point. Indeed, if h is not cofinal, then the point inf{ρ(g)(x) | hn g for every n ∈ Z} is fixed
by ρ(h). Conversely, if h satisfies (4.2), then the orbit of x under ρ(h) is clearly unbounded on both
sides.
12
ρ(g)
ρ(f )
u
w
v
Figure 4.1: A crossing in the dynamical realization.
Given a group G with a circular order c, there is a natural procedure to lift c to a linear order c
on a central extension of G by Z such that any generator of the central Z subgroup is cofinal for c
[21, 30]. The following statement appears as Proposition 5.4 in [21].
Proposition 4.9. Assume that G is finitely generated and c is an isolated circular order on G. If
b of G by Z, then the induced linear order c is isolated in
c is the lift of c to a central extension G
b
LO(G).
Finally, we recall the definition of crossings.
Definition 4.10. Let G be a group acting on a totally ordered space (Ω, ≤). The action has
crossings if there exist f, g ∈ G and u, v, w ∈ Ω such that:
1. u < w < v.
2. g n u < v and f n v > u for every n ∈ N, and
3. there exist M, N in N such that f N v < w < g M u.
In this case, we say that f and g are crossed.
If f and g are crossed, then the graph of ρ(f ) and ρ(g) in the dynamical realization is locally
given by the picture in Figure 4.1.
Our application of the notion of crossings will be through the following lemma.
Lemma 4.11 ([14] Cor. 3.2.28). Let C be a convex subgroup of (G, ) and suppose that the (natural)
action of G on (G/C, C ) has no crossings. Then there exists a homomorphism τ : G → R with
C in its kernel. Moreover, if C is the maximal convex subgroup of (G, ), then C agrees with the
kernel of τ .
4.2
Isolated linear orders on Fn × Z
We now turn to our main goal of describing isolated linear orders on Fn × Z and proving
Theorem 1.1. We begin by reducing the proof to the statement of Proposition 4.12 below.
13
Since every central extension of Fn by Z splits, Proposition 4.9 tell us that F2n × Z admits
isolated linear orders – more precisely, any lift of an isolated order on F2n to F2n × Z will be isolated.
Furthermore, if
π
0 → Z → Ĝ → G → 1
is a central extension of G by Z then any linear order on Ĝ in which Z is cofinal gives a canonical
circular order on G as follows. Let z be the generator of Z such that z id. Since z is cofinal, for
each g ∈ G, there exists a unique representative ĝ ∈ π −1 (g) such that id ĝ ≺ z. Given distinct
elements g1 , g2 , g3 ∈ G, let σ be the permutation such that
id ĝσ(1) ≺ ĝσ(2) ≺ ĝσ(3) ≺ z.
Define π ∗ ()(g1 , g2 , g3 ) := sign(σ). One checks that this is a well defined circular order on G. In the
proof of Proposition 5.4 of [21], it is shown that π ∗ is continuous and is locally injective when G
is finitely generated, which implies that an isolated linear order of F2n+1 × Z with cofinal center
induces an isolated circular order of F2n+1 by this procedure. Since F2n+1 has no isolated circular
orders, by Theorem 1.3, to finish the proof of Theorem 1.1 it is enough to show the following:
Proposition 4.12. Let F be a free group, and a linear order on G = F × Z in which the central
factor is not cofinal. Then is non-isolated.
As a warm-up, as well as tool to be used in the proof, we start with a short proof of a special
case.
Lemma 4.13. Let F be a free group of infinite rank and G = F × Z. Then no order in LO(G) is
isolated.
Proof. Let f1 , f2 , . . . be a set of free generators of the free factor F and g the generator of the central
factor Z. Let be any order on G and ρ0 a dynamical realization with basepoint x. For any fixed
n ∈ N, we can define a representation ρn : G → Homeo+ (R) by setting
(
ρn (g) = ρ0 (g),
ρn (fk ) =
ρ0 (fk )
ρ0 (fn )−1
if k 6= n,
if k = n.
It is easy to see that the orbit of x is free for all the actions ρn , and that no two distinct representations
ρn and ρm are semi-conjugate one to another. Thus, they determine distinct orders n ; and these
orders converge to in LO(G) as n → ∞.
Proof of Proposition 4.12. We have already eliminated the case where F has infinite rank. If F has
rank one, then F × Z is abelian, and so admits no isolated orders (see [29]). So from now on we
assume that the rank of F is finite and at least 2.
Looking for a contradiction, suppose that is a linear order on G = F × Z which is isolated,
and in which the center is not cofinal. Let ρ be its dynamical realization, and let z be a generator of
the central Z subgroup. By Remark 4.8, ρ(z) acts with fixed points. Moreover since Z is central, the
set of fixed points of ρ(z) is ρ(G)-invariant. Since ρ(G) has no global fixed point, this implies that
ρ(z) has fixed points in every neighborhood of +∞ and of −∞.
We now find a convex subgroup in which z is cofinal. Let I denote the connected component
of R \ Fix(ρ(z)) that contains the basepoint x0 of ρ, so in particular I is a bounded interval. Let
C = StabG (I).
Claim 1. C is a convex subgroup of (G, ) and z is cofinal in (C, ).
14
Proof of Claim. If h, k ∈ C and g ∈ G satisfy ρ(h)(x0 ) < ρ(g)(x0 ) < ρ(k)(x0 ), then for any n we
also have ρ(z n h)(x0 ) < ρ(z n g)(x0 ) < ρ(z n k)(x0 ). Since z is central, this implies
ρ(hz n )(x0 ) < ρ(gz n )(x0 ) < ρ(kz n )(x0 ).
(4.3)
Up to replacing z with z −1 , without loss of generality we may assume that ρ(z)(x0 ) > x0 . Thus, as
n → ∞, the sequence of points ρ(z n )(x0 ) converges to the rightmost point of I, which is fixed by
both ρ(h) and ρ(k). We deduce from (4.3) that ρ(g) also fixes this point. Similarly, considering the
limit in (4.3) as n → −∞ shows that the leftmost point of I is fixed by ρ(g). Hence g ∈ C, which
shows C is convex. Finally, by Remark 4.8, the fact that ρ(z) has no fixed points in I implies that z
is cofinal in (C, ).
Since (G, ) is isolated and C is convex, the restriction of to C is also an isolated order on C.
Additionally, the fact that is isolated implies, by Lemma 4.3, that the chain of convex subgroups
of G is finite. Let G0 denote the smallest convex subgroup properly containing C. Since Z ⊂ C,
we have that G0 is also a direct product of Z and a free group (a subgroup of F ), and again, our
assumptions on imply that (the restriction of) is an isolated left-order on G0 in which Z is not
cofinal. Thus, we may work from now on with G0 instead of G. Equivalently – and, for notational
convenience, this is how we will proceed – we may assume that C is the maximal convex subgroup
of G.
For our next claim observe that this maximal convex subgroup C also admits a decomposition of
the form F ∗ × Z, where F ∗ is a subgroup of F .
Claim 2. F ∗ is a non trivial free group of even rank.
Proof of Claim. Since the restriction of to C = F ∗ × Z is isolated, as before, Lemma 4.13 implies
that F ∗ cannot have infinite rank. If F ∗ were trivial, then the action of G would be semi-conjugate
to an action of F , thus making very easy to perturb the action of F × Z and thus the order (recall
that free groups have no isolated orders [25]). Thus, F ∗ is a nontrivial free group of finite rank,
and as z is cofinal in the ordering in C, its rank must be even (c.f. the remarks at the beginning of
Section 4.2).
Claim 3. C has infinite index in G.
Proof of Claim. If C had finite index, then the G-orbit of the interval I would be bounded. This
would imply that the dynamical realization has a global fixed point, which is absurd.
Since every nontrivial normal, infinite index subgroup of F has infinite rank, we conclude from
Claims 2 and 3 that F ∗ (and thus C) is not a normal subgroup of G. Lemma 4.11 thus implies that
the action of G on (G/C, C ) has crossings, as otherwise C would be normal. In particular, if we
collapse I and its G-orbit, we obtain a semi-conjugate action ρ̄ : G → Homeo+ (R) which is minimal
and has crossings. Using this observation, we now prove the following claim.
Claim 4. For any compact set K ⊂ R, there exists ρ0 agreeing with ρ on K, but not semi-conjugate
to ρ.
Proof of Claim. Fix a compact set K. We will modify the action of F outside K to produce an
action of G that is not semi-conjugate to ρ.
Suppose as an initial case that there is a primitive element (i.e. a generator in some free generating
set) a of F such that ρ(a) has a fixed point p ∈
/ K. Without loss of generality, assume p is to the
right of K, the other case is completely analogous. Since Fix(ρ(a)) is ρ(z)-invariant, and ρ(z n )(p) is
15
bounded and accumulates at a fixed point of ρ(z), we may also assume without loss of generality
that we have chosen p to be a common fixed point of ρ(z) and ρ(a).
We now define a+ and a− ∈ Homeo+ (R) which commute with ρ(z), and have the property that
a+ (x) ≥ x for all x ≥ p, and a− ◦ ρ(a)(x) ≤ x for all x ≥ p. For this, let J be any connected
component of (R\Fix(ρ(z)))∩[p, ∞). Suppose first that J contains a point of Fix(ρ(a)). The fact that
a and z commute means that the endpoints of J are preserved by ρ(a). Then define the restriction
of a+ to J to agree with ρ(z) if ρ(z)(x) > x on J, or with ρ(z −1 ) if ρ(z)(x) < x on J. If J contains
no point of Fix(ρ(a)), then J ⊆ J 0 where J 0 is a connected component of R \ Fix(ρ(a)) ∩ [p, ∞), and
we may define a+ to agree with ρ(a) or ρ(a−1 ) there, so as to satisfy a+ (x) > x for x ∈ J. Lastly, set
a+ (x) = x for any x ∈ Fix(ρ(z)) ∩ [p, ∞). The definition of a− is analogous. Let ρ± be the actions
obtained by replacing the action of ρ(a) by that of a± on [p, ∞) and leaving the other generators
unchanged. Since a+ and a− commute with ρ(z), this defines representations of G, and clearly ρ+
and ρ− are not semi-conjugate.
We are left to deal with the case where no primitive element of F has a fixed point outside K.
In this case, we will perturb the action ρ to obtain a primitive element with a fixed point outside K,
and hence a non-semi-conjugate action. To do this, we use the fact that the semi-conjugate action ρ̄
has crossings and is minimal. Minimality implies that crossings can be found outside any compact
set and, thus, for any compact K ⊂ R there is g ∈ G such that R \ Fix(ρ(g)) has a component outside
(and on the right of) K. Let J = (j0 , j1 ) denote one of those components.
Notice that some primitive element a ∈ F has the property that ρ(a)(j0 ) ∈ J, but ρ(a)(j1 ) ∈
/ J.
For if this was not the case, J would satisfy property (4.1) and as observed in Remark 4.2, G would
then have a convex subgroup properly containing a conjugate of C. Since C was assumed maximal,
this is impossible.
Fix a primitive element a with the property above, and let ḡ be the homeomorphism defined as
the identity outside J and agreeing with ρ(g) on J. Define ρḡ by
ρḡ (a) = ḡρ(a), and ρḡ (b) = ρ(b) for any other generator of F , and ρḡ (z) = ρ(z).
Since ḡ commutes with ρ(z) = ρḡ (z), the new action ρḡ is a representation of G. Moreover, by
changing ḡ by some power if necessary, we have that ρḡ (a) has a fixed point in J. This ends the
proof of Claim 4.
To finish the proof of Proposition 4.12 (and thus that of Theorem 1.1), we note that the flexibility
of ρ from Claim 4 together with the statement of Lemma 4.5 implies that the order is non-isolated,
giving the desired contradiction.
Acknowledgments
The authors thank Yago Antolín for suggesting Corollary 1.2. K.M. was partially supported
by NSF grant DMS-1606254. C.R. was partially supported by FONDECYT 1150691. M.T. was
partially supported by PEPS – Jeunes Chercheur-e-s – 2017 (CNRS), Projet “Jeunes Géométres” of
F. Labourie (financed by the Louis D. Foundation) and the Réseau France-Brésil en Mathématiques.
References
[1] J. Alonso, J. Brum, and C. Rivas, Orderings and flexibility of some subgroups of Homeo+ (R), J. Lond. Math. Soc.
(2) 95 (2017), no. 3, 919–941. MR3664524
16
[2] S. Alvarez, P. Barrientos, D. Filimonov, V. Kleptsyn, D. Malicet, C. Meniño, and M. Triestino, Maskit partitions
and locally discrete groups of real-analytic circle diffeomorphisms. In preparation.
[3] A.K. Arora and S.H. McCleary, Centralizers in free lattice-ordered groups, Houston J. Math. 12 (1986), no. 4,
455–482. MR873641
[4] H. Baik and E. Samperton, Spaces of invariant circular orders of groups, Groups Geom. Dyn. To appear.
[5] D. Calegari, Circular groups, planar groups, and the Euler class, Proceedings of the Casson Fest, 2004, pp. 431–491.
MR2172491
[6] J. Cantwell and L. Conlon, Foliations and subshifts, Tohoku Math. J. (2) 40 (1988), no. 2, 165–187. MR943817
[7]
, Leaves of Markov local minimal sets in foliations of codimension one, Publ. Mat. 33 (1989), no. 3, 461–484.
MR1038484
[8] C. Champetier and V. Guirardel, Limit groups as limits of free groups, Israel J. Math. 146 (2005), 1–75. MR2151593
[9] A. Clay, K. Mann, and C. Rivas, On the number of circular orders on a group, ArXiv e-prints (2017), available at
1704.06242.
[10] P. Dehornoy, Monoids of O-type, subword reversing, and ordered groups, J. Group Theory 17 (2014), no. 3,
465–524. MR3200370
[11] P. Dehornoy, I. Dynnikov, D. Rolfsen, and B. Wiest, Ordering braids, Mathematical Surveys and Monographs,
vol. 148, American Mathematical Society, Providence, RI, 2008. MR2463428
[12] B. Deroin, V.A. Kleptsyn, and A. Navas, On the question of ergodicity for minimal group actions on the circle,
Mosc. Math. J. 9 (2009), no. 2, 263–303. MR2568439
[13]
, On the ergodic theory of free group actions by real-analytic circle diffeomorphisms, Invent. Math. (2014).
To appear.
[14] B. Deroin, A. Navas, and C. Rivas, Groups, orders and dynamics, Arxiv e-print (2016), available at 1408.5805.
[15] T. V. Dubrovina and N. I. Dubrovin, On braid groups, Mat. Sb. 192 (2001), no. 5, 53–64. MR1859702
[16] D.A. Filimonov and V.A. Kleptsyn, Structure of groups of circle diffeomorphisms with the property of fixing
nonexpandable points, Funct. Anal. Appl. 46 (2012), no. 3, 191–209. MR3075039
[17] É. Ghys, Groups acting on the circle, Enseign. Math. (2) 47 (2001), no. 3-4, 329–407. MR1876932
[18] T. Inaba and S. Matsumoto, Resilient leaves in transversely projective foliations, J. Fac. Sci. Univ. Tokyo Sect. IA
Math. 37 (1990), no. 1, 89–101. MR1049020
[19] T. Ito, Dehornoy-like left orderings and isolated left orderings, J. Algebra 374 (2013), 42–58. MR2998793
[20] R. Mañé, Hyperbolicity, sinks and measure in one-dimensional dynamics, Comm. Math. Phys. 100 (1985), no. 4,
495–524. MR806250
[21] K. Mann and C. Rivas, Group orderings, dynamics, and rigidity, Ann. Inst. Fourier (Grenoble) (2016). To appear.
[22] S. Matsumoto, Measure of exceptional minimal sets of codimension one foliations, A fête of topology, 1988,
pp. 81–94. MR928398
[23]
[24]
, Basic partitions and combinations of group actions on the circle: a new approach to a theorem of Kathryn
Mann, Enseign. Math. 62 (2016), no. 1-2, 15–47. MR3605808
, Dynamics of isolated left orders, ArXiv e-prints (2017), available at 1701.05987.
[25] S.H. McCleary, Free lattice-ordered groups represented as o-2 transitive l-permutation groups, Trans. Amer. Math.
Soc. 290 (1985), no. 1, 69–79. MR787955
[26] A. Navas, On the dynamics of (left) orderable groups, Ann. Inst. Fourier (Grenoble) 60 (2010), no. 5, 1685–1740.
MR2766228
[27]
, A remarkable family of left-ordered groups: central extensions of Hecke groups, J. Algebra 328 (2011),
31–42. MR2745552
[28] C. Rivas, Left-orderings on free products of groups, J. Algebra 350 (2012), 318–329. MR2859890
[29] A.S. Sikora, Topology on the spaces of orderings of groups, Bull. London Math. Soc. 36 (2004), no. 4, 519–526.
MR2069015
[30] S.D. Želeva, Cyclically ordered groups, Sibirsk. Mat. Ž. 17 (1976), no. 5, 1046–1051, 1197. MR0422106
17
| 4math.GR
|
Computing the Convolution of Analog and Discrete Time
Exponential Signals Algebraically
Francisco Mota
arXiv:1606.08072v1 [cs.SY] 26 Jun 2016
Departamento de Engenharia de Computação e Automação
Universidade Federal do Rio Grande do Norte – Brasil
e-mail:[email protected]
November 17, 2017
Abstract
We present a procedure for computing the convolution of exponential signals without the need of
solving integrals or summations. The procedure requires the resolution of a system of linear equations
involving Vandermonde matrices. We apply the method to solve ordinary differential/difference equations
with constant coefficients.
1
Notation and Definitions
Below we introduce the definitions and notation to be used along the paper:
• Z, R and C are, respectively, the set of integers, real and complex numbers;
• An analog time signal is defined as a complex valued function f : R → C , and a discrete time signal
t 7→ f (t)
is a complex valued function f : Z → C . In this paper we are mainly concerned with exponential
rt
k 7→ f (k)
k
signals, that is, f (t) = e , or f (k) = r , where r ∈ C. Two basic signals will be necessary in our
development, namely, the unit step signal (σ) and the unit impulse (generalized) signal (δ), both in
analog or discrete time setting. The unit step is defined as
(
(
0, t < 0
0, k < 0
σ(t) =
(analog) and σ(k) =
(discrete time)
1, t > 0
1, k ≥ 0
In analog time context we define the unit impulse as δ = σ̇, where the derivative is supposed to be
defined in the generalized sense, since σ has a “jump” discontinuity at t = 0, and this is why we denote
δ as a “generalized” signal [1]. If f is an analog signal continuous at t = 0, the product “f σ” is given
by
(
0,
t<0
(f σ)(t) = f (t)σ(t) =
f (t), t > 0
and then, if f (0) 6= 0, the module of f σ also has a “jump” discontinuity at t = 0, in fact (f σ)(0− ) = 0
while (f σ)(0+ ) = f (0). Additionally, using the generalized signal δ, we can obtain the derivative of f σ
as
(f˙σ) = f˙σ + f σ̇ = f˙σ + f (0)δ
(1)
In discrete time context, time shifting is a fundamental operation. We denote by [f ]n the shifting of
signal f by n units in time, that is, [f ]n (k) = f (k − n). Using this notation, the discrete time impulse
δ can be written as δ = σ − [σ]1 or δ(k) = σ(k) − σ(k − 1).
• The convolution between two signals f and g, represented by f ∗ g, is the binary operation defined as
[2]:
Z ∞
(f ∗ g)(t) =
f (τ )g(t − τ )dτ, for analog signals, or
−∞
(f ∗ g)(k) =
∞
X
j=−∞
(2)
f (j)g(k − j),
1
for discrete time signals
Additionally if we have f (t) = g(t) = 0 for t < 0 and f (k) = g(k) = 0 for k < 0, we get from (2) that:
k<0
0,
t<0
0,
Z t
k
(f ∗ g)(t) =
(3)
and (f ∗ g)(k) = X
f (j)g(k − j), k ≥ 0
f (τ )g(t − τ )dτ, t > 0
0
j=0
Convolution is commutative, associative and the unity of the operation is the signal δ, that is, f ∗ δ =
δ ∗ f = f for any signal f . Other important properties of convolution are related with derivation and
time shifting:
(f ∗˙ g) = f˙ ∗ g = f ∗ ġ
f ∗ [δ]n = [f ]n
2
Introduction
Convolution between signals is a fundamental operation in the theory of linear time invariant (LTI) systems1
and its importance comes mainly from the fact that a LTI operator H, which represents a LTI system in
analog or discrete time context, satisfies the following property involving signals convolution [3]:
H(u ∗ v) = H(u) ∗ v = u ∗ H(v)
(4)
for any signals u and v, analog or discrete time defined. Since u = u ∗ δ for any signal u, taking in particular
v = δ in (4), we get:
H(u) = u ∗ H(δ) = H(δ) ∗ u, for any signal u.
(5)
Equation (5) above implies that the signal h = H(δ) (denominated impulse response) characterizes the
operator H, or the LTI system, in the sense that the system output due to any input signal u, that is H(u),
is given by the convolution between u itself and the system impulse response h. This is pretty much similar
to the fact that a linear function, e.g. f (x) = ax, is characterized by its value at x = 1, or f (x) = f (1)x.
Maybe the most important class of LTI systems (in analog or discrete time context) are the ones modeled
by a n order ordinary differential/difference equation with constant coefficients, as shown bellow:
y (n) (t) + an−1 y (n−1) (t) + · · · + a2 ÿ(t) + a1 ẏ(t) + a0 y(t)
= u(t),
y(k + n) + an−1 y(k + n − 1) + · · · + a2 y(k + 2) + a1 y(k + 1) + a0 y(k) = u(k),
analog, or
(6)
discrete time
where y represents the system output signal and u is the system input signal. For this class of systems, it
can be shown that the impulse response h can be written as a convolution between n exponential signals
which are defined from the system model (6); more specifically [3]:
(
hi (t) = eri t σ(t)
analog, or
h = h1 ∗ h2 ∗ · · · ∗ hn ,
(7)
hi (k) = rik−1 σ(k − 1) discrete time
where r1 , r2 , . . . , rn , ri ∈ C, are the roots of the characteristic equation xn +an−1 xn−1 +· · ·+a2 x2 +a1 x+a0 =
0, associated to the model (6).
The result in Equation (7) above motivate us to find a procedure to compute the convolution between
exponential signals. In most text books this question is generally dealt in the domain of Laplace or Z
transforms, where time domain convolution, under certain circumstances, becomes the usual product (see
e.g. [4]). In next sections, on the other hand, we show that convolution between exponential signals can
be evaluated directly in time domain, without having to solve integrals or summations, just by solving an
algebraic system of linear equations involving Vandermonde matrices. This approach is very adequate to be
implemented computationally in software packages like Scilab [5]. We should note that, since this is a quite
old question, equivalent results scattered in literature may exists (see e.g. [6, 7] for results obtained in the
context of probability theory); but we believe that our approach to this problem is new. Additionally to find
the system impulse response (7), we also use the same technique to compute the complete solution of the
differential/difference equation (6) for a given signal u.
1 In another important context, convolution can also be used to compute the probability density function of a sum of
independent random variables [8, 9].
2
3
Convolution between analog exponential signals
Consider the analog time signal h : R → C defined by:
rt
h(t) = e σ(t),
r ∈ C, and σ(t) =
(
0, t < 0
1, t > 0
(8)
which is well known to appear as the impulse response of (causal) linear time invariant systems (LTI)
modeled by a first order ordinary differential equation. We note that h, as defined in (8), has two simple,
and important, properties:
1. Its module has a jump discontinuity of amplitude one at t = 0, more precisely, h(0− ) = 0 and h(0+ ) = 1;
2. Its derivative (ḣ) satisfies the (first order differential) equation ḣ = rh + δ, as can be deduced from (1).
Now lets consider the convolution between two signals of this kind, that is, let be h1 (t) = er1 t σ(t) and
h2 (t) = er2 t σ(t). Since both of them are zero for t < 0, we get from (3) that (h1 ∗ h2 )(t) = 0 for t < 0 and,
for t > 0 we have:
Z
Z
t
(h1 ∗ h2 )(t) =
t
er1 τ er2 (t−τ ) dτ = er2 t
0
e(r1 −r2 )τ dτ,
(9)
0
and, before solving this integral, we note that the convolution h1 ∗ h2 satisfies the properties below:
1. h1 ∗ h2 is continuous at t = 0, more precisely, (h1 ∗ h2 )(0− ) = (h1 ∗ h2 )(0+ ) = 0, since by (9) we have:
+
r2 0+
(h1 ∗ h2 )(0 ) = e| {z }
=1
Z
|
0+
0
e(r1 −r2 )τ dτ = 0;
{z
}
(10)
=0
and, of course, the integral above is zero because we have an integration of an exponential function
over an infinitesimal interval.
2. The derivative of (h1 ∗ h2 ), that is (h1 ∗˙ h2 ), is such that (h1 ∗˙ h2 )(0− ) = 0 and (h1 ∗˙ h2 )(0+ ) = 1. In
fact:
(h1 ∗˙ h2 ) = h1 ∗ ḣ2 = h1 ∗ (r2 h2 + δ) = r2 (h1 ∗ h2 ) + h1 ∗ δ = r2 (h1 ∗ h2 ) + h1
and then
(h1 ∗˙ h2 )(0+ ) = r2 (h1 ∗ h2 )(0+ ) + h1 (0+ ) = 1
|
{z
} | {z }
=0
(11)
=1
Now we return to analyse the integral in (9), by considering two cases:
1. r1 6= r2 (or h1 6= h2 ):
(h1 ∗ h2 )(t)
=
(h1 ∗ h2 )(t)
=
1
1
er1 t σ(t) +
er2 t σ(t), or
r1 − r2
r2 − r1
1
1
A1 h1 (t) + A2 h2 (t), A1 =
and A2 =
r1 − r2
r2 − r1
(12)
(13)
Remark 3.0.1. Note that in case where r1 and r2 is a complex conjugate pair, represented by α ± jω,
we get from (12) that (h1 ∗ h2 )(t) = (eαt /ω) sin(ωt) for t ≥ 0.
From Equation (13) we see that, in case that r1 6= r2 , the convolution h1 ∗ h2 can be written as a linear
combination of the signals h1 and h2 , and this fact, along with conditions (10) and (11), can be used to
find the scalars A1 and A2 , without the need of solving the convolution integral (9), as shown bellow:
(h1 ∗ h2 )(0+ ) =
(h1 ∗˙ h2 )(0+ ) =
or:
1
r1
1
r2
A1 h1 (0+ ) + A2 h2 (0+ ) = A1 + A2 = 0
A1 ḣ1 (0+ ) + A2 ḣ2 (0+ ) = A1 r1 + A2 r2 = 1
0
1
A1
A1
=
=
=⇒
1
r1
A2
A2
Solving (14) we get A1 and A2 as shown in (13).
3
1
r2
−1
0
.
1
(14)
2. r1 = r2 = r (or h1 = h2 = h):
(h ∗ h)(t) = tert σ(t) = th(t)
(15)
Now we consider a generalization of the results above for a convolution of n ≥ 2 exponential signals as
shown in (8). We start by finding a generalization for the conditions (10) and (11):
Theorem 3.1. Consider the convolution of n ≥ 2 signals {h1 , h2 , . . . , hn } with hj (t) = erj t σ(t) and rj ∈ C.
The i-th derivative of (h1 ∗ h2 ∗ · · · ∗ hn ), represented by (h1 ∗ h2 ∗ · · · ∗ hn )(i) , evaluated at t = 0+ is given by:
(
0, i = 0, 1, . . . , n − 2
(i) +
(h1 ∗ h2 ∗ · · · ∗ hn ) (0 ) =
1, i = n − 1
and we consider (h1 ∗ h2 ∗ · · · ∗ hn )(0) = h1 ∗ h2 ∗ · · · ∗ hn .
Proof. We note that (h1 ∗ h2 ∗ · · · ∗ hn )(0+ ) = 0 if n ≥ 2, since this involves an integration of exponentials
over an infinitesimal interval; this proves that (h1 ∗ h2 ∗ · · ·∗ hn )(0) (0+ ) = 0. Now consider (h1 ∗ h2 ∗ · · ·∗ hn )(i)
for 1 ≤ i ≤ n − 2, then:
(h1 ∗ h2 ∗ · · · ∗ hn )(i)
= (ḣ1 ∗ ḣ2 ∗ · · · ∗ ḣi ) ∗ (hi+1 ∗ · · · ∗ hn−1 ∗ hn )
{z
}
|
at least two terms
= [(r1 h1 + δ) ∗ (r2 h2 + δ) ∗ · · · ∗ (ri hi + δ)] ∗ (hi+1 ∗ · · · ∗ hn−1 ∗ hn )
= (f + δ) ∗ (hi+1 ∗ · · · ∗ hn−1 ∗ hn )
= f ∗ (hi+1 ∗ · · · ∗ hn−1 ∗ hn ) + (hi+1 ∗ · · · ∗ hn−1 ∗ hn )
(16)
Since the two terms in (16) are composed by a convolution of at least two signals, we conclude that (h1 ∗
h2 ∗ · · · ∗ hn )(i) (0+ ) is equals to zero. Now, considering i = n − 1, we have:
(h1 ∗ h2 ∗ · · · ∗ hn )(n−1)
=
=
=
=
(ḣ1 ∗ ḣ2 ∗ · · · ∗ ḣn−1 ) ∗ hn
(r1 h1 + δ) ∗ (r2 h2 + δ) ∗ · · · ∗ (rn−1 hn−1 + δ) ∗ hn
(f + δ) ∗ hn = f ∗ hn + δ ∗ hn
f ∗ hn + hn
(17)
Then from (17), since f ∗ hn is a sum of (at least) two signals convolution, we have that (f ∗ hn )(0+ ) = 0
and consequently (h1 ∗ h2 ∗ · · · ∗ hn )(n−1) (0+ ) = hn (0+ ) = 1
In the following we will find a procedure for computing the convolution h1 ∗ h2 ∗ · · · ∗ hn for n ≥ 2 and
hj (t) = erj t σ(t) with rj ∈ C without the need of solving integrals. To begin with, we consider the case where
hi 6= hj for i 6= j, which implies ri 6= rj for i 6= j, and it is just a generalization of (14):
Theorem 3.2. The convolution between n ≥ 2 exponentials signals {h1 , h2 , . . . , hn }, with hj (t) = erj t σ(t),
rj ∈ C and hi 6= hj for i 6= j, is given by
h1 ∗ h2 ∗ · · · ∗ hn = A1 h1 + A2 h2 + · · · + An hn ,
(18)
where Aj ∈ C are scalars that can be computed by solving a linear system V A = B where V is the
n × n (nonsingular) Vandermonde matrix defined by Vij = rji−1 , A and B are the n-column vectors A =
(A1 , A2 , . . . , An ) and B = (0, 0, . . . , 1), that is:
1
1
···
1
0
A1
r1
r
·
·
·
r
A
2
n 2
0
2
2
2
r1
r
·
·
·
r
0
A
2
n 3 =
(19)
..
..
..
.. .. ..
.
.
.
.
.
.
r1n−1
r2n−1
rnn−1
···
An
1
So, vector A is the last (n-th) column of the inverse of V .
Proof. We use induction on n to prove (18), which is valid for n = 2, as shown in (13). Suppose (18) is valid
for n = k, and we prove it for n = k + 1:
h1 ∗ h2 ∗ · · · ∗ hk ∗ hk+1
=
=
=
=
=
(h1 ∗ h2 ∗ · · · ∗ hk ) ∗ hk+1
(A1 h1 + A2 h2 + · · · + Ak hk ) ∗ hk+1
A1 (h1 ∗ hk+1 ) + A2 (h2 ∗ hk+1 ) + · · · + Ak (hk ∗ hk+1 )
A1 (B1 h1 + C1 hk+1 ) + A2 (B2 h2 + C2 hk+1 ) + · · · + Ak (Bk hk + Ck hk+1 )
(A1 B1 )h1 + (A2 B2 )h2 + · · · + (Ak Bk )hk + (A1 C1 + · · · + Ak Ck )hk+1 ,
4
and then (18) is proved. To prove (19) we take the i-th derivative at t = 0+ on both sides of (18) to get:
(i)
(i)
(h1 ∗ h2 ∗ · · · ∗ hn )(i) (0+ ) = A1 h1 (0+ ) + A2 h2 (0+ ) + · · · + An hn(i) (0+ ),
i = 0, 1, 2, . . . , n − 1.
(i)
Applying Theorem 3.1 to left side of equation above and using the fact that hj (0+ ) = rji we get (19).
Now we consider the more general convolution h1 ∗h2 ∗· · ·∗hn , n ≥ 2, where there is the possibility of some
hi to be repeated in the convolution, that is hi = hj for some i 6= j. We initially consider some facts about
the so-called “convolution power” (or “n-fold” convolution [8, 9]) of exponentials, that is, the convolution of
h, as defined in (8), repeated between itself n times, and we represent it by h∗n (in Equation (15) we have
a formula for h∗2 ).
Lemma 3.2.1. The convolution power of n exponentials h(t) = ert σ(t), denoted by h∗n , is given by
1
tn−1 h(t),
h∗n (t) = (h ∗ h ∗ · · · ∗ h)(t) =
|
{z
}
(n − 1)!
n≥1
n terms
Proof. By induction on n. It is trivially true for n = 1 and suppose it is valid for n = k, then:
Z t
1
h∗(k+1) (t) = (h∗k ∗ h)(t) =
τ k−1 erτ er(t−τ ) dτ, t > 0
(k
−
1)!
0
Z t
ert
τ k−1 dτ
=
(k − 1)! 0
1
1
=
tk ert = tk h(t).
k(k − 1)!
k!
The Lemma bellow shows a generalization of Theorem 3.1 applied to the convolution power of h:
Lemma 3.2.2. Let be h(t) = ert σ(t), then i-th derivative of h∗n , for n ≥ 2, computed at t = 0+ and
represented by (h∗n )(i) (0+ ), is given by:
i = 0, 1, . . . , n − 2
0,
(20)
(h∗n )(i) (0+ ) = i
ri−n+1 , i ≥ n − 1
n−1
Proof. Equation (20) follows from Lemma 3.2.1 by setting k = n − 1 in the well-known formula:
i = 0, 1, . . . , k − 1
k
0,
i
d
t rt
=
e
i i−k
dti k!
t=0
r , i≥k
k
r1 t
1
2
Now we analyse how it would be like the convolution h∗n
∗ h∗n
σ(t) and h2 (t) =
1
2 , where h1 (t) = e
e σ(t), with r1 6= r2 , that is the convolution between the “n1 -power” convolution of h1 with the “n2 -power”
convolution of h2 when h1 6= h2 .
r2 t
Lemma 3.2.3. Let be h1 (t) = er1 t σ(t) and h2 (t) = er2 t σ(t), with r1 6= r2 , the convolution between the
1
2
n1 -power convolution of h1 and the n2 -power convolution of h2 , denoted by h∗n
∗ h∗n
1
2 , is given by:
2
1
∗ h∗n
h∗n
2
1
=
(h1 ∗ h1 ∗ · · · ∗ h1 ) ∗ (h2 ∗ h2 ∗ · · · ∗ h2 )
|
{z
} |
{z
}
n1 terms
=
(A1 h1 +
A2 h∗2
1
+
n2 terms
1
· · · An1 h∗n
1 ) + (B1 h2
∗n2
+ B2 h∗2
2 + · · · Bn2 h1 )
Proof. We prove by induction on (n1 , n2 ). It is true for (n1 , n2 ) = (1, 1) as shown in (13).
5
1. Induction on n1 : Valid for n1 = k and n2 = 1. Let it be n1 = k + 1:
∗(k+1)
h1
∗ h2 = h1 ∗ (h∗k
1 ∗ h2 ) =
∗k
h1 ∗ (A1 h1 + A2 h∗2
1 + · · · Ak h1 + B1 h2 )
∗(k+1)
∗3
A1 h∗2
1 + A2 h1 + · · · Ak+1 h1
=
=
A1 h∗2
1
=
(B1 C1 )h1 +
+ B1 (h1 ∗ h2 )
∗(k+1)
+ · · · Ak+1 h1
+ B1 (C1 h1 + C2 h2 )
∗(k+1)
∗2
∗3
+ (B1 C2 )h2
A1 h1 + A2 h1 + · · · Ak+1 h1
A2 h∗3
1
+
∗(k+1)
1
2. Induction on n2 : Valid for generic n1 and n2 = k. Let it be n2 = k + 1: Since h∗n
∗ h2
1
∗n1
∗k
(h1 ∗ h2 ) ∗ h2 , then:
1
∗ h∗k
(h∗n
2 ) ∗ h2
1
∗n1
∗2
∗k
= [(A1 h1 + A2 h∗2
1 + · · · + An1 h1 ) + (B1 h2 + B2 h2 + · · · + Bk h2 )] ∗ h2
=
∗(k+1)
∗n1
∗3
∗ h2 ) +B1 h∗2
= A1 (h1 ∗ h2 ) + A2 (h∗2
2 + B2 h 2 + · · · + Bk h 2
1 ∗ h2 ) + · · · + An1 (h1
{z
}
|
∗n1
Rearranged as (C1 h1 +C2 h∗2
1 +···+Cn1 h1
= (C1 h1 +
C2 h∗2
1
+ ···+
1
Cn1 h∗n
1 )
+Dh2 )
∗(k+1)
∗3
+ (Dh2 + B1 h∗2
2 + B2 h 2 + · · · + Bk h 2
)
We now prove the general result about the power convolution of n exponential signals as show in (8)
which is a generalization of Theorem 3.2:
Theorem 3.3. The convolution between n ≥ 2 exponentials signals {h1 , h2 , . . . , hn }, with hi (t) = eri t σ(t),
ri ∈ C and q distinct hs , each of them repeated ns times, so that n1 + n2 + · · · nq = n, is given by
1
2
q
h∗n
∗ h∗n
=
∗ · · · ∗ h∗n
q
1
2
n1
X
A1j h∗j
1 +
n2
X
j=1
j=1
A2j h∗j
2 + ···+
nq
X
Aqj h∗j
q ,
(21)
j=1
where Asj ∈ C are scalars that can be computed by solving a linear system V A = B where V is the n × n
nonsingular confluent (or generalized) Vandermonde matrix defined by V = V1 V2 · · · Vq , where each
block Vs is the n × ns matrix whose entries are defined by
i<j
0,
(Vs )ij =
i − 1 i−j
r , i≥j
j−1 s
A and B are the n-column vectors A = (A1 , A2 , . . . , Aq ), each As is a ns -column vector, and B =
(01 , 02 , . . . , Bq ), where 0s are ns -column zero vectors and Bq is the nq -column vector (0, 0, · · · , 1) that
is:
A1
01
A2 02
V1 V2 · · · Vq A3 = 03
(22)
.. ..
. .
Aq
Bq
So, vector A is the last (n-th) column of the inverse of V . Alternatively, using Lemma 3.2.1, we can rewrite
(21) as
1
2
q
h∗n
∗ h∗n
= p 1 h1 + p 2 h2 + · · · + p q hq
(23)
∗ · · · ∗ h∗n
q
1
2
where each ps , s = 1, . . . , q, is a polynomial defined as
ps (t) =
ns
X
Asj
j=1
tj−1
(j − 1)!
Proof. We use induction on q to prove (21), which is valid for q = 2, as shown in Lemma 3.2.3. Suppose
6
(21) is valid for q = k, and we prove it for q = k + 1:
∗n
k+1
1
2
k
h∗n
∗ h∗n
∗ · · · ∗ h∗n
∗ hk+1
1
2
k
=
=
∗n
k+1
1
2
k
(h∗n
∗ h∗n
∗ · · · ∗ h∗n
1
2
k ) ∗ hk+1
nk
n2
n1
X
X
X
∗ h∗nk+1
Akj h∗j
A2j h∗j
A1j h∗j
2 + ··· +
1 +
k
k+1
=
j=1
=
n1
X
∗n
k+1
A1j (h∗j
1 ∗ hk+1 ) +
B1j h∗j
1 +
j=1
j=1
j=1
j=1
n1
X
n2
X
j=1
n2
X
j=1
∗n
k+1
A2j (h∗j
2 ∗ hk+1 ) + · · · +
B2j h∗j
2 + ···+
nk
X
nk+1
Bkj h∗j
k +
X
nk
X
j=1
∗n
k+1
Akj (h∗j
k ∗ hk+1 )
B(k+1)j h∗j
k+1
j=1
j=1
and the (21) is proved. To prove (22) we take the i-th derivative at t = 0+ on both sides of (21) to get:
+
1
2
q (i)
(h∗n
∗ h∗n
∗ · · · ∗ h∗n
q ) (0 ) =
1
2
n1
X
(i) +
A1j (h∗j
1 ) (0 ) +
j=1
j=1
nq
+
X
n2
X
(i) +
Aqj (h∗j
q ) (0 ),
j=1
(i) +
A2j (h∗j
2 ) (0 ) + · · ·
i = 0, 1, 2, . . . , n − 1.
(i)
(i) +
+
i
Applying Theorem 3.1 to left side of equation above and using the fact that (h∗1
k ) (0 ) = hk (0 ) = rk
along with Lemma 3.2.2, i.e., for j ≥ 2:
i = 0, 1, . . . , j − 2
0,
(i) +
(h∗j
)
(0
)
=
s
i
ri−j+1 , i ≥ j − 1
j−1 s
we get (22).
3.1
Solution of ordinary differential equations with constant coefficients
Consider the ordinary differential equation
y (n) + an−1 y (n−1) + · · · + a1 ẏ + a0 y = u,
ai ∈ R
(24)
which models an n order (causal) linear time invariant (LIT) system with input signal u and output signal
y. The impulse response (h) for this system is given by the convolution [3]:
h = h1 ∗ h2 ∗ · · · ∗ hn ,
hi (t) = eri t σ(t),
ri ∈ C
and r1 , r2 , . . . , rn are the roots of the characteristic equation xn + an−1 xn−1 + · · · + a1 x + a0 = 0 associated
to (24). Supposing that the characteristic equation has q distinct roots rs , each one repeated ns times, so
that n1 + n2 + · · · + nq = n, then we can obtain the impulse response h by using Theorem 3.3, Equation (23),
that is
ns
X
tj−1
Asj
h = p1 h1 + p2 h2 + · · · + pq hq , hs (t) = ers t , ps (t) =
, t>0
(25)
(j − 1)!
j=1
where Asj , j = 1, . . . , ns and s = 1, . . . , q are calculated by solving the Vandermonde system (22).
The complete solution of (24) is generally written as
y = yh + yp
(26)
where yh is the homogeneous (or zero input) solution and yp is a particular solution, i.e., it depends on input
signal u. When solving (24) for t ≥ 0, the particular solution yp can be written as
(
Z t
0,
t<0
u(τ )h(t − τ )dτ = [(uσ) ∗ h](t), where (uσ)(t) =
yp (t) =
(27)
u(t), t > 0
0
The homogeneous solution (yh ) has the same format of (25), that is
yh = p̄1 h1 + p̄2 h2 + · · · + p̄q hq ,
hs (t) = ers t , and p̄s (t) =
ns
X
j=1
7
Āsj
tj−1
.
(j − 1)!
(28)
Therefore to solve (24) we need to obtain yh , which is equivalent to obtain the constants Āsj in (28), and
then compute yp , by evaluating the convolution “(uσ) ∗ h” as showed in (27). To find yh we use the fact
that the particular solution yp is a convolution between n + 1 signals, namely, “(uσ) ∗ h1 ∗ h2 ∗ · · · ∗ hn ” ,
and conclude, by using Theorem 3.1, that:
yp (0+ ) = ẏp (0+ ) = ÿp (0+ ) = · · · = yp(n−1) (0+ ) = 0
and so, using these conditions in (26), we get:
y(0+ ) = yh (0+ ),
ẏ(0+ ) = ẏh (0+ ),
ÿ(0+ ) = ÿh (0+ ),
···
(n−1)
y (n−1) (0+ ) = yh
(0+ ).
This set of conditions on yh can be used to find the constants Āsj in (28) since the “initial values”
y(0), ẏ(0), ÿ(0), . . . , y (n−1) (0) are generally known when solving (24) for t ≥ 0. This implies that the constants Āsj , s = 1, . . . q and j = 1, . . . , ns , can be computed by solving a Vandermonde system like the one
showed in Theorem 3.3, that is V Ā = B̄, where the Vandermonde matrix V is the same one used to compute
the impulse response h, Ā is the n × 1 vector composed by the Āsj ’s and the vector B̄, differently from the
one used to compute h, it is now defined as B̄ = (y(0), ẏ(0), ÿ(0), · · · , y n−1 (0)).
Finally, in order to obtain the complete solution y for (24) as shown in (26), we need to compute the
particular solution “yp = (uσ) ∗ h”, that is the convolution between the input signal uσ and the impulse
response h, and to avoid solving a convolution integral we can use the result of Theorem 3.3, by writing,
if possible, the signal “uσ” as a convolution (or a finite sum) of exponential signals of type “ert σ(t)”, for
some r ∈ C. In this situation, as shown in examples in Section 5.1 bellow, we increase the order of the
Vandermonde matrix, as defined in Theorem 3.3, depending on how many “exponential modes” exists in the
input signal “uσ”.
4
Convolution between discrete time exponential signals
In the context of discrete time signals we consider the exponential signal e : Z → C defined as
(
0, k < 0
e(k) = rk σ(k), r 6= 0 ∈ C, σ(k) =
1, k ≥ 0
(29)
And also consider the signal defined as a right shift of “e” by one unit, that is h = [e]1 , or:
h(k) = rk−1 σ(k − 1),
(30)
which is well known to appear as the impulse response of (causal) linear time invariant systems (LTI)
modeled by a first order difference equation, since it satisfies the relationship h(k + 1) = rh(k) + δ(k). Now
lets consider the convolution between two signals of this kind, that is, let be h1 (k) = r1k−1 σ(k − 1) and
h2 (k) = r2k−1 σ(k − 1), with r1 6= 0 and r2 6= 0. Since both of them are time shift of exponentials as defined
in (29), we can write h1 = [e1 ]1 and h2 = [e2 ]1 , where e1 (k) = r1k σ(k) and e2 = r2k σ(k), and then:
h1 ∗ h2 = [e1 ]1 ∗ [e2 ]1 = (e1 ∗ [δ]1 ) ∗ (e2 ∗ [δ]1 ) = (e2 ∗ e2 ) ∗ ([δ]1 ∗ [δ]1 ) = (e1 ∗ e2 ) ∗ [δ]2 = [e1 ∗ e2 ]2
therefore, h1 ∗ h2 can be obtained by a right time shift of e1 ∗ e2 by two units. We develop e1 ∗ e2 instead,
noting that (e1 ∗ e2 )(k) = 0 for k < 0, since both e1 (k) and e2 (k) are null for k < 0 and
(e1 ∗ e2 )(k) =
k
X
r1j r2k−j ,
j=0
for k ≥ 0
(31)
Additionally we also have that (e1 ∗ e2 )(0) = r10 r20 = 1. Then, before solving this summation, we note that
the convolution h1 ∗ h2 is such that (h1 ∗ h2 )(k) = 0 for k ≤ 0, and, more importantly:
(h1 ∗ h2 )(1)
(h1 ∗ h2 )(2)
= 0
= 1
since h1 ∗ h2 is a right shift of e1 ∗ e2 by two units.
We now develop the summation in (31) by considering two cases:
8
(32)
(33)
1. r1 6= r2 (or e1 6= e2 ):
= r2k [1 + (r1 /r2 ) + (r1 /r2 )2 + · · · + (r1 /r2 )k ]
(e1 ∗ e2 )(k)
= r2k
=
(r1k+1 /r2k+1 ) − 1
(r1 /r2 ) − 1
r1k+1 − r2k+1
r1 − r2
and since h1 ∗ h2 = [e1 ∗ e2 ]2 , then (h1 ∗ h2 )(k) = (e1 ∗ e2 )(k − 2) or:
1
1
r1k−1 σ(k − 1) +
rk−1 σ(k − 1), or
r1 − r2
r2 − r1 2
1
1
A1 h1 (k) + A2 h2 (k), A1 =
and A2 =
r1 − r2
r2 − r1
(h1 ∗ h2 )(k) =
(h1 ∗ h2 )(k) =
(34)
(35)
Remark 4.0.1. Note that in case where r1 and r2 is a complex conjugate pair, represented by α±jω =
Re±jφ , we get from (34) that (h1 ∗ h2 )(k) = (Rk−1 /ω) sin[(k − 1)φ], for k ≥ 1.
From Equation (35) we see that, in case that r1 6= r2 , the convolution h1 ∗ h2 can be written as a linear
combination of signals h1 and h2 , and this fact, along with conditions (32) and (33), can be used to
find the scalars A1 and A2 , without the need of solving the convolution sum (31), as shown bellow:
(h1 ∗ h2 )(1)
(h1 ∗ h2 )(2)
And then:
1
r1
1
r2
= A1 h1 (1) + A2 h2 (1) = A1 + A2 = 0
= A1 h1 (2) + A2 h2 (2) = A1 r1 + A2 r2 = 1
1
0
A1
A1
=
=
=⇒
r1
A2
1
A2
1
r2
−1
0
.
1
(36)
Solving (36) we get A1 and A2 as shown in (35).
2. r1 = r2 = r (or e1 = e2 = e):
(e ∗ e)(k) = rk
k
X
j=0
rj ∗ r−j = (k + 1)rk ,
k≥0
and then, since h1 = h2 = h = [e]1 , (h ∗ h)(k) = (e ∗ e)(k − 2) is given by
(
0,
k≤1
(h ∗ h)(k) =
k−2
(k − 1)r
, k≥2
(37)
Now we consider a generalization of the results above for a convolution of n ≥ 2 exponential signals as
shown in (30). We start by finding a generalization for conditions (32) and (33) applied to the convolution
h1 ∗ h2 ∗ · · · ∗ hn , with hi (k) = rik−1 σ(k − 1) and n ≥ 2:
Theorem 4.1. Consider the convolution h1 ∗ h2 ∗ · · · ∗ hn , n ≥ 2 and each hi (k) = rik−1 σ(k − 1), ri 6= 0 ∈ C.
Then we have
(
0, k ≤ n − 1
(h1 ∗ h2 ∗ · · · ∗ hn )(k) =
1, k = n
Proof. Defining ei (k) = rik σ(k), we note that hi = [ei ]1 and then
(h1 ∗ h2 ∗ · · · ∗ hn ) = ([e1 ]1 ∗ [e2 ]1 ∗ · · · ∗ [en ]1 ) = [e1 ∗ e2 ∗ · · · ∗ en ]n
that is, h1 ∗ h2 ∗ · · · ∗ hn is a time shift right of e1 ∗ e2 ∗ · · · ∗ en by n units, and since (e1 ∗ e2 ∗ · · · ∗ en )(k) = 0
for k < 0 and (e1 ∗ e2 ∗ · · · ∗ en )(0) = 1 the result is proved.
In the following we will find a formula for computing the convolution h1 ∗ h2 ∗ · · · ∗ hn for n ≥ 2 and
hj (k) = rjk−1 σ(k − 1) with rj ∈ C. To begin with, we consider the case where hi 6= hj for i 6= j, which
implies ri 6= rj for i 6= j, and it is just a generalization of Equation (36):
9
Theorem 4.2. The convolution between n ≥ 2 exponentials signals hj (k) = rjk−1 σ(k − 1), j = 1, 2, . . . , n,
with rj 6= 0 ∈ C and hi 6= hj for i 6= j, is given by
h1 ∗ h2 ∗ · · · ∗ hn = A1 h1 + A2 h2 + · · · + An hn ,
(38)
where Aj ∈ C are scalars that can be computed by solving a linear system V A = B where V is the
n × n (nonsingular) Vandermonde matrix defined by Vij = rji−1 , A and B are the n-column vectors A =
(A1 , A2 , . . . , An ) and B = (0, 0, . . . , 1), that is:
1
1
···
1
0
A1
r1
r
·
·
·
r
A
2
n 2
2
0
2
2
r1
r
·
·
·
r
A
0
2
n 3 =
(39)
..
..
..
.. .. ..
.
.
.
.
.
.
r1n−1
r2n−1
···
rnn−1
An
1
So, vector A is the last (n-th) column of the inverse of V .
Proof. We use induction on n to prove (38), which is valid for n = 2, as shown in (35). Suppose (38) is valid
for n = k, and we prove it for n = k + 1 following the same reasoning we used to prove (18) in Theorem 3.2.
To prove (39) we apply the result of Theorem 4.1 to Equation (38). Taking the value at k = i on both sides
of (38) we have:
(h1 ∗ h2 ∗ · · · ∗ hn )(i) = A1 h1 (i) + A2 h2 (i) + · · · + An hn (i),
i = 1, 2, . . . , n.
Using Theorem 4.1 and the fact that hj (i) = rji−1 we get (39).
Now we consider the more general convolution h1 ∗ h2 ∗ · · · ∗ hn , n ≥ 2, where there is the possibility of
some hi to be repeated in the convolution, that is hi = hj for some i 6= j. To begin with, we consider some
facts about “n-power” convolution of discrete time exponentials, that is, the convolution of h, as defined in
(30), repeated between itself n times, that we represent it by h∗n (in Equation (37) we have a formula for
h∗2 ). The Lemma bellow shows a generalization of Theorem 4.1 applied to the “n-power” convolution of the
exponential signal:
Lemma 4.2.1. The power convolution of n ≥ 1 exponentials e(k) = rk σ(k), r 6= 0 ∈ C, denoted by e∗n , is
given by
k<0
0,
∗n
e (k) = (e ∗ e ∗ · · · ∗ e)(k) =
n−1+k k
{z
}
|
r , k≥0
n terms
n−1
or, in a more compact notation
n−1+k k
n−1+k
e (k) =
r σ(k) =
e(k)
n−1
n−1
∗n
Proof. By induction on n. It is trivially true for n = 1 and suppose it is valid for n = p then
p−1+k k
e∗p (k) =
r σ(k)
p−1
Obviously e∗(p+1) (k) = 0 for k < 0 since e(k) = 0 for k < 0; for k ≥ 0 we have:
e∗(p+1) (k) = (e∗p ∗ e)(k) =
k
X
j=0
e∗p (j)e(k − j)
=
k
X
p − 1 + j j (k−j)
r r
p−1
j=0
=
rk
=
10
k
X
p−1+j
p−1
j=0
p+k
rk
p
(40)
In the last step of the proof above we used the following well-known fact about sum of binomial coefficients
[8]:
k
X
p−1+j
p−1
p
p+1
p−1+k
p+k
=
+
+
+ ···+
=
p−1
p−1
p−1
p−1
p−1
p
j=0
Corollary 4.2.1. If we consider the n-power convolution of exponentials h(k) = rk−1 σ(k − 1), that is
h = [e]1 , we have:
k ≤n−1
0,
∗n
(41)
h (k) =
k − 1 k−n
r
, k≥n
n−1
equivalently
h∗n (k) =
k−1
n−1
since it is assumed that
Proof. Since h = [e]1 , then
1
rn−1
k−1
h(k),
n−1
n≥1
(42)
= 0 for k = 1, 2, . . . , n − 1.
h∗n
=
(h ∗ h ∗ · · · ∗ h)
{z
}
|
n terms
=
=
=
[e]1 ∗ [e]1 ∗ · · · ∗ [e]1
[e ∗ e ∗ · · · ∗ e]n
[en ]n
that is, h∗n is e∗n (right) shifted n units. Then we have by setting k := k − n in (40):
k − 1 k−n
h∗n (k) =
r
σ(k − n)
(43)
n−1
k−1
which is equivalent to (41). To obtain (42), we note that n−1
= 0, for k = 1, 2, . . . n − 1, and so (43) can
be rewriten as
1
k − 1 k−1
k−1
1
k − 1 k−n
∗n
r
σ(k − 1) = n−1
h(k)
h (k) =
r
σ(k − 1) = n−1
n−1
n−1
n−1
r
r
k−1
1
2
Now we analyse how it would be like the convolution h∗n
∗ h∗n
σ(k − 1) and
1
2 , where h1 (k) = r1
k−1
h2 (k) = r2 σ(k − 1), with r1 6= r2 :
Lemma 4.2.2. Let be h1 (t) = r1k−1 σ(k − 1) and h2 (k) = r2k−1 σ(k − 1), with r1 6= r2 , the convolution
1
2
between the n1 -power convolution of h1 and the n2 -power convolution of h2 , denoted by h∗n
∗ h∗n
1
2 , is given
by:
1
2
h∗n
∗ h∗n
1
2
=
(h1 ∗ h1 ∗ · · · ∗ h1 ) ∗ (h2 ∗ h2 ∗ · · · ∗ h2 )
{z
} |
{z
}
|
n1 terms
=
(A1 h1 +
A2 h∗2
1
+
n2 terms
1
· · · An1 h∗n
1 ) + (B1 h2
∗n2
+ B2 h∗2
2 + · · · Bn2 h1 )
Proof. We prove by induction on (n1 , n2 ). It is true for (n1 , n2 ) = (1, 1) as shown in (35). The inductive
step is the same one used in the proof of Lemma 3.2.3 for the analog time case.
In the following we prove the general result about the convolution of n exponential signals as show in
(30) which is a generalization of Theorem 4.2:
Theorem 4.3. The convolution between n ≥ 2 exponentials signals hi (k) = rik−1 σ(k − 1), i = 1, 2, . . . , n,
with ri 6= 0 ∈ C, and q distinct hs , each of them repeated ns times, so that n1 + n2 + · · · nq = n, is given by
1
h∗n
1
∗
2
h∗n
2
∗ ···∗
q
h∗n
q
=
n1
X
A1j h∗j
1
j=1
+
n2
X
j=1
11
A2j h∗j
2
+ ···+
nq
X
j=1
Aqj h∗j
q ,
(44)
where Asj ∈ C are scalars that can be computed by solving a linear system V A = B where V is the
n×n
(nonsingular) confluent (or generalized) Vandermonde matrix defined by V = V1 V2 · · · Vq , where
each block Vs is the n × ns matrix whose entries are defined by
i<j
0,
(Vs )ij =
i − 1 i−j
r , i≥j
j−1 s
A and B are the n-column vectors A = (A1 , A2 , . . . , Aq ), each As is a ns -column vector, and B =
(01 , 02 , . . . , Bq ), where 0s are ns -column zero vectors and Bq is the nq -column vector (0, 0, · · · , 1) that
is:
01
A1
A2 02
V1 V2 · · · Vq A3 = 03
(45)
.. ..
. .
Bq
Aq
So, vector A is the last (n-th) column of the inverse of V . Alternatively, using Equation (42), we can rewrite
(44) as
1
2
q
h∗n
∗ h∗n
= p 1 h1 + p 2 h2 + · · · + p q hq
(46)
∗ · · · ∗ h∗n
q
1
2
where each ps , s = 1, . . . , q, is a polynomial defined as
ps (k) =
ns
X
Asj
j=1
k−1
,
rsj−1 j − 1
1
k≥1
Proof. We use induction on q to prove (44), which is valid for q = 2, as shown in Lemma 4.2.2. The inductive
step follows in the same way we did in the proof of Theorem 3.3. To prove (45) we evaluate Equation (44)
at k = i to obtain:
1
2
q
(h∗n
∗ h∗n
∗ · · · ∗ h∗n
q )(i) =
1
2
n1
X
A1j h∗j
1 (i) +
j=1
nq
+
X
n2
X
j=1
Aqj h∗j
q (i),
A2j h∗j
2 (i) + · · ·
i = 1, 2, . . . , n.
j=1
Applying the result of Theorem 4.1 to the left side of this equation and using Lemma 4.2.1, Equation (41),
that is for j ≥ 1:
0,
i≤j−1
h∗j
(i)
=
s
i − 1 i−j
r , i≥j
j−1 s
we get (45).
4.1
Solution of difference equations with constant coefficients
Consider the “n order” difference equation
y(k + n) + an−1 y(k + n − 1) + · · · + a1 y(k + 1) + a0 y(k) = u(k)
(47)
which models an n order discrete time (causal) linear time invariant (LIT) system with input signal u and
output signal y. The impulse response (h) for this system is given by the convolution [3]:
h = h1 ∗ h2 ∗ · · · ∗ hn ,
hi (k) = rik−1 σ(k − 1),
ri 6= 0 ∈ C
and r1 , r2 , . . . , rn are the roots of the characteristic equation xn + an−1 xn−1 + · · · + a1 x + a0 = 0 associated
to (47), which all are assumed to be non-zero.2 Supposing that the characteristic equation has q distinct
2 Zero roots are discarded and order of the difference equation reduced by the amount of discarded roots. The final solution
is then the solution of the reduced order equation right-shifted as many units as the number of zero roots of the characteristic
equation (see examples in Section 5.2).
12
non-zero roots rs , each one repeated ns times, so that n1 + n2 + · · · + nq = n, then we can obtain h by using
Theorem 4.3, Equation (46), that is
h = p 1 h1 + p 2 h2 + · · · + p q hp ,
hs (k) =
rsk−1 ,
ns
X
k−1
,
Asj j−1
ps (k) =
j−1
rs
j=1
1
k≥1
(48)
where Asj , j = 1, . . . , ns and s = 1, . . . , q are calculated by solving the Vandermonde system (45).
The solution of (47) for k ≥ 0 can be written as:
y = yh + yp
(49)
where yh is the homogeneous (or zero input) solution and yp is a particular solution, i.e., it depends on the
input signal u. When solving (49) for k ≥ 0, the particular solution can be written as
(
k
X
0,
k<0
u(j)h(k − j) = [(uσ) ∗ h](k), where (uσ)(k) =
(50)
yp (k) =
u(k), k ≥ 0
j=0
The homogeneous solution has the same format of (48), that is
yh = p̄1 h̄1 + p̄2 h̄2 + · · · + p̄q h̄q ,
h̄s (k) =
rsk ,
and p̄s (k) =
nX
s −1
j=0
k
Āsj j
,
rs j
1
k≥0
(51)
Therefore to solve (47) we need to obtain yh , which is equivalent obtain the constants Āsj in (51), and then
obtain yp , by evaluating the convolution “(uσ) ∗ h” as shown in (50). Since the particular solution yp is,
in fact, a convolution between n + 1 signals, namely, “(uσ) ∗ h1 ∗ h2 ∗ · · · ∗ hn ” , we conclude, by using
Theorem 3.1, that:
yp (0) = yp (1) = yp (2) = · · · = yp (n − 1) = 0
and so, by (49), we have that:
y(0) = yh (0),
y(1) = yh (1),
y(2) = yh (2),
···
y(n − 1) = yh (n − 1)
which can be used in (51) to find the constants Āsj , j = 1, . . . ns and s = 1, . . . q, since the “initial values”
y(0), y(1), y(2), . . . , y(n − 1) are generally known when solving (47) for k ≥ 0. In fact, constants Āsj are
computed by solving a Vandermonde system like the one showed in Theorem 4.3, that is V Ā = B̄, where
the Vandermonde matrix V is the same one used to compute the impulse response h, Ā is the n × 1 vector
composed by the Āsj ’s and the vector B̄, differently from the one used to compute h, it is defined as
B̄ = (y(0), y(1), y(2), · · · , y(n − 1)).
Finally, in order to obtain the complete solution y for (47) as shown in (49), we need to compute
the particular solution “yp = (uσ) ∗ h”, that is the convolution between the input signal uσ and the inpulse
response h, and this can be done by the result of Theorem 4.3 if we can write the signal “uσ” as a convolution
(or a sum) of exponential signals of type “rk σ(k)”, for some r 6= 0 ∈ C. In this situation, as shown in examples
bellow, we increase the order of the Vandermonde matrix, as defined in Theorem 4.3, depending on how
many “exponential modes” exists in the input signal “uσ”. In Section 5.2 we apply these results to the
resolution of some specific difference equations.
5
Examples
Bellow we apply the results discussed in previous sections to the solution to some specific differential/difference
equations.
5.1
Differential Equations
Example 5.1.1. Let be the second order initial value problem (IVP):
ÿ + 3ẏ + 2y = 1,
with y(0) = −1 and ẏ(0) = 2.
(52)
To find the solution y, we consider the characteristic equation is x2 + 3x + 2 = 0 whose roots as r1 = −1
and r2 = −2.
13
(a) Impulse response: h(t) = A1 e−t + A2 e−2t , where A1 and A2 are computed as
1
0
A1
1
1
A1
=
=
=⇒
−1
A2
1
−1 −2 A2
which implies h(t) = e−t − e−2t .
(b) Homogeneous solution: yh (t) = B1 e−t + B2 e−2t , where B1 and B2 are computed as:
1
1
B1
y(0)
−1
B1
0
=
=
=⇒
=
−1 −2 B2
ẏ(0)
2
−1
B2
which implies yh (t) = −e−2t .
(c) Particular solution: yp = (uσ) ∗ h, and (uσ)(t) = 1.σ(t) = e0t σ(t), then
yp = (uσ) ∗ h = h ∗ (uσ) = h1 ∗ h2 ∗ h3
where h1 (t) = e−t σ(t), h2 (t) = e−2t σ(t) and h3 (t) = e0t σ(t), or:
yp (t) = C1 e−t + C2 e−2t + C3 e0t
where C1 , C2 and C3 are compute as
1
1
−1 −2
1
4
the solution of the “augmented” Vandermonde system:
1 C1
0
C1
−1
0 C2 = 0 =⇒ C2 = 0.5
0 C3
1
C3
0.5
which implies yp (t) = −e−t + 0.5e−2t + 0.5.
Finally, the solution for the IVP (52) is y = yh + yp or
y(t) = −e−t − 0.5e−2t + 0.5
Example 5.1.2. Let be the following third order IVP
...
y + 7ÿ + 20ẏ + 24y = sin 2t, y(0) = 0, ẏ(0) = 1, ÿ(0) = −3
(53)
The characteristic equation is x3 + 7x + 20x + 24 = 0 whose roots are r1 = −3, r2 = −2 + 2i and r3 = −2 − 2i.
(a) Impulse response: h(t) = A1 e−3t + A2 e(−2+2i)t + A3 e(−2−2i)t , and
0
1
1
1
0.2
A1
A1
−3 −2 + 2i −2 − 2i A2 = 0 =⇒ A2 = −0.1 − 0.05i
1
9
−8i
8i
A3
−0.1 + 0.05i
A3
and then
h(t) = 0.2e−3t + (−0.1 − 0.05i)e(−2+2i)t + (−0.1 + 0.05i)e(−2−2i)t
which (optionally) can be simplified to
h(t) = 0.2e−3t − 0.2e−2t cos 2t + 0.1e−2t sin 2t.
(b) Homogeneous solution: yh (t) = B1 e−3t + B2 e(−2+2i)t + B3 e(−2−2i)t , and
1
1
1
B1
0
B1
0.2
−3 −2 + 2i −2 − 2i B2 = 1 =⇒ B2 = −0.1 − 0.3i
9
−8i
8i
B3
−3
B3
−0.1 + 0.3i
and then
yh (t) = 0.2e−3t + (−0.1 − 0.3i)e(−2+2i)t + (−0.1 + 0.3i)e(−2−2i)t
or
yh (t) = 0.2e−3t − 0.2e−2t cos 2t + 0.6e−2t sin 2t.
14
(c) Particular solution: yp = (uσ) ∗ h, since u(t) = sin 2t we have two possibilites:
uσ = 2(h4 ∗ h5 ) or uσ =
using uσ = 2(h4 ∗ h5 ) we have
h4 + h5
,
2i
where h4 (t) = e2it σ(t) and h5 (t) = e−2it σ(t)
yp = 2(h1 ∗ h2 ∗ h3 ∗ h4 ∗ h5 ),
where
h1 (t) = e−3t σ(t), h2 (t) = e(−2+2i)t σ(t), h3 (t) = e(−2−2i)t σ(t), h4 (t) = e2it σ(t), h5 (t) = e−2it σ(t).
So, to compute h1 ∗ h2 ∗ h3 ∗ h4 ∗ h5 , we have the following (augmented) Vandemonde system:
1
1
1
1
1
C1
0
C1
0.0307692
−3 −2 + 2i −2 − 2i 2i −2i C2 0
C2
−0.025i
9
C3 = 0 =⇒ (2) × C3 =
−8i
8i
−4
−4
0.025i
−27 16 + 16i 16 − 16i −8i 8i C4 0
C4 −0.0153846 + 0.0019231i
C5
81
−64
−64
16
16
1
C5
−0.0153846 − 0.0019231i
Then the particular solution is
yp (t) = 0.0307692e−3t + 0.05e−2t sin 2t − 0.0307692 cos 2t − 0.0038462 sin 2t
Finally, the solution y = yh + yp for the IVP (53) is given by:
y(t) = 0.2307692e−3t − 0.2e−2t cos 2t + 0.65e−2t sin 2t − 0.0307692 cos 2t − 0.0038462 sin 2t
Example 5.1.3. Let be the following IVP
ÿ + 4y = t cos 2t,
y(0) = −2,
ẏ(0) = 4
whose characteristic equation is x2 + 4 = 0 which implies r1 = e2it and r2 = e−2it .
(a) Impulse response: h(t) = A1 e2it + A2 e−2it , and
−0.25i
0
1
1
A1
A1
=
=
=⇒
0.25i
1
2i −2i A2
A2
Then
h(t) = −025ie2it + 0.25ie−2it = 0.5 sin 2t.
(b) Homogeneous solution: yh (t) = B1 e2it + B2 e−2it , and
1
1
B1
−2
B1
−1 − i
=
=⇒
=
2i −2i B2
4
−1 + i
B2
Then
yh (t) = (−1 − i)e2it + (−1 + i)e−2it = −2 cos 2t + 2 sin 2t
(c) Particular solution: yp = (uσ) ∗ h, and u(t) = t cos 2t = t(e2it + e−2it )/2, or:
u = 0.5(u1 + u2 ),
u1 (t) = te2it ,
u2 (t) = te−2it
and so, yp = 0.5(u1 σ) ∗ h + 0.5(u2 σ) ∗ h. Since u1 (t) = te2it and u2 (t) = te−2it , we have
u1 σ
u2 σ
=
=
h3 ∗ h3 ,
h4 ∗ h4 ,
h3 (t) = e2it σ(t)
h4 (t) = e−2it σ(t)
Therefore
(u1 σ) ∗ h
(u2 σ) ∗ h
=
=
h1 ∗ h2 ∗ h3 ∗ h3 ,
h1 ∗ h2 ∗ h4 ∗ h4 ,
h1 (t) = h3 (t) = e2it σ(t), h2 (t) = e−2it σ(t)
h1 (t) = e2it σ(t), h2 (t) = h4 (t) = e−2it σ(t)
15
(54)
and then
= C0 e−2it + p(t)e2it ,
= D0 e2it + q(t)e−2it ,
((u1 σ) ∗ h)(t)
((u2 σ) ∗ h)(t)
p(t) = C1 + C2 t + C3 t2 /2
q(t) = D1 + D2 t + D3 t2 /2
where
1
1
0
0
C0
−2i 2i
C1
1
0
=
−4 −4
4i
1 C2
8i −8i −12 6i C3
1
1
0
0
D0
2i −2i
D1
1
0
=
−4 −4 −4i
1 D2
−8i 8i −12 −6i D3
0
C0
−0.015625i
0
=⇒ C1 = 0.015625i
0
C2 0.0625
1
C3
−0.25i
0
D0
0.015625i
0
=⇒ D1 = −0.015625i
0
D2 0.0625
1
D3
0.25i
Since yp = 0.5(u1 σ) ∗ h + 0.5(u2 σ) ∗ h we have, after regrouping the terms
yp (t) = −0.03125 sin 2t + 0.0625t cos 2t + 0.125t2 sin 2t
and the solution y = yh + yp will be given by
y(t) = 1.96875 sin 2t − 2 cos 2t + 0.0625t cos 2t + 0.125t2 sin 2t
5.2
Difference Equations
Example 5.2.1. Let be the third order initial value problem (IVP):
y(k + 3) − 1.5y(k + 2) + 0.75y(k + 1) − 0.125y(k) = 1,
y(0) = −1, y(1) = 2, y(2) = 0.8
(55)
To find the solution y, we consider its characteristic equation z 3 − 1.5z 2 + 0.75z − 0.125 = 0 whose roots as
r1 = r2 = r3 = 0.5.
(a) Impulse response (k ≥ 1): h(k) = p(k)(0.5)k−1 where p(k) = A1 + (k − 1)A2 /0.5 + 0.5(k − 1)(k −
2)A3 /(0.5)2 with A1 , A2 and A3 being computed as
1
0 0 A1
0
A1
0
0.5 1 0 A2 = 0 =⇒ A2 = 0
0.25 1 1 A3
1
A3
1
and then
h(k) = (k − 1)(k − 2)(0.5)k−2 ,
k ≥ 1.
(b) Homogeneous solution (k ≥ 0): yh (k) = p(k)(0.5)k where p(k) = B0 + kB1 /0.5 + 0.5k(k − 1)B2 /(0.5)2
with B0 , B1 and B2 being computed as:
1
0 0 B0
−1
B0
−1
0.5 1 0 B1 = 2 =⇒ B1 = 2.5
0.25 1 1 B2
0.8
B2
−1.45
and then
yh (k) = −(0.5)k + 2.5k(0.5)k−1 − 1.45k(k − 1)(0.5)k−1 ,
k ≥ 0.
(c) Particular solution (k ≥ 0): yp = (uσ) ∗ h, and (uσ) = (1σ) = σ then
yp = (uσ) ∗ h = h ∗ (uσ) = h1 ∗ h2 ∗ h3 ∗ σ
where h1 (k) = h2 (k) = h3 (k) = (0.5)k−1 σ(k − 1). Since σ(0) = 1 we will first compute ȳp = h1 ∗
h2 ∗ h3 ∗ [σ]1 , where [σ]1 (k) = σ(k − 1), in order we have a convolution in the format as required in
Theorem 4.3; at the end we take yp (k) = ȳp (k + 1). Then:
ȳp (k) = q(k)h1 (k) + C4 σ(k − 1),
q(k) = C1 + (k − 1)C2 /(0.5) + 0.5(k − 1)(k − 2)C3 /(0.5)2 ,
16
k≥1
where C1 , C2 , C3 and C4 are compute as
1
0
0
0.5
1
0
2
0.5
1
1
0.53 0.75 1.5
Then
the solution of the “augmented” Vandermonde system:
C1
−8
0
1 C1
1
C2 = 0 =⇒ C2 = −4
C3 −2
1 C3 0
C4
8
1
1 C4
ȳp (k) = −8(0.5)k−1 − 4(k − 1)(0.5)k−2 − (k − 1)(k − 2)(0.5)k−3 + 8,
k≥1
and since yp (k) = ȳp (k + 1) we have
yp (k) = −8(0.5)k − 4k(0.5)k−1 − k(k − 1)(0.5)k−2 + 8,
k≥0
Finally, the solution for the IVP (55) is y = yh + yp , or
y(k) = −9(0.5)k − 1.5k(0.5)k−1 − 3.45k(k − 1)(0.5)k−1 + 8,
k≥0
Example 5.2.2. Let be the third order IVP:
y(k + 3) − 1.4y(k + 2) + 0.9y(k + 1) − 0.2y(k) = k,
y(0) = 2, y(1) = −3, y(2) = 0.5
(56)
whose characteristic polynomial is −0.2 + 0.9z 2 − 1.4z 2 + z 3 = (z − 0.4)[(z − 0.5)2 + 0.5].
√
√
(a) Impulse response (k ≥ 1): h(k) = A1 (0.4)k−1 + A2 (1/ 2)k−1 ej(k−1)π/4 + A3 (1/ 2)k−1 e−j(k−1)π/4
where A1 , A2 and A3 are computed as
1
1
1
A1
0
A1
3.8461538
0.4 0.5 + 0.5i 0.5 − 0.5i A2 = 0 =⇒ A2 = −1.9230769 − 0.3846154i
0.16
0.5i
−0.5i
1
A3
−1.9230769 + 0.3846154i
A3
and then
h(k) =
√
3.8461538(0.4)k−1 + (−1.9230769 − 0.3846154i)(1/ 2)k−1 ej(k−1)π/4 +
√
(−1.9230769 + 0.3846154i)(1/ 2)k−1 e−j(k−1)π/4
or
h(k) =
√
3.8461538(0.4)k−1 − 3.8461538(1/ 2)k−1 cos[(k − 1)π/4] +
√
0.7692308(1/ 2)k−1 sin[(k − 1)π/4], k ≥ 1
√
√
(b) Homogeneous solution (k ≥ 0): yh (k) = B0 (0.4)k + B1 (1/ 2)k ejkπ/4 + B2 (1/ 2)k e−jkπ/4 with B0 , B1
and B2 being computed as:
1
1
1
B0
2
B0
17.307692
0.4 0.5 + 0.5i 0.5 − 0.5i B1 = −3 =⇒ B1 = −7.6538462 + 2.2692308i
0.16
0.5i
−0.5i
B2
0.5
B2
−7.6538462 − 2.2692308i
and then
√
√
yh (k) = 17.307692(0.4)k − 15.307692(1/ 2)k cos(kπ/4) − 4.5384615(1/ 2)k sin(kπ/4)
(c) Particular solution (k ≥ 0): yp = (uσ) ∗ h where u(k) = k, and then we need to write kσ(k) as a sum
of convolution of signals. From Remark 4.2.1 we have that (σ ∗ σ)(k) = k + 1, then we easily get
kσ(k) = (σ ∗ σ)(k) − σ(k),
or (uσ) = (σ ∗ σ) − σ
then
yp = (uσ) ∗ h = h ∗ (uσ) = h1 ∗ h2 ∗ h3 ∗ σ ∗ σ − h1 ∗ h2 ∗ h3 ∗ σ
|
{z
} |
{z
}
yp1
yp2
where h1 (k) = (0.4)k−1 σ(k − 1), h2 (k) = (0.5 + 0.5i)k−1 σ(k − 1) and h3 (k) = (0.5 − 0.5i)k−1 σ(k − 1)
and yp1 and yp2 can be calculated as:
17
(c.1) yp1 (k) = ȳp1 (k + 2), where ȳp1 = h1 ∗ h2 ∗ h3 ∗ [σ]1 ∗ [σ]1 , or
√
√
ȳp1 (k) = C1 (0.4)k−1 + C2 (1/ 2)k−1 ej(k−1)π/4 + C3 (1/ 2)k−1 e−j(k−1)π/4 + C4 + C5 (k − 1),
with C1 , C2 , C3 , C4 and C5 computed by
1
1
1
0.4
0.5
+
0.5i
0.5
−
0.5i
0.16
0.5i
−0.5i
0.064 −0.25 + 0.25i −0.25 − 0.25i
0.0256
−0.25
−0.25
and so
ȳp1 (k) =
solving
1 0 C1
0
C1
10.683761
C2 0.7692308 − 3.8461538i
1 1
C2 0
1 2 C3 = 0 =⇒
C3 = 0.7692308 + 3.8461538i
1 3 C4
0
C4
−12.222222
1 4 C5
1
C5
3.3333333
√
10.683761(0.4)k−1 + 1.5384615(1/ 2)k−1 cos[(k − 1)π/4] +
√
7.6923077(1/ 2)k−1 sin[(k − 1)π/4] − 12.222222 + 3.3333333(k − 1)
then yp1 (k) = ȳp1 (k + 2) is given by
yp1 (k) =
√
10.683761(0.4)k+1 + 1.5384615(1/ 2)k+1 cos[(k + 1)π/4] +
√
7.6923077(1/ 2)k+1 sin[(k + 1)π/4] − 12.222222 + 3.3333333(k + 1)
(c.2) yp2 (k) = ȳp2 (k + 1), where ȳp2 = h1 ∗ h2 ∗ h3 ∗ [σ]1 , or
√
√
ȳp2 (k) = D1 (0.4)k−1 + D2 (1/ 2)k−1 ej(k−1)π/4 + D3 (1/ 2)k−1 e−j(k−1)π/4 + D4 ,
with D1 , D2 , D3 and D4 computed by solving
D1
−6.4102564
0
1
1
1
1 D1
0.4
0.5 + 0.5i
0.5 − 0.5i
1
D2 = 0 =⇒ D2 = 1.5384615 + 2.3076923i
0.16
D3
1.5384615 − 2.3076923i
0
0.5i
−0.5i
1 D3
D4
3.3333333
1
0.064 −0.25 + 0.25i −0.25 − 0.25i 1 D4
which implies
ȳp2 (k)
√
= −6.4102564(0.4)k−1 + 3.0769231(1/ 2)k−1 cos[(k − 1)π/4] −
√
4.6153846(1/ 2)k−1 sin[(k − 1)π/4] + 3.3333333
and then
√
√
yp2 (k) = −6.4102564(0.4)k + 3.0769231(1/ 2)k cos[kπ/4] − 4.6153846(1/ 2)k sin[kπ/4] + 3.3333333
Therefore yp = yp1 + yp2 is given by
yp (k) =
√
10.683761(0.4)k+1 + 1.5384615(1/ 2)k+1 cos[(k + 1)π/4] +
√
7.6923077(1/ 2)k+1 sin[(k + 1)π/4] − 12.222222 + 3.3333333(k + 1) − 6.4102564(0.4)k +
√
√
3.0769231(1/ 2)k cos[kπ/4] − 4.6153846(1/ 2)k sin[kπ/4] + 3.3333333
Finally, the solution for the IVP (55) is y = yh + yp , or
√
√
y(k) = 17.307692(0.4)k − 15.307692(1/ 2)k cos(kπ/4) − 4.5384615(1/ 2)k sin(kπ/4) +
√
10.683761(0.4)k+1 + 1.5384615(1/ 2)k+1 cos[(k + 1)π/4] +
√
7.6923077(1/ 2)k+1 sin[(k + 1)π/4] − 12.2222222 + 3.3333333(k + 1) −
√
√
6.4102564(0.4)k + 3.0769231(1/ 2)k cos[kπ/4] − 4.6153846(1/ 2)k sin[kπ/4] +
3.3333333
which, in turn, can be simplified to
√
√
y(k) = 15.17094(0.4)k − 7.6153843(1/ 2)k cos(kπ/4) − 6.076923(1/ 2)k sin(kπ/4) + 3.3333333k − 5.5555556
18
Example 5.2.3. Let be the third order IVP:
y(k + 3) + y(k + 1) = sin(kπ/2),
y(0) = 1, y(1) = y(2) = 0
(57)
whose characteristic equation is z 3 + z = z(z 2 + 1) = 0, and r1 = j, r2 = −j and r3 = 0. We discard r3 = 0
and solve a second order equation and at the end shift the solution by one unity to the right.
(a) Impulse response (k ≥ 1): h(k) = A1 (j)k−1 + A2 (−j)k−1 where A1 and A2 are computed as
1 1
A1
0
A1
−j/2
=
=⇒
=
j −j A2
1
j/2
A2
which implies h(k) = −j/2(j)k−1 + j/2(−j)k−1 or h(k) = − cos(kπ/2), k ≥ 1
(b) Homogeneous solution (k ≥ 0): yh (k) = B0 (j)k + B1 (−j)k with B0 and B1 being computed as:
1 1
0
0
B0
B0
=
=
=⇒
j −j B1
0
0
B1
and then yh (k) = 0.
(c) Particular solution (k ≥ 0): yp = (uσ) ∗ h where u(k) = sin(kπ/2) = (1/2j)(j)k − (1/2j)(−j)k . Then
yp = (1/2j) (u1 ∗ h1 ∗ h2 ) −(1/2j) (u2 ∗ h1 ∗ h2 )
|
{z
}
{z
}
|
yp1
yp2
where u1 (k) = (j)k σ(k), u2 (k) = (−j)k σ(k), h1 (k) = (j)k−1 σ(k − 1), h2 (k) = (−j)k−1 σ(k − 1) and
yp1 (k) = ȳp1 (k + 1) and yp2 (k) = ȳp2 (k + 1):
(c.1) ȳp1 (k) = p(k)h1 + C3 h2 (k), where p(k) = C1 + (k − 1)C2 /j, and
1 0
1
0
C1
1/4
C1
j
1
−j C2 = 0 =⇒ C2 = −j/2
j 2 2j (−j)2
C3
1
C3
−1/4
Then ȳp1 (k) = 1/4(j)k−1 − 1/2(k − 1)(j)k−1 − 1/4(−j)k−1 and so
yp1 (k) = ȳp1 (k + 1) = 1/4(j)k − 1/2k(j)k − 1/4(−j)k ,
k≥0
(c.2) ȳp2 (k) = D1 h1 + q(k)h2 (k), where q(k) = D2 + (k − 1)D3 /(−j), and
1
1
0
D1
0
D1
−1/4
j
−j
1 D2 = 0 =⇒ D2 = 1/4
2
2
j
(−j) −2j
D3
1
D3
j/2
Then ȳp2 (k) = −1/4(j)k−1 + 1/4(−j)k−1 − 1/2(k − 1)(−j)k−1 and so
yp2 (k) = ȳp2 (k + 1) = −1/4(j)k + 1/4(−j)k − 1/2k(−j)k ,
k≥0
Now, since yp = (1/2j)yp1 − (1/2j)yp2 , we have
yp (k) = (1/2j)[1/4(j)k − 1/2k(j)k − 1/4(−j)k ] − (1/2j)[−1/4(j)k + 1/4(−j)k − 1/2k(−j)k ]
which can (optionally) be simplified to yp (k) = (1/2) sin(kπ/2) − (k/2) sin(kπ/2). Finally, to contemplate the zero root of the characteristic equation and the initial condition y(0) = 1, we have:
y(k) = 2δ(k) + (1/2) sin[(k − 1)π/2] − [(k − 1)/2] sin[(k − 1)π/2],
or
y(k) = 2δ(k) + (k/2) cos(kπ/2) − cos(kπ/2),
19
k≥0
k≥0
6
Conclusions
We showed in this paper a technique for computing the convolution of exponential signals, in analog and
discrete time context, that avoids the resolution of integrals and summations. The method is essentially
algebraic and requires the resolution of Vandermonde systems, which is a well-known and extensively discussed problem in literature (see e.g. [10, 11] and references therein). While the question of computing
convolution of exponentials have been discussed previously in literature ([6, 7]), the proposed approach is
apparently different from the previous ones, and additionally is quite simple and suitable to be implemented
computationally. Finally, we use the proposed approach to solve a n order differential/difference equation
with constant coefficients.
References
[1] G. Grubb. Distributions and Operators. Graduate Texts in Mathematics (Book 252). Springer Science+Business Media, LLC, NY, 2009.
[2] Wikipedia: The Free Encyclopedia. Wikimedia Foundation, Inc. 7 June 2016. Web. 21 June, 2016.
Available at http://en.wikipedia.org/wiki/Convolution.
[3] F. Mota. Signals, Systems and Transforms. Lecture Notes, 2015.
[4] J. D’Azzo and C. Houpis. Linear Control System Analysis and Design. Second Edition. MacGraw-Hill
Kogakusha, Ltd., 1981.
[5] Scilab Enterprises. Scilab: Free and Open Source Software for Numerical Computation. Orsay, France,
2012. Available at http://www.scilab.org.
[6] M. Akkouchi. On The Convolution of Exponential Distributions. Journal of The Chungcheong Mathematical Society, Vol. 21, No. 4, December 2008.
[7] N.-Y. Ma, F. Liu. A Novel Analytical Scheme to Compute the n-Fold Convolution of Exponential-Sum
Distribution Functions. Applied Mathematics and Computation, 158 (2004) 225–235.
[8] K. L. Chung. Elementary Probability Theory with Stochastic Processes. Third Edition. Springer-Verlag
NY Inc., 1979.
[9] Wikipedia: The Free Encyclopedia. Wikimedia Foundation, Inc. 4 June 2016. Web. 21 June, 2016.
Available at http://en.wikipedia.org/wiki/Convolution power.
[10] G. H. Golub and C. F. Van Loan. Matrix Computations. Second Edition. The Johns Hopkins Univ.
Press, 1989.
[11] S.-H. Hou and W.-K. Pang. Inversion of Confluent Vandermonde Matrices. Computers and Mathematics
with Applications 43 (2002) 1539-1547.
20
| 3cs.SY
|
arXiv:1711.06467v1 [cs.PL] 17 Nov 2017
W YS? : A Verified Language Extension for Secure Multi-party Computations
Aseem Rastogi
Nikhil Swamy
Michael Hicks
University of Maryland, Microsoft Research
Microsoft Research
University of Maryland
Abstract—Secure multi-party computation (MPC) enables a
set of mutually distrusting parties to cooperatively compute,
using a cryptographic protocol, a function over their private data. This paper presents W YS? , a new domain-specific
language (DSL) implementation for writing MPCs. W YS?
is a Verified, Domain-Specific Integrated Language Extension
(VDSILE), a new kind of embedded DSL hosted in F? , a fullfeatured, verification-oriented programming language. W YS?
source programs are essentially F? programs written against
an MPC library, meaning that programmers can use F? ’s
logic to verify the correctness and security properties of their
programs. To reason about the distributed semantics of these
programs, we formalize a deep embedding of W YS? , also in
F? . We mechanize the necessary metatheory to prove that the
properties verified for the W YS? source programs carry over
to the distributed, multi-party semantics. Finally, we use F? ’s
extraction mechanism to extract an interpreter that we have
proved matches this semantics, yielding a verified implementation. W YS? is the first DSL to enable formal verification of
source MPC programs, and also the first MPC DSL to provide
a verified implementation. With W YS? we have implemented
several MPC protocols, including private set intersection, joint
median, and an MPC-based card dealing application, and have
verified their security and correctness.
1. Introduction
Secure multi-party computation (MPC) is a framework
that enables two or more parties to compute a function f
over their private inputs x1 , ..., xn so that no party sees
any of the others’ inputs, but rather only sees the output
f (x1 , ..., xn ). Utilizing a trusted third party to compute
f would achieve this goal, but in fact we can achieve it
using one of a variety of cryptographic protocols carried
out only among the participants [1]–[4]. One example use
of MPC is private set intersection (PSI): the xi could be
individuals’ personal interests, and the function f computes
their intersection, revealing which interests the group has in
common, but not any interests that they don’t. Among other
applications, MPC has been used for auctions [5], detecting
tax fraud [6], managing supply chains [7], and performing
privacy preserving statistical analysis [8].
Typically, cryptographic protocols expect f to be specified as a boolean or arithmetic circuit. Programming directly
with circuits and cryptography via a host-language API
is painful, so starting with the Fairplay project [9] many
researchers have designed higher-level domain-specific languages (DSLs) in which to program MPCs [10]–[21]. These
DSLs compile source code to circuits which are then given
to the underlying protocol. While doing this undoubtedly
makes it easier to program MPCs, these languages still have
several drawbacks regarding both security and usability.
First, MPC participants should be able to reason that
f is sufficiently privacy preserving, i.e., that its output will
not reveal too much information about the inputs [22]. The
goal of an MPC DSL is secure computations, and such
reasoning gives assurance that this goal is being achieved.1
Yet, only a few DSLs (Sharemind DSL [21], Wysteria [19],
and SCVM [20]) have a mathematical semantics that can
serve as a basis for formal reasoning.
Second, those languages that do have a semantics lack
support for mechanized reasoning about MPC programs:
only by-hand proofs are possible, which provide less assurance than machine-checked proofs. A middle ground might
be a mechanization of the semantics and its metatheory [23]
(e.g., in a system like Coq, Agda, or Isabelle), which adds
greater assurance that it is correct [24], but so far no MPC
DSL has even had a mechanized semantics.
Third, there is a gap between the semantics, if there is
one, and the actual implementation. Within that gap is the
potential for security holes. Formal verification of the MPC
DSL’s toolchain can significantly reduce the occurrence of
security-threatening bugs [25]–[29], but no existing MPC
DSL implementation has been (even partially) formally
verified—this should not be surprising since, as mentioned
earlier, these DSLs have lacked a formal semantics on which
to base a verification effort.
Finally, there is the practical problem that existing DSLs
do not scale up, because they lack the infrastructure of a
full-featured language. Adding more features (to both the
language and the formalization) would help, but doing so
quickly becomes unwieldy and frustrating, especially when
the added features are “standard” and do not have much to
do with MPC. We want access to libraries and frameworks
for I/O, GUIs, etc. in a way that easily adds to functionality
without adding complexity or compromising security.
This paper presents W YS? , a new MPC DSL that addresses these problems. Unlike most previous MPC DSLs,
1. Our attacker model is the “honest-but-curious” model where the
attackers are the participants in the protocol themselves. That is, we assume
that the participants in the protocol play their roles faithfully, but they are
motivated to deduce as much as they can about the other participants’
secrets by observing the protocol.
W YS? is not a standalone language, but is rather what
we call a Verified, Domain-Specific Integrated Language
Extension (VDSILE), a new kind of embedded DSL that can
be hosted by F? [30], a full-featured, verification-oriented
programming language.
W YS? has the following distinguishing elements:
• Integrated language extension (Section 3). Programmers can write W YS? MPC source programs in what is essentially an extended dialect of F? . W YS? inherits the basic
programming model from Wysteria [19] (see Section 2 for
comparison with Wysteria). Like so-called shallow domainspecific language embeddings, W YS? embeds the Wysteriaspecific combinators in normal F? syntax, with prescriptions
on their correct use expressed with F? ’s dependent type-andeffect system. This arrangement has two benefits. Firstly,
W YS? programs can use, with no extra effort, standard
constructs such as datatypes and libraries directly from F? .
Secondly, programmers can formally verify properties, such
as those related to correctness and security, about their MPC
program using F? ’s semi-automated verification facilities.
W YS? is the first DSL to enable formal verification of source
MPC programs.
• Deep embedding of domain-specific semantics (Section 4). A shallow embedding implements the semantics of
a DSL using the abstraction facilities of the host language,
e.g., as a kind of library. However, for W YS? this is impossible because its core semantics cannot be directly encoded in
F? ’s semantics. A W YS? program is like a SIMD program
whose execution alternates between in-parallel computations
at each party, privately, and joint computations involving all
parties, securely. While such a program can be conceptually
viewed as having a single thread of control, it is not directly
implemented that way. As such, we take the approach of a
typical deep embedding: We define an interpreter in F? that
operates over W YS? abstract syntax trees (ASTs), defined
as an F? data type; these trees are produced by running
the F? compiler (in a special mode) on the extended source
program. Importantly, the W YS? AST (and hence the interpreter) does not “bake in” standard F? constructs like
numbers and lists; rather, inherited language features appear
abstractly in the AST, and their semantics is handled by a
novel foreign function interface (FFI) that is easy to use,
both when programming and when verifying.
• Verified implementation, modulo a trusted crypto library (Sections 4 and 5). Within F? , we mechanize two
operational semantics for deep-embedded W YS? ASTs: a
conceptual single-threaded semantics that formalizes the
SIMD view and a distributed semantics that formalizes the
actual multi-party runs of the programs. We prove that
(a) the conceptual single-threaded semantics is sound with
respect to the actual distributed semantics (including the
semantics of the FFI calls), and (b) the distributed semantics
is correctly implemented by our interpreter. These proofs
are checked by F? ’s proof checking algorithm. As a result,
we have verified that the properties formally proven about
the W YS? source programs carry over when these programs
are run by multiple parties in a distributed manner. There
is an important caveat though: Our interpreter makes use
of a circuit library to compile ASTs to circuits and then
execute them using the Goldreich, Micali and Wigderson
(GMW) multi-party computation protocol [3], but at present
this library is not formally verified. Formal verification of
GMW (which is, at present, an open problem) would add
even greater assurance.
Using W YS? we have implemented several programs,
including PSI, joint median, and an MPC-based card dealing
application (Section 6). For PSI and joint median we implement two versions: a straightforward one and a version that
composes several small MPCs, which improves performance
but increases the number of visible outputs. We formally
prove, for both PSI and median, that the optimized and
unoptimized versions are equivalent, both functionally and
with respect to the privacy of parties’ inputs. In particular,
W YS? enhances the Wysteria target semantics to “instrument” it with a trace of observations, and we prove that
the visible events in the optimized versions’ traces provide
neither participant with any additional information about
the other’s secrets. Performance experiments confirm that
the optimized versions do indeed perform better. Our card
dealing application relies on W YS? ’s support for secret
shares [31]. We formally prove that our card dealing algorithm always deals a fresh card.
In summary, this paper’s main contribution is W YS? ,
a new Verified, Domain-Specific Integrated Language Extension (VDSILE) for supporting secure multiparty computation. W YS? is unique in its use of formal methods
to ensure that both its underlying implementation and the
programs written in it behave according to important correctness and security properties. The W YS? implementation,
example programs, and proofs are publicly available online
on github, https://github.com/FStarLang/FStar/tree/stratified last/
examples/wysteria.
2. Related work
W YS? ’s computational model is based on programming
abstractions of a previous domain-specific language, Wysteria [19]. But W YS? offers several new contributions. First,
while Wysteria is a standalone language, W YS? is implemented as an extension to the language F? . As such, W YS?
programs can freely use datatypes and libraries from the host
language via a novel verification-friendly FFI mechanism
(outlined in Section 5.2). This architecture allows programs
to scale more easily (rather than requiring constant extension
and reimplementation of the standalone language, and its
verification results). Second, relying on F? ’s verification
features, the W YS? implementation has also been verified,
except for its cryptographic libraries. Third, since W YS?
is also an embedded DSL in F? , MPC programs can be
formally verified to satisfy correctness and security properties. In support of security verification, W YS? ’s semantics
includes a notion of observable traces, which we use to state
and prove information flow properties. Although it is our
point of departure, Wysteria enjoys none of these benefits.
MPC DSLs and DSL extensions. In addition to Wysteria,
several other MPC DSLs have been proposed in the literature [10]–[21]. Most of these languages have standalone
implementations, and the drawbacks that come with these.
Like W YS? , a few are implemented as language extensions.
Launchbury et al. [32] describe a Haskell-embedded DSL
for writing low-level “share protocols” on a multi-server
“SMC machine”. OblivC [33] is an extension to C for twoparty MPC that annotates variables and conditionals with
an obliv qualifier to identify private inputs; these programs
are compiled by source-to-source translation. The former is
essentially a shallow embedding, and the latter is compilerbased; W YS? is unique in its use of the VDSILE strategy,
that combines a shallow embedding to support source program verification and a deep embedding to support a nonstandard target semantics.
Mechanized metatheory. Our verification results are different from a typical verification result that might either
“mechanize metatheory” using a proof assistant for an
idealized language [23], or might prove an interpreter or
compiler correct w.r.t. a formal semantics [26]—we do both.
We mechanize the metatheory of W YS? establishing the
soundness of the conceptual single-threaded semantics w.r.t.
the actual distributed semantics, and we also mechanize
the proof that the W YS? interpreter implements the correct
W YS? semantics.
Source MPC verification. While the verification of the underlying crypto protocols has received some attention [34],
the verification of the MPC source programs has remained
largely unexplored. The only previous work that we know
of is Backes et. al. [35] who devise an applied pi-calculus
based abstraction for MPC, and use it for formal verification.
For an auction protocol that computes the min function, their
abstraction comprises about 1400 lines of code. W YS? , on
the other hand, enables direct verification of the higher-level
MPC source programs, and in addition provides a verified
toolchain.
General DSL implementation strategies. DSLs (for MPC
or other purposes) are implemented in various ways, such
as by developing a standalone compiler/interpreter, or by
embedding the DSL (shallowly or deeply) in a host language. VDSILE’s language-integrated syntax bears relation
to the approach taken in LINQ [36], which embeds a query
language in normal C# programs, and implements these
programs by extracting the query syntax tree and passing it
to a provider to implement for a particular backend. Other
researchers have embedded DSLs in verification-oriented
host languages (e.g., Bedrock [37] in Coq [38]) to permit
formal proofs of DSL programs. F? provides some advantage as a host language since it is both higher-order and
effectful, making it easier to write DSL combinators for
effectful languages while still proving that DSL programs
have good properties, and being able to (easily) extract those
programs to runnable code.
Figure 1. Architecture of an W YS? deployment
In sum, W YS? is the first DSL to enable formal verification of efficient source MPC programs as written in a
full-featured host programming language. W YS? is also the
first MPC DSL to provide a (partially) verified interpreter.
3. Verified programming in W YS?
Consider a dating application that enables its users to
compute their common interests without revealing all their
private interests to one another. This is an instance of the
private set intersection (PSI) problem. We illustrate the
main concepts of W YS? by showing, in several stages, how
to program, optimize, verify and deploy this application—
Figure 1 provides an overview.
3.1. Secure computations with
as sec
In W YS? , an MPC is written as a single specification
which executes in one of two computation modes. The
primary mode is called sec mode, and it specifies a secure
computation to be carried out among multiple parties. Here
is the private set intersection example written in W YS? :
let psi a b input a input b l a l b =
as sec {a,b} (fun () →
let r = List.intersect (reveal input a) (reveal input b) l a l b
give a r ++ give b r)
The six arguments to psi are, respectively, principal identifiers for Alice and Bob, Alice and Bob’s secret inputs,
expressed as lists, and their (public) lengths. The as sec ps f
construct indicates that thunk f should be run in sec mode.
In this mode, the code may jointly access the secrets of the
principals ps. In this case, we jointly intersect input a and
input b, the inputs of a and b, and then return the same result
r to both a and b. Outside of sec mode, Alice would not be
permitted to see Bob’s secret input, and vice versa, but inside
both can be made visible using the reveal coercion. Finally,
the code constructs a map, associating a result for each
principal (which in this case is the same)—give p v builds
a singleton map p 7→ v and ++ concatenates disjoint maps.
Running this code requires the following steps. First,
we run the F? compiler in a special mode that extracts the
above code, psi.fst, into the W YS? AST as a data structure
in psi.ml. W YS? has only a few constructs of its own, like
as sec (the full syntax is in Figure 2 in Section 4), and
these are extracted to Wysteria-specific nodes. The rest of
a program’s code is extracted into FFI nodes that indicate
the use of, or calls into, functionality provided by F? itself.
The next step is for each party, Alice and Bob, to run
the extracted program using the W YS? interpreter. This
interpreter is written in F? and provably implements a deep
embedding of the F? semantics, also specified in F? (shown
in Figures 4, 5, and 6 in Section 4). This interpreter is
extracted to OCaml code by a standard F? process. When
each party reaches as sec ps f, the interpreter’s back-end
compiles f, on-the-fly, for particular values of the secrets
in f’s environment, to a boolean circuit. First-order, loopfree code can be compiled to a circuit; W YS? provides
specialized support for several common combinators (e.g.,
List.intersect, List.mem, List.nth etc.). In the current example,
the lengths of the input lists are required to be public in
order for Alice and Bob to be able to create boolean circuits.
The circuit is handed to a library by Choi et al. [39] that
implements the GMW [3] multi-party computation protocol.
Running the protocol at each party starts by confirming that
they wish to run the same circuit, and then proceeds by
generating (XOR-based) secret shares [31] for each party’s
secret inputs. Running the GMW protocol involves evaluating the boolean circuit for f over the secret shares, involving
communication between the parties for each AND-gate.
One obvious question is how both parties are able to
get this process off the ground, running this program of six
inputs, when only five of the inputs are known to them (the
principals, their own inputs, and the size of other party’s
input). In W YS? , values specific to each principal are sealed
with the principal’s name (which appears in the sealed container’s type). As such, the types of input a and input b are,
respectively, list (sealed {a} int) and list (sealed {b} int). When
the program is run on Alice’s host, the former will be a list
of l a of Alice’s values, whereas the latter will be a list of
l b garbage values (which we denote as •). The reverse will
be true on Bob’s host. When the circuit is constructed, each
principal links their non-garbage values to the relevant input
wires of the circuit. Likewise, the output map component of
each party is derived from their output wires in the circuit,
thus, each party only gets to see their own output.
We would like MPC’s like psi to be called from normal
F? programs. For example, we would like the logic for a
dating application, which involves reading inputs, displaying
results, etc. to be able to call into psi to compute common
interests. To achieve this, W YS? provides a way to compute
a “single-party projection” of multi-party functions, i.e., a
version of psi that can be called with just a single party’s
inputs. The other party’s inputs are filled in with sealed
garbage values, as described above. Calling this function
from F? code also kicks off the W YS? interpreter, so that
it can run psi as described above. When the interpreter
completes, the result is returned and the F? program can
continue.
3.2. Optimizing PSI with
as par
Although psi gets the job done, it turns out to be
inefficient for some cases (as shown in §6). Better implementations of PSI for such cases involve performing a
mixed-mode computation, where each participant evaluates
some local computations in parallel (e.g., iterating over
the elements of their sets) interleaved with small amounts
of jointly evaluated, cryptographically secure computations.
W YS? ’s second computation mode, called par mode, supports such mixed-mode computation. In particular, the construct as par ps f states that each principal in ps should
locally execute the thunk f, simultaneously (any principal
not in the set ps simply skips the expression). Within f,
principals may engage in secure computations via as sec.
Below is an optimized version of PSI, based on an
algorithm by [40], which uses as par. The function psi opt
(line 12) begins by using as par involving Alice and Bob. In
the provided thunk, each principal calls for each alice la lb,
which in turn calls check each bob a lb, for each element a
of Alice’s list la. Secure computation occurs at the use of
as sec at line 8. Within the circuit, Alice and Bob securely
compare their values ax and bx, and gather a list (list bool).
There is one outer list for each of Alice’s elements, the
ith inner list contains comparisons of Alice’s ith value
with some of Bob’s values—rather than comparing each of
Alice’s elements with all of Bob’s, the code is optimized
(as described below) to omit redundant comparisons. At
line 13, both parties build a matrix of comparisons from the
boolean lists. Alice inspects the rows of the matrix (line 14)
to determine which of her elements are in the intersection;
Bob inspects the columns (line 15); and the joint function
gives a result to each principal (line 16).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
let rec for each alice a b la lb =
if la=[] then []
else let lb, r = check each bob a b (List.hd la) lb in
r::for each alice a b (List.tl la) lb
and check each bob a b ax lb =
if lb=[] then [], []
else let bx = List.hd lb in
let r = as sec {a,b} (fun () → reveal ax = reveal bx) in
if r then List.tl lb, [r]
else let lb’, r’ = check each bob a b ax (List.tl lb) in
bx::lb’, r::r’
let psi opt a b la lb = as par {a,b} (fun () →
let bs = build matrix (for each alice la lb) in
let ia = as par {a} (fun () → filteri (contains true ◦ row bs) la) in
let ib = as par {b} (fun () → filteri (contains true ◦ col bs) lb) in
give a ia ++ give b ib)
The optimizations are at line 9. Once we detect that
element ax is in the intersection, we return immediately
instead of comparing ax against the remaining elements of
lb. Furthermore, we remove bx from lb, excluding it from
any future comparisons with other elements of Alice’s set
la. Since la and lb are representations of sets (no repeats),
all the excluded comparisons are guaranteed to be false.
One might wonder whether we could have programmed
most of this code in normal F? , relying on just sec mode for
the circuit evaluation. However, recalling that our goal is to
formally reason about the code and prove it correct and secure, par mode provides significant benefits. In particular, the
SIMD model provided by W YS? enables us to capture many
invariants for free. For example, proving the correctness
of psi opt requires reasoning that both participants iterate
their loops in lock step—W YS? assures this by construction.
Besides, the code would be harder to write (and read) if it
were split across multiple functions or files. As a general
guideline, we use F? for code written from the view of
a single principal, and W YS? when programming for all
principals at once, and rely on the FFI to mediate between
the two.
3.3. Embedding a type system for W YS? in F?
Using the abstractions provided by Wysteria, designing
various high-level, multi-party computation protocols is relatively easy. However, before deploying such protocols, three
important questions arise.
1)
2)
3)
Is the protocol realizable? For example, does a
computation that is claimed to be executed only
by some principals ps (e.g., using an as par ps or
an as sec ps) only ever access data belonging to ps?
Does the protocol correctly implement the desired
functionality? For example, does it correctly compute the intersection of Alice and Bob’s sets?
Is the protocol secure? For example, do the optimizations of the previous section that omit certain
comparisons inadvertently also release information
besides the final answer?
?
?
By embedding W YS in F and leveraging its type system, we address each of these three questions. Our strategy
is to make use of F? ’s extensible, monadic dependent typeand-effect system to define a new indexed monad (called
Wys) and use it to describe precise trace properties of Wysteria multi-party computations. Additionally, we make use of
an abstract type, sealed ps t, representing a value accessible
only to the principals in ps. Combining the Wys monad
with the sealed type, we encode a form of information-flow
control to ensure that protocols are realizable.
The Wys monad. The Wys monad provides several features.
First, all DSL code is typed in this monad, encapsulating
it from the rest of F? . Within the monad, computations and
their specifications can make use of two kinds of ghost state:
modes and traces. The mode of a computation indicates
whether the computation is running in an as par or in an
as sec context. The trace of a computation records the
sequence and nesting structure of messages exchanged between parties as they jointly execute as sec expressions—the
result of a computation and its trace constitute its observable
behavior. The Wys monad is, in essence, the product of a
reader monad on modes and a writer monad on traces.
Formally, we define the following types for modes and
traces. A mode Mode m ps is pair of a mode tag (either Par
or Sec) and a set of principals ps. A trace is a forest of trace
element (telt) trees. The leaves of the trees record messages
TMsg x that are received as the result of executing an as sec
block. The tree structure represented by the TScope ps t
nodes record the set of principals that are able to observe
the messages in the trace t.
type mtag = Par | Sec
type mode = Mode: m:mtag → ps:prins → mode
type telt =
| TMsg : x:α → telt
| TScope: ps:prins → t:list telt → telt
type trace = list telt
Every W YS? computation e has a monadic computation
type Wys t pre post. The type indicates that e is in the Wys
monad (so it may perform multi-party computations); t is
its result type; pre is a pre-condition on the mode in which
e may be executed; and post is a post-condition relating
the computation’s mode, its result value, and its trace of
observable events. When run in a context with mode m
satisfying the pre-condition predicate pre m, e may send
and receive message according to some trace tr, and if and
when it returns, the result is a t-typed value v validating the
post-condition predicate post m v tr. The style of indexing a
monad with a computation’s pre- and post-condition is a
standard technique [30], [41], [42]—we defer the definition
of the monad’s bind and return to the actual implementation
and focus instead on specifications of combinators specific
to W YS? .
We now describe two of the Wysteria-specific combinators in W YS? , as sec and reveal, and how we give them
types in F? .
Defining
as sec
in W YS? .
1 val as sec: ps:prins → f:(unit → Wys a pre post) → Wys a
2 (requires (fun m → m=Mode Par ps ∧ pre (Mode Sec ps)))
3 (ensures (fun m r tr → tr=[TMsg r] ∧ post (Mode Sec ps) r [])))
The type of as sec is dependent on the first parameter,
Its second argument f is the thunk to be evaluated
in as sec mode. The result’s computation type has the
form Wys a (requires φ) (ensures ψ), for some pre-condition
and post-condition predicates φ and ψ , respectively. The
free variables in the type (a, pre and post) are implicitly
universally quantified (at the front); we use the requires and
ensures keywords for readability—they are not semantically
significant.
The pre-condition of as sec is a predicate on the mode
m of the computation in whose context as sec ps f is called.
For all the ps to jointly execute f, we require all of them
to transition to perform the as sec ps f call simultaneously,
i.e., the current mode must be Mode Par ps. We also require
the pre-condition pre of f to be valid once the mode has
transitioned to Mode Sec ps—line 2 says just this.
The post-condition of as sec is a predicate relating the
initial mode m, the result r:a, and the trace tr of the computation. Line 3 states that the trace of a secure computation
as sec ps f is just a singleton [TMsg r], reflecting that its execution reveals only result r.2 Additionally, it ensures that the
result r is related to the mode in which f is run (Mode Sec ps)
ps.
2. This is the “ideal functionality” ensured by the backend, e.g., GMW.
and the empty trace [] (since f has no observables) according
to post, the post-condition of f.
Defining reveal in W YS? . As discussed earlier, a value v of
type sealed ps t encapsulates a t value that can be accessed by
calling reveal v. This call should only succeed under certain
circumstances. For example, in par mode, Bob should not
be able to reveal a value of type sealed {Alice} int. The type
of reveal makes the access control rules clear:
val unseal: #ps:prins → sealed ps α → Ghost α
val reveal: #ps:prins → x:sealed ps α → Wys α
(requires (fun m → m.mode=Par =⇒ m.ps ⊆ ps
∧ m.mode=Sec =⇒ m.ps ∩ ps =
6 ∅))
(ensures (fun m r tr → r=unseal x ∧ tr=[]))
The unseal function is a Ghost function, meaning that it
can only be used in specifications for reasoning purposes.
On the other hand, reveal can be called in the concrete
W YS? programs. Its precondition says that when executing
in Mode Par ps’, all current participants must be listed in the
seal, i.e., ps’ ⊆ ps. However, when executing in Mode Sec ps’,
only a subset of current participants is required: ps’ ∩ ps 6= ∅.
This is because the secure computation is executed jointly
by all of ps’, so it can access any of their individual data. The
postcondition of reveal relates the result r to the argument x
using the unseal function.
3.4. Correctness and security verification
Using the Wys monad and the sealed type, we can write
down precise types for our psi program, proving various useful properties. For lack of space, we discuss the statements
of the main lemmas we prove and the proof structure—
the details of their machine-checked proofs are left to the
actual implementation. By programming the protocols using
the high-level abstractions provided by W YS? , our proofs
are relatively straightforward. In particular, we rely heavily
on the view that both parties execute (different fragments
of) the same code. In contrast, reasoning directly against
the low-level message passing semantics would be much
more unwieldy. In Section 4, by formalizing the connection
between the high- and low-level semantics, we justify our
source-level reasoning.
We present the structure of the security and correctness
proof for psi opt by showing the top-level specification for
psi opt:
val psi opt: a:prin → b:prin
→ la:list (sealed {a} int) → lb:list (sealed {b} int)
→ Wys (map {a, b} (list int))
(requires (fun m → m=Mode Par {a, b}
∧ no dups la ∧ no dups lb))
(ensures (fun m r tr →
let ia = as set (Map.get r a) in
let ib = as set (Map.get r b) in
ia = ib ∧ ia = (as set la ∩ as set lb) ∧ tr=psi opt trace la lb))
The signature above establishes that when Alice and Bob
simultaneously execute psi opt (they start together in Par
mode), with lists la and lb containing their secrets (without
any duplicates), then if and when the protocol terminates,
they both obtain that same results ia and ib corresponding to
the intersection of their sets, i.e., the protocol is functionally
correct.
To prove properties beyond functional correctness, we
also prove that the trace of observable events from a run of
psi la lb is described by the function psi opt trace la lb. This is
a purely specificational function that, in effect, records each
of the boolean results of every as sec comparison performed
during a run of psi—it has the same structure as for each alice
and check each bob.
Given a full characterization of the observable behavior
of psi opt trace la lb in terms of its inputs, we can prove
optimizations correct using relational reasoning [43] and
we can also prove security hyperproperties [44] by relating
traces from multiple runs of the protocol.
Our goal is to prove a noninterference with delimited
release [45] property for psi opt. Since our attacker model is
the “honest-but-curious” model (as mentioned in Section 1),
we do not aim to prove security properties against a thirdparty network adversary.
For psi, from the perspective of Alice as the attacker,
we aim prove that for two runs of the protocol in which
Alice’s input is constant but Bob’s varies, Alice learns no
more by observing the the protocol trace than what she is
allowed to. Covering Bob’s perspective symmetrically, we
show that in two runs of psi la0 lb0 and psi la1 lb1 that satisfy
formula Ψ below, the traces observed by Alice and Bob are
indistinguishable, up to permutation, where la0 , la1 , lb0 , lb1
have type lset int, the type of integer sets represented as lists.
Ψ la0 la1 lb0 lb1 =
intersect la0 lb0 = intersect la1 lb1
∧ length la0 = length la1 ∧ length lb0 = length lb1
In other words, Alice and Bob learn no more than the
intersection of their sets and the size of the other’s set; Ψ
is the predicate that delimits the information released by
the protocol. As far as we are aware, this is the first formal
proof of correctness and security of Huang et al.’s optimized,
private set-intersection protocol.3
The proof is in the style of a step-wise refinement, via
psi, an inefficient variant of the psi opt program. Running
psi la lb always involves doing exactly length la ∗ length lb
comparisons in two nested loops. We prove the following relational security property for psi, relating the traces
trace psi la0 lb0 and trace psi la1 lb1 —the formal statement of
the lemma we prove in F? is shown below.
val psi is secure: la0 : → lb0 : → la1 : → lb1 : → Lemma
(requires (Ψ la0 la1 lb0 lb1 ))
(ensures (permutation (trace psi la0 lb0 )
(trace psi la1 lb1 )))
We reason about the traces of psi only up to permutation.
Given that Alice has no prior knowledge of the choice of
representation of Bob’s set (Bob can shuffle his list), the
3. In carrying out this proof, it becomes evident that Alice and Bob
learn the size of each other’s sets. One can compose psi opt with other
protocols to partially hide the size—W YS? makes it easy to compose
protocols simply by composing their functions.
Principal
Principal set
FFI const
Constant
Expression
p
s
c, f
c
e
Map m
Value v
::=
::=
|
|
|
|
|
p | s | () | true | false | c
as par e1 e2 | as sec e1 e2
seal e1 e2 | reveal e | ffi f ē
mkmap e1 e2 | project e1 e2
concat e1 e2
c | x | let x = e1 in e2 | λx.e | e1 e2
fix f.λx.e | if e1 then e2 else e3
Figure 2. W YS? syntax
traces Alice observes are equivalent up to permutation—
we can formalize this observation using a probabilistic,
relational variant of F? [46], but have yet to do so.
As a next step, we prove that optimizing psi to psi opt
is secure by showing that there exists a function f, such
that for any trace tr=trace psi la lb, the trace of psi opt,
trace psi opt la lb, can be computed by f (length la) tr. In other
words, the trace produced psi opt la lb can be computed using
a function of information already available to Alice (or Bob)
when she (or he) observes a run of the secure, unoptimized
version psi la lb. As such, the optimizations do not reveal
further information.
We present more examples and their verification details
in Section 6.
4. Formalizing W YS?
In the previous section, we presented examples of verifying properties about W YS? programs using F? ’s logic.
However, these programs are not executed using the F?
(single-threaded) semantics; they have a distributed semantics carried out by multiple parties. So, how do the properties
that we verify using F? carry over to the actual runs?
In this section, we present the metatheory that answers
this question. First, we formalize the W YS? single-threaded
(ST) semantics, arguing that it faithfully realizes the F?
semantics, including the W YS? API presented in Section 3.
Next, we formalize the distributed (DS) semantics that the
multiple parties use to run W YS? programs. Our theorems
establish the correspondence between the two semantics,
thereby ensuring that the properties that we verify using F?
carry over to the actual protocol runs. We have mechanized
all the metatheory presented in this section in F? .
4.1. Syntax
Figure 2 shows the complete syntax of W YS? . Principal
and principal sets are first-class values, and are denoted by p
and s respectively. Constants in the language also include ()
(unit), booleans, and FFI constants c. Expressions e include
the regular forms for functions, applications, let bindings,
etc. and the W YS? -specific constructs. Among the ones that
we have not seen in Section 3, expression mkmap e1 e2
Mode
Context
Frame
Stack
Environment
Trace element
Trace
Configuration
M
E
F
X
L
t
T
C
Par component P
Sec component S
Protocol π
::=
::=
|
|
::=
::=
::=
::=
::=
::=
::=
::=
· | m[p 7→ v]
p | s | () | true | false | sealed s v
m | v | (L, λx.e) | (L, fix f.λx.e)
•
Par s | Sec s
hi | as par hi e | as par v hi | . . .
(M, L, E, T )
· | F, X
· | L[x 7→ v]
TMsg v | TScope s T
· | t, T
M ; X; L; T ; e
::= · | P [p 7→ C]
::= · | S[s 7→ C]
::= P ; S
Figure 3. Runtime configuration syntax
creates a map from principals in e1 (which is a principal
set) to the value computed by e2 . project e1 e2 projects the
value of principal e1 from the map e2 , and concat e1 e2
concatenates the two maps.
Host language (i.e., F? ) constructs are also part of the
syntax of W YS? , including constants c include strings,
integers, lists, tuples, etc. Likewise, host language functions/primitives can be called from W YS? —ffi f ē is the
invocation of a host-language function f with arguments ē.
The FFI confers two benefits. First, it simplifies the core
language while still allowing full consideration of security
relevant properties. Second, it helps the language scale by
incorporating many of the standard features, libraries, etc.
from the host language.
4.2. Single-threaded semantics
The ST semantics is a model of the F? semantics and the
W YS? API. The ST semantics defines a judgment C → C 0
that represents a single step of an abstract machine. Here,
C is a configuration M ; X; L; T ; e. This five-tuple consists
of a mode M , a stack X , an environment L, a trace T ,
and an expression e. The syntax for these elements is given
in Figure 3. The value form v represents the host language
(FFI) values. The stack and environment are standard; trace
T and mode M were discussed in the previous section.
The ST semantics is formalized in the style of Hieb
and Felleisen [47], where the redex is chosen by (standard)
evaluation contexts E , which prescribe left-to-right, callby-value evaluation order. A few of the core rules are
given in Figure 4. In essence, the semantics extends a
standard reduction machinery for a call-by-value, lambda
calculus (in direct correspondence with a pure fragment of
F? ), with several Wysteria-specific constructs. We argue, by
inspection, that the Wysteria-specific constructs are in 1-1
correspondence with their specifications in the Wys monad.
Despite the “eyeball closeness”, there is room for formal
discrepancy between the ST semantics and its static model
S- LET
X1 = (M ; L; let x = hi in e2 ; T ), X
M ; X; L; T ; let x = e1 in e2 → M ; X1 ; L; ·; e1
M ; X; L; T ; (L1 , λx.e) e1 → M ; X; L1 [x 7→ e1 ]; T ; e
S- APP
S- ASPARRET
S- ASPAR
M = Par s1 s ⊆ s1 X1 = (M ; L; seal s hi; T ), X
M ; X; L; T ; as par s (L1 , λx.e) → Par s; X1 ; L1 [x 7→ ()]; ·; e
can seal s v
X = (M1 ; L1 ; seal s hi; T1 ), X1 T2 = append T1 [TScope s T ]
M ; X; L; T ; v → M1 ; X1 ; L1 ; T2 ; sealed s v
S- ASSECRET
S- ASSEC
M = Par s X1 = (M ; L; hi T ), X
M ; X; L; T ; as sec s (L1 , λx.e) → Sec s; X1 ; L1 [x 7→ ()]; ·; e
S- SEAL
M = s1 s ⊆ s1
M ; X; L; T ; seal s v → M ; X; L; T ; sealed s v
is sec M
X = (M1 ; L1 ; hi; T ), X1 T1 = append T [TMsg v]
M ; X; L; ·; v → M1 ; X1 ; L1 ; T1 ; v
M = Par s1 ⇒ s1 ⊆ s
M = Sec s1 ⇒ s1 ∩ s 6= φ
S- REVEAL
M ; X; L; T ; reveal (sealed s v) → M ; X; L; T ; v
S- MKMAP
M = Par s1 ⇒ v = sealed s2 v2 ∧ s ⊆ s1 ∧ s ⊆ s2
M = Sec s1 ⇒ s ⊆ s1 ∧ v2 = v
M ; X; L; T ; mkmap s v → M ; X; L; T ; [s 7→ v2 ]
S- CONCAT
S- PROJ
M = Par s ⇒ s = singleton p M = Sec s ⇒ p ∈ s m[p] = v
M ; X; L; T ; project m p → M ; X; L; T ; v
dom(m1 ) ∩ dom(m1 ) = φ
M ; X; L; T ; concat m1 m2 → M ; X; L; T ; m1 ] m2
v = exec ffi f v̄
S- FFI
M ; X; L; T ; ffi f v̄ → M ; X; L; T ; v
Figure 4. W YS? ST semantics (selected rules)
within F? ’s Wys monad. We leave to future work formally
proving a correspondence between the ST semantics and
µF? , the official semantics of F? in F? [30].
The standard constructs such as let bindings (let x =
e1 in e2 ), applications (e1 e2 ), etc. evaluate as usual (see
rules S- LET and S- APP), where the mode and traces play
no role. Rules S- ASPAR and S- ASPARRET reduce an as par
expression once its arguments are fully evaluated. S- ASPAR
first checks that the current mode is Par and contains all the
principals from the set s. It then pushes a seal s hi frame
on the stack, and starts evaluating e. The rule S- ASPARRET
pops the frame and seals the result, so that it is accessible
only to the principals in s. The rule also creates a trace
element TScope s T , essentially making observations during
the reduction of e (i.e., T ) visible only to the principals in
s.
To see that these rules faithfully model the F? API,
consider the F? type of as par, shown below.
1 val as par: ps:prins → (unit → Wys a pre post) →
Wys (sealed ps a)
2 (requires (fun m → m.mode=Par ∧ ps ⊆ m.ps ∧
3
can seal ps a ∧ pre (Mode Par ps)))
4 (ensures (fun m r tr → ∃t. tr=[TScope ps t] ∧
5
post (Mode Par ps) (unseal r) t)))
Rule S- ASPAR implements the pre-condition on line 2.
For the pre-condition on line 3, rule S- ASPARRET checks
that the returned value can be sealed.4 The rule also generates a trace element TScope s T , as per the post-condition
4. For technical reasons, function closures may not be sealed; see the
end of Section 4.3 for details.
on line 4, and returns the sealed value, as per the return type
of the API and the post-condition on line 5.
Next consider the rules S- ASSEC and S- ASSECRET.
Again, we can see that the rules implement the type of
as sec (shown in §3). The rule S- ASSEC checks the precondition of the API, and the rule S- ASSECRET generates
a trace observation TMsg v , as per the postcondition of the
API.
In a similar manner, we can easily see that the rule SREVEAL implements the corresponding pre- and postconditions as given in Section 3.
Rules S- MKMAP, S- PROJ, and S- CONCAT implement
map creation, projection, and concatenation respectively. For
map creation, if the current mode is Par, the rule ensures that
the parties in s can access the value v by requiring v to be
a sealed value that all parties in s can reveal (s ⊆ s2 ). The
rule also requires (for both Par and Sec mode) that all the
parties in the map domain are present in the current mode
(s ⊆ s1 ). In rule S- PROJ, if the current mode is Par then
the current party set must be a singleton equal to the index
of the map projection, whereas if the current mode is Sec,
then the index of the map projection must be present in the
current party set. Rule S- CONCAT simply checks that the
two maps have disjoint range, and returns the disjoint union
(]) of the two maps.
The rule S- FFI implements the FFI call by calling a
host-language function exec ffi. As expected, calling a hostlanguage function has no effect on the W YS? -specific state.
Concretely, this is enforced by F? ’s monadic encapsulation
of effects. We present more details of exec ffi in Section 5.2.
The remaining rules are straightforward.
4.3. Distributed semantics
The DS semantics implements judgments of the form
π −→ π 0 , where a protocol π is a tuple (P ; S) such that P
maps each principal to its local configuration and S maps a
set of principals to the configuration of an ongoing, secure
computation. Both kinds of configurations (local and secure)
have the form C (per Figure 3).
In the DS semantics, principals evaluate the same program locally and asynchronously until they reach a secure
computation, at which point they synchronize to jointly
perform the computation. This semantics is expressed with
four rules, given in Figure 6, which state that either: (1)
a principal can take a step in their local configuration, (2)
a secure computation can take a step, (3) some principals
can enter a new secure computation, and finally, (4) a
secure computation can return the result to the (waiting)
participants.
The first case is covered by rule P- PAR, which (nondeterministically) chooses a principal’s configuration and
evaluates it according to the local evaluation judgment
C
C 0 , which is given in Figure 5 (discussed below). The
second case is covered by P- SEC, which evaluates using the
ST semantics. The last two cases are covered by P- ENTER
and P- EXIT, also discussed below.
Local evaluation. The rules in Figure 5 present the local
evaluation semantics. These express how a single principal
behaves while in par mode; as such, mode M will always
be Par {p}. Local evaluation agrees with the ST semantics
for the standard language constructs (e.g. rules L- LET and
L- APP) and differs for W YS? -specific constructs.5
For an as par expression, a principal either participates
in the computation, or skips it. Rules L- ASPAR 1 and LASPARRET handle the case when p ∈ s, and so, the principal
p participates in the computation. The rules closely mirror
the corresponding ST semantics rules. One difference in the
rule L- ASPARRET is that the trace T is not scoped. In the DS
semantics, traces only contain TMsg elements; i.e., a trace
is the (flat) list of secure computation outputs observed by
that active principal. If p 6∈ s, then the principal skips the
computation with the result being a sealed value containing
garbage • (rule L- ASPAR 2). The contents of the sealed value
do not matter, since the principal will not be allowed to
unseal the value anyway.
Rule L- SEAL has the same intuition as above. Rule LREVEAL allows principal p to reveal the value sealed s v ,
only if p ∈ s. Rule L- MKMAP requires value v to be a sealed
value. In case the current principal p is in the set s, the rule
requires that p can access the contents of the sealed value
(p ∈ s2 ) and creates a singleton map that maps p to the
contents of the sealed value. In case the current principal is
not in the set s, the rule simply creates an empty map. Rule
5. Our formal development actually shares the code for both sets of rules,
using an extra flag to indicate whether a rule is “local” or “joint”.
L- PROJ projects the current principal’s mapping from the
map m. The rule for map concatenation is straightforward.
As should be the case, there are no local rules for
as sec—to perform a secure computation parties need to
combine their data and jointly do the computation.
Entering/exiting secure computations. Returning to Figure 6, Rule P- ENTER handles the case when principals enter
a secure computation. It requires that all the principals p ∈ s
must have the expression form as sec s (Lp , λx.e), where
Lp is their local environment associated with the closure.
Each party’s local environment contains its secret values (in
addition to some public values). Conceptually, a secure computation combines these environments, thereby producing a
joint view, and evaluates e under the combination. We define
an auxiliary combine v function on values as follows:
combine
combine
combine
combine
...
v
v
v
v
(•, v) = v
(v, •) = v
(p, p) = p
(sealed s v1 , sealed s v2 ) = sealed s (combine v v1 v2 )
The first two rules handle the case when one of the
values is garbage; in these cases, the function picks the other
value. For sealed values, if the set s is the same, the function
recursively combines the contents. The combine function
for the environments combines the mappings pointwise.
The combine functions for n values and environments is
a folding of the corresponding function.
So now, consider the following code:
let x = as par alice (fun x → 2) in
let y = as par bob (fun x → 3) in
let z = as sec (alice, bob) (fun z → (unseal x) + (unseal y)) in ...
In alice’s environment x will be mapped to sealed alice
2, whereas in bob’s environment it will be mapped to sealed
alice •. Similarly, in alice’s environment y will be mapped
to sealed bob •, whereas in bob’s environment it will be
mapped to sealed bob 3. Before the secure computation, their
environments will be combined, producing an environment
with x mapped to sealed alice 2 and y mapped to sealed bob 3,
and then, the secure computation function will be evaluated
in this new environment.
Although the combine v function as written is a partial
function, our metatheory guarantees that at runtime, the
function always succeeds. Since the principals are computing the same program over their view of the data, these views
are structurally similar.
So, the rule P- ENTER combines the principals’ environments, and creates a new entry in the S map. The principals
are now waiting for the secure computation to finish.
The rule P- EXIT applies when a secure computation has
terminated and returns results to the waiting principals. If the
secure computation terminates with value v , each principal
gets the value slice v p v . The slice v function is analogous
to combine v, but in the opposite direction—it strips off the
parts of v that are not accessible to p. Some cases for the
slice v function are:
slice v p p’ = p’
L- LET
X1 = (M ; L; let x = hi in e2 ; T ), X
M ; X; L; T ; let x = e1 in e2 → M ; X1 ; L; ·; e1
M ; X; L; T ; (L1 , λx.e) e1 → M ; X; L1 [x 7→ e1 ]; T ; e
L- APP
L- ASPAR 1
L- ASPARRET
p ∈ s X1 = (M ; L; seal s hi; T ), X
M ; X; L; T ; as par s (L1 , λx.e)
M ; X1 ; L1 [x 7→ ()]; ·; e
X = (M ; L1 ; seal s hi; T1 ), X1 T2 = append T1 T
M ; X; L; T ; v
M ; X1 ; L1 ; T2 ; sealed s v
L- ASPAR 2
L- SEAL
p 6∈ s
M ; X; L; T ; as par s (L1 , λx.e)
p ∈ s ⇒ v1 = seal s v p 6∈ s ⇒ v1 = seal s •
M ; X; L; T ; seal s v
M ; X; L; T ; v1
M ; X; L; T ; sealed s •
p∈s
M ; X; L; T ; reveal (sealed s v)
M ; X; L; T ; v
L- REVEAL
L- MKMAP
v = sealed s2 v2 p ∈ s ⇒ p ∈ s2 ∧ m = [p 7→ v] p 6∈ s ⇒ m = ·
M ; X; L; T ; mkmap s v → M ; X; L; T ; m
L- CONCAT
p = p1 m = [p 7→ v]
L- PROJ
M ; X; L; T ; project m p1 → M ; X; L; T ; v
dom(m1 ) ∩ dom(m1 ) = φ
M ; X; L; T ; concat m1 m2 → M ; X; L; T ; m1 ] m2
Figure 5. Distributed semantics, selected local rules (the mode M is always Par (singleton p))
P- PAR
C
C0
P [p 7→ C]; S −→ P [p 7→ C 0 ]; S
P- SEC
C → C0
P ; S[s 7→ C] −→ P ; S[s 7→ C 0 ]
∀p ∈ s. P [p].e = as sec s (Lp , λx.e) s 6∈ dom(S) L = combine L̄p
P ; S −→ P ; S[s 7→ Sec s; ·; L[x 7→ ()]; ·; e]
P- EXIT
S[s] = Sec s; ·; L; T ; v
P 0 = ∀p ∈ s. P [p 7→ P [p] / (slice v p v)]
P ; S −→ P 0 ; S 0
P- ENTER
S0 = S \ s
Figure 6. Distributed semantics, multi-party rules
slice v p (sealed s v) = sealed s •, if p ∈
6 s
slice v p (sealed s v) = sealed s (slice v p v), if p ∈ s
As an example, consider the following code:
let x = as sec (alice, bob) (fun x → let y = ... in seal alice y)
Since the return value of the secure computation is
sealed for alice, bob will get a sealed alice •, produced using
the slice v function on the result of seal alice y.
In the rule P- EXIT, the / notation is defined as:
M ; X; L; T ; / v = M ; X; L; append T [TMsg v]; v
That is, the returned value is also added to the principal’s
trace to note their observation of the value.
We now return to the point of not allowing closures to
be sealed. Consider the following example:
secure block, alice’s environment would map x to seal alice 2
and y to seal bob •, whereas bob’s environment would map
x to seal alice •, and y to the closure (L, fun z → x), where
L maps x to seal alice •. Now, as per the target semantics,
their environments are combined, and in the combined environment y gets the value from bob’s environment, but the
closure for y has a garbage value for x. Thus, running this
program in the target semantics fails to make progress.
We found this problem during our effort of mechanizing
the semantics. For now, we do not allow closures to be
boxed. We plan to fix the problem in future.
4.4. Metatheory
let x = as par alice 2 in
let y = as par bob (fun z → x) in
let z = as sec ab (fun z →
let a = reveal y in
let b = reveal (a ()) in
b) in
z
Our goal is to show that the ST semantics faithfully
represents the semantics of W YS? programs as they are
executed by multiple parties, i.e., according to the DS
semantics. We do this by proving simulation of the ST
semantics by the DS semantics, and by proving confluence
of the DS semantics. Our F? development mechanizes all
the metatheory presented in this section.
In the source semantics, the program returns 2 to both
the parties. In the target semantics, just before the call to the
Simulation. We define a slice s C function that returns the
corresponding protocol πC for an ST configuration C . In
the P component of πC , each principal p ∈ s is mapped
to their slice of the protocol. For slicing values, we use the
same slice v function as before. Traces are sliced as follows:
slice tr p (TMsg v) = [TMsg (slice v p v)]
slice tr p (TScope s T) = slice tr p T, if p ∈ s
slice tr p (TScope s T) = [], if p 6∈ s
The slice of an expression (e.g., the source program) is
itself. For all other components of C , slice functions are
defined analogously.
We say that C is terminal if it is in Par mode and is
fully reduced to a value (i.e., C.e is a value and C.X is
empty). Similarly, a protocol π = (P, S) is terminal if S
is empty and all the local configurations in P are terminal.
The simulation theorem is then the following:
Theorem 1 (Simulation of ST by DS). Let s be the set of all
principals. If C1 →∗ C2 , and C2 is terminal, then there
exists some derivation (slice s C1 ) −→∗ (slice s C2 )
such that (slice s C2 ) is terminal.
Notably, each principal’s value and trace in protocol
(slice s C2 ) is the slice of the value and trace in C2 .
Confluence. To state the confluence theorem, we first define
the notion of strong termination.
Definition 1 (Strong termination). A protocol π strongly
terminates in the terminal protocol πt , written as π ⇓ πt ,
if all possible runs of π terminate in some number of
steps in πt .
Our confluence result then says:
Theorem 2 (Confluence of DS). If π −→∗ πt and πt is
terminal, then π ⇓ πt .
Combining the two theorems, we get a corollary that
establishes the soundness of the ST semantics w.r.t. the DS
semantics:
Corollary 1 (Soundness of ST semantics). Let s be the set
of all principals. If C1 →∗ C2 , and C2 is terminal, then
(slice s C1 ) ⇓ (slice s C2 ).
Now suppose that for a W YS? source program, we prove
in F? a post-condition that the result is sealed alice n, for
some n > 0. By the soundness of the ST semantics, we can
conclude that when the program is run in the DS semantics,
it may diverge, but if it terminates, alice’s output will also
be sealed alice n, and for all other principals their outputs
will be sealed alice •. Aside from the correspondence on
results, our semantics also covers correspondence on traces.
Thus, via our VDSILE embedding of Wysteria in F? , the
correctness and security properties that we prove about a
W YS? program using F? ’s logic, hold for the program that
actually runs.
Of course, this statement is caveated by how we produce
an actual implementation from the DS semantics; details are
presented in the next section.
5. Implementation
This section describes our W YS? implementation. We
begin by describing our interpreter; we have proved that its
core implements our formal semantics, adding confidence
that bugs have not been introduced in the translation from
formalism to implementation. Then we describe our novel
FFI by which W YS? programs can easily take advantage of
features and libraries of W YS? ’s host language, F? .
5.1. W YS? interpreter
The formal semantics presented in the prior section is
mechanized as an inductive type in F? . This style is useful
for proving properties, but does not directly translate to an
implementation. Therefore, we implement an interpretation
function step in F? and prove that it corresponds to the
rules; i.e., that for all input configurations C , step(C) = C 0
implies that C
C 0 according to the semantics. Then,
the core of each principal’s implementation is an F? stub
function tstep that repeatedly invokes step on the AST of
the source program (produced by the F? extractor run in a
custom mode), unless the AST is an as sec node. Functions
step and tstep are extracted to OCaml by the standard F?
extraction process.
Local evaluation is not defined for as sec, so the stub
implements what amounts to P- ENTER and P- EXIT from
Figure 6. When the stub notices the program has reached
an as sec expression, it calls into a circuit library we have
written that converts the AST of the second argument of
as sec to a boolean circuit. This circuit and the encoded
inputs are communicated to a co-located server, written
using a library due to Choi et. al. [39] that implements
the GMW MPC protocol. The server evaluates the circuit,
coordinating with the GMW servers of the other principals,
and sends back the result. The circuit library decodes the
result and returns it to the stub. The stub then carries on
with the local evaluation.
Our F? formalization of the W YS? semantics, including
the AST specification, is 1900 lines of code. This formalization is used both by the metatheory as well as by
the (executable) interpreter. The metatheory that connects
the ST and DS semantics (Section 4.4) is 3000 lines. The
interpreter and its correctness proof are another 290 lines
of F? code. The interpreter step function is essentially a
big switch-case on the current expression, that calls into the
functions from the semantics specification. The tstep stub is
another 15 lines. The size of the circuit library, not including
the GMW implementation, is 836 lines.
The stub, the implementation of GMW, the circuit library, and the F? extractor (including our custom W YS?
mode for it) are part of our trusted computing base. As
such, bugs in them could constitute security holes. Verifying
these components as well (especially the circuit library and
the GMW implementation, which are open problems to our
knowledge) is interesting future work.
5.2. FFI
When writing a source W YS? program (in F? ), the
programmer can access definitions from an FFI module,6
which exports F? datatypes and library functions to W YS?
programs. Below we explain W YS? ’s extensible FFI mechanism, which enables programmers to add new datatypes and
functions to the FFI module, while ensuring that the W YS?
metatheory remains applicable.
Source programming with FFI. Datatypes and functions
are added to the FFI module as usual:
type list α =
| Nil: list α
| Cons: hd:α → tl:list α → list α
val append: l1 :list α → l2 :list α → Tot (list α)
let rec append l1 l2 = match l1 with
| [] → l2
| hd::tl → hd::(append tl l2 )
In addition to these usual definitions, W YS? requires the
programmer to define the corresponding slice (and combine)
functions (Section 4.3) for the new datatype, e.g.:
val slice list: (prin → α → Tot α) → prin → list α → Tot (list α)
let rec slice list f p l = match l with
| [] → []
| hd::tl → (f p hd)::(slice list f p tl)
Once the datatype is defined, an W YS? program is free
to use it by importing the FFI module, and can prove
properties with it using standard F? reasoning. F? ’s monadic
encapsulation of effects ensures that the FFI functions do
not interfere with W YS? -specific state, i.e., the mode and
trace. For example, the effect annotation Tot in append above
indicates that append is a pure function, and hence does not
modify or use the the Wys monad’s state.
FFI metatheory. Recall from Section 4 that we formalize
FFI calls using the expression form ffi, FFI values using
the value form v, and the semantics of FFI calls using the
meta function exec ffi. The W YS? metatheory (Section 4.4)
needs to relate the ST and DS semantics of FFI calls. For
this purpose, the FFI programmer must prove that the added
definitions meet certain obligations. For example, one such
obligation is that the slice of the value returned from an FFI
call must match the return value of the FFI call on the slice
of the arguments. Formally, for an FFI function f ,
∀p, v̄. slice p (exec ffi f v̄) = exec ffi f slice p v
To fulfill this obligation for the append function, for
example, the programmer is required to prove the following
lemma:
val slice append lemma:
f:(prin → α → Tot α) → p:prin → l1 :list α → l2 :list α → Lemma
(ensures (slice list f p (append l1 l2 ) =
append (slice list f p l1 ) (slice list f p l2 )))
6. How F? programs call into W YS? functions was described in Section 3.1.
This lemma is easily provable in F? .
Once all obligations are proven, W YS? metatheory guarantees that the theorems of Section 4.4 extend to the new
datatypes and functions in the FFI.
FFI implementation. The FFI module itself is extracted
to OCaml via regular F? extraction. We rely on the F?
metatheory to conclude that the extracted code executes per
its specification.
The custom F? extraction mode that we have implemented for W YS? , identifies integer, string, and other constants in a W YS? source program, and extracts them to the
V ffi AST form, which is part of the AST value type. The FFI
calls, that can take as arguments and return F? datatypes,
are extracted to an E ffi AST form, which is part of the AST
expression type:
type exp = . . .
| E ffi: f:α → args:list exp → inj:β → exp
The f argument is extracted to be the name of the FFI
function, that links to the extracted OCaml function. We
explain the inj argument shortly.
When evaluating the W YS? AST, the interpreter may
reach an E ffi f args inj node. As we saw in Section 4.2, the
interpreter calls a library function exec ffi with the list of
values; in addition, it passes a inj argument. The exec ffi
function first un-embeds any embedded host-language arguments. The un-embedding function is straightforward (the
values shown below are from the value AST form):
unembed V unit = ()
unembed (V ffi v) = v (∗ values in the host language ∗)
unembed (V seal s v) = V seal s v
Interpreter-specific values, such as V seal, are passed as
is. The FFI module does not have access to the W YS? API
in F? , and hence it must treat these values abstractly. exec ffi
then calls the OCaml function f with the un-embedded
arguments. The OCaml function returns some result which
needs to be embedded back into the AST. F? programs
cannot inspect the type of values at run-time, but fortunately
the compiler has enough information during extraction to
know how to re-embed the result.
In particular, when the extractor compiles an FFI call
in the source program to an E ffi node, it has the type
information for the return value of the FFI call. Using this
information, it instruments the E ffi node with an injection,
a function that can be used at runtime to embed the FFI call
result back to the AST. For example, if the result is (), the
injection is (an OCaml function) fun x → V unit. If the return
value is an interpreter value (e.g. V seal), the injection is the
identity. If the return value is some host F? value (such as a
list, tuple, or int), the injection creates an V ffi node. exec ffi
uses the injection to embed the result back to the AST, and
returns it to the interpreter.
Our interface essentially provides a form of monomorphic, first-order interoperability between the (dynamically
typed) interpreter and the host language. We do not foresee
any problems extending this approach to be higher order by
using coercions [48].
Here, pre captures the preconditions on the inputs as
mentioned above, and median spec is an idealized median
specification. For both the versions, F? is able to prove
the specification without any extra hints in the code. For
example, the monolithic version is programmed as:
let median x y =
let g: unit → Wys int
(requires (fun m → m = Mode Sec {Alice, Bob}))
(ensures (fun r → (pre (unseal x) (unseal y) =⇒
r = median spec (unseal x) (unseal y))))
= fun → ... in //monolithic median algorithm
as sec {Alice, Bob} g
Figure 7. Time to run (in secs) normal and optimized PSI for varying
per-party set sizes and intersection densities.
6. Applications
Private set intersection. We evaluate the performance of the
psi (computing intersection in a single secure computation),
and the psi opt (the optimized version) algorithms from
Section 3. The programs that we benchmark are slightly
different than the ones presented there, in that the local col
and row functions are not the verified ones. The results are
shown in Figure 7. We measure the time (in seconds) for per
party set sizes 96, 128, and 256, and intersection densities
(i.e. the fraction of elements that are common) 0.5, 0.75,
and 0.9.
The time taken by the unoptimized version is independent of the intersection density since it always compares
all pairs of values. However, as the intersection density
increases, the optimized version performs far better – it
is able to skip many comparisons. For lower densities (<
0.35), the optimization does not improve performance, as
the algorithm essentially becomes quadratic, and the setup
cost for each secure computation takes over.
We note that a similar performance profile was also
noted by Rastogi et. al. [19], although they did not experiment with set size 256, like we did.
Joint median. We program unoptimized and optimized versions of the two-party joint median [49]. The programs take
two distinct, sorted inputs from alice, x1 and x2 , and two
distinct, sorted inputs from bob, y1 and y2 and return the
median of all four. In the unoptimized version, the whole
computation takes place as a monolithic secure computation,
whereas the optimized version breaks up the computation,
revealing some intermediate results and off-loading some
parts to the local hosts (much like PSI). We refer the reader
to [49] for more details of the algorithms.
For both the versions, we prove functional correctness:
val median:
x:sealed Alice (int ∗ int) → y:sealed Bob (int ∗ int) → Wys int
(requires (fun m → m = Mode Par {Alice, Bob}))
(ensures (fun r t → (pre (unseal x) (unseal x) =⇒
r = median spec (unseal x) (unseal y))))
For proving the security properties, for the unoptimized
version, we prove that the observable trace is [TMsg r], where
r is the result of the computation, basically reflecting that
both the parties only see the final result. For the optimized version, we first prove that the observable trace is
opt trace (reveal x) (reveal y), where opt trace is a purely specificational function that takes as arguments Alice’s (reveal x)
and Bob’s (reveal y) inputs, and returns the trace generated
by the optimized median algorithm. Then, we prove that the
trace does not reveal more than the final output, by proving
the following relational lemma:
val optimized median is secure for alice:
x1:(int ∗ int) → x2:(int ∗ int) → y:(int ∗ int)
→ Lemma (requires (pre x1 y ∧ pre x2 y ∧
median spec x1 y = median spec x2 y))
(ensures (opt trace x1 y = opt trace x2 y))
The lemma says that for two runs of the optimized median with arbitrarily different inputs from Alice (x1 and x2), if Bob’s input and output are the same,
i.e. median spec x1 y = median spec x2 y, then the observable
trace is also same. Essentially, the trace does not reveal more
about Alice’s inputs, beyond what is already revealed by the
output. We also prove a symmetrical lemma for Bob where
we vary Bob’s inputs and keep Alice’s input and output the
same. Once again, for both the proofs, F? is able to prove
them automatically.
Card dealing. We have implemented an MPC-based card
dealing application in W YS? . Such an application can play
the role of the dealer in a game of online poker, thereby
eliminating the need to trust the game portal for card dealing. The application relies on W YS? ’s support for secret
shares [31]. Using secret shares, the participating parties can
share a value in a way that none of the parties can observe
the actual value individually (each party’s share consists of
some random-looking bytes), but they can recover the value
by combining their shares in a secure block.
In the application, the parties maintain a list of secret
shares of already dealt cards (the number of already dealt
cards is public information). To deal a new card, each party
first generates a random number locally. The parties then
perform a secure computation to compute the sum of their
random numbers modulo 52, let’s call it n. The output of
the secure block is secret shares of n. Before declaring n
as the newly dealt card, the parties needs to ensure that the
card n has not already been dealt. To do so, they iterate over
the list of secret shares of already dealt cards, and for each
element of the list, check that it is different from n. The
check is performed in a secure block that simply combines
the shares of n, combines the shares of the list element, and
checks the equality of the two values. If n is different from
all the previously dealt cards, it is declared to be the new
card, else the parties repeat the protocol by again generating
a fresh random number each.
W YS? exports the following API for secret shares:
location sharing application. At the moment, we have only
run these applications using a secure server backend. In
this backend, as sec works by literally sending code and
inputs to a separate server that implements the ST semantics
directly. The server returns the result with a cryptographic
proof of correctness to each party (we have verified the
use of cryptography using a technique similar to [50]). We
conjecture that such a server could be useful for a trusted
hardware based deployment scenario.
type Sh: Type → Type
type can sh: Type → Type
assume Cansh int: can sh int
7. Conclusions
val v of sh: #a:Type → sh:Sh a → Ghost a
val ps of sh: #a:Type → sh:Sh a → Ghost prins
val mk sh: #a:Type → x:a → Wys (Sh a)
(requires (fun m → m.mode = Sec ∧ can sh a))
(ensures (fun m r tr → v of sh r = x ∧ ps of sh r = m.ps ∧
tr = [])
val comb sh: #a:Type → x:Sh a → Wys a
(requires (fun m → m.mode = Sec ∧ ps of sh x = m.ps))
(ensures (fun m r tr → v of sh x = r ∧ tr = [])
Type Sh a types the shares of values of type a. Our
implementation currently supports shares of int values only;
the can sh predicate enforces this restriction on the source
programs. Extending secret shares support to other types
(such as pairs) should be straightforward. Functions v of sh
and ps of sh are marked Ghost, meaning that they can only
be used in specifications for reasoning purposes. In the
concrete code, shares are created and combined using the
mk sh and comb sh functions. Together, the specifications
of these functions enforce that the shares are created and
combined by the same set of parties (through ps of sh), and
that comb sh recovers the original value (through v of sh).
The W YS? interpreter transparently handles the low-level
details of extracting shares from the GMW implementation
of Choi et al. (mk sh), and reconstituting the shares back
(comb sh).
In addition to implementing the card dealing application
in W YS? , we have formally verified that the returned card is
fresh. The signature of the function that checks for freshness
of the newly dealt card is as follows (abc is the set of
parties):
val check fresh:
l:list (Sh int){∀ s’. mem s’ l =⇒ ps of sh s’ = abc}
→ s:Sh int{ps of sh s = abc}
→ Wys bool (requires (fun m → m = Mode Par abc))
(ensures (fun r → r ⇐⇒ (∀ s’. mem s’ l =⇒
not (v of sh s’ = v of sh s))))
The specification says that the function takes two arguments: l is the list of secret shares of already dealt cards, and
s is the secret shares of the newly dealt card. The function
returns a boolean r that is true iff the concrete value (v of sh)
of s is different from the concrete values of all the elements
of the list l. Using F? , we verify that the implementation of
check fresh meets this specification.
Other applications and secure server. We have implemented some more applications in W YS? , including a geo-
This paper has proposed Verified, Domain-Specific Integrated Language Extensions (VDSILE) as a new way to
implement a domain-specific language. The paper specifically applies the idea to design and implement W YS? , a new
MPC DSL that is hosted in F? . W YS? inherits the basic
programming model from Wysteria. However, by virtue
of being implemented as a VDSILE, it provides several
novel capabilities missing from all previous MPC DSLs,
including Wysteria. W YS? is the first DSL to enable formal
verification of the source MPC programs. W YS? is also
the first MPC DSL to provide a (partially) verified interpreter. Furthermore, W YS? programs can freely use standard
constructs such as datatypes and libraries directly from
F? , thereby making it more scalable and usable. All these
capabilities constitute a significant step towards making
MPC more practical and trustworthy. The paper has reported
on several MPC applications programmed in W YS? , and
verified for correctness and security.
References
[1]
A. Shamir, R. L. Rivest, and L. M. Adleman, Mental poker. Springer,
1980.
[2]
A. C.-C. Yao, “How to generate and exchange secrets,” in FOCS,
1986.
[3]
O. Goldreich, S. Micali, and A. Wigderson, “How to play ANY
mental game,” in STOC, 1987.
[4]
D. Beaver, S. Micali, and P. Rogaway, “The round complexity of
secure protocols,” in STOC, 1990.
[5]
P. Bogetoft, D. L. Christensen, I. Damgård, M. Geisler, T. Jakobsen,
M. Krøigaard, J. D. Nielsen, J. B. Nielsen, K. Nielsen, J. Pagter,
M. Schwartzbach, and T. Toft, “Financial cryptography and data
security,” 2009, ch. Secure Multiparty Computation Goes Live.
[6]
D. Bogdanov, M. Jemets, S. Siim, and M. Vaht, “How the estonian
tax and customs board evaluated a tax fraud detection system based
on secure multi-party computation,” in Financial Cryptography and
Data Security. Springer Berlin Heidelberg, 2015.
[7]
F. Kerschbaum, A. Schroepfer, A. Zilli, R. Pibernik, O. Catrina,
S. de Hoogh, B. Schoenmakers, S. Cimato, and E. Damiani, “Secure
collaborative supply-chain management,” Computer, 2011.
[8]
L. Kamm, “Privacy-preserving statistical analysis using secure multiparty computation,” Ph.D. dissertation, University of Tartu, 2015.
[9]
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, “Fairplay: a secure
two-party computation system,” in USENIX Security, 2004.
[10] Y. Huang, D. Evans, J. Katz, and L. Malka, “Faster secure two-party
computation using garbled circuits,” in USENIX, 2011.
[11] “VIFF, the virtual ideal functionality framework,” http://viff.dk/.
[12] L. Malka, “Vmcrypt: modular software architecture for scalable secure computation,” in CCS, 2011.
[13] A. Ben-David, N. Nisan, and B. Pinkas, “FairplayMP: a system for
secure multi-party computation,” in CCS, 2008.
[14] A. Holzer, M. Franz, S. Katzenbeisser, and H. Veith, “Secure twoparty computations in ANSI C,” in CCS, 2012.
[15] J. D. Nielsen and M. I. Schwartzbach, “A domain-specific programming language for secure multiparty computation,” in PLAS, 2007.
[16] J. D. Nielsen, “Languages for secure multiparty computation and
towards strongly typed macros,” Ph.D. dissertation, 2009.
[17] D. Bogdanov, S. Laur, and J. Willemson, “Sharemind: A framework
for fast privacy-preserving computations,” in Computer Security ESORICS 2008, 2008.
[18] A. Schropfer, F. Kerschbaum, and G. Muller, “L1 - an intermediate
language for mixed-protocol secure computation,” in COMPSAC,
2011.
[19] A. Rastogi, M. A. Hammer, and M. Hicks, “Wysteria: A programming language for generic, mixed-mode multiparty computations,” in
Proceedings of the 2014 IEEE Symposium on Security and Privacy,
2014.
[20] C. Liu, Y. Huang, E. Shi, J. Katz, and M. Hicks, “Automating efficient
ram-model secure computation,” in IEEE Symposium on Security and
Privacy (Oakland), 2014.
[21] P. Laud and J. Randmets, “A domain-specific language for low-level
secure multiparty computation protocols,” in Proceedings of the
22Nd ACM SIGSAC Conference on Computer and Communications
Security, ser. CCS ’15. New York, NY, USA: ACM, 2015, pp.
1492–1503. [Online]. Available: http://doi.acm.org/10.1145/2810103.
2813664
[22] P. Mardziel, M. Hicks, J. Katz, M. Hammer, A. Rastogi, and M. Srivatsa, “Knowledge inference for optimizing and enforcing secure
computations,” in Proceedings of the Annual Meeting of the US/UK
International Technology Alliance, 2013, this short paper consists of
coherent excerpts from several prior papers.
[23] B. E. Aydemir, A. Bohannon, M. Fairbairn, J. N. Foster, B. C. Pierce,
P. Sewell, D. Vytiniotis, G. Washburn, S. Weirich, and S. Zdancewic,
“Mechanized metatheory for the masses: The poplmark challenge,” in
Proceedings of the 18th International Conference on Theorem Proving in Higher Order Logics, ser. TPHOLs’05. Berlin, Heidelberg:
Springer-Verlag, 2005, pp. 50–65.
[24] C. Klein, J. Clements, C. Dimoulas, C. Eastlund, M. Felleisen,
M. Flatt, J. A. McCarthy, J. Rafkind, S. Tobin-Hochstadt, and R. B.
Findler, “Run your research: On the effectiveness of lightweight
mechanization,” in Proceedings of the 39th Annual ACM SIGPLANSIGACT Symposium on Principles of Programming Languages, ser.
POPL ’12. New York, NY, USA: ACM, 2012, pp. 285–296.
[25] X. Yang, Y. Chen, E. Eide, and J. Regehr, “Finding and understanding bugs in C compilers,” in Proceedings of ACM SIGPLAN 2011
Conference on Programming Language Design and Implementation,
2011.
[26] X. Leroy, “Formal verification of a realistic compiler,” Commun.
ACM, 2009.
[27] K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, and P.-Y. Strub,
“Implementing TLS with verified cryptographic security,” in IEEE
Symposium on Security & Privacy (Oakland), 2013, pp. 445–462.
[Online]. Available: http://www.ieee-security.org/TC/SP2013/papers/
4977a445.pdf
[28] “PolarSSL
verification
polarssl-verification-kit/, 2015.
kit,”
http://trust-in-soft.com/
[29] J. Yang and C. Hawblitzel, “Safe to the last instruction: Automated
verification of a type-safe operating system.” Association for Computing Machinery, Inc., June 2010.
[30] N. Swamy, C. Hriţcu, C. Keller, A. Rastogi, A. Delignat-Lavaud,
S. Forest, K. Bhargavan, C. Fournet, P.-Y. Strub, M. Kohlweiss, J.K. Zinzindohoue, and S. Z. Beguelin, “Dependent types and multimonadic effects in F*,” in POPL, 2016.
[31] A. Shamir, “How to share a secret,” Communications of the ACM,
vol. 22, no. 11, pp. 612–613, Nov. 1979.
[32] J. Launchbury, I. S. Diatchki, T. DuBuisson, and A. Adams-Moran,
“Efficient lookup-table protocol in secure multiparty computation,” in
ICFP, 2012.
[33] S. Zahur and D. Evans, “Obliv-c: A language for extensible
data-oblivious computation,” Unpublished, 2015, http://oblivc.org/
downloads/oblivc.pdf.
[34] J. B. Almeida, M. Barbosa, G. Barthe, G. Davy, F. Dupressoir,
B. Grgoire, and P.-Y. Strub, “Verified implementations for secure and
verifiable computation,” 2014.
[35] M. Backes, M. Maffei, and E. Mohammadi, “Computationally Sound
Abstraction and Verification of Secure Multi-Party Computations,” in
IARCS Annual Conference on Foundations of Software Technology
and Theoretical Computer Science (FSTTCS 2010), 2010.
[36] E. Meijer, B. Beckman, and G. Bierman, “Linq: Reconciling object,
relations and xml in the .net framework,” in Proceedings of the 2006
ACM SIGMOD International Conference on Management of Data,
ser. SIGMOD ’06. New York, NY, USA: ACM, 2006, pp. 706–706.
[Online]. Available: http://doi.acm.org/10.1145/1142473.1142552
[37] “Bedrock, a coq library for verified low-level programming,” http:
//plv.csail.mit.edu/bedrock/.
[38] The Coq development team, The Coq proof assistant. [Online].
Available: http://coq.inria.fr
[39] S. G. Choi, K.-W. Hwang, J. Katz, T. Malkin, and D. Rubenstein,
“Secure multi-party computation of boolean circuits with applications
to privacy in on-line marketplaces,” 2011, http://eprint.iacr.org/.
[40] Y. Huang, D. Evans, and J. Katz, “Private set intersection: Are garbled
circuits better than custom protocols?” in NDSS, 2012.
[41] R. Atkey, “Parameterised notions of computation,” Journal of
Functional Programming, vol. 19, pp. 335–376, 2009. [Online].
Available: http://journals.cambridge.org/article S095679680900728X
[42] A. Nanevski, J. G. Morrisett, and L. Birkedal, “Hoare type theory,
polymorphism and separation,” J. Funct. Program., vol. 18, no. 5-6,
pp. 865–911, 2008. [Online]. Available: http://ynot.cs.harvard.edu/
papers/jfpsep07.pdf
[43] N. Benton, “Simple relational correctness proofs for static analyses
and program transformations,” in Proceedings of the 31st ACM
SIGPLAN-SIGACT Symposium on Principles of Programming
Languages, ser. POPL ’04. New York, NY, USA: ACM, 2004,
pp. 14–25. [Online]. Available: http://doi.acm.org/10.1145/964001.
964003
[44] M. R. Clarkson and F. B. Schneider, “Hyperproperties,” J. Comput.
Secur., vol. 18, no. 6, pp. 1157–1210, Sep. 2010. [Online]. Available:
https://www.cs.cornell.edu/fbs/publications/Hyperproperties.pdf
[45] A. Sabelfeld and A. C. Myers, “A model for delimited information release,” in Software Security - Theories and Systems, Second
Mext-NSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan,
November 4-6, 2003, Revised Papers, 2003.
[46] G. Barthe, C. Fournet, B. Grégoire, P. Strub, N. Swamy, and S. Z.
Béguelin, “Probabilistic relational verification for cryptographic
implementations,” in The 41st Annual ACM SIGPLAN-SIGACT
Symposium on Principles of Programming Languages, POPL ’14,
San Diego, CA, USA, January 20-21, 2014, 2014, pp. 193–206.
[Online]. Available: http://doi.acm.org/10.1145/2535838.2535847
[47] M. Felleisen and R. Hieb, “The revised report on the syntactic theories
of sequential control and state,” Theoretical computer science, vol.
103, no. 2, pp. 235–271, 1992.
[48] F. Henglein, “Dynamic typing: Syntax and proof theory,” Sci.
Comput. Program., vol. 22, no. 3, pp. 197–230, 1994. [Online].
Available: http://dx.doi.org/10.1016/0167-6423(94)00004-2
[49] A. Rastogi, P. Mardziel, M. Hammer, and M. Hicks, “Knowledge
inference for optimizing secure multi-party computation,” in PLAS,
2013.
[50] C. Fournet, M. Kohlweiss, and P.-Y. Strub, “Modular code-based
cryptographic verification,” in Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011.
| 6cs.PL
|
Antifragility for Intelligent Autonomous Systems
arXiv:1802.09159v1 [cs.AI] 26 Feb 2018
Anusha Mujumdar, Swarup Kumar Mohalik, Ramamurthy Badrinath
Ericsson Research, Bangalore
anusha.pradeep.mujumdar, swarup.kumar.mohalik,[email protected]
Abstract
Antifragile systems grow measurably better in the
presence of hazards. This is in contrast to fragile
systems which break down in the presence of hazards, robust systems that tolerate hazards up to a
certain degree, and resilient systems that – like selfhealing systems – revert to their earlier expected
behavior after a period of convalescence. The notion of antifragility was introduced by Taleb for
economics systems, but its applicability has been
illustrated in biological and engineering domains
as well. In this paper, we propose an architecture
that imparts antifragility to intelligent autonomous
systems, specifically those that are goal-driven and
based on AI-planning. We argue that this architecture allows the system to self-improve by uncovering new capabilities obtained either through the
hazards themselves (opportunistic) or through deliberation (strategic). An AI planning-based case
study of an autonomous wheeled robot is presented.
We show that with the proposed architecture, the
robot develops antifragile behaviour with respect to
an oil spill hazard.
1
Introduction
How should an intelligent, autonomous system adapt to unforeseen situations? Answering this question has been the
focus of significant research effort over the last two decades
[Hayes-Roth, 1995]. However, the notion of adaptivity has
so far been limited to a system’s capability to cope with unknown situations and return, at best to its original performance. In this work, we argue that the presence of unforeseen
stressors, or hazards, offers a system an opportunity to selfimprove. Such self-improvement in the presence of hazards
is the central notion of antifragility.
The term antifragility was coined by Nicholas Taleb in his
book [Taleb, 2012], in which he argued that the opposites of
fragile systems are not robust or resilient systems, but systems that benefit from hazards and grow stronger as a result.
These concepts and their relationships are compelling and
have been illustrated in many domains such as economics, biology and engineering. However, the literature does not provide any suggestion towards formalization of the concepts,
due to which there are no concrete guidelines for designing an antifragile system. In this paper, we address this gap
by formalizing the notions of fragility, robustness, resilience
and antifragility in the context of intelligent systems, in particular, for a large subclass of systems that are based upon
knowledge-based reasoning and AI planning. We show that
antifragile intelligent systems can be designed using a refinement of MAPE-K (Monitor, Analyse, Planning and Execution - Knowledge), the autonomic architecture suggested by
IBM [IBM, 2005].
The paper is organized as follows. We briefly review some
background work on antifragility in section 2. Section 3 lays
out the scope of the current study, and describes our approach
towards introducing antifragility concepts into intelligent systems. Section 4 details the intelligent systems model followed, and formalizes concepts of fragility and antifragilility in such systems. Section 5 proposes design modules for
antifragility, to be augmented to an existing autonomic computing architecture of intelligent systems. In section 6, we
illustrate the developed concepts with the help of a robot path
planning example. We conclude in section 7 with some future
directions.
2
Related Work
Systems that degrade in behavior when acted upon by external hazards (or, stressors) are known as fragile systems. Robust systems display tolerance to hazards upto a certain predesigned level, and show no change in performance. If the
magnitude of the hazard exceeds this level, system performance rapidly degrades. An example of a robust system is
a building designed to withstand an earthquake of a particular magnitude. Resilient systems are affected by hazards, but
return to normal performance after a hiatus. Robust and resilient systems have been studied extensively as a means to
allow intelligent systems to cope with hazards [Russell et al.,
2015]; however, in such systems, the performance, at best,
retains its original behavior.
Taleb notes that certain systems, in fact, benefit from the
presence of hazards, and that these systems need to be distinguished from being merely robust or resilient. Such systems
abound in nature e.g., the immune system strengthens itself
upon encounter with an antigen and often retains the developed coping capability permanently [Monperrus, 2017]. Another example is muscular strength being developed by the
stressor of exercise [Jones, 2014]. The increase in strength so
developed improves the capability of the muscle to perform a
wide variety of tasks many of which may be unrelated to the
exercise that initially triggered it. In environmental ecosystems [Taleb, 2012], the presence of a hazard in the form of a
predator strengthens the surviving prey population, since they
learn from past experience.
Antifragile systems have been studied in the literature
in the context of communication systems [Lichtman et al.,
2016], infrastructure networks [Fang and Sansavini, 2017],
aerospace [Jones, 2014], health care [Clancy, 2015] and
cloud systems [Johnson and Gheorghe, 2013]. All of these
emphasize the following characteristics of antifragile systems:
• Such systems thrive in the presence of hazards, as opposed to robust systems that simply endure, and resilient
systems which merely survive and return to original performance at best.
• Antifragile systems learn from failure to handle hazards;
the failure may be their own or of other members in a
population-based system.
• When acted upon by hazards, the system responds in
a fashion that improves its performance over time (not
necessarily immediately); the improvement is through
acquisition of new capabilities caused by deliberate
strategies by the system or through the opportunistic exploitation of certain attributes of the hazard itself.
The literature, in general, does not provide formal definitions
of the concepts of fragility, robustness, resilience and antifragility. In [Lichtman et al., 2016], antifragility is demonstrated mathematically for a particular hazard in a communication system, but the definitions are specific to the problem
and are not generic enough to be applicable to other systems.
3
Our Scope and Approach
In this paper, we wish to formalize the concepts of antifragility in the context of intelligent systems. Specifically,
we consider the class of systems that are goal-driven and
based on AI planning. These systems have a fixed set of actions. Given goals and constraints, they attempt to achieve the
goals by deriving a sequence (called plan) from the available
actions and then executing the plan.
An intelligent system can be fragile because hazards encountered during execution may drive the system to states
from where it cannot find a plan to achieve its goals. If, on
the other hand, it is able to find an alternate plan to lead to
the goals no matter where the hazards drive it to, it is designated resilient. Note that if the system is able to find plans
that avoid the hazards altogether then occurrence of hazards
do not affect the plans - such a system is robust w.r.t. the hazards. This is possible in many cases since most hazards are
localized (e.g. traffic jam, corruption of memory block).
A crucial point to note is that robustness and resilience
uses plans over actions available with the system. However, antifragile systems, by definition, must become stronger
when a hazard occurs. In the intelligent systems, we correlate
strength with available plans and take a position that a system is stronger if there are more plans available. This can be
implemented by introducing new actions in the system. As
a consequence, a system that was fragile w.r.t. some hazards
may now become robust and/or resilient. This is consistent
with the observation in antifragility literature that new capabilities introduce redundancy, which brings beneficial effects
through resilience and robustness.
Modeling the above notion of antifragility in the context of
intelligent systems has a difficulty. In the antifragility literature, new capabilities are introduced through external entities (e.g. medicine) or through realization of already existing
capabilities (e.g. exercise). However, the intelligent systems
that we consider have fixed sets of actions and do not have access to any external source for new actions1 . We ameliorate
this situation by partitioning the set of actions into visible and
hidden subsets. At any point of time, the plan synthesis algorithms have access to only the visible subset. Actions can be
brought in from the hidden set to introduce new actions for
the planner. One can argue that such an approach is “artificial” because the system by default has access to all actions,
which results in the largest set of plans possible. However,
our approach is realistic and has a strong rationale: first, due
to the smaller visible set, planning is more efficient. More
importantly, there is a cost to support the planning and execution of actions (more sensors and actuators, more predicates,
larger state space). Therefore, it is advisable to consider only
a subset of the actions that are necessary in the current situation and enhance the subset only when in need (e.g. to handle
a hazard). This is accurately captured by the partition of the
actions into visible and hidden sets.
An antifragile intelligent system must therefore first decide
what actions are made visible, when and for what duration,
and then execute these decisions. We show that by suitable
refinement of the MAPE-K loop mentioned in the introduction, with refined action sets and appropriate modules, one
can obtain an architecture to design intelligent systems that
exhibit antifragility. In the rest of this section, we give some
details of the base MAPE-K loop.
Intelligent systems based on AI planning can be implemented using the MAPE-K loop (see Fig. 2). It comprises the
Monitor, Analyzer, Planner, Executor and Knowledge modules orchestrated in a loop by the Autonomic Manager. The
Monitor module is responsible for gathering relevant state information from the resources to detect the events of interest. This information is then used by the Analysis module
to determine if there is a need to change the current plan (sequence of actions) which is being executed. The change may
be necessitated due to a change in the goals of the system
or changes in the environment which force a course correction. The Planning module is then called upon to synthesize a
new plan for the changed goals/context. The Execution module uses the generated plan to resume its execution. During
the monitoring of the environment and execution, the system derives knowledge about the environment and possible
responses that it can store in a knowledge-base . This knowl1
We note that the generalization to “open” intelligent systems is
certainly interesting, and we leave this direction for future work.
edge is used to derive faster and better responses as the system
continues to interact with the environment.
4
System Model
We model an intelligent system A as a goal-driven, planningbased agent interacting with an environment E . The interaction is specified as a game where the environment supplies a goal and the agent tries to achieve the goal through
a plan (sequence of actions). Once a goal is achieved, the
environment supplies another goal and thus the game continues ad infinitum. During the execution of the plan, the environment may change the state of the system nondeterministically, capturing the notion of hazards. The type of response
from A determines whether it is fragile, robust, resilient or
antifragile.
Formally, we have a finite set of boolean predicates Q, and
the system states S are defined as all valuations V : Q →
{true, false}. The environment E is specified through a set of
goal states G ⊆ S, goal transitions TG ⊆ G × G (also called
missions) and a set of hazard transitions H ⊆ S × S. For a
hazard (s, t), s is referred to as the hazard source and t the
hazard consequence. There is a special subset W of G called
the waypoints.
The intelligent system A is defined over of a set
of actions Act where each action is specified by a
hprecondition, ef f ecti pair with precondition, effect ⊆ Q.
Act induces a deterministic labeled graph SAct with S as the
nodes and edges (s, a, t) when precondition(a) is consistent with s and t = s ← effect(a) denoting the values of the
predicates in s being overridden by effect(a). A sequence of
actions P , is a plan for a pair of states (c, g) if starting at the
initial state c and applying the actions in P consecutively, we
arrive at the goal state g. The corresponding path is denoted
as path(P, c, g). We assume that the system has a special
reset action which moves it to one of the waypoints i.e. for
every state s ∈ S, there is a waypoint w ∈ W such that
(s, reset, w) ∈ SAct .
The minimal notations above are sufficient to define the
following concepts succinctly.
Definition A plan P for (c, g) is fragile w.r.t H if there is
state s on path(P, c, g) and (s, t) ∈ H such that there is no
plan P 0 for (t, g).
A plan P for (c, g) is robust w.r.t a set of hazards H, if for
all (s, t) ∈ H, s is not on path(P, c, g).
A plan P for (c, g) is resilient w.r.t H, if for all (s, t) ∈ H,
s is on path(P, c, g) implies there is a plan P 0 for (t, g).
A fragile plan is one which goes through a state where a
hazard can occur and the from the hazard consequence state
one cannot achieve the intended goal state. A robust plan
completely avoids the states where hazards can occur. A resilient plan switches to another starting from the hazard consequence state when a hazard occurs. These plans are illustrated in Figure 1 (in (b) the dotted path on the left corresponds to a robust plan). One can extend these definitions to
the entire system.
Definition An intelligent system is fragile w.r.t H if there is
a mission (c, g) such that all plans for (c, g) are fragile w.r.t.
H.
Figure 1: Fragile, Robust and Resilient Plans
An intelligent system is robust w.r.t a set of hazards H if
for every mission (c, g), there is a robust plan w.r.t. H.
An intelligent system is resilient w.r.t. H if, for every mission (c, g), any plan P for (c, g) is resilient w.r.t. H.
Corollary 4.1 An intelligent system is not fragile w.r.t. H if
it is either robust or resilient w.r.t. H.
Robustness and resilience are independent concepts, i.e. a
system may be robust w.r.t. a hazard h because there is a
robust plan for every mission, but there may be other plans
which enable a hazard and are not resilient. Similarly, all the
plans for the missions may be resilient but there may not be a
single robust plan.
Fragility, robustness and resilience refers to a given system.
However, antifragility points to the capability of systems to
evolve from fragile to not fragile. This is how we define the
notion of “an antifragile system becomes stronger” due to the
occurrence of hazards.
Definition An intelligent system A is Antifragile w.r.t. a set
of hazards H if, A is fragile w.r.t H implies A eventually becomes either resilient or robust to H.
A corollary of the definition is that whereas there was no plan
for (t, g) for some hazard consequence t and goal g originally,
there needs to be such plan to have resiliency. Similarly, there
has to be new paths for some mission (s, g) to have robustness. This implies there is a need to introduce new actions for
the agent.
As one can see, the definition of antifragility leaves a number of dimensions unspecified. When there is a hazard, if
there is no alternate plan, it does not specify whether the improvement through new actions should happen immediately
or at a future time, whether the improvement should be for
a limited duration (say, till the current goal) or permanent,
whether the improvement should be for the specific hazard
only or a related larger set. We note that such decisions depend upon predictive capabilities of the system and cost considerations that must be left for the designer.
5
Implementation
In this section, we describe the refinements for the MAPE-K
loop and also suggest some design decisions for the unspecified dimensions mentioned in the previous section as a guide
for system designers.
({Now, Later}), D denoted duration of improvement ({Current, All}) and M denotes mode of handling({Robust, Resilient})
Note that the hW, D, M i’s are only recommendations. The
system will “improve” for any value of M. W denotes that
the urgency of improvement and D controls whether the new
actions are necessary for longer term.
5.4
Figure 2: Intelligent System with MAPE-K Architecture
5.1
Knowledge
The Knowledge module (KM) has a set of actions. As
observed in Section 3, the key idea for introducing new
actions is partitioning the actions Act into 3 classes:
Acte (empowering), Actv (visible) and Acth (hidden). All actions a have an associated visibility predicate visiblea . The
membership of action a in Actv or Acth is determined by the
boolean value of visiblea in the current state. Visibility predicates can be set to True only through empowering actions, or
by the hazards themselves, though they can be set to False by
all actions and hazards.
Apart from the actions, the knowledge base maintains a
history of hazards that have occurred and a set of visibility
predicates called internal goals. The latter are essentially the
predicates which can possibly be achieved through planning
and execution of empowering actions. Through this, the Manager can make some of the hidden actions visible in the future
in a deliberate and strategic way.
5.2
Monitor
The normal role of Monitor in MAPE-K is to access the current state of the system and detect anomalies if any. Here,
the Monitor detects a hazard through the inconsistency of the
current state (c) and the desired precondition of the action-tobe-executed. In case of a hazard, it records the hazard (e, c) in
the knowledge base, where e is the state that had been reached
after the execution of the previous action.
5.3
Analyzer
The design decisions we mentioned are mostly in the Analyzer module. The Analyzer refers to the history of the hazards, domain knowledge including cost etc (which could be
based upon analytics, for example, and taking into account
the impact of the hazard on the achievement of the current
goal) and outputs the following in the event of a hazard:
Planner
Given the current state, a goal state, set of actions, a set of
hazards and the recommendation from the analyzer, the Planner synthesizes a plan using only the visible actions. First,
it determines the current state space from the predicates used
in Actv . Note that since Actv is dynamic, the state space
also changes dynamically. It is expected that the Monitor can
query the environment and find the correct current state at
any level of detail (e.g. accessing the appropriate sensors and
processing modules outputting the predicates).
Plan synthesis may fail because of several reasons. All of
visible or hidden actions may not be sufficient to provide new
plans. This is a pathological case where external support is
mandatory. There may not be plans satisfying the recommendation in which case the best effort improvement is done. For
example, if a robust plan cannot be found, the Planner tries
to find a resilient one. Or, if robust plan cannot be found for
all missions, it finds one for the current mission and so on.
Specific behavior depends upon Planner policies.
5.5
Executor
The Executor module is pretty simple: given a plan which
is a labeled sequence of transitions in Sact , it executes the
actions associated with the labels in the sequence order taking
help of the Monitor to detect hazards. If there is a hazard,
the Executor halts the execution, signals the Manager that a
hazard has taken place and appends the hazard to the history
in the knowledge base. In the best case, the Executor finishes
executing the plan without countering any hazard and signals
the environment about plan completion. The Environment
then can issue a new goal which is handled by Autonomic
Manager.
When the Manager decides to issue a reset action, it is issued directly to the Executor. Just as it executes a plan, the
Executor executes the reset action which leads to a waypoint
(a special goal state). The reset completion signal to the Environment allows it to continue the game with a new goal.
5.6
Autonomic Manager
Autonomic manager is essentially an orchestrator for other
components in MAPE-K, but has a greater role in antifragile
intelligent systems since the life cycle is no longer just a loop.
The reactive behavior of the Manager is as follows:
1. It first determines a set of hazards (including the present
one) that needs to be handled, by predicting and/or correlating with the present hazard.
1. When E issues a new goal, Manager passes the goal
along with the Actv , corresponding current state, hazards and hW, D, M i recommendations to the Planner for
plan synthesis.
2. It outputs for each hazard a three-tuple hW, D, M i
where W denotes immediate or future improvement
2. When E introduces a hazard, the Manager gets the signal from the Executor. It invokes the Planner as in (1)
to first find if there is a resilient plan already in the current SActv . If no such plan exists, then it invokes the
Analyzer to get possibly a set of hazards H 0 with the
hW, D, M i recommendations. For space reasons, assume that there is a single hazard to be handled. The
case of multiple hazards is routine though tedious.
(a) Manager invokes Planner to use both visible and
hidden actions to come up with a plan P with minimum number of hidden actions if possible depending upon mode M of the hazard h. If it is possible
to synthesize a plan, then it records the visibility
predicates P redv (h) of the hidden actions in P .
(b) If W==Later, then Manager issues reset to the Executor, but in a separate, parallel thread triggers the
Planner to achieve the visibility predicates and execute the plan subsequently. This is so that during
the planning and execution for other missions, hidden actions are enabled gradually.
(c) If W==Now, then Manager triggers the planner to
first achieve P redv (h), which ensures new actions
in Actv and then invoking P for the current goal.
(d) If D == Current, then the visibility predicates are
toggled by the Manager as soon as the current goal
is achieved.
Thus, whenever there is a hazard, if there is a possibility of
having a robust or resilient system w.r.t. the hazard using
extra hidden actions, those actions are made visible. This ensures that whenever there is a new goal, the system is able
to find a plan (robust or resilient) for the goal. Note that for
completely different goals, the system may not find robust/resilient plans in SAct , hence a similar exercise is carried out to
make more actions visible.
In the antifragility literature, it is noted that certain systems may perform better under hazards (e.g. adrenaline rush
enabling great strength in stress conditions). In a way, this
attribute is captured in our setup by the fact that a hazard may
lead to a state where certain visibility predicates are set to
True and hence the agent has access to (possibly) more number of visible actions for planning. On the other hand, building up resources to enable more strength or immunity is a deliberate process and this is captured by the internal planning
with empowering actions.
6
Case Study
We illustrate the concepts discussed in this paper within
a path planning scenario. We consider a wheeled robot
A autonomously navigating in its world (e.g., a warehouse).
The mission is split into a sequence of goals, with the next
goal being planned for once the current goal is successfully
achieved. Each goal is nothing but a position the robot has to
reach on a sparse 5×6 grid of equally sized cells.
In a simplistic scenario, the robot has the following visible actions: MOVE and TURN using which it navigates the
sparse grid. Traditional path planning is used to compute the
optimal sequence of actions that take the robot from an initial
position to the given goal. The robot’s behavior also has two
other actions smallMOVE and smallTURN. These two are
initially not visible (hidden actions). These two require additional support from the environment during execution, for
example they need sensors to locate the robot on a finer grid.
Therefore we assume additional empowering actions are typically needed before one can use these hidden actions; the
preconditions for these actions account for that requirement
through appropriate predicates.
During execution, A follows the computed plan. An oil
spill, unknown at the time of planning, is encountered, which
throws the robot off the planned path and hence the original
plan is not applicable (shown by point (1) in Figure 3(b)).
Thus the robot discovers it has encountered a hazard.
The Autonomic Manager now uses external information
(camera images, image analytics etc.) to identify that the
hazard is an oil spill and uses domain knowledge to derive
the fact that MOVE and TURN actions cannot be used in the
oil spill. Therefore it makes these actions Hidden, and sets
the visibility predicates of smallMOVE and smallTURN as
an internal goal. The Planner uses the prerequisite empowering actions to prepare the current state and ultimately makes
the smallMOVE and smallTURN actions visible. The robot’s
domain view when these actions are enabled is shown in Figure 3(b). To support this world view, note that the environment needs to be able to provide the right kind of sensory
information (e.g., fine grid positions).
For the purposes of this illustration, we assume that
smallMOVE and smallTURN actions are deterministic and
have the intended effect2 . Various possibilities exist for replanning with these additional actions and it depends upon
the Planner. As shown in Figure 3(b), the robot can navigate
from within the oil spill, with smallMOVE and smallTURN
actions to a known state on the earlier plan (red path), it can
come out of the oil spill as early as possible and then navigate
the the known state (yellow path) and it could directly find
the a path to the current goal, abandoning the earlier plan. As
we have mentioned, getting out of the oil spill may be treated
as a hazard as a response to which MOVE and TURN actions
be made visible, and the robot now has all the four actions at
its disposal for planning the new paths.
Figure 4 shows a second goal sequence after the first goal
has been successfully reached. We note that the path avoids
known oil spills, due to the awareness of this new entity in
the environment. While following the path, a new oil spill
that did not exist at plan-time may be encountered. In this
case, the robot uses its newly visible actions to easily cope.
In Figure 4, the red curve (4) shows the path using these new
capabilities. We also note that these new actions may also be
used as planned actions to navigate through known oil spills
even at original plan time possibly resulting in a lower cost
path. Thus in reaching the second goal if the red oil spill
was known, it could still have chosen the path through the oil
spill, the blue line - (5), using the newly visible actions for
this stretch appropriately.
As mentioned in the Implementation, Analyzer with the
help of Knowledge module can generalize the specific oil
spill hazard to other hazards such as ice, slippery sand etc.
2
A reasonable assumption when referring to sufficiently small
steps on slippery surfaces.
(a) Originally planned path
(b) Hazard mode triggered by oil-spill hazard
Figure 3: Robot path planning example: first goal sequence
Figure 4: Robot path planning example: second goal sequence
by identifying that the hazard consequence state is similar
and also from the knowledge that these surfaces have similar
properties. With this, similar uncovering of hidden actions
can be done for all such hazards. This shows the dimension
of the antifragile architecture where occurrence of one hazard
builds antifragility for a class of other hazards.
This illustrative example has shown that it is possible for
an intelligent system to develop antifragility through the suggested refinements and suitable design decisions in the base
MAPE-K architecture.
7
Summary and Further Work
In this paper we have defined antifragility in the context of
intelligent systems which are goal-directed and based on AI
planning. We have shown that antifragile intelligent systems
can be built using the MAPE-K architecture though with several additional features. Primarily, the available action set
should be divided into empowering, visible, and hidden subsets. Depending on the strategy of the Autonomic Manager
module, the system is made robust or resilient to the hazard in different manners, correctly capturing the essence of
antifragility. The proposed architecture has been illustrated
through a robotics path planning example, where a robotic
agent A performs better after encountering a hazard.
One immediate problem arises that must be studied: that of
optimization of the selection process through which hidden
actions are made visible. Efficiency of algorithms to select
the minimal number of new actions that will allow robustness/resilience is critical from the view of real-time systems.
We observe that the improvement of the systems is triggered by hazards in antifragility literature. In an indirect way,
by defining hazards as any violation of cost metrics, one can
bring in improvements through new actions that will result
in more efficient plans even though the system does not encounter “unforeseen” hazards. The simian army in [Abid et
al., 2014] used to inject faults and create hazards to improve
the systems is similar in spirit.
We note that this work is an initial effort to study the concept of antifragility in the context of intelligent systems, and
therefore is rather preliminary. Undoubtedly, rigorous implementation and verification of the developed ideas is needed.
In addition, the notion of performance improvement from antifragility, albeit intuitively true, must be quantified in the current context. We believe that the real value of building antifragile systems will become evident as we develop complex
multi-agent systems. Therefore, distributed antifragility, built
into a population of systems, is an interesting future direction.
The potential applications of a system that improves from the
presence of hazards is vast. We hope that the promise of
antifragile intelligent systems will stimulate further research
within the intelligent systems community.
References
[Abid et al., 2014] Amal Abid, Mouna Torjmen Khemakhem, Soumaya Marzouk, Maher Ben Jemaa, Thierry
Monteil, and Khalil Drira. Toward antifragile cloud
computing infrastructures. Procedia Computer Science,
32(Antifragile):850–855, 2014.
[Clancy, 2015] Thomas R. Clancy. Complexity, Flow, and
Antifragile Healthcare Systems. JONA: The Journal of
Nursing Administration, 45(4):188–191, 2015.
[Fang and Sansavini, 2017] Yiping Fang and Giovanni
Sansavini. Emergence of antifragility by optimum postdisruption restoration planning of infrastructure networks.
Journal of Infrastructure Systems, 23(4):04017024, 2017.
[Hayes-Roth, 1995] Barbara Hayes-Roth. An architecture
for adaptive intelligent systems. Artificial Intelligence,
72(1-2):329–365, 1995.
[IBM, 2005] An architectural blueprint for autonomic computing. Technical report, IBM, 2005.
[Johnson and Gheorghe, 2013] John Johnson and Adrian V.
Gheorghe. Antifragility analysis and measurement framework for systems of systems. International Journal of Disaster Risk Science, 4(4):159–168, 2013.
[Jones, 2014] Kennie H. Jones. Engineering antifragile systems: A change in design philosophy. Procedia Computer
Science, 32(Antifragile):870–875, 2014.
[Lichtman et al., 2016] Marc Lichtman, Matthew T. Vondal,
T. Charles Clancy, and Jeffrey H. Reed. Antifragile Communications. IEEE Systems Journal, pages 1–12, 2016.
[Monperrus, 2017] Martin Monperrus. Principles of antifragile software. In Companion to the first International
Conference on the Art, Science and Engineering of Programming, page 32. ACM, 2017.
[Russell et al., 2015] Stuart Russell, Daniel Dewey, and Max
Tegmark. Research priorities for robust and beneficial artificial intelligence. AI Magazine, 36(4):105–114, 2015.
[Taleb, 2012] Nassim Nicholas Taleb. Antifragile: Things
that gain from disorder, volume 3. Random House Incorporated, 2012.
| 2cs.AI
|
A Polynomial Algorithm for Balanced Clustering via Graph
Partitioning∗
Luis Evaristo Caraballo†
José-Miguel Dı́az-Báñez‡
Nadine Kroher§
arXiv:1801.03347v2 [cs.CG] 25 Jan 2018
January 26, 2018
Abstract
The objective of clustering is to discover natural groups in datasets and to identify geometrical structures which might reside there, without assuming any prior knowledge on the
characteristics of the data. The problem can be seen as detecting the inherent separations
between groups of a given point set in a metric space governed by a similarity function. The
pairwise similarities between all data objects form a weighted graph adjacency matrix which
contains all necessary information for the clustering process, which can consequently be formulated as a graph partitioning problem. In this context, we propose a new cluster quality measure
which uses the maximum spanning tree and allows us to compute the optimal clustering under
the min-max principle in polynomial time. Our algorithm can be applied when a load-balanced
clustering is required.
1
Introduction
The objective of clustering is to divide a given dataset into groups of similar objects in an unsupervised manner. Clustering techniques find frequent application in various areas, including
computational biology, computer vision, data mining, gene expression analysis, text mining, social
network analysis, VLSI design, and web indexing, to name just a few. Commonly, a metric is used
to compute pair-wise similarities between all items and the clustering task is formulated as a graph
partitioning problem, where a complete graph is generated from the similarity matrix. In fact,
many graph-theoretical methods have been developed in the context of detecting and describing
inherent cluster structures in arbitrary point sets using a distance function[2].
Here, we propose a novel clustering algorithm based on a quality measure that uses the maximum
spanning tree of the underlying weighted graph and addresses a balanced grouping with the minmax principle. More specifically, we aim to detect clusters which are balanced with respect to
∗
This research has received funding from the projects COFLA2 (Junta de Andalucı́a, P12-TIC-1362) and GALGO
(Spanish Ministry of Economy and Competitiveness and MTM2016-76272-R AEI/FEDER,UE).
This work has also received funding from the European Union’s Horizon 2020 research and innovation
programme under the Marie Sklodowska-Curie grant agreement No 734922.
†
Department of Applied Mathematics II, University of Seville, Spain. L.E.C. is funded by the Spanish Government
under the FPU grant agreement FPU14/04705. Email: [email protected].
‡
Department of Applied Mathematics II, University of Seville, Spain. Email: [email protected].
§
Department of Applied Mathematics II, University of Seville, Spain. Email: [email protected].
1
Figure 1: Illustration of the desired cluster properties: The ratios of inner variance to distance to
other clusters is balanced among groups. Clusters 1 and 4 exhibit a higher variance but are also
further apart from the other clusters.
their ratio of intra-cluster variance to their distance to other data instances. In other words, we
allow clusters with a weaker inner edges to be formed, if they are located at large distance of other
clusters (Figure 1). We prove that an optimal clustering under this measure can be computed in
polynomial time using dynamic programming.
Such cluster properties are typically desired when grouping sensors in wireless sensor networks [1]: Each group communicates only with sensors in the same cluster and streams its information to a single command node located inside the cluster. The power consumption of sensors
heavily depends on their distance to the command node and ideally, a balanced consumption among
sensors is desirable. Consequently, a grouping should be balanced with respect to the ratio of interconnection (sharing information between clusters) and intra-connection (sharing information within
a cluster). A similar scenario occurs in the context of multi-robot task allocation in cooperative
robotics, where the goal is to allocate tasks to robots while minimizing costs. For example, in
monitoring missions, using a cooperative team of Unmanned Aerial Vehicles (UAVs), the goal is
to minimize the elapsed time between two consecutive observations of any point in the area. Techniques based in area partitioning achieve this by assigning a sub-area to each UAV according to its
capabilities. In this scenario, a load balanced clustering extends the life of the agents and allows
to perform the task in a distributed manner [8, 3]. Another possible application area arises from
the field of Music Information Retrieval[5], where several applications rely on the unsupervised
discovery of similar (but not identical) melodies or melodic fragments. In this context, clustering
methods can be used to explore large music collections with respect to melodic similarity, or to
detect repeated melodic patterns within a composition[7].
1.1
Related work
Graph clustering refers to the task of partitioning a given graph G(V, E) into a set of k clusters
C = {C1 , . . . , Ck } in such a way that vertices within a cluster are strongly connected whereas clusters are well separated. A number of exact and approximate algorithms have been proposed for
this task, targeting different types of graphs (directed vs. undirected, complete vs. incomplete,
etc.) and optimizing different cluster fitness values (i.e. maximizing densities, minimizing cuts).
For a complete overview of existing strategies and their taxonomy, we refer to [9]. The algorithm
proposed in this study operates on the maximum spanning tree M ST (G) of graph G. The idea
of using minimum or maximum spanning trees (when working with distances or similarities, respectively) for cluster analysis goes back as far as 1971, when Zahn demonstrated [12] various
properties which indicate that the minimum spanning tree serves as a suitable starting point for
graph clustering algorithms and proposes a segmentation algorithm based on a local edge weight
inconsistency criterion. This criterion was revisited and improved in [6]. Asano et al. [2] show
2
that both, the optimal partitioning minimizing the maximum intra-cluster distances and the partitioning maximizing the minimum inter-cluster distance, can be computed from the maximum and
minimum spanning trees. In the context of image processing, Xu et al. [11] propose a dynamic
programming algorithm for segmenting gray-level images which minimizes gray level variance in
the resulting subtrees. Felzenszwalb et al. [4] introduced a comparison predicate which serves as
evidence for a cluster boundary and provide a bottom-up clustering algorithm in O(n log n) time.
In the context of Gene Expression Data Clustering, Xu et al. [10] proposed three algorithms for
partitioning the minimum spanning tree optimizing different quality criteria.
2
Problem statement
Let V = {v1 , v2 , . . . , vn } be a set of points or nodes in a metric space and suppose that there exists a
function to estimate the similarity between two nodes. Let A be the matrix of similarity computed
for every pair of elements in V . The value A[i, j] is the similarity between the nodes vi and vj . If
A[i, j] > A[i, l], then the node vi is more similar to vj than vl . Our goal is to create groups, such
that similar nodes are in the same cluster and dissimilar nodes are in separate clusters.
Let G = (V, E, w) be a weighted and undirected graph induced by the similarity matrix A on the
set of nodes V . In the sequel, such graphs are simply referred to as “graph”. If E is the set of edges
and contains an edge for every unordered pair of nodes, and w is a weight function w : E −→ (0, 1)
such that w(e) is the similarity between the nodes connected by e (i.e. if e = {vi , vj }, then
w(e) = A[i, j]).
Let C ⊆ V be a cluster. The outgoing edges set of C, denoted by Out(C) , is the set of edges
connecting C with V \ C. Let M ST (C) be the maximum spanning tree of C. Let max(Out(C))
and min(M ST (C)) be the weights of the heaviest and lightest edges of Out(C) and M ST (C),
respectively.
We can use the following function as a quality measure of a cluster C:
0
if C = V,
max(Out(C)) if |C| = 1,
Φ(C) =
max(Out(C))
in other case
min(M ST (C))
Note that higher values of Φ(·) correspond to worse clusters. Also, note that, if |C| = 1 then
max(Out(C))
we can consider min(M ST (C)) = 1 and then Φ(C) = max(Out(C)) = min(M
ST (C)) . In addition, if
max(Out(C))
C = V then we can consider max(Out(C)) = 0 and then Φ(C) = 0 = min(M
ST (C)) .
Let C = {C1 . . . , Ck } be a clustering formed by k > 1 clusters of G. To evaluate the quality of
k
C we use the quality of the worst cluster of C, that is, Φ(C) = max{Φ(Ci )}.
i=1
Denoting the set of all possible k-clusterings (clustering scenarios formed by k clusters) on G
by P(k , G), we state the following optimization problem (MinMax Clustering Problem):
min Φ(C)
subject to: C ∈ P(k , G).
3
(1)
A0
A
v0
v
Figure 2: Representation of a graph’s bipartition. The crossing edges of this bipartition are indicated by dashed lines.
When the value of k is unknown, the problem can be stated as follows:
min Φ(C)
n
[
P(k , G).
subject to: C ∈
(2)
k=2
That is, to find the clustering C ∈ P(k , G) such that Φ(C) is minimum among all possible clusterings
with more than one cluster irrespective of the number of clusters contained in it.
3
Properties of the optimal clustering
Note that the problems stated above can be generalized to connected (not necessarily complete)
graphs, by simply setting P(k , G) as the set of all the possible partitions of G in k connected
components.
Lemma 1. Let G be a graph and let C ∗ be an optimal clustering of G for Problem 1 in P(k , G).
Then, Φ(C ∗ ) ≤ 1.
Proof. If k = 1, Φ(C ∗ ) ≤ 1. If k > 1, then take the maximum-spanning-tree of G and denote it
by T = M ST (G). Let C = {C1 , . . . , Ck } be the clustering induced by the k connected components
obtained by removing (or “cutting”) the k − 1 lightest edges from T . If |Ci | = 1 then Φ(Ci ) < 1
since w(e) ∈ (0, 1) for all edge e in the graph. If |Ci | > 1, then min(M ST (Ci )) ≥ max(Out(Ci ))
(according to properties of a maximum-spanning-tree), therefore Φ(C) ≤ 1. The result follows.
Before showing the next lemma, we recall the definition of the crossing edge. Let G = (V, E)
be a graph and let B = {A, A0 } be a bipartition of V . An edge {v, v 0 } ∈ E is a crossing edge of B
if v ∈ A and v 0 ∈ A0 (see Figure 2).
Lemma 2. Let G be a graph and let C ∗ be an optimal clustering of G for Problem 1. Let C be a
cluster in C ∗ . If |C| > 1, then every bipartition of C has a crossing edge in a maximum spanning
tree of G.
Proof. We prove by contradiction. Let C be a cluster in C ∗ with cardinality greater than 1 and let
{A, A0 } be a partition of C such that there is no edge from A to A0 in a maximum spanning tree of G.
4
Let e be the heaviest edge that crosses from A to A0 . Let M ST (G) be a spanning tree of G. Due to
our assumption, e ∈
/ M ST (G) and therefore, adding e to M ST (G) results in a cycle. All other edges
in this cycle have a weight equal or greater than e, given by the properties of the maximum spanning
tree. Let e0 be an edge in this cycle connecting a node in C with others in V \ C. If w(e) = w(e0 ),
then replacing e0 by e in M ST (G) we obtain another maximum spanning tree containing e and thus,
this is a contradiction. If w(e) < w(e0 ), then max(Out(C)) ≥ w(e0 ) > w(e) ≥ min(M ST (C)).This
is a contradiction by Lemma 1.
Theorem 3. Let G be a graph and let C ∗ ∈ P(k , G) be an optimal clustering of G for Problem 1.
For every cluster C ∈ C ∗ , the maximum spanning tree of C is a subtree of a maximum spanning
tree of G and the heaviest outgoing edge of C is in a maximum spanning tree of G.
Proof. Let C be a cluster of C ∗ . If |C| = 1 then, obviously, M ST (C) ⊂ M ST (G). If |C| > 1 then
M ST (C) ⊆ M ST (G) by Lemma 2. The second part of the theorem, claiming that the heaviest
edge in Out(C) is in M ST (G), is deduced from the properties of the maximum spanning tree of a
graph.
The following result is directly deduced from the theorem above.
S
Corollary 4. Let G be a graph and let C ∗ ∈ nk=1 P(k , G) be an optimal clustering of G for
Problem 2. For every cluster C ∈ C ∗ , the maximum spanning tree of C is a subtree of a maximum
spanning tree of G and the heaviest outgoing edge of C is in a maximum spanning tree of G.
v1
C1
v1
v2
v3
v2
v3
v7 C3
v4
v8
v7 C3
v4
v9
v5
C2
C1
C2
v6
(a)
v8
v9
v5
v6
(b)
Figure 3: (a) A graph G and a spanning tree T of G. The edges of T are bold. The clustering
C = {C1 , C2 , C3 } is represented by dotted strokes. (b) Obtaining an optimal clustering C ∗ =
{C1 , C2 , C3 } by cutting two edges in the maximum spanning tree.
Let G be a graph and let T be a spanning tree of G. Note that every possible clustering of T is a
valid clustering in G and therefore P(k , T ) ⊆ P(k , G) (see Figure 3a). However, a valid clustering
of G may be not feasible for T , for example, the clustering {{v1 , v3 , v5 }, {v4 , v6 }, {v2 , v7 , v8 , v9 }} is
valid for the graph G in Figure 3a, but is not feasible for T because the cluster {v1 , v3 , v5 } does
not constitute a connected component in T . Let C be a valid cluster for G and T . Consider
OutT (C) as the set of outgoing edges of C as described earlier, but restricted to the set of edges
forming T . For example, considering G and T in Figure 3a, the set OutT (C1 ) only contains the
edge {v3 , v4 }; however, the set Out(C1 ) contains {v3 , v4 }, {v1 , v5 }, {v1 , v6 }, . . . Analogously, we can
5
apply the same argument to the set of inner edges in the cluster C. We use the analogous notations
M STT (·) to denote the maximum spanning tree of a cluster using only the edges in T ; also, note that
M STT (C) is the subtree of T determined by the nodes of C. Consequently M STG (C) = M ST (C)
and OutG (C) = Out(C).
The previous explanation is needed to introduce the following notions: Let T be a spanning
tree of a graph G. Let C ∈ P(k , T ) be a clustering of T . The evaluation function ΦT (C) operates as
usual, but is restricted to the set of edges forming T . Therefore, the optimal solution for Problem 1
on T is C † ∈ P(k , T ) such that ΦT (C † ) ≤ ΦT (C) for every other clustering C ∈ P(k , T ).
Theorem 5. Let G be a graph and let T be a maximum spanning tree of G. If C ∗ ∈ P(k , G)
and C † ∈ P(k , T ) are the optimal clusterings (for Problem 1) on G and T , respectively; then
Φ(C ∗ ) = ΦT (C † ).
Proof. Let us first prove that Φ(C ∗ ) ≥ ΦT (C † ). Suppose that every cluster C ∈ C ∗ contains a single
connected component in T . Then, for every cluster C ∈ C ∗ , min(M STG (C)) = min(M STT (C))
follows from properties of a maximum spanning tree. Moreover max(OutG (C)) ≥ max(OutT (C))
(because T is a subgraph of G). Therefore, Φ(C) ≥ ΦT (C), which implies Φ(C ∗ ) ≥ ΦT (C ∗ ) ≥
ΦT (C † ).
Suppose now, that some cluster C ∈ C ∗ does not contain a single connected component in T . For
an illustration, see Figure 4 where the cluster C encompasses parts of two connected components
in T . Take an edge e ∈ M ST (C) connecting nodes in two of the different connected components
determined by C in T . Adding e to T will form a cycle in the edges of T . If there exists an edge e0
such that w(e) > w(e0 ) in this cycle, then T is not a maximum spanning tree. Consequently, for all
edges e0 6= e in this cycle w(e0 ) ≥ w(e). Note that this cycle includes edges in Out(C) (if all edges of
this cycle were inner edges of C, then e would connect nodes within the same connected component,
posing a contradiction), then max(Out(C)) ≥ w(e) ≥ min(M ST (C)). Thus 1 ≤ Φ(C) ≤ Φ(C ∗ ).
On the other hand, ΦT (C † ) ≤ 1 by using Lemma 1, so, ΦT (C † ) ≤ Φ(C ∗ ).
Finally, let us prove that Φ(C ∗ ) ≤ ΦT (C † ). For every cluster C ∈ C † , min(M STG (C)) =
min(M STT (C)) and max(OutG (C)) = max(OutT (G)) can be demonstrated using the properties of
the maximum spanning tree. Therefore Φ(C) = ΦT (C), which implies that Φ(C † ) = ΦT (C † ). Then
Φ(C ∗ ) ≤ Φ(C † )m because C ∗ is the optimal clustering on G. This completes the proof.
The following result is directly deduced from the theorem above.
S
Corollary
6. Let G be a graph and let T be a maximum spanning tree of G. If C ∗ ∈ nk=1 P(k , G)
S
and C † ∈ nk=1 P(k , T ) are the optimal clusterings (for Problem 2) on G and T , respectively; then
Φ(C ∗ ) = ΦT (C † ).
As a consequence of the above properties, the optimal k-clustering C ∗ for Problem 1 can be
obtained by “cutting” the k −1 appropriate edges in a maximum spanning tree of G (see Figure 3b).
These edges can be found combinatorially in O(nk−1 ) time. Thus, using a naive approach, the
solution of Problem 2 can be found in O(nn−1 ) time. In the next section, we show an algorithm
which solves both problems in polynomial time in n and k.
4
The algorithm
First, recall that Theorem 5 and Corollary 6 provide a nice property, which allows us to reduce
Problems 1 and 2 from a graph to its maximum spanning tree. Consequently, given a similarity
6
e
C
e0
e
C
e00
(a)
(b)
Figure 4: Representation of a graph G and a clustering C ∗ . Dotted black strokes mark clustering
boundaries. (a) The maximum spanning trees of the clusters are drawn in red. (b) A maximum
spanning tree T of G is drawn in blue. The two connected components partially covered by cluster
C in T are shaded gray.
graph, we can operate on its maximum spanning tree T = (V, E, w). From now on, we will use
E to denote the set of edges in the maximum spanning tree. Observe that every cluster C in T
determines only one subtree of T . Then, using M ST (C) to denote the maximum spanning tree in
C may be confusing or redundant. Therefore, instead of using M ST (C), we will use E(C) (set of
edges connecting nodes in C).
The following technical lemma is crucial for the correctness of our algorithm.
Lemma 7. Let C be a clustering of a tree T = (V, E, w). By removing an edge of T we induce two
clusterings, one for each generated subtree (see Figure 5). The evaluations of the induced clusterings
are at most Φ(C).
Proof. Let A and B denote the two induced clusterings and let e be the removed edge (see Figure 5).
For the sake of contradiction, suppose that one of the two induced clusterings has an evaluation
greater than C. W.l.o.g. assume that Φ(A) > Φ(C). Let A denote the cluster of A containing one
of the incident nodes of e (the other one is in a cluster of B).
If Φ(A) > Φ(A), then there is another cluster A0 ∈ A such that Φ(A0 ) = Φ(A). Note that A0 is
also in C and A0 is not affected when e is removed, so, Φ(C) ≥ Φ(A0 ). This is a contradiction since
we are assuming that Φ(A0 ) = Φ(A) > Φ(C).
If Φ(A) = Φ(A), then let mA = min(E(A)) (recall that we consider mA = 1 if |A| = 1) and
MA = max(Out(A)). Observe that the incident nodes of e may be both, in the same cluster of C
(see Figure 5a), or not (see Figure 5b). Suppose the incident nodes of e are in the same cluster
C ∈ C. Note that min(E(C)) ≤ mA and max(E(C)) ≥ MA , therefore
Φ(C) ≥ Φ(C) =
max(Out(C))
MA
≥
= Φ(A) = Φ(A).
min(E(C))
mA
This is another contradiction.
7
A B
A
C
e
(a)
A
A
A
B
e
(b)
Figure 5: Obtaining two clusterings, one per subtree, by removing an edge of a given clustering.
The removed edge in (a) is inside a cluster, and in (b) is a crossing edge.
Now, suppose that the incident nodes of e are in different clusters of C. In this case A ⊂ C
(C)
and then A is also in C. Let MA denote the weight of the heaviest outgoing edge of A in C, then
(C)
MA = max{w(e), MA } ≥ MA , and the evaluation of A in C is Φ(C) (A) =
(C)
MA
mA
, therefore
(C)
Φ(C) ≥ Φ(C) (A) =
MA
MA
≥
= Φ(A) = Φ(A).
mA
mA
This is a contradiction and completes the proof.
The proposed algorithm is based on dynamic programming. We show, that the stated problems
have an optimal substructure and construct the optimal solution in T from optimal solutions for
subtrees of T . From here on, we consider that the tree T is rooted at an arbitrary node r ∈ V . For
all v ∈ V , let c(v) be the set of children of v; and for all v ∈ V, v 6= r, let p(v) be the parent of v.
Recall that if c(v) is empty then we say that v is a leaf node.
Given a tree T , let S be a subtree of T and let v be the node with minimum depth in S. Then
we say that S is rooted at v. In the sequel, we only consider subtrees S rooted at v that contain
all the descendants of vertices v 0 ∈ S \ {v}. Figure 6a shows a subtree S 0 rooted at v. The leaves
hanging from v 0 and v 00 are not in S 0 , so S 0 is not considered as a subtree. Figure 6b shows an
example of a subtree to be considered. In addition, we say that S = Tv if S is rooted at v and
contains all the descendants of v.
The main idea of our algorithm is to work on (local) clusterings of a subtree and perform a
bottom-up dynamic programming strategy with two basic operations:
• UpToParent: knowing an optimal clustering of the subtree S = Tv 6= T , compute an optimal
clustering of the subtree formed by adding p(v) to S, see Figure 10a.
8
v
v
v
v 00
g→
v0
S0
S
S
(a)
(b)
(c)
Figure 6: (a) A subtree S 0 which is not considered. (b) A considered subtree S. (c) Representation
of a clustering C of S. The head cluster is above the curve g. The edges of OutS (h(C)) are the edges
in S crossed by g. The clusters of C that are below g constitute the headless clustering C \ {h(C)}.
• AddChildTree: knowing an optimal clustering of a subtree S rooted at p(v) and knowing
an optimal clustering of the subtree Q = Tv such that v 6∈ S, compute an optimal clustering
of the subtree formed by joining S and Q, see Figure 10b.
Now, we elaborate on a the (local) clustering C of a subtree S rooted at v, see Figure 6c.
A clustering of S is given by cutting some edges. We call a cluster containing the node v head
cluster of C, denoted h(C) (see Figure 6c). Note that if C ∈ C and C 6= h(C), then Out(C) is
entirely contained in S. However, Out(h(C)) is entirely contained in S only if S = T ; if v 6= r then
{v, p(v)} ∈ Out(h(C)) and {v, p(v)} is not in S; if v = r and S 6= T , then some node v 0 ∈ c(v) is not
in S and {v, v 0 } ∈ Out(h(C)) but {v, v 0 } is not in S. Thus, it is convenient to introduce OutS (C)
as the set of outgoing edges of C connecting nodes in S. In Figure 6c, OutS (h(C)) is formed by the
edges stabbed by the curve g.
Given a clustering C of a subtree S, let M be the weight of the heaviest edge in OutS (h(C)),
that is, M = max(OutS (h(C))). If h(C) contains all the nodes in S, then there are no descending
outgoing edges, and in these cases we set M = 0. On the other hand, let µ be the weight of
the lightest edge in E(h(C)), that is µ = min(E(h(C))). If h(C) is formed by single node, that is
h(C) = {v}, then E(h(C)) is empty, and in these cases we set µ = 1. For convenience, we introduce
the functions ΦS (·) and ΦS (·) as the restricted quality measures of a cluster and a clustering,
respectively. They work as usual but are restricted to the edges of the subtree S, thus:
ΦS (h(C)) =
M
.
µ
(3)
Note that if S = T , then ΦS (h(C)) = Φ(h(C)). If S = Tv 6= T , then:
Φ(h(C)) =
max{M, w({v, p(v)})}
.
µ
For every cluster C ∈ C, such that C is not the head cluster, the usual evaluation and the restricted
9
one have the same value, Φ(C) = ΦS (C). Consequently, the restricted evaluation of the “headless”
clustering C \ {h(C)} is:
ΦS (C \ {h(C)}) = Φ(C \ {h(C)}) = max { Φ(C) | C ∈ C \ {h(C)} } ,
(4)
therefore, the restricted evaluation of the clustering C is:
ΦS (C) = max {ΦS (h(C)), Φ(C \ {h(C)})} .
(5)
Let S be a subtree of T , and let H(l , S , µ) denote the set of l-clusterings of S in which µ is the
weight of the lightest edge in the head cluster. That is:
H(l , S , µ) = { C | C ∈ P(l , S )
and µ = min(E(h(C))) } .
We are now ready to state an encoding of a local solution and the invariant that allows us to
apply dynamic programming:
Notation 8. Suppose H(l , S , µ) is not empty, then a clustering C in H(l , S , µ) is encoded by the
ordered pair OS (l, µ) = (M, b), if the following properties are fulfilled:
1. M = max(OutS (h(C))) and b = ΦS (C).
2. ΦS (C) = min { ΦS (C 0 ) | C 0 ∈ H(l , S , µ)} .
3. max(OutS (h(C))) = min { max(OutS (h(C 0 ))) | C 0 ∈ H(l , S , µ) and ΦS (C 0 ) = ΦS (C) } .
If H(l , S , µ) is empty, then OS (l, µ) = (∞, ∞), where ∞ indicates the “infinity” value.
By Lemma 1, an optimal clustering C ∗ of T has an evaluation Φ(C ∗ ) ≤ 1 and according to
Lemma 7, if a clustering C of a subtree S is used to build C ∗ , then ΦS (C) ≤ 1 too. Therefore, we
set OS (l, µ) as (∞, ∞) if 1 < min { ΦS (C) | C ∈ H(l , S , µ) }. Then, given a subtree S, OS (·, ·) is a
function whose domain is N[1,k] × (w(E) ∪ {1}) and image {(∞, ∞)} ∪ (w(E) ∪ {0}) × R[0,1] where
w(E) = { w(e) | e ∈ E }.
Remark 9. Some times, it is more convenient to see OS (·, ·) as a table of k rows with labels
1, 2, . . . , k and n columns with labels w(e1 ), w(e2 ), . . . , w(en−1 ), 1 where e1 , e2 , . . . , en−1 is a labeling
of the edges in E from the lightest one to the heaviest one. In this way OS (l, µ) refers to the cell
with row-label l and column-label µ and it is value is the corresponding ordered pair (M, b).
If OS (l, µ) = (M, b) 6= (∞, ∞), then, by using equations (3), (4) and (5), we obtain that OS (l, µ)
encodes a clustering C (not necessarily unique) where:
M
ΦS (C) = b = max
, Φ(C \ {h(C)}) .
(6)
µ
For the sake of simplicity, we use the following notation for OS (l, µ) = (M, b) (not necessarily
distinct from (∞, ∞)): OS (l, µ)[1] = M and OS (l, µ)[2] = b.
If we have the function OT , then the evaluation of the optimal clusterings for Problems 1 and
2 are:
min { OT (k, µ)[2] | µ ∈ w(E) ∪ {1} } , and
min OT (l, µ)[2] | l ∈ N[2,n] and µ ∈ w(E) ∪ {1} , respectively.
The following lemma is a useful technical result:
10
vi+1
vi
vi+1
g0
(a)
{
g
g0
v = v0
}|
{
z
g
P
z
vi
v = v0
}|
P
}|
{
z
P
v = v0
vi
g
g0
vi+1
(b)
(c)
Figure 7: Let C and C 0 be two different clusterings in a subtree S. The head clusters h(C) and h(C 0 )
are formed by the nodes above g and g 0 , respectively. Let P = (v = v0 , v1 , . . . , vi ) be a path in S.
In the three pictures e = {vi , vi+1 } ∈ OutS (h(C)), note that e is stabbed by g. (a) e ∈ OutS (h(C 0 )),
note that e is stabbed by g 0 . (b) e ∈ h(C 0 ), note that vi and vi+1 are both above g 0 . (c) Some edge
in P is in OutS (h(C 0 )), note that P is stabbed by g 0 .
Lemma 10. Let S be a subtree rooted at v. Let C and C 0 be two different clusterings of S such
that min(E(h(C))) = min(E(h(C 0 ))) = µ. If ΦS (C) < ΦS (C 0 ) ≤ 1 then max(OutS (h(C))) ≤
max(OutS (h(C 0 ))).
Proof. For the sake of contradiction, suppose that max(OutS (h(C))) > max(OutS (h(C 0 ))). Observe that µ ≥ max(OutS (h(C))) > max(OutS (h(C 0 ))), since ΦS (C) < ΦS (C 0 ) ≤ 1. Note that
max(OutS (h(C))) > max(OutS (h(C 0 ))) implies that max(OutS (h(C))) > 0 and then OutS (h(C)) is
not empty. Let e be one of the heaviest edges of OutS (h(C)). Let P = (v = v0 , v1 , . . . , vi ) denote a
path from v to vi such that e = {vi , vi+1 } (see Figure 7).
If none of the edges of P are in OutS (h(C 0 )), then e ∈ OutS (h(C 0 )) or e ∈ E(h(C 0 )).
If e ∈ OutS (h(C 0 )) (Figure 7a) then there is a contradiction, because
w(e) = max(OutS (h(C))) > max(OutS (h(C 0 ))).
If e ∈ E(h(C 0 )) (Figure 7b), using min(E(h(C 0 ))) = µ yields µ ≤ w(e) and using µ ≥
max(OutS (h(C))) leads to µ ≥ w(e), so, µ = w(e). Therefore, there is a contradiction
because:
w(e)
1=
= ΦS (h(C)) ≤ ΦS (C) < ΦS (C 0 ) ≤ 1.
µ
Suppose that an edge e0 ∈ P is in OutS (h(C 0 )) (Figure 7c). Note that w(e0 ) ≤ max(OutS (h(C 0 ))).
Also, note that e0 is in E(h(C)), and consequently, µ ≤ w(e0 ). Therefore µ ≤ w(e0 ) ≤ max(OutS (h(C 0 )))
which is a contradiction since µ ≥ max(OutS (h(C))) > max(OutS (h(C 0 ))).
From the previous lemma, the following result is deduced directly:
Corollary 11. Let S be a subtree of T . For a given value OS (l, µ) = (M, b) 6= (∞, ∞), every
l-clustering C ∈ H(l , S , µ) fulfills that: ΦS (C) ≥ b, and max(OutS (h(C))) ≥ M .
11
The following lemma is the key of the proposed dynamic programming:
Lemma 12. Let S be a subtree rooted at v. Let OS (l, µ) = (M, b) 6= (∞, ∞) and let C be an
l-clustering of S encoded by OS (l, µ). Let Q be a subtree of S rooted at v 0 ∈ c(v). By removing the
edge e = {v 0 , v} from S an l0 -clustering A of Q is induced. Let µ0 = min(E(h(A))). By replacing
A with a clustering B encoded by OQ (l0 , µ0 ) and restoring the edge e, a new clustering C 0 of S is
obtained, which is also encoded as OS (l, µ) = (M, b) (see Figures 8 and 9).
Proof. By using Corollary 11, we have that
ΦQ (B) ≤ ΦQ (A), and max(OutQ (h(B))) ≤ max(OutQ (h(A))).
(7)
By using Lemma 7, we have that ΦQ (A) ≤ b, then:
b ≥ ΦQ (A) ≥ ΦQ (h(A)) =
max(OutQ (h(A)))
µ0
(8)
Moreover, using observations (7) and (8) yields to:
ΦQ (B) ≤ b.
(9)
Obviously, C and C 0 are both l-clusterings. We need to prove that:
min(E(h(C))) = min(E(h(C 0 ))) = µ,
ΦS (C) = ΦS (C 0 ) = b, and
max(OutS (h(C))) = max(OutS (h(C 0 ))) = M.
We divide the rest of the proof into two parts according to the two possible situations when e is
going to be removed, e ∈ OutS (h(C)) (see Figure 8) or e ∈ E(h(C)) (see Figure 9).
Let us start with the first case. Note that, by replacing A by B, the head cluster is not affected.
Consequently, max(OutS (h(C))) = max(OutS (h(C 0 ))) = M , and min(E(h(C))) = min(E(h(C 0 ))) =
µ. Let us prove that ΦS (C) = ΦS (C 0 ) = b. By Corollary 11, it is enough to prove that ΦS (C) ≤ b for
every cluster C ∈ C 0 . For every cluster C ∈ C 0 such that C 6∈ B, we have that C is also contained in C,
so, ΦS (C) ≤ b. For every cluster C ∈ B, such that C 6= h(B) we have ΦS (C) = ΦQ (C) ≤ ΦQ (B) ≤ b
by observation (9). From observation (7) we can deduce that ΦS (h(B)) ≤ ΦS (h(A)) ≤ b.
Let us analyze the second case. Let D denote the induced clustering of the (remaining) subtree
rooted at v (see Figure 9). Note that:
min(E(h(C 0 ))) = min {min(E(h(D))), w(e), min(E(h(B)))} , and
min(E(h(C))) = min {min(E(h(D))), w(e), min(E(h(A)))} .
Notice that min(E(h(A))) = min(E(h(B))) = µ0 by construction, therefore, min(E(h(C 0 ))) =
min(E(h(C))). By Corollary 11, it is enough to prove that max(OutS (h(C 0 ))) ≤ M and ΦS (C) ≤ b
for every cluster C ∈ C 0 . Note that:
max(OutS (h(C 0 ))) = max {max(OutS (h(D))), max(OutS (h(B)))} , and
max(OutS (h(C))) = max {max(OutS (h(D))), max(OutS (h(A)))} .
12
vC
v
A
v0
v
B
v0
v0
(b)
(a)
0
vC
v0
(c)
(d)
Figure 8: Removing the edge e = {v, v 0 } when e connects nodes in different clusters. (a) Initial
situation. (b) Induced clustering A when e is removed. (c) Replacing A with another clustering B.
(d) Restoring the edge e and obtaining a new clustering C 0 .
vC
v
D
D
B
v0
v0
(a)
v
A
0
vC
v0
(b)
(c)
v0
(d)
Figure 9: Removing the edge e = {v, v 0 } when e is inside a cluster. (a) Initial situation. (b) Induced
clustering A when e is removed. (c) Replacing A with another clustering B. (d) Restoring the edge
e and obtaining a new clustering C 0 .
Since max(OutS (h(B))) ≤ max(OutS (h(A))), therefore,
max(OutS (h(C 0 ))) ≤ max(OutS (h(C))) = M.
Finally, for every cluster C ∈ C 0 \ {h(C 0 )} such that C 6∈ B, C is also contained in C, so, ΦS (C) ≤ b.
For every cluster C ∈ (C 0 \ {h(C 0 )}) ∩ B we have ΦS (C) = ΦQ (C) ≤ ΦQ (B) ≤ b by observation (9).
From observation (7) we can deduce that ΦS (h(C 0 )) ≤ ΦS (h(C)) ≤ b.
In the next subsections we show how to perform the operations UpToParent and AddChildTree.
In order to simplify the formulas in the next subsections we introduce the following total order:
Let (M, b) and (M 0 , b0 ) be two ordered pairs. We say that (M, b) = (M 0 , b0 ) if M = M 0 and b = b0 .
We say that (M, b) < (M 0 , b0 ) if b < b0 , or if b = b0 and M < M 0 .
4.1
UpToParent: computing OS from OS
Let S = Tv 6= T be a subtree and let S denote the tree formed by the union of S and p(v). In this
section we will show how to compute OS , assuming that we already know OS . Let ω = w({v, p(v)}).
If we are computing OS (l, µ), then:
13
v
v
P
S
S
S
(a)
Q
(b)
Figure 10: (a) Subtree S formed by the subtree S = Tv and p(v). (b) Subtree P formed by joining
the subtree Q = Tv and a subtree S rooted at p(v).
ω
ω
ω
ω
v
v
v
v
S
S
S
S
S
(a)
S
(b)
Figure 11: Construction of a clustering of S based in one of S. (a) The edge {v, p(v)} is cut. (b)
The edge {v, p(v)} is not cut.
Claim 13. If µ = 1, then:
max{ω, OS (l − 1, µ0 )[1]}
0
max ω, OS (l − 1, µ )[2],
OS (l, µ) = ω, min
µ0
µ0
Proof. Let C be a clustering encoded as OS (l, µ) = (M, b). We have that h(C) = {p(v)} because
µ = 1. Then, the edge {v, p(v)} is cut and M = ω, see Figure 11a. Using (6) leads to b =
max{ω, Φ(C \{h(C)})}. Note that C \{h(C)} is an (l−1)-clustering C 0 of S. According to Lemma 12,
C 0 is encoded as OS (l − 1, µ0 ) for some µ0 , and then:
ΦS (C 0 ) = OS (l − 1, µ0 )[2] and Φ(h(C 0 )) =
max{ω, OS (l − 1, µ0 )[1]}
.
µ0
It is easy to see that:
Φ(C 0 ) = max Φ(h(C 0 )), Φ(C 0 \ {h(C 0 )}) ,
by using equation (4) we have:
Φ(C 0 ) = max Φ(h(C 0 )), ΦS (C 0 \ {h(C 0 )}) .
14
It is also easy to see that Φ(h(C 0 )) ≥ ΦS (h(C 0 )), therefore:
Φ(C 0 ) = max Φ(h(C 0 )), ΦS (h(C 0 )), ΦS (C 0 \ {h(C 0 )}) .
The previous equation can be reduced to Φ(C 0 ) = max {Φ(h(C 0 )), ΦS (C 0 )} .
Finally, Φ(C \ {h(C)}) = Φ(C 0 ) = max ΦS (C 0 ), Φ(h(C 0 ))
max{ω, OS (l − 1, µ0 )[1]}
0
.
= max OS (l − 1, µ )[2],
µ0
Claim 14. If 1 > µ > ω then OS (l, µ) = (∞, ∞).
Proof. It is impossible to build a clustering with this encoding. If we cut {v, p(v)}, then µ = 1,
and if we do not cut {v, p(v)}, then it is in the head cluster and then µ ≤ ω.
Claim 15. If µ = ω then:
OS (l, µ0 )[1]
0
0
OS (l, µ) = min
OS (l, µ )[1], max
, OS (l, µ )[2]
.
µ0 ≥ω
ω
Proof. Let C be a clustering encoded as OS (l, µ) = (M, b). In this case µ ≤ ω, so, {v, p(v)} is not
cut, see Figure 11b. According to Lemma 12, C is formed by adding p(v) to the head cluster of an
l-clustering C 0 of S, which is encoded as OS (l, µ0 ) for some µ0 ≥ ω. Note that max(OutS (h(C))) =
max(OutS (h(C 0 ))) and then M = OS (l, µ0 )[1]. It is easy to see that ΦS (C\{h(C)}) = ΦS (C 0 \{h(C 0 )})
and ΦS (h(C)) ≥ ΦS (h(C 0 )), so:
b = ΦS (C) = max ΦS (h(C)), ΦS (C \ {h(C)})
= max ΦS (h(C)), ΦS (h(C 0 )), ΦS (C 0 \ {h(C 0 )})
= max ΦS (h(C)), ΦS (C 0 ) .
The result follows.
Claim 16. If µ < ω, then:
OS (l, µ) = OS (l, µ).
Proof. Let C be a clustering encoded as OS (l, µ) = (M, b). In this case µ ≤ ω, and consequently
{v, p(v)} is not cut, see Figure 11b. According to Lemma 12, C is formed by adding p(v) to
the head cluster of an l-clustering C 0 of S which is encoded as OS (l, µ). It is easy to see that
max(OutS (h(C))) = max(OutS (h(C 0 ))) = M and ΦS (C) = ΦS (C 0 ) = b. The result follows.
Theorem 17. Let S = Tv such that Tv 6= T , and let S be the subtree formed by adding p(v) to S.
If we know the function OS , then the function OS can be computed in O(kn) time.
15
ω
ω
ω
ω
P
Q
S
S
P
Q
S
(a)
Q
S
Q
(b)
Figure 12: Construction of a clustering of S based in one of S. (a) The edge {v, p(v)} is cut. (b)
The edge {v, p(v)} is not cut.
Proof. Think in OS (·, ·) as table (see Remark 9), lets analyze the time to compute the values of
every cell in this table. By Claim 13, computing the values of form OS (l, 1) takes O(n) time per
cell and there are O(k) cells of this form, resulting in the total time of O(kn). By Claim 14, the
values of form OS (l, µ) with 1 > µ > ω take constant time per cell and given that there are O(kn)
cells of this form, the total time results to O(kn). By Claim 15, computing the values of the form
OS (l, ω) takes O(n) time per cell and there are O(k) cells of this form, yielding a total time of
O(kn). Finally, by Claim 16, computing the values of form OS (l, µ) with µ < ω takes constant
time per cell and there are O(kn) cells of this form, resulting in a total time of O(kn). The result
follows.
4.2
AddChildTree: computing OP from OS and OQ
Let Q = Tv 6= T and let S be a subtree rooted in p(v) such that S does not contain v. Let P denote
the subtree which results from joining on S and Q. We show how to compute OP from OS and OQ .
Let ω = w({v, p(v)}). Let Q be the subtree formed by adding p(v) to Q. Pre-compute OQ from
OQ using the claims of the previous subsection. If we are computing OP (l, µ), then we have that:
Claim 18. If µ = 1 then:
n
n
oo
OP (l, µ) = min
max {ω, OS (x, 1)[1]} , max OS (x, 1)[2], OQ (l − x + 1, 1)[2]
1≤x<l
Proof. Let C be a clustering encoded as OP (l, µ) = (M, b). We have that h(C) = {p(v)}, since
µ = 1. Then, the edge {v, p(v)} is cut, see Figure 12b. C is based in two clusterings C 0 and C 00 with
encodings OS (x, 1) and OQ (l − x + 1, 1) for some 1 ≤ x < l. It easy to see that:
M = max(OutP (h(C))) = max ω, max(OutS (h(C 0 )))
= max {ω, OS (x, 1)[1]} .
It is easy to see that:
b = ΦP (C) = max {ΦP (h(C)), ΦP (C \ {h(C)})} .
Note also that:
n
o
ΦP (h(C)) = max ΦS (h(C 0 )), ΦQ (h(C 00 )) , and
16
o
n
ΦP (C \ {h(C)}) = max ΦS (C 0 \ {h(C 0 )}), ΦQ (C 00 \ {h(C 00 )}) .
Then,
n
o
0
00
0
0
00
00
ΦP (C) = max ΦS (h(C )), ΦQ (h(C )), ΦS (C \ {h(C )}), ΦQ (C \ {h(C )}) .
And this can be rewritten as:
n
o
ΦP (C) = max ΦS (C 0 ), ΦQ (C 00 )
n
o
= max OS (x, 1)[2], OQ (l − x + 1, 1)[2] .
Claim 19. If 1 > µ > ω then:
M
M, max
OP (l, µ) = min
,
, OS (x, µ)[2], OQ (l − x + 1, 1)[2]
1≤x<l
µ
where M = max {ω, OS (x, µ)[1]}.
Proof. Let C be a clustering encoded as OP (l, µ) = (M, b). Note that {v, p(v)} is not included in
h(C) because µ > ω, and consequently this edge is cut, see Figure 12b. Furthermore, C is based in
two clusterings, C 0 and C 00 , with encodings OS (x, µ) and OQ (l − x + 1, 1) for some 1 ≤ x < l. It is
easy to see that M = max {ω, OS (x, µ)[1]}. Notice:
ΦP (h(C)) ≥ ΦS (h(C 0 )), and ΦP (h(C)) ≥ ΦQ (h(C 00 )).
Moreover,
n
o
ΦP (C \ {h(C)}) = max ΦS (C 0 \ {h(C 0 )}), ΦQ (C 00 \ {h(C 00 )}) .
Now, focus on the evaluation of C:
b = ΦP (C) = max {ΦP (h(C)), ΦP (C \ {h(C)})}
n
o
= max ΦP (h(C)), ΦS (h(C 0 )), ΦQ (h(C 0 )), ΦS (C 0 \ {h(C 0 )}), ΦQ (C 00 \ {h(C 00 )})
M
0
00
= max
, ΦS (C ), ΦS (C )
µ
M
= max
, OS (x, µ)[2], OQ (l − x + 1, 1)[2] .
µ
Claim 20. If µ = ω then:
M1
o1 = min
M1 , max
, OS (x, ω)[2], OQ (l − x + 1, 1)[2]
,
1≤x<l
ω
where M1 = max {ω, OS (x, ω)[1]} ;
M2
0
o2 =
min
M2 , max
, OS (x, µ )[2], OQ (l − x + 1, ω)[2]
,
1≤x<l, ω≤µ0
ω
n
o
where M2 = max OS (x, µ0 )[1], OQ (l − x + 1, ω)[1] ; and
OP (l, µ) = min{o1 , o2 }.
17
Proof. Let C be a clustering encoded as OP (l, µ) = (M, b). In this case, we have two options to build
C. The first one is using two clusterings, C 0 and C 00 , with encodings OS (x, ω) and OQ (l − x + 1, 1),
respectively. In this case, {v, p(v)} is cut. This case is analogous to the previous claim and
corresponds to o1 encoding. And the second one, using two clusterings C 0 and C 00 with encodings
OS (x, µ0 ) for some µ0 ≥ ω and OQ (l − x + 1, ω), respectively. In this case, {v, p(v)} is not cut. This
case corresponds to o2 encoding and we can prove it using ideas similar to the ones used in the
previous claims.
Claim 21. If µ < ω then:
M1
0
o1 =
min
M1 , max
, OS (x, µ)[2], OQ (l − x + 1, µ )[2]
,
1≤x<l, µ≤µ0
µ
n
o
where M1 = max OS (x, µ)[1], OQ (l − x + 1, µ0 )[1] ;
M2
0
o2 =
min
M2 , max
, OS (x, µ )[2], OQ (l − x + 1, µ)[2]
,
1≤x<l, µ≤µ0
µ
o
n
where M2 = max OS (x, µ0 )[1], OQ (l − x + 1, µ)[1] ;
and
OP (l, µ) = min{o1 , o2 }.
Proof. Let C be a clustering encoded as OP (l, µ) = (M, b). In this case µ < ω and then {v, p(v)} is
not cut (otherwise, the head cluster of C has an evaluation greater than 1). C is based in clusterings
C 0 and C 00 of S and Q, respectively. There are two possible ways to build C: the lightest edge into
h(C) is in h(C 0 ), o1 ; or the lightest edge into h(C) is in h(C 00 ), o2 . In both cases, the formulas can
be verified using the same ideas used in the previous claims.
Theorem 22. Let Q = Tv such that Tv 6= T , and let S be a subtree rooted at p(v) such that v is
not in S. Let P denote the subtree formed by joining S and Q. If we know the functions OS and
OQ , then the function OP can be computed in O(k 2 n2 ).
Proof. Analyzing the number of cells in each claim (18, 19, 20, 21) and the complexity to compute
the value of a cell in each case, we conclude that OP can be computed in O(k 2 n2 ).
4.3
Complexity of the algorithm
Given a tree T and a value k, we can calculate OT by computing OTv for every node v in T in a
bottom-up (from the leaves to the root) procedure using the mentioned operations. Note that, if v
is a leaf, then OTv (1, 1) = (0, 0) and OTv (l, µ) = (∞, ∞) if l > 1 or µ < 1. To compute the function
OTv of an inner node v, we proceed as follows: Let {v1 , . . . , vm } be the set of children of v. First,
considering S = Tv1 , compute OS from OS using the UpToParent operation. Subsequently, we
proceed with joining the subtrees Tvi one by one using the AddChildTree operation. When all
the children have been added, the resulting subtree corresponds to Tv . Note that we apply a single
operation per edge. Consequently, this algorithm takes O(k 2 n3 ) time. Note also that with this
algorithm, we obtain the evaluation of the optimal clustering; the clusters of an optimal solution
can be computed by “navigating backwards” through the computed functions.
18
Problem 2 can be solved using the same idea with a slightly more complex approach. We can
use a similar algorithm based on functions OS (µ), saving the parameter l, (which corresponds to
the number of clusters) and then the computing time is O n3 .
References
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: a
survey. Computer networks, 38(4):393–422, 2002.
[2] T. Asano, B. Bhattacharya, M. Keil, and F. Yao. Clustering algorithms based on minimum and
maximum spanning trees. In Proceedings of the fourth annual symposium on Computational
geometry, 1988.
[3] L. E. Caraballo, J. M. Dı́az-Báñez, I. Maza, and A. Ollero. The block-information-sharing
strategy for task allocation: A case study for structure assembly with aerial robots. European
Journal of Operational Research, 260(2):725–738, 2017.
[4] P. F. Felzenszwalb and D. P. Huttenlocher. Efficient graph-based image segmentation. International Journal of Computer Vision, 59(2):167–181, 2004.
[5] M. Frühwirth and A. Rauber. Self-organizing maps for content-based music clustering. In
Neural Nets WIRN Vietri-01, pages 228–233. Springer, 2002.
[6] O. Grygorash, Y. Zhou, and Z. Jorgensen. Minimum spanning tree based clustering algorithms.
In Proceedings of the 18th IEEE International COnference on Tools with Artificial Intelligence
(ICTAI’06), 2006.
[7] N. Kroher, J.-M. Dı́az-Báñez, and A. Pikrakis. Discovery of repeated melodic phrases in folk
singing recordings. IEEE Transactions on Multimedia (Submitted, pending minor revision),
2017.
[8] A. Ollero and I. Maza. Multiple heterogeneous unmanned aerial vehicles. Springer Publishing
Company, Incorporated, 2007.
[9] S. E. Schaeffer. Graph clustering. Computer Science Rieveiw, 1:27–64, 2007.
[10] Y. Xu, V. Olman, and D. Xu. Minimum spanning trees for gene expression data clustering.
Genome Inform, 12:12:24, 2001.
[11] Y. Xu and E. C. Uberbacher. 2d image segmentation using minimum spanning tree. Image
and Vision Computing, 15:47–57, 1997.
[12] C. T. Zahn. Graph-theoretical methods for detecting and describing gestalt clusters. IEEE
Transactions on Computers, C-20(1):68–86, 1971.
19
| 8cs.DS
|
arXiv:1610.03625v2 [math.GR] 8 Apr 2017
THE FSZ PROPERTIES OF SPORADIC SIMPLE GROUPS
MARC KEILBERG
Abstract. We investigate a possible connection between the F SZ properties
of a group and its Sylow subgroups. We show that the simple groups G2 (5)
and S6 (5), as well as all sporadic simple groups with order divisible by 56 are
not F SZ, and that neither are their Sylow 5-subgroups. The groups G2 (5)
and HN were previously established as non-F SZ by Peter Schauenburg; we
present alternative proofs. All other sporadic simple groups and their Sylow
subgroups are shown to be F SZ. We conclude by considering all perfect groups
available through GAP with order at most 106 , and show they are non-F SZ
if and only if their Sylow 5-subgroups are non-F SZ.
Introduction
The F SZ properties for groups, as introduced by Iovanov et al. [4], arise from
considerations of certain invariants of the representation categories of semisimple
Hopf algebras known as higher Frobenius-Schur indicators [5, 10, 11]. See [9] for
a detailed discussion of the many important uses and generalizations of these invariants. When applied to Drinfeld doubles of finite groups, these invariants are
described entirely in group theoretical terms, and are in particular invariants of
the group itself. The F SZ property is then concerned with whether or not these
invariants are always integers—which gives the Z in F SZ.
While the F SZ and non-F SZ group properties are well-behaved with respect to
direct products [4, Example 4.5], there is currently little reason to suspect a particularly strong connection to proper subgroups which are not direct factors. Indeed,
by [2, 4] the symmetric groups Sn are F SZ, while there exist non-F SZ groups of
order 56 . Therefore, Sn is F SZ but contains non-F SZ subgroups for all sufficiently
large n. On the other hand, non-F SZ groups can have every proper subquotient
be F SZ. Even the known connection to the one element centralizers—see the comment following Definition 1.1—is relatively weak. In this paper we will establish a
few simple improvements to this situation, and then proceed to establish a number
of examples of F SZ and non-F SZ groups that support a potential connection to
Sylow subgroups. We propose this connection as Conjecture 2.7.
We will make extensive use of GAP [3] and the AtlasRep[15] package. Most of
the calculations were designed to be completed with only 2GB of memory or (much)
less available—in particular, using only a 32-bit implementation of GAP—, though
in a few cases a larger workspace was necessary. In all cases the calculations can
2010 Mathematics Subject Classification. Primary: 20D08; Secondary: 20F99, 16T05, 18D10.
Key words and phrases. sporadic groups, simple groups, Monster group, Baby Monster group,
Harada-Norton group, Lyons group, projective symplectic group, higher Frobenius-Schur indicators, FSZ groups, Sylow subgroups.
This work is in part an outgrowth of an extended e-mail discussion between Geoff Mason,
Susan Montgomery, Peter Schauenburg, Miodrag Iovanov, and the author. The author thanks
everyone involved for their contributions, feedback, and encouragement.
1
2
MARC KEILBERG
be completed in workspaces with no more than 10GB of memory available. The
author ran the code on an Intel(R) Core(TM) i7-4770 CPU @ 3.40GHz machine
with 12GB of memory. All statements about runtime are made with respect to this
computer. Most of the calculations dealing with a particular group were completed
in a matter of minutes or less, though calculations that involve checking large
numbers of groups can take several days or more across multiple processors.
The structure of the paper is as follows. We introduce the relevant notation,
definitions, and background information in Section 1. In Section 2 we present a
few simple results which offer some connections between the F SZ (or non-F SZ)
property of G and certain of its subgroups. This motivates the principle investigation of the rest of the paper: comparing the F SZ properties for certain groups and
their Sylow subgroups. In Section 3 we introduce the core functions we will need to
perform our calculations in GAP. We also show that all groups of order less than
2016 (except possibly those of order 1024) are F SZ. The remainder of the paper
will be dedicated to exhibiting a number of examples that support Conjecture 2.7.
In Section 4 we show that the simple groups G2 (5), HN , Ly, B, and M , as
well as their Sylow 5-subgroups, are all non-F SZ5 . In Section 5 we show that all
other sporadic simple groups (including the Tits group) and their Sylow subgroups
are F SZ. This is summarized in Theorem 5.4. The case of the simple projective
symplectic group S6 (5) is handled in Section 6, which establishes S6 (5) as the second
smallest non-F SZ simple group after G2 (5). It follows from the investigations
of Schauenburg [13] that HN is then the third smallest non-F SZ simple group.
S6 (5) was not susceptible to the methods of Schauenburg [13], and requires further
modifications to our own methods to complete in reasonable time. We finish our
examples in Section 7 by examining those perfect groups available through GAP,
and show that they are F SZ if and only if their Sylow subgroups are F SZ. Indeed,
they are non-F SZ if and only if their Sylow 5-subgroup is non-F SZ5 .
Of necessity, these results also establish that various centralizers and maximal
subgroups in the groups in question are also non-F SZ5 , which can be taken as
additional examples. If the reader is interested in F SZ properties for other simple
groups, we note that Schauenburg [13] has checked all simple groups of order at
most |HN | = 273,030,912,000,000 = 214 ·36 ·56 ·7·11·19, except for S6 (5) (which we
resolve here); and that several families of simple groups were established as F SZ
by Iovanov et al. [4].
We caution the reader that the constant recurrence of the number 5 and Sylow
5-subgroups of order 56 in this paper is currently more of a computationally convenient coincidence than anything else. The reasons for this will be mentioned during
the course of the paper.
1. Background and Notation
Let N be the set of positive integers. The study of F SZ groups is connected to
the following sets.
Definition 1.1. Let G be a group, u, g ∈ G, and m ∈ N. Then we define
Gm (u, g) = {a ∈ G : am = (au−1 )m = g}.
Note that Gm (u, g) = ∅ if u 6∈ CG (g), and that in all cases Gm (u, g) ⊆ CG (g).
In particular, letting H = CG (g), then when u ∈ H we have
Gm (u, g) = Hm (u, g).
THE FSZ PROPERTIES OF SPORADIC SIMPLE GROUPS
3
The following will then serve as our definition of the F SZm property. It’s equivalence to other definitions follows easily from [4, Corollary 3.2] and applications of
the Chinese remainder theorem.
Definition 1.2. A group G is F SZm if and only if for all g ∈ G, u ∈ CG (g), and
n ∈ N coprime to the order of g, we have
|Gm (u, g)| = |Gm (u, g n )|.
We say a group is F SZ if it is F SZm for all m.
The following result is useful for reducing the investigation of the F SZ properties
to the level of conjugacy classes or even rational classes.
Lemma 1.3. For any group G and u, g, x ∈ G we have a bijection Gm (u, g) →
Gm (ux , g x ) given by a 7→ ax .
If n ∈ N is coprime to |G| and r ∈ N is such that rn ≡ 1 mod |G|, we also have
a bijection Gm (u, g n ) → Gm (ur , g).
Proof. The first part is [5, Proposition 7.2] in slightly different notation. The second
part is [14, Corollary 5.5].
All expressions of the form Gm (u, g n ) will implicitly assume that n is coprime to
the order of g. We are free to replace n with an equivalent value which is coprime
to |G| whenever necessary. Moreover, when computing cardinalities |Gm (u, g)| it
suffices to compute the cardinalities |Hm (u, g)| for H = CG (g), instead. This latter
fact is very useful when attempting to work with groups of large order, or groups
with centralizers that are easy to compute in, especially when the group is suspected
of being non-F SZ.
+
, the union of which yields
Remark 1.4. There are stronger conditions called F SZm
+
the F SZ + condition, which are also introduced by Iovanov et al. [4]. The F SZm
condition is equivalent to the centralizer of every non-identity element with order
not in {1, 2, 3, 4, 6} being F SZm , which is in turn equivalent to the sets Gm (u, g) and
Gm (u, g n ) being isomorphic permutation modules for the two element centralizer
CG (u, g) [4, Theorem 3.8], with u, g, n satisfying the same constraints as for the
F SZm property. Here the action is by conjugation. We note that while the F SZ
property is concerned with certain invariants being in Z, the F SZ + property is not
concerned with these invariants being non-negative integers. When the invariants
are guaranteed to be non-negative is another area of research, and will also not be
considered here.
Example 1.5. The author has shown that quaternion groups and certain semidirect products defined from cyclic groups are always F SZ [7, 8]. This includes
the dihedral groups, semidihedral groups, and quasidihedral groups, among many
others.
Example 1.6. Iovanov et al. [4] showed that several groups and families of groups
are F SZ, including:
• All regular p-groups.
• Zp ≀r Zp , the Sylow p-subgroup of Sp2 , which is an irregular F SZ p-group.
• P SL2 (q) for a prime power q.
4
MARC KEILBERG
• Any direct product of F SZ groups. Indeed, any direct product of F SZm
groups is also F SZm , as the cardinalities of the sets in Definition 1.1 split
over the direct product in an obvious fashion.
• The Mathieu groups M11 and M12 .
• Symmetric and alternating groups. See also [2].
Because of the first item, Susan Montgomery has proposed that we use the term
F S-regular instead of F SZ, and F S-irregular for non-F SZ. Similarly for F Sm regular and F Sm -irregular. These seem reasonable choices, but for this paper the
author will stick with the existing terminology.
Example 1.7. On the other hand, Iovanov et al. [4] also established that non-F SZ
groups exist by using GAP [3] to show that there are exactly 32 isomorphism classes
of groups of order 56 which are not F SZ5 .
Example 1.8. The author has constructed examples of non-F SZpj p-groups for
all primes p > 3 and j ∈ N in [6]. For j = 1 these groups have order pp+1 , which is
the minimum possible order for any non-F SZ p-group. Combined, [4, 6, 13] show,
among other things, that the minimum order of non-F SZ 2-groups is at least 210 ,
and the minimum order for non-F SZ 3-groups is at least 38 . It is unknown if any
non-F SZ 2-groups or 3-groups exist, however.
Example 1.9. Schauenburg [13] provides several equivalent formulations of the
F SZm properties, and uses them to construct GAP [3] functions which are useful
for testing the property. Using these functions, it was shown that the Chevalley
group G2 (5) and the sporadic simple group HN are not F SZ5 . These groups
were attacked directly, using advanced computing resources for HN , often with
an eye on computing the values of the indicators explicitly. We will later present
an alternative way of using GAP to prove that these groups, and their Sylow 5subgroups, are not F SZ5 . We will not attempt to compute the actual values of the
indicators, however.
One consequence of these examples is that the smallest known order for a nonF SZ group is 56 = 15,625. The groups with order divisible by pp+1 for p > 5
that are readily available through GAP are small in number, problematically large,
and frequently do not have convenient representations. Matrix groups have so far
proven too memory intensive for what we need to do, so we need permutation
or polycyclic presentations for accessible calculations. For these reasons, all of
the examples we pursue in the following sections will hone in on the non-F SZ5
property for groups with order divisible by 56 , and which admit known or reasonably
computable permutation representations. In most of the examples, 56 is the largest
power of 5 dividing the order, with the Monster group, the projective symplectic
group S6 (5), and the perfect groups of order 12 · 57 being the exceptions.
2. Obtaining the non-F SZ property from certain subgroups
Our first elementary result offers a starting point for investigating non-F SZm
groups of minimal order.
Lemma 2.1. Let G be a group with minimal order in the class of non-F SZm
groups. Then |Gm (u, g)| 6= |Gm (u, g n )| for some (n, |G|) = 1 implies g ∈ Z(G).
Proof. If not then CG (g) is a smaller non-F SZm group, a contradiction.
THE FSZ PROPERTIES OF SPORADIC SIMPLE GROUPS
5
The result applies to non-F SZm groups in a class that is suitably closed under
the taking of centralizers. For example, we have the following version for p-groups.
Corollary 2.2. Let P be a p-group with minimal order in the class of non-F SZpj
p-groups. Then |Ppj (u, g)| 6= |Ppj (u, g n )| for some p ∤ n implies g ∈ Z(P ).
Example 2.3. From the examples in the previous section, we know the minimum
possible order for a non-F SZp p-group for p > 3 is pp+1 . It remains unknown if
the examples of non-F SZpj p-groups from [6] for j > 1 have minimal order among
non-F SZpj p-groups. We also know that to check if a group of order 210 or 38 is
F SZ it suffices to assume that g is central.
Next, we determine a condition for when the non-F SZ property for a normal
subgroup implies the non-F SZ property for the full group.
Lemma 2.4. Let G be a group and suppose H is a non-F SZm normal subgroup
with m coprime to [G : H]. Then G is non-F SZm .
Proof. Let u, g ∈ H and (n, |g|) = 1 be such that |Hm (u, g)| 6= |Hm (u, g n )|. By
the index assumption, for all x ∈ G we have xm ∈ H ⇔ x ∈ H, so by definitions
Gm (u, g) = Hm (u, g) and Gm (u, g n ) = Hm (u, g n ), which gives the desired result.
Corollary 2.5. Let G be a finite group and suppose P is a normal non-F SZpj
Sylow p-subgroup of G for some prime p. Then G is non-F SZpj .
Corollary 2.6. Let G be a finite group and P a non-F SZpj Sylow p-subgroup of
G. Then the normalizer NG (P ) is non-F SZpj .
Sadly, we will find no actual use for Corollary 2.5 in the examples we consider
in this paper. However, this result, [13, Lemma 8.7], and the examples we collect
in the remainder of this paper do suggest the following conjectural relation for the
F SZ property.
Conjecture 2.7. A group is F SZ if and only if all of its Sylow subgroups are F SZ.
Some remarks on why this conjecture may involve some deep results to establish
affirmatively seems in order.
Consider a group G and let u, g ∈ G and n ∈ N with (n, |G|) = 1. Suppose that
g has order a power of p, for some prime p. Then
[
Gpj (u, g) =
Gpj (u, g) ∩ P x ,
where the union runs over all distinct conjugates P x in CG (g) of a fixed Sylow
p-subgroup P of CG (g). Let Ppxj (u, g) = Gpj (u, g) ∩ P x . Then |Gpj (u, g)| =
S
S
|Gpj (u, g n )| if and only if there is a bijection P x (u, g) → P x (u, g n ). In the
special case u ∈ P , if P was F SZpj we would have a bijection P (u, g) → P (u, g n ),
x
x
but this does not obviously guarantee a bijection
g n ) for all conS x P (u, g)
S →xP (u,
n
jugates. Attempting to get a bijection P (u, g) → P (u, g ) amounts, via
the Inclusion-Exclusion Principle, to controlling the intersections of any number of
conjugates and how many elements those intersections contribute to Gpj (u, g) and
Gpj (u, g n ). There is no easy or known way to predict the intersections of a collection of Sylow p-subgroups for a completely arbitrary G, so any positive affirmation
of the conjecture will impose a certain constraint on these intersections.
6
MARC KEILBERG
Moreover, we have not considered the case of the sets Gm (u, g) where m has
more than one prime divisor, nor those cases where u, g do not order a power of
a fixed prime, so a positive affirmation of the conjecture is also expected to show
that the F SZm properties are all derived from the F SZpj properties for all prime
powers dividing m. On the other hand, a counterexample seems likely to involve
constructing a large group which exhibits a complex pattern of intersections in its
Sylow p-subgroups for some prime p, or otherwise exhibits the first example of a
group which is F SZpj for all prime powers but is nevertheless not F SZ.
Example 2.8. All currently known non-F SZ groups are either p-groups (for which
the conjecture is trivial), are nilpotent (so are just direct products of their Sylow
subgroups), or come from perfect groups (though the relevant centralizers need not
be perfect). The examples of both F SZ and non-F SZ groups we establish here
will also all come from perfect groups and p-groups. In the process we obtain,
via the centralizers and maximal subgroups considered, an example of a solvable,
non-nilpotent, non-F SZ group; as well as an example of a non-F SZ group which
is neither perfect nor solvable. All of these examples, of course, conform to the
conjecture.
3. GAP functions and groups of small order
The current gold standard for general purpose testing of the F SZ properties in
GAP [3] is the FSZtest function of Schauenburg [13]. In certain specific situations,
the function FSInd from [4] can also be useful for showing a group is non-F SZ.
However, with most of the groups we will consider in this paper both of these
functions are impractical to apply directly. The principle obstruction for FSZtest
is that this function needs to compute both conjugacy classes and character tables
of centralizers, and this can be a memory intensive if not wholly inaccessible task.
For FSInd the primary obstruction, beyond its specialized usage case, is that it
must completely enumerate, store, and sort the entire group (or centralizer). This,
too, can quickly run into issues with memory consumption.
We therefore need alternatives for testing (the failure of) the FSZ properties
which can sidestep such memory consumption issues. For Section 7 we will also
desire functions which can help us detect and eliminate the more ”obviously” FSZ
groups. We will further need to make various alterations to FSZtest to incorporate
these things, and to return a more useful value when the group is not F SZ.
The first function we need, FSZtestZ, is identical to FSZtest—and uses several of
the helper functions found in [13]—except that instead of calculating and iterating
over all rational classes of the group it iterates only over those of the center. It
needs only a single input, which is the group to be checked. If it finds that the
group is non-F SZ, rather than return false it returns the data that established
the non-F SZ property. Of particular importance are the values m and z. If the
group is not shown to be non-F SZ by this test, then it returns fail to indicate
that the test is typically inconclusive.
FSZtestZ := function (G)
l o c a l CT, zz , z , c l , div , d , c h i , m, b ;
c l := R a t i o n a l C l a s s e s ( Center (G) ) ;
c l := F i l t e r e d ( c l , c−>not Order ( R e p r e s e n t a t i v e ( c ) )
THE FSZ PROPERTIES OF SPORADIC SIMPLE GROUPS
7
in [ 1 , 2 , 3 , 4 , 6 ] ) ;
for z z in c l do
z := R e p r e s e n t a t i v e ( z z ) ;
d i v := F i l t e r e d ( D i v i s o r s I n t ( Exponent (G) / Order ( z ) ) ,
m−>not Gcd (m, Order ( z ) ) in [ 1 , 2 , 3 , 4 , 6 ] ) ;
i f Length ( d i v ) < 1 then continue ; f i ;
CT := O r d i n a r y C h a r a c t er T a b le (G) ;
for c h i in I r r (CT) do
for m in d i v do
i f not I s R a t ( beta (CT, z , m, c h i ) )
then return [ z ,m, c h i ,CT ] ;
fi ;
od ;
od ;
od ;
#t h e t e s t i s i n c o n c l u s i v e i n g e n e r a l
return f a i l ;
end ;
This function is primarily useful for testing groups with minimal order in a class
closed under centralizers, such as in Lemma 2.1 and Corollary 2.2. Or for any group
with non-trivial center that is suspected of failing the F SZ property at a central
value.
We next desire a function which can quickly eliminate certain types of groups as
automatically being F SZ. For this, the following result on groups of small order is
helpful.
Theorem 3.1. Let G be a group with |G| < 2016 and |G| 6= 1024. Then G is F SZ.
Proof. By Lemma 2.1 it suffices to run FSZtestZ over all groups in the SmallGroups
library of GAP. This library includes all groups with |G| < 2016, except those of
order 210 = 1024. In practice, the author also used the function IMMtests introduced below, but where the check on the size of the group is constrained initially
to 100 by [4, Corollary 5.5], and can be increased whenever desired to eliminate all
groups of orders already completely tested. This boils down to quickly eliminating
p-groups and groups with relatively small exponent. By using the closure of the
F SZ properties with respect to direct products, one need only consider a certain
subset of the orders in question rather than every single one in turn, so as to avoid
essentially double-checking groups. We note that the groups of order 1536 take the
longest to check. The entire process takes several days over multiple processors,
but is otherwise straightforward.
8
MARC KEILBERG
We now define the function IMMtests. This function implements most of the
more easily checked conditions found in [4] that guarantee the F SZ property, and
calls FSZtestZ when it encounters a suitable p-group. The function returns true
if the test conclusively establishes that the group is F SZ; the return value of
FSZtestZ if it conclusively determines the group is non-F SZ; and fail otherwise.
Note that whenever this function calls FSZtestZ that test is conclusive by Corollary 2.2, so it must adjust a return value of fail to true.
IMMtests := function (G)
l o c a l sz , b , l , p2 , p3 , po ;
i f I s A b e l i a n (G)
then return true ;
fi ;
s z := S i z e (G) ;
i f ( s z < 2 0 1 6 ) and ( not s z =1024)
then return true ;
fi ;
i f IsPGroup (G) then
#R e g u l a r p−g r o u p s are a l w a y s FSZ .
l := C o l l e c t e d ( F a c t o r s I n t ( s z ) ) [ 1 ] ;
i f l [1] >= l [ 2 ] or Exponent (G) = l [ 1 ]
then return true ;
fi ;
s z := Length ( U p p e r C e n t r a l S e r i e s (G) ) ;
i f l [ 1 ] = 2 then
i f l [2 ] < 1 0 or s z < 3
or Exponent (G)<64
then return true ;
e l i f l [ 2 ] = 1 0 and s z >= 3
then
b := FSZtestZ (G) ;
i f I s L i s t ( b ) then return b ;
e l s e return true ;
fi ;
fi ;
e l i f l [ 1 ] = 3 then
i f l [2 ] < 8 or s z < 4
or Exponent (G)<27
THE FSZ PROPERTIES OF SPORADIC SIMPLE GROUPS
9
then return true ;
e l i f l [ 2 ] = 8 and sz >=4
then
b := FSZtestZ (G) ;
i f I s L i s t ( b ) then return b ;
e l s e return true ;
fi ;
fi ;
e l i f sz < l [1]+1
then return true ;
e l i f s z = l [ 1 ] + 1 and s z=l [ 2 ]
then
b := FSZtestZ (G) ;
i f I s L i s t ( b ) then return b ;
e l s e return true ;
fi ;
fi ;
else
#c h e c k t h e e x p o n e n t f o r non−p−g r o u p s
l := F a c t o r s I n t ( Exponent (G) ) ;
p2 := Length ( P o s i t i o n s ( l , 2 ) ) ;
p3 := Length ( P o s i t i o n s ( l , 3 ) ) ;
po := F i l t e r e d ( l , x−>x > 3 );
i f F o r A l l ( C o l l e c t e d ( po ) , x−>x [ 2 ] < 2 ) and
( ( p2 < 4 and p3 < 4 )
or ( p2 < 6 and p3 < 2 ) )
then return true ;
fi ;
fi ;
#t e s t s were i n c o n c l u s i v e
return f a i l ;
end ;
We then incorporate these changes into a modified version of FSZtest, which we
give the same name. Note that this function also uses the function beta and its
corresponding helper functions from [13]. It has the same inputs and outputs as
FSZtestZ, except that the test is definitive, and so returns true when the group is
F SZ.
FSZtest := function (G)
l o c a l C, CT, zz , z , c l , div , d , c h i , m, b ;
b := IMMtests (G ) ; ;
10
MARC KEILBERG
i f not b= f a i l
then return b ;
fi ;
c l := R a t i o n a l C l a s s e s (G) ;
c l := F i l t e r e d ( c l , c−>not Order ( R e p r e s e n t a t i v e ( c ) )
in [ 1 , 2 , 3 , 4 , 6 ] ) ;
for z z in c l do
z := R e p r e s e n t a t i v e ( z z ) ;
C := C e n t r a l i z e r (G, z ) ;
d i v := F i l t e r e d ( D i v i s o r s I n t ( Exponent (C) / Order ( z ) ) ,
m−>not Gcd (m, Order ( z ) ) in [ 1 , 2 , 3 , 4 , 6 ] ) ;
i f Length ( d i v ) < 1 then continue ; f i ;
# Check f o r t h e e a s y c a s e s
b := IMMtests (C ) ;
i f b=true
then continue ;
e l i f I s L i s t ( b ) then
i f R a t i o n a l C l a s s (C, z)= R a t i o n a l C l a s s (C, b [ 2 ] )
then return b ;
fi ;
fi ;
CT := O r d i n a r y C h a r a c t er T a b le (C) ;
for c h i in I r r (CT) do
for m in d i v do
i f not I s R a t ( beta (CT, z , m, c h i ) )
then return [m, z , c h i ,CT ] ;
fi ;
od ;
od ;
od ;
return true ;
end ;
Our typical procedure will be as follows: given a group G, take its Sylow 5subgroup P and find u, g ∈ P such that |P5 (u, g)| 6= |P5 (u, g n )| for 5 ∤ n, and
then show that |G5 (u, g)| 6= |G5 (u, g n )|. The second entry in the list returned by
THE FSZ PROPERTIES OF SPORADIC SIMPLE GROUPS
11
FSZtest gives precisely the g value we need. But it does not provide the u value
directly, nor the n. As it turns out, we can always take n = 2 when o(g) = 5, but
for other orders this need not necessarily hold.
In order to acquire these values we introduce the function FSIndPt below, which
is a variation on FSInd [4]. This function has the same essential limitation that
FSInd does, in that it needs to completely enumerate, store, and sort the elements
of the group. This could in principle be avoided, at the cost of increased run-time.
However our main use for the function is to apply it to Sylow 5-subgroups which
have small enough order that this issue does not pop up.
The inputs are a group G, m ∈ N and g ∈ G. It is best if one in fact passes in
CG (g) for G, but the function will compute the centralizer regardless. The function
looks for an element u ∈ CG (g) and an integer j coprime to the order of g such that
|Gm (u, g)| 6= |Gm (u, g j )|. The output is the two element list [u,j] if such data
exists, otherwise it returns fail to indicate that the test is normally inconclusive.
Note that by Lemma 1.3 and centrality of g in C = CG (g) we need only consider
the rational classes in C to find such a u.
FSIndPt:= function (G,m, g )
l o c a l GG, C, Cl , g u c o e f f , elG , Gm, a l i s t ,
a u l i s t , u m l i s t , npos , j , n , u , pr ;
C := C e n t r a l i z e r (G, g ) ;
GG := EnumeratorSorted (C ) ; ;
elG := S i z e (C ) ;
Gm := L i s t (GG, x−>P o s i t i o n (GG, xˆm) ) ;
pr := P r imeResidues ( Order ( g ) ) ;
for Cl in R a t i o n a l C l a s s e s (C) do
u := R e p r e s e n t a t i v e ( Cl ) ;
npos := [ ] ;
a l i s t := [ ] ;
a u l i s t := [ ] ;
u m l i s t := [ ] ;
g u c o e f f := [ ] ;
u m l i s t := L i s t (GG, a−>P o s i t i o n (GG,
( a∗ I n v e r s e ( u ) ) ˆm) ) ; ;
#The f o l l o w i n g computes t h e c a r d i n a l i t i e s
# o f G m( u , g ˆn ) .
for n in pr
12
MARC KEILBERG
do
npos := P o s i t i o n (GG, g ˆn ) ;
a l i s t := P o s i t i o n s (Gm, npos ) ;
a u l i s t := P o s i t i o n s ( u m l i s t , npos ) ;
g u c o e f f [ n ] := S i z e (
Intersection ( alist , aulist ));
#Check i f we ’ ve fou n d our u
i f not g u c o e f f [ n ] = g u c o e f f [ 1 ]
then return [ u , n ] ;
fi ;
od ;
od ;
#No u was fou n d f o r t h i s G,m, g
return f a i l ;
end ;
Lastly, we introduce the function FSZSetCards, which is the most naive and
straightforward way of computing both |Gm (u, g)| and |Gm (u, g n )|. The inputs are
a set C of group elements—normally this would be CG (g), but could be a conjugacy
class or some other subset or subgroup—; group elements u, g; and integers m, n
such that g 6= g n . The output is a two element list, which counts the number of
elements of C in Gm (u, g) in the first entry and the number of elements of C in
Gm (u, g n ) in the second entry. It is left to the user to check that the inputs satisfy
whatever relations are needed, and to then properly interpret the output.
FSZSetCards := function (C, u , g ,m, n )
l o c a l c o n t r i b s , apow , aupow , a ;
c o n t r i b s := [ 0 , 0 ] ;
for a in C do
apow := a ˆm;
aupow := ( a ∗ I n v e r s e ( u ) ) ˆm;
i f ( apow = g and aupow = g ) then
c o n t r i b s [ 1 ] := c o n t r i b s [ 1 ] + 1 ;
e l i f ( apow=g ˆn and aupow=gˆn ) then
c o n t r i b s [ 2 ] := c o n t r i b s [ 2 ] + 1 ;
fi ;
od ;
return ( c o n t r i b s ) ;
end ;
THE FSZ PROPERTIES OF SPORADIC SIMPLE GROUPS
13
As long as C admits a reasonable iterator in GAP then this function can compute
these cardinalities with a very minimal consumption of memory. Any polycyclic or
permutation group satisfies this, as well as any conjugacy class therein. However,
for a matrix group GAP will attempt to convert to a permutation representation,
which is usually very costly.
The trade-off, as it often is, is in the speed of execution. For permutation groups
the run-time can be heavily impacted by the degree, such that it is almost always
worthwhile to apply SmallerDegreePermutationRepresentation whenever possible. If the reader wishes to use this function on some group that hasn’t been tested
before, the author would advise adding in code that would give you some ability
to gauge how far along the function is. By default there is nothing in the above
code, even if you interrupt the execution to check the local variables, to tell you if
the calculation is close to completion. Due to a variety of technical matters it is
difficult to precisely benchmark the function, but when checking a large group it
is advisable to acquire at least some sense of whether the calculation may require
substantial amounts of time.
Remark 3.2. Should the reader opt to run our code to see the results for themselves,
they may occasionally find that the outputs of FSZSetCards occur in the opposite
order we list here. This is due to certain isomorphisms and presentations for groups
calculated in GAP not always being guaranteed to be identical every single time you
run the code. As a result, the values for u or g may sometimes be a coprime power
(often the inverse) of what they are in other executions of the code. Nevertheless,
there are no issues with the function proving the non-F SZ property thanks to
Lemma 1.3, and there is sufficient predictability to make the order of the output
the only variation.
While very naive, FSZSetCards will suffice for most of our purposes, with all
uses of it completing in an hour or less. However, in Section 6 we will find an
example where the expected run-time for this function is measured in weeks, and
for which FSZtest requires immense amounts of memory—Schauenburg [13] says
that FSZtest for this group consumed 128 GB of memory without completing!
We therefore need a slightly less naive approach to achieve a more palatable runtime in this case. We leave this to Section 6, but note to the reader that the method
this section uses can also be applied to all of the other groups for which FSZSetCards
suffices. The reason we bother to introduce and use FSZSetCards is that the method
of Section 6 relies on being able to compute conjugacy classes, which can hit memory
consumption issues that FSZSetCards will not encounter. It is not our goal with
these functions to find the most efficient, general-purpose procedure. Instead we
seek to highlight some of the ways in which computationally problematic groups
may be rendered tractable by altering the approach one takes, and to show that the
non-F SZ property of these groups can be demonstrated in a (perhaps surprisingly)
short amount of time and with very little memory consumption.
4. The non-F SZ sporadic simple groups
The goal for this section is to show that the Chevalley group G2 (5), and all
sporadic simple groups with order divisible by 56 , as well as their Sylow 5-subgroups,
are non-F SZ5 . We begin with a discussion of the general idea for the approach.
Our first point of observation is that the only primes p such that pp+1 divides the
order of any of these groups have p ≤ 5. Indeed, a careful analysis of the non-F SZ
14
MARC KEILBERG
groups of order 56 found in [4] shows that several of them are non-split extensions
with a normal extra-special group of order 55 , which can be denoted in AtlasRep
notation as 51+4 .5. Consulting the known maximal subgroups for these groups we
can easily infer that the Sylow 5-subgroups of HN , G2 (5), B, and Ly have this same
form, and that the Monster has such a p-subgroup. Indeed, G2 (5) is a maximal
subgroup of HN , and B and Ly have maximal subgroups containing a copy of
HN , so these Sylow subgroups are all isomorphic. Furthermore, the Monster’s
Sylow 5-subgroup has the form 51+6 .52 , a non-split extension of the elementary
abelian group of order 25 by an extra special group of order 57 . Given this, we
suspect that these Sylow 5-subgroups are all non-F SZ5 , and that this will cause
the groups themselves to be non-F SZ5 .
We can then exploit the fact that non-trivial p-groups all have non-trivial centers
to obtain centralizers in the parent group that contain a Sylow 5-subgroup. In the
case of G = HN or G = G2 (5), we can quickly find u, g ∈ P , with P a Sylow
5-subgroup of G, such that |P5 (u, g)| 6= |P5 (u, g 2 )|, and show that for H = CG (g)
we have |H5 (u, g)| 6= |H5 (u, g 2 )|. Since necessarily |H5 (u, g)| = |G5 (u, g)| and
|H5 (u, g 2 )| = |G5 (u, g 2 )|, this will show that HN and G2 (5) are non-F SZ5 . Unfortunately, it turns out that P is not normal in H in either case, so the cardinalities of
these sets in H must be checked directly, rather than simply applying Corollary 2.5.
The remaining groups require a little more work, for various reasons.
In the case of the Monster, there is a unique non-identity conjugacy class yielding
a centralizer with order divisible by 59 . So we are free to pick any subgroup G
of M that contains a centralizer with this same order. Fortunately, not only is
such a (maximal) subgroup known, but Bray and Wilson [1] have also computed
a permutation representation for it. This is available in GAP via the AtlasRep
package. This makes all necessary calculations for the Monster accessible. The
Sylow 5-subgroup is fairly easily shown to be non-F SZ5 directly. However, the
centralizer we get in this way has large order, and its Sylow 5-subgroup is not
normal, making it impractical to work with on a personal computer. However,
further consultation of character tables shows that the Monster group has a unique
conjugacy class of an element of order 10 whose centralizer is divisible by 56 . So we
may again pick any convenient (maximal) subgroup with such a centralizer, and it
turns out the same maximal subgroup works. We construct the appropriate element
of order 10 by using suitable elements from Sylow subgroups of the larger centralizer,
and similarly to get the element u. Again it turns out that the Sylow 5-subgroup of
this smaller subgroup is not normal, so we must compute the set cardinalities over
the entire centralizer in question. However, this centralizer is about 1/8000-th the
size of the initial one, and we are subsequently able to calculate the appropriate
cardinalities in under an hour.
The Baby Monster can then be handled by using the fact that the Monster
contains the double cover of B as the centralizer of an involution to obtain the centralizer we need in B from a centralizer in M . The author thanks Robert Wilson
for reminding them of this fact. For the Lyons group, the idea is much the same
as for HN and G2 (5), with the additional complication that the AtlasRep package
does not currently contain any permutation representations for Ly. To resolve this,
we obtain a permutation representation for Ly, either computed directly in GAP
THE FSZ PROPERTIES OF SPORADIC SIMPLE GROUPS
15
or downloaded [12]. This is then used to construct a suitable permutation representation of the maximal subgroup in question. Once this is done the calculations
proceed without difficulties.
These calculations all make extensive use of the functions given in Section 3.
4.1. Chevalley group G2 (5). We now show that G2 (5) and its Sylow 5-subgroups
are not F SZ5 . This was independently verified in [13]. Since G2 (5) is of relatively
small order, it can be attacked quickly and easily.
Theorem 4.1. The simple Chevalley group G2 (5) and its Sylow 5-subgroup are
non-F SZ5 .
Proof. The claims follow from running the following GAP code.
G := AtlasGroup ( ”G2 ( 5 ) ” ) ; ;
P := SylowSubgroup (G, 5 ) ; ;
# The f o l l o w i n g shows P i s n ot FSZ 5
g := FSZtestZ (P ) [ 2 ] ;
# Find u
u := FSIndPt (P , 5 , g ) [ 1 ] ; ;
C := C e n t r a l i z e r (G, g ) ; ;
#Check t h e c a r d i n a l i t i e s
FSZSetCards (C, u , g , 5 , 2 ) ;
The output is [0,625], so it follows that G and P are both non-F SZ5 as desired.
We note that P is not normal in C, and indeed C is a perfect group of order
375,000 = 23 · 3 · 56 .
The call to FSZSetCards above runs in approximately 11 seconds, which is approximately the amount of time necessary to run FSZtest on G2 (5) directly. In
this case, the use of FSZSetCards is not particularly efficient, as the groups in
question are of reasonably small sizes and permutation degree. Nevertheless, this
demonstrates the basic method we will employ for all subsequent groups.
4.2. The Harada-Norton group. For the group HN the idea proceeds similarly
as for G2 (5).
Theorem 4.2. The Harada-Norton simple group HN and its Sylow 5-subgroup are
not F SZ5 .
Proof. To establish the claims it suffices to run the following GAP code.
G := AtlasGroup ( ”HN” ) ; ;
P := SylowSubgroup (G, 5 ) ; ;
# G, t h u s P, has v e r y l a r g e d e g r e e .
# P o l y c y c l i c g r o u p s are e a s i e r t o work w i t h .
i s o P := IsomorphismPcGroup (P ) ; ;
P := Image ( i s o P ) ; ;
16
MARC KEILBERG
#Find u , g f o r P
g := FSZtestZ (P ) [ 2 ] ;
u := FSIndPt (P , 5 , g ) [ 1 ] ;
g := Image ( Inver seGener a lMa pping ( i s o P ) , g ) ; ;
u := Image ( Inver seGener a lMa pping ( i s o P ) , u ) ; ;
C := C e n t r a l i z e r (G, g ) ; ;
iso C := IsomorphismPcGroup (C ) ; ;
C := Image ( iso C ) ; ;
FSZSetCards (C, Image ( isoC , u ) , Image ( isoC , g ) , 5 , 2 ) ;
This code executes in approximately 42 minutes, with approximately 40 of that
spent finding P . The final output is [3125,0], so we conclude that both P and HN
are non-F SZ5 , as desired.
P is again not a normal subgroup of C, so we again must test the entire centralizer
rather than just P . We note that |C| = 25 56 = 500,000. Indeed, C is itself nonF SZ5 of necessity, and the fact that the call to IsomorphismPcGroup did not fail
means that C is solvable, and in particular not perfect and not a p-group.
4.3. The Monster group. We will now consider the Monster group M . The full
Monster group is famously difficult to compute in. But, as detailed in the beginning of the section, by consulting character tables of M and its known maximal
subgroups, we can find a maximal subgroup which contains a suitable centralizer
(indeed, two suitable centralizers) and also admits a known permutation representation [1].
Theorem 4.3. The Monster group M and its Sylow 5-subgroup are not F SZ5 .
Proof. The Sylow 5-subgroup of M has order 59 . Consulting the character table of
M , we see that M has a unique conjugacy class yielding a proper centralizer with
order divisible by 59 , and a unique conjugacy class of an element of order 10 whose
centralizer has order divisible by 56 ; moreover, the order of the latter centralizer is
precisely 12 million, and in particular is not divisible by 57 . It suffices to consider
any maximal subgroups containing such centralizers. The maximal subgroup of
shape 51+6
: 2.J2 .4, which is the normalizer associated to a 5B class, is one such
+
choice.
We first show that the Sylow 5-subgroup of M is not F SZ5 .
G :=
P :=
isoP
P :=
AtlasGroup ( ” 5 ˆ ( 1 + 6 ) : 2 . J2 . 4 ” ) ; ;
SylowSubgroup (G, 5 ) ; ;
:= IsomorphismPcGroup (P ) ; ;
Image ( i s o P ) ; ;
ex := FSZtestZ (P ) ;
The proper centralizer with order divisible by 59 is still impractical to work with.
So we will use the data for P to construct the element of order 10 mentioned above.
THE FSZ PROPERTIES OF SPORADIC SIMPLE GROUPS
17
zp := ex [ 2 ] ; ;
zp := Image ( Inver seGener a lMa pping ( i s o P ) , zp ) ; ;
C := C e n t r a l i z e r (G, zp ) ; ;
Q := SylowSubgroup (C , 2 ) ; ;
zq := F i r s t ( Center (Q) , q−>Order ( q)>1 and
S i z e ( C e n t r a l i z e r (G, zp ∗q ) ) = 1 2 0 0 0 0 0 0 ) ; ;
#This g i v e s us t h e g and c e n t r a l i z e r we want .
g := zp ∗ zq ; ;
C := C e n t r a l i z e r (G, g ) ; ;
#Reducing t h e p e r m u t a t i o n d e g r e e w i l l
#s a v e a l o t o f compu t at ion t ime l a t e r .
iso C := S m a l l e r D e g r e e P e r m u t a t i o n R e p r e s e n t a t i o n (C ) ; ;
C := Image ( iso C ) ; ;
g := Image ( isoC , g ) ; ;
zp := Image ( isoC , zp ) ; ;
zq := Image ( isoC , zq ) ; ;
#Now
P :=
isoP
P :=
proceed to con st ru ct a choice of u .
SylowSubgroup (C , 5 ) ; ;
:= IsomorphismPcGroup (P ) ; ;
Image ( i s o P ) ; ;
ex := FSIndPt (P, 5 , Image ( iso P , zp ) ) ;
up := Image ( Inver seGener a lMa pping ( i s o P ) , ex [ 1 ] ) ; ;
#D e f i n e our c h o i c e o f u .
#In t h i s case , u has o r d e r 5 0 .
u := up∗ zq ; ;
#F i n a l l y , we compute t h e c a r d i n a l i t i e s
# of the relevant s e t s .
FSZSetCards (C, u , g , 5 , 7 ) ;
This final function yields [0,15000], which proves that M is not F SZ5 , as desired.
This final function call takes approximately 53 minutes to complete, while all
preceding operations can complete in about 5 minutes combined—though the conversion of C to a lower degree may take more than this, depending. The lower
degree C has degree 18, 125, but requires (slightly) more than 2 GB of memory to
acquire. This conversion can be skipped to keep the memory demands well under
2GB, but the execution time for FSZSetCards will inflate to approximately a day
and a half.
18
MARC KEILBERG
Remark 4.4. In the first definition of C above, containing the full Sylow 5-subgroup
of M , we have |C| = 9.45 × 1010 = 28 · 33 · 59 · 7. For the second definition of C,
corresponding to the centralizer of an element of order 10, we have |C| = 1.2×107 =
28 · 3 · 56 . The first centralizer is thus 7875 = 32 · 53 · 7 times larger than the second
one. Either one is many orders of magnitude smaller than |M | ≈ 8.1 × 1053 , but
the larger one was still too large to work with for practical purposes.
4.4. The Baby Monster. We can now consider the Baby Monster B.
Theorem 4.5. The Baby Monster B and its Sylow 5-subgroup are both non-F SZ5 .
Proof. The Baby Monster is well known to have a maximal subgroup of the form
HN.2, so it follows that B and HN have isomorphic Sylow 5-subgroups. By Theorem 4.2 HN has a non-F SZ5 Sylow 5-subgroup, so this immediately gives the
claim about the Sylow 5-subgroup of B.
From the character table of B we see that there is a unique non-identity conjugacy class whose centralizer has order divisible by 56 . This corresponds to an element of order 5 from the 5B class, and the centralizer has order 6,000,000 = 27 ·3·56 .
In the double cover 2.B of B, this centralizer is covered by the centralizer of an
element of order 10. This centralizer necessarily has order 12, 000, 000. Since M
contains 2.B as a maximal subgroup, and there is a unique centralizer of an element
of order 10 in M with order divisible by 12,000,000, these centralizers in 2.B and M
are isomorphic. We have already computed this centralizer in M in Theorem 4.3.
To obtain the centralizer in B, we need only quotient by an appropriate central
involution. In the notation of the proof of Theorem 4.3, this involution is precisely
zq.
GAP will automatically convert this quotient group D into a lower degree representation, yielding a permutation representation of degree 3125 for the centralizer.
This will require as much as 8GB of memory to complete. Moreover, the image
of zp from Theorem 4.3 in this quotient group yields the representative of the 5B
class we desire, denoted here by g. Using the image of up in the quotient for u,
we can then easily run FSZSetCards(C,u,g,5,2) to get a result of [15000,3125],
which shows that B is non-F SZ5 as desired. This final call completes in about 4
minutes.
Note that in M the final return values summed to 15,000, with one of the values
0, whereas in B they sum to 18,125 and neither is zero. This reflects how there
is no clear relationship between the F SZ properties of a group and its quotients,
even when the quotient is by a (cyclic) central subgroup. In particular, it does not
immediately follow that the quotient centralizer would yield the non-F SZ property
simply because the centralizer in M did, or vice versa.
Moreover, we also observe that the cardinalities computed in Theorem 4.2 implies that for a Sylow 5-subgroup P of B we have P5 (u, g 2 ) = ∅, so the 3125 ”extra”
elements obtained in B5 (u, g 2 ) come from non-trivial conjugates of P . This underscores the expected difficulties in a potential proof (or disproof) of Conjecture 2.7.
4.5. The Lyons group. There is exactly one other sporadic group with order
divisible by 56 (or pp+1 for p > 3): the Lyons group Ly.
Theorem 4.6. The maximal subgroup of Ly of the form 51+4 : 4.S6 has a faithful
permutation representation on 3,125 points, given by the action on the cosets of
THE FSZ PROPERTIES OF SPORADIC SIMPLE GROUPS
19
4.S6 . Moreover, this maximal subgroup, Ly, and their Sylow 5-subgroups are all
non-F SZ5 .
Proof. It is well-known that Ly contains a copy of G2 (5) as a maximal subgroup,
and that the order of Ly is not divisible by 57 . Therefore Ly and G2 (5) have
isomorphic Sylow 5-subgroups, and by Theorem 4.1 this Sylow subgroup is not
F SZ5 .
Checking the character table for Ly as before, we find there is a unique nonidentity conjugacy class whose corresponding centralizer has order divisible by 56 .
In particular, the order of this centralizer is 2,250,000 = 24 ·32 ·56 , and it comes from
an element of order 5. So any maximal subgroup containing an element of order 5
whose centralizer has this order will suffice. The maximal subgroup 51+4 : 4.S6 is
the unique such choice.
The new difficulty here is that, by default, there are only matrix group representations available though the AtlasRep package for Ly and 51+4 : 4.S6 , which
are ill-suited for our purposes. However, faithful permutation representations for
Ly are known, and they can be constructed through GAP with sufficient memory
available provided one uses a well-chosen method. A detailed description of how to
acquire the permutation representation on 8,835,156 points, as well as downloads
for the generators (including MeatAxe versions courtesy of Thomas Breuer) can be
found on the web, courtesy Pfeiffer [12].
Using this, we can then obtain a permutation representation for the maximal subgroup 51+4 : 4.S6 on 8,835,156 points using the programs available on the online
ATLAS [16]. This in turn is fairly easily converted into a permutation representation on a much smaller number of points, provided one has up to 8 GB of memory
available, via SmallerDegreePermutationRepresentation. The author obtained
a permutation representation on 3125 points, corresponding to the action on the
cosets of 4.S6 . The exact description of the generators is fairly long, so we will not
reproduce them here. The author is happy to provide them upon request. One can
also proceed in a fashion similar to some of the cases handled in [1] to find such a
permutation representation.
Once this smaller degree representation is obtained, it is then easy to apply
the same methods as before to show the desired claims about the F SZ5 properties. We can directly compute the Sylow 5-subgroup, then find u, g through
FSZtestZ and FSIndPt irrespectively, set C to be the centralizer of g, then run
FSZSetCards(C,u,g,5,2). This returns [5000,625], which gives the desired nonF SZ5 claims.
Indeed, FSZtest can be applied to (both) the centralizer and the maximal subgroup once this permutation representation is obtained. This will complete quickly,
thanks to the relatively low orders and degrees involved. We also note that the centralizer C so obtained will not have a normal Sylow 5-subgroup, and is a perfect
group. The maximal subgroup in question is neither perfect nor solvable, and does
not have a normal Sylow 5-subgroup.
5. The F SZ sporadic simple groups
We can now show that all other sporadic simple groups and their Sylow subgroups
are F SZ.
20
MARC KEILBERG
Example 5.1. Any group which is necessarily F SZ (indeed, F SZ + ) by [4, Corollary 5.3] necessarily has all of its Sylow subgroups F SZ, and so satisfies the conjecture. This implies that all of the following sporadic groups, as well as their Sylow
p-subgroups, are F SZ (indeed, F SZ + ).
• The Mathieu groups M11 , M12 , M22 , M23 , M24 .
• The Janko groups J1 , J2 , J3 , J4 .
• The Higman-Simms group HS.
• The McLaughlin group M cL.
• The Held group He.
• The Rudvalis group Ru.
• The Suzuki group Suz.
• The O’Nan group O′ N .
• The Conway group Co3 .
• The Thompson group T h.
• The Tits group 2 F4 (2)′ .
Example 5.2. Continuing the last example, it follows that the following are the
only sporadic simple groups not immediately in compliance with the conjecture
thanks to [4, Corollary 5.3].
• The Conway groups Co1 , Co2 .
• The Fischer groups F i22 , F i23 , F i′24 .
• The Monster M .
• The Baby Monster B.
• The Lyons group Ly.
• The Harada-Norton group HN .
The previous section showed that the last four groups were all non-F SZ5 and have
non-F SZ5 Sylow 5-subgroups, and so conform to the conjecture. By exponent considerations the Sylow subgroups of the Conway and Fischer groups are all F SZ + .
The function FSZtest can be used to quickly show that Co1 , Co2 , F i22 , and F i23
are F SZ, and so conform to the conjecture.
This leaves just the largest Fischer group F i′24 .
Theorem 5.3. The sporadic simple group F i′24 and its Sylow subgroups are all
F SZ.
Proof. The exponent of F i′24 can be calculated from its character table and shown
to be
24,516,732,240 = 24 · 33 · 5 · 7 · 11 · 13 · 17 · 23 · 29.
As previously remarked, this automatically implies that the Sylow subgroups are all
F SZ (indeed, F SZ + ). By [4, Corollary 5.3] it suffices to show that every centralizer
of an element with order not in {1, 2, 3, 4, 6} in F i′24 that contains an element of
order 16 is F SZ. There is a unique conjugacy class in F i′24 for an element with
order (divisible by) 16. The centralizer of such an element has order 32, and is
isomorphic to Z16 × Z2 . So it suffices to consider the elements of order 8 in this
centralizer, and show that their centralizers (in F i′24 ) are F SZ. Every such element
has a centralizer of order 1536 = 29 · 3. So by Theorem 3.1 the result follows.
The following is GAP code verifying these claims.
G := AtlasGroup ( ” Fi2 4 ’ ” ) ; ;
THE FSZ PROPERTIES OF SPORADIC SIMPLE GROUPS
21
GT := C h a r a c t e r T a b l e ( ” Fi2 4 ’ ” ) ; ;
P o s i t i o n s ( O r d e r s C l a s s R e p r e s e n t a t i v e s (GT) mod 1 6 , 0 ) ;
exp := Lcm( O r d e r s C l a s s R e p r e s e n t a t i v e s (GT) ) ;
C o l l e c t e d ( F a c t o r s I n t ( exp ) ) ;
SetExponent (G, exp ) ; ;
P := SylowSubgroup (G, 2 ) ; ;
#There are many ways t o g e t an e l e m e n t o f o r d e r 1 6 .
#Here ’ s a v e r y crude , i f non−d e t e r m i n i s t i c , one .
x := Random(P ) ; ;
while not Order ( x ) = 16 do x:=Random(P ) ; od ;
C := C e n t r a l i z e r (G, x ) ; ;
c e n t s := F i l t e r e d (C, y−>Order ( y ) = 8 ) ; ;
c e n t s := L i s t ( c e n t s , y−>C e n t r a l i z e r (G, y ) ) ; ;
L i s t ( cents , Size ) ;
The following then summarizes our results on sporadic simple groups.
Theorem 5.4. The following are equivalent for a sporadic simple group G.
(1) G is not F SZ.
(2) G is not F SZ5 .
(3) The order of G is divisible by 56 .
(4) G has a non-F SZ Sylow subgroup.
(5) The Sylow 5-subgroup of G is not F SZ5 .
Proof. Combine the results of this section and the previous one.
6. The symplectic group S6 (5)
In [13] it was mentioned that the symplectic group S6 (5) was likely to be the
second smallest non-F SZ simple group, after G2 (5). Computer calculations there
ran into issues when checking a particular centralizer, as the character table needed
excessive amounts of memory to compute. Our methods so far also place this group
at the extreme end of what’s reasonable. In principle the procedure and functions
we’ve introduced so far can decide that this group is non-F SZ in an estimated two
weeks of uninterrupted computations, and with nominal memory usage. However,
we can achieve a substantial improvement that completes the task in about 8 hours
(on two processes; 16 hours for a single process), while maintaining nominal memory
usage.
The simple yet critical observation comes from [13, Definition 3.3]. In particular,
if a ∈ Gm (u, g), then am = g implies that for all b ∈ classCG (g) (a) we have bm = g.
So while FSZSetCards acts as naively as possible and iterates over all elements of
22
MARC KEILBERG
C = CG (g), we in fact need to only iterate over the elements of those conjugacy
classes of C whose m-th power is g (or g n ). GAP can often compute the conjugacy
classes of a finite permutation or polycyclic group quickly and efficiently. So while
it is plausible that finding these conjugacy classes can be too memory intensive
for certain centralizers, there will nevertheless be centralizers for which all other
methods are too impractical for either time or memory reasons, but for which this
reduction to conjugacy classes makes both time and memory consumption a nonissue. The otherwise problematic centralizer of S6 (5) is precisely such a case, as we
will now see.
Theorem 6.1. The projective symplectic group S6 (5) and its Sylow 5-subgroup are
both non-F SZ5 .
Proof. As usual, our first task is to show that the Sylow 5-subgroup is non-F SZ5 ,
and then use the data obtained from that to attack S6 (5).
G :=
P :=
isoP
P :=
AtlasGroup ( ” S6 ( 5 ) ” ) ; ;
SylowSubgroup (G, 5 ) ; ;
:= IsomorphismPcGroup (P ) ; ;
Image ( i s o P ) ; ;
#Show P i s non−FSZ 5 , and
#g e t t h e g we need v i a FS Zt est Z
g := FSZtestZ (P ) [ 2 ] ;
#Get t h e u we need v i a FSIndPt
u := FSIndPt (P , 5 , g ) [ 1 ] ;
One can of course store the results of FSZtestZ and FSIndPt directly to see the
complete data returned, and then extract the specific data need.
We can then show that G = S6 (5) is itself non-F SZ5 by computing G5 (u, g) and
G5 (u, g 2 ) with the following code.
G :=
isoG
G :=
g :=
u :=
uinv
C e n t r a l i z e r (G, g ) ; ;
:= S m a l l e r D e g r e e P e r m u t a t i o n R e p r e s e n t a t i o n (G ) ; ;
Image ( isoG ) ; ;
Image ( isoG , g ) ; ;
Image ( isoG , u ) ; ;
:= I n v e r s e ( u ) ; ;
#Now we compute t h e c o n j u g a c y c l a s s e s
# of the c e n t r a l i z e r .
c l := C o n j u g a c y C l a s s e s (G ) ; ;
#We t h e n need o n l y c o n s i d e r t h o s e
# c l a s s e s w i t h a s u i t a b l e 5− t h power
cand1 := F i l t e r e d ( c l , x−>R e p r e s e n t a t i v e ( x)ˆ5=g ) ; ;
cand2 := F i l t e r e d ( c l , x−>R e p r e s e n t a t i v e ( x)ˆ5=g ˆ 2 ) ; ;
THE FSZ PROPERTIES OF SPORADIC SIMPLE GROUPS
23
#There i s i n f a c t o n l y one c o n j u g a c y
# c l a s s in both cases .
Length ( cand1 ) ;
Length ( cand2 ) ;
cand1 := cand1 [ 1 ] ; ;
cand2 := cand2 [ 1 ] ; ;
#The f o l l o w i n g computes | G 5 ( u , g ) |
Number ( cand1 , x−>(x∗ uinv )ˆ5=g ) ;
#The f o l l o w i n g computes | G 5 ( u , g ˆ 2 ) |
Number ( cand2 , x−>(x∗ uinv )ˆ5=g ˆ 2 ) ;
This code shows that
|G5 (u, g)| = 1,875,000;
|G5 (u, g 2 )| = 375,000.
Therefore S6 (5) is non-F SZ5 , as desired.
The calculation of |G5 (u, g)| takes approximately 8.1 hours, and the calculation of |G5 (u, g 2 )| takes approximately 7.45 hours. The remaining calculations are
done in significantly less combined time. We note that the calculations of these
two cardinalities can be done independently, allowing each one to be calculated
simultaneously on separate GAP processes.
We also note that the centralizer in S6 (5) under consideration in the above
is itself a perfect group; is a permutation group of degree 3125 and order 29.25
billion; and has a non-normal Sylow 5-subgroup. Moreover, it can be shown that
the g we found yields the only rational class of P at which P fails to be F SZ. One
consequence of this, combined with the character table of S6 (5), is that, unlike in
the case of the Monster group, we are unable to switch to any other centralizer
with a smaller Sylow 5-subgroup to demonstrate the non-F SZ5 property.
Similarly as with the Baby Monster group, it is interesting to note that |P5 (u, g)| =
62,500 and |P5 (u, g 2 )| = 0 for P, u, g as in the proof. These cardinalities can be
quickly computed exactly as they were for S6 (5), simply restricted to P , or using the slower FSZSetCards, with the primary difference being that now there are
multiple conjugacy classes to check and sum over.
Before continuing on to the next section, where we consider small order perfect
groups available in GAP, we wish to note a curious dead-end, of sorts.
Lemma 6.2. Given u, g ∈ G with [u, g] = 1, let C = CG (g), D = CC (u), and
m ∈ N. Then a ∈ Gm (u, g) if and only if ad ∈ Gm (u, g) for some/any d ∈ D.
Proof. This is noted by Iovanov et al. [4] when introducing the concept of an F SZ +
group. It is an elementary consequence of the fact that D = CG (u, g) centralizes
both g and u by definition.
So suppose we have calculated those conjugacy classes in C whose m-th power is
g. As in the above code, we can iterate over all elements of these conjugacy classes
in order to compute |Gm (u, g)|. However, the preceding lemma shows that we could
instead partition each such conjugacy class into orbits under the D action. The
24
MARC KEILBERG
practical upshot then being that we need only consider a single element of each
orbit in order to compute |Gm (u, g)|.
In the specific case of the preceding theorem, we can show that the single conjugacy classes cand1 and cand2 both have precisely 234 million elements, and that
D is a non-abelian group of order 75,000, and is in fact the full centralizer of u in
S6 (5). Moreover the center of C is generated by g, and so has order 5. Thus in the
best-case scenario partitioning these conjugacy classes into D orbits can result in
orbits with |D/Z(C)| = 15,000 elements each. The cardinalities we computed can
also be observed to be multiples 15,000. That would constitute a reduction of more
than four orders of magnitude on the total number of elements we would need to
check. While this is a best-case scenario, since D also has index 390,000 in C it
seems very plausible that such a partition would produce a substantial reduction in
the number of elements to be checked. So provided that calculating these orbits can
be done reasonably quickly, we would expect a significant reduction in run-time.
There is a practical problem, however. The problem being that, as far as the
author can tell, there is no efficient way for GAP to actually compute this partition.
Doing so evidently requires that GAP fully enumerate and store the conjugacy class
in question. In our particular case, a conjugacy class of 234 million elements in a
permutation group of degree 3125 simply requires far too much memory—in excess
of 1.5 terabytes. As such, while the lemma sounds promising, it seems to be lacking
in significant practical use for computer calculations. It seems likely, in the author’s
mind, that any situation in which it is useful could have been handled in reasonable
time and memory by other methods. Nevertheless, the author cannot rule out the
idea as a useful tool.
7. Perfect groups of order less than 106
We now look for examples of additional non-F SZ perfect groups. The library
of perfect groups stored by GAP has most perfect groups of order less than 106 ,
with a few exceptions noted in the documentation. So we can iterate through the
available groups, of which there are 1097 at the time this paper was written. We
can use the function IMMtests from Section 3 to show that most of them are F SZ.
#Get a l l a v a i l a b l e s i z e s
G l i s t := F i l t e r e d ( S i z e s P e r f e c t G r o u p s ( ) ,
n−>N r P e r f e c t L i b r a r y G r o u p s ( n ) > 0 ) ; ;
#Get a l l a v a i l a b l e p e r f e c t g r o u p s
G l i s t := L i s t ( G l i s t ,
n−>L i s t ( [ 1 . . N r P e r f e c t L i b r a r y G r o u p s ( n ) ] ,
k−>P er fectGr o up ( IsPermGroup , n , k ) ) ) ; ;
G l i s t := F l a t ( G l i s t ) ; ;
#Remove t h e o b v i o u s l y FSZ on es
F l i s t := F i l t e r e d ( G l i s t , G−>not IMMtests (G)=true ) ; ;
This gives a list of 63 perfect groups which are not immediately dismissed as being
F SZ.
THE FSZ PROPERTIES OF SPORADIC SIMPLE GROUPS
25
Theorem 7.1. Of the 1097 perfect groups of order less than 106 available through
the GAP perfect groups library, exactly 7 of them are not F SZ, all of which are
extensions of A5 . All seven of them are non-F SZ5 . Four of them have order
375,000 = 23 · 3 · 56 , and three of them have order 937,500 = 22 · 3 · 57 . Their perfect
group ids in the library are:
[375000, 2],
[375000, 8],
[375000, 9],
[937500, 3],
[937500, 4],
[937500, 5]
[375000, 11],
Proof. Continuing the preceding discussion, we can apply FSZtest to the 63 groups
in Flist to obtain the desired result. This calculation takes approximately two days
of total calculation time on the author’s computer, but can be easily split across
multiple GAP instances. Most of the time is spent on the F SZ groups of orders
375,000 and 937,500.
On the other hand, we can also consider the Sylow subgroups of all 1097 available
perfect groups, and test them for the F SZ property.
Theorem 7.2. If G is one of the 1097 perfect groups of order less than 106 available
through the GAP perfect groups library, then the following are equivalent.
(1)
(2)
(3)
(4)
G
G
G
G
is not F SZ.
has a non-F SZ Sylow subgroup.
has a non-F SZ5 Sylow 5-subgroup.
is not F SZ5 .
Proof. Most of the GAP calculations we need to perform now are quick, and the
problem is easily broken up into pieces, should it prove difficult to compute everything at once. The most memory intensive case requires about 1.7 GB to test.
With significantly more memory available than this, the cases can simply be tested
by FSZtest en masse, which will establish the result relatively quickly—a matter of
hours. We sketch the details here and leave it to the interested reader to construct
the relevant code. Recall that it is generally worthwhile to convert p-groups into
polycyclic groups in GAP via IsomorphismPcGroup.
Let Glist be constructed in GAP as before. Running over each perfect group,
we can easily construct their Sylow subgroups. We can then use IMMtests from
Section 3 to eliminate most cases. There are 256 Sylow subgroups, each from a
distinct perfect group, for which IMMtests is inconclusive; and there are exactly 4
cases where IMMtests definitively shows the non-F SZ property, which are precisely
the Sylow 5-subgroups of each of the non-F SZ perfect groups of order 375,000.
These 4 Sylow subgroups are all non-F SZ5 . We can also apply FSZtestZ to the
Sylow 5-subgroups of the non-F SZ perfect groups of order 937,500 to conclude
that they are all non-F SZ5 . All other Sylow subgroups remaining that come from
a perfect group of order less than 937,500 can be shown to be F SZ by applying
FSZtest without difficulty. Of the three remaining Sylow subgroups, one has a
direct factor of Z5 , and the other factor is easily tested and shown to be F SZ,
whence this Sylow subgroup is F SZ. This leaves two other cases, which are the
Sylow 5-subgroups of the perfect groups with ids [937500,7] and [937500,8]. The
second of these is easily shown to be FSZ by FSZtest. The first can also be
26
MARC KEILBERG
tested by FSZtest, but this is the case that requires the most memory and time—
approximately 15 minutes and the indicated 1.7 GB. In this case as well the Sylow
subgroups are F SZ. This completes the proof.
References
[1] John N. Bray and Robert A. Wilson. Explicit representations of maximal
subgroups of the monster. Journal of Algebra, 300(2):834 – 857, 2006.
ISSN 0021-8693. doi: http://dx.doi.org/10.1016/j.jalgebra.2005.12.017. URL
http://www.sciencedirect.com/science/article/pii/S0021869305007313.
[2] Pavel Etingof.
On some properties of quantum doubles of finite groups.
Journal of Algebra, 394:1 – 6, 2013.
ISSN 00218693.
doi:
http://dx.doi.org/10.1016/j.jalgebra.2013.07.004.
URL
http://www.sciencedirect.com/science/article/pii/S0021869313003529.
[3] GAP.
GAP – Groups, Algorithms, and Programming, Version 4.8.4.
http://www.gap-system.org, Jun 2016.
[4] M. Iovanov, G. Mason, and S. Montgomery. F SZ-groups and Frobenius-Schur
indicators of quantum doubles. Math. Res. Lett., 21(4):1–23, 2014.
[5] Yevgenia Kashina, Yorck Sommerhäuser, and Yongchang Zhu.
On
higher Frobenius-Schur indicators. Mem. Amer. Math. Soc., 181(855):
viii+65, 2006.
ISSN 0065-9266.
doi: 10.1090/memo/0855.
URL
http://dx.doi.org/10.1090/memo/0855.
[6] M. Keilberg. Examples of non-FSZ p-groups for primes greater than three.
ArXiv e-prints, September 2016. under review.
[7] Marc Keilberg.
Higher indicators for some groups and
their doubles.
J. Algebra Appl.,
11(2):1250030, 38,
2012.
ISSN 0219-4988.
doi:
10.1142/S0219498811005543.
URL
http://dx.doi.org/10.1142/S0219498811005543.
[8] Marc Keilberg.
Higher Indicators for the Doubles of Some Totally Orthogonal Groups.
Comm. Algebra, 42(7):2969–2998, 2014.
ISSN 0092-7872.
doi:
10.1080/00927872.2013.775651.
URL
http://dx.doi.org/10.1080/00927872.2013.775651.
[9] C. Negron and S.-H. Ng. Gauge invariants from the powers of antipodes. ArXiv
e-prints, September 2016.
[10] Siu-Hung Ng and Peter Schauenburg.
Higher Frobenius-Schur indicators for pivotal categories.
In Hopf algebras and generalizations, volume 441 of Contemp. Math., pages 63–90. Amer. Math.
Soc., Providence, RI, 2007.
doi: 10.1090/conm/441/08500.
URL
http://dx.doi.org/10.1090/conm/441/08500.
[11] Siu-Hung Ng and Peter Schauenburg. Central invariants and higher indicators for semisimple quasi-Hopf algebras. Trans. Amer. Math. Soc., 360(4):
1839–1860, 2008. ISSN 0002-9947. doi: 10.1090/S0002-9947-07-04276-6. URL
http://dx.doi.org/10.1090/S0002-9947-07-04276-6.
[12] Markus J. Pfeiffer.
Computing a (faithful) permutation representation of Lyons’ sporadic simple group,
2016.
URL
https://www.morphism.de/~markusp/posts/2016-06-20-computing-permutation-representation-ly
[13] P. Schauenburg. Higher frobenius-schur indicators for drinfeld doubles of finite groups through characters of centralizers. ArXiv e-prints, April 2016. in
preparation.
THE FSZ PROPERTIES OF SPORADIC SIMPLE GROUPS
27
[14] Peter Schauenburg. Some quasitensor autoequivalences of drinfeld doubles of
finite groups. Journal of Noncommutative Geometry, 11:51–70, 2017. doi:
10.4171/JNCG/11-1-2. URL http://dx.doi.org/10.4171/JNCG/11-1-2.
[15] R. A. Wilson, R. A. Parker, S. Nickerson, J. N. Bray, and T. Breuer. AtlasRep, a gap interface to the atlas of group representations, Version 1.5.1.
http://www.math.rwth-aachen.de/~Thomas.Breuer/atlasrep, Mar 2016.
Refereed GAP package.
[16] Robert Wilson, Peter Walsh, Jonathan Tripp, Ibrahim Suleiman, Richard
Parker, Simon Norton, Simon Nickerson, Steve Linton, John Bray, and
Rachel Abbott. ATLAS of Finite Group Representations - Version 3. URL
http://brauer.maths.qmul.ac.uk/Atlas/v3/. Accessed: October 3, 2016.
E-mail address: [email protected]
| 4math.GR
|
SceneFlowFields: Dense Interpolation of Sparse Scene Flow Correspondences
René Schuster1
Oliver Wasenmüller1
Georg Kuschk2
Christian Bailer1
Didier Stricker1
1
2
DFKI - German Research Center for Artificial Intelligence
BMW Group
arXiv:1710.10096v1 [cs.CV] 27 Oct 2017
firstname.lastname@{dfki,bmw}.de
Abstract
While most scene flow methods use either variational optimization or a strong rigid motion assumption, we show for
the first time that scene flow can also be estimated by dense
interpolation of sparse matches. To this end, we find sparse
matches across two stereo image pairs that are detected
without any prior regularization and perform dense interpolation preserving geometric and motion boundaries by
using edge information. A few iterations of variational energy minimization are performed to refine our results, which
are thoroughly evaluated on the KITTI benchmark and additionally compared to state-of-the-art on MPI Sintel. For
application in an automotive context, we further show that
an optional ego-motion model helps to boost performance
and blends smoothly into our approach to produce a segmentation of the scene into static and dynamic parts.
a)
b)
c)
1. Introduction
Scene flow describes the perceived 3D motion field with
respect to the observer. It can thereby be considered as an
extension to optical flow, which in comparison is the apparent motion field in 2D image space. Many applications
such as robot navigation, high level vision tasks, e.g. moving object detection [25], and driver assistance systems rely
on an accurate motion estimation of their surroundings. Especially the latter ones have great potential to make traffic
more comfortable and much safer. While scene flow is not
only a more detailed representation of the real world motion compared to optical flow, scene flow algorithms also
reconstruct the 3D geometry of the environment. Due to
the increased complexity when compared to depth or optical flow estimation, scene flow has only recently become
of bigger interest. At the same time, simply estimating
depth and optical flow separately to obtain scene flow (see
[19, 28, 29, 31]) is not exploiting the full potential of the
underlying data. The splitting produces incoherent results,
limits the exploitation of inherent redundancies, and in general yields a non-dense scene flow field. Approaches that
combine stereo depth estimation, e.g. [15], and 2D optical
d)
Figure 1. We present SceneFlowFields which uses stereo image
pairs (a), extracts scene flow boundaries (b), and computes a dense
scene flow field (c) that we compare to ground truth (d). The color
of the point clouds encodes the optical flow.
flow, e.g. [4, 30], have clearly been outperformed by a huge
margin in the KITTI benchmark [10].
Most state-of-the-art approaches are either designed for
indoor scenarios or describe outdoor scenes under mostly
stationary or rigid motion assumptions. Contrary to that,
our method is very versatile. In fact, we do not employ any
a-priori regularization. Our matching process inherently encodes a first order local smoothness assumption and is itself
solely data term based, while our interpolation scheme allows for very sharp discontinuities in the scene flow field.
An optional ego-motion extension that incorporates additional assumptions improves accuracy for challenging traf-
Figure 2. Overview of our SceneFlowFields. Blue color indicates
the optional ego-motion extension.
fic data sets like KITTI, but is no mandatory part of our
method. The basic version of the method and its optional
extension are illustrated in Figure 2. The single stages of
our approach are visualized in the supplementary video1 .
In more detail, we present a new scene flow approach –
called SceneFlowFields – that densely interpolates sparse
scene flow matches. The interpolation preserves boundaries of the 3D geometry and of moving objects by edgepreserving interpolation based on an improved edge detector to approximate scene flow boundaries. Matches are obtained by multi-scale propagation with random search to
compute a dense scene flow field that in turn is filtered to
remove outliers and leave sparse, robust correspondences
across all images. The combination of multi-scale matching
and edge-preserving interpolation sums to a novel method
which is in strong contrast with any existing method that
estimates scene flow. Matching can optionally be used to
estimate ego-motion and obtain sparse motion indicators
which can be interpolated to a dense motion segmentation.
Optionally using ego-motion, we can reconstruct the scene
flow for static parts of the scene directly. However, our
method does not rely on ego-motion estimation. In particular, our contribution consists of:
• A novel method to find scene flow matches.
• A new interpolation method for scene flow that preserves boundaries of geometry and motion.
• An improved edge detector to approximate scene flow
boundaries.
• An optional approach for straightforward integration
of ego-motion.
• Thorough evaluation of our method on KITTI and MPI
Sintel with comparison to state-of-the-art methods.
2. Related Work
Starting from Vedula et al. [32] who was among the first
to compute 3D scene flow, many variational approaches followed. First using pure color images as input [2, 17] and
later using RGB-D images [13, 18, 37]. While a varia1 https://youtu.be/7fsXq5EA0Rw
tional formulation is typically complex, [18] achieved realtime performance with a primal-dual framework. Yet, all
these approaches are sensitive to initialization and can not
cope with large displacements [36], which is why they use
a coarse-to-fine scheme. That in turn tends to miss finer
details. Furthermore, the RGB-D approaches rely on depth
sensors that either perform poorly in outdoor scenarios or
are accordingly very expensive [39].
Since it is hard to capture ground truth scene flow information, there exist only very few data sets to evaluate
scene flow algorithms on. Most of them use virtually rendered scenes to obtain the ground truth data [5, 9, 22]. To
the best of our knowledge the only realistic data set that
provides a benchmark for scene flow is the KITTI Vision
Benchmark [10] that combines various tasks for automotive
vision. Its introduction has played an important role in the
development of stereo and optical flow algorithms, and the
extension by [23] has also driven the progress in scene flow
estimation.
Due to the advent of a piece-wise rigid plane model [33],
scene flow has recently achieved a boost in performance.
The majority of top performing methods at the KITTI Vision Benchmark employ this model to enforce strong regularization [21, 23, 34]. In [34] the authors encode this model
by alternating assignment of each pixel to a plane segment
and each segment to a rigid motion, based on a discrete set
of planes and motions. In [23] the complexity of the model
is further lowered by the assumption that a scene consists
of only very few independently moving rigid objects. Thus
each plane segment only needs to be assigned to one object.
All segments assigned to the same object share the same
motion. By propagation of objects over multiple frames,
[24] achieves temporal consistency for [23]. The authors of
[21] solve the pixel-to-plane assignment and the plane-tomotion assignment in a continuous domain.
Another promising strategy builds on the decomposition
of a scene into static and moving parts [31]. While the motion of dynamic objects is estimated by solving a discrete labeling problem (as in [6]) using the Semi-Global-Matching
(SGM) [15] algorithm, the perceived motion of all static
parts is directly obtained from the 3D geometry of the scene
and the ego-motion of the camera. This approach is especially convenient for scenes, where only a small proportion
consists of moving objects, like it is typically the case in
traffic scenarios. However, any a-priori assumption limits
the versatility of a method. A rigid plane model performs
poorly when applied to deformable objects, and ego-motion
estimation for highly dynamic scenes is hard.
Our scene flow method differs from any of the mentioned
approaches. We find sparse scene flow matches that are interpolated to a dense scene flow field, recovering the geometry of the scene and the 3D motion. Our method has to be
distinguished from purely variational approaches. Although
we use variational optimization, it can be considered as a
post-processing step for refinement. During interpolation,
we assume that the geometry of a scene can be modeled
by small planar segments, but we do not initially presume
any segmentation. In fact, the size of our plane segments
only depends on the density of the matches, which leads
to smoothly curved shapes where matches are dense and to
planar patches where matches are sparse. The same holds
for our piece-wise affine motion model that is used to interpolate the 3D motion. These differences in the model and
additionally the difference in the optimization method draw
a clear boundary between our method and [21, 23, 34]. If
we apply our optional ego-motion model there is a conceptual overlap to [31] which also uses ego-motion to estimate
the 3D motion for the static parts of the scene. However, if
we do not apply the ego-motion model, both methods have
no noteworthy similarities. In any case, the way we estimate the ego-motion and the motion segmentation differs
essentially from [31].
Finally, one has to differentiate between dual-frame
[21, 23, 34] and multi-frame [24, 31, 34] approaches. Especially the images of KITTI have several characteristics
that make matching between two frame pairs much more
challenging than in a multi-view setting. First, considerably large stereo and flow displacements. Second, difficult
lighting conditions and many reflective surfaces. Third, fast
ego-motions combined with a low frame rate, which causes
large regions to move out of image bounds. This has to be
kept in mind when comparing results across these two categories.
3. SceneFlowFields
For scene flow computation we assume to have the typical stereo image information provided, i.e. two rectified
stereo image pairs (Il0 , Il1 , Ir0 , Ir1 ) at times t0 and t1 along
with the camera intrinsics. We further assume that the baseline B is known. For rectified images, the baseline describes
the relative pose between the left and right cameras as translation parallel to the image plane. We represent scene flow
as a 4D vector u = (u, v, d0 , d1 )T consisting of two optical flow components u, v and the disparity values d0 , d1
for both time steps. During matching, we jointly optimize
all four components to obtain coherent scene flow. Given
the mentioned information, we estimate a dense scene flow
field as follows: For k subscales we initialize the coarsest by
finding the best correspondences from kD-trees build with
feature vectors using Walsh-Hadamard-Transform (WHT)
[12]. For all k + 1 scales (the k subscales plus full resolution), we iteratively propagate scene flow vectors and adjust
them by random search. Afterwards, the dense scene flow
map on full resolution is filtered using an inverse scene flow
field and a region filter. The filtered scene flow map is further thinned out by only taking the best match in each non-
overlapping 3×3 block. Scene flow boundaries are detected
using a structured random forest. Geometry and 3D motion are separately interpolated based on a boundary-aware
neighborhood. Finally, we refine the 3D motion by variational optimization. An overview is outlined in Figure 2.
3.1. Sparse Correspondences
Matching Cost. The matching cost in our algorithm
solely depends on a data term. No additional smoothness
assumptions are made like e.g. in [13, 17, 21, 23, 33, 34].
Given a scene flow vector, we define its matching cost by
the sum of Euclidean distances between SIFTFlow features
[20] over small patches for three image correspondences.
These correspondences are the stereo image pair at time t0 ,
the temporal image pair for the left view point (standard optical flow correspondence) and a cross correspondence between the reference frame and the right frame at the next
time step. This leads to the following cost C for a scene
flow vector u at pixel p:
X
+
φ Il0 (p̃) − φ Il1 p̃ + (u, v)T
C=
p̃∈W (p)
+
φ Il0 (p̃) − φ Ir0 p̃ + (−d0 , 0)T
0
1
T
φ Il (p̃) − φ Ir p̃ + (u − d1 , v)
(1)
W (p) is a 7 × 7 patch window centered at pixel p and
φ (I (p)) returning the first three principal components of
a SIFT feature vector for image I and pixel p. The principal axes are computed for the combined SIFT features of all
four images. At image boundaries we replicate the boundary pixel to pad images.
Initialization. Initialization is based on kD-trees similar
to [11], but with three trees, using WHT features as in
[1, 35]. For each frame other than the reference frame, we
compute a feature vector per pixel and store them in a tree.
To initialize a pixel of the reference image, we query the
feature vector of the pixel to the pre-computed kD-trees.
Scene flow matches are then obtained by comparing all
combinations of the leafs for each queried node according
to the matching data term introduced before (Equation 1).
Since our stereo image pairs are rectified, for the images
observed from the right camera view, we create kD-trees
which regard the epipolar constraint, i.e. queries for such a
tree will only return elements, which lie on the same image row as the query pixel. This way, we can efficiently
lower the number of leaves per node for the epipolar trees,
which speeds up the initialization process without loss of
accuracy. For further acceleration, we use this initialization
on the coarsest resolution only, and let the propagation fill
the gaps when evolving to the next higher scale.
Multi-Scale Propagation. The initial matches get spread
by propagation and steadily refined by random search. This
is done over multiple scales which helps to distribute rare
correct initial matches over the whole image. For each
scale, we run several iterations of propagation in one out
of the four image quadrants so that each direction is used
equally. During propagation, a scene flow vector is replaced
if the propagated vector has a smaller matching cost. If this
is not the case, the propagation along this path continues
with the existing scene flow vector. After each iteration we
perform a random search. That means that for all pixels
we add a uniformly distributed random offset in the interval ]−1, 1[ in pixel units of the current scale to each of the
four scene flow components and check whether the matching cost decreases. Both propagation and random search
help to obtain a smoothly varying vector field and to find
correct matches even if the initialization is slightly flawed.
For the different scale spaces, we simulate the scaling by
smoothing the images and taking only every n-th pixel for
a subsampling factor of n = 2k so that the patches consist of the same number of pixels for all scales. This way,
we prevent (up)sampling errors because all operations are
performed on exact pixel locations on the full image resolution. Smoothing is done by area-based downsampling
followed by upsampling using Lanczos interpolation. Note
that this matching method has already been used in [1], but
while they use it for optical flow, we apply it to twice as
many dimensions in search space.
Consistency Check. The matching procedure yields a
dense map of scene flow correspondences across all images. However, many of the correspondences are wrong
because of occlusions, out-of-bounds motion or simply because of mismatching due to challenging image conditions.
To remove these outliers, we perform a two-step consistency check. First, we compute an inverse scene flow field
for which the reference image is the right image at time
t1 . Temporal order as well as points of view are swapped.
Everything else remains as explained above. During consistency check, optical flow and both disparity maps for each
pixel are compared to the corresponding values of the inverse scene flow field. If either difference exceeds a consistency threshold τc in image space, the scene flow vector
gets removed. Secondly, we form small regions of the remaining pixels as in [1], where a pixel is added to a region
if it has approximately the same scene flow vector. Afterwards, we check if we could add one of the already removed
outliers in the neighborhood following the same rule. If this
is possible and the region is smaller than sc pixels, we remove the whole region. This way we obtain the filtered
final scene flow correspondences of high accuracy and very
few outliers (cf. Table 2). Because most of the times the
joint filtering of the matches removes more disparity values than necessary, we fill up gaps with additional values.
These values are the result of a separate consistency check
for the disparity matches only. For the separate check we
a)
b)
c)
Figure 3. Sparse correspondences (left) and dense interpolation
(right). Optical flow (a) and disparities at t0 (b) and t1 (c).
compute a second disparity map with SGM [15] and use the
same threshold τc as before. The additional disparity values
that are retrieved this way are as accurate as the one from
our standard consistency check but much denser which is
shown in Figure 3 and Table 2.
3.2. Dense Interpolation
Sparsification. Before interpolating the filtered scene
flow field to recover full density, an additional sparsification
step is performed. This helps to extend the spatial support
of the neighborhood during interpolation and speeds up the
whole process [1]. For non-overlapping 3 × 3 blocks, we
select the match with the lowest consistency error during
filtering only. The remaining matches are called seeds with
respect to the interpolation.
Interpolation Boundaries. A crucial part of the interpolation is the estimation of scene flow boundaries. While
[1, 26] approximate motion boundaries for optical flow with
a texture-agnostic edge detector [8], our edge detector is
trained on semantic boundaries. We find that this models
geometric boundaries as well as motion boundaries much
better than image edges and is much more robust to lighting,
shadows, and coarse textures. To do so, we have gathered
about 400 images of the KITTI data set from [14, 27, 38]
that have been labeled with semantic class information.
Within these images we have merged semantic classes that
in general neither align with geometric nor motion discontinuities, e.g. lane markings and road, or pole and panel.
The boundaries between the remaining semantic labels are
used as binary edge maps to train our edge detector. To this
end, we utilize the framework of Structured Edge Detection
(SED) [8] and train a random forest with the same parameters as in their paper, except for the number of training
patches. We sample twice as many positive and negative
patches during training because we use a bigger data set
with images of higher resolution. The impact of the novel
boundary detector will be evaluated in Section 5.
Interpolation Models. For the interpolation of geometry
and motion, we use two different models. Both parts are
interpolated separately which leads to a more accurate re-
a)
b)
with the same closest seed share the same local neighborhood. And secondly, the distance between p̂ and its closest seed is a constant offset for all neighboring seeds which
can be neglected. It is therefore sufficient to find a labeling that assigns each pixel to its closest seed and to find the
local neighborhood for each seed. We use the graph-based
method of [26] for this. Where the distances between seeds
are geodesic distances that are directly based on the edge
maps from our boundary detector.
3.3. Variational Optimization
c)
Figure 4. Whereas SED [8] (b) detects all image boundaries, our
new boundary detector (c) suppresses lane markings and shadows.
construction of the scene. This is due to the fact that the
separate consistency check for disparity leaves more geometric matches where motion would leave image boundaries. Suppose a local, boundary-aware neighborhood of
seeds is given for each unknown scene flow vector û at
pixel p̂ for geometric and motion seeds respectively, Ngeo
and Nmotion . The depth of pixel p̂ is reconstructed by fitting a plane E(p̂) : a1 x + a2 y + a3 = d0 through all seeds
of the neighborhood Ngeo . This is done by solving a linear system of equations for all neighboring seed points pg
for which the disparity values are known, using weighted
least squares. The weights for each seed are obtained from
a Gaussian kernel g(D) = exp (−αD) on the distance
D(p̂, pg ) between target pixel and seed. The missing disparity value of p̂ is obtained by plugging the coordinates
of p̂ into the estimated plane equation. In a similar fashion, but using a neighborhood of motion seeds Nmotion ,
the missing 3D motion is obtained by fitting an affine 3D
transformation x1 = Ax0 + t using weighted least squares
on all motion seeds pm . Where xt = (xt , yt , zt )T are the
3D world coordinates of motion seed pm at time t0 and t1 ,
and [A|t] ∈ R3×4 is the affine 3D transformation of twelve
unknowns. The weights are computed by the same Gaussian kernel as for geometric interpolation, but using the distances D(p̂, pm ) between the target pixel and the motion
seeds. To summarize, for the full reconstruction of scene
flow û = (u, v, d0 , d1 )T at pixel p̂, we compute d0 using
the plane model E(p̂), reproject the point into 3D world
space, transform it according to its associated affine transformation [A|t], and project it back to image space to obtain
u, v and d1 .
Edge-Aware Neighborhood. To find the local neighborhoods, we follow the idea of [26] using both their approximations. That is first, the n closest seeds to a pixel p̂ are the
n − 1 closest seeds to the closest seed of p̂, thus all pixels
To further refine the 3D motion after interpolation, we
use variational energy minimization to optimize the objective
f low
cross
E(u, v, d0 ) = Edata
+ Edata
+ ϕ · Esmooth
(2)
Motion is represented in image space by optical flow and the
change in disparity d0 . The energy consists of three parts.
Two data terms, one temporal correspondence and one cross
correspondence, and an adaptively weighted smoothness
term for regularization. The data terms use the gradient
constancy assumption. Our experiments have shown, that
a term for the color constancy assumption can be neglected.
∗
Edata
(I1 , I2 , x, w) =
Z
2
β (x, w) · Ψ γ · |∇I2 (x + w) − ∇I1 (x)| dx
(3)
Ω
f low
∗
Edata
= Edata
Il0 , Il1 , x, (u, v)T
cross
Edata
=
∗
Edata
Il0 , Ir1 , x, (u
0
− d0 − d , v)
(4)
T
(5)
The data terms do not contribute to the energy if the function
(
T
1, if (x + w) ∈ Ω
β (x, w) =
(6)
0, otherwise
indicates that the scene flow is leaving the image domain.
The smoothness term
Z
2
2
2
Esmooth =
Ψ |∇u| + |∇v| + λ · |∇d0 | dx (7)
Ω
penalizes changes in the motion field and is weighted by
ϕ(x) = e−κB(x)
(8)
where B(x) is the edge value of our boundary detector
at
pixel x. All parts use the Charbonnier penalty Ψ x2 =
√
x2 + ε2 to achieve robustness. Since the smoothness term
rather enforces constancy if β for both data terms is zero, we
do not optimize the scene flow at pixels where the interpolated scene flow field leaves Ω. Our energy formulation is
inspired by [3, 17, 37]. We use linear approximations of the
Euler-Lagrange equations for the objective and apply the
framework of Brox et al. [3] without the coarse-to-fine steps
to find a solution by Successive Over-Relaxation (SOR).
a)
b)
c)
Figure 5. Example of our motion segmentation. Sparse motion
indicators as obtained during ego-motion computation (a), dense
segmentation by interpolation (b) and moving ground truth objects
as provided by KITTI [23] (c).
4. Ego-Motion Model
In Section 5 we will show that our approach as described
so far achieves results comparable to state-of-the-art. For
the special challenges of the KITTI data set, we make an
additional, optional assumption to further improve the performance of SceneFlowFields. Following [31], we argue
that most parts of a scene are static and thus that the 3D motion for these areas is fully determined by the ego-motion of
the observer. Given the ego-motion and a motion segmentation into static and dynamic areas, we apply the inverse egomotion to all static points in the scene. Using our matching
and interpolation scheme, both can be easily estimated with
almost no additional effort.
Ego-Motion Estimation. The filtered scene flow field before interpolation provides very accurate matches across all
images. We compute 3D-2D correspondences between the
reference frame and the temporally subsequent frame by triangulation with the stereo matches. We limit the depth of
these correspondences to 35 meters because disparity resolution for farther distances gets too inaccurate. This way, we
obtain a Perspective-n-Point problem, which we solve iteratively using Levenberg-Marquardt and RANSAC to find the
relative pose between the left cameras at time t0 and t1 by
minimizing the re-projection error of all correspondences.
For RANSAC, we consider a correspondence an outlier if
the re-projection error is above 1 pixel. After first estimation, we recompute the set of inliers with a relaxed threshold
of 3 pixels and re-estimate the pose P = [R|t] ∈ R3×4 . The
two stage process helps to avoid local optima and to find a
trade-off between diverse and robust correspondences.
Motion Segmentation. An initial sparse motion segmentation can directly be obtained as side product of the egomotion estimation. Outliers in the correspondences are
considered in motion, while points in conformity with the
estimated ego-motion are marked as static. We use our
boundary-aware interpolation to compute a dense segmentation (cf. Figure 5). Pixels labeled as moving are spread
up to the object boundaries within they are detected. Because the segmentation is only a binary labeling, no complex interpolation model is needed. An unknown pixel gets
assigned with the weighted mean of its local neighborhood.
The weights are again based on the geodesic distances between matches. This interpolation method is similar to
the Nadaraya-Watson estimator in [26]. The interpolated
motion field is then thresholded to obtain a dense, binary
motion segmentation. The quality of this segmentation is
evaluated in Section 5. Finally, the inverse estimated egomotion is applied to all points that are labeled as static.
5. Experiments and Results
We use the explicit values of the previous sections and
the following parameters for all our experiments, even
across different data sets. For k = 3 subscales and full
resolution we run 12 iterations of propagation and random
search. We use a consistency threshold of τc = 1 and a minimal region size of sc = 150 for the region filter. During interpolation we use geometry and motion neighborhoods of
160 and 80 seeds respectively and α = 2.2 for the Gaussian
kernel to weight the geodesic distances. For the variational
energy minimization we set κ = 5, γ = 0.77, λ = 10 and
ε = 0.001. We run two outer and one inner iteration in
our optimization framework with 30 iterations for the SOR
solver using a relaxation factor of ω = 1.9. We threshold
the interpolated motion field with τS = 0.4 to obtain a binary segmentation when applying the ego-motion model.
5.1. Boundary Detection
To test the impact of our motion boundary detector, we
evaluate different variants of our method twice. Once, using
standard edge detection as in [8], and a second time using
our structured random forest trained on semantic edges. The
results are compared in Table 2. The major improvements
are visualized in Figure 4. High image gradients at lane
markings or shadows (especially shadows of vehicles) are
effectively suppressed when using our boundary detector,
while at the same time it accurately detects all kinds of objects. This helps greatly to smoothly recover the street surface during interpolation, sharpen discontinuities in depth
and motion in general, and allows for accurate boundaries
when interpolating the motion segmentation.
5.2. KITTI Scene Flow Benchmark
Our main experiments are taken out on the KITTI Scene
Flow Benchmark [23]. The results of our public submission are presented in Table 1 where we compare to
state-of-the-art methods. At the time of writing, our method
Rank
Method
1
2
3
4
5
6
7
8
9
10
PRSM [34]
OSF+TC [24]
OSF [23]
FSF+MS [31]
CSF [21]
SceneFlowFields
PRSF [33]
SGM+SF [15, 16]
PCOF-LDOF [7]
PCOF+ACTF [7]
dual
x
x
x
x
x
x
x
D1-bg
D1-fg
D1-all
D2-bg
D2-fg
D2-all
Fl-bg
Fl-fg
Fl-all
SF-bg
SF-fg
SF-all
Runtime
3.02
4.11
4.54
5.72
4.57
5.12
4.74
5.15
6.31
6.31
10.52
9.64
12.03
11.84
13.04
13.83
13.74
15.29
19.24
19.24
4.27
5.03
5.79
6.74
5.98
6.57
6.24
6.84
8.46
8.46
5.13
5.18
5.45
7.57
7.92
8.47
11.14
14.10
19.09
19.15
15.11
15.12
19.41
21.28
20.76
21.83
20.47
23.13
30.54
36.27
6.79
6.84
7.77
9.85
10.06
10.69
12.69
15.60
20.99
22.00
5.33
5.76
5.62
8.48
10.40
10.58
11.73
20.91
14.34
14.89
13.40
13.31
18.92
25.43
25.78
24.41
24.33
25.50
38.32
60.15
6.68
7.02
7.83
11.30
12.96
12.88
13.83
21.67
18.33
22.43
6.61
7.08
7.01
11.17
12.21
12.48
13.49
23.09
25.26
25.77
20.79
20.03
26.34
33.91
33.21
32.28
31.22
34.46
49.39
67.75
8.97
9.23
10.23
14.96
15.71
15.78
16.44
24.98
29.27
32.76
300 s
3000 s
3000 s
2.7 s
80 s
65 s
150 s
2700 s
50 s
(0.08 s)
Variant
D1-bg
D1-fg
D1-all
D2-bg
D2-fg
D2-all
Fl-bg
Fl-fg
Fl-all
SF-bg
SF-fg
SF-all
Density
full+ego
full
no var
5.36
5.36
5.36
10.85
10.85
10.85
6.20
6.20
6.20
7.94
15.91
15.77
18.23
18.03
18.81
9.51
16.23
16.24
10.36
22.33
23.75
22.85
21.69
23.72
12.28
22.23
23.75
12.04
24.78
25.60
28.31
27.37
28.99
14.53
25.18
26.12
100.00 %
100.00 %
100.00 %
Ours
full+ego
full
no var
5.48
5.48
5.48
11.99
11.99
11.99
6.47
6.47
6.47
9.07
16.90
16.73
19.98
20.80
21.38
10.74
17.50
17.44
11.63
23.57
25.00
25.47
25.22
27.04
13.75
23.82
25.32
13.39
26.14
26.93
30.92
30.71
32.16
16.07
26.84
27.73
100.00 %
100.00 %
100.00 %
SED [8]
Table 1. Results on the KITTI Scene Flow Benchmark [23]. The column dual indicates whether only two frame pairs are used by this
method. Run times in parentheses are using a GPU. We achieve the third best result among all dual-frame methods. Our SceneFlowFields
yields especially good results at foreground regions (SF-fg).
Edges
matches
disparity
1.91
1.42
3.74
4.06
2.18
1.82
2.48
–
4.08
–
2.71
–
2.10
–
2.78
–
2.20
–
3.87
–
6.24
–
4.21
–
38.82 %
57.81 %
–
–
Table 2. Evaluation of the different parts of our method on KITTI [23] training data. Our new edge detector outperforms SED [8]. The egomotion model helps greatly to improve overall results. The bottom two rows show the amount of outliers for our sparse correspondences
before interpolation. The density is computed with respect to available KITTI ground truth.
was ranked 6th and achieved the 3rd best result out of all
dual-frame methods while at the same time being considerably faster than the top three performing methods (cf. Table 1). That our method generalizes better to other data sets
is shown in Section 5.3 where we often outperform the best
dual-frame method [23]. In Figure 6, we give an visual
example of our results and compare it to the two top performing methods in dual-frame [23] and multi-frame [34]
categories. It can be seen that our interpolation produces
very sharp edges. This in combination with our matching
method helps to obtain accurate scene flow, especially for
(moving) objects. Methods with comparable overall performance on KITTI ([21, 31]), perform worse on moving
foreground objects than our SceneFlowFields.
Apart from the official evaluation, we test the different
components of our method in Table 2 to evaluate the effect
of each part. We use all training images of the KITTI data
set, and evaluate our basic method without the variational
optimization (no var), the full basic approach (full) and our
method with the optional ego-motion extension (full+ego).
Additionally we compute the accuracy and densities with
respect to the KITTI ground truth of our sparse scene flow
matches (matches) and the separately filtered sparse stereo
correspondences (disparity). The variational optimization is
primarily useful for optical flow and foreground. All variants using our improved edge detector outperform their according variant using basic image edges.
Finally, we use the provided object maps of KITTI, to
test the performance of our motion segmentation (cf. Figure 5). To this end, we compute the precision and recall
for our binary segmentation. Precision is defined as the percentage of estimated pixels that are correctly labeled as in
motion. The recall is the relative amount of ground truth
pixels that are labeled as moving and covered by our estimation. Over all frames, we achieve a precision of about 28 %
and a recall of about 83 %. Most of the missed ground truth
foreground pixels belong to objects which are far away and
moving parallel to the direction of viewing. This way, the
re-projection error of the 3D-2D correspondences during
ego-motion estimation is below the threshold. Two remarks
have to be considered regarding the precision. First, KITTI
only annotates cars that are mostly visible, i.e. pedestrians,
cyclists, other vehicles, or partly occluded cars are not included in the ground truth, but will be marked as moving if
they are in motion. Secondly, since areas that are wrongly
classified as dynamic will be filled with our basic scene flow
estimation which is still of high quality, we did tune in favor
of a high recall.
5.3. MPI Sintel
We claim that our proposed method is very versatile and
not at all restricted to any setup. Therefore, we have additionally evaluated SceneFlowFields on MPI Sintel [5] without changing any parameters. The only difference to our
PRSM [34] – multi-frame
SceneFlowFields (ours) – dual-frame
OSF [23] – dual-frame
a)
b)
c)
d)
Figure 6. Exemplary visual comparison on KITTI Scene Flow Benchmark [23]. We show disparity (a) and optical flow (c) results along
with the corresponding error maps (b) and (d) for PRSM [34], OSF [23] and our SceneFlowFields. We accurately detect moving objects
and reconstruct sharp boundaries. More examples are visualized in the supplementary video and on the public homepage of KITTI.
evaluation on KITTI is, that we do not use our semantic
edge detector which was trained on KITTI imagery, but
instead SED to obtain edge maps. We test both, our basic approach and the ego-motion extension (+ego) for our
method. All training frames over all but two sequences for
which a subsequent frame exists are processed. The final
rendering passes for all images are used. We measure the
percentage of outliers according to the KITTI metric for
disparity and optical flow. The sequences cave 2 and sleeping 1 are left out because they have not been evaluated in
[31] – to which we want to compare – due to varying camera parameters. The relative amounts of outliers over all
evaluated sequences are given in Table 3 and are compared
to [23, 31, 34] using the results published by [31]. Our results can keep up with state-of-the-art scene flow methods,
although we have not tuned our method on MPI Sintel. For
sequences with close-up, non-rigid motion, e.g. ambush 7
or bandage 1, our depth estimation even beats the multiframe scene flow method that is ranked first on KITTI.
6. Conclusion
Our novel approach to interpolate sparse matches to a
dense scene flow achieves state-of-the-art performance on
different data sets. At time of submission SceneFlowFields
is ranked third on KITTI and achieves state-of-the-art performance on MPI Sintel. We have shown that a stochastic matching approach works for higher dimensional search
Sequence
PRSM
Disparity
OSF
FSF
Ours
PRSM
Optical Flow
OSF
FSF Ours
+ego
Average
15.99
19.84
15.35
18.15
13.70
28.16
18.32
29.24
22.20
alley 1
alley 2
ambush 2
ambush 4
ambush 5
ambush 6
ambush 7
bamboo 1
bamboo 2
bandage 1
bandage 2
cave 4
market 2
market 5
market 6
mountain 1
shaman 2
shaman 3
sleeping 2
temple 2
temple 3
7.43
0.79
41.77
24.09
17.72
29.41
35.07
7.34
17.06
21.22
22.44
4.27
5.27
15.38
8.99
0.42
25.49
33.92
1.74
4.92
11.04
5.28
1.31
55.13
24.05
19.54
26.18
71.58
9.71
18.08
19.37
23.53
5.86
6.61
13.67
10.29
0.78
28.27
52.22
2.97
5.54
16.62
5.92
2.08
36.93
23.30
18.54
30.33
23.47
9.67
19.27
20.93
22.69
6.22
6.81
13.25
10.63
0.23
24.77
27.09
3.52
5.96
10.65
8.81
1.73
51.72
37.78
25.52
37.13
16.34
14.53
19.89
16.42
21.77
6.20
6.71
26.66
14.53
0.15
21.13
35.37
3.07
6.98
8.61
1.58
1.08
51.33
41.99
25.23
41.98
3.35
2.41
3.58
3.30
4.06
16.32
4.77
28.38
10.72
3.71
0.46
1.75
0.00
9.51
32.10
7.33
1.44
87.37
49.16
44.70
54.75
22.47
4.04
4.86
18.40
13.12
33.94
10.08
29.58
16.39
88.60
1.67
11.45
0.01
10.52
81.39
2.11
1.20
72.68
45.23
24.82
44.05
27.87
4.11
3.65
4.00
4.76
14.62
5.17
26.31
13.13
17.05
0.56
1.31
0.02
9.66
62.34
5.94
2.85
90.92
60.03
46.92
57.06
13.66
6.11
5.84
3.82
10.72
15.63
7.11
40.77
28.92
90.60
8.85
15.91
0.61
29.58
72.28
3.95
0.87
83.84
42.65
29.86
47.65
7.35
4.15
3.97
4.03
9.06
12.95
6.09
28.87
16.69
89.57
4.31
8.51
0.03
12.57
49.18
Table 3. Results on MPI Sintel [5]. Average outliers show that
SceneFlowFields can keep up with state-of-the-art.
spaces and that the applied consistency filters produce very
robust correspondences. Boundary-aware interpolation has
turned out to be a powerful tool to fill the gaps in the scene
flow field due to filtering. To cope with missing correspondences across the images, we have applied an optional egomotion model that helps to overcome this issue. For future
work, we want to improve robustness of the ego-motion or
extend SceneFlowFields to use multiple frame pairs.
References
[1] C. Bailer, B. Taetz, and D. Stricker. Flow Fields: Dense
correspondence fields for highly accurate large displacement
optical flow estimation. In International Conference on
Computer Vision (ICCV), 2015. 3, 4
[2] T. Basha, Y. Moses, and N. Kiryati. Multi-view scene flow
estimation: A view centered variational approach. International Journal of Computer Vision (IJCV), 2013. 2
[3] T. Brox, A. Bruhn, N. Papenberg, and J. Weickert. High accuracy optical flow estimation based on a theory for warping.
European Conference on Computer Vision (ECCV), 2004. 5
[4] T. Brox and J. Malik. Large displacement optical flow: Descriptor matching in variational motion estimation. Transactions on Pattern Analysis and Machine Intelligence (PAMI),
2011. 1
[5] D. J. Butler, J. Wulff, G. B. Stanley, and M. J. Black. A
naturalistic open source movie for optical flow evaluation.
In European Conference on Computer Vision (ECCV), 2012.
2, 7, 8
[6] Q. Chen and V. Koltun. Full Flow: Optical flow estimation
by global optimization over regular grids. In Conference on
Computer Vision and Pattern Recognition (CVPR), 2016. 2
[7] M. Derome, A. Plyer, M. Sanfourche, and G. Le Besnerais.
A prediction-correction approach for real-time optical flow
computation using stereo. In German Conference on Pattern
Recognition (GCPR), 2016. 7
[8] P. Dollár and C. L. Zitnick. Structured forests for fast edge
detection. In International Conference on Computer Vision
(ICCV), 2013. 4, 5, 6, 7
[9] A. Gaidon, Q. Wang, Y. Cabon, and E. Vig. Virtual worlds
as proxy for multi-object tracking analysis. In Conference on
Computer Vision and Pattern Recognition (CVPR), 2016. 2
[10] A. Geiger, P. Lenz, and R. Urtasun. Are we ready for autonomous driving? The KITTI vision benchmark suite. In
Conference on Computer Vision and Pattern Recognition
(CVPR), 2012. 1, 2
[11] K. He and J. Sun. Computing nearest-neighbor fields via
propagation-assisted kD-trees. In Conference on Computer
Vision and Pattern Recognition (CVPR), 2012. 3
[12] Y. Hel-Or and H. Hel-Or. Real-time pattern matching using projection kernels. Transactions on Pattern Analysis and
Machine Intelligence (PAMI), 2005. 3
[13] E. Herbst, X. Ren, and D. Fox. RGB-D Flow: Dense 3-D
motion estimation using color and depth. In International
Conference on Robotics and Automation (ICRA), 2013. 2, 3
[14] A. Hermans and G. Floros.
https://omnomnom.
vision.rwth-aachen.de/data/rwth_kitti_
semantics_dataset.zip. 4
[15] H. Hirschmuller. Stereo processing by semiglobal matching
and mutual information. Transactions on Pattern Analysis
and Machine Intelligence (PAMI), 2008. 1, 2, 4, 7
[16] M. Hornacek, A. Fitzgibbon, and C. Rother. SphereFlow: 6
DoF scene flow from RGB-D pairs. In Conference on Computer Vision and Pattern Recognition (CVPR), 2014. 7
[17] F. Huguet and F. Devernay. A variational method for scene
flow estimation from stereo sequences. In International Conference on Computer Vision (ICCV), 2007. 2, 3, 5
[18] M. Jaimez, M. Souiai, J. Gonzalez-Jimenez, and D. Cremers.
A primal-dual framework for real-time dense RGB-D scene
flow. In International Conference on Robotics and Automation (ICRA), 2015. 2
[19] P. Lenz, J. Ziegler, A. Geiger, and M. Roser. Sparse scene
flow segmentation for moving object detection in urban environments. In Intelligent Vehicles Symposium (IV), 2011.
1
[20] C. Liu, J. Yuen, and A. Torralba. SIFT Flow: Dense correspondence across scenes and its applications. Transactions
on Pattern Analysis and Machine Intelligence (PAMI), 2011.
3
[21] Z. Lv, C. Beall, P. F. Alcantarilla, F. Li, Z. Kira, and F. Dellaert. A continuous optimization approach for efficient and
accurate scene flow. In European Conference on Computer
Vision (ECCV), 2016. 2, 3, 7
[22] N. Mayer, E. Ilg, P. Hausser, P. Fischer, D. Cremers,
A. Dosovitskiy, and T. Brox. A large dataset to train convolutional networks for disparity, optical flow, and scene flow
estimation. In Conference on Computer Vision and Pattern
Recognition (CVPR), 2016. 2
[23] M. Menze and A. Geiger. Object scene flow for autonomous
vehicles. In Conference on Computer Vision and Pattern
Recognition (CVPR), 2015. 2, 3, 6, 7, 8
[24] M. Neoral and J. Šochman. Object scene flow with temporal
consistency. In Computer Vision Winter Workshop (CVWW),
2017. 2, 3, 7
[25] C. Rabe, U. Franke, and S. Gehrig. Fast detection of moving
objects in complex scenarios. In Intelligent Vehicles Symposium (IV), 2007. 1
[26] J. Revaud, P. Weinzaepfel, Z. Harchaoui, and C. Schmid.
EpicFlow: Edge-preserving interpolation of correspondences for optical flow. In Conference on Computer Vision
and Pattern Recognition (CVPR), 2015. 4, 5, 6
[27] G. Ros, S. Ramos, M. Granados, A. Bakhtiary, D. Vazquez,
and A. Lopez.
Vision-based offline-online perception
paradigm for autonomous driving. In Winter Conference on
Applications of Computer Vision (WACV), 2015. 4
[28] R. Schuster, C. Bailer, O. Wasenmüller, and D. Stricker.
Combining stereo disparity and optical flow for basic scene
flow. In Commercial Vehicle Technology Symposium (CVTS),
2018. 1
[29] R. Schuster, O. Wasenmüller, G. Kuschk, C. Bailer, and
D. Stricker. Towards flow estimation in automotive scenarios. In ACM Computer Science in Cars Symposium (CSCS),
2017. 1
[30] D. Sun, S. Roth, and M. J. Black. A quantitative analysis
of current practices in optical flow estimation and the principles behind them. International Journal of Computer Vision
(IJCV), 2014. 1
[31] T. Taniai, S. N. Sinha, and Y. Sato. Fast multi-frame stereo
scene flow with motion segmentation. In Conference on
Computer Vision and Pattern Recognition (CVPR), 2017. 1,
2, 3, 6, 7, 8
[32] S. Vedula, S. Baker, P. Rander, R. Collins, and T. Kanade.
Three-dimensional scene flow. In International Conference
on Computer Vision (ICCV), 1999. 2
[33] C. Vogel, K. Schindler, and S. Roth. Piecewise rigid scene
flow. In International Conference on Computer Vision
(ICCV), 2013. 2, 3, 7
[34] C. Vogel, K. Schindler, and S. Roth. 3D scene flow estimation with a piecewise rigid scene model. International
Journal of Computer Vision (IJCV), 2015. 2, 3, 7, 8
[35] A. S. Wannenwetsch, M. Keuper, and S. Roth. Probflow:
Joint optical flow and uncertainty estimation. In International Conference on Computer Vision (ICCV), 2017. 3
[36] O. Wasenmüller, B. Schenkenberger, and D. Stricker. Towards non-rigid reconstruction - How to adapt rigid RGB-D
reconstruction to non-rigid movements? In International
Conference on Computer Vision Theory and Applications
(VISAPP), 2017. 2
[37] A. Wedel, C. Rabe, T. Vaudrey, T. Brox, U. Franke, and
D. Cremers. Efficient dense scene flow from sparse or dense
stereo data. In European Conference on Computer Vision
(ECCV), 2008. 2, 5
[38] P. Xu, F. Davoine, J.-B. Bordes, H. Zhao, and T. Denœux.
Multimodal information fusion for urban scene understanding. Machine Vision and Applications (MVA), 2016. 4
[39] T. Yoshida, O. Wasenmüller, and D. Stricker. Time-of-flight
sensor depth enhancement for automotive exhaust gas. In
International Conference on Image Processing (ICIP), 2017.
2
| 1cs.CV
|
arXiv:1703.01913v1 [cs.DS] 6 Mar 2017
Near-Optimal Closeness Testing of Discrete Histogram
Distributions
Ilias Diakonikolas∗
University of Southern California
[email protected]
Daniel M. Kane†
University of California, San Diego
[email protected]
Vladimir Nikishkin‡
University of Edinburgh
[email protected]
March 7, 2017
Abstract
We investigate the problem of testing the equivalence between two discrete histograms. A
k-histogram over [n] is a probability distribution that is piecewise constant over some set of k
intervals over [n]. Histograms have been extensively studied in computer science and statistics.
Given a set of samples from two k-histogram distributions p, q over [n], we want to distinguish
(with high probability) between the cases that p = q and kp − qk1 ≥ ǫ. The main contribution
of this paper is a new algorithm for this testing problem and a nearly matching informationtheoretic lower bound. Specifically, the sample complexity of our algorithm matches our lower
bound up to a logarithmic factor, improving on previous work by polynomial factors in the
relevant parameters. Our algorithmic approach applies in a more general setting and yields
improved sample upper bounds for testing closeness of other structured distributions as well.
1
Introduction
In this work, we study the problem of testing equivalence (closeness) between two discrete structured
distributions. Let D be a family of univariate distributions over [n] (or Z). The problem of closeness
testing for D is the following: Given sample access to two unknown distribution p, q ∈ D, we want
to distinguish between the case that p = q versus kp − qk1 ≥ ǫ. (Here, kp − qk1 denotes the ℓ1 distance between the distributions p, q.) The sample complexity of this problem depends on the
underlying family D.
For example, if D is the class of all distributions over [n], then it is known [CDVV14] that
the optimal sample complexity is Θ(max{n2/3 /ǫ4/3 , n1/2 /ǫ2 }). This sample bound is best possible
only if the family D includes all possible distributions over [n], and we may be able to obtain
significantly better upper bounds for most natural settings. For example, if both p, q are promised
to be (approximately) log-concave over [n], there is an algorithm to test equivalence between them
using O(1/ǫ9/4 ) samples [DKN15a]. This sample bound is independent of the support size n, and
is dramatically better than the worst-case tight bound [CDVV14] when n is large.
∗
Supported by NSF Award CCF-1652862 (CAREER) and a Sloan Research Fellowship.
Supported by NSF Award CCF-1553288 (CAREER) and a Sloan Research Fellowship.
‡
Supported by a University of Edinburgh PCD Scholarship.
†
More generally, [DKN15a] described a framework to obtain sample-efficient equivalence testers
for various families of structured distributions over both continuous and discrete domains. While
the results of [DKN15a] are sample-optimal for some families of distributions (in particular, over
continuous domains), it was not known whether they can be improved for natural families of discrete
distributions. In this paper, we work in the framework of [DKN15a] and obtain new nearly-matching
algorithms and lower bounds.
Before we state our results in full generality, we describe in detail a concrete application of our
techniques to the case of histograms – a well-studied family of structured discrete distributions with
a plethora of applications.
Testing Closeness of Histograms. A k-histogram over [n] is a probability distribution p : [n] →
[0, 1] that is piecewise constant over some set of k intervals over [n]. The algorithmic difficulty in
testing properties of such distributions lies in the fact that the location and “size” of these intervals
is a priori unknown. Histograms have been extensively studied in statistics and computer science.
In the database community, histograms [JKM+ 98, CMN98, TGIK02, GGI+ 02, GKS06, ILR12,
ADH+ 15] constitute the most common tool for the succinct approximation of data. In statistics,
many methods have been proposed to estimate histogram distributions [Sco79, FD81, Sco92, LN96,
DL04, WN07, Kle09] in a variety of settings.
In recent years, histogram distributions have attracted renewed interested from the theoretical
computer science community in the context of learning [DDS12a, CDSS13, CDSS14a, CDSS14b,
DHS15, ADLS16, ADLS17, DKS16a] and testing [ILR12, DDS+ 13, DKN15b, Can16, CDGR16].
Here we study the following testing problem: Given sample access to two distributions p, q over [n]
that are promised to be (approximately) k-histograms, distinguish between the cases that p = q
versus kp − qk1 ≥ ǫ. As the main application of our techniques, we give a new testing algorithm
and a nearly-matching information-theoretic lower bound for this problem.
We now provide a summary of previous work on this problem followed by a description of our
new upper and lower bounds. We want to ǫ-test closeness in ℓ1 -distance between two k-histograms
over [n], where k ≤ n. Our goal is to understand the optimal sample complexity of this problem
as a function of k, n, 1/ǫ. Previous work is summarized as follows:
• In [DKN15a], the authors gave a closeness tester with sample complexity O(max{k 4/5 /ǫ6/5 , k1/2 /ǫ2 }).
• The best known sample lower bound is Ω(max{k2/3 /ǫ4/3 , k1/2 /ǫ2 }). This straightforwardly
follows from [CDVV14], since k-histograms can simulate any support k distribution.
Notably, none of the two bounds depends on the domain size n. Observe that the upper bound
of O(max{k4/5 /ǫ6/5 , k1/2 /ǫ2 }) cannot be tight for the entire range of parameters. For example, for
n = O(k), the algorithm of [CDVV14] for testing closeness between arbitrary support n distributions
has sample size O(max{k2/3 /ǫ4/3 , k1/2 /ǫ2 }), matching the above sample complexity lower bound,
up to a constant factor.
This simple example might suggest that the Ω(max{k2/3 /ǫ4/3 , k1/2 /ǫ2 }) lower bound is tight in
general. We prove that this is not the case. The main conceptual message of our new upper bound
and nearly-matching lower bound is the following:
The sample complexity of ǫ-testing closeness between two k-histograms over [n] depends
in a subtle way on the relation between the relevant parameters k, n and 1/ǫ.
We find this fact rather surprising because such a phenomenon does not occur for the sample
complexities of closely related problems. Specifically, testing the identity of a k-histogram over [n]
to a fixed distribution has sample complexity Θ(k1/2 /ǫ2 ) [DKN15b]; and learning a k-histogram
2
over [n] has sample complexity Θ(k/ǫ2 ) [CDSS14a]. Note that both these sample bounds are
independent of n and are known to be tight for the entire range of parameters k, n, 1/ǫ.
Our main positive result is a new closeness testing
algorithm for k-histograms over [n] with
4/3
2/3
4/3
sample complexity O k · log (2 + n/k) log(k)/ǫ
. Combined with the known upper bound of
[DKN15a], we obtain the sample upper bound of
O max min(k4/5 /ǫ6/5 , k2/3 log4/3 (2 + n/k) log(k)/ǫ4/3 ), k1/2 log2 (k) log log(k)/ǫ2 .
As our main negative result, we prove a lower bound of Ω(min(k2/3 log1/3 (2+ n/k)/ǫ4/3 , k4/5 /ǫ6/5 )).
The first term in this expression shows that the “log(2 + n/k)” factor that appears in the sample
complexity of our upper bound is in fact necessary, up to a constant power. In summary, these
bounds provide a nearly-tight characterization of the sample complexity of our histogram testing
problem for the entire range of parameters.
A few observations are in order to interpret the above bounds:
• When n goes to infinity, the O(k4/5 /ǫ6/5 ) upper bound of [DKN15a] is tight for k-histograms.
• When n = poly(k) and ǫ is not too small (so that the k1/2 /ǫ2 term does not kick in), then
the right answer for the sample complexity of our problem is (k2/3 /ǫ4/3 )polylog(k).
• The terms “k4/5 /ǫ6/5 ” and “k2/3 log4/3 (2 + n/k) log(k)/ǫ4/3 ” appearing in the sample complexity become equal when n is exponential in k. Therefore, our new algorithm has better
sample complexity than that of [DKN15a] for all n ≤ 2O(k) .
In the following subsection, we state our results in a general setting and explain how the
aforementioned applications are obtained from them.
1.1
Our Results and Comparison to Prior Work
For a given family D of discrete distributions over [n], we are interested in designing a closeness
tester for distributions in D. We work in the general framework introduced by [DKN15b, DKN15a].
Instead of designing a different tester for any given family D, the approach of [DKN15b, DKN15a]
proceeds by designing a generic equivalence tester under a different metric than the ℓ1 -distance.
This metric, termed Ak -distance [DL01], where k ≥ 2 is a positive integer, interpolates between
Kolmogorov distance (when k = 2) and the ℓ1 -distance (when k = n). It turns out that, for a range
of structured distribution families D, the Ak -distance can be used as a proxy for the ℓ1 -distance
for a value of k ≪ n [CDSS14a]. For example, if D is the family of k-histograms over [n], the
A2k distance between them is tantamount to their ℓ1 distance. We can thus obtain an ℓ1 closeness
tester for D by plugging in the right value of k in a general Ak closeness tester.
To formally state our results, we will need some terminology.
Notation. We will use p, q to denote the probability mass functions of our distributions. If p
is discrete over support [n] := {1, . . . , n}, we denote by pi the probability of element
Pn i in the
distribution. For two
discrete
distributions
p,
q,
their
ℓ
and
ℓ
distances
are
kp−qk
=
1
2
1
i=1 |pi −qi |
pPn
2
and kp − qk2 =
i=1 (pi − qi ) . Fix a partition of the domain I into disjoint intervals I :=
(Ii )ℓi=1 . For such a partition I, the reduced distribution pIr corresponding to p and I is the discrete
distribution over [ℓ] that assigns the i-th “point” the mass that p assigns to the interval Ii ; i.e., for
i ∈ [ℓ], pIr (i) = p(Ii ). Let Jk be the collection of all partitions of the domain I into k intervals.
def
For p, q : I → R+ and k ∈ Z+ , we define the Ak -distance between p and q by kp − qkAk =
P
maxI=(Ii )k ∈Jk ki=1 |p(Ii ) − q(Ii )| = maxI∈Jk kpIr − qrI k1 .
i=1
3
In this context, [DKN15a] gave a closeness testing algorithm under the Ak -distance using
O(max{k4/5 /ǫ6/5 , k1/2 /ǫ2 }) samples. It was also shown that this sample bound is information–
theoretically optimal (up to constant factors) for some adversarially constructed continuous distributions, or discrete distributions of support size n sufficiently large as a function of k. These
results raised two natural questions: (1) What is the optimal sample complexity of the Ak -closeness
testing problem as a function of n, k, 1/ǫ? (2) Can we obtain tight sample lower bounds for natural
families of structured distributions?
We resolve both these open questions. Our main algorithmic result is the following:
Theorem 1.1. Given sample access to distributions p and q on [n] and ǫ > 0 there exists an
algorithm that takes
O max min k4/5 /ǫ6/5 , k2/3 log4/3 (2 + n/k) log(2 + k)/ǫ4/3 , k1/2 log2 (k) log log(k)/ǫ2
samples from each of p and q and distinguishes with 2/3 probability between the cases that p = q
and kp − qkAk ≥ ǫ.
As explained in [DKN15b, DKN15a], using Theorem 1.1 one can obtain testing algorithms for
the ℓ1 closeness testing of various distribution families D, by using the Ak distance as a “proxy”
for the ℓ1 distance:
Fact 1.2. For a univariate distribution family D and ǫ > 0, let k = k(D, ǫ) be the smallest integer
such that for any f1 , f2 ∈ D it holds that kf1 − f2 k1 ≤ kf1 − f2 kAk + ǫ/2. Then there exists an ℓ1
closeness testing algorithm for D with the sample complexity of Theorem 1.1.
Applications. Our upper bound for ℓ1 -testing of k-histogram distributions follows from the above
by noting that for any k-histograms p, q we have kp − qk1 = kp − qkA2k . Also note that our upper
bound is robust: it applies even if p, q are O(ǫ)-close in ℓ1 -norm to being k-histograms.
Finally, we remark that our general Ak closeness tester yields improved upper bounds for various
other families of structured distributions. Consider for example the case that D consists of all kmixtures of some simple family (e.g., discrete Gaussians or log-concave), where the parameter k is
large. The algorithm of [DKN15a] leads to a tester whose sample complexity scales with O(k 4/5 ),
while Theorem 1.1 implies a Õ(k2/3 ) bound.
On the lower bound side, we show:
Theorem 1.3. Let p and q be distributions on [n] and let ǫ > 0 be less than a sufficiently small
constant. Any tester that distinguishes between p = q and kp − qkAk ≥ ǫ for some k ≤ n must use
Ω(m) samples for m = min(k2/3 log4/3 (2 + n/k)/ǫ4/3 , k4/5 /ǫ6/5 ).
Furthermore, for m = min(k2/3 log1/3 (2 + n/k)/ǫ4/3 , k4/5 /ǫ6/5 ), any tester that distinguishes
between p = q and kp − qkAk ≥ ǫ must use Ω(m) samples even if p and q are both guaranteed to be
piecewise constant distributions on O(k + m) pieces.
√
Note that a lower bound of Ω( k/ǫ2 ) straightforwardly applies even for p and q being khistograms. This dominates the above bounds for ǫ < k −3/8 .
We also note that our general lower bound with respect to the Ak distance is somewhat stronger,
matching the term “log4/3 (2 + n/k)” in our upper bound.
4
1.2
Related Work
During the past two decades, distribution property testing [BFR+ 00] – whose roots lie in statistical
hypothesis testing [NP33, LR05] – has received considerable attention by the computer science
community, see [Rub12, Can15] for two recent surveys. The majority of the early work in this field
has focused on characterizing the sample size needed to test properties of arbitrary distributions of
a given support size. After two decades of study, this “worst-case” regime is well-understood: for
many properties of interest there exist sample-optimal testers (matched by information-theoretic
lower bounds) [Pan08, CDVV14, VV14, DKN15b, DK16, DGPP16].
In many settings of interest, we know a priori that the underlying distributions have some “nice
structure” (exactly or approximately). The problem of learning a probability distribution under
such structural assumptions is a classical topic in statistics, see [BBBB72] for a classical book,
and [GJ14] for a recent book on the topic, that has recently attracted the interest of computer
scientists [DDS12a, DDS12b, CDSS13, DDO+ 13, CDSS14a, CDSS14b, ADH+ 15, DKS16d, DKS16e,
DKS16b, DDKT16, ADLS17, DKS16a, DKS16c].
On the other hand, the theory of distribution testing under structural assumptions is less fully
developed. More than a decade ago, Batu, Kumar, and Rubinfeld [BKR04] considered a specific
instantiation of this question – testing the equivalence between two unknown discrete monotone
distributions – and obtained a tester whose sample complexity is poly-logarithmic in the domain
size. A recent sequence of works [DDS+ 13, DKN15b, DKN15a] developed a framework to leverage
such structural assumptions and obtained more efficient testers for a number of natural settings.
However, for several natural properties of interest there is still a substantial gap between known
sample upper and lower bounds.
1.3
Overview of Techniques
To prove our upper bound, we use a technique of iteratively reducing the number of bins (domain
elements). In particular, we show that if we merge bins together in consecutive pairs, this does
not significantly affect the Ak distance between the distributions, unless a large fraction of the
discrepancy between our distributions is supported on O(k) bins near the boundaries in the optimal
partition. In order to take advantage of this, we provide a novel identity tester that requires few
samples to distinguish between the cases where p = q and the case where p and q have a large
ℓ1 distance supported on only k of the bins. We are able to take advantage of the small support
essentially because having a discrepancy supported on few bins implies that the ℓ2 distance between
the distributions must be reasonably large.
Our new lower bounds are somewhat more involved. We prove them by exhibiting explicit
families of pairs of distributions, where in one case p = q and in the other p and q have large Ak
distance, but so that it is information-theoretically impossible to distinguish between these two
families with a small number of samples. In both cases, p and q are explicit piecewise constant
distributions with a small number of pieces. In both cases, our domain is partitioned into a small
number of bins and the restrictions of the distributions to different bins are independent, making
our analysis easier. In some bins we will have p = q each with mass about 1/m (where m is the
number of samples). These bins will serve the purpose of adding “noise” making harder to read
the “signal” from the other bins. In the remaining bins, we will have either that p = q being
supported on some interval, or p and q will be supported on consecutive, non-overlapping intervals.
If three samples are obtained from any one of these intervals, the order of the samples and the
distributions that they come from will provide us with information about which family we came
from. Unfortunately, since triple collisions are relatively uncommon, this will not be useful unless
5
m ≫ max(k4/5 /ǫ6/5 , k1/2 /ǫ2 ). Bins from which we have one or zero samples will tell us nothing,
but bins from which we have exactly two samples may provide information.
For these bins, it can be seen that we learn nothing from the ordering of the samples, but we
may learn something from their spacing. In particular, in the case where p and q are supported on
disjoint intervals, we would suspect that two samples very close to each other are far more likely to
be taken from the same distribution rather than from opposite distributions. On the other hand,
in order to properly interpret this information, we will need to know something about the scale of
the distributions involved in order to know when two points should be considered to be “close”. To
overcome this difficulty, we will stretch each of our distributions by a random exponential amount.
This will effectively conceal any information about the scales involved so long as the total support
size of our distributions is exponentially large.
2
2.1
A Near-Optimal Closeness Tester over Discrete Domains
Warmup: A Simpler Algorithm
We start by giving a simpler algorithm establishing a basic version of Theorem 1.1 with slightly
worse parameters:
Proposition 2.1. Given sample access to distributions p and q on [n] and ǫ > 0 there exists an
algorithm that takes
√
O k2/3 log4/3 (3 + n/k) log log(3 + n/k)/ǫ4/3 + k log2 (3 + n/k) log log(3 + n/k)/ǫ2
samples from each of p and q and distinguishes with 2/3 probability between the cases that p = q
and kp − qkAk ≥ ǫ.
The basic idea of our algorithm is the following: From the distributions p and q construct new
distributions p′ and q ′ by merging pairs of consecutive buckets. Note that p′ and q ′ each have much
smaller
domains (of size about n/2). Furthermore, note that the Ak distance between p and q is
P
|p(I)
− q(I)| for some partition I into k intervals. By using essentially the same partition,
I∈I
we can show that kp′ − q ′ kAk should be almost as large as kp − qkAk . This will in fact hold unless
much of the error between p and q is supported at points near the endpoints of intervals in I. If
this is the case, it turns out there is an easy algorithm to detect this discrepancy. We require the
following definitions:
Definition 2.2. For a discrete distribution p on [n], the merged distribution obtained from p is
def
the distribution p′ on ⌈n/2⌉, so that p′ (i) = p(2i) + p(2i + 1). For a partition I of [n] , define the
divided partition I ′ of domain ⌈n/2⌉, so that Ii′ ∈ I ′ has the points obtained by point-wise gluing
together odd points and even points.
Note that one can simulate a sample from p′ given a sample from p by letting p′ = ⌈p/2⌉.
Definition 2.3. Let p and q be distributions on [n]. For integers k ≥ 1, let kp − qk1,k be the sum
of the largest k values of |p(i) − q(i)| over i ∈ [n].
We begin by showing that either kp′ − q ′ kAk is close to kp − qkAk or kp − qk1,k is large.
Lemma 2.4. For any two distributions p and q on [n], let p′ and q ′ be the merged distributions.
Then,
kp − qkAk ≤ kp′ − q ′ kAk + 2kp − qk1,k .
6
P
Proof. Let I be the partition of [n] into k intervals so that kp − qkAk = I∈I |p(I) − q(I)|. Let I ′
be obtained from I by rounding each upper endpoint of each interval except for the last down to
the nearest even integer, and rounding the lower endpoint of each interval up to the nearest odd
integer. Note that
X
X
|p(I) − q(I)| =
|p′ (I/2) − q ′ (I/2)| ≤ kp′ − q ′ kAk .
I∈I ′
I∈I ′
The partition I ′ is obtained from I by taking at most k points and moving them from one interval
to another. Therefore, the difference
X
I∈I
|p(I) − q(I)| −
X
I∈I ′
|p(I) − q(I)| ,
is at most twice the sum of |p(i) − q(i)| over these k points, and therefore at most 2kp − qk1,k .
Combing this with the above gives our result.
Next, we need to show that if two distributions have kp − qk1,k large that this can be detected
easily.
Lemma 2.5. Let p and q be distributions on [n]. √Let k > 0 be a positive integer, and ǫ > 0.
There exists an algorithm which takes O(k2/3 /ǫ4/3 + k/ǫ2 ) samples from each of p and q and, with
probability at least 2/3, distinguishes between the cases that p = q and kp − qk1,k > ǫ.
Note that if we needed to distinguish between p = q and kp − qk1 > ǫ, this would require
√
Ω(n2/3 /ǫ4/3 + n/ǫ2 ) samples. However, the optimal testers for this problem are morally ℓ2 √
testers. That is, roughly, they actually distinguish between p = q and kp − qk2 > ǫ/ n. From this
viewpoint, it is clear why it would
√ be easier to test for discrepancies in k − k1,k -distance, since if
kp − qk1,k > ǫ, then kp − qk2 > ǫ/ k, making it easier for our ℓ2 -type tester to detect the difference.
Our general approach will be by way of the techniques developed in [DK16]. We begin by giving
the definition of a split distribution coming from that paper:
Definition 2.6. Given a distribution p on [n] and a multiset S of elements of [n], define the split
distribution pS on [n + |S|] asPfollows: For 1 ≤ i ≤ n, let ai denote 1 plus the number of elements of
S that are equal to i. Thus, ni=1 ai = n + |S|. We can therefore associate the elements of [n + |S|]
to elements of the set B = {(i, j) : i ∈ [n], 1 ≤ j ≤ ai }. We now define a distribution pS with
support B, by letting a random sample from pS be given by (i, j), where i is drawn randomly from
p and j is drawn randomly from [ai ].
We now recall two basic facts about split distributions:
Fact 2.7 ([DK16]). Let p and q be probability distributions on [n], and S a given multiset of
[n]. Then: (i) We can simulate a sample from pS or qS by taking a single sample from p or q,
respectively. (ii) It holds kpS − qS k1 = kp − qk1 .
Lemma 2.8 ([DK16]). Let p be a distribution on [n]. Then: (i) For any multisets S ⊆ S ′ of [n],
kpS ′ k2 ≤ kpS k2 , and (ii) If S is obtained by taking m samples from p, then E[kpS k22 ] ≤ 1/m.
We also recall an optimal ℓ2 closeness tester under the promise that one of the distributions
has smal ℓ2 norm:
7
Lemma 2.9 ([CDVV14]). Let p and q be two unknown distributions
on [n]. There exists an
√
algorithm that on input n, b ≥ min{kpk2 , kqk2 } and 0 < ǫ < 2b, draws O(b/ǫ2 ) samples from
each of p and q and, with probability at least 2/3, distinguishes between the cases that p = q and
kp − qk2 > ǫ.
Proof of Lemma 2.5: We begin by presenting the algorithm:
Algorithm Small-Support-Discrepancy-Tester
Input: sample access to pdf’s p, q : [n] → [0, 1], k ∈ Z+ , and ǫ > 0.
Output: “YES” if q = p; “NO” if kq − pk1,k ≥ ǫ.
1. Let m = min(k2/3 /ǫ4/3 , k).
2. Let S be the multiset obtained by taking m independent samples from p.
3. Use the ℓ2 tester of Lemma 2.9 to distinguish between the cases that pS = qS and
kpS − qS k22 ≥ k−1 ǫ2 /2 and return the result.
The analysis is simple. By Lemma 2.8, with 90% probability kpS k2 = O(m−1/2 ), and therefore
the number of√ samples needed (using the ℓ2 tester from Lemma 2.9) is O(m + km−1/2 /ǫ2 ) =
O(k2/3 /ǫ4/3 + k/ǫ2 ). If p = q, then pS = qS and the algorithm will return “YES” with appropriate
probability. If kq − pk1,k ≥ ǫ, then kpS − qS k1,k+m ≥ ǫ. Since k + m elements contribute to total ℓ1
error at least ǫ, by Cauchy-Schwarz, we have that kpS − qS k22 ≥ ǫ2 /(k + m) ≥ k−1 ǫ2 /2. Therefore,
in this case, the algorithm returns “NO” with appropriate probability.
Proof of Proposition 2.1: The basic idea of our algorithm is the following: By Lemma 2.5, if kp −
qkAk is large, then so is either kp − qk1,k or kp′ − q ′ kAk . Our algorithm then tests whether kp − qk1,k
is large, and recursively tests whether kp′ − q ′ kAk is large. Since p′ , q ′ have half the support size, we
will only need to do this for log(n/k) rounds, losing only a poly-logarithmic factor in the sample
complexity. We present the algorithm here:
Algorithm Small-Domain-Ak-tester
Input: sample access to pdf’s p, q : [n] → [0, 1], k ∈ Z+ , and ǫ > 0.
Output: “YES” if q = p; “NO” if kq − pkAk ≥ ǫ.
def
1. For i := 0 to t = ⌈log2 (n/k)⌉, let p(i) , q (i) be distributions on [⌈2−i n⌉] defined by
p(i) = ⌈2−i p⌉ and q (i) = ⌈2−i q⌉.
2. Take Ck2/3 log4/3 (3 + n/k) log log(3 + n/k)/ǫ4/3 samples, for C sufficiently large, and
use these samples to distinguish between the cases p(i) = q (i) and kp(i) − q (i) k1,k >
ǫ/(4 log 2 (3 + n/k)) with probability of error at most 1/(10 log 2 (3 + n/k)) for each i
from 0 to t, using the same samples for each test.
3. If any test yields that p(i) 6= q (i) , return “NO”. Otherwise, return “YES”.
We now show correctness. In terms of sample complexity, we note that by taking a majority over
O(log log(3 + n/k)) independent runs of the tester from Lemma 2.5 we can run this algorithm with
the stated sample complexity. Taking a union bound, we can also assume that all tests performed
in Step 2 returned the correct answer. If p = q then p(i) = q (i) for all i and thus, our algorithm
8
returns “YES”. Otherwise, we have that kp − qkAk ≥ ǫ. By repeated application of Lemma 2.4, we
have that
kp − qkAk ≤
t−1
X
i=0
2kp
(i)
(i)
− q k1,k + kp
(t)
(t)
− q kAk ≤ 2
t
X
i=0
kp(i) − q (i) k1,k ,
where the last step was because p(t) and q (t) have a support of size at most k and so kp(t) −
q (t) kAk = kp(t) − q (t) k1 = kp(t) − q (t) k1,k . Therefore, if this is at least ǫ, it must be the case that
kp(i) − q (i) k1,k > ǫ/(4 log 2 (3 + n/k)) for some 0 ≤ i ≤ t, and thus our algorithm returns “NO”. This
completes our proof.
2.2
Full Algorithm
The improvement to Proposition 2.1 is somewhat technical. The key idea involves looking into the
analysis of Lemma 2.5. Generally speaking, choosing a larger value of m (up to the total sample
complexity), will decrease the ℓ2 norm of p, and thus the final complexity. Unfortunately, taking
m > k might lead to problems as it will subdivide the k original bins on which the error is supported
into ω(k) bins. This in turn could worsen the lower bounds on kp − qk2 . However, this will only
be the case if the total mass of these bins carrying the difference is large. Thus, we can obtain an
improvement to Lemma 2.5 when the mass of bins on which the error is supported is small. This
motivates the following definition:
Definition 2.10. For probability distributions p, q, an integer k and real number
P α > 0, dk,α (p, q)
is the maximum over sets T of size at most k so that p(i) ≤ α for all i ∈ T of i∈T |p(i) − q(i)|.
In other words, dk,α (p, q) is the biggest ℓ1 difference between p and q coming from at most k
bins of mass at most α. We have the following lemma:
Lemma 2.11. Let p and q be distributions on [n]. Let k > 0 be a positive integer, and ǫ, α > 0.
There exists an algorithm which takes O(k2/3 /ǫ4/3 (1 + mα)) samples from each of p and q and,
with probability at least 2/3, distinguishes between the cases that p = q and dk,α (p, q) > ǫ.
Proof. The algorithm and its analysis are nearly identical to that of Lemma 2.5. We include them
here for completeness:
Algorithm Small-Support-Discrepancy-Tester
Input: sample access to pdf’s p, q : [n] → [0, 1], k ∈ Z+ , and ǫ > 0 with kpk2 ≤ α.
Output: “YES” if q = p; “NO” if kq − pk1,k ≥ ǫ.
1. Let m = k2/3 /ǫ4/3 .
2. Let S be the multiset obtained by taking m independent samples from p.
3. Use the ℓ2 tester of Lemma
√ 2.9 to distinguish between the cases pS = qS and kpS −
2
−1
2
qS k2 ≥ k ǫ /(1 + O(αm/ k)) and return the result.
The analysis is quite simple. Firstly, we can assume that kpS k22 = O(1/m) as this happens
with 90% probability
over the choice of S. Next, let T be the set of size at most k such that
P
dk,α (p, q) = i∈T |p(i)−q(i)|. With 90% probability over the choice of S, we have that only O(mkα)
elements from S land in T . Assuming this is the case, it is sufficient to distinguish between
pS = q S
√
√
and kpS − qS k22 ≥ k−1 ǫ2 /(1 + O(αm)), which can be done in O(kǫ−2 (1 + O(αm/ k))/ m) =
O(k2/3 ǫ−4/3 (1 + O(αm))) samples. This completes the proof.
9
We are now prepared to prove Theorem 1.1. The basic idea behind the improvement is that we
want to avoid merging heavy bins. We do this by first taking a large set of elements and defining
the p(i) in a way that doesn’t involve merging elements of these sets.
Proof. We first note that given the algorithm from [DKN15a], it suffices to provide an algorithm
when ǫ > k −3/8 and n ≤ 2k .
Our algorithm is the following:
Algorithm Small-Domain-Ak-tester
Input: sample access to pdf’s p, q : [n] → [0, 1], k ∈ Z+ , and ǫ > 0.
Output: “YES” if q = p; “NO” if kq − pkAk ≥ ǫ.
1. Let m = k2/3 log4/3 (3 + n/k)/ǫ4/3 . Let C be a sufficiently large constant.
2. Let S be a set of Cm log(k) independent samples from p.
def
3. Let p(0) = p and q (0) = q. For i := 1 to t = ⌈log2 (n/k)⌉, define distributions p(i) , q (i)
inductively as follows:
(a) p(i) will be a flattening of p by merging all bins in certain dyadic intervals (i.e.,
intervals of the form [a · 2b + 1, (a + 1)2b ]).
(b) p(i+1) is obtained from p(i) by merging any pair of adjacent bins of p(i) that
correspond to intervals [a2i+1 + 1, a2i+1 + 2i ] and [a2i+1 + 2i + 1, (a + 1)2i ] where
neither of these subintervals contains a point of S.
(c) q (i+1) is obtained by merging bins in a similar way.
4. Take Cm log log(3 + n/k) samples, and use these samples to distinguish between the
cases p(i) = q (i) and dk,1/m (p(i) − q (i) ) > ǫ/(8 log 2 (3 + n/k)) with probability of error
at most 1/(10 log 2 (3 + n/k)) for each i from 0 to t, using the same samples for each
test.
5. If any test yields that p(i) 6= q (i) , return “NO”.
6. Otherwise, test if p(t) = q (t) of kp(t) − q (t) kAk > ǫ/2 using the algorithm from Proposition 2.1 and return the answer.
We now proceed with the analysis. Firstly, we note that the bins of p(t) corresponds to a dyadic
interval either containing an element of S or adjacent to such an element. Therefore, the domain
of p(t) is at most O(t|S|) = poly(k).
We also note that the sample complexity of
O(m log(k)) + O(k2/3 log4/3 (3 + n/k) log log(3 + n/k)/ǫ4/3 )
√
+ O((k2/3 log4/3 (k) log log(k)/ǫ4/3 + k log2 (k) log log(k)/ǫ2 )),
which is sufficient.
We now proceed to prove correctness. For completeness, if p = q, it is easy to see that p(i) = q (i)
for all i, and thus, by a union bound, we pass every test and our algorithm returns “YES” with
2/3 probability.
It remains to consider the soundness case, i.e., the case where kp − qkAk > ǫ. In this case, let
P
I = {Ii }1≤i≤k be a partition of [n] into intervals so that ki=1 |p(Ii ) − q(Ii )| > ǫ. We claim that
10
with high probability over the choice of S every dyadic interval that has mass (under p) at least
1/m and contains an endpoint of some Ii also contains an element of S. To prove this, we note that
the Ii contain only O(k) endpoints, and each endpoint is contained in a unique minimal dyadic
interval of mass at least 1/m. It suffices to show that each of these O(k) intervals of mass at least
1/m contains a point in S, but this follows easily by a union bound. Henceforth, we will assume
that the S we chose has this property.
Let I (i) be a partition of the bins for p(i) and q (i) defined inductively by I (0) = I and I (i+1) is
obtained from I (i) by flattening it and assigning new bins that partially overlap two of the intervals
in I (i) arbitrarily to one of the two corresponding intervals in I (i+1) .
We note that
X
X
|p(i) (I) − q (i) (I)| −
|p(i+1) (I) − q (i+1) (I)|
I∈I (i)
I∈I (i+1)
is at most twice a sum over k bins b, not containing an element of S of |p(i) (b) − q (i) (b)|. This in
turn is at most 2dk,1/m (p(i) , q (i) ). Inducting, we have that
kp − qkAk ≤ 2
t−1
X
i=0
dk,1/m (p(i) , q (i) ) + kp(t) − q (t) kAk .
Therefore, if kp − qkAk > ǫ, we have that either dk,1/m (p(i) − q (i) ) > ǫ/(8 log2 (3 + n/k)) for some i,
or kp(t) − q (t) kAk > ǫ/2. In either case, with probability at least 2/3, our algorithm will detect this
and reject. This completes the proof.
3
Nearly Matching Information-Theoretic Lower Bound
In this section, we prove a nearly matching sample lower bound. We first show a slightly easier
lower bound that holds even for distributions that are piecewise constant on a few pieces, and then
modify it to obtain the stronger general bound for testing closeness in Ak distance.
3.1
Lower Bound for k-Histograms
We begin with a lower bound for k-histograms (k-flat distributions). Before moving to the discrete
setting, we first establish a lower bound for continuous histogram distributions. Our bound on
discrete distributions will follow from taking the adversarial distribution from this example and
rounding its values to the nearest integer. In order for this to work, we will need ensure to that our
adversarial distribution does not have its Ak -distance decrease by too much when we apply this
operation. To satisfy this requirement, we will guarantee that our distributions will be piecewise
constant with all the pieces of length at least 1.
Proposition 3.1. Let k ∈ Z+ , ǫ > 0 sufficiently small, and W > 2 . Fix
m = min(k2/3 log1/3 (W )/ǫ4/3 , k4/5 /ǫ6/5 ) .
There exist distributions D, D ′ over pairs of distributions p and q on [0, 2(m + k)W ], where p and
q are O(m + k)-flat with pieces of length at least 1, so that: (a) when drawn from D, we have p = q
deterministically, (b) when drawn from D ′ , we have kp − qkAk > ǫ with 90% probability, and so that
o(m) samples are insufficient to distinguish whether or not the pair is drawn from D or D ′ with
better than 2/3 probability.
11
At a high-level, our lower bound construction proceeds as follows: We will divide our domain
into m+k bins so that no information about which distributions had samples drawn from a given bin
or the ordering of these samples will help to distinguish between the cases of p = q and otherwise,
unless at least three samples are taken from the bin in question. Approximately k of these bins
will each have mass ǫ/k and might convey this information if at least three samples are taken from
the bin. However, the other m bins will each have mass approximately 1/m and will be used to
add noise. In all, if we take s samples, we expect to see approximately s3 ǫ3 /k2 of the lighter bins
with at least three samples. However, we will see approximately s3 /m2 of our heavy bins with
three samples. In order for the signal to overwhelm the noise, we will need to ensure that we have
(s3 ǫ3 /k2 )2 > s3 /m2 .
The above intuitive sketch assumes that we cannot obtain information from the bins in which
only two samples are drawn. This naively should not be the case. If p = q, the distance between
two samples drawn from that bin will be independent of whether or not they are drawn from the
same distribution. However, if p and q are supported on disjoint intervals, one would expect that
points that are close to each other should be far more likely to be drawn from the same distribution
than from different distributions. In order to disguise this, we will scale the length of the intervals
by a random, exponential amount, essentially making it impossible to determine what is meant by
two points being close to each other. In effect, this will imply that two points drawn from the same
bin will only reveal O(1/ log(W )) bits of information about whether p = q or not. Thus, in order
for this information to be sufficient, we will need that (s2 ǫ2 /k)2 / log(W ) > (s2 /m). We proceed
with the formal proof below.
Proof of Proposition 3.1: We use ideas from [DK16] to obtain this lower bound using an information
theoretic argument.
We √
may assume that ǫ > k1/2 , because otherwise we may employ the standard lower bound
that Ω( k/ǫ2 ) samples are required to distinguish two distributions on a support of size k.
First, we note that it is sufficient to take D and D ′ be distributions over pairs of non-negative,
piecewise constant distributions with total mass Θ(1) with 90% probability so that running a
Poisson process with parameter o(m) is insufficient to distinguish a pair from D from a pair from
D ′ [DK16].
We construct these distributions as follows: We divide the domain into m+k bins of length 2W .
For each bin i, we independently generate a random ℓi , so that log(ℓi /2) is uniformly distributed
over [0, 2 log(W )/3]. We then produce an interval Ii within bin i of total length ℓi and with random
offset. In all cases, we will have p and q supported on the union of the Ii ’s.
For each i with probability m/(m + k), we have the restrictions of p and q to Ii both uniform
with p(Ii ) = q(Ii ) = 1/m. The other k/(m + k) of the time we have p(Ii ) = q(Ii ) = ǫ/k. In this
latter case, if p and q are being drawn from D, p and q are each constant on this interval. If they
are being drawn from D ′ , then p + q will be constant on the interval, with all of that mass coming
from p on a random half and coming from q on the other half.
Note that in all cases p and q are piecewise constant with O(m + k) pieces of length at least 1.
It is easy to show that with high probability the total mass of each of p and q is Θ(1), and that if
drawn from D ′ that kp − qkAk ≫ ǫ with at least 90% probability.
We will now show that if one is given m samples from each of p and q, taken randomly from
either D or D ′ , that the shared information between the samples and the source family will be
small. This implies that one is unable to consistently guess whether our pair was taken from D or
D′ .
Let X be a random variable that is uniformly at random either 0 or 1. Let A be obtained by
applying a Poisson process with parameter s = o(m) on the pair of distributions p, q drawn from
12
D if X = 0 or from D ′ if X = 1. We note that it suffices to show that the shared information
I(X : A) = o(1). In particular, by Fano’s inequality, we have:
Lemma 3.2. If X is a uniform random bit and A is a correlated random variable, then if f is any
function so that f (A) = X with at least 51% probability, then I(X : A) ≥ 2 · 10−4 .
Let Ai be the samples of A taken from the ith bin.
P Note that the Ai are conditionally independent on X. Therefore, we have that I(X : A) ≤ i I(X : Ai ) = (m + k)I(X : A1 ) . We will
proceed to bound I(X : A1 ).
We note that I(X : A1 ) is at most the integral over pairs of multisets a (representing a set of
samples from q and a set of samples from p), of
(Pr(A1 = a|X = 0) − Pr(A1 = a|X = 1))2
O
.
Pr(A1 = a)
Thus,
I(X : A1 ) =
∞ Z
X
h=0 |a|=h
O
(Pr(A1 = a|X = 0) − Pr(A1 = a|X = 1))2
Pr(A1 = a)
.
We will split this sum up based on the value of h.
For h = 0, we note that the distributions for p+q are the same for X = 0 and X = 1. Therefore,
the probability of selecting no samples is the same. Therefore, this contributes 0 to the sum.
For h = 1, we note that the distributions for p + q are the same in both cases, and conditioning
on I1 and (p + q)(I1 ) that E[p] and E[q] are the same in each of the cases X = 0 and X = 1.
Therefore, again in this case, we have no contribution.
For h ≥ 3, we note that I(X : A1 ) ≤ I(X : A1 , I1 ) ≤ I(X : A1 |I1 ) , since I1 is independent of
X. We note that Pr(A1 = a|X = 0, p(I1 ) = 1/m) = Pr(A1 = a|X = 1, p(I1 ) = 1/m). Therefore,
we have that
Pr(A1 = a|X = 0)−Pr(A1 = a|X = 1) = Pr(A1 = a|X = 0, p(I1 ) = ǫ/k)−Pr(A1 = a|X = 1, p(I1 ) = ǫ/k).
If p(I1 ) = ǫ/k, the probability that exactly h elements are selected in this bin is at most k/(m +
k)(2sǫ/k)h /h!, and if they are selected, they are uniformly distributed in I1 (although which of the
sets p and q they are taken from is non-uniform). However, the probability that h elements are
taken from I1 is at least Ω(m/(m + k)(sm)−h /h!) from the case where p(I1 ) = 1/m, and in this
case the elements are uniformly distributed in I1 and uniformly from each of p and q. Therefore, we
have that this contribution to our shared information is at most k2 /(m(m + k))O(sǫ2 m/k2 )h /h! .
We note that ǫ2 m/k2 < 1. Therefore, the sum of this over all h ≥ 3 is k2 /(m(m + k))O(sǫ2 m/k2 )3 .
Summing over all m + k bins, this is k−4 ǫ6 s3 m2 = o(1).
It remains to analyze the case where h = 2. Once again, we have that ignoring which of p and
q elements of A1 came from, A1 is identically distributed conditioned on p(I1 ) = 1/m and |A1 | = 2
as it is conditioned on p(I1 ) = ǫ/k and |A1 | = 2. Since once again, the distributions D and D ′ are
indistinguishable in the former case, we have that the contribution of the h = 2 terms to the shared
information is at most
(k/(k + m)(ǫs/k)2 )2
dTV ((A1 |X = 0, p(I1 )ǫ/k, |A1 | = 2), (A1 |X = 1, p(I1 ) = ǫ/k, |A1 | = 2))
O
m/(k + m)(s/m)2
or
O s2 mk−2 ǫ4 /(k + m) dTV ((A1 |X = 0, p(I1 ) = ǫ/k, |A1 | = 2), (A1 |X = 1, p(I1 ) = ǫ/k, |A1 | = 2)) .
13
It will suffice to show that conditioned upon p(I1 ) = ǫ/k and |A1 | = 2 that
dTV ((A1 |X = 0), (A1 |X = 1)) = O(1/ log(W )).
Let f be the order preserving linear function from [0, 2] to I1 . Notice that conditional on |A1 | = 2
and p(I1 ) = ǫ/k that we may sample from A1 as follows:
• Pick two points x > y uniformly at random from [0, 2].
• Assign the points to p and q as follows:
– If X = 0 uniformly randomly assign these points to either distribution p or q.
– If X = 1 randomly do either:
∗ Assign points in [0, 1] to q and other points to p.
∗ Assign points in [0, 1] to p and other points to q.
• Randomly pick I1 and apply f to x and y to get outputs z = f (x), w = f (y).
Notice that the four cases: (i) both points coming from p, (ii) both points coming from q, (iii) a
point from p preceding a point from q, (iv) a point from q preceding a point from p, are all equally
likely conditioned on either X = 0 or X = 1. However, we will note that this ordering is no longer
independent of the choice of x and y.
Therefore, we can sample from A1 subject to X = 0 and from A1 subject to X = 1 in such
a way that this ordering is the same deterministically. We consider running the above sampling
algorithm to select (x, y) while sampling from X = 0 and (x′ , y ′ ) when sampling from X = 1 so
that we are in the same one of the above four cases. We note that
dTV ((A1 |X = 0), (A1 |X = 1)) ≤ Ex,y,x′ ,y′ [dTV ((f (x), f (y)), (f (x′ ), f (y ′ )))] ,
where the variation distance is over the random choices of f .
To show that this is small, we note that |f (x) − f (y)| is distributed like ℓ1 (x − y). This means
that log(|f (x) − f (y)|) is uniform over [log(f (x) − f (y)), log(f (x) − f (y)) + 2 log(W )/3]. Similarly,
log(|f ′ (x′ )− f ′ (y ′ )|) is uniform over [log(f (x′ )− f (y ′ )), log(f (x′ )− f (y ′ ))+ 2 log(W )/3]. These differ
in total variation distance by
| log(f (x) − f (y))| + | log(f (x′ ) − f (y ′ ))|
O
.
log(W )
Taking the expectation over x, y, x′ , y ′ we get O(1/ log(W )). Therefore, we may further correlate
the choices made in selecting our two samples, so that z − w = z ′ − w′ except with probability
O(1/ log(W )). We note that after conditioning on this, z and z ′ are both uniformly distributed
over subintervals of [0, 2W ] of length at least 2(W − W 2/3 ). Therefore, the distributions on z
and z ′ differ by at most O(W −1/3 ). Hence, the total variation distance between A1 conditioned
on |A1 | = 2, p(I1 ) = ǫ/k, X = 0 and conditioned on |A1 | = 2, p(I1 ) = ǫ/k, X = 1 is at most
O(1/ log(W )) + O(W −1/3 ) = O(1/ log(W )). This completes our proof.
We can now turn this into a lower bound for testing Ak distance on discrete domains.
Proof of second half of Theorem 1.3: Assume for sake of contradiction that this is not the case, and
that there exists a tester taking o(m) samples. We use this tester to come up with a continuous
tester that violates Proposition 3.1.
14
We begin by proving a few technical bounds on the parameters involved. Firstly, note that we
already have a lower bound of Ω(k1/2 /ǫ2 ), so we may assume that this is much less than m. We
now claim that m = O(min(k2/3 log1/3 (3 + n/(m + k))/ǫ4/3 , k4/5 /ǫ6/5 ). If m ≤ k, there is nothing
to prove. Otherwise,
k2/3 log1/3 (3 + n/(m + k))/ǫ4/3 ≥ m(m/k)−1/3 log(3 + n/(m + k))1/3 .
Thus, there is nothing more to prove unless log(3 + n/(m + k)) ≫ m/k. But, in this case, log(3 +
n/(m + k)) ≫ log(m/k) and thus log(3 + n/(m + k)) = Θ(log(3 + n/k)), and we are done.
We now let W = n/(6(m + k)), and let D and D ′ be as specified in Proposition 3.1. We claim
that we have a tester to distinguish a p, q from D from ones taken from D ′ in o(m) samples. We
do this as follows: By rounding p and q down to the nearest third of an integer, we obtain p′ ,q ′
supported on set of size n. Since p and q were piecewise constant on pieces of size at least 1, it
is not hard to see that kp′ − q ′ kAk ≥ kp − qkAk /3. Therefore, a tester to distinguish p′ = q ′ from
kp′ − q ′ kAk ≥ ǫ can be used to distinguish p = q from kp − qkAk ≥ 3ǫ. This is a contradiction and
proves our lower bound.
3.2
The Stronger Lower Bound
In order to improve on the bound from the last section, we will need to modify our previous
construction in two ways both having to do with the contribution to the shared information coming
from the case where two samples are taken from the same bin. The first is that we will need
a different way of distinguishing between D and D ′ so that the variation distance between the
distributions obtained from taking a pair of samples from the same bin is O(1/ log 2 (W )) rather
than O(1/ log(W )). After that, we will also need a better method of disguising these errors. In
particular, in the current construction, most of the information coming from pairs of samples from
the same bin occurs when the two samples are very close to each other (as when this happens in
D ′ , the samples usually don’t come one from p and the other from q). This is poorly disguised by
noise coming from the heavier bins since these are not particularly likely to produce samples that
are close. We can improve our way of disguising this by having different heavy bins to better mask
this signal.
In order to solve the first of these problems, we will need the following construction:
Lemma 3.3. Let W be a sufficiently large integer. There exists a family E of pairs of distributions
p and q on [0, W ] so that the following holds:
Firstly, p and q are deterministically supported on disjoint intervals, and thus have A1 distance
2. Furthermore, let E0 be the family of pairs of distributions p and q on [W ] obtained by taking
(p′ , q ′ ) from E and letting p = q = (p′ + q ′ )/2. In other words, a sample from E0 can be thought of
as taking a sample from E and then re-randomizing the label. Consider the distribution obtained
by sampling (p, q) from E, and then taking two independent samples x and y from (p + q)/2. We
let E 2 be the induced distribution on x and y along with the labels of which of p and q each were
taken from. Define E02 similarly, and note that it is equivalent to taking a sample from E 2 and
re-randomizing the labels. Then dTV (E 2 , E02 ) = O(1/ log 2 (W )).
Proof. We note that it is enough to construct a family of continuous distributions p and q on [0, W ]
so that deterministically p and q are supported on intervals separated by distance 2, and so that
the second condition above holds. By then rounding the values of p and q to the nearest integer,
we obtain an appropriate discrete distribution.
The construction of E is straightforward. First, choose a uniformly from [W 2/3 , W − W 2/3 ], ℓ
uniformly from [0, log(W )/3], and b uniformly from {±1}. To sample from p, take an α uniformly
15
from [0, log(W )/3] and return a + beℓ eα . To sample from q, take an α uniformly from [0, log(W )/3]
and return a − beℓ eα .
It is clear that p and q are supported on disjoint intervals of distance at least 2. It remains to
prove the more complicated claim.
Let Es2 be the distribution obtained by picking a pair of distributions from E and then returning two independent samples from p. Let Ed2 be the distribution obtained by picking a pair
of distributions from E and then returning independent samples from p and q. We claim that
dTV (E 2 , E02 ) = O(dTV (Es2 , Ed2 )). This is because if a sample from E 2 has both points coming from p
or both from q, the points come from Es2 , whereas if one point comes from each, the points come
from Ed2 . On the other hand, in any of these cases, a pair of samples from E02 comes from (Es2 +Ed2 )/2.
Let (x, y) be a sample from Es2 and (w, z) a sample from Ed2 . We claim that dTV ((x, y), (w, z)) ≤
dTV (x − y, w − z) + O(W −1/3 ). This is because of the averaging over a in the definition of E. In
particular, consider the following mechanism for taking a sample from Es2 or Ed2 . First, randomly
select values of s and ℓ. Then select the α and α′ for the two sample points. Finally, sample the
defining value of a. Notice that the difference between the two final points does not depend on
the choice of a. In fact, after making all other choices, the final distribution is within O(W −1/3 )
of the uniform distribution over pairs of points in [0, W ] with this distance. Thus, (x, y) is close
distributionally to the distribution on pairs in [0, W ] with separation x−y. A similar statement holds
for (z, w) and points with separation z−w. Thus, dTV ((x, y), (w, z)) = dTV (x−y, w−z)+O(W −1/3 ),
as desired.
Next, we claim that dTV (x − y, z − w) = dTV (|x − y|, |z − w|). This is easily seen to be the case
by averaging over b. We have left to bound the latter distance. If x and y are chosen using αx and
αy , we have that |x − y| = eℓ |eαx − eαy |. Similarly, if z and w are chosen using αz and αw , we have
that |z − w| = eℓ |eαz + eαw |. Notice that if we fix αx , αy , αz and αw , the variation distance between
these two distributions (given the distributions over the values of ℓ) is
αx αy
|e −e |
log |e
αz +eαw |
.
O
log(W )
Therefore, the variation distance between |x − y| and |z − w| is O(1/ log(W )) times the earth
mover distance between log(|eαx − eαy |) and log(|eαz + eαw |). Correlating these variables so that
αx = αz = α and αy = αw = β, this is at most the expectation of | log(tanh((α − β)/2))|, which
can easily be seen to be O(1/ log(W )). This shows that dTV (E 2 , E02 ) = O(1/ log 2 (W )), completing
our proof.
We are now ready to prove the first part of Theorem 1.3.
Proof. The overall outline is very similar to the methods used in the last section. For sufficiently
large integers m, k, W and ǫ > 0 we are going to define families of pairs of pseudo-distributions D
and D ′ on [(k + 2m)W ] so that:
• With 90% probability a random sample from either D or D ′ consists of two pseudo-distributions
with total mass Θ(1).
• The distributions picked by a sample from D are always the same.
• The two distributions picked by a sample from D ′ have Ak distance Ω(ǫ) with 90% probability.
16
• Letting A be the outcome of a Poisson process with parameter m run on a random sample from
either D or D ′ , the family used cannot be reliably determined from A unless m ≫ k4/5 /ǫ6/5
or m ≫ k2/3 log4/3 (W )/ǫ4/3 .
Before we define D and D ′ , we will need to define one more family. Firstly, let E and E0 be the
families of distributions on [W ] from Lemma 3.3. Let E 2 and E02 be as described in that lemma.
We define another family, F of pairs of distributions on [W ] as follows. First select a point (x, y)
from the renormalized version of |E 2 − E02 |. Then return the pair of distributions p = q equals the
uniform distribution over {x, y}.
To define D and D ′ , we split [(k + 2m)W ] into k + 2m blocks of size W . A sample from D
assigns to each block independently the pseudo-distribution:
• E0 /m (i.e., a random sample from E0 scaled by a factor of 1/m) with probability m/(k + 2m)
• E0 ǫ/k with probability k/(k + 2m)
• F/m with probability m/(k + 2m).
A sample from D ′ assigns to each block independently the pseudo-distribution:
• E0 /m with probability m/(k + 2m)
• Eǫ/k with probability k/(k + 2m)
• F/m with probability m/(k + 2m).
It is easy to see that D and D ′ satisfy the first three of the properties listed above. To demonstrate the fourth, let X be a uniform Bernoulli random variable. Let A be obtained by applying a
Poisson process of parameter m to a sample from D if X = 0, and to a sample from D ′ if X = 1.
We will show that I(X : A) = o(1). Once again, letting A = (A1 , A2 , . . . , Ak+2m ), where Ai are
the samples taken from the ith block, we note that the Ai are conditionally independent on X and
therefore, I(X : A) ≤ (k + 2m)I(X : A1 ).
As before, no information is gained when |A1 | < 2, and the contribution when |A1 | ≥ 3 is
O((k/(k + m))2 (mǫ/k)6 /(m/(k + m))), which leads to a total contribution of o(1) when m =
o(k4/5 /ǫ6/5 ). It remains to consider the contribution from events where |A1 | = 2.
This is
X
(Pr(A1 = x|X = 0) − Pr(A1 = x|X = 1))2
.
O
Pr(A1 = x)
2
x∈([W ]×{p,q})
Note that the contribution to Pr(A1 = x|X = 0) − Pr(A1 = x|X = 1) from cases where D and D ′
on block 1 are E0 /m or F/m cancel out. Therefore, we have that
| Pr(A1 = x|X = 0) − Pr(A1 = x|X = 1)| = O((k/(k + m))(mǫ/k)2 |E 2 (x) − E02 (x)|)
= O((k/(k + m))(mǫ/k)2 F(x)/ log 2 (W )).
On the other hand, the Pr(A1 = x) is at least the probability that A1 = x when the restriction
to block 1 is F/m, which is Ω(m/(k + m)F(x)). Therefore, the contribution to I(X : A1 ) coming
17
from events where |A1 | = 2 is
X
x∈([W ]×{p,q})2
=
X
(Pr(A1 = x|X = 0) − Pr(A1 = x|X = 1))2
Pr(A1 = x)
((k/(k + m))(mǫ/k)2 F 2 (x)/ log2 (W ))2
O
m/(k + m)F 2 (x)
2
O
x∈([W ]×{p,q})
=
X
x∈([W ]×{p,q})2
F 2 (x)O(k2 (mǫ/k)4 log−4 (W )/(m(k + m)))
= O(m3 ǫ4 k−2 log−4 (W )/(m + k)).
Hence, the total contribution to I(X : A) from such terms is O(m3 ǫ4 k−2 log−4 (W )/(m + k)). This
is o(1) if m = o(k2/3 log4/3 (W )/ǫ4/3 ). This completes our proof.
References
[ADH+ 15] J. Acharya, I. Diakonikolas, C. Hegde, J. Li, and L. Schmidt. Fast and Near-Optimal
Algorithms for Approximating Distributions by Histograms. In 34th ACM SIGMODSIGACT-SIGAI Symposium on Principles of Database Systems, PODS 2015, pages
249–263, 2015.
[ADLS16] J. Acharya, I. Diakonikolas, J. Li, and L. Schmidt. Fast algorithms for segmented
regression. In Proceedings of the 33nd International Conference on Machine Learning,
ICML 2016, pages 2878–2886, 2016.
[ADLS17] J. Acharya, I. Diakonikolas, J. Li, and L. Schmidt. Sample-optimal density estimation in
nearly-linear time. In Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium
on Discrete Algorithms, SODA 2017, pages 1278–1289, 2017. Full version available at
https://arxiv.org/abs/1506.00671.
[BBBB72] R.E. Barlow, D.J. Bartholomew, J.M. Bremner, and H.D. Brunk. Statistical Inference
under Order Restrictions. Wiley, New York, 1972.
[BFR+ 00] T. Batu, L. Fortnow, R. Rubinfeld, W. D. Smith, and P. White. Testing that distributions are close. In IEEE Symposium on Foundations of Computer Science, pages
259–269, 2000.
[BKR04]
T. Batu, R. Kumar, and R. Rubinfeld. Sublinear algorithms for testing monotone and
unimodal distributions. In ACM Symposium on Theory of Computing, pages 381–390,
2004.
[Can15]
C. L. Canonne. A survey on distribution testing: Your data is big. but is it blue?
Electronic Colloquium on Computational Complexity (ECCC), 22:63, 2015.
[Can16]
C. L. Canonne. Are few bins enough: Testing histogram distributions. In Proceedings
of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, PODS 2016, pages 455–463, 2016.
[CDGR16] C. L. Canonne, I. Diakonikolas, T. Gouleakis, and R. Rubinfeld. Testing shape restrictions of discrete distributions. In 33rd Symposium on Theoretical Aspects of Computer
Science, STACS 2016, pages 25:1–25:14, 2016.
18
[CDSS13]
S. Chan, I. Diakonikolas, R. Servedio, and X. Sun. Learning mixtures of structured
distributions over discrete domains. In SODA, pages 1380–1394, 2013.
[CDSS14a] S. Chan, I. Diakonikolas, R. Servedio, and X. Sun. Efficient density estimation via
piecewise polynomial approximation. In STOC, pages 604–613, 2014.
[CDSS14b] S. Chan, I. Diakonikolas, R. Servedio, and X. Sun. Near-optimal density estimation in
near-linear time using variable-width histograms. In NIPS, pages 1844–1852, 2014.
[CDVV14] S. Chan, I. Diakonikolas, P. Valiant, and G. Valiant. Optimal algorithms for testing
closeness of discrete distributions. In SODA, pages 1193–1203, 2014.
[CMN98]
S. Chaudhuri, R. Motwani, and V. R. Narasayya. Random sampling for histogram
construction: How much is enough? In SIGMOD Conference, pages 436–447, 1998.
[DDKT16] C. Daskalakis, A. De, G. Kamath, and C. Tzamos. A size-free CLT for poisson multinomials and its applications. In Proceedings of the 48th Annual ACM Symposium on
the Theory of Computing, STOC ’16, New York, NY, USA, 2016. ACM.
[DDO+ 13] C. Daskalakis, I. Diakonikolas, R. O’Donnell, R.A. Servedio, and L. Tan. Learning
Sums of Independent Integer Random Variables. In FOCS, pages 217–226, 2013.
[DDS12a]
C. Daskalakis, I. Diakonikolas, and R.A. Servedio. Learning k-modal distributions via
testing. In SODA, pages 1371–1385, 2012.
[DDS12b]
C. Daskalakis, I. Diakonikolas, and R.A. Servedio. Learning Poisson Binomial Distributions. In STOC, pages 709–728, 2012.
[DDS+ 13] C. Daskalakis, I. Diakonikolas, R. Servedio, G. Valiant, and P. Valiant. Testing k-modal
distributions: Optimal algorithms via reductions. In SODA, pages 1833–1852, 2013.
[DGPP16] I. Diakonikolas, T. Gouleakis, J. Peebles, and E. Price. Collision-based testers are optimal for uniformity and closeness. Electronic Colloquium on Computational Complexity
(ECCC), 23:178, 2016.
[DHS15]
I. Diakonikolas, M. Hardt, and L. Schmidt. Differentially private learning of structured
discrete distributions. In NIPS, pages 2566–2574, 2015.
[DK16]
I. Diakonikolas and D. M. Kane. A new approach for testing properties of discrete
distributions. In FOCS, pages 685–694, 2016. Full version available at abs/1601.05557.
[DKN15a] I. Diakonikolas, D. M. Kane, and V. Nikishkin. Optimal algorithms and lower bounds
for testing closeness of structured distributions. In IEEE 56th Annual Symposium on
Foundations of Computer Science, FOCS 2015, pages 1183–1202, 2015.
[DKN15b] I. Diakonikolas, D. M. Kane, and V. Nikishkin. Testing identity of structured distributions. In Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete
Algorithms, SODA 2015, pages 1841–1854, 2015.
[DKS16a]
I. Diakonikolas, D. M. Kane, and A. Stewart. Efficient robust proper learning of logconcave distributions. CoRR, abs/1606.03077, 2016.
[DKS16b] I. Diakonikolas, D. M. Kane, and A. Stewart. The fourier transform of poisson multinomial distributions and its algorithmic applications. In Proceedings of STOC’16, 2016.
19
[DKS16c]
I. Diakonikolas, D. M. Kane, and A. Stewart. Learning multivariate log-concave distributions. CoRR, abs/1605.08188, 2016.
[DKS16d] I. Diakonikolas, D. M. Kane, and A. Stewart. Optimal Learning via the Fourier Transform for Sums of Independent Integer Random Variables. In COLT, volume 49, pages
831–849, 2016. Full version available at arXiv:1505.00662.
[DKS16e]
I. Diakonikolas, D. M. Kane, and A. Stewart. Properly learning poisson binomial distributions in almost polynomial time. In Proceedings of the 29th Conference on Learning
Theory, COLT 2016, pages 850–878, 2016. Full version available at arXiv:1511.04066.
[DL01]
L. Devroye and G. Lugosi. Combinatorial methods in density estimation. Springer
Series in Statistics, Springer, 2001.
[DL04]
L. Devroye and G. Lugosi. Bin width selection in multivariate histograms by the
combinatorial method. Test, 13(1):129–145, 2004.
[FD81]
D. Freedman and P. Diaconis. On the histogram as a density estimator:l2 theory.
Zeitschrift für Wahrscheinlichkeitstheorie und Verwandte Gebiete, 57(4):453–476, 1981.
[GGI+ 02]
A. C. Gilbert, S. Guha, P. Indyk, Y. Kotidis, S. Muthukrishnan, and M. Strauss.
Fast, small-space algorithms for approximate histogram maintenance. In STOC, pages
389–398, 2002.
[GJ14]
P. Groeneboom and G. Jongbloed. Nonparametric Estimation under Shape Constraints:
Estimators, Algorithms and Asymptotics. Cambridge University Press, 2014.
[GKS06]
S. Guha, N. Koudas, and K. Shim. Approximation and streaming algorithms for histogram construction problems. ACM Trans. Database Syst., 31(1):396–438, 2006.
[ILR12]
P. Indyk, R. Levi, and R. Rubinfeld. Approximating and Testing k-Histogram Distributions in Sub-linear Time. In PODS, pages 15–22, 2012.
[JKM+ 98] H. V. Jagadish, N. Koudas, S. Muthukrishnan, V. Poosala, K. C. Sevcik, and T. Suel.
Optimal histograms with quality guarantees. In VLDB, pages 275–286, 1998.
[Kle09]
J. Klemela. Multivariate histograms with data-dependent partitions. Statistica Sinica,
19(1):159–176, 2009.
[LN96]
G. Lugosi and A. Nobel. Consistency of data-driven histogram methods for density
estimation and classification. Ann. Statist., 24(2):687–706, 04 1996.
[LR05]
E. L. Lehmann and J. P. Romano. Testing statistical hypotheses. Springer Texts in
Statistics. Springer, 2005.
[NP33]
J. Neyman and E. S. Pearson. On the problem of the most efficient tests of statistical hypotheses. Philosophical Transactions of the Royal Society of London. Series
A, Containing Papers of a Mathematical or Physical Character, 231(694-706):289–337,
1933.
[Pan08]
L. Paninski. A coincidence-based test for uniformity given very sparsely-sampled discrete data. IEEE Transactions on Information Theory, 54:4750–4755, 2008.
[Rub12]
R. Rubinfeld. Taming big probability distributions. XRDS, 19(1):24–28, 2012.
20
[Sco79]
D. W. Scott. On optimal and data-based histograms. Biometrika, 66(3):605–610, 1979.
[Sco92]
D.W. Scott. Multivariate Density Estimation: Theory, Practice and Visualization.
Wiley, New York, 1992.
[TGIK02]
N. Thaper, S. Guha, P. Indyk, and N. Koudas. Dynamic multidimensional histograms.
In SIGMOD Conference, pages 428–439, 2002.
[VV14]
G. Valiant and P. Valiant. An automatic inequality prover and instance optimal identity
testing. In FOCS, 2014.
[WN07]
R. Willett and R. D. Nowak. Multiscale poisson intensity and density estimation. IEEE
Transactions on Information Theory, 53(9):3171–3187, 2007.
21
| 10math.ST
|
1
arXiv:cs/0509027v1 [cs.PL] 10 Sep 2005
Haskell’s overlooked object system
— 1 February 2008 —
Oleg Kiselyov
Fleet Numerical Meteorology and Oceanography Center, Monterey, CA
Ralf Lämmel
Microsoft Corp., Redmond, WA
Abstract
Haskell provides type-class-bounded and parametric polymorphism as opposed to subtype
polymorphism of object-oriented languages such as Java and OCaml. It is a contentious
question whether Haskell 98 without extensions, or with common extensions, or with
new extensions can fully support conventional object-oriented programming with encapsulation, mutable state, inheritance, overriding, statically checked implicit and explicit
subtyping, and so on.
In a first phase, we demonstrate how far we can get with object-oriented functional
programming, if we restrict ourselves to plain Haskell 98. In the second and major phase,
we systematically substantiate that Haskell 98, with some common extensions, supports
all the conventional OO features plus more advanced ones, including first-class lexically
scoped classes, implicitly polymorphic classes, flexible multiple inheritance, safe downcasts
and safe co-variant arguments. Haskell indeed can support width and depth, structural
and nominal subtyping. We address the particular challenge to preserve Haskell’s type
inference even for objects and object-operating functions. Advanced type inference is a
strength of Haskell that is worth preserving. Many of the features we get “for free”: the
type system of Haskell turns out to be a great help and a guide rather than a hindrance.
The OO features are introduced in Haskell as the OOHaskell library, non-trivially
based on the HList library of extensible polymorphic records with first-class labels and
subtyping. The library sample code, which is patterned after the examples found in OO
textbooks and programming language tutorials, including the OCaml object tutorial,
demonstrates that OO code translates into OOHaskell in an intuition-preserving way:
essentially expression-by-expression, without requiring global transformations.
OOHaskell lends itself as a sandbox for typed OO language design.
Keywords: Object-oriented functional programming, Object type inference, Typed objectoriented language design, Heterogeneous collections, ML-ART, Mutable objects, TypeClass-based programming, Haskell, Haskell 98, Structural subtyping, Duck typing, Nominal subtyping, Width subtyping, Deep subtyping, Co-variance
2
O. Kiselyov and R. Lämmel
Contents
1 Introduction
2 The folklore ‘shapes’ example
2.1 C++ reference encoding
2.2 OOHaskell encoding
2.3 Discussion of the example
2.3.1 Classes vs. interfaces
2.3.2 Extensibility and encapsulation
2.3.3 Subtyping technicalities
3 Alternative Haskell encodings
3.1 Map subtype hierarchy to an algebraic datatype
3.2 Map object data to tail-polymorphic record types
3.3 Functional objects, again with tail polymorphism
3.4 Mutable objects, again with tail polymorphism
3.5 Subtypes as composed record types with overloading
3.6 Variation — existential quantification
3.7 Variation — heterogeneous collections
4 Type-agnostic OOHaskell idioms
4.1 Objects as records
4.1.1 First-class labels
4.1.2 Mutable variables
4.1.3 HList records
4.1.4 OO test cases
4.2 Object generators
4.2.1 Constructor arguments
4.2.2 Construction-time computations
4.2.3 Implicitly polymorphic classes
4.2.4 Nested object generators
4.2.5 Open recursion
4.2.6 Instantiation checking
4.3 Reuse techniques
4.3.1 Single inheritance with extension
4.3.2 Class-polymorphic functionality
4.3.3 Single inheritance with override
4.3.4 Orphan methods
4.3.5 Flexible reuse schemes
4.4 Safe value recursion
5 Type-perceptive OOHaskell idioms
5.1 Semi-implicit upcasting
5.2 Narrow to a fixed type
5.3 Self-returning methods
5.4 Casts based on dynamics
5.5 Casts based on unions
5.6 Explicit type constraints
5.7 Nominal subtyping
5.8 Iso-recursive types
5.9 Width and depth subtyping
5.10 Co-variant method arguments
5.11 Anti-patterns for subtyping
6 Discussion
6.1 Usability issues
6.1.1 Usability of inferred types
6.1.2 Usability of type errors
6.1.3 Efficiency of object encoding
6.2 Related work
6.2.1 The ML-ART object encoding
6.2.2 Haskell language extensions
6.2.3 Object encodings for Haskell
6.3 More future work
7 Concluding remarks
References
3
5
5
8
10
10
11
11
11
12
14
17
20
23
27
28
29
30
30
31
32
33
34
34
34
35
36
37
38
39
39
40
40
41
41
43
46
46
48
49
50
52
54
55
58
59
62
64
66
66
66
68
70
71
71
72
73
74
74
76
Haskell’s overlooked object system
— 1 February 2008 —
3
1 Introduction
The topic of object-oriented programming in the functional language Haskell
is raised time and again on programming language mailing lists, on programming tutorial websites, and in verbal communication at programming
language conferences with remarkable intensity. Dedicated OO Haskell language extensions have been proposed; specific OO idioms have been encoded
in Haskell (Hughes & Sparud, 1995; Gaster & Jones, 1996; Finne et al., 1999;
Shields & Peyton Jones, 2001; Nordlander, 2002; Bayley, 2005). The interest in this
topic is not at all restricted to Haskell researchers and practitioners since there is a
fundamental and unsettled question — a question that is addressed in the present
paper:1
What is the relation between type-class-bounded and subtype polymorphism?
In this research context, we specifically (and emphatically) restrict ourselves to the
existing Haskell language (Haskell 98 and common extensions where necessary),
i.e., no new Haskell extensions are to be proposed. As we will substantiate, this
restriction is adequate, as it allows us to deliver a meaningful and momentous answer to the aforementioned question. At a more detailed level, we offer the following
motivation for research on OO programming in Haskell:
• In an intellectual sense, one may wonder whether Haskell’s advanced type
system is expressive enough to model object types, inheritance, subtyping,
virtual methods, etc. No general, conclusive result has been available so far.
• In a practical sense, one may wonder whether we can faithfully transport
imperative OO designs from, say, C#, C++, Eiffel, Java, VB to Haskell —
without totally rewriting the design and without foreign-language interfacing.
• From a language design perspective, Haskell has a strong record in prototyping semantics and encoding abstraction mechanisms, but one may wonder
whether Haskell can perhaps even serve as a sandbox for design of typed
object-oriented languages so that one can play with new ideas without the
immediate need to write or modify a compiler.
• In an educational sense, one may wonder whether more or less advanced
functional and object-oriented programmers can improve their understanding
of Haskell’s type system and OO concepts by looking into the pros and cons
of different OO encoding options in Haskell.
1
On a more anecdotal account, we have collected informative pointers to mailing list discussions, which document the unsettled understanding of OO programming in Haskell and the relation between OO classes and Haskell’s type classes:
http://www.cs.mu.oz.au/research/mercury/mailing-lists/mercury-users/mercury-users.0105/0051.html,
http://www.talkaboutprogramming.com/group/comp.lang.functional/messages/47728.html,
http://www.haskell.org/pipermail/haskell/2003-December/013238.html,
http://www.haskell.org/pipermail/haskell-cafe/2004-June/006207.html,
http://www.haskell.org//pipermail/haskell/2004-June/014164.html
4
O. Kiselyov and R. Lämmel
This paper delivers substantiated, positive answers to these questions. We describe OOHaskell — a Haskell-based library for (as of today: imperative) OO programming in Haskell. OOHaskell delivers Haskell’s “overlooked” object system.
The key to this result is a good deal of exploitation of Haskell’s advanced type system combined with a careful identification of a suitable object encoding. We instantiate and enhance existing encoding techniques (such as (Pierce & Turner, 1994;
Rémy, 1994; Abadi & Cardelli, 1996)) aiming at a practical object system that
blends well with the host language — Haskell. We take advantage of our previous
work on heterogeneous collections (Kiselyov et al., 2004) (the HList library). More
generally, we put type-class-based or type-level programming to work (Hallgren, 2001;
McBride, 2002; Neubauer et al., 2002; Neubauer et al., 2001).
The simplified story is the following:
- Classes are represented as functions that are in fact object generators.
- State is maintained through mutable variables allocated by object generators.
- Objects are represented as records of closures with a component for each method.
- Methods are monadic functions that can access state and self.
- We use HList’s record calculus (extensible records, up-casts, etc.).
- We use type-class-based functionality to program the object typing rules.
To deliver a faithful, convenient and comprehensive object system, several techniques had to be discovered and combined. Proper effort was needed to preserve
Haskell’s type inference for OO programming idioms (as opposed to explicit type
declarations or type constraints for classes, methods, and up-casts). The obtained
result, OOHaskell, delivers an amount of polymorphism and type inference that
is unprecedented. Proper effort was also needed in order to deploy value recursion
for closing object generators. Achieving safety of this approach was a known challenge (Rémy, 1994). In order to fully appreciate the object system of OOHaskell,
we also review less sophisticated, less favourable encoding alternatives.
Not only OOHaskell provides the conventional OO idioms; we have also
language-engineered several features that are either bleeding-edge or unattainable
in mainstream OO languages: for example, first-class classes and class closures; statically type-checked collection classes with bounded polymorphism of implicit collection arguments; multiple inheritance with user-controlled sharing; safe co-variant
argument subtyping. It is remarkable that these and more familiar object-oriented
features are not introduced by fiat — we get them for free. For example, the type
of a collection with bounded polymorphism of elements is inferred automatically
by the compiler. Also, abstract classes are uninstantiatable not because we say so
but because the program will not typecheck otherwise. Co- and contra-variant subtyping rules and the safety conditions for the co-variant method argument types
are checked automatically without any programming on our part. These facts suggest that (OO)Haskell lends itself as prime environment for typed object-oriented
language design.
Haskell’s overlooked object system
— 1 February 2008 —
5
Road-map of this paper
• Sec. 2: We encode a tutorial OO example both in C++ and OOHaskell.
• Sec. 3: We review alternative object encodings in Haskell 98 and beyond.
• Sec. 4 and Sec. 5: We describe all OOHaskell idioms. The first part focuses
on idioms where subtyping and object types do not surface the OO program
code. The second part covers all technical details of subtyping including casts
and variance properties.
• Sec. 6: We discuss usability issues, related work and future work.
• Sec. 7: We conclude the paper.
The main sections, Sec. 4 and Sec. 5, are written in tutorial style, as to ease digestion of all techniques, as to encourage OO programming and OO language design
experiments. There is an extended source distribution available.2
2 The folklore ‘shapes’ example
One of the main goals of this paper is to be able to represent the conventional
OO code, in as straightforward way as possible. The implementation of our system
may be not for the feeble at heart — however, the user of the system must be
able to write conventional OO code without understanding the complexity of the
implementation. Throughout the paper, we illustrate OOHaskell with a series of
practical examples as they are commonly found in OO textbooks and programming
language tutorials. In this section, we begin with the so-called ‘shapes’ example.
We face a type for ‘shapes’ and two subtypes for ‘rectangles’ and ‘circles’; see
Fig. 1. Shapes maintain coordinates as state. Shapes can be moved around and
drawn. The exercise shall be to place objects of different kinds of shapes in a
collection and to iterate over them as to draw the shapes. It turns out that this
example is a crisp OO benchmark.3
2.1 C++ reference encoding
The type of shapes can be defined as a C++ class as follows:
class Shape {
public:
// Constructor method
Shape(int newx, int newy) {
x = newx;
y = newy;
}
2
3
The source code can be downloaded at http://www.cwi.nl/~ralf/OOHaskell/ , and it is subject
to a very liberal license (MIT/X11 style). As of writing, the actual code commits to a few specific
extensions of the GHC implementation of Haskell — for reasons of convenience. In principle,
Haskell 98 + multi-parameter classes with functional dependencies is sufficient.
The ‘shapes’ problem has been designed by Jim Weirich and deeply explored by him and
Chris Rathman. See the multi-lingual collection ‘OO Example Code’ by Jim Weirich at
http://onestepback.org/articles/poly/ ; see also an even heavier collection ‘OO Shape Examples’ by Chris Rathman at http://www.angelfire.com/tx4/cus/shapes/.
6
O. Kiselyov and R. Lämmel
Fig. 1. Shapes with state and a subtype-specific draw method
// Accessors
int getX() { return
int getY() { return
void setX(int newx)
void setY(int newy)
x; }
y; }
{ x = newx; }
{ y = newy; }
// Move shape position
void moveTo(int newx, int newy) {
x = newx;
y = newy;
}
// Move shape relatively
void rMoveTo(int deltax, int deltay) {
moveTo(getX() + deltax, getY() + deltay);
}
// An abstract draw method
virtual void draw() = 0;
// Private data
private:
int x;
int y;
}
The x, y coordinates are private, but they can be accessed through getters and setters. The methods for accessing and moving shapes are inherited by the subclasses
of Shape. The draw method is virtual and even abstract; hence concrete subclasses
must implement draw.
The subclass Rectangle is derived as follows:
Haskell’s overlooked object system
— 1 February 2008 —
7
class Rectangle: public Shape {
public:
// Constructor method
Rectangle(int newx, int newy, int newwidth, int newheight)
: Shape(newx, newy) {
width = newwidth;
height = newheight;
}
// Accessors
int getWidth() { return width; }
int getHeight() { return height; }
void setWidth(int newwidth)
{ width = newwidth; }
void setHeight(int newheight) { height = newheight; }
// Implementation of the abstract draw method
void draw() {
cout << "Drawing a Rectangle at:("
<< getX() << "," << getY()
<< "), width " << getWidth()
<< ", height " << getHeight() << endl;
}
// Additional private data
private:
int width;
int height;
};
For brevity, we elide the similar derivation of the subclass Circle:
class Circle : public Shape {
Circle(int newx, int newy, int newradius)
: Shape(newx, newy) { ... }
...
}
The following code block constructs different shape objects and invokes their
methods. More precisely, we place two shapes of different kinds in an array, scribble,
and then loop over it to draw and move the shape objects:
Shape *scribble[2];
scribble[0] = new Rectangle(10, 20, 5, 6);
scribble[1] = new Circle(15, 25, 8);
for (int i = 0; i < 2; i++) {
scribble[i]->draw();
scribble[i]->rMoveTo(100, 100);
scribble[i]->draw();
}
The loop over scribble exercises subtyping polymorphism: the actually executed
implementation of the draw method differs per element in the array. The program
run produces the following output — due to the logging-like implementations of
the draw method:
8
O. Kiselyov and R. Lämmel
Drawing
Drawing
Drawing
Drawing
a
a
a
a
Rectangle at:(10,20), width 5, height 6
Rectangle at:(110,120), width 5, height 6
Circle at:(15,25), radius 8
Circle at:(115,125), radius 8
2.2 OOHaskell encoding
We now show an OOHaskell encoding, which happens to pleasantly mimic the
C++ encoding, while any remaining deviations are appreciated. Most notably, we
are going to leverage type inference: we will not define any type. The code shall be
fully statically typed nevertheless.
Here is the OOHaskell rendering of the shape class:
-- Object generator for shapes
shape newx newy self
= do
-- Create references for private state
x <- newIORef newx
y <- newIORef newy
-- Return object as record of methods
returnIO $ getX
.=. readIORef x
.*. getY
.=. readIORef y
.*. setX
.=. writeIORef x
.*. setY
.=. writeIORef y
.*. moveTo
.=. (\newx newy -> do
(self # setX) newx
(self # setY) newy )
.*. rMoveTo .=. (\deltax deltay ->
do
x <- self # getX
y <- self # getY
(self # moveTo) (x + deltax) (y + deltay) )
.*. emptyRecord
Classes become functions that take constructor arguments plus a self reference
and that return a computation whose result is the new object — a record of methods
including getters and setters. We can invoke methods of the same object through
self; cf. the method invocation self # getX and others. (The infix operator #
denotes method invocation.) Our objects are mutable, implemented via IORef.
(STRef also suffices.) Since most OO systems in practical use have mutable state,
OOHaskell does not (yet) offer functional objects, which are known to be challenging on their own. We defer functional objects to future work.
We use the extensible records of the HList library (Kiselyov et al., 2004), hence:
•
•
•
•
emptyRecord denotes what the name promises,
(.*.) stands for (right-associative) record extension,
(.=.) is record-component construction: label .=. value,
Labels are defined according to a trivial scheme, to be explained later.
Haskell’s overlooked object system
— 1 February 2008 —
9
The abstract draw method is not mentioned in the OOHaskell code because it
is not used in any other method, neither did we dare declaring its type. As a side
effect, the object generator shape is instantiatable whereas the explicit declaration
of the abstract draw method made the C++ class Shape uninstantiatable. We will
later show how to add similar declarations in OOHaskell.
We continue with the OOHaskell code for the shapes example.
-- Object generator for rectangles
rectangle newx newy width height self
= do
-- Invoke object generator of superclass
super <- shape newx newy self
-- Create references for extended state
w <- newIORef width
h <- newIORef height
-- Return object as
returnIO $
getWidth .=.
.*. getHeight .=.
.*. setWidth .=.
.*. setHeight .=.
record of methods
readIORef
readIORef
(\neww ->
(\newh ->
w
h
writeIORef w neww)
writeIORef h newh)
.*. draw .=.
do -- Implementation of the abstract draw method
putStr "Drawing a Rectangle at:(" <<
self # getX << ls "," << self # getY <<
ls "), width " << self # getWidth <<
ls ", height " << self # getHeight << ls "\n"
-- Rectangle records start from shape records
.*. super
This snippet illustrates the essence of inheritance in OOHaskell. Object generation for the supertype is made part of the monadic sequence that defines object
generation for the subtype; self is passed from the subtype to the supertype.
Subtype records are derived from supertype records through record extension (or
potentially also through record updates when overrides are to be modelled).
As in the C++ case, we elide the derivation of the object generators for circles:
circle newx newy newradius self
= do
super <- shape newx newy self
...
returnIO ... .*. super
Ultimately, here is the OOHaskell rendering of the ‘scribble loop’:
-- Object construction and invocation as a monadic sequence
myOOP = do
-- Construct objects
s1 <- mfix (rectangle (10::Int) (20::Int) 5 6)
s2 <- mfix (circle (15::Int) 25 8)
10
O. Kiselyov and R. Lämmel
-- Create a homogeneous list of different shapes
let scribble = consLub s1 (consLub s2 nilLub)
-- Loop over list with normal monadic map
mapM_ (\shape -> do
shape # draw
(shape # rMoveTo) 100 100
shape # draw)
scribble
The use of mfix (an analogue of the new in C++) reflects that object generators take ‘self’ and construct (part of) it. Open recursion enables inheritance. The
let scribble . . . binding is noteworthy. We cannot directly place rectangles and
circles in a normal Haskell list — the following cannot possibly type check:
let scribble = [s1,s2] -- s1 and s2 are of different types!
We have to homogenise the types of s1 and s2 when forming a Haskell list. To this
end, we use special list constructors nilLub and consLub as opposed to the normal
list constructors [] and (:). These new constructors coerce the list elements to the
least-upper bound type of all the element types. Incidentally, if the ‘intersection’ of
the types of the objects s1 and s2 does not include the methods that are invoked
later (i.e., draw and rMoveTo), we get a static type error which literally says so. As
a result, the original for-loop can be carried out in the native Haskell way: a normal
(monadic) list map over a normal Haskell list of shapes. Hence, we have exercised
a faithful model of subtype polymorphism, which also allows for (almost) implicit
subtyping. OOHaskell provides several subtyping models, as we will study later.
2.3 Discussion of the example
2.3.1 Classes vs. interfaces
The C++ code should not be misunderstood to suggest that class inheritance is the
only OO design option for the shapes hierarchy. In a Java-like language, one may
want to model Shape as an interface, say, IShape, with Rectangle and Circle as
classes implementing this interface. This design would not allow us to reuse the implementations of the accessors and the move methods. So one may want to combine
interface polymorphism and class inheritance. That is, the classes Rectangle and
Circle will be rooted by an additional implementation class for shapes, say Shape,
which hosts implementations shared among different shape classes — incidentally
a part of the IShape interface. The remainder of the IShape interface, namely the
draw method in our example, would be implemented in Rectangle and Circle.
More generally, OO designs that employ interface polymorphism alone are rare,
so we need to provide encodings for both OO interface polymorphism and OO class
inheritance in OOHaskell. One may say that the former mechanism is essentially
covered by Haskell’s type classes (modulo the fact that we would still need an object encoding). The latter mechanism is specifically covered by original HList and
OOHaskell contributions: structural subtyping polymorphism for object types,
based on polymorphic extensible records and programmable subtyping constraints.
(Sec. 5.7 discusses nominal object types in OOHaskell)˙
Haskell’s overlooked object system
— 1 February 2008 —
11
2.3.2 Extensibility and encapsulation
Both the C++ encoding and the OOHaskell encoding of the shapes example are
faithful to the encapsulation premise as well as the extensibility premise of the OO
paradigm. An object encapsulates both data (‘state’) and methods (‘behaviour’).
One may add new kinds of shapes without rewriting (or, perhaps, even re-compiling)
existing code.
Both premises are the subject of an unsettled debate in the programming language community, especially with regards to functional programming. The basic
OO paradigm has been criticised (Zenger & Odersky, 2004) for its over-emphasis
of extensibility in the subtyping dimension and for its neglect of other dimensions
such as the addition of new functions into a pre-existing subtyping hierarchy. While
we agree with this overall criticism, we avoid the debate in this paper. We simply
want OOHaskell to provide an object encoding that is compatible with the established OO paradigm. (Incidentally, some of the non-encapsulation-based encodings
in Sec. 3 show that Haskell supports extensibility in both the data and the functionality dimension.)
2.3.3 Subtyping technicalities
The “scribble loop” is by no means a contrived scenario. It is a faithful instance
of the ubiquitous composite design pattern (Gamma et al., 1994). In terms of expressiveness and typing challenges, this sort of loop over an array of shapes of
different kinds forces us to explore the tension between implicit and explicit subtyping. As we will discuss, it is relatively straightforward to use type-class-bounded
polymorphism to represent subtype constraints. It is however less straightforward
to accumulate entities of different subtypes in the same collection. With explicit
subtyping (e.g., by wrapping in a properly constrained existential envelope) the
burden would be on the side of the programmer. A key challenge for OOHaskell
was to make subtyping (almost) implicit in all the cases, where a OO programmer would expect it. This is a particular area in which OOHaskell goes beyond OCaml (Leroy et al. , 2004)— the de-facto leading strongly typed functional
object-oriented language. OOHaskell provides a range of subtyping notions, including one that even allows for safe downcasts for object types. This is again
something that has not been achieved in OCaml to date.
3 Alternative Haskell encodings
OOHaskell goes particularly far in providing an object system, when compared
to conservative Haskell programming knowledge. To this end, we put type-classbased or type-level programming to work. In this section, we will review more
conservative object encodings with their characteristics and limitations. All of them
require boilerplate code from the programmer.
Some of the ‘conservative’ encodings to come are nevertheless involved and enlightening. In fact, the full spectrum of encodings has not been documented before — certainly not in a Haskell context. So we reckon that their detailed analysis
12
O. Kiselyov and R. Lämmel
makes a useful contribution. Furthermore, several of the discussed techniques are
actually used in OOHaskell, where some of them are simply generalised through
the advanced use of Haskell’s type classes. Hence, the present section is an incremental preparation for the main sections Sec. 4 and Sec. 5.
For most of this section, we limit ourselves to Haskell 98. (By contrast, OOHaskell
requires several common Haskell 98 extensions.) Towards the end of the section, we
will investigate the value of dismissing this restriction.
3.1 Map subtype hierarchy to an algebraic datatype
We begin with a trivial and concise encoding. Its distinguishing characteristic is extreme simplicity.4 It uses only basic Haskell 98 idioms. The encoding is also seriously
limited, lacking extensibility with regard to new forms of shapes (cf. Sec. 2.3.2).
We define an algebraic datatype for shapes, where each kind of shape amounts to
a constructor declaration. For readability, we use labelled fields instead of unlabelled
constructor components.
data Shape =
Rectangle {
,
,
,
getX
getY
getWidth
getHeight
::
::
::
::
Int
Int
Int
Int }
|
Circle { getX
:: Int
, getY
:: Int
, getRadius :: Int }
Both constructor declarations involve labelled fields for the (x, y) position of a
shape. While this reusability dimension is not emphasised at the datatype level, we
can easily define reusable setters for the position. (There are some issues regarding
type safety, which we will address later.) For instance:
setX :: Int -> Shape -> Shape
setX i s = s { getX = i }
We can also define setters for Rectangle- and Circle-specific fields. For instance:
setWidth :: Int -> Shape -> Shape
setWidth i s = s { getWidth = i }
It is also straightforward to define functions for moving around shapes:
moveTo :: Int -> Int -> Shape -> Shape
moveTo x y = setY y . setX x
rMoveTo :: Int
rMoveTo deltax
where
x = getX s +
y = getY s +
4
-> Int -> Shape -> Shape
deltay s = moveTo x y s
deltax
deltay
Thanks to Lennart Augustsson for pointing out this line of encoding.
Cf. http://www.haskell.org/pipermail/haskell/2005-June/016061.html
Haskell’s overlooked object system
— 1 February 2008 —
13
The function for drawing shapes properly discriminates on the kind of shapes.
That is, there is one equation per kind of shape. Subtype polymorphism reduces to
pattern matching, so to say:
draw :: Shape -> IO ()
draw s@(Rectangle _ _ _ _)
= putStrLn ("Drawing a Rectangle at:("
++ (show (getX s))
++ ","
++ (show (getY s))
++ "), width " ++ (show (getWidth s))
++ ", height " ++ (show (getHeight s)))
draw s@(Circle _ _ _)
= putStrLn ("Drawing a Circle at:("
++ (show (getX s))
++ ","
++ (show (getY s))
++ "), radius "
++ (show (getRadius s)))
With this encoding, it is trivial to build a collection of shapes of different kinds and
to iterate over it such that each shape is drawn and moved (and drawn again):
main =
do
let scribble = [ Rectangle 10 20 5 6
, Circle 15 25 8
]
mapM_ ( \x ->
do
draw x
draw (rMoveTo 100 100 x))
scribble
Assessment of the encoding
• The encoding ignores the encapsulation premise of the OO paradigm.
• The foremost weakness of the encoding is the lack of extensibility. The addition of a new kind of shape would require re-compilation of all code; it would
also require amendments of existing definitions or declarations: the datatype
declaration Shape and the function definition draw.
• A related weakness is that the overall scheme does not suggest a way of
dealing with virtual methods: introduce the type of a method for a base
type potentially with an implementation; define or override the method for
a subtype. We would need a scheme that offers (explicit and implicit) open
recursion for datatypes and functions defined on them.
• The setters setX and setY happen to be total because all constructors end
up defining labelled fields getX and getY. The type system does not prevent
us from forgetting those labels for some constructor. It is relatively easy to
14
O. Kiselyov and R. Lämmel
resolve this issue to the slight disadvantage of conciseness. (For instance, we
may avoid labelling entirely, and use pattern matching instead. We may also
compose together rectangles and circles from common shape data and deltas.)
• The use of a single algebraic datatype Shape implies that Rectangle- and
Circle-specific functions cannot be defined as total functions. Such biased
functions, e.g., setWidth, are only defined for certain constructors. Once we go
beyond the simple-minded encoding model of this section, it will be possible to
increase type safety by making type distinctions for different kinds of shapes,
but then we will also encounter the challenge of subtype polymorphism.
3.2 Map object data to tail-polymorphic record types
There is a folklore technique for encoding extensible records (Burton, 1990) that
we can use to model the shapes hierarchy in Haskell 98. Simple type classes let us
implement virtual methods. We meet the remaining challenge of placing different
shapes into one list by making different subtypes homogeneous through embedding
shape subtypes into a union type (Haskell’s Either).
We begin with a datatype for extensible shapes; cf. shapeTail:
data Shape w =
Shape { getX :: Int
, getY :: Int
, shapeTail :: w }
For convenience, we also provide a constructor for shapes:
shape x y w = Shape { getX = x
, getY = y
, shapeTail = w }
We can define setters and movers once and for all for all possible extensions
of Shape by simply leaving the extension type parametric. The actual equations
are literally the same as in the previous section; so we only show the (different)
parametrically polymorphic types:
setX :: Int -> Shape w -> Shape w
setY :: Int -> Shape w -> Shape w
moveTo :: Int -> Int -> Shape w -> Shape w
rMoveTo :: Int -> Int -> Shape w -> Shape w
The presence of the type variable w expresses that the earlier definitions on Shape . . .
can clearly be instantiated to all subtypes of Shape. The draw function must be
placed in a dedicated type class, Draw, because we anticipate the need to provide
type-specific implementations of draw. (One may compare this style with C++
where one explicitly declares a method to be (pure) virtual.)
class Draw w
where
draw :: Shape w -> IO ()
Haskell’s overlooked object system
— 1 February 2008 —
15
Shape extensions for rectangles and circles are built according to a common
scheme. We only show the details for rectangles. We begin with the definition of
the “data delta” contributed by rectangles; each such delta is again polymorphic in
its tail.
data RectangleDelta w =
RectangleDelta { getWidth
:: Int
, getHeight
:: Int
, rectangleTail :: w }
We define the type of rectangles as an instance of Shape:
type Rectangle w = Shape (RectangleDelta w)
For convenience, we provide a constructor for rectangles. Here we fix the tail of
the rectangle delta to (). (We could still further instantiate Rectangle and define
new constructors later, if necessary.)
rectangle x y w h
= shape x y $ RectangleDelta {
getWidth
= w
, getHeight
= h
, rectangleTail = () }
The definition of rectangle-specific setters involves nested record manipulation:
setHeight :: Int -> Rectangle w -> Rectangle w
setHeight i s = s { shapeTail = (shapeTail s) { getHeight = i } }
setWidth :: Int -> Rectangle w -> Rectangle w
setWidth i s = s { shapeTail = (shapeTail s) { getWidth = i } }
The rectangle-specific draw function is defined through a Draw instance:
instance Draw (RectangleDelta w)
where
draw s
=
putStrLn ("Drawing a Rectangle at:("
++ (show (getX s))
++ ","
++ (show (getY s))
++ "), width "
++ (show (getWidth (shapeTail s)))
++ ", height "
++ (show (getHeight (shapeTail s))))
The difficult part is the ‘scribble loop’. We cannot easily form a collection of
shapes of different kinds. For instance, the following attempt will not type-check:
-- Wrong! There is no homogeneous element type.
let scribble = [ rectangle 10 20 5 6
, circle 15 25 8
]
16
O. Kiselyov and R. Lämmel
There is a relatively simple technique to make rectangles and circles homogeneous
within the scope of the scribble list and its clients. We have to establish a union
type for the different kinds of shapes.5 Using an appropriate helper, tagShape,
for embedding shapes into a union type (Haskell’s Either), we may construct a
homogeneous collection as follows:
let scribble = [ tagShape Left (rectangle 10 20 5 6)
, tagShape Right (circle 15 25 8)
]
The boilerplate operation for embedding is trivially defined as follows.
tagShape :: (w -> w’) -> Shape w -> Shape w’
tagShape f s = s { shapeTail = f (shapeTail s) }
Embedding (or tagging) clearly does not disturb the reusable definitions of functions
on Shape w. However, the loop over scribble refers to the draw operation, which
is defined for RectangleDelta and CircleDelta, but not for the union over these
two types. We have to provide a trivial boilerplate for generalising draw:
instance (Draw a, Draw b) => Draw (Either a b)
where
draw = eitherShape draw draw
(This instance actually suffices for arbitrarily nested unions of Shape subtypes.)
Here, eitherShape is variation on the normal fold operation for unions, i.e., either.
We discriminate on the Left vs. Right cases for the tail of a shape datum. This
boilerplate operation is independent of draw, but specific to Shape.
eitherShape :: (Shape w -> t) -> (Shape w’ -> t) -> Shape (Either w w’) -> t
eitherShape f g s
= case shapeTail s of
(Left s’) -> f (s { shapeTail = s’ })
(Right s’) -> g (s { shapeTail = s’ })
The Draw instance for Either makes it clear that we use the union type as an
intersection type. We may only invoke a method on the union only if we may
invoke the method on either branch of the union. The instance constraints make
that fact obvious.
Assessment of the encoding
• Again, the encoding ignores the encapsulation premise of the OO paradigm:
methods are not encapsulated along with the data.
• The encoding does not have the basic extensibility problem of the previous
section. We can introduce new kinds of shapes without rewriting and recompiling type-specific code.
5
Haskell 98 supports unions in the prelude: with the type name Either, and the two constructors
Left and Right for the branches of the union.
Haskell’s overlooked object system
— 1 February 2008 —
17
• Some patterns of subtype-polymorphic code may require revision, though. For
instance all program points that insert into a subtype-polymorphic collection
or that downcast must agree on the formation of the union type over specific
subtypes. If a new subtype must be covered, then the scattered applications
of embedding operations must be revised.
• We fail to put Haskell’s type inference to work as far as object types are
concerned. We end up defining explicit datatypes for all encoded classes. This
is acceptable from a mainstream OO point of view since nominal types (i.e.,
explicit types) dominate the OO paradigm. However, in Haskell, we would
like to do better by allowing for inference of structural class and interface
types. All subsequent encodings of this section will share this problem. (By
contrast, OOHaskell provides full structural type inference.)
• It is annoying enough that the formation of a subtype-polymorphic collection
requires explicit tagging of all elements; cf. Left and Right. What is worse,
the tagging is done on the delta position of Shape. This makes the scheme noncompositional: Each new base class requires its own functions like tagShape
and eitherShape.
• The encoding of final and virtual methods differs essentially. The former are
encoded as parametric polymorphic functions parameterised in the extension
type. Virtual methods are encoded as type-class-bounded polymorphic functions overloaded in the extension type. Changing a final method into virtual
or vice versa triggers code rewriting. This may be overcome by making all
methods virtual (and using default type class methods to reuse implementations). However, this bias will increase the amount of boilerplate code such
as the instances for Either.
• The subtyping hierarchy leaks into the encoding of subtype-specific accessors;
cf. setWidth. The derivation chain from a base type shows up as nesting
depth in the record access pattern. One may factor out these code patterns
into access helpers and overload them so that all accessors can be coded in a
uniform way. This will complicate the encoding, though.
• The approach is restricted to single inheritance.
3.3 Functional objects, again with tail polymorphism
So far we have defined all methods as separate functions that process “data records”.
Hence, we ignored the OO encapsulation premise: our data and methods were
divorced from each other. Thereby, we were able to circumvent problems of self
references that tend to occur in object encodings. Also, we avoided the classic
dichotomy ‘mutable vs. functional objects’. We will complement the picture by exploring a functional object encoding (this section) and a mutable object encoding
(next section). We continue to use tail-polymorphic records.
In a functional object encoding, object types are necessarily recursive because all
mutating methods are modelled as record components that return “self”. In fact,
18
O. Kiselyov and R. Lämmel
the type-theoretic technique is to use equi-recursive types (Pierce & Turner, 1994).
We must use iso-recursive types instead since Haskell lacks equi-recursive types.
Extensible shapes are modelled through the following recursive datatype:
data Shape w =
Shape { getX
, getY
, setX
, setY
, moveTo
, rMoveTo
, draw
, shapeTail
}
::
::
::
::
::
::
::
::
Int
Int
Int ->
Int ->
Int ->
Int ->
IO ()
w
Shape w
Shape w
Int -> Shape w
Int -> Shape w
This type reflects the complete interface of shapes, including getters, setters, and
more complex methods. The object constructor is likewise recursive. Recall that
recursion models functional mutation, i.e., the construction of a changed object:
shape x y d t
= Shape { getX
, getY
, setX
, setY
, moveTo
, rMoveTo
, draw
, shapeTail
}
=
=
=
=
=
=
=
=
x
y
\x’ -> shape x’ y d t
\y’ -> shape x y’ d t
\x’ y’ -> shape x’ y’ d t
\deltax deltay -> shape (x+deltax) (y+deltay) d t
d x y
t
As before, subtypes are modelled as instantiations of the base-type record. That
is, the Rectangle record type is an instance of the Shape record type, where instantiation fixes the type shapeTail somewhat:
type Rectangle w = Shape (RectangleDelta w)
data RectangleDelta w =
RectangleDelta { getWidth’
, getHeight’
, setWidth’
, setHeight’
, rectangleTail
}
::
::
::
::
::
Int
Int
Int -> Rectangle w
Int -> Rectangle w
w
We used primed labels because we wanted to save the unprimed names for the
actual programmer API. The following implementations of the unprimed functions
hide the fact that rectangle records are nested.
getWidth
getHeight
setWidth
setHeight
=
=
=
=
getWidth’
getHeight’
setWidth’
setHeight’
.
.
.
.
shapeTail
shapeTail
shapeTail
shapeTail
The constructor for rectangles elaborates the constructor for shapes as follows:
Haskell’s overlooked object system
— 1 February 2008 —
19
rectangle x y w h
= shape x y drawRectangle shapeTail
where
drawRectangle x y
= putStrLn ("Drawing a Rectangle at:("
++ (show x) ++ ","
++ (show y) ++ "), width "
++ (show w) ++ ", height "
++ (show h) )
shapeTail
= RectangleDelta { getWidth’
= w
, getHeight’
= h
, setWidth’
= \w’ -> rectangle x y w’ h
, setHeight’
= \h’ -> rectangle x y w h’
, rectangleTail = ()
}
The encoding of the subclass Circle can be derived likewise. (Omitted.)
This time, the scribble loop is set up as follows:
main =
do
let scribble = [ narrowToShape (rectangle 10 20 5 6)
, narrowToShape (circle 15 25 8)
]
mapM_ ( \x ->
do
draw x
draw (rMoveTo x 100 100) )
scribble
The interesting aspect of this encoding concerns the construction of the scribble
list. We cast or narrow the shapes of different kinds to a common type. This is a
general option, which we could have explored in the previous section (where we used
embedding into a union type instead). Narrowing takes a shape with an arbitrary
tail and returns a shape with tail ():
narrowToShape :: Shape w -> Shape
narrowToShape s = s { setX
=
, setY
=
, moveTo
=
, rMoveTo
=
, shapeTail =
}
()
narrowToShape . setX s
narrowToShape . setY s
\z -> narrowToShape . moveTo s z
\z -> narrowToShape . rMoveTo s z
()
Assessment of the encoding
• The encoding is faithful to the encapsulation premise of the OO paradigm.
• The specific extensibility problem of the ‘union type’ approach is resolved (cf.
assessment Sec. 3.2). Code that accesses a subtype-polymorphic collection
does not need to be revised when new subtypes are added elsewhere in the
program. The ‘narrowing’ approach frees the programmer from commitment
to a specific union type.
20
O. Kiselyov and R. Lämmel
• The narrowing approach (unlike the union-type one) does not permit downcasting.
• The implementation of the narrowing operation is base-type-specific just as
the earlier embedding helpers for union types. Boilerplate code of that kind
is, of course, not required from programmers in mainstream OO languages.
3.4 Mutable objects, again with tail polymorphism
We also review an object encoding for mutable objects, where we employ IORefs
of the IO monad to enable object state — as is the case for OOHaskell. The
functions (“methods”) in a record manipulate the state through IORef operations.
We continue to use tail-polymorphic records.
Extensible shapes are modelled through the following type:
data Shape w =
Shape { getX
, getY
, setX
, setY
, moveTo
, rMoveTo
, draw
, shapeTail
}
::
::
::
::
::
::
::
::
IO Int
IO Int
Int ->
Int ->
Int ->
Int ->
IO ()
w
IO ()
IO ()
Int -> IO ()
Int -> IO ()
The result type of all methods is wrapped in the IO monad so that all methods
may have side effects, if necessary. One may wonder whether this is really necessary
for getters. Even for a getter, we may want to add memoisation or logging, when we
override the method in a subclass, in which case a non-monadic result type would
be too restrictive.
The object generator (or constructor) for shapes is parameterised in the initial
shape position x and y, in a concrete implementation of the abstract method draw,
in the tail of the record to be contributed by the subtype, and in self so to enable
open recursion. The latter lets subtypes override method defined in shape. (We will
illustrate overriding shortly.)
shape x y concreteDraw tail self
= do
xRef <- newIORef x
yRef <- newIORef y
tail’ <- tail
returnIO Shape
{ getX
= readIORef xRef
, getY
= readIORef yRef
, setX
= \x’ -> writeIORef xRef x’
, setY
= \y’ -> writeIORef yRef y’
, moveTo
= \x’ y’ -> do { setX self x’; setY self y’ }
, rMoveTo
= \deltax deltay ->
do x <- getX self
y <- getY self
Haskell’s overlooked object system
— 1 February 2008 —
21
moveTo self (x+deltax) (y+deltay)
, draw
= concreteDraw self
, shapeTail = tail’ self
}
The type declarations for rectangles are the following:
type Rectangle w = Shape (RectangleDelta w)
data RectangleDelta w =
RectangleDelta { getWidth’
, getHeight’
, setWidth’
, setHeight’
, rectangleTail
}
::
::
::
::
::
IO Int
IO Int
Int -> IO ()
Int -> IO ()
w
Again, we define unprimed names to hide the nested status of the rectangle API:
getWidth
getHeight
setWidth
setHeight
=
=
=
=
getWidth’
getHeight’
setWidth’
setHeight’
.
.
.
.
shapeTail
shapeTail
shapeTail
shapeTail
We reveal the object generator for rectangles step by step.
rectangle x y w h
= shape x y drawRectangle shapeTail
where
-- to be cont’d
We invoke the generator shape, passing on the normal constructor arguments x
and y, a rectangle-specific draw method, and the tail for the rectangle API. We do
not yet fix the self reference, thereby allowing for further subtyping of rectangle.
We define the draw method as follows, resorting to C++-like syntax, <<, for daisy
chaining output:
drawRectangle self =
putStr "Drawing a Rectangle at:(" <<
getX self << ls "," << getY self <<
ls "), width " << getWidth self <<
ls ", height " << getHeight self <<
ls "\n"
Finally, the following is the rectangle part of the shape object:
shapeTail
= do
wRef <- newIORef w
hRef <- newIORef h
returnIO ( \self ->
RectangleDelta
{ getWidth’
, getHeight’
, setWidth’
, setHeight’
, rectangleTail
} )
=
=
=
=
=
readIORef wRef
readIORef hRef
\w’ -> writeIORef wRef w’
\h’ -> writeIORef hRef h’
()
22
O. Kiselyov and R. Lämmel
The overall subtype derivation scheme is at ease with overriding methods in subtypes. We illustrate this capability by temporarily assuming that the draw method
is not abstract. So we may revise the constructor for shapes as follows:
shape x y tail self
= do
xRef <- newIORef x
yRef <- newIORef y
tail’ <- tail
returnIO Shape
{ -- ... as before but we deviate for draw ...
, draw = putStrLn "Nothing to draw"
}
We override draw when constructing rectangles:
rectangle x y w h self
= do
super <- shape x y shapeTail self
returnIO super { draw = drawRectangle self }
As in the previous section, we use narrowToShape when building a list of different
shapes. Actual object construction ties the recursive knot for the self references with
mfix. Hence, mfix is our operator “new”.
main =
do
s1 <- mfix $ rectangle 10 20 5 6
s2 <- mfix $ circle 15 25 8
let scribble = [ narrowToShape s1
, narrowToShape s2
]
mapM_ ( \x ->
do
draw x
rMoveTo x 100 100
draw x )
scribble
The narrow operation is trivial this time:
narrowToShape :: Shape w -> Shape ()
narrowToShape s = s { shapeTail = () }
We just “chop off” the tail of shape objects. We may no longer use any rectangleor circle-specific methods. One may say that chopping off the tail makes the fields
in the tail and the corresponding methods private. The openly recursive methods,
in particular draw, had access to self that characterised the whole object, before
the chop off. The narrow operation becomes (potentially much) more involved or
infeasible once we consider self-returning methods, binary methods, co- and contravariance, and other advanced OO idioms.
Haskell’s overlooked object system
— 1 February 2008 —
23
Assessment of the encoding This encoding is actually very close to OOHaskell
except that the former uses explicitly declared, non-extensible record types. As
a result, the encoding requires substantial boilerplate code (to account for type
extension) and subtyping is explicit. Furthermore, OOHaskell leverages typelevel programming to lift restrictions like the limited narrowing capabilities.
3.5 Subtypes as composed record types with overloading
Many problems of tail-polymorphic record types prompt us to consider an alternative. We now compose record types for subtypes and use type classes to represent
the actual subtype relationships. Such use of type classes has first been presented
in (Shields & Peyton Jones, 2001) for encoding of OO interface polymorphism in
Haskell. We generalise this technique for class inheritance.
The compositional approach can be described as follows:
•
•
•
•
•
•
The data part of an OO class amounts to a record type.
Each such record type includes components for superclass data
The interface for each OO class amounts to a Haskell type class.
OO superclasses are mapped to Haskell superclass constraints.
Reusable OO method implementations are mapped to default methods.
A subtype is implemented as a type-class instance.
We begin with the record type for the data part of the Shape class:
data ShapeData =
ShapeData { valX :: Int
, valY :: Int }
For convenience, we also provide a constructor:
shape x y = ShapeData { valX = x
, valY = y }
We define a type class Shape that models the OO interface for shapes:
class Shape s
where
getX
:: s -> Int
setX
:: Int -> s -> s
getY
:: s -> Int
setY
:: Int -> s -> s
moveTo
:: Int -> Int -> s -> s
rMoveTo
:: Int -> Int -> s -> s
draw
:: s -> IO ()
-- to be cont’d
We would like to provide reusable definitions for most of these methods (except
for draw of course). In fact, we would like to define the accessors to shape data
once and for all. To this end, we need additional helper methods. While it is clear
how to define accessors on ShapeData, we must provide generic definitions that
are able to handle records that include ShapeData as one of their (immediate or
non-immediate) components. This leads to the following two helpers:
24
O. Kiselyov and R. Lämmel
class Shape s
where
-- cont’d from earlier
readShape :: (ShapeData -> t)
-> s -> t
writeShape :: (ShapeData -> ShapeData) -> s -> s
which let us define generic shape accessors:
class Shape s
where
-- cont’d from earlier
getX
= readShape valX
setX i
= writeShape (\s -> s { valX = i })
getY
= readShape valY
setY i
= writeShape (\s -> s { valY = i })
moveTo x y = setY y . setX x
rMoveTo deltax deltay s = moveTo x y s
where
x = getX s + deltax
y = getY s + deltay
We do not define an instance of the Shape class for ShapeData because the
original shape class was abstract due to the purely virtual draw method. As we
move to rectangles, we define their data part as follows:
data RectangleData =
RectangleData { valShape :: ShapeData
, valWidth :: Int
, valHeight :: Int
}
The rectangle constructor also invokes the shape constructor:
rectangle x y w h
= RectangleData { valShape = shape x y
, valWidth = w
, valHeight = h
}
“A rectangle is a shape.” We provide access to the shape part as follows:
instance Shape RectangleData
where
readShape f
= f . valShape
writeShape f s = s { valShape = readShape f s }
-- to be cont’d
We also implement the draw method.
-- instance Shape RectangleData cont’d
draw s
=
putStrLn ("Drawing a Rectangle at:("
++ (show (getX s)) ++ ","
++ (show (getY s)) ++ "), width "
++ (show (getWidth s)) ++ ", height "
++ (show (getHeight s)))
Haskell’s overlooked object system
— 1 February 2008 —
25
We also need to define a Haskell type class for the OO class of rectangles. OO
subclassing coincides in Haskell type-class subclassing.
class Shape s => Rectangle s
where
-- to be cont’d
The type class is derived from the corresponding OO class just as we explained for
the base class of shapes. The class defines the ‘normal’ interface of rectangles and
access helpers.
-- class Rectangle cont’d
getWidth
:: s -> Int
getWidth
= readRectangle valWidth
setWidth
:: Int -> s -> s
setWidth i
= writeRectangle (\s -> s
getHeight
:: s -> Int
getHeight
= readRectangle valHeight
setHeight
:: Int -> s -> s
setHeight i
= writeRectangle (\s -> s
{ valWidth = i })
{ valHeight = i })
readRectangle :: (RectangleData -> t)
-> s -> t
writeRectangle :: (RectangleData -> RectangleData) -> s -> s
“A rectangle is (nothing but) a rectangle.”
instance Rectangle RectangleData
where
readRectangle = id
writeRectangle = id
The subclass for circles can be encoded in the same way.
The scribble loop can be performed on tagged rectangles and circles:
main =
do
let scribble = [ Left (rectangle 10 20 5 6)
, Right (circle 15 25 8)
]
mapM_ ( \x ->
do
draw x
draw (rMoveTo 100 100 x)
)
scribble
We attach Left and Right tags at the top-level this time. Such simple tagging
was not possible with the tail-polymorphic encodings. We still need an instance for
Shape that covers tagged shapes:
instance (Shape a, Shape b) => Shape (Either a b)
where
readShape f = either (readShape f) (readShape f)
writeShape f = bimap (writeShape f) (writeShape f)
draw
= either draw draw
26
O. Kiselyov and R. Lämmel
The bi-functorial map, bimap, pushes writeShape into the tagged values. The
Either-specific fold operation, either, pushes readShape and draw into the tagged
values. For completeness, we recall the relevant facts about bi-functors and folds
on Either:
class BiFunctor f where
bimap :: (a -> b) -> (c -> d) -> f a c -> f b d
instance BiFunctor Either where
bimap f g (Left x) = Left (f x)
bimap f g (Right x’) = Right (g x’)
either :: (a -> c) -> (b -> c) -> Either a b -> c
either f g (Left x) = f x
either f g (Right y) = g y
We should mention a minor but useful variation, which avoids the explicit attachment of tags when inserting into a subtype-polymorphic collection. We use a
special cons operation, consEither, which replaces the normal list constructor (:):
-- ... so far ...
let scribble = [ Left (rectangle 10 20 5 6)
, Right (circle 15 25 8)
]
-- ... liberalised notation ...
let scribble = consEither
(rectangle 10 20 5 6)
[circle 15 25 8]
-- A union-constructing cons operation
consEither :: h -> [t] -> [Either h t]
consEither h t@(_:_) = Left h : map Right t
consEither _ _ = error "Cannot cons with empty tail!"
Assessment of the encoding
• This approach is highly systematic and general. For instance, multiple inheritance is immediately possible. One may argue that this approach does
not directly encode OO class inheritance. Rather, it mimics object composition. One might indeed convert native OO programs, prior to encoding, so
that they do not use class inheritance, but they use interface polymorphism
combined with (manually coded) object composition instead.
• A fair amount of boilerplate code is required (cf. readShape and writeShape).
Also, each transitive subtype relationship requires surprising boilerplate. For
example, let us assume an OO class FooBar that is a subclass of Rectangle.
The transcription to Haskell would involve three instances: one for the type
class that is dedicated to FooBar (“Ok”), one for Rectangle (still “Ok” except
the scattering of implementation), and one for Shape (“annoying”).
Haskell’s overlooked object system
— 1 February 2008 —
27
• The union-type technique improved compared to Sec. 3.2. The top-level tagging scheme eliminates the need for tagging helpers that are specific to the
object types. Also, the consEither operation relieves us from the chore of
explicitly writing sequences of tags. However, we must assume that we insert
into a non-empty list, and we also must accept that the union type increases
for each new element in the list — no matter how many different element
types are encountered. Also, if we want to downcast from the union type, we
still need to know its exact layout. To lift these restrictions, we have to engage
into proper type-class-based programming.
3.6 Variation — existential quantification
So far we have restricted ourselves to Haskell 98. We now turn to common extensions
of Haskell 98, in an attempt to improve on the problems that we have encountered.
In upshot, we cannot spot obvious ways for improvement.
Our first attempt is to leverage existential quantification for the implementation of subtype-polymorphic collections. Compared to the earlier Either-based approach, we homogenise shapes by making them opaque (Cardelli & Wegner, 1985)
as opposed to embedding them into the union type. This use of existentials could
be combined with various object encodings; we illustrate it here for the specific
encoding from the previous section.
We define an existential envelope for shape data.
data OpaqueShape = forall x. Shape x => HideShape x
“Opaque shapes are (still) shapes.” Hence, a Shape instance:
instance Shape
where
readShape f
writeShape f
draw
OpaqueShape
(HideShape x) = readShape f x
(HideShape x) = HideShape $ writeShape f x
(HideShape x) = draw x
When building the scribble list, we place shapes in the envelope.
let scribble = [ HideShape (rectangle 10 20 5 6)
, HideShape (circle 15 25 8)
]
Assessment of the encoding
• Compared to the ‘union type’ approach, programmers do not have to invent
union types each time they need to homogenise different subtypes. Instead, all
shapes are tagged by HideShape. The ‘narrowing’ approach was quite similar,
but it required boilerplate.
• We face a new problem. Existential quantification limits type inference.
We see that in the definition of OpaqueShape; viz. the explicit constraint Shape. It
is mandatory to constraint the quantifier by all subtypes whose methods may be
invoked. A reader may notice the similar problem for the ‘union type’ approach,
which required Shape constraints in the instance
28
O. Kiselyov and R. Lämmel
instance (Shape a, Shape b) => Shape (Either a b) where ...
That instance, however, was merely a convenience. We could have disposed of it
and used the fold operation either explicitly in the scribble loop:
main =
do
let scribble = [ Left (rectangle 10 20 5 6)
, Right (circle 15 25 8)
]
mapM_ (either scribbleBody scribbleBody) scribble
where
scribbleBody x = do
draw x
draw (rMoveTo 100 100 x)
By contrast, the explicit constraint for the existential envelope cannot be eliminated. Admittedly, the loss of type inference is a nuance in this specific example. In
general, however, this weakness of existentials is quite annoying. It is intellectually
dissatisfying since type inference is one of the added values of an (extended) Hindley/Milner type system, when compared to mainstream OO languages. Worse than
that, the kind of constraints in the example are not necessary in mainstream OO
languages (without type inference), because these constraints deal with subtyping,
which is normally implicit.
We do not use existentials in OOHaskell.
3.7 Variation — heterogeneous collections
We continue with our exploration of common extensions of Haskell 98. In fact,
we will offer another option for the difficult problem of subtype-polymorphic collections. We recall that all previously discussed techniques aimed at making it
possible to construct a normal homogeneous Haskell list in the end. This time,
we will engage into the construction of a heterogeneous collection in the first
place. To this end, we leverage techniques as described by us in the HList
paper (Kiselyov et al., 2004). Heterogeneous collections rely on multi-parameter
classes (Chen et al., 1992; Jones, 1992; Jones, 1995; Peyton Jones et al., 1997) with
functional dependencies (Jones, 2000; Duck et al., 2004).
Heterogeneous lists are constructed with dedicated constructors HCons and HNil —
analogues of (:) and []. One may think of a heterogeneous list type as a nested
binary product, where HCons corresponds to (,) and HNil to (). We use special
HList functions to process the heterogeneous lists; the example requires a map
operation. The scribble loop is now encoded as follows:
main =
do
let scribble =
HCons (rectangle 10 20 5 6)
(HCons (circle 15 25 8)
HNil)
hMapM_ (undefined::ScribbleBody) scribble
Haskell’s overlooked object system
— 1 February 2008 —
29
The operation hMapM_ is the heterogeneous variation on the normal monadic map
mapM_. The function argument for the map cannot be given inline; instead we pass a
proxy undefined::ScribbleBody. This detour is necessary due to technical reasons
that are related to the combination of rank-2 polymorphism and type-class-bounded
polymorphism.6
The type code for the body of the scribble loop is defined by a trivial datatype:
data ScribbleBody -- No constructors needed; non-Haskell 98
The heterogeneous map function is constrained by the Apply class, which models
interpretation of function codes like ScribbleBody. Here is the Apply class and the
instance dedicated to ScribbleBody:
class Apply f a r | f a -> r
where apply :: f -> a -> r
instance Shape s => Apply ScribbleBody s (IO ())
where
apply _ x =
do
draw x
draw (rMoveTo 100 100 x)
Assessment of the encoding
• This approach eliminates all effort for inserting elements into a collection.
• The approach comes with heavy surface encoding; cf. type code ScribbleBody.
• This encoding is at odds with type inference — just as in the case of existentials. That is, the Apply instance must be explicitly constrained by the
interfaces that are going to be relied upon in the body of the scribble loop.
Again, the amount of explicit typing is not yet disturbing in the example at
hand, but it is an intrinsic weakness of the encoding. The sort of required
explicit typing goes beyond standard OO programming practise.
4 Type-agnostic OOHaskell idioms
We will now systematically develop all important OOHaskell programming idioms. In this section, we will restrict ourselves to ‘type-agnostic’ idioms, as to clearly
substantiate that most OOHaskell programming does not require type declarations, type annotations, explicit casts for object types — thanks to Haskell’s type
inference and its strong support for polymorphism. The remaining, ‘type-perceptive’
6
A heterogeneous map function can encounter entities of different types. Hence, its argument function must be polymorphic on its own (which is different from the normal
map function for lists). The argument function typically uses type-class-bounded polymorphic functions to process the entities of different types. The trouble is that the map
function cannot possibly anticipate all the constraints required by the different uses of
the map function. The type-code technique moves the constraints from the type of the
heterogeneous map function to the interpretation site of the type codes.
30
O. Kiselyov and R. Lämmel
OOHaskell idioms (including a few advanced topics related to subtyping) are described in the subsequent section.
In both sections, we adopt the following style. We illustrate the OO idioms and
describe the technicalities of encoding. We highlight strengths of OOHaskell:
support for the traditional OO idioms as well as extra features due to the underlying
record calculus, and first-class status of labels, methods and classes. Finally, we
illustrate the overall programmability of a typed OO language design in Haskell.
As a matter of style, we somewhat align the presentation of OOHaskell with the
OCaml object tutorial. Among the many OO systems that are based on open records
(Perl, Python, Javascript, Lua, etc.), OCaml stands out because it is statically
typed (just as OOHaskell). Also, OCaml (to be precise, its predecessor ML-ART)
is close to OOHaskell in terms of motivation: both aim at the introduction of
objects as a library in a strongly-typed functional language with type inference. The
implementation of the libraries and the sets of features used or required are quite
different (cf. Sec. 6.2.1 for a related work discussion), which makes a comparison
even more interesting. Hence, we draw examples from the OCaml object tutorial,
to specifically contrast OCaml and OOHaskell code and to demonstrate the fact
that OCaml examples are expressible in OOHaskell, roughly in the same syntax,
based on direct, local translation. We also use the OCaml object tutorial because
it is clear, comprehensive and concise.
4.1 Objects as records
Quoting from (Leroy et al. , 2004)[§ 3.2]:7
“The class point below defines one instance variable varX and two methods getX and
moveX. The initial value of the instance variable is 0. The variable varX is declared mutable.
Hence, the method moveX can change its value.”
class point =
object
val mutable varX = 0
method getX
= varX
method moveX d
= varX <- varX + d
end;;
4.1.1 First-class labels
The transcription to OOHaskell starts with the declaration of all the labels that
occur in the OCaml code. The HList library readily offers 4 different models of
labels. In all cases, labels are Haskell values that are distinguished by their Haskell
type. We choose the following model:
• The value of a label is “⊥”.
7
While quoting portions of the OCaml tutorial, we take the liberty to rename some identifiers
and to massage some subminor details.
Haskell’s overlooked object system
— 1 February 2008 —
31
• The type of a label is a proxy for an empty type (empty except for “⊥”).8
data VarX; varX = proxy :: Proxy VarX
data GetX; getX = proxy :: Proxy GetX
data MoveX; moveX = proxy :: Proxy MoveX
where proxies are defined as
data Proxy e
proxy :: Proxy e
proxy = ⊥
-- A proxy type is an empty phantom type.
-- A proxy value is just ‘‘⊥’’.
Simple syntactic sugar can significantly reduce the length of the one-liners for label
declaration should this become an issue. For instance, we may think of the above
lines just as follows:
-- Syntax extension assumed; label is a new keyword.
label varX
label getX
label moveX
The explicit declaration of OOHaskell labels blends well with Haskell’s scoping
rules and its module concept. Labels can be private to a module, or they can be
exported, imported, and shared. All models of HList labels support labels as firstclass citizens. In particular, we can pass them to functions. The “labels as type
proxies” idea is the basis for defining record operations since we can thereby dispatch
on labels in type-level functionality. We will get back to the record operations
shortly.
4.1.2 Mutable variables
The OCaml point class is transcribed to OOHaskell as follows:
point =
do
x <- newIORef 0
returnIO
$ varX .=. x
.*. getX .=. readIORef x
.*. moveX .=. (\d -> do modifyIORef x (+d))
.*. emptyRecord
The OOHaskell code clearly mimics the OCaml code. While we use Haskell’s
IORefs to model mutable variables, we do not use any magic of the IO
monad. We could as well use the simpler ST monad, which is very well formalised (Launchbury & Peyton Jones, 1995). The source distribution for the paper
illustrates the ST option.
8
It is a specific GHC extension of Haskell 98 to allow for datatypes without any constructor
declarations. Clearly, this is a minor issue because one could always declare a dummy constructor
that is not used by the program.
32
O. Kiselyov and R. Lämmel
The Haskell representation of the point class stands revealed as a value binding
declaration of a monadic record type. The do sequence first creates an IORef for the
mutable variable, and then returns a record for the new point object. In general,
the OOHaskell records provide access to the public methods of an object and to
the IORefs for public mutable variables. We will often call all record components of
OOHaskell’s objects just ‘methods’. In the example, varX is public, just as in the
original OCaml code. In OOHaskell, a private variable would be encoded as an
IORef that is not made available through a record component. (Private variables
were explored in the shapes example.)
4.1.3 HList records
We may ask Haskell to tell us the inferred type of point:
ghci> :t point
point :: IO (Record (HCons (Proxy MutableX, IORef Integer)
(HCons (Proxy GetX, IO Integer)
(HCons (Proxy Move, Integer -> IO ())
HNil))))
The type reveals the use of HList’s extensible records (Kiselyov et al., 2004). We
explain some details about HList, as to make the present paper self-contained. The
inferred type shows that records are represented as heterogeneous label-value pairs,
which are promoted to a proper record type through the type-constructor Record.
-- HList constructors
data HNil
= HNil
-- empty heterogeneous list
data HCons e l = HCons e l -- non-empty heterogeneous list
-- Sugar for forming label-value pairs
infixr 4 .=.
l .=. v = (l,v)
-- Record type constructor
newtype Record r = Record r
The constructor Record is opaque for the library user. Instead, the library user
(and most of the library code itself) relies upon a constrained constructor:
-- Record value constructor
mkRecord :: HRLabelSet r => r -> Record r
mkRecord = Record
The constraint HRLabelSet r statically assures that all labels are pairwise distinct
as this is a necessary precondition for a list of label-value pairs to qualify as a record.
(We omit the routine specification of HRLabelSet r (Kiselyov et al., 2004).) We can
now implement emptyRecord, which was used in the definition of point:
emptyRecord = mkRecord HNil
The record extension operator, (.*.), is a constrained variation on the heterogeneous cons operation, HCons: we need to make sure that the newly added label-value
pair does not violate the uniqueness property for the labels. This is readily expressed
by wrapping the unconstrained cons term in the constrained record constructor:
Haskell’s overlooked object system
— 1 February 2008 —
33
infixr 2 .*.
(l,v) .*. (Record r) = mkRecord (HCons (l,v) r)
4.1.4 OO test cases
We want to instantiate the point class and invoke some methods. We begin with
an OCaml session, which shows some inputs and the responses from the OCaml
interpreter:9
# let p = new point;;
val p : point = <obj>
# p#getX;;
- : int = 0
# p#moveX 3;;
- : unit = ()
# p#getX;;
- : int = 3
In Haskell, we capture this program in a monadic do sequence because method
invocations can involve IO effects including the mutation of objects. We denote
method invocation by (#), just as in OCaml; this operation is a plain record lookup. Hence:
myFirstOOP =
do
p <- point -- no need for new!
p # getX >>= Prelude.print
p # moveX $ 3
p # getX >>= Prelude.print
OOHaskell and OCaml agree:
ghci> myFirstOOP
0
3
For completeness we outline the definition of “#”:
-- Sugar operator
infixr 9 #
obj # feature = hLookupByLabel feature obj
-- Type-level operation for look-up
class HasField l r v | l r -> v
where
hLookupByLabel:: l -> r -> v
This operation performs type-level (and value-level) traversal of the label-value
pairs, looking up the value component for a given label from the given record, while
9
OCaml’s prompt is indicated by a leading character “#”.
Method invocation is modelled by the infix operator “#”.
The lines with leading “val” or “–” are the responses from the interpreter.
34
O. Kiselyov and R. Lämmel
using the label type as a key. We recall that the term ‘field’ (cf. HasField) originates from record terminology. In OOHaskell, all ‘fields’ are ‘methods’. (We omit
the routine specification of HasField l r v (Kiselyov et al., 2004).) The class declaration reveals that HList (and thereby OOHaskell) relies on multi-parameter
classes (Chen et al., 1992; Jones, 1992; Jones, 1995; Peyton Jones et al., 1997) with
functional dependencies (Jones, 2000; Duck et al., 2004).
4.2 Object generators
In class-based, mainstream OO languages, the construction of new class instances
is normally regulated by so-called constructor methods. In OOHaskell, instances
are created by a function that serves as an object generator. The function can be
seen as the embodiment of the class itself. The point computation defined above
is a trivial example of an object generator.
4.2.1 Constructor arguments
Quoting from (Leroy et al. , 2004)[§ 3.1]:
“The class point can also be abstracted over the initial value of varX. The parameter
x_init is, of course, visible in the whole body of the definition, including methods. For
instance, the method getOffset in the class below returns the position of the object relative
to its initial position.”
class para_point x_init =
object
val mutable varX = x_init
method getX
= varX
method getOffset = varX - x_init
method moveX d
= varX <- varX + d
end;;
In OOHaskell, objects are created as the result of monadic computations producing records. We can parameterise these computations by turning them into
functions, object generators, which take construction parameters as arguments.
For instance, the parameter x_init of the OCaml class para_point ends up as a
plain function argument:
para_point x_init
= do
x <- newIORef x_init
returnIO
$ varX
.=. x
.*. getX
.=. readIORef x
.*. getOffset .=. queryIORef x (\v -> v - x_init)
.*. moveX
.=. (\d -> modifyIORef x (+d))
.*. emptyRecord
4.2.2 Construction-time computations
Quoting from (Leroy et al. , 2004)[§ 3.1]:
Haskell’s overlooked object system
— 1 February 2008 —
35
“Expressions can be evaluated and bound before defining the object body of the class.
This is useful to enforce invariants. For instance, points can be automatically adjusted to
the nearest point on a grid, as follows:”
class adjusted_point x_init =
let origin = (x_init / 10) * 10 in
object
val mutable varX = origin
method getX
= varX
method getOffset = varX - origin
method moveX d
= varX <- varX + d
end;;
In OOHaskell, we follow the suggestion from the OCaml tutorial: we use local
let bindings to carry out the constructor computations “prior” to returning the
constructed object:
adjusted_point x_init
= do
let origin = (x_init ‘div‘ 10) * 10
x <- newIORef origin
returnIO
$ varX
.=. x
.*. getX
.=. readIORef x
.*. getOffset .=. queryIORef x (\v -> v - origin)
.*. moveX
.=. (\d -> modifyIORef x (+d))
.*. emptyRecord
That “prior” is not meant in a temporal sense: OOHaskell remains a non-strict
language, in contrast to OCaml.
4.2.3 Implicitly polymorphic classes
A powerful feature of OOHaskell is implicit polymorphism for classes. For instance, the class para_point is polymorphic with regard to the point’s coordinate — without our contribution. This is a fine difference between the OCaml
model and our OOHaskell transcription. In OCaml’s definition of para_point,
the parameter x_init was of the type int — because the operation (+) in OCaml
can deal with integers only. The OOHaskell points are polymorphic — a point’s
coordinate can be any Num-ber, for example, an Int or a Double. Here is an example
to illustrate that:
myPolyOOP =
do
p <- para_point (1::Int)
p’ <- para_point (1::Double)
p # moveX $ 2
p’ # moveX $ 2.5
p # getX >>= Prelude.print
p’ # getX >>= Prelude.print
The OOHaskell points are actually bounded polymorphic. The point coordinate may be of any type that implements addition. Until very recently, one could
36
O. Kiselyov and R. Lämmel
not express this in Java and in C#. Expressing bounded polymorphism in C++ is
possible with significant contortions. In (OO)Haskell, we did not have to do anything at all. Bounded polymorphism (aka, generics) is available in Ada95, Eiffel and
a few other languages. However, in those languages, the polymorphic type and the
type bounds must be declared explicitly. (There are ongoing efforts to add some
specific bits of type inference to new versions of mainstream OO languages.) In
(OO)Haskell, the type system infers the (bounded) polymorphism on its own, in
full generality.
The implicit polymorphism of OOHaskell does not injure static typing. If we confuse Ints and Doubles in the above code, e.g., by attempting “p # moveX $ 2.5”,then
we get a type error saying that Int is not the same as Double. In contrast, the poor
men’s implementation of polymorphic collections, e.g., in Java < 1.5, which up-casts
an element to the most general Object type when inserting it into the collection,
requires runtime-checked downcasts when accessing elements.
4.2.4 Nested object generators
Quoting from (Leroy et al. , 2004)[§ 3.1]:
“The evaluation of the body of a class only takes place at object creation time. Therefore,
in the following example, the instance variable varX is initialised to different values for
two different objects.”
let x0 = ref 0;;
class incrementing_point :
object
val mutable varX = incr x0; !x0
method getX
= varX
method moveX d
= varX <- varX + d
end;;
We test this new class at the OCaml prompt:
#
#
-
new incrementing_point#getX;;
: int = 1
new incrementing_point#getX;;
: int = 2
The variable x0 can be viewed as a “class variable”, belonging to a class object.
Recall that classes are represented by object generators in OOHaskell. Hence to
build a class object we need a nested object generator:
incrementing_point =
do
x0 <- newIORef 0
returnIO (
do modifyIORef x0
x <- readIORef
returnIO
$ varX .=.
.*. getX .=.
(+1)
x0 >>= newIORef
x
readIORef x
Haskell’s overlooked object system
— 1 February 2008 —
37
.*. moveX .=. (\d -> modifyIORef x (+d))
.*. emptyRecord)
We can nest generators to any depth since we just use normal Haskell scopes. In the
example, the outer level does the computation for the point template (i.e., “class”);
the inner level constructs points themselves. Here is a more suggestive name for the
nested generator:
makeIncrementingPointClass = incrementing_point
This (trivial) example demonstrates that classes in OOHaskell are really firstclass citizens. We can pass classes as arguments to functions and return them as
results. In the following code fragment, we create a class in a scope, and bind it as
a value to a locally-scoped variable, which is then used to instantiate the created
class in that scope. The localClass is a closure over the mutable variable x0.
myNestedOOP =
do
localClass <- makeIncrementingPointClass
localClass >>= ( # getX ) >>= Prelude.print
localClass >>= ( # getX ) >>= Prelude.print
ghci> myNestedOOP
1
2
In contrast, such a class closure is not possible in Java, let alone C++. Java
supports anonymous objects, but not anonymous first-class classes. Nested classes
in Java must be linked to an object of the enclosing class. Named nested classes in
C# are free from that linking restriction. However, C# does not support anonymous
classes or class computations in a local scope (although anonymous delegates of C#
let us emulate computable classes). Nevertheless, classes, as such, are not first-class
citizens in any mainstream OO language.
4.2.5 Open recursion
The methods of an object may send messages to ‘self’. To support inheritance with
override that ‘self’ must be bound explicitly (Cook, 1989). Otherwise, inheritance
will not able to revise the messages to self that were coded in a superclass. Consequently, general object generators are to be given in the style of ‘open recursion’:
they take self and construct (some part of) self.
Quoting from (Leroy et al. , 2004)[§ 3.2]:
“A method or an initialiser can send messages to self (that is, the current object). For
that, self must be explicitly bound, here to the variable s (s could be any identifier, even
though we will often choose the name self.) ... Dynamically, the variable s is bound at
the invocation of a method. In particular, when the class printable_point is inherited,
the variable s will be correctly bound to the object of the subclass.”
class printable_point x_init =
object (s)
val mutable varX = x_init
38
O. Kiselyov and R. Lämmel
method getX
method moveX d
method print
end;;
= varX
= varX <- varX + d
= print_int s#getX
Again, this OCaml code is transcribed to OOHaskell very directly. The self argument, s, ends up as an ordinary argument of the monadic function for generating
printable point objects:
printable_point x_init s =
do
x <- newIORef x_init
returnIO
$ varX .=. x
.*. getX .=. readIORef x
.*. moveX .=. (\d -> modifyIORef x (+d))
.*. print .=. ((s # getX ) >>= Prelude.print)
.*. emptyRecord
In OCaml, we use printable_point as follows:
# let p = new printable_point 7;;
val p : printable_point = <obj>
# p#moveX 2;;
- : unit = ()
# p#print;;
9- : unit = ()
Although s does not appear on the line that constructs a point p with the new
construct, the recursive knot clearly is tied right there. In OOHaskell, we use the
(monadic) fixpoint function, mfix, rather than a special keyword new. This makes
the nature of openly recursive object generators manifest.
mySelfishOOP =
do
p <- mfix (printable_point 7)
p # moveX $ 2
p # print
ghci> mySelfishOOP
9
4.2.6 Instantiation checking
One potential issue with open recursion in OOHaskell is that some type errors
in messages to self will not be spotted until the first object construction is coded.
For instance, an OO library developer could, accidentally, provide object generators
that turn out to be uninstantiatable; the library user would notice this defect once
the generators are put to work. This issue is readily resolved as follows. When we
program object generators, we may use the concrete operation:
-- An assured printable point generator
concrete_printable_point x_init
= concrete $ printable_point x_init
Haskell’s overlooked object system
— 1 February 2008 —
39
-- The concrete operation
concrete generator self = generator self
where
_ = mfix generator
Operationally, concrete is the identity function. However, it constrains the type
of generator such that the application of mfix is typeable. This approach needs
to be slightly refined to cover abstract methods (aka pure virtual methods). To
this end, one would need to engage into local inheritance — adding vacuous (i.e.,
potentially undefined) methods for any needed virtual method. This generalised
concrete operation would take the virtual portion of a record, or preferably just a
proxy for it, so that the purpose of this argument is documented.
4.3 Reuse techniques
The first-class status of labels, methods and classes enables various, common and
advanced forms of reuse. Single inheritance boils down to (monadic) function composition of object generators. Multiple inheritance and object composition employ
more advanced operations of the record calculus.
4.3.1 Single inheritance with extension
Quoting from (Leroy et al. , 2004)[§ 3.7]:10
“We illustrate inheritance by defining a class of colored points that inherits from the
class of points. This class has all instance variables and all methods of class point, plus
a new instance variable color, and a new method getColor.”
class colored_point x (color : string) =
object
inherit point x
val color = color
method getColor = color
end;;
Here is the corresponding OCaml session:
# let p’ = new colored_point 5 "red";;
val p’ : colored_point = <obj>
# p’#getX, p’#getColor;;
- : int * string = (5, "red")
The following OOHaskell version does not employ a special inherit construct.
We compose computations instead. To construct a colored point we instantiate the
superclass while maintaining open recursion, and extend the intermediate record,
super, by the new method getColor.
10
We use British spelling consistently in this paper, except for some words that enter the text
through code samples: color, colored, ...
40
O. Kiselyov and R. Lämmel
colored_point x_init (color::String) self =
do
super <- printable_point x_init self
returnIO
$ getColor .=. (returnIO color)
.*. super
Here, super is just a variable rather than an extra construct.
myColoredOOP =
do
p’ <- mfix (colored_point 5 "red")
x <- p’ # getX
c <- p’ # getColor
Prelude.print (x,c)
OOHaskell and OCaml agree:
ghci> myColoredOOP
(5,"red")
4.3.2 Class-polymorphic functionality
We can parameterise computations with respect to classes.
myFirstClassOOP point_class =
do
p <- mfix (point_class 7)
p # moveX $ 35
p # print
ghci> myFirstClassOOP printable_point
42
The function myFirstClassOOP takes a class (i.e., an object generator) as an argument, instantiates the class, and moves and prints the resulting object. We can
pass myFirstClassOOP any object generator that creates an object with the slots
moveX and print. This constraint is statically verified. For instance, the colored
point class, which we derived from the printable point class in the previous section,
is suitable:
ghci> myFirstClassOOP $ flip colored_point "red"
42
4.3.3 Single inheritance with override
We can override methods and still refer to their superclass implementations (akin
to the super construct in OCaml and other languages). We illustrate overriding
with a subclass of colored_point whose print method is more informative:
colored_point’ x_init (color::String) self =
do
super <- colored_point x_init color self
return $ print .=. (
do putStr "so far - "; super # print
putStr "color - "; Prelude.print color )
.<. super
Haskell’s overlooked object system
— 1 February 2008 —
41
The first step in the monadic do sequence constructs an old-fashioned colored point,
and binds it to super for further reference. The second step in the monadic do
sequence returns super updated with the new print method. The HList operation
“.<.” denotes type-preserving record update as opposed to the familiar record
extension “.*.”. The operation “.<.” makes the overriding explicit (as it is in C#,
for example). We could also use a hybrid record operation, which does extension
in case the given label does not yet occur in the given record, falling back to typepreserving update. This hybrid operation would let us model the implicit overriding
in C++ and Java. Again, such a variation point demonstrates the programmability
of OOHaskell’s object system.
Here is a demo that shows overriding to properly affect the print method:
myOverridingOOP =
do
p <- mfix (colored_point’ 5 "red")
p # print
ghci> myOverridingOOP
so far - 5
color - "red"
4.3.4 Orphan methods
We can program methods outside of any hosting class. Such methods can be reused
across classes without any inheritance relationship. For instance, we may define a
method print_getX that can be shared by all objects that have at least the method
getX of the type Show a => IO a — regardless of any inheritance relationships:
print_getX self = ((self # getX ) >>= Prelude.print)
We can update the earlier code for printable_point as follows:
-- before: inlined definition of print
... .*. print
.=. ((s # getX ) >>= Prelude.print)
-- after: reusable orphan method
... .*. print
.=. print_getX s
4.3.5 Flexible reuse schemes
In addition to single class inheritance, there are several other established reuse
schemes in OO programming including object composition, different forms of mixins and different forms of multiple inheritance. Given the first-class status of all
OOHaskell entities and its foundation in a powerful record calculus, it should be
possible to reconstruct most if not all existing reuse schemes. We will use an (admittedly contrived) example to demonstrate a challenging combination of multiple
inheritance and object composition. To the best of our knowledge, this example
cannot be directly represented in any existing mainstream language.
We are going to work through a scenario of making a class heavy_point from
three different concrete subclasses of abstract_point. The first two concrete points
42
O. Kiselyov and R. Lämmel
Fig. 2. A complex reuse scenario
will be shared in the resulting heavy point, because we leave open the recursive
knot. The third concrete point does not participate in the open recursion and is
not shared. In C++ terminology, abstract_point is a virtual base class (with
respect to the first two concrete points) and a non-virtual base class at the same
time. See Fig. 2 for an overview.
The object template for heavy points starts as follows:
heavy_point x_init color self =
do super1 <- concrete_point1 x_init self
super2 <- concrete_point2 x_init self
super3 <- mfix (concrete_point3 x_init)
... -- to be continued
We bind all ancestor objects for subsequent reference. We pass self to the first two
points, which participate in open recursion, but we fix the third point in place. The
first two classes are thus reused in the sense of inheritance, while the third class is
reused in the sense of object composition. A heavy point carries print and moveX
methods delegating corresponding messages to all three points:
... -- continued from above
let myprint = do
putStr "super1: "; (super1
putStr "super2: "; (super2
putStr "super3: "; (super3
let mymove = ( \d -> do
super1 # moveX $ d
super2 # moveX $ d
super3 # moveX $ d
return
$
print .=. myprint
.*.
moveX .=. mymove
.*.
emptyRecord
... -- to be continued
# print)
# print)
# print)
)
Haskell’s overlooked object system
— 1 February 2008 —
43
The three points, with all their many fields and methods, contribute to the heavy
point by means of left-biased union on records, which is denoted by “.<++.” below:
... -.<++.
.<++.
.<++.
continued from above
super1
super2
super3
Here is a demo:
myDiamondOOP =
do
p <- mfix (heavy_point 42 "blue")
p # print -- All points still agree!
p # moveX $ 2
p # print -- The third point lacks behind!
ghci> myDiamondOOP
super1: 42
super2: 42
super3: 42
super1: 46
super2: 46
super3: 44
For comparison, in OCaml, multiple inheritance follows fixed rules. Only the
last definition of a method is kept: the redefinition in a subclass of a method that
was visible in the parent class overrides the definition in the parent class. Previous
definitions of a method can be reused by binding the related ancestor using a special
. . . as . . . notation. The bound name is said to be a ‘pseudo value identifier’ that can
only be used to invoke an ancestor method. Eiffel, C++, etc. have their own fixed
rules and notations for multiple inheritance. OOHaskell allows us to “program”
this aspect of the OO type system. Programmers (or language designers) may devise
their own inheritance and object composition rules.
4.4 Safe value recursion
The support for open recursion in an OO system has a subtle but fundamental
difficulty. Of the three ways to emulate open recursion – recursive types, existential
abstraction ((Rémy, 1994; Pierce & Turner, 1994)) and value recursion, the latter
is the simplest one. This is the one we have chosen for OOHaskell. Recall that
each object generator receives the self argument (representing the constructed
object), which lets the methods send the messages to the object itself. An object is
constructed by obtaining the fixpoint of the generator. Here is a variation on the
printable point example from Sec. 4.2.5 that illustrates the potential unsafety of
value recursion:
printable_point x_init self =
do
x <- newIORef x_init
self # print -- Unsafe!
44
O. Kiselyov and R. Lämmel
returnIO
$ varX .=. x
.*. getX .=. readIORef x
.*. moveX .=. (\d -> modifyIORef x (+d))
.*. print .=. ((self # getX ) >>= Prelude.print)
.*. emptyRecord
An object generator may be tempted to invoke methods on the received self argument, as self # print above. That code typechecks. However, the attempt to
construct an object by executing
mfix (printable_point 0)
reveals the problem: looping. Indeed, self represents the object that will be constructed. It is not proper to invoke any method on self when the object generation
is still taking place, because self as a whole does not yet exist.
In Haskell, accessing a not-yet-constructed object leads to “mere” looping. This,
so-called left-recursion problem (well-known in parsing (Aho et al., 1986)) is akin
to the divergence of the following trivial expression:
mfix (\self -> do { Prelude.print self; return "s" })
In a non-strict language like Haskell, determining the fixpoint of a value a->a
where a is not a function type is always safe: the worst can happen is the divergence,
but no undefined behaviour. In strict languages, the problem is far more serious:
accessing the field before it was filled in is accessing a dummy value (e.g., a null
pointer) that was placed into the field prior to the evaluation of the recursive
definition. Such an access results in undefined behaviour, and has to be prevented
with a run-time check. As noted in (Rémy, 1994), this problem has been widely
discussed but no satisfactory solution was found.
Although the problem is relatively benign in OOHaskell and never leads to
undefined behaviour, we would like to statically prevent it. To be precise, we impose the rule that the constructor may not execute any actions that involve notyet-constructed objects. With little changes, we statically enforce that restriction.
Object construction may be regarded as a sort of a staged computation; the problem of preventing the use of not-yet-constructed values is one of the key challenges
in multi-staged programming (Taha & Nielsen, 2003), where it has been recently
solved with environment classifiers. Our solution is related in principle (making the
stage of completion of an object a part of its type), but differs in technique (we
exploit compile-time tagging and monadic types rather than higher-ranked types).
We introduce a tag NotFixed to mark the objects that are not constructed yet:
newtype NotFixed a = NotFixed a -- data constructor opaque!
Because NotFixed is a newtype, this tag imposes no run-time overhead. We do not
export the data constructor NotFixed so the user may not arbitrarily introduce
or remove that tag. All operations on this tag are restricted to a new module
NotFixed that is part of the OOHaskell library. The module exports two new
operations: new and construct. The former is a variant of mfix for the IO monad.
The construct operation is a variation on returnIO.
Haskell’s overlooked object system
— 1 February 2008 —
45
new :: (NotFixed (Record a)
-> IO (NotFixed (Record a))) -- object generator
-> IO (Record a)
-- object computation
new f = mfix f >>= (\(NotFixed a) -> return a)
construct :: NotFixed (Record a)
-> (Record a -> Record b)
-> IO (NotFixed (Record b))
construct (NotFixed self) f = returnIO
-- self
-- constructor
-- object computation
$ NotFixed (f self)
Staged object construction proceeds as follows. The argument self passed to the
object generator is marked as NotFixed. After the fixpoint is computed, new removes the NotFixed tag. The function construct, while maintaining the NotFixed
tag, lifts the tag internally so that the methods being defined by the object generator could use the self reference. We can now write our example as follows:
printable_point x_init self =
do
x <- newIORef x_init
-- self # print
construct self (\self->
mutableX .=. x
.*. getX
.=. readIORef x
.*. moveX
.=. (\d -> modifyIORef x ((+) d))
.*. print
.=. ((self # getX ) >>= Prelude.print)
.*. emptyRecord)
test_pp
do
p
p
p
=
<- new (printable_point 7)
# moveX $ 2
# print
If we uncomment the statement self # print we will get the type error saying
that a NotFixed object does not have the method print. (There are no HasField
instances for the NotFixed type.) Within the body of construct, the reference to
self is available without the NotFixed tag; so one may be tempted to invoke methods on self and execute their actions. However, the second argument of construct
is a non-monadic function of the type Record a -> Record b. Because the result
type of the function does not include IO, it is not possible to read and write IORef
and do other IO actions within that function. In Haskell (in contrast to OCaml),
imperativeness of a function is manifest in its type.
The extension to the construction of inherited classes is straightforward. For
example, the colored_point example from Sec. 4.3.1 now reads:
colored_point x_init (color::String) self =
do
p <- printable_point x_init self
-- p # print -- would not typecheck.
construct p $ \p -> getColor .=. (returnIO color) .*. p
myColoredOOP =
do
46
O. Kiselyov and R. Lämmel
p’ <- new (colored_point 5 "red")
x <- p’ # getX
c <- p’ # getColor
Prelude.print (x,c)
The constructor colored_point receives the argument self marked as not-yetconstructed. We pass that argument to printable_point, which gives us a notyet-constructed object of the superclass. We cannot execute any methods on that
object (and indeed, uncommenting the statement p # print leads to a type error).
The execution of a superclass method may involve the invocation of a method
on self (as is the case for the method print), and self is not constructed yet.
The construct operation shown here is not fully general; the source distribution
illustrates safe object generation where methods refer both to self and super. The
technique readily generalises to multiple inheritance and object composition.
5 Type-perceptive OOHaskell idioms
So far we have avoided type declarations, type annotations and explicit coercions of
object types. We will now discuss those OOHaskell programming scenarios that
can benefit from additional type information, or even require it. We will pay special
attention to various subtyping and related cast and variance issues. In particular,
we will cover the technical details of subtype-polymorphic collections, which require
some amount of type perceptiveness, as we saw in the introductory shapes example
in Sec. 2.
5.1 Semi-implicit upcasting
There is an important difference between OOHaskell’s subtype polymorphism
(which we share to some extent with OCaml and ML-ART) and polymorphism in
C++ and other mainstream OO languages.11 In the latter languages, an object can
be implicitly coerced to an object of any of its superclasses (“upcast”). One may
even think that an object is polymorphic by itself, i.e., it has types of all of its
superclasses, simultaneously. Hence, there is no need for functions on objects (or
methods) to be polymorphic by themselves; they are monomorphic.
In OCaml and OOHaskell, it is the other way around: objects are monomorphic
(with regard to the record structure) and the language semantics does not offer
any implicit upcasting or narrowing.12 However, functions that take objects can be
polymorphic and can process objects of different types. To be precise, OOHaskell
exploits type-class-bounded polymorphism. A function that takes an object and
refers to its methods (i.e., record components) has in its inferred or explicit type
HasField constraints for these record components. The function therefore accepts
11
12
See, however, Sec. 5.7, where we emulate the mainstream nominal subtyping.
We prefer the term narrow over up-cast, as to emphasise the act of restricting the interface of
an object, as opposed to walking up an explicit (perhaps even nominal) subtyping hierarchy.
Haskell’s overlooked object system
— 1 February 2008 —
47
any object that has at least the components that satisfy the HasField constraints.13
Therefore, most of the time no (implicit or explicit) upcasting is needed; in fact, in
Sec. 4 we did not see any.
An explicit cast is usually understood as casting to an explicitly named target
type. We discuss such casts later in this section. Here we show that the established
explicit-vs.-implicit upcast dichotomy misses an intermediate option, which is admitted by OOHaskell. Namely, OOHaskell lets the programmer specify that
narrowing is to be performed — without giving an explicit target type, though. So
we continue to get by without specifying types, leaving it all to type inference — at
least for a while.
In OOHaskell (and OCaml), we must narrow an object if its expression context
has no type-class-bounded polymorphism left and requires an object of a different
type. The archetypal example is placing objects in a homogeneous collection, e.g., a
list. The original item objects may be of different types; therefore, we must establish
a common element type and narrow the items to it. This common element type does
not have to be specified explicitly, however. OOHaskell can compute that common
type as we add objects to the collection; the context will drive the narrowing. The
OOHaskell implementation of the shapes example in Sec. 2 involved this sort of
narrowing:
myOOP = do
s1 <- mfix (rectangle (10::Int) (20::Int) 5 6)
s2 <- mfix (circle (15::Int) 25 8)
let scribble = consLub s1 (consLub s2 nilLub)
... and so on ...
The designated list constructors nilLub and consLub incorporate narrowing into
their normal constructor behaviour. The specific element type of each new element
constraints the ultimate least-upper bound (LUB) element type for the final list.
Elements are continuously cast towards this LUB. The list constructors are defined
as follows:
-- A type-level code for the empty list
data NilLub
-- The empty list constructor
nilLub = ⊥ :: NilLub
-- Cons as a type-level function
class ConsLub h t l | h t -> l
where
consLub :: h -> t -> l
-- No coercion needed for a singleton list
instance ConsLub e NilLub [e]
where
consLub h _ = [h]
13
We oversimplify here by not talking about operations that add or remove fields. This is a
fair simplification though because we talk about normal OO functionality here, as opposed to
free-wheeling functionality for record manipulation.
48
O. Kiselyov and R. Lämmel
-- Narrow head and tail to their LUB type
instance LubNarrow e0 e1 e2 => ConsLub e0 [e1] [e2]
where
consLub h t = fst (head z) : map snd (tail z)
where
z = map (lubNarrow h) (⊥:t)
The important operation is lubNarrow:
class LubNarrow a b c | a b -> c
where lubNarrow :: a -> b -> (c,c)
Given two values of record types a and b, this operation returns a pair of narrowed
values, both of type c, where c is supposed to be the least-upper bound in the sense
of structural subtyping. The specification of lubNarrow once again illustrates the
capability of OOHaskell to ‘program’ OO type-system aspects. We exploit the
type-level reflection on HList records to define narrowing:
instance ( HZip la va a
, HZip lb vb b
, HTIntersect la lb lc
, H2ProjectByLabels lc a c aout
, H2ProjectByLabels lc b c bout
, HRLabelSet c
)
=> LubNarrow (Record a) (Record b) (Record c)
where
lubNarrow ra@(Record a) rb@(Record b) =
( hProjectByLabels lc ra
, hProjectByLabels lc rb
)
where
lc = hTIntersect la lb
(la,_) = hUnzip a
(lb,_) = hUnzip b
That is, given two records ra and rb, we compute the intersection lc of their labels
la and lb such that we can subsequently project both records to this shared label
set. It is possible to improve consLub so that we can construct lists in linear time.
We may also want to consider depth subtyping in addition to width subtyping, as
we will discuss in Sec. 5.9.
5.2 Narrow to a fixed type
The LUB narrowing is neither an explicit nor an implicit coercion. In the shapes
example, we explicitly apply special list constructors, which we know perform coercion, but the target type is left implicit. Such semi-implicit narrowing is a feature of
OOHaskell, not available in the otherwise similar systems OCaml and ML-ART.
In OCaml, building the scribble list in the shapes example requires fully explicit
narrowing (which OCaml calls upcast, “:>”):
Haskell’s overlooked object system
— 1 February 2008 —
49
let (scribble: shape list) = [
(new rectangle 10 20 5 6 :> shape);
(new circle 15 25 8 :> shape)] in ...
We can express such narrowing in OOHaskell as well:
s1 <- mfix (rectangle (10::Int) (20::Int) 5 6)
s2 <- mfix (circle (15::Int) 25 8)
let scribble :: [Shape Int]
scribble = [narrow s1, narrow s2]
The applications of narrow prepare the shape objects for insertion into the homogeneous Haskell list. We do not need to identify the target type per element:
specifying the desired type for the result list is enough. The operation narrow is
defined in a dedicated class:
class Narrow a b
where narrow :: Record a -> Record b
The operation narrow extracts those label-value pairs from a that are requested by
b. Its implementation uses the same kind of projection on records that we saw in
full in the previous section; cf. lubNarrow.
(Fully) explicit narrowing implies that we must declare appropriate types —
something that we managed to avoid so far. Here is the Shape type, which ‘drives’
narrowing in the example:
-- The Shape interface
type Shape a = Record (
:*:
:*:
:*:
:*:
:*:
:*:
:*:
GetX
GetY
SetX
SetY
MoveTo
RMoveTo
Draw
HNil )
:=:
:=:
:=:
:=:
:=:
:=:
:=:
IO
IO
(a
(a
(a
(a
IO
a
a
->
->
->
->
()
IO ())
IO ())
a -> IO ())
a -> IO ())
Two infix type synonyms add convenience to explicitly written types:
infixr 2 :*:
type e :*: l = HCons e l
infixr 4 :=:
type l :=: v = (l,v)
The Shape interface above explicitly includes the virtual operation draw because
the loop over scribble needs this method. We will see more applications of narrow
in subsequent sections.
5.3 Self-returning methods
A self-returning method is a method whose result type is the type of self or
is based on it. An example is a clone method. The typing of such methods (and of self) is known to be a difficult issue in typed object encodings;
50
O. Kiselyov and R. Lämmel
cf. (Cook et al., 1990; Abadi & Cardelli, 1996; Bruce et al., 2003) for some advanced treatments. In OOHaskell, we must not naively define a method me that
returns self, as is:
self_returning_point (x_init::a) self =
do
super <- printable_point x_init self
returnIO
$ me .=. self -- WRONG!
.*. super
If we wrote such code, then we get a type error, when we attempt to instantiate the
corresponding object (i.e., when we mfix the object generator). Haskell does not
permit (equi-)recursive types, which are needed to type self in the example. The
issue of recursive types and returning the full self is discussed in detail in Sec. 5.8.
Here, we point out a simpler solution: disallowing returning self and requiring the
programmer to narrow self to a specific desired interface. In the case of the clone
method, mainstream programming languages typically define its return type to be
the base class of all classes. The programmer is then supposed to use downcast to
the intended subtype.
We resolve the problem with the self-returning method as follows:
self_returning_point (x_init::a) self =
do
super <- printable_point x_init self
returnIO
$ me .=. (narrow self :: PPInterface a)
.*. super
type PPInterface a
= Record ( GetX :=: IO a
:*: MoveX :=: (a -> IO ())
:*: Print :=: IO ()
:*: HNil )
That is, me narrows self explicitly to the interface for printable points.
We should relate the explicit narrowing of the return type of me to the explicit
declaration of the return type of all methods in C++ and Java. The presented
narrowing approach does have a limitation however: all record components that
do not occur in the target interface are irreversibly eliminated from the result
record. We would prefer to make these components merely ‘private’ so they can
be recovered through a safe downcast. We offer two options for such downcastable
upcasts in the next two sections.
5.4 Casts based on dynamics
Turning again to the shapes benchmark, let us modify the loop over scribble,
a homogeneous list of shapes, so to single out circles for special treatment. This
requires downcast:
Haskell’s overlooked object system
— 1 February 2008 —
51
mapM_ (\shape -> maybe (putStrLn "Not a circle.")
(\circ -> do circ # setRadius $ 10;
circ # draw)
((downCast shape) ‘asTypeOf‘ (Just s2)))
scribble
In each iteration, we attempt to downcast the given shape object to the type of
s2 (which we recall is a circle object). A downcast may fail or succeed, hence the
Maybe type of the result.
Neither OOHaskell’s narrow operation nor OCaml’s upcast support such scenarios. OOHaskell’s narrow irrevocably removes record components. We can
define, however, other forms of upcast, which are reversible. We begin with a
technique that exploits dynamic typing (Abadi et al., 1989; Abadi et al., 1991;
Lämmel & Peyton Jones, 2003).
The new scribble list is built as follows:
let scribble :: [UpCast (Shape Int)]
scribble = [upCast s1, upCast s2]
where
data UpCast x = UpCast x Dynamic
The data constructor UpCast is opaque for the library user, who can only upcast through a dedicated upCast operation. The latter saves the original object by
embedding it into Dynamic. (We presume that record types readily instantiate the
type class Typeable.) Dually, downcast is then a projection from Dynamic to the
requested subtype:
upCast :: (Typeable (Record a), Narrow a b)
=> Record a -> UpCast (Record b)
upCast x = UpCast (narrow x) (toDyn x)
downCast :: (Typeable b, Narrow b a)
=> UpCast (Record a) -> Maybe (Record b)
downCast (UpCast _ d) = fromDynamic d
We want to treat ‘upcast objects’ as being objects too, and so we add a trivial HasField instance for looking up record components of upcast objects. This
instance delegates the look-up to the narrowed part of the UpCast value:
instance HasField l x v => HasField l (UpCast x) v
where
hLookupByLabel l (UpCast x _) = hLookupByLabel l x
This technique suffers from a few shortcomings. Although downcast is safe in a
sense that no ‘bad things can happen’ (cf. unsafe casts in C), this downcast does not
keep us from attempting so-called ‘stupid casts’, i.e., casts to types for which casting
cannot possibly succeed. In the following section, we describe a more elaborate upcast/downcast pair that statically prevents stupid downcasts. The dynamics-based
method also suffers from the full computational overhead of the narrow operation,
a value-level coercion that iterates over all record components.
52
O. Kiselyov and R. Lämmel
5.5 Casts based on unions
We turn to the subtyping technique from Sec. 3.4 (further refined in Sec. 3.5), which
used union types to represent the intersection of types. That techniques had several
problems: it could not easily deal with the empty list, could not minimise the union
type to the number of distinct element types, and could not downcast. We fully lift
these restrictions here by putting type-level programming to work.
We again make upcasts semi-implicit with dedicated list constructors:
myOOP = do
s1 <- mfix (rectangle (10::Int) (20::Int) 5 6)
s2 <- mfix (circle (15::Int) 25 8)
let scribble = consEither s1 (consEither s2 nilEither)
... and so on ...
The list constructors are almost identical to nilLub and consLub in Sec. 5.1. The
difference comes when we cons to a non-empty list; see the last instance below:
-- A type-level code for the empty list
data NilEither
-- The empty list constructor
nilEither = ⊥ :: NilEither
-- Cons as a trivial type-level function
class ConsEither h t l | h t -> l
where
consEither :: h -> t -> l
-- No coercion needed for a singleton list
instance ConsEither e NilEither [e]
where
consEither h _ = [h]
-- Construct union type for head and tail
instance ConsEither e1 [e2] [Either e1 e2]
where
consEither h t = Left h : map Right t
We extend the union type for the ultimate element type with one branch for each
new element, just as we did in the Haskell 98-based encoding of Sec. 3.5. However,
with type-level programming, we can, in principle, minimise the union type so that
each distinct element type occurs exactly once.14 This straightforward optimisation
is omitted here for brevity.15
Method look-up is generic, treating the union type as the intersection of record
fields of the union branches:
14
15
The same kind of constraints was covered in the HList paper (Kiselyov et al., 2004), cf. typeindexed heterogeneous collections.
In essence, we need to iterate over the existing union type and use type-level type equality to
detect if the type of the element to cons has already occurred in the union. If so, we also need
to determine the corresponding sequence of Left and Right tags.
Haskell’s overlooked object system
instance (HasField
=> HasField
where
hLookupByLabel l
hLookupByLabel l
— 1 February 2008 —
53
l x v, HasField l y v)
l (Either x y) v
(Left x) =
(Right y) =
hLookupByLabel l x
hLookupByLabel l y
Downcast is a type-driven search operation on the union type. We also want
downcast to fail statically if the target types does not appear among the branches.
Hence, we start downcast with a type-level Boolean, hFalse, to express that we
have not yet seen the type in question:
downCast = downCastSeen hFalse
Downcast returns Maybe because it can intrinsically fail at the value level:
class DownCastSeen seen u s
where downCastSeen :: seen -> u -> Maybe s
We process the union like a list. Hence, there are two cases: one for the nonsingleton union, and one for the final branch. Indeed, the details of the definition
reveal that we assume right-associative unions.
instance (DownCastEither seen b x y s, TypeEq x s b)
=> DownCastSeen seen (Either x y) s
where
downCastSeen seen = downCastEither seen (⊥::b)
instance (TypeCastSeen seen b x s, TypeEq x s b)
=> DownCastSeen seen x s
where
downCastSeen seen = typeCastSeen seen (⊥::b)
In both cases we test for the type equality between the target type and the (left)
branch type. We pass the computed type-level Boolean to type-level functions
DownCastEither (‘non-singleton union’) and TypeCastSeen (‘final branch’, a singleton union):
class TypeCastSeen seen b x y
where typeCastSeen :: seen -> b -> x -> Maybe y
instance TypeCast x y => TypeCastSeen seen HTrue x y
where
typeCastSeen _ _ = Just . typeCast
instance TypeCastSeen HTrue HFalse x y
where
typeCastSeen _ _ = const Nothing
The first instance applies when we have encountered the requested type at last.
In that case, we invoke normal, type-level type cast (cf. (Kiselyov et al., 2004)),
knowing that it must succeed given the earlier check for type equality. The second
instance applies when the final branch is not of the requested type. However, we
must have seen the target type among the branches, cf. HTrue. Thereby, we rule
out stupid casts.
The following type-level function handles ‘non-trivial’ unions:
class DownCastEither seen b x y s
where downCastEither :: seen -> b -> Either x y -> Maybe s
54
O. Kiselyov and R. Lämmel
instance (DownCastSeen HTrue y s, TypeCast x s)
=> DownCastEither seen HTrue x y s
where
downCastEither _ _ (Left x) = Just (typeCast x)
downCastEither _ _ (Right y) = downCastSeen hTrue y
instance DownCastSeen seen y s
=> DownCastEither seen HFalse x y s
where
downCastEither _ _
(Left x) = Nothing
downCastEither seen _ (Right y) = downCastSeen seen y
The first instances applies in case the left branch of the union type is of the target
type; cf. HTrue. It remains to check the value-level tag. If it is Left, we are done
after the type-level type cast. We continue the search otherwise, with seen set
to HTrue to record that the union type does indeed contain the target type. The
second instance applies in case the left branch of the union type is not of the target
type; cf. HFalse. In that case, downcast continues with the tail of union type, while
propagating the seen flag. Thereby, we rule out stupid casts.
5.6 Explicit type constraints
In some cases, it is useful to impose structural record type constraints on arguments
of an object generator, on arguments or the result type of a method. These constraints are akin to C++ concepts (Siek et al., 2005). The familiar narrow turns out
to be a convenient tool for imposition of such type constraints. This use of narrow
does no operations at run-time. A good example example of OO type constraints
is the treatment of virtual methods in OOHaskell.
Quoting from (Leroy et al. , 2004)[§ 3.4]:
“It is possible to declare a method without actually defining it, using the keyword virtual.
This method will be provided later in subclasses. A class containing virtual methods must be
flagged virtual, and cannot be instantiated (that is, no object of this class can be created).
It still defines type abbreviations (treating virtual methods as other methods.)
class virtual abstract_point x_init =
object (self)
val mutable varX = x_init
method print = print_int self#getX
method virtual getX : int
method virtual moveX : int -> unit
end;;
In C++, such methods are called pure virtual and the corresponding classes are
called abstract. In Java and C#, we can flag both methods and classes as being
abstract. In OOHaskell, it is enough to leave the method undefined. Indeed, in the
shapes example, we omitted any mentioning of the draw method when we defined
the object generator for shapes.
OCaml’s abstract point class may be transcribed to OOHaskell as follows:
Haskell’s overlooked object system
— 1 February 2008 —
55
abstract_point x_init self =
do
xRef <- newIORef x_init
returnIO $
varX
.=. xRef
.*. print .=. ( self # getX >>= Prelude.print )
.*. emptyRecord
This object generator cannot be instantiated with mfix because getX is used but not
defined. The Haskell type system effectively prevents us from instantiating classes
which use the methods neither they nor their parents have defined. There arises the
question of the explicit designation of a method as pure virtual, which would be of
particular value in case the pure virtual does not happen to be used in the object
generator itself.
OOHaskell allows for such explicit designation by means of adding type constraints to self. To designate getX and moveX as pure virtuals of abstract_point
we change the object generator as follows:
abstract_point (x_init::a) self =
do
... as before ...
where
_ = narrow self :: Record ( GetX :=: IO a
:*: MoveX :=: (a -> IO ())
:*: HNil )
We use the familiar narrow operation, this time to express a type constraint. We
must stress that we narrow here at the type level only. The result of narrowing is not
used (cf. “ ”), so operationally it is a no-op. It does however affect the typechecking
of the program: every instantiatable extension of abstract_point must define getX
and moveX.
One may think that the same effect can be achieved by adding regular type
annotations (e.g., on self). These annotations however must spell out the desired
object type entirely. Furthermore, a regular record type annotation rigidly and
unnecessarily restrains the order of the methods in the record as well as their types
(preventing deep subtyping, Sec. 5.9). One may also think object types can be
simply constrained by specifying HasField constraints. This is impractical in so far
that full object types would need to be specified then by the programmer; Haskell
does not directly support partial signatures. Our narrow-based approach solves
these problems.
5.7 Nominal subtyping
In OCaml and, by default, in OOHaskell, object types engage into structural
subtype polymorphism. Many other OO languages prefer nominal object types
with explicitly declared subtyping (inheritance) relationships. There is an enduring
debate about the superiority of either form of subtyping. The definite strength
of structural subtype polymorphism is that it naturally enables inference of object
56
O. Kiselyov and R. Lämmel
types. The downside is potentially accidental subtyping (Cardelli & Wegner, 1985):
a given object may be admitted as an actual argument of some function just because
its structural type fits. Nominal types allow us to restrict subtyping polymorphism
on the basis of explicitly declared subclass or inheritance relationships between
nominal (i.e., named) types.
Although OOHaskell is biased towards structural subtyping polymorphism,
OOHaskell, as a general sandbox for typed OO language design, does admit
nominal object types and nominal subtyping including multiple inheritance.
We revisit our familiar printable points and colored points, switching to nominal
types. First, we need to invent class names, or nominations:
data PP
data CP
= PP
= CP
-- Printable points
-- Colored points
As an act of discipline, we also register these types as nominations:
class Nomination f
instance Nomination PP
instance Nomination CP
We attach nomination to a regular, record-based OOHaskell object as a phantom type. To this end, we using the following newtype wrapper:
newtype N nom rec = N rec
The following two functions add and remove the nominations:
-- An operation to ‘nominate’ a record as nominal object
nominate :: Nomination nt => nt -> x -> N nt x
nominate nt x = N x
-- An operation to take away the type distinction
anonymize :: Nomination nt => N nt x -> x
anonymize (N x) = x
To be able to invoke methods on nominal objects, we need a HasField instance for
N, with the often seen delegation to the wrapped record:
instance (HasField l x v, Nomination f) => HasField l (N f x) v
where hLookupByLabel l o = hLookupByLabel l (anonymize o)
OO programming with nominal subtyping on PP and CP can now commence. The
object generator for printable points remains exactly the same as before except that
we nominate the returned object as an PP:
printable_point x_init s =
do
x <- newIORef x_init
returnIO $ nominate PP -- Nominal!
$ mutableX .=. x
.*. getX
.=. readIORef x
.*. moveX
.=. (\d -> modifyIORef x (+d))
.*. print
.=. ((s # getX ) >>= Prelude.print)
.*. emptyRecord
Haskell’s overlooked object system
— 1 February 2008 —
57
The nominal vs. structural distinction only becomes meaningful once we start
to annotate functions explicitly with the requested nominal argument type. We
will first consider request that insist on a specific nominal type, with no subtyping
involved. Here is a print function that only accepts nominal printable points.
printPP (aPP::N PP x) = aPP # print
To demonstrate nominal subtyping, we define colored points (‘CP’):
colored_point x_init (color::String) self =
do
super <- printable_point x_init self
returnIO $ nominate CP -- Nominal!
$ print .=. ( do putStr "so far - "; super # print
putStr "color - "; Prelude.print color )
.<. getColor .=. (returnIO color)
.*. anonymize super -- Access record!
We need to make CP a nominal subtype of PP. That designation is going to be
explicit. We introduce a type class Parents, which is an extensible type-level function from nominal types to the list of their immediate supertypes. A type may have
more than one parent: multiple inheritance. The following two instances designate
PP as the root of the hierarchy and CP as its immediate subtype:
class ( Nomination child, Nominations parents ) =>
Parents child parents | child -> parents
instance Parents PP HNil
instance Parents CP (HCons PP HNil)
-- PP has no parents
-- Colored points are printable points
The OOHaskell library also defines a general relation Ancestor, which is the
reflexive, transitive closure of Parents:
class ( Nomination f, Nomination anc ) =>
Ancestor f anc
We are now in the position to define an upcast operation, which is the basis for
nominal subtyping:
-- An up-cast operation
nUpCast :: Ancestor f g => N f x -> N g x
nUpCast = N . anonymize
We could also define some forms of downcast. Our nUpCast does no narrowing, so
operationally it is the identity function. This is consistent with the implementation of the nominal upcast in mainstream OO languages. The record type of an
OOHaskell object is still visible in its nominal type. Our nominal objects are
fully OOHaskell objects except that their subtyping is deliberately restricted.
We can define a subtype-polymorphic print function for printable points by ‘relaxing’ the non-polymorphic printPP function through upcast.16
16
We cannot define printPP’ in a point-free style because of Haskell’s monomorphism restriction.
58
O. Kiselyov and R. Lämmel
printPP (aPP::N PP x) = aPP # print -- accept PP only
printPP’ o = printPP (nUpCast o)
-- accept PP and nominal subtypes
The couple printPP and printPP’ clarifies that we can readily restrict argument
types of functions to either precise types or to all subtypes of a given base. This
granularity of type constraints it not provided by mainstream OO languages. Also,
the use of structural subtyping in the body of printPP hints at the fact that we
can blend nominal and structural subtyping with ease in OOHaskell. Again, this
is beyond state-of-the-art in mainstream OO programming.
5.8 Iso-recursive types
In the previous section, we have studied nominal types for the sake of nominal
subtyping. Nominal types are intrinsically necessary, when we need to model recursive object types in OOHaskell. In principle, a type system with equi-recursive
types would be convenient in this respect. However, adding such types to Haskell
was debated and then rejected because it will make type-error messages nearly useless (Hughes, 2002). Consequently, we encode recursive object types as iso-recursive
types; in fact, we use newtypes. (An alternative technique of existential quantification (Pierce & Turner, 1994) is discussed in Sec. 5.11.)
We illustrate iso-recursive types on uni-directionally linked dynamic lists. The
interface of such list objects has methods that also return list objects: a getter for
the tail and an insertion method.
-- The nominal object type
newtype ListObj a =
ListObj (ListInterface a)
-- The structural interface type
type ListInterface a =
Record (
IsEmpty :=: IO
:*: GetHead :=: IO
:*: GetTail :=: IO
:*: SetHead :=: (a
:*: InsHead :=: (a
:*: HNil )
Bool
a
(ListObj a)
-> IO ())
-> IO (ListObj a))
Recall that we had to define a HasField instance whenever we went beyond the
normal ‘objects as records’ approach. This is the case here, too. Each newtype for
iso-recursion has to be complemented by a trivial HasField instance:
instance HasField l (ListInterface a) v =>
HasField l (ListObj a) v
where
hLookupByLabel l (ListObj x) = hLookupByLabel l x
For clarity, we chose the implementation of ListInterface a with two OO
classes: for the empty and non-empty lists. A single OO list class would have sufficed
too. Empty-list objects fail for all getters. Here is the straightforward generator for
empty lists:
Haskell’s overlooked object system
— 1 February 2008 —
59
nilOO self :: IO (ListInterface a)
= returnIO
$ isEmpty .=. returnIO True
.*. getHead .=. failIO "No head!"
.*. getTail .=. failIO "No tail!"
.*. setHead .=. const (failIO "No head!")
.*. insHead .=. reusableInsHead self
.*. emptyRecord
The reusable insert operation constructs a new object of the consOO:
reusableInsHead list head
= do
newCons <- mfix (consOO head list)
returnIO (ListObj newCons)
Non-empty list objects hold a reference for the head, which is accessed by getHead
and setHead. Here is the object generator for non-empty lists:
consOO head tail self
= do
hRef <- newIORef
returnIO
$ isEmpty .=.
.*. getHead .=.
.*. getTail .=.
.*. setHead .=.
.*. insHead .=.
.*. emptyRecord
head
returnIO False
readIORef hRef
returnIO (ListObj tail)
writeIORef hRef
reusableInsHead self
OO programming on nominal objects commences without ado. They can be used
just like record-based OOHaskell objects before. As an example, the following
recursive function prints a given list. One can check that the various method invocations involve nominally typed objects.
printList aList
= do
empty <- aList # isEmpty
if empty
then putStrLn ""
else do
head <- aList # getHead
putStr $ show head
tail <- aList # getTail
putStr " "
printList tail
5.9 Width and depth subtyping
We have used the term subtyping in the informal sense of type-safe type substitutability. That is, we call the object type S to be a subtype of the object type T
if in any well-typed program P the typeability of method invocations is preserved
upon replacing objects of type T with objects of type S. This notion of subtyping is
60
O. Kiselyov and R. Lämmel
to be distinguished from behavioural subtyping, also known as Liskov Substitution
Principle (Liskov & Wing, 1994).
In OOHaskell, subtyping is enabled by the type of the method invocation
operator #. For instance, the function \o -> o # getX has the following inferred
type:
HasField (Proxy GetX) o v => o -> v
This type is polymorphic. The function will accept any object (i.e., record) o provided that it has the method labelled GetX whose type matches the function’s
desired return type v.
A basic form of subtyping or subsumption is width subtyping, whereupon an
object of type S is a subtype of T if the record type S has (at least) all the fields
of T with the exact same type. The HList library readily provides this subtyping
relation, Record.SubType. Corresponding constraints can be added to type signatures (although we recall that Sec. 5.6 devised a constraint technique that is more
convenient for OOHaskell). It is easy to see that if SubType S T holds for some
record types S and T , then substituting an object of type S for an object of type
T preserves the typing of every occurrence of # in a program. No method will be
missing and no method will be of a wrong type.
Width subtyping is only one form of subtyping. There are other subtyping relations, which too preserve the typing of each occurrence of # in a program — in
particular, depth subtyping. While width subtyping allows the subtype to have
more fields than the supertype, depth subtyping allows the fields of the subtype to
relate to the fields of the supertype by subtyping. Typed mainstream OO languages
like Java and C# do not support full depth subtyping.
We will now explore depth subtyping in OOHaskell. We define some new object
types and functions on the one-dimensional printable_point class from Sec. 4.2.5
and its extension colored_point from Sec. 4.3.3. We define a simple-minded onedimensional vector class, specified by two points for the beginning and the end,
which can be accessed by the methods getP1 and getP2:
vector (p1::p) (p2::p) self =
do
p1r <- newIORef p1
p2r <- newIORef p2
returnIO $
getP1
.=. readIORef
.*. getP2
.=. readIORef
.*. print
.=. do self #
self #
.*. emptyRecord
p1r
p2r
getP1 >>= ( # print )
getP2 >>= ( # print )
The local type annotations p1::p and p2::p enforce our intent that the two points
of the vector have the same type. It is clear that objects of type p must be able to
respond to the message print. Otherwise, the type of the points is not constrained.
Our object generator vector is parameterised over the class of points. In C++, the
close analogue is a class template. This example shows that Haskell’s normal forms
Haskell’s overlooked object system
— 1 February 2008 —
61
of polymorphism, combined with type inference, allow us to define parameterised
classes without ado.
We construct two vector objects, v and cv:
testVector = do
p1 <- mfix (printable_point 0)
p2 <- mfix (printable_point 5)
cp1 <- mfix (colored_point 10 "red")
cp2 <- mfix (colored_point 25 "red")
v <- mfix (vector p1 p2)
cv <- mfix (vector cp1 cp2)
-- ... to be continued ...
The former is the vector of two printable points; the latter is the vector of two
colored points. The types of v and cv are obviously different: the type checker will
remind us of this fact if we tried to put both vectors into the same homogeneous
list. The vectors v and cv are not related by width subtyping: indeed, both vectors
agree on method names, but the types of the methods getP1 and getP2 differ. In v,
the method getP1 has the type IO PrintablePoint whereas in cv the same method
has the type IO ColoredPoint. These different result types, PrintablePoint and
ColoredPoint, are related by width subtyping.
The type of cv is a deep subtype of v. In OOHaskell, we may readily use
functions (or methods) that exploit depth subtyping. For instance, we can define
the following function for computing the norm of a vector, and we can pass either
vector v or cv to the function.
norm v =
do
p1 <- v # getP1; p2 <- v # getP2
x1 <- p1 # getX; x2 <- p2 # getX
return (abs (x1 - x2))
The above test code continues thus:
-- ... continued ...
putStrLn "Length of v"
norm v >>= Prelude.print
putStrLn "Length of colored cv"
norm cv >>= Prelude.print
The method invocation operations within norm remain well-typed no matter
which vector, v or cv, we pass to that function. The typing of # is indeed compatible with both width and depth subtyping, and, in fact, their combination. Thus,
the object type S is a subtype of T if the record type S has all the fields of T
whose types are not necessarily the same but related by subtyping in turn. Here
we assume, for now, that subtyping on method types is defined in accordance to
conservative rules (Cardelli & Wegner, 1985; Abadi & Cardelli, 1996). (In the following formulation, without loss of generality, we assume that OOHaskell method
types are monadic function types.) If A1 → · · · → An → IO R is a method type
from T , then there must be a method type in S, with the same method name, and
with a type A′1 → · · · → A′n → IO R′ such that the following relationships hold:
62
O. Kiselyov and R. Lämmel
• A1 , . . . , An must be subtypes of A′1 , . . . , A′n .
• R′ must be a subtype of R.
(contra-variance)
(co-variance)
The above vector example exercises the co-variance of the result type for the getters
getP1 and getP2.
We never had to specifically assert that the types of two objects are related by
width or depth subtyping. This is because in each and every case, the compiler
checks the well-typedness of all method invocations directly, so no separate subtyping rules are needed. We contrast this with type systems like System F≤ , where the
subsumption rules are explicitly asserted. The only place where an OOHaskell
programmer has to make the choice of subtyping relationship explicit is in explicit
narrowing operations. The previously described operation narrow covers width subtyping; the OOHaskell library also includes an operation deep’narrow. For instance, we can place v and cv, into the same homogeneous list:
let vectors = [v, deep’narrow cv]
The operation deep’narrow descends into records, prefixes method arguments
by narrowing, and postfixes method results by narrowing. Deep narrowing is just
another record operation driven by the structure of method types. (We refer to
the source distribution for details.) Deep narrowing is not the only way of dealing
explicitly with depth subtyping in OOHaskell. We may also adopt the union-type
technique as of Sec. 5.5.
5.10 Co-variant method arguments
The variance of argument types is the subject of a significant controversy (Castagna, 1995; Surazhsky & Gil, 2004; Howard et al., 2003). The contravariant rule for method arguments entails type substitutability, i.e., it assures the
type safety of method invocation for all programs. However, argument type contravariance is known to be potentially too conservative. It is often argued that a
co-variant argument type rule is more suitable for modelling real-world problems.
If a method with co-variant argument types happens to receive objects of expected
types, then co-variance is safe — for that particular program. The proponents of
the co-variant argument type rule argue that because of the idiomatic advantages
of the rule we should admit it for those programs where it is safe. It is the job
of the compiler to warn the user when the co-variant rule is used unsafely. Alas,
in the case of Eiffel — the most established language with co-variance — the situation is the following: “No compiler currently available fully implements these
checks and behaviour in those cases ranges from run-time type errors to system
crashes.” (comp.lang.eiffel, 2004).
In this section we demonstrate the restrictiveness of contra-variance for methodargument types and show that OOHaskell’s subtyping naturally supports typesafe co-variance. The faithful implementation of the archetypal example from the
Eiffel FAQ (comp.lang.eiffel, 2004) is contained in the accompanying source code.
Continuing with the vector example from the previous section, we extend vector
Haskell’s overlooked object system
— 1 February 2008 —
63
with a method, moveO for moving the origin of the vector. The method receives the
new origin as a point object.
vector1 (p1::p) (p2::p) self =
do
super <- vector p1 p2 self
returnIO
$ moveO .=. (\pa -> do
p1 <- self # getP1
x <- pa # getX
p1 # moveX $ x)
.*. super
As in the previous section, we construct the vector1 of plain printable points
v1 and the vector1 of colored points cv1. If we intend cv1 to be substitutable
for v1 in all circumstances (by the virtue of depth subtyping), we must follow the
contra-variance rule, which requires the argument pa of moveO be either a plain
printable point (or an instance of its super-type). That requirement is responsible
for the longer-than-expected implementation of moveO. Furthermore, the supertyping requirement on pa precludes moveO’s changing the color of the origin point,
for the vector of colored points. That degrades the expressiveness.
To illustrate the subtyping of the vectors, we define the function that moves the
origin of its vector argument to 0:
move_origin_to_0 varg =
do
zero <- mfix (printable_point 0)
varg # moveO $ zero
We may indeed apply that function to either v1 or cv1. The function is polymorphic
and can take any vector1 of plain points and and its subtypes. The type of cv1 is
truly a deep subtype of the type of v1. (Again, OOHaskell does not require us
to assert the relevant subtype relationship in any way.)
We now turn to co-variant method argument types and so experiment with yet
another class of vectors. We also construct two instances of vector2.
vector2 (p1::p) (p2::p) self =
do
p1r <- newIORef p1
p2r <- newIORef p2
returnIO $
setO .=. writeIORef p1r
-- ... other fields as in vector ...
testVector = do
-- ... test case as before ...
v2 <- mfix (vectors p1 p2)
-- vector of printable points
cv2 <- mfix (vectors cp1 cp2) -- vector of colored points
Like vector1, vector2 provides for setting the origin point; cf. the method setO.
However, vector2 does that in a direct and simple way; also, only vector2 permits
changing the color of the origin point, in a vector of colored points. Although the
64
O. Kiselyov and R. Lämmel
method setO is more convenient and powerful than the method moveO, the method
setO has co-variant argument types — across printable-point and colored-point
vectors. For a vector of colored points, cv2, the argument type of setO must be a
colored point too, i.e., the same type as p1r — otherwise, the mutation writeIORef
cannot be typed.
Hence, the type of cv2 cannot be a subtype of the type of v2 (because setO
breaks the contra-variant argument type rule). An OO system that enforces the
contra-variant rule will not allow us to write functions that can take both v2 and
cv2. For example, we may want to devise the following function:
align_origins va vb =
do
pa <- va # getP1
vb # setO $ pa
It is always safe to apply align_origins to two vector2s of the same type.
OOHaskell does let us pass either two vector2s of printable points (such as
v2) to two vector2s of colored points (such as cv2), and so vector types can be
substitutable — despite a co-variant argument type of set0.
Substitutability is properly restricted for this function:
set_origin_to_0 varg =
do
zero <- mfix (printable_point 0)
varg # setO $ zero
We apply the function to v2, but if we try to apply it to cv2 we get the type error
message about a missing method getColor (which distinguishes colored points from
plain printable points). Likewise, we get an error if we attempt to place both v2
and cv2 in a homogeneous list like this:
let vectors = [v2, deep’narrow cv2]
In this case, we can narrow both vectors to the type of vector though, so that the
offending method setO will be projected out and becomes private.
OOHaskell typechecks actual operations on objects; therefore, OOHaskell
permits methods with co-variant argument types in situations where they are used
safely. The type checker will flag any unsafe use and force the programmer to remove
the offending method. Permitting safe uses of methods with co-variant argument
types required no programming on our part. We get this behaviour for free.
5.11 Anti-patterns for subtyping
We have seen several approaches to the construction of a subtype-polymorphic
collection, as needed for the ‘scribble’ loop in the running shapes example. In the
section on non-OOHaskell encodings, Sec. 3, we had discussed two additional
options:
• The use of HList’s heterogeneous lists.
• The use of “∃” to make the list element type opaque.
Haskell’s overlooked object system
— 1 February 2008 —
65
Albeit one might have expected these options to be of use, they turned out to
be problematic for OO programming with non-extensible Haskell records. In the
combination with OOHaskell (and its extensible records), these two options are
even less attractive.
In first approach, we construct the scribble list as:
let scribble = s1 ‘HCons‘ (s2 ‘HCons‘ HNil)
and use hMap_, Sec. 3.7, to iterate over the list:
hMapM_ (⊥::FunOnShape) scribble
where there must be an instance of type class Apply for FunOnShape, e.g.:
instance ( HasField (Proxy Draw) r (IO ())
, HasField (Proxy RMoveTo) r (Int -> Int -> IO ())
)
=> Apply FunOnShape r (IO ())
where
apply _ x = do
x # draw
(x # rMoveTo) 100 100
x # draw
Haskell’s type class system requires us to provide proper bounds for the instance,
hence the list of the method-access constraints (for “#”, i.e., HasField) above. The
form of these constraints strongly resembles the method types listed in the shape
interface type, Sec. 5.2. One may wonder whether we can somehow use the full type
synonym Shape, in order to constrain the instance. This is not possible in Haskell
because constraints are not first-class citizens in Haskell; we cannot compute them
from types or type proxies — unless we were willing to rely on heavy encoding or
advanced syntactic sugar. So we are doomed to manually infer and explicitly list
such method-access constraints for each such piece of polymorphic code.
The existential quantification approach falls short for essentially the same reason. Assuming a suitable existential envelope and following Sec. 3.6, we can build
scribble as
let scribble = [ HideShape s1, HideShape s2 ]
The declaration of the existential type depends on the function that we want to
apply to the opaque data. When iterating over the list, via mapM_, we only need to
unwrap the HideShape constructor prior to method invocations:
mapM_ ( \(WrapShape shape) -> do
shape # draw
(shape # rMoveTo) 100 100
shape # draw )
scribble
These operations have to be anticipated in the type bound for the envelope:
data OpaqueShape =
forall x. ( HasField (Proxy Draw) x (IO ())
, HasField (Proxy RMoveTo) x (Int -> Int -> IO ())
) => HideShape x
66
O. Kiselyov and R. Lämmel
This approach evidently matches the HList-based technique in terms of encoding
efforts. In both cases, we need to identify type class constraints that correspond
to the (potentially) polymorphic method invocations. This is impractical. Not even
mainstream OO languages with no advanced type inference, require this sort of
type information from the programmer.
Existential quantification can also be used for object encoding, e.g., for wrapping
up self. That lets us, for example, easily implement self-returning methods without
resorting to infinite types. Such use of existential quantification is not practical in
OOHaskell for the same reason: it requires us to exhaustively enumerate all type
classes an object and any of its types are or will be the instances of.
6 Discussion
We will first discuss usability issues of the current OOHaskell library, further constrained by current Haskell implementations. We will then summarise related work
on functional object-oriented programming in Haskell and elsewhere. Finally, we will
list topics for future work — other than just improving usability of OOHaskell.
6.1 Usability issues
6.1.1 Usability of inferred types
So far, we have not shown any type inferred by Haskell for our objects. One may
wonder how readable and comprehensible they are, if they can be used as means of
program understanding, and if a Haskell language extension is needed to improve
the presentation of the inferred types. In upshot, the inferred types are reasonable
for simple OO programming examples, but there is a fuzzy borderline beyond which
the volume and the idiosyncrasies of inferred types injure their usefulness. This
concern suggests an important topic for future work.
Let us see the inferred type of the colored point introduced in Sec. 4.3.1:
ghci6.4> :t mfix $ colored_point (1::Int) "red"
mfix $ colored_point (1::Int) "red" ::
IO (Record
(HCons (Proxy GetColor, IO String)
(HCons (Proxy VarX, IORef Int)
(HCons (Proxy GetX, IO Int)
(HCons (Proxy MoveX, Int -> IO ())
(HCons (Proxy Print, IO ())
HNil))))))
We think that this type is quite readable, even though it reveals the underlying
representation of records (as a heterogeneous list of label-value pairs), and gives
away the proxy-based model for labels. We may hope for a future Haskell implementation whose customisable ‘pretty printer’ for types would present the result of
type inference perhaps as follows:
ghci> :t mfix $ colored_point (1::Int) "red"
mfix $ colored_point (1::Int) "red" ::
Haskell’s overlooked object system
IO ( Record (
GetColor
:*: VarX
:*: GetX
:*: MoveX
:*: Print
:*: HNil ))
:=:
:=:
:=:
:=:
:=:
— 1 February 2008 —
67
IO String
IORef Int
IO Int
(Int -> IO ())
IO ()
The above example dealt with monomorphic objects. Let us also see the inferred
type of a polymorphic object generator, with ‘open recursion left open’. Here is the
(pretty-printed) type of the object generator for colored points:
ghci> :t colored_point
( Num a
, HasField (Proxy GetX) r (IO a1)
, Show a1
) => a
-> String
-> r
-> IO ( Record (
GetColor :=: IO String
:*: VarX
:=: IORef a
:*: GetX
:=: IO a
:*: MoveX
:=: (a -> IO ())
:*: Print
:=: IO ()
:*: HNil ))
The inferred type lists all the fields of an object, both new and inherited. Assumptions about self are expressed as constraints on the type variable r. The object
generator refers to getX (through self), which entails a constraint of the form
HasField (Proxy GetX) r (IO a1). The coordinate type for the point is polymorphic; cf. a for the initial value and a1 for the value retrieved by getX. Since
arithmetics is performed on the coordinate value, this implies bounded polymorphism: only Num-ber types are permitted. We cannot yet infer that a and a1 must
eventually be the same since ‘the open recursion is still open’.
We must admit that we have assumed a relatively eager instance selection in
the previous Haskell session. The Hugs implementation of Haskell is (more than)
eager enough. The recent versions of GHC have become quite lazy. In a session with
contemporary GHC (6.4), the inferred type would comprise the following additional
constraints, which all deal with the uniqueness of label sets as they are encountered
during record extension:
HRLabelSet (HCons
(HCons
likewise for MoveX,
likewise for MoveX,
likewise for MoveX,
(Proxy
(Proxy
Print,
Print,
Print,
MoveX, a -> IO ())
Print, IO ()) HNil)),
GetX
GetX, VarX
GetX, VarX, GetColor
Inspection of the HRLabelSet instances shows that these constraints are all satisfied,
no matter how the type variable a is instantiated. No ingenuity is required. A
simple form of strictness analysis were sufficient. Alas, GHC is consistently lazy in
68
O. Kiselyov and R. Lämmel
resolving even such constraints. Modulo HRLabelSet constraints, the inferred type
seems quite reasonable, explicitly listing all relevant labels and types of the record
components.
6.1.2 Usability of type errors
Due to OOHaskell’s extensive use of type-class-based programming, there is a
risk that type errors may become too complex. We will look at some examples. The
results clearly provide incentive for future work on the subject of type errors.
Let us first attempt to instantiate an abstract class, e.g., abstract_point from
Sec. 5.6. That object generator defined the print method, which invoked getX on
self. The latter is left to be defined in concrete subclasses. If we take the fixpoint
of such an ‘incomplete’ object generator, Haskell’s type checker (here: GHC 6.4)
gives the following error message:
ghci> let x = mfix (abstract_point 7)
No instance for (HasField (Proxy GetX) HNil (IO a))
arising from use of ‘abstract_point’ at <interactive>:1:14-27
Probable fix:
add an instance declaration for (HasField (Proxy GetX) HNil (IO a1))
In the first argument of ‘mfix’, namely ‘(abstract_point 7)’
In the definition of ‘x’: x = mfix (abstract_point 7)
We think that the error message is concise and to the point. The message succinctly lists just the missing field (The suggested ‘probable fix’ is not really helpful
here). In our next scenario, we use a version of abstract_point that comprises an
instantiation test by constraining self through narrow, as discussed in Sec. 5.6:
abstract_point (x_init::a) self =
do
... as before ...
where
_ = narrow self :: Record ( GetX :=: IO a
:*: MoveX :=: (a -> IO ())
:*: HNil )
When we now take the fixpoint again, we get a more complex error message:
ghci> let x = mfix (abstract_point 7)
No instance for (HExtract HNil (Proxy GetX) (IO a),
HExtract HNil (Proxy MoveX) (a -> IO ()),
HasField (Proxy GetX) HNil (IO a1))
arising from use of ‘abstract_point’ at <interactive>:1:14-27
Probable fix: ...
In the first argument of ‘mfix’, namely ‘(abstract_point 7)’
In the definition of ‘x’: x = mfix (abstract_point 7)
Compared to the earlier error message, there are two additional unsatisfied HExtract
constraints. Two out of the three constraints refer to GetX, and they complain about
the same problem: a missing method implementation for getX. The constraint regarding MoveX deals with a pure virtual method that is not used in the object
Haskell’s overlooked object system
— 1 February 2008 —
69
generator. The kinds and numbers of error messages for GetX and MoveX may lead
to confusion; internals of OOHaskell end up at the surface.
In order to improve on such problems, the Haskell type system and its errorhandling part would need to be opened up to allow for problem-specific error messages. We would like to refine Haskell’s type checker so that type error messages
directly refer to the involved OO concepts.
Let us consider yet another scenario. We turn to self-returning methods, as we
discussed them in Sec. 5.3. In the following flawed OOHaskell program, we attempt to return self right away:
self_returning_point (x_init::a) self =
do
super <- printable_point x_init self
returnIO
$ me .=. self -- assumes iso-recursive types
.*. super
The problem will go unnoticed until we try to mfix the generator, at which point
we get a type error:
Occurs check: cannot construct the infinite type:
a
=
Record (HCons (Proxy Me, a)
(HCons (Proxy MutableX, IORef a1)
(HCons (Proxy GetX, IO a1)
(HCons (Proxy MoveX, a1 -> IO ())
(HCons (Proxy Print, IO ()) HNil)))))
Expected type: a -> IO a
Inferred type: a -> IO (Record (HCons (Proxy Me, a)
(HCons (Proxy MutableX, IORef a1)
(HCons (Proxy GetX, IO a1)
(HCons (Proxy MoveX, a1 -> IO ())
(HCons (Proxy Print, IO ()) HNil))))))
In the application ‘self_returning_point 7’
In the first argument of ‘mfix’, namely ‘(self_returning_point 7)’
This error message is rather complex compared to the simple object types that
are involved. Although the actual problem is correctly described, the programmer
receives no help in locating the offending code, me .=. self. The volume of the
error message is the consequence of our use of structural types. One may think that
adding some type synonyms and using them in type signatures should radically
improve the situation. It is true that contemporary Haskell type checkers keep
track of type synonyms. However, an erroneous subexpression may just not be
sufficiently annotated or constrained by its context. Also, the mere coding of type
synonyms is very inconvenient. This situation suggests that a future Haskell type
checker could go two steps further. Our first proposal is to allow for the inference
of type synonyms; think of:
foo x y z = ... -- complex expression on structural object types
type Foo = typeOf foo
-- capture the type in an alias
70
O. Kiselyov and R. Lämmel
(Here, typeOf is an envisaged extension.) Our second proposal is to use type synonyms aggressively for the simplification of inferred types or type portions of error
messages. This is a challenging subject given Haskell’s forms of polymorphism.
The verbosity of OOHaskell error messages may occasionally compare to error
messages in C++ template instantiation, which can be immensely verbose, spanning several dozens of packed lines, and yet boost and similar C++ libraries, which
extensively use templates, are gaining momentum. In general, the clarity of error
messages is undoubtedly an area that needs more research, and such research is being carried out by Sulzmann and others (Stuckey et al., 2004), which OOHaskell
programmers and Haskell compiler writers may take advantage of.
The ultimate conclusion of our discussion of inferred types and type errors is
that such type information needs to be presented to the programmer in an abbreviated and OO-aware fashion. This proposal is based on the observation of OCaml’s
development. Although objects types shown by OCaml are quite concise, that has
not always been the case. In the ML-ART system, the predecessor of OCaml with
no syntactic sugar (Rémy, 1994), the printed inferred types were not unlike the
OOHaskell types we have seen in this section.
“Objects have anonymous, long, and often recursive types that describe all methods
that the object can receive. Thus, we usually do not show the inferred types of programs
in order to emphasise object and inheritance encoding rather than typechecking details.
This is quite in a spirit of ML where type information is optional and is mainly used
for documentation or in module interfaces. Except when trying top-level examples, or
debugging, the user does not often wish to see the inferred types of his programs in a
batch compiler.”
6.1.3 Efficiency of object encoding
Our representation of objects and their types is deliberately straightforward: polymorphic, extensible records of closures. This approach has strong similarities with
prototype-based systems (such as Self (Ungar & Smith, 1987)) in that mutable
fields and method ‘pointers’ are contained in one record. A more efficient representation based on separate method and field tables (as in C++ and Java) is
possible, in principle. Although our current encoding is certainly not optimal, it
is conceptually clearer. This encoding is used in such languages as Perl, Python,
Lua — and is often the first one chosen when adding OO to an existing language.
The efficiency of the current OOHaskell encoding is also problematic for reasons other than separation of fields and methods. For example, although record
extension is constant (run-)time, the field/method lookup is linear search. Clearly,
a more efficient encoding is possible: one representation of the labels in the HList
paper permits a total order among the labels types, which in turn, permits construction of efficient search trees. We may also impose an order on the components
per record type, complete with subtype-polymorphic record extension only to the
right, so that labels can be mapped to array indexes.
In the present paper, we chose conceptual clarity over such optimisations. Furthermore, a non-trivial case study is needed to drive optimisations. Mere improvements in object encoding may be insufficient however. The compilation time of
Haskell’s overlooked object system
— 1 February 2008 —
71
OOHaskell programs and their runtime efficiency is challenged by the number of
heavily nested dictionaries that are implied by our systematic type-class-based approach. It is quite likely that a scalable HList/OOHaskell style of programming
will require compiler optimisations that make type-class-based programming more
efficient — in general.
6.2 Related work
Throughout the paper we referenced related work whenever specific technical aspects suggested to do so. We will complete the picture by a broader discussion.
There are three overall dimensions of related work: foundations of object encoding (cf. Sec. 6.2.1), Haskell extensions for OO (cf. Sec. 6.2.2), and OO encoding in
Haskell (cf. Sec. 6.2.3).
The literature on object encoding is quite extensive. OOHaskell takes advantage of seminal work such as (Cardelli & Wegner, 1985; Abadi & Cardelli, 1996;
Ohori, 1995; Pierce & Turner, 1994; Bruce & Mitchell, 1992). Most often, typed
object encodings are based on polymorphic lambda calculi with subtyping, while
there are also object calculi that start, more directly, from objects or records. Due
to this overwhelming variety, we narrow down the discussion. We identify MLART (Rémy, 1994) by Rémy et al. (see also (Rémy & Vouillon, 1997)) as the closest to OOHaskell — in motivation and spirit, but not in the technical approach.
Hence, Sec. 6.2.1 is entirely focused on ML-ART, without further discussion of less
similar object encodings. The distinguishing characteristic of OOHaskell is the
use of type-class-bounded polymorphism.
6.2.1 The ML-ART object encoding
Both ML-ART and OOHaskell identify a small set of language features that make
functional object-oriented programming possible. In both projects, the aim was to
be able to implement objects — as a library feature. Therefore, several OO styles
can be implemented, for different classes of users and classes of problems. One does
not need to learn any new language and can discover OO programming progressively. Both ML-ART and OOHaskell base their object systems on polymorphic
extensible records. Both OOHaskell and ML-ART deal with mutable objects
(OOHaskell currently neglects functional objects since they are much less commonly used in practise). Both OOHaskell and ML-ART aim at preserving type
inference.
ML-ART adds several extensions to ML to implement objects: records with polymorphic access and extension, projective records, recursive types, implicit existential and universal types. As the ML-ART paper (Rémy, 1994) reports, none of the
extensions are new, but their combination is original and “provides just enough
power to program objects in a flexible and elegant way”.
We make the same claim for OOHaskell, but using a quite different set of
features. What fundamentally sets us apart from ML-ART is the different source
language: Haskell. In Haskell, we can implement polymorphic extensible records
72
O. Kiselyov and R. Lämmel
natively rather than via an extension. We use type-class-based programming to this
end.17 We avoid row variables and their related complexities. Our records permit
introspection and thus let us implement various type-safe cast operations appealing
to different subtyping relationships. For instance, unlike ML-ART, OOHaskell
can compute the most common type of two record types without requiring type
annotations. Quoting from the ML-ART paper:
“The same message print can be sent to points and colored points. However, both of
them have incompatible types and can never be stored in the same list. Some languages
with subtyping allow this set-up. They would take the common interface of all objects
that are mixed in the list as the interface of any single object of the list.”
Unlike ML-ART, we do not rely on existential or implicitly universal types, nor
recursive types. We use value recursion instead. That representation, a record of
recursive closures, abstracts the internal state of the object — its value as well
its type. Haskell helps us overcome what ML-ART calls “severe difficulties” with
value recursion. In ML, the difficulties are serious enough to abandon the value
recursion, despite its attractive features in supporting implicit subtyping, in favour
of more complex object encodings requiring extensions of the type system. The
subtle problem of value recursion is responsible for complicated and elaborate rules
of various mainstream OO languages that prescribe what an object constructor may
or may not do. The ML-ART paper mentions an unpublished attempt (by Pierce)
to take advantage of the facts that fixpoints in a call-by-name language are always
safe and that call-by-name can be emulated in a call-by-value language with the
help of extra abstraction (thunks). However, in that attempted implementation the
whole message table had to be rebuilt every time an object sends a message to self
and so that approach was not pursued further. Our simple scheme of Sec. 4.4 seems
to answer the ML-ART challenge — “to provide a clean and efficient solution that
permits restricted form of recursion on non-functional values.”
ML-ART uses a separate method table, whereas OOHaskell uses a single record
for both mutable fields and method ‘pointers’. The ML-ART encoding is more efficient than that of OOHaskell. All instances of an object (class) literally share
the same method table. ML-ART (and OCaml) is also more efficient simply because more elements of the object encoding are natively implemented. By contrast,
OOHaskell’s type system is programmed through type-class-based programming.
As a result, OOHaskellis definitely less fit for practical OO software development
than ML-ART (or rather OCaml).
6.2.2 Haskell language extensions
There were attempts to bring OO to Haskell by a language extension. An early
attempt is Haskell++ (Hughes & Sparud, 1995) by Hughes and Sparud. The authors motivated their extension by the perception that Haskell lacks the form of
17
The fact that such records are realisable in Haskell at all has been unknown, until the HList
paper, which we published in 2004. The assumed lack of extensible records in Haskell was
selected as prime topic for discussion at the Haskell 2003 workshop (H. Nilsson, 2003).
Haskell’s overlooked object system
— 1 February 2008 —
73
incremental reuse that is offered by inheritance in object-oriented languages. Our
approach uses common extensions of the Hindley/Milner type system to provide
the key OO notions. So in a way, Haskell’s fitness for OO programming just had to
be discovered, which is the contribution of this paper.
O‘Haskell (Nordlander, 1998; Nordlander, 2002) is a comprehensive OO variation
on Haskell designed by Nordlander. O‘Haskell extends Haskell with reactive objects
and subtyping. The subtyping part is a substantial extension. The reactive object
part combines stateful objects and concurrent execution, again a major extension.
Our development shows that no extension of Haskell is necessary for stateful objects,
and the details of the object system can be programmed in Haskell.
Another relevant Haskell variation is Mondrian. In the original paper on the
design and implementation of Mondrian (Meijer & Claessen, 1997), Meijer and
Claessen write: “The design of a type system that deals with subtyping, higherorder functions, and objects is a formidable challenge ...”. Rather than designing
a very complicated language, the overall principle underlying Mondrian was to obtain a simple Haskell dialect with an object-oriented flavour. To this end, algebraic
datatypes and type classes were combined into a simple object-oriented type system with no real subtyping, with completely co-variant type-checking. In Mondrian,
runtime errors of the kind “message not understood” are considered a problem akin
to partial functions with non-exhaustive case discriminations. OOHaskell raises
the bar by providing proper subtyping (“all message will be understood”) and other
OO concepts in Haskell without extending the Haskell type system.
6.2.3 Object encodings for Haskell
This paper may claim to provide the most authoritative analysis of possible object
encodings in Haskell; cf. Sec. 3. Previous published work on this subject has not
addressed general (functional) object-oriented programming, but it has focused instead on the import of foreign libraries or components into Haskell (Finne et al., 1999;
Shields & Peyton Jones, 2001; Pang & Chakravarty, 2004). The latter problem domain makes important simplifying assumptions:
•
•
•
•
•
•
Object state does not reside in Haskell data.
There are only (opaque) object ids referring to the foreign site.
State is solely accessed through methods (“properties”).
Haskell methods are (often generated) stubs for foreign code.
As a result, such OO styles just deal with interfaces.
No actual (sub)classes are written by the programmer.
In this restricted context, one approach is to use phantom types for recording
inheritance relationships (Finne et al., 1999). Each interface is represented by an
(empty) datatype with a type parameter for extension. After due consideration, it
turns out that this approach is a restricted version of what Burton called “type
extension through polymorphism”: even records can be made extensible through
the provision of a polymorphic dummy field (Burton, 1990). Once we do not maintain Haskell data for objects, there is no need to maintain a record type, but the
74
O. Kiselyov and R. Lämmel
extension point is a left over, and it becomes a phantom. We have “re-generalised”
the phantom approach in Sec. 3.2.
Another approach is to set up a Haskell type class to represent
the subtyping relationship among interfaces (Shields & Peyton Jones, 2001;
Pang & Chakravarty, 2004) where each interface is modelled as a dedicated (empty)
Haskell type. We have enhanced this approach by state in Sec. 3.5.
Based on our detailed analysis of both approaches, we submit that the second
approach seems to be slightly superior to the first one, while both approaches are
too cumbersome for actual functional OO programming.
Not in peer-referred publications, but in Haskell coding practise, some sorts
of OO-like encodings are occasionally found. For instance, it is relatively well
understood that Haskell’s type classes allow for interface polymorphism or for
abstract classes (type classes) vs. concrete classes (type class instances). As
of writing, the published Haskell reference solution for the shapes example,
http://www.angelfire.com/tx4/cus/shapes/, is a simple-to-understand encoding that does not attempt to maximise reuse among data declarations and accessors.
The encoding is specialised to the specific problem; the approach may fail to scale.
The encoding also uses existentials for handling subtype-polymorphic collections,
which is an inherently problematic choice, as we have shown in Sec. 5.11.
6.3 More future work
We have focused on mutable objects so far; studying functional objects appears to
be a natural continuation of this work, even though functional objects are of much
less practical relevance.
The notion of object construction as a multi-stage computation (cf. Sec. 4.4)
merits further exploration (as well as the clarification of the relationship with environment classifiers (Taha & Nielsen, 2003)).
OOHaskell should be elaborated to cover general forms of reflective programming and, on the top of that, general forms of aspect-oriented programming. A
simple form of reflection is already provided in terms of the type-level encoding
of records. We can iterate over records and their components in a generic fashion.
Further effort is needed to cover more advanced forms of reflection such as the
iteration over the object pool, or the modification of object generators.
Another promising elaboration of OOHaskell would be its use for the reusable
representation of design-pattern solutions.
7 Concluding remarks
The present paper addresses the intellectual challenge of seeing if the conventional
OO idioms can at all be implemented in Haskell (short of writing a compiler for
an OO language in Haskell). Peyton Jones and Wadler’s paper on imperative programming in Haskell (Peyton Jones & Wadler, 1993) epitomises such an intellectual tradition for the imperative paradigm. The same kind of intellectual challenge,
‘paradigm assimilation’, is addressed by FC++ (McNamara & Smaragdakis, 2004),
Haskell’s overlooked object system
— 1 February 2008 —
75
which implements in C++ the quintessential Haskell features: type inference, higherorder functions, non-strictness. The present paper, conversely, faithfully (i.e., in a
similar syntax and without global program transformation) realises a principal C++
trait — OO programming. According to Peyton Jones, Haskell is “the world’s finest
imperative programming language” (Peyton Jones, 2001). We submit that Haskell
is also a bleeding-edge OO programming language, while we readily restrict this
claim to mere OO language-design capability; much more work would be needed to
enable scalable OO software development with Haskell.
We have discovered an object system for Haskell that supports stateful objects,
inheritance and subtype polymorphism. We have implemented OO as a Haskell
library, OOHaskell, based on the polymorphic, extensible records with introspection and subtyping provided by the HList library (Kiselyov et al., 2004). Haskell
programmers can use OO idioms if it suits the problem at hand. We have demonstrated that OOHaskell programs are very close to the textbook OO code, which
is normally presented in mainstream OO languages. OOHaskell’s deviations are
appreciated. The OOHaskell library offers a comparatively rich combination of
OO idioms. Most notably, we have implemented parameterised classes, constructor methods, abstract classes, pure virtual methods, single inheritance, multiple
inheritance, object composition, structural types, and nominal types. The choice of
Haskell as a base language has allowed us to deliver extensive type inference, firstclass classes, implicit polymorphism of classes, and more generally: programmable
OO type systems. Starting from the existing OOHaskell library and the corresponding sample suite, one can explore OO language design, without the need to
write a compiler.
The present paper settles the question that hitherto has been open. The conventional OO idioms in their full generality are expressible in current Haskell without
any new extensions. It turns out, Haskell 98 plus multi-parameter type classes with
functional dependencies are sufficient. This combination is well-formalised and reasonably understood (Stuckey & Sulzmann, 2005). Even overlapping instances are
not essential (yet using them permits a more convenient representation of labels,
and a more concise implementation of some type-level functionality). The fact that
we found a quite unexpected (and unintended) use of the existing Haskell features is
reminiscent of the accidental discovery of C++ template meta-programming. The
latter is no longer considered an exotic accident or a type hack — rather, a real
feature of the language (Czarnecki et al., 2003), used in the Standard Template
Library and described in popular C++ books, e.g., (Alexandrescu, 2001).
Haskell has let us move beyond the mere curiosity of implementing OO idioms to
the point of making contributions to open and controversial OO problems. Haskell
has let us concisely specify and enforce the restrictions on the behaviour of object
constructors (preventing the constructor access not-yet-fully constructed objects).
The object encoding with recursive records can be made safe. Also, we were able to
effortlessly implement fine-grain notions of width and depth subtyping, with respect
to particular object operations, and thus safely permit methods with co-variant
argument subtyping. Not only OOHaskell is able to automatically compute the
least general interface of a heterogeneous collection of objects (through semi-implicit
76
O. Kiselyov and R. Lämmel
upcasts) and make the collection homogeneous, but it provides the means for safe
downcasts. Moreover, downcasts that cannot possibly succeed are flagged as type
errors. These are capabilities that go beyond state-of-the-art functional objectoriented programming with OCaml.
Just as C++ has become the laboratory for generative programming (Czarnecki et al., 2003) and lead to such applications as
FC++ (McNamara & Smaragdakis, 2004) and Boost (http://www.boost.org/),
we contend that (OO)Haskell would fit as the laboratory for advanced and typed
OO language design. All our experiments have shown that (OO)Haskell indeed
supports a good measure of experimentation — all without changing the type
system and the compiler.
Acknowledgements
We thank Keean Schupke for his major contributions to the HList and OOHaskell libraries. We thank Chung-chieh Shan for very helpful discussions. We also gratefully acknowledge feedback from Robin Green, Bryn Keller, Chris Rathman and several other
participants in mailing list or email discussions. The second author presented this work
at an earlier stage at the WG2.8 meeting (Functional Programming) in November 2004
at West Point. We are grateful for feedback received at this meeting.
References
Abadi, M., & Cardelli, L. (1996). A Theory of Objects. Monographs in Computer Science.
New York, NY: Springer-Verlag.
Abadi, M., Cardelli, L., Pierce, B., & Plotkin, G. 1989 (Jan.). Dynamic typing in a
statically-typed language. Pages 213–227 of: 16th ACM Conference on Principles of
Programming Languages.
Abadi, M., Cardelli, L., Pierce, B., & Plotkin, G. (1991). Dynamic typing in a staticallytyped language. TOPLAS, 13(2), 237–268.
Aho, A.V., Sethi, R., & Ullman, J.D. (1986). Compilers. principles, techniques and tools.
Addison-Wesley.
Alexandrescu, A. (2001). Modern C++ Design. Pearson Education.
Bayley, A. 2005 (June). Functional Programming vs. Object Oriented Programming.
Monad.Reader, http://www.haskell.org/tmrwiki/FpVsOo.
Bruce, K.B., & Mitchell, J.C. (1992). PER models of subtyping, recursive types and
higher-order polymorphism. Pages 316–327 of: POPL 1992: Proc. of the 19th ACM
SIGPLAN-SIGACT symposium on Principles of programming languages. ACM Press.
Bruce, K.B., Schuett, A., van Gent, R., & Fiech, A. (2003). PolyTOIL: A type-safe
polymorphic object-oriented language. TOPLAS, 25(2), 225–290.
Burton, F.W. (1990). Type extension through polymorphism. TOPLAS, 12(1), 135–138.
Cardelli, L., & Wegner, P. (1985). On Understanding Types, Data Abstraction, and
Polymorphism. ACM Computing Surveys, 17(4), 471–522.
Castagna, G. (1995). Covariance and contravariance: Conflict without a cause. TOPLAS,
17(3), 431–447.
Chen, K., Hudak, P., & Odersky, M. (1992). Parametric type classes. Pages 170–181 of:
Proceedings of the 1992 ACM Conference on LISP and Functional Programming. ACM
Press.
Haskell’s overlooked object system
— 1 February 2008 —
77
comp.lang.eiffel. 2004 (17 Apr.).
Frequently Asked Questions (FAQ).
http://www.faqs.org/faqs/eiffel-faq/.
Cook, W. R. (1989). A Denotational Semantics of Inheritance. Ph.D. thesis, Brown
University.
Cook, W.R., Hill, W., & Canning, P.S. (1990). Inheritance is not subtyping. Pages 125–
135 of: POPL ’90: Proceedings of the 17th ACM SIGPLAN-SIGACT Symposium on
Principles of Programming Languages. New York, NY, USA: ACM Press.
Czarnecki, K., O’Donnell, J.T., Striegnitz, J., & Taha, W. (2003). DSL implementation
in MetaOCaml, Template Haskell, and C++. Pages 51–72 of: Lengauer, C., Batory,
D.S., Consel, C., & Odersky, M. (eds), Domain-specific program generation. LNCS, vol.
3016. Springer-Verlag.
Duck, G.J., Peyton Jones, S.L., Stuckey, P.J., & Sulzmann, M. (2004). Sound and Decidable Type Inference for Functional Dependencies. Pages 49–63 of: Schmidt, D.A.
(ed), Proceedings, 13th European Symposium on Programming, ESOP 2004, Barcelona,
Spain, March 29 - April 2, 2004. LNCS, vol. 2986. Springer-Verlag.
Finne, S., Leijen, D., Meijer, E., & Peyton Jones, S.L. (1999). Calling hell from heaven
and heaven from hell. Pages 114–125 of: ICFP ’99: Proceedings of the fourth ACM
SIGPLAN International Conference on Functional Programming. New York, NY, USA:
ACM Press.
Gamma, E., Helm, R., Johnson, R., & Vlissides, J. (1994). Design patterns: Elements of
reusable object-oriented software. Addison-Wesley.
Gaster, B.R., & Jones, M.P. 1996 (Nov.). A Polymorphic Type System for Extensible
Records and Variants. Technical report NOTTCS-TR-96-3. University of Nottingham,
Department of Computer Science.
H.
Nilsson.
(2003).
The
Future
of
Haskell
discussion
at
the
Haskell
Workshop.
Message
on
the
Haskell
mailing
list,
http://www.mail-archive.com/haskell\spacefactor\@mhaskell.org/msg13366.html.
Hallgren, T. (2001).
Fun with functional dependencies.
Joint Winter Meeting of the Departments of Science and Computer Engineering, Chalmers University of Technology and Goteborg University, Varberg, Sweden, Jan. 2001.
http://www.cs.chalmers.se/~hallgren/Papers/wm01.html.
Howard, M., Bezault, E., Meyer, B., Colnet, D., Stapf, E., Arnout, K., & Keller, M. 2003
(27 Apr.). Type-safe covariance: Competent compilers can catch all catcalls. Work done
as part of Eiffel language standardization by the TC39-TG4 committee of ECMA; Draft;
Available at http://www.inf.ethz.ch/~meyer/ongoing/covariance/recast.pdf.
Hughes,
J.
2002
(23
Aug.).
Re:
More
suitable
data
structure
needed.
Message
on
the
Haskell
mailing
list,
http://www.haskell.org/pipermail/haskell/2002-August/010335.html.
Hughes, J., & Sparud, J. (1995). Haskell++: An Object-Oriented Extension of Haskell.
Proc. of Haskell Workshop, La Jolla, California. YALE Research Report DCS/RR-1075.
Jones, M.P. (1992). A theory of qualified types. Pages 287–306 of: Symposium proceedings
on 4th European Symposium on Programming. Springer-Verlag.
Jones, M.P. (1995). Simplifying and improving qualified types. Pages 160–169 of: Proceedings of the 7th International Conference on Functional Programming Languages and
Computer Architecture. ACM Press.
Jones, M.P. (2000). Type Classes with Functional Dependencies. Pages 230–244 of:
Proceedings of the 9th European Symposium on Programming Languages and Systems.
Springer-Verlag.
Kiselyov, O., Lämmel, R., & Schupke, K. (2004).
Strongly typed heterogeneous collections.
ACM SIGPLAN Workshop on Haskell.
ACM Press.
See
78
O. Kiselyov and R. Lämmel
http://www.cwi.nl/~ralf/HList/ for an extended technical report and for the source
distribution.
Lämmel, R., & Peyton Jones, S.L. (2003). Scrap your boilerplate: a practical design
pattern for generic programming. ACM SIGPLAN Notices, 38(3), 26–37. Proc. of the
ACM SIGPLAN Workshop TLDI 2003.
Launchbury, J., & Peyton Jones, S.L. (1995). State in Haskell. Lisp and Symbolic Computation, 8(4), 293–342.
Leroy, Xavier, et al. . 2004 (July). The Objective Caml system, release 3.08, Documentation
and user’s manual. http://caml.inria.fr/ocaml/htmlman/index.html.
Liskov, B., & Wing, J.M. (1994). A Behavioral Notion of Subtyping. TOPLAS, 16(6),
1811–1841.
McBride, C. (2002). Faking It (Simulating Dependent Types in Haskell). Journal of
Functional Programming, 12(4–5), 375–392.
McNamara, B., & Smaragdakis, Y. (2004). Functional Programming with the FC++
Library. Journal of Functional Programming, 14(4), 429–472.
Meijer, E., & Claessen, K. (1997). The Design and Implementation of Mondrian. ACM
SIGPLAN Haskell Workshop. ACM Press.
Neubauer, M., Thiemann, P., Gasbichler, M., & Sperber, M. (2001). A Functional Notation
for Functional Dependencies. Pages 101–120 of: Proc. 2001 ACM SIGPLAN Haskell
Workshop, Firenze, Italy, September 2001.
Neubauer, M., Thiemann, P., Gasbichler, M., & Sperber, M. (2002). Functional logic
overloading. Pages 233–244 of: Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. ACM Press.
Nordlander, J. (1998). Pragmatic Subtyping in Polymorphic Languages. Pages 216–227 of:
Berman, M., & Berman, S. (eds), Proceedings of the third ACM SIGPLAN international
conference on functional programming (ICFP-98). ACM SIGPLAN Notices, vol. 34, 1.
New York: ACM Press.
Nordlander, J. (2002). Polymorphic subtyping in O’Haskell. Science of computer programming, 43(2–3), 93–127. Also in the Proceedings of the APPSEM Workshop on
Subtyping and Dependent Types in Programming, Ponte de Lima, Portugal, 2000.
Ohori, A. (1995). A polymorphic record calculus and its compilation. TOPLAS, 17(6),
844–895.
Pang, A.T.H., & Chakravarty, M.M.T. (2004). Interfacing Haskell with Object-Oriented
Languages. Pages 20–35 of: P.W. Trinder and G. Michaelson and R. Pena (ed), Implementation of Functional Languages, 15th International Workshop, IFL 2003, Edinburgh,
UK, September 8-11, 2003, Revised Papers. LNCS, vol. 3145. Springer-Verlag.
Peyton Jones, S.L. (2001). Tackling the Awkward Squad: monadic input/output, concurrency, exceptions, and foreign-language calls in Haskell. Pages 47–96 of: Hoare, C.A.R.,
Broy, M., & Steinbrueggen, R. (eds), Engineering theories of software construction,
Marktoberdorf Summer School 2000. NATO ASI Series. IOS Press.
Peyton Jones, S.L., & Wadler, P. 1993 (Jan.). Imperative functional programming. Pages
71–84 of: the symposium on principles of programming languages (POPL ’93). ACM.
Peyton Jones, S.L., Jones, M.P., & Meijer, E. (1997). Type classes: exploring the design
space. Launchbury, J. (ed), Haskell Workshop.
Pierce, B.C., & Turner, D.N. (1994). Simple Type-Theoretic Foundations for ObjectOriented Programming. Journal of functional programming, 4(2), 207–247.
Rémy, D. (1994). Programming Objects with ML-ART: An extension to ML with Abstract
and Record Types. Pages 321–346 of: Hagiya, M., & Mitchell, J.C. (eds), International
Haskell’s overlooked object system
— 1 February 2008 —
79
Symposium on Theoretical Aspects of Computer Software. LNCS, no. 789. Sendai,
Japan: Springer-Verlag.
Rémy, D., & Vouillon, J. (1997). Objective ML: a simple object-oriented extension of
ML. Pages 40–53 of: POPL ’97: Proceedings of the 24th ACM SIGPLAN-SIGACT
Symposium on Principles of Programming Languages. New York, NY, USA: ACM
Press.
Shields, M., & Peyton Jones, S.L. (2001).
Object-Oriented Style Overloading for Haskell.
ENTCS, 59(1).
An extended TR is available from
http://research.microsoft.com/Users/simonpj/Papers/oo-haskell/.
Siek, J., Gregor, D., Garcia, R., Willcock, J., Järvi, J., & Lumsdaine, A. (2005). Concepts
for C++0x. Tech. rept. N1758=05-0018. ISO/IEC JTC 1, Information Technology,
Subcommittee SC 22, Programming Language C++.
Stuckey, P. J., & Sulzmann, M. (2005). A Theory of Overloading. TOPLAS. To appear.
Stuckey, P. J., Sulzmann, M., & Wazny, J. (2004). Improving type error diagnosis. Pages
80–91 of: Proc. of haskell’04. ACM Press.
Surazhsky, V., & Gil, J.Y. (2004). Type-safe covariance in C++. Pages 1496–1502 of:
SAC ’04: Proceedings of the 2004 ACM Symposium on Applied Somputing. ACM Press.
Taha, W., & Nielsen, M.F. (2003). Environment classifiers. Pages 26–37 of: POPL ’03:
Proceedings of the 30th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. New York, NY, USA: ACM Press.
Ungar, D., & Smith, R. B. (1987). Self: The power of simplicity. Pages 227–242 of:
OOPSLA 1987: Conference Proceedings on Object-Oriented Programming Systems, Languages and Applications. ACM Press.
Zenger, M., & Odersky, M. 2004 (Mar.). Independently Extensible Solutions to the Expression Problem. Tech. rept. Ecole Polytechnique Fdérale de Lausanne. Technical Report
Nr. 200433.
| 2cs.AI
|
1
Minimax Rate-Optimal Estimation of Divergences
between Discrete Distributions
Yanjun Han, Student Member, IEEE, Jiantao Jiao, Student Member, IEEE, and Tsachy Weissman, Fellow, IEEE.
arXiv:1605.09124v2 [cs.IT] 24 Nov 2016
Abstract
We refine the general methodology in [1] for the construction and analysis of essentially minimax estimators for a wide class
of functionals of finite dimensional parameters, and elaborate on the case of discrete distributions with support size S comparable
with the number of observations n. Specifically, we determine the “smooth” and “non-smooth” regimes based on the confidence
set and the smoothness of the functional. In the “non-smooth” regime, we apply an unbiased estimator for a suitable polynomial
approximation of the functional. In the “smooth” regime, we construct a general version of the bias-corrected Maximum Likelihood
Estimator (MLE) based on Taylor expansion.
We apply the general methodology to the problem of estimating the KL divergence between two discrete probability measures
P and Q from empirical data in a non-asymptotic and possibly large alphabet setting. We construct minimax rate-optimal estimators
for D(P kQ) when the likelihood ratio is upper bounded by a constant which may depend on the support size, and show that
the performance of the optimal estimator with n samples is essentially that of the MLE with n ln n samples. Our estimator is
adaptive in the sense that it does not require the knowledge of the support size nor the upper bound on the likelihood ratio. We
show that the general methodology results in minimax rate-optimal estimators for other divergences as well, such as the Hellinger
distance and the χ2 -divergence. Our approach refines the Approximation methodology recently developed for the construction of
near minimax estimators of functionals of high-dimensional parameters, such as entropy, Rényi entropy, mutual information and
`1 distance in large alphabet settings, and shows that the effective sample size enlargement phenomenon holds significantly more
widely than previously established.
Index Terms
Divergence estimation, KL divergence, multivariate approximation theory, Taylor expansion, functional estimation, maximum
likelihood estimator, high dimensional statistics, minimax lower bound
I. I NTRODUCTION
Given jointly independent m samples from P = (p1 , · · · , pS ) and n samples from Q = (q1 , · · · , qS ) over some unknown
common alphabet of size S, consider the problem of estimating a functional of the distribution of the following form:
F (P, Q) =
S
X
f (pi , qi )
(1)
i=1
where f : A → R is a continuous function with some A ⊂ [0, 1]2 . Note that by allowing f to solely depend on p, this
problem generalizes the functional estimation problem considered in [1]. Among the most fundamental of such functionals is
the f -divergence [2]
Z
S
X
pi
dP
f
Df (P kQ) = f
dQ =
qi
(2)
dQ
qi
i=1
for some convex function f with f (1) = 0. The f -divergence serves as the fundamental information contained in binary
statistical models [3] and enjoys numerable applications in information theory [4] and statistics [5].
Among many f -divergences, we focus on the estimation problem of the Kullback–Leibler (KL) divergence (with f (t) =
t ln t − t + 1) in this paper, and the general approach naturally extends to the Hellinger distance and χ2 -divergence. The
KL divergence is an important measure of the discrepancy between two discrete distributions P = (p1 , · · · , pS ) and Q =
(q1 , · · · , qS ), defined as [6]
(PS
pi
if P Q,
i=1 pi ln qi
(3)
D(P kQ) =
+∞
otherwise,
where P Q denotes that the absolute continuity of P with respect to Q. Like the entropy and mutual information [7], the KL
divergence is a key information theoretic measure arising naturally in data compression [8], communications [9], probability
Yanjun Han, Jiantao Jiao, and Tsachy Weissman are with the Department of Electrical Engineering, Stanford University, CA, USA. Email: {yjhan, jiantao,
tsachy}@stanford.edu. The material in this paper was presented in part at the 2016 IEEE International Symposium on Information Theory and Its Applications
(ISITA), Monterey, USA.
2
theory [10], statistics [11], optimization [12], machine learning [13], [14], and many other disciplines. Throughout the paper
we use the squared error loss, i.e., the risk function for any estimator D̂ is defined as
L(D̂; P, Q) , E(P,Q) |D̂ − D(P kQ)|2 .
The maximum risk of an estimator D̂, and the minimax risk in estimating D(P kQ) are defined as
Rmaximum (D̂; U) ,
sup L(D̂; P, Q),
(4)
(5)
(P,Q)∈U
Rminimax (U) , inf
sup L(D̂; P, Q)
(6)
D̂ (P,Q)∈U
respectively, where U is a given collection of probability measures (P, Q), and the infimum is taken over all possible estimators
D̂. We aim to obtain the minimax risk Rminimax (U) for some properly chosen U.
Notations: for non-negative sequences aγ , bγ , we use the notation aγ . bγ to denote that there exists a universal constant
a
C such that supγ bγγ ≤ C, and aγ & bγ is equivalent to bγ . aγ . Notation aγ bγ is equivalent to aγ . bγ and bγ . aγ .
a
Notation aγ bγ means that lim inf γ bγγ = ∞, and aγ bγ is equivalent to bγ aγ . We write a ∧ b = min{a, b} and
d
a ∨ b = max{a, b}. Moreover, polyn denotes the set of all d-variate polynomials of degree no more than n, and En [f ; I]
denotes the distance of the function f to the space polydn in the uniform norm k · k∞,I on I ⊂ Rd . All logarithms are in the
natural base.
A. Background and main results
There have been several attempts to estimate the KL divergence for the continuous case, see [15]–[20] and references therein.
These approaches usually do not operate in the minimax framework, and focus on consistency but not rates of convergence,
unless strong smoothness conditions on the densities are imposed to achieve the parametric rate (i.e., Θ(n−1 ) in mean squared
error). In the discrete setting, [21] and [22] proved consistency of some specific estimators without arguing minimax optimality.
We note that in the discrete case, if the alphabet size S is fixed and the number of samples m, n go to infinity, the standard
Hájek–Le Cam theory of classical asymptotics shows that the plug-in approach is asymptotically efficient [23, Thm. 8.11,
Lemma 8.14]. The key challenge we face in the discrete setting is the regime where the support size S can be comparable to
or even larger than the number of observations m, n, which classical analyses do not address.
Now we consider the estimation of KL divergence between discrete distributions in a large-alphabet setting. For the choice
of U, it may appear natural to allow P to be any distribution which is absolutely continuous with respect to Q with alphabet
size S, i.e.,
US = {(P, Q) : P, Q ∈ MS , P Q}
(7)
where MS denotes the set of all probability measures with support size S. However, in this case, it turns out to be impossible
to estimate the KL divergence in the minimax sense, i.e., Rminimax (US ) = ∞ for any configuration (S, m, n) with S ≥ 2.
Intuitively, this is because that the observation from the Multinomial model depends continuously on (P, Q) while the KL
divergence does not at extremal points. A rigorous statement and proof of this result is given in Lemma 21 of the Appendix.
It seems natural then to consider an alternative uncertainty set with bounded likelihood ratio:
pi
US,u(S) = {(P, Q) : P, Q ∈ MS ,
≤ u(S), ∀i}
(8)
qi
where u(S) ≥ 1 is an upper bound on the likelihood ratio. Since u(S) = 1 results in the trivial case where D(P kQ) ≡ 0,
throughout we will assume that u(S) ≥ c for some constant c > 1.
The main result of this paper is as follows.
Theorem 1. For m & S/ ln S, n & Su(S)/ ln S, u(S) & (ln S)2 and ln S & ln(m ∨ n), we have
2
S
Su(S)
(ln u(S))2
u(S)
+
+
+
.
Rminimax (US,u(S) )
m ln m
n ln n
m
n
(9)
Furthermore, our estimator D̂A in Section III achieves this bound under the Poisson sampling model, and is adaptive in the
sense that it does not require knowledge of S or u(S).
The following corollary is a direct consequence of Theorem 1. Note that ln S & ln n and n & Su(S)/ ln S have already
implied that ln S & ln u(S), and thus ln(Su(S)) ln S.
Corollary 1. For our KL divergence estimator, the maximum mean squared error vanishes provided that m S/ ln S and
n Su(S)/ ln S. Moreover, if m . S/ ln S or n . Su(S)/ ln S, then the maximum risk of any estimator for KL divergence
is bounded away from zero.
3
Next we consider the plug-in approach in the context of minimax rate-optimality. Since it is possible that p̂i > 0 and q̂i = 0
for some i ∈ {1, · · · , S}, where Pm = (p̂1 , · · · , p̂S ), Qn = (q̂1 , · · · , q̂S ) are the respective empirical probability distributions,
the direct plug-in estimate D(Pm kQn ) may be infinity with positive probability. Hence, we use the following modification of
the direct plug-in approach: when we observe that p̂i > 0 and q̂i = 0, since naturally q̂i is an integral multiple of 1/n, we
manually change the value of q̂i to the closed lattice 1/n of zero. More precisely, we define
1
1
0
∨ q̂1 , · · · , ∨ q̂S
(10)
Qn =
n
n
and use the estimator D(Pm kQ0n ) to estimate the KL divergence. Note that Q0n may not be a probability distribution (in which
case D(Pm kQ0n ) is extended in the obvious way). The performance of this modified plug-in approach is summarized in the
following theorem.
Theorem 2. Under the Poisson sampling model, the modified plug-in estimator D(Pm kQ0n ) satisfies
2
(ln u(S))2
Su(S)
u(S)
S
+
Rmaximum (D(Pm kQ0n ); US,u(S) ) .
+
+
.
m
n
m
n
Moreover, for m ≥ 15S and n ≥ 4Su(S), we have
Rmaximum (D(Pm kQ0n ); US,u(S) )
&
Su(S)
S
+
m
n
2
+
(ln u(S))2
u(S)
+
.
m
n
(11)
(12)
The following corollary on the minimum sample complexity is immediate.
Corollary 2. The worst-case mean squared error of the modified plug-in estimator D(Pm kQ0n ) vanishes if and only if m
S ∨ (ln u(S))2 and n Su(S).
Hence, compared with the mean squared error or the minimum sample complexity of the modified plug-in approach, the
optimal estimator enjoys a logarithmic improvement. Note that (ln u(S))2 . (ln S)2 S is negligible under the condition in
Theorem 1, so there is no counterpart of m (ln u(S))2 in Corollary 1. Specifically, the performance of the optimal estimator
with (m, n) samples is essentially that of the plug-in approach with (m ln m, n ln n) samples, which is another manifestation
of the effective sample size enlargement phenomenon [1], [24]. Note that in the KL divergence example, the modified plug-in
estimator D(Pm kQ0n ) essentially exploits the plug-in idea.
After our submission of this work to arXiv, an independent study of the same problem was presented in ISIT 2016 [25]
without the construction of the optimal estimator, which was added to the full version [26] that appeared later on arXiv.
Specifically, the main result (i.e., Theorem 1) was also obtained in [26], while there are some differences. First, our estimator
is agnostic to both the support size S and the upper bound u(S) on the likelihood ratio, while the estimator in [26] requires
2
both. Second, as for Theorem 2, there is an unnecessary additional term (lnmS) in the upper bound (11) of the plug-in approach
in [26], though there is a minor difference between our choices of the plug-in estimator. Third, and most significant, [26] is
dedicated exclusively to the KL divergence case, while in our paper we propose a general approximation-based methodology
for the estimation of a wide class of functionals, with the estimation of KL divergence serving as the main example for concrete
illustration of the concepts. As additional examples, following the general recipe in the next subsection and the later analysis,
the result on estimating the L1 distance in [24] can be recovered, and for the Hellinger distance and the χ2 -divergence [2]
S
H 2 (P, Q) ,
χ2 (P, Q) ,
1X √
√ 2
( pi − qi )
2 i=1
(PS p2
i
i=1 qi − 1 if P Q,
+∞
otherwise
(13)
(14)
we can similarly obtain the following results on the optimal estimation rates in the large-alphabet setting.
Theorem 3. For m ∧ n & S/ ln S and ln S & ln(m ∨ n), for Hellinger distance we have
2
1
S
+
inf
sup
E(P,Q) T̂ − H 2 (P, Q)
(m ∧ n) ln(m ∧ n) m ∧ n
T̂ P ∈MS ,Q∈MS
(15)
and the estimator in Section V achieves this bound without the knowledge of S under the Poisson sampling model.
Theorem 4. For n &
S(u(S))2
, u(S)
ln S
& (ln S)2 and ln S & ln(m ∨ n), for χ2 -divergence we have
2 S(u(S))2 2 (u(S))2
(u(S))3
2
inf
sup
E(P,Q) T̂ − χ (P, Q)
+
+
n ln n
m
n
T̂ (P,Q)∈US,u(S)
(16)
4
and the estimator in Section V achieves this bound without the knowledge of either S or u(S) under the Poisson sampling
model.
The following corollaries on the minimum sample complexities follow directly from the previous theorems.
Corollary 3. For Hellinger distance over (P, Q) ∈ MS × MS , there exists an estimator with a vanishing maximum mean
squared error if and only if m ∧ n lnSS .
Corollary 4. For χ2 -divergence over (P, Q) ∈ US,u(S) , there exists an estimator with a vanishing maximum mean squared
2
error if and only if m (u(S))2 and n S(u(S))
∨ (u(S))3 .
ln S
B. Approximation: the general recipe
Estimation of KL divergence belongs to a large family of functional estimation problems: consider estimating the functional
G(θ) of a parameter θ ∈ Θ ⊂ Rp for an experiment {Pθ : θ ∈ Θ}. There
Pn has been a recent wave of study on functional
estimation of high dimensional parameters, e.g., the scaled `1 norm n1 i=1 |θi | in the Gaussian model [27], the Shannon
PS
PS
α
entropy
i=1 −pi ln pi [1], [28]–[30], the mutual information [1], the power sum function
i=1 pi [1], the Rényi entropy
PS
α
PS
ln i=1 pi
[31] and the `1 distance i=1 |pi − qi | [24] in Multinomial and Poisson models. Moreover, the effective sample size
1−α
enlargement phenomenon holds in all these examples: the performance of the minimax estimators with n samples is essentially
that of the plug-in approach with n ln n samples.
The optimal estimators in the previous examples all follow the general methodology of Approximation proposed in [1]:
suppose θ̂n is a consistent estimator for θ, where n is the number of observations. Suppose the functional G(θ) is analytic1
everywhere except at θ ∈ Θ0 . A natural estimator for G(θ) is G(θ̂n ), and we know from classical asymptotics [23, Lemma
8.14] that given the benign LAN (Local Asymptotic Normality) condition [23], G(θ̂n ) is asymptotically efficient for G(θ) for
θ∈
/ Θ0 if θ̂n is asymptotically efficient for θ. In the estimation of functionals of discrete distributions, Θ is the S-dimensional
probability simplex, and a natural candidate for θ̂n is the empirical distribution, which is unbiased for any θ ∈ Θ. Then the
following two-step procedure is conducted in estimating G(θ).
1) Classify the Regime: Compute θ̂n , and declare that we are in the “non-smooth” regime if θ̂n is “close” enough to Θ0 .
Otherwise declare we are in the “smooth” regime;
2) Estimate:
• If θ̂n falls in the “smooth” regime, use an estimator “similar” to G(θ̂n ) to estimate G(θ);
• If θ̂n falls in the “non-smooth” regime, replace the functional G(θ) in the “non-smooth” regime by an approximation
Gappr (θ) (another functional) which can be estimated without bias, then apply an unbiased estimator for the functional
Gappr (θ).
Simple as it may sound, this methodology has a few drawbacks and ambiguities. In our recent work [24], we applied this
general recipe to the estimation of `1 distance between two discrete distributions, where this recipe proves to be inadequate.
In the estimation of the `1 distance, a bivariate function f (x, y) = |x − y| which is non-analytic in a segment was considered,
which is completely different from the previous studies [1], [28]–[31] where a univariate function analytic everywhere except
a point is always taken into consideration. In particular, two more topics, i.e., multivariate approximation and localization via
confidence sets, were introduced and used.
Question 1. What if the domain of θ̂n is different from (usually larger than) Θ, the domain of θ?
Question 2. How to determine the “non-smooth” regime? What is its size?
Question 3. If θ̂n falls in the “non-smooth” regime, in which region should Gappr (θ) be a good approximation of G(θ) (e.g.,
the whole domain Θ, or a proper neighborhood of θ̂n )?
Question 4. If θ̂n falls in the “smooth” regime, how to construct an estimator “similar” to G(θ̂n )?
Other questions, such as what type/degree of approximation Gappr (θ) should be used, were answered in more detail in [1].
Among these questions, Question 1 is a relatively new one, where the estimation of KL divergence is the second example
so far for which it has arisen, where the first example on estimating the support size of a discrete distribution [32] did not
explicitly propose and answer this question. Question 2 and 3 were partially addressed in [1] and [24], but the answer to
Question 2 changes in view of Question 1, and further elaborations are also necessary for Question 3. As for Question 4,
the previous approaches can only handle order-one bias correction, while for some problems bias correction with an arbitrary
order is proved to be necessary [33]. Before answering these questions, we begin with a formal definition of confidence set in
statistical experiments, which is motivated by [24].
1A
function f is analytic at a point x0 if and only if its Taylor series about x0 converges to f in some neighborhood of x0 .
5
Definition 1 (Confidence set). Consider a statistical model (Pθ )θ∈Θ and an estimator θ̂ ∈ Θ̂ of θ, where Θ ⊂ Θ̂. For r ∈ [0, 1],
a confidence set of significance level r is a collection of sets {U (x)}x∈Θ̂ , where U (x) ⊂ Θ for any x ∈ Θ̂, and2
(17)
sup Pθ (θ ∈
/ U (θ̂)) ≤ r.
θ∈Θ
Moreover, every confidence set of significance level r can also induce a reverse confidence set {V (y)}y∈Θ of significance level
r, where V (y) , {x ∈ Θ̂ : y ∈ U (x)} ⊂ Θ̂ for any y ∈ Θ, and
(18)
sup Pθ (θ̂ ∈
/ V (θ)) ≤ r.
θ∈Θ
Intuitively, if {U (x)}x∈Θ̂ is a confidence set of significance level r, then after observing θ̂ we can conclude that θ ∈ U (θ̂)
with error probability at most r. More precisely, for any θ ∈ Θ, with probability at least 1 − r, we can get back to θ based on
U (·) after observing θ̂. Conversely, with probability at least 1 − r, we can also restrict θ̂ in the region V (θ). In other words,
the true parameter θ is localized at U (θ̂), and the observation θ̂ is localized at V (θ), from which the name localization via
confidence sets originates. Note that confidence set of any level exists for any statistical model (Pθ )θ∈Θ and estimator θ̂, since
U (x) ≡ Θ is always a feasible confidence set of level zero (and then V (y) ≡ Θ̂). In practice, we seek confidence sets which
5
are as small as possible. We also remark that, apart from the confidence set used in traditional hypothesis testing where r is
−A
usually chosen to be a fixed constant (e.g., 0.01), here we allow r to decay with n, e.g., rn n
with some constant A > 0.
−A
For
example,
in
the
Binomial
model
np̂
∼
B(n,
p)
with
Θ̂
=
[0,
1]
and
any
Θ
⊂
Θ̂,
for
r
n
,
by measure
concentration
−A
n
example, in the Binomial model np̂ ∼ B(n, p) with Θ̂ = [0, 1] and any Θ ⊂ Θ̂, for rn n , by measure
concentration
(cf.
(cf.
Lemma
28
in
Appendix
A)
the
collection
{U
(x)}
with
x∈[0,1]
Lemma 26 in Appendix A) the collection {U (x)}x∈[0,1]
with
ln n
ln n
[0, cc11ln
≤ cc11ln
n n ]]
n n ,,
[0, nq
ifif xx ≤
n
q
(19)
U(x)
(x) =
=Θ
Θ∩
∩
q
U
(17)
ln n
ln n
c ln n
[x − q cc11xxln
x+
+ cc11xxnln
< xx ≤
≤ 1.
1
n ] if c11 ln
n n ,,x
[x −
] if n n <
n
n
n
is aa (1
confidence
set of significance
level
assuming
the universal
c1 > 0 and
is large
enough, reverse
and theconfidence
induced reverse
is
− rn )-confidence
set assuming
thernuniversal
constant
c1 > 0 constant
is large enough,
the induced
set is
confidence
set
is
contained
in
contained in
4c1 ln n
2c1 ln n
[0, 4c
≤ 2c
ln n ,
ln n ]
1n
n
]
ifif yy ≤
,
[0, 1q
q
n
n
V
(y)
=
[0,
1]
∩
(20)
q
q
(18)
V (y) = [0, 1] ∩ [y − 2c1 y ln n , y + 2c1 y ln n ] if 2c1 ln n < y ≤ 1
[y − 2c1 ynln n , y + 2c1 ynln n ] if 2c1 nln n < y ≤ 1.
n
n
n
Θ̂
V (θ)
θ = (p1 , p2 )
q
l2 ∼ p1 nln n
w2 ∼
p̂2 ln n
n
U (θ̂)
p̂1 ln n
n
U (θ̂)
q
q
θ̂ = (p̂1 , p̂2 )
V (θ)
θ
w1 ∼
l1 ∼
Θ̂ = Θ
q
Θ
p2 ln n
n
which is
is of
of aa similar
similar structure.
structure. Figure
Figure 11 gives
gives aa pictorial
pictorial illustration
illustration of
of both
both the
the confidence
confidence set
set and
and the
the reverse
reverse confidence
confidence set
set
which
in
2D
Binomial
and
Gaussian
models,
respectively.
in 2D Binomial and Gaussian models, respectively.
θ̂
√
r2 ∼ σ ln n
√
r1 ∼ σ ln n
Fig.
Fig. 1:
1: Pictorial
Pictorial illustration
illustration of
of confidence
confidence set
set U
U ((θ̂)
θ̂) and
and reverse
reverse confidence
confidence set
set V
V (θ)
(θ) in
in 2D
2D Binomial
Binomial (left
(left panel)
panel) and
and Gaussian
Gaussian
(right
panel)
models.
In
the
Binomial
model,
n(p̂
,
p̂
)
∼
B(n,
p
)
×
B(n,
p
)
with
(p
,
p
)
∈
Θ,
(p̂
,
p̂
)
∈
Θ̂
and
(right panel) models. In the Binomial model, n(p̂11 , p̂22 ) ∼ B(n, p11 ) × B(n, p22 ) with (p11 , p22 ) ∈ Θ, (p̂11 , p̂22 ) ∈ Θ̂ and Θ
Θ⊂
⊂ Θ̂.
Θ̂. In
In
2
2 I2 ) with θ ∈ Θ, θ 0 ∈ Θ̂ and Θ = Θ̂.
the
Gaussian
model,
θ̂
∼
N
(θ,
σ
the Gaussian model, θ̂ ∼ N (θ, σ I2 ) with θ ∈ Θ, θ̂ ∈ Θ̂ and Θ = Θ̂.
Now
Now we
we provide
provide answers
answers to
to these
these questions
questions with
with the
the help
help of
of localization
localization via
via confidence
confidence sets.
sets.
1)
Question
1:
When
we
consider
the
non-analytic
region
of
G(·),
we
should
always
stick
1) Question 1: When we consider the non-analytic region of G(·), we should always stick to
to the
the domain
domain of
of θ̂θ̂nn instead
instead of
of
that
of
the
true
parameter
θ
(for
the
existence
of
G(
θ̂
),
here
we
assume
that
G(·)
is
well-defined
on
the
Θ̂
⊃
n
that of the true parameter θ (for the existence of G(θ̂n ), here we assume that G(·) is well-defined on the Θ̂ ⊃ Θ,
Θ, where
where
Θ̂
Θ̂ is
is the
the domain
domain of
of θ̂θ̂nn).
). In
In fact,
fact, we
we should
should distinguish
distinguish the
the “smooth”
“smooth” (resp.
(resp. “non-smooth”)
“non-smooth”) regime
regime of
of θθ and
and that
that of
of θ̂θ̂nn::
we
determine
the
corresponding
regimes
of
θ
first,
and
then
localize
θ
using
θ̂
since
θ
cannot
be
observed.
Hence,
n
we determine the corresponding regimes of θ first, and then localize θ using θ̂n since θ cannot be observed. Hence, in
in
the
the first
first step,
step, to
to make
make the
the plug-in
plug-in approach
approach G(
G(θ̂θ̂nn)) work
work for
for the
the estimation
estimation of
of G(θ),
G(θ), it
it must
must be
be ensured
ensured that
that with
with high
high
probability
probability θ̂θ̂nn does
does not
not fall
fall into
into the
the non-analytic
non-analytic region
region of
of G(·),
G(·), which
which is
is defined
defined over
over Θ̂
Θ̂ instead
instead of
of Θ.
Θ. As
As aa result,
result, the
the
non-analytic
region
of
G(·)
over
the
domain
of
θ̂
is
the
correct
region
to
consider.
n
non-analytic region of G(·) over the domain of θ̂n is the correct region
to
consider.
2) Question 2: We first determine the “smooth” regime Θs of θ. Let Θ00 ⊂ Θ̂ be the non-analytic region of G(·) over Θ̂.
2 In standard
By theterminology
previous answer
to testing,
Question
1, also
Θs the
should
be set
in statistical
this is
confidence
set to
of level 1 − r.
Θs , {θ ∈ Θ : Pθ (θ̂n ∈ Θ00 ) ≤ rn }
(19)
where the convergence rate rn (e.g., rn n−A for some constant A > 0) depends on the specific problem. Usually rn
can be of any negligible order compared to the minimax risk of the estimation problem. With the help of localization
6
2) Question 2: We first determine the “smooth” regime Θs of θ. Let Θ̂0 ⊂ Θ̂ be the non-analytic region of G(·) over Θ̂.
By the previous answer to Question 1, Θs should be set to
Θs , {θ ∈ Θ : Pθ (θ̂n ∈ Θ̂0 ) ≤ rn }
(21)
sup Pθ (θ̂n ∈ Θ̂0 ) ≤ sup Pθ (θ ∈
/ U (θ̂n )) ≤ sup Pθ (θ ∈
/ U (θ̂n )) ≤ rn
(22)
where the convergence rate rn (e.g., rn n−A for some constant A > 0) depends on the specific problem. Usually rn
can be of any negligible order compared to the minimax risk of the estimation problem. With the help of localization
via confidence sets, we can just set Θs = Θ − ∪x∈Θ̂0 U (x) for any confidence set {U (x)}x∈Θ̂ of significance level rn .
In fact, if θ ∈ Θs and θ̂n ∈ Θ̂0 , we have U (θ̂n ) ⊂ ∪x∈Θ̂0 U (x) = Θ − Θs and thus θ ∈
/ U (θ̂n ). As a result, by definition
of the confidence set we have
θ∈Θs
θ∈Θs
θ∈Θ
as desired. By taking complement we obtain the “non-smooth” regime Θns , Θ − Θs of θ.
Since we cannot observe θ, we need to determine the “smooth” regime Θ̂s based on θ̂n rather than θ. A natural choice
is given by confidence set: Θ̂s , {θ̂n ∈ Θ̂ : Θs ⊃ U (θ̂n )}, i.e., Θ̂s contains all observations whose confidence set for
the true parameter falls into the “smooth” regime Θs . Likewise, we can define Θ̂ns , {θ̂n ∈ Θ̂ : Θns ⊃ U (θ̂n )} for the
“non-smooth” regime based on θ̂n . Since Θs ∩ Θns = ∅, it can be easily seen that Θ̂s ∩ Θ̂ns = ∅ as well, but one problem
is that Θ̂ns ∪ Θ̂s $ Θ̂, i.e., some observation θ̂n is attributed to neither the “non-smooth” regime nor the “smooth” regime.
To solve this problem, we should expand Θs and Θns a little bit to ensure that Θ̂s and Θ̂ns form a partition of Θ̂.
In fact, this expansion can be done in many statistical models with satisfactory measure concentration properties (e.g.,
(2)
(1)
in Multinomial, Poisson and Gaussian models). Specifically, for some proper rn ≥ rn of order both negligible to
(2)
(1)
that of the minimax risk, there exists confidence sets {U1 (x)}x∈Θ̂ and {U2 (x)}x∈Θ̂ of significance level rn and rn ,
respectively, such that
Θ(1)
, Θ − ∪x∈Θ̂0 U1 (x)
s
Θ(2)
ns
, ∪x∈Θ̂0 U2 (x)
Θ̂s , {θ̂n ∈ Θ̂ :
Θ̂ns , {θ̂n ∈ Θ̂ :
Θ(1)
s
Θ(2)
ns
(23)
(24)
⊃ U1 (θ̂n )}
⊃ U2 (θ̂n )}
(25)
(26)
satisfy that Θ̂s ∪ Θ̂ns = Θ̂ (by passing through subsets it does not matter if Θ̂s ∩ Θ̂ns 6= ∅). Note that in this case we
(1)
(2)
must have Θs ∩ Θns 6= ∅, i.e., there exists some θ which belongs to both the “smooth” regime and the “non-smooth”
regime.
(1)
The interpretation of this approach is as follows. If the true parameter θ falls in the “smooth” regime Θs , then the plug(2)
in approach will work; conversely, if the true parameter θ falls in the “non-smooth” regime Θns , then the approximation
(1)
(2)
idea will work. Then Θs ∩ Θns 6= ∅ implies that there exists an intermediate regime such that both the plug-in approach
and the approximation approach work when θ falls into this regime. This intermediate regime is unnecessary when we
(1)
(2)
are given the partial information whether θ ∈ Θs or θ ∈ Θns , but it becomes important when we need to infer this
partial information based on θ̂n . Our target is as follows: if the true parameter θ does not fall in the “smooth” (resp.
“non-smooth”) regime, then with high probability we will also declare based on θ̂n that we are not in the “smooth” (resp.
(1)
(2)
“non-smooth”) regime. Mathematically, with high probability, θ ∈ Θ − Θs implies θ̂n ∈ Θ̂ns , and θ ∈ Θ − Θns implies
(2)
(1)
θ̂n ∈ Θ̂s . Note that if θ ∈ Θs ∩ Θns falls in the intermediate regime, either θ̂n ∈ Θ̂s or θ̂n ∈ Θ̂ns suffices for our
(1)
estimator to perform well. The key fact is that this target is fulfilled by the definition of confidence sets: if θ ∈ Θ − Θs
(1)
and θ̂n ∈
/ Θ̂ns , we have θ̂n ∈ Θ̂s , and by definition of Θ̂s we have U1 (θ̂n ) ⊂ Θs , which implies θ ∈
/ U1 (θ̂n ). As a
result,
sup
(1)
θ∈Θ−Θs
Pθ (θ̂n ∈
/ Θ̂ns ) ≤
sup
(1)
θ∈Θ−Θs
(2)
Pθ (θ ∈
/ U1 (θ̂n )) ≤ sup Pθ (θ ∈
/ U1 (θ̂n )) ≤ rn(1)
(27)
θ∈Θ
and similarly supθ∈Θ−Θ(2) Pθ (θ̂n ∈
/ Θ̂s ) ≤ rn . Hence, we successfully localize θ via confidence sets based on θ̂n such
ns
that the true parameter θ is very likely to belong to the declared regime based on θ̂n .
A pictorial illustration of this idea is shown in Figure 2.
3) Question 3: Given a confidence set {U (x)}x∈Θ̂ of a satisfactory significance level rn , after observing θ̂n ∈ Θ̂ns we
can always set the approximation region to be U (θ̂n ). Note that U (θ̂n ) ⊂ Θns by definition, and in fact U (θ̂n ) can be
considerably smaller than Θns , which makes it a desirable regime to approximate over rather than Θns and is proved
to be necessary in [24]. The reason why U (θ̂n ) is sufficient is as follows: by definition of confidence sets we have
supθ∈Θ Pθ (θ ∈ U (θ̂n )) ≤ rn , hence with probability at least 1 − rn , the approximation region U (θ̂n ) based on θ̂n covers
θ, which allows us to operate as if θ is conditioned to be inside U (θ̂). Note that in order to obtain a good approximation
7
Θ̂ = Θ
U2 (θ̂2 )
θ̂2
θ̂1
U1 (θ̂1 )
Θ̂ns
Θ̂0
Θ̂s
(1)
Θ − Θs
I
II
III
(2)
Θ − Θns
IV
Fig. 2: Pictorial explanation of the “smooth” and “non-smooth” regimes based on θ and θ̂n , respectively. In the above figure,
(1)
(2)
(1)
(2)
we have Θs = II ∪ III ∪ IV, Θns = I ∪ II ∪ III, Θ̂s = III ∪ IV, and Θ̂ns = I ∪ II. In particular, Θs ∩ Θns = II ∪ III is
the intermediate regime, where both the plug-in and the approximation approach are performing well. For θ̂1 ∈ Θ̂ns , we have
(2)
(1)
U1 (θ̂1 ) ⊂ Θns ; for θ̂2 ∈ Θ̂s , we have U2 (θ̂2 ) ⊂ Θs .
performance, we need to find a confidence set {U (x)}x∈Θ̂ as small as possible, which depends on the statistical model.
4) Question 4: there has been a long history of correcting the bias of the MLE based on Taylor expansion. For example, in
entropy estimation, one of the earliest investigations on reducing the bias of MLE in entropy estimation is due to Miller
[34]. Interestingly, it was already observed in 1969 by Carlton [35] that Miller’s bias correction formula should only be
applied when p 1/n, which is automatically satisfied when p belongs to the “smooth” regime [ lnnn , 1] defined in [1].
As a result, in the “smooth” regime, Miller’s idea was used in [1]. In our generalization of the “smooth” regime, by
definition of Θs , G(T ) (θ̂n ) remains bounded with high probability for any order T > 0 and θ ∈ Θs . Hence, it shows that
Miller’s bias-correction approach based on Taylor expansion can also be used in general. However, Miller’s approach
fails when high-order bias correction is desired, or equivalently, when T is large. To see why it is the case, we take a
look at the procedure considered in [1]. For Binomial random variable X ∼ B(n, p), denote the empirical frequency by
p̂ = X
n . Then it follows from Taylor’s theorem that
1
1
1 00
p(1 − p) 00
f (p)Varp (p̂) + O( 2 ) =
f (p) + O( 2 )
(28)
2
n
2n
n
where f 00 (p) is the second-order derivative of f at p. Hence, the bias-corrected estimator in [1] was proposed as follows:
Ef (p̂) − f (p) =
f 00 (p̂)p̂(1 − p̂)
.
(29)
2n
However, the plug-in approach was still used for the bias-correction term in the previous estimator, which should be
further corrected based on Taylor expansion again in order to achieve higher-order bias correction. Continuing this
approach, the further correction still suffers from the same problem and additional corrections need to be done, and so
on and so forth. As a result, the previous bias-correction fails to be generalized to high-order corrections, and a successful
bias-correction approach should avoid employing the plug-in approach for bias-correction terms.
One way to avoid the plug-in approach is as follows: instead of doing Taylor expansion of G(θ̂n ) near θ, we employ
Taylor expansion of G(θ) near θ̂n as
f c (p̂) = f (p̂) −
G(θ) ≈
T
X
G(k) (θ̂n )
k=0
k!
(θ − θ̂n )k .
(30)
The advantage is that, now G(k) (θ̂n ) is by definition an unbiased estimator of Eθ [G(k) (θ̂n )]. However, the unknown
θ in the RHS still prevents us from using this estimator explicitly. Fortunately, this difficulty can be overcome by the
(1)
(2)
standard sample splitting approach: we split samples to obtain independent θ̂n and θ̂n , both of which follow the same
class of distribution (with possibly different parameters) as θ̂n . We remark that sample splitting can be employed for
divisible distributions, including Multinomial, Poisson and Gaussian models [36], and it will be discussed in detail at
8
the beginning of Section III for Poisson models. Now our bias-corrected estimator is
k
T
(1)
X
G(k) (θ̂n ) X k
Sj (θ̂n(2) )(−θ̂n(1) )k−j
Ĝs (θ̂n ) =
k!
j
j=0
(31)
k=0
(2)
where Sj (θ̂n ) is an unbiased estimator of θj (which usually exists). Now it is straightforward to show that
" T
#
X G(k) (θ̂n(1) )
G(T +1) (ξ) (1)
(1) k
(θ − θ̂n ) − G(θ) = O Eθ
(θ̂n − θ)T +1
E[Ĝs (θ̂n )] − G(θ) = Eθ
k!
(T + 1)!
(32)
k=0
i.e., the estimator in (31) achieves the bias-correction of any desired order. Although in many scenarios (those in [1],
[24], [27]–[30]) no bias correction or only order-one bias correction is required in the “smooth” regime, bias correction
of an arbitrary order turns out to be crucial in our recent work on the estimation of nonparametric functionals [33]. We
also conjecture that this approach is crucial for the construction of the minimax rate-optimal estimator for the Rényi
entropy in the large alphabet setting, which [31] did not address completely.
The answers to these questions shed light on the detailed implementation of the general recipe and give rise to the important
concept of localization via confidence sets, which leads us to propose a refined two-step approach. As before, denote by Θ̂ ⊃ Θ
the set containing all possible values of the estimator θ̂n , and by Θ̂0 ⊂ Θ̂ the set on which G(·) is non-analytic. Let {U (x)}x∈Θ̂
be a satisfactory confidence set.
1) Classify the Regime:
• For the true parameter θ, declare that θ is in the “non-smooth” regime if θ is “close” enough to Θ̂0 in terms of
localization via confidence sets (cf. (24)). Otherwise declare θ is in the “smooth” regime (cf. (23));
• Compute θ̂n , and declare that we are in the “non-smooth” regime if the confidence set of θ̂n falls into the “nonsmooth” regime of θ (cf. (26)). Otherwise declare we are in the “smooth” regime (cf. (25));
2) Estimate:
• If θ̂n falls in the “smooth” regime, use an estimator “similar” to G(θ̂n ) to estimate G(θ);
• If θ̂n falls in the “non-smooth” regime, replace the functional G(θ) in the “non-smooth” regime by an approximation
Gappr (θ) (another functional which well approximates G(θ) on U (θ̂n )) which can be estimated without bias, then
apply an unbiased estimator for the functional Gappr (θ).
In this paper, we follow the refined recipe for the construction of our optimal estimator in estimating several divergences
between discrete distributions, including the KL divergence, Hellinger distance and χ2 -divergence, where only the KL divergence will be discussed in detail. Moreover, in the estimation of KL divergence, we will encounter a new phenomenon, i.e.,
multivariate approximation in polytopes, which is a highly non-trivial topic in approximation theory, and will also propose a
general tool to analyze the risk of the bias-corrected plug-in approach with the help of localization via confidence sets.
The rest of this paper is organized as follows. We first analyze the performance of the modified plug-in estimator and prove
Theorem 2 in Section II. In Section III, we first follow the general recipe to explicitly construct our estimator for the KL
divergence step by step, and show that it essentially achieves the bound in Theorem 1. Then we adopt and adapt some tricks to
construct another estimator which is rate-optimal, adaptive and easier to implement. The minimax lower bound for estimating
the KL divergence is proved in Section IV. For the Hellinger distance and the χ2 -divergence, we sketch the construction of
the respective minimax rate-optimal estimators in Section V. Conclusions are drawn in Section VI, and complete proofs of
the remaining theorems and lemmas are provided in the appendices. The Matlab code of estimating KL divergence has been
released on http://www.stanford.edu/∼tsachy/index hjw.
II. P ERFORMANCE OF THE MODIFIED PLUG - IN APPROACH
In this section, we give the upper bound and the lower bound of the worst-case mean squared error via the modified plug-in
approach, i.e., we prove Theorem 2. Throughout our analysis, we utilize the Poisson sampling model, i.e., each component
Xi (resp. Yi ) in the histogram X (resp. Y) has distribution Poi(mpi ) (resp. Poi(nqi )), and all coordinates of X (resp. Y) are
independent. In other words, instead of drawing fixed sample sizes m and n, there are i.i.d. samples from distributions P, Q
of sizes M ∼ Poi(m) and N ∼ Poi(n), respectively. Consequently, the observed number of occurrences of each symbol are
independent [37, Theorem 5.6]. We note that the Poisson sampling model is essentially the same as the Multinomial model,
and their minimax risks are related via Lemma 22 in Appendix A.
A. Proof of upper bounds
Recall that the empirical distribution Qn has been modified to
1
1
0
∨ q̂1 , · · · , ∨ q̂S
Qn =
n
n
(33)
9
the modified plug-in estimator D(Pm kQ0n ) is not the exact plug-in approach. However, it can be observed that this quantity
S
X
1
0
∨ q̂i
(34)
D(Pm kQn ) =
p̂i ln p̂i − p̂i ln
n
i=1
is close to the following natural plug-in estimator
D1 (Pm kQn ) =
where
gn (q) ,
S
X
i=1
[p̂i ln p̂i − p̂i gn (q̂i )] ,
(
−(1 + ln n) + nq
ln q
if 0 ≤ q <
if
1
n
1
n,
≤ q ≤ 1.
(35)
(36)
In view of this fact, we can apply the general approximation-based method in [38] to analyze the performance of the plug-in
approach.
By construction it is obvious that gn (q) is continuously differentiable on [0, 1], which coincides with g(q) = ln q on [ n1 , 1].
Moreover, since q̂i is a multiple of n1 , gn (q̂i ) only differs from ln( n1 ∨ q̂i ) at q̂i = 0 by | − (1 + ln n) − ln(1/n)| = 1. Hence, we
may consider the performance of the plug-in estimator p̂i (ln p̂i − gn (q̂i )) in estimating p(ln p − gn (q)), which is summarized
in the following lemma.
Lemma 1. Let np̂ ∼ Poi(mp) and nq̂ ∼ Poi(nq) be independent, and p ≤ u(S)q. Then we have
30u(S) 5 ln 2
+
,
n
m
2
4q 4u(S)
700u(S)
1
51
2
Var(p̂(ln p̂ − gn (q̂)) ≤ 2 +
p + p(ln u(S)) + 2 +
+
p+
.
m
m
e
en
n
m
|E[p̂(ln p̂ − gn (q̂))] − p(ln p − gn (q))| ≤
(37)
(38)
In particular,
1
u(S)
+ ,
n
m
pu(S) u(S) p(1 + ln u(S))2
q
1
+
+
+ .
Var(p̂(ln p̂ − gn (q̂))) . 2 +
m
n
mn
m
m
Hence, by Lemma 1, we conclude that
|E[p̂(ln p̂ − gn (q̂))] − p(ln p − gn (q))| .
|ED1 (Pm kQn ) − D1 (P kQ)| ≤
.
S
X
i=1
S
X
i=1
=
(39)
(40)
|E[pˆi (ln p̂i − gn (qˆi ))] − pi (ln pi − gn (qi ))|
(41)
1
u(S)
+
n
m
(42)
Su(S)
S
+
n
m
(43)
and
Var(D1 (Pm kQn )) =
.
S
X
i=1
S
X
i=1
Var(p̂i gn (q̂i ))
(44)
1
pi u(S) u(S) pi (1 + ln u(S))2
qi
+
+
+
+
2
m
n
mn
m
m
(45)
S
u(S) Su(S) (1 + ln u(S))2
+
+
+
m2
n
m
mn
S
u(S)
(Su(S))2
1
(ln u(S))2
. 2+
+
+
+
m
n
n2
m2
m
2
S
u(S) (Su(S))
(ln u(S))2
. 2+
+
+
.
m
n
n2
m
.
(46)
(47)
(48)
10
Combining these two inequalities yields, for any (P, Q) ∈ US,u(S) ,
2
2
E (D1 (Pm kQn ) − D1 (P kQ)) = |ED1 (Pm kQn ) − D1 (P kQ)| + Var(D1 (Pm kQn ))
2
u(S) (ln u(S))2
S
Su(S)
+
+
+
.
.
n
m
n
m
(49)
(50)
To prove Theorem 2, it remains to compute the difference between D and D1 . By the definition of gn (·), we have
E|D1 (Pm kQn ) −
D(Pm kQ0n )|2
S
X
=E
≤S
=S
2
p̂i 1(q̂i = 0)
i=1
S
X
(51)
E|p̂i 1(q̂i = 0)|2
i=1
S
X
p2i +
i=1
S
X
(52)
pi −nqi
e
m
(53)
u(S) −nqi
qi e
m
i=1
!
2
S
X
2
u(S)
≤S
(u(S))2
+
en
enm
i=1
2
Su(S)
S 2 u(S)
.
+
n
mn
2
S
Su(S)
+
.
n
m
≤S
where we have used the fact that
k −nx
sup x e
x∈[0,1]
=
(u(S))2 qi2 e−nqi +
k
en
k
(54)
(55)
(56)
(57)
(58)
.
Moreover, for any (P, Q) ∈ US,u(S) ,
|D1 (P kQ) − D(P kQ)| ≤
≤
S
X
i=1
S
X
i=1
pi | − (ln n + 1) + nqi − ln qi |1(qi <
pi (1 − ln(nqi ))1(qi <
≤ u(S) ·
S
X
i=1
1
)
n
1
)
n
qi (1 − ln(nqi ))1(qi <
(59)
(60)
1
)
n
(61)
Su(S)
(62)
n
where we have used that supq∈[0,1/n] q(1 − ln(nq)) = 1/n. Hence, by the triangle inequality, for any (P, Q) ∈ US,u(S) , we
have
.
2
E (D(Pm kQ0n ) − D(P kQ))
2
2
≤ 3 E (D1 (Pm kQn ) − D1 (P kQ)) + E (D1 (Pm kQn ) − D(Pm kQ0n )) + |D1 (P kQ) − D(P kQ)|2
2
Su(S)
S
u(S) (ln u(S))2
.
+
+
+
n
m
n
m
which completes the proof of the upper bound in Theorem 2.
(63)
(64)
11
B. Proof of lower bounds
By the bias-variance decomposition of the mean squared error, to prove that the squared term in Theorem 2 serves as a
lower bound, it suffices to find some (P, Q) ∈ US,u(S) such that
S
Su(S)
+ .
(65)
n
m
Note that here we prove this inequality based on the Multinomial model, and then obtain the result for the Poisson sampling
model via Lemma 22. The construction of (P, Q) is as follows: P = ( S1 , · · · , S1 ) is the uniform distribution, and Q =
1
1
S−1
( Su(S)
, · · · , Su(S)
, 1 − Su(S)
) is near-uniform. We first recall from [38] that, if m ≥ 15S, we have
|E(P,Q) D(Pm kQ0n ) − D(P kQ)| &
S
X
i=1
[E[p̂i ln p̂i ] − pi ln pi ] ≥
1
S2
S−1
−
.
−
2m
20m2
12m2
(66)
Next we give a lower bound for the term E(− ln(q̂i ∨ n1 )) − (− ln qi ) for qi ≥ n4 . We shall use the following lemma for
the approximation error of the Bernstein polynomial, which corresponds to the bias in the Multinomial model. Define the
Bernstein operator Bn as follows:
n
X
n i
i
n−i
,
f ∈ C[0, 1].
(67)
Bn [f ](x) =
x (1 − x)
·f
n
i
i=0
Lemma 2. [39] Let k ≥ 4 be an even integer. Suppose that the k-th derivative of f satisfies that f (k) ≤ 0 on (0, 1), and
Qk−1 is the Taylor polynomial of order k − 1 of f at some point x0 . Then for x ∈ [0, 1],
f (x) − Bn [f ](x) ≥ Qk−1 (x) − Bn [Qk−1 ](x).
(68)
Since our modification of ln(·) is not even differentiable, Lemma 2 cannot be applied directly. However, we can consider
the following function instead:
(
2
3
4
− ln n + n(x − n1 ) − n2 (x − n1 )2 + n3 (x − n1 )3 − n4 (x − n1 )4 if 0 ≤ x < n1 ,
(69)
hn (x) =
ln x
if n1 ≤ x ≤ 1.
By construction it is obvious that hn (x) ∈ C 4 [0, 1] which coincides with ln x on [ n1 , 1]. Moreover, hn (q̂) only differs from
(4)
ln( n1 ∨ q̂) at zero by |hn (0) + ln n| = 25
12 . Since hn (x) ≤ 0, Lemma 2 can be applied here to yield the following lemma.
Lemma 3. For
4
n
≤ x ≤ 1, we have
hn (x) − Bn [hn ](x) ≥
(1 − x)((n + 4)x − 2)
> 0.
n2 x2
Since our assumption n ≥ 4Su(S) ensures that for our choice of Q, qi ≥
of hn (·), we have
S
X
i=1
S−1
X
4
n
for any i. Hence, by Lemma 3 and the concavity
1
[ln qi − E[hn (q̂i )]]
S
i=1
S − 1 (Su(S))2
1
n+4
≥
·
1−
−2
S
n2
Su(S)
Su(S)
S − 1 (Su(S))2
1
n
≥
·
1−
·
S
n2
Su(S)
2Su(S)
(S − 1)u(S)
1
=
1−
.
2n
Su(S)
[pi ln qi − E[p̂i hn (q̂i )]] ≥
(70)
(71)
(72)
(73)
(74)
12
Now note that
S
X
i=1
S
|E[p̂i hn (q̂i )] − E[p̂i ln(
25 X
1
∨ q̂i )]| ≤
pi · P(q̂i = 0)
n
12 i=1
(75)
S
25 X
=
pi (1 − qi )n
12 i=1
(76)
≤
(77)
≤
where we have used the fact that
sup x(1 − x)n =
4
x∈[ n
,1]
4
n
1−
S
X
25
u(S)
qi (1 − qi )n
12
i=1
25Su(S)
3ne4
4
n
n
≤
4
.
ne4
A combination of these two inequalities yields
X
S
S
S
X
X
1
1
E[−p̂i ln( ∨ q̂i )] − (−pi ln qi ) ≥
[pi ln qi − E[p̂i hn (q̂i )]] −
|E[p̂i hn (q̂i )] − E[p̂i ln( ∨ q̂i )]|
n
n
i=1
i=1
i=1
1
25Su(S)
(S − 1)u(S)
1−
−
.
≥
2n
Su(S)
3ne4
Hence, when m ≥ 15S and n ≥ 4Su(S), combining (66) and (81) gives
|E(P,Q) D(Pm kQ0n ) − D(P kQ)| ≥ E(P,Q) D(Pm kQ0n ) − D(P kQ)
S
X
1
=
[E[p̂i ln p̂i ] − pi ln pi ] +
E[−p̂i ln( ∨ q̂i )] − (−pi ln qi )
n
i=1
i=1
S−1
S2
1
(S − 1)u(S)
1
25Su(S)
≥
−
−
+
1
−
−
2m
20m2
12m2
2n
Su(S)
3ne4
S
X
which gives (65), as desired.
For the remaining terms, we remark that
2
(ln u(S))2
u(S)
E(P,Q) D̂ − D(P kQ) &
+
m
n
(P,Q)∈US,u(S)
sup
(78)
(79)
(80)
(81)
(82)
(83)
(84)
(85)
holds for any estimator D̂ (and thus for the modified plug-in estimator D(Pm kQ0n )), and we postpone the proof to Section
IV. Now the proof of Theorem 2 is complete.
III. C ONSTRUCTION OF THE O PTIMAL E STIMATOR
We stay with the Poisson sampling model in this section. For simplicity of analysis, we conduct the classical “splitting”
operation [40] on the Poisson random vector X, and obtain three independent identically distributed random vectors Xj =
[X1,j , X2,j , . . . , XS,j ]T , j ∈ {1, 2, 3}, such that each component Xi,j in Xj has distribution Poi(mpi /3), and all coordinates in
Xi
i
Xj are independent. For each coordinate i, the splitting process generates a random sequence {Tik }X
k=1 such that {Tik }k=1 |X ∼
PXi
i
Multinomial(Xi ; (1/3, 1/3, 1/3)), and assign Xi,j = k=1 1(Tik = j) for j ∈ {1, 2, 3}. All the random variables {{Tik }X
k=1 :
1 ≤ i ≤ S} are conditionally independent given our observation X. The splitting operation is similarly conducted for the
Poisson random vector Y.
For simplicity, we re-define m/3 as m and n/3 as n, and denote
Xi,j
Yi,j
, q̂i,j =
,
i ∈ {1, 2, · · · , S}, j ∈ {1, 2, 3}.
(86)
m
n
We remark that the “splitting” operation is not necessary in implementation. We also note that for independent random variables
(X, Y ) such that nX ∼ Poi(mp), nY ∼ Poi(nq),
p̂i,j =
E
k−1
Y
r=0
r Y
s
Y −
= pk q l ,
m s=0
n
l−1
X−
for any k, l ∈ N. For a proof of this fact we refer to Withers [41, Example 2.8].
(87)
13
A. Estimator construction
Now we apply our general recipe to construct the estimator. Note that
D(P kQ) =
S
X
pi ln
i=1
S
S
S
X
X
X
pi
=
pi ln pi −
pi ln qi = −H(P ) −
pi ln qi
qi
i=1
i=1
i=1
(88)
PS
where H(P ) = i=1 −pi ln pi is the entropy function. Hence, the optimal estimator Ĥ for entropy [1], [28]–[30] can be used
PS
here and it remains to estimate the cross entropy i=1 pi ln qi , i.e., our target is the bivariate function f (p, q) = p ln q.
We first classify the regime. For the bivariate function f (p, q) = p ln q, the entire parameter set is Θ = {(p, q) ∈ [0, 1]2 : p ≤
u(S)q}, and the function is analytic everywhere except for the point Θ0 = {(0, 0)}. For all possible values of the estimator
(p̂, q̂), we have Θ̂ = [0, 1]2 , and non-analytic points are Θ̂0 = [0, 1] × {0}. For the confidence set of this two-dimensional
Poisson model (mp̂, nq̂) ∼ Poi(mp) × Poi(nq), we can set rn n−A for some universal constant A > 0 and use
m
n
n
m
[0, c ln
[0, c ln
if x ≤ c ln
if y ≤ c ln
m ]
m ,
n ]
n ,
q
q
q
q
×
U (x, y) = Θ ∩
[x − cx ln m , x + cx ln m ] if c ln m < x ≤ 1. [y − cy ln n , y + cy ln n ] if c ln n < y ≤ 1.
m
m
m
n
n
n
(89)
for some constant c > 0. Hence, by choosing c = c1 /2 and c = 2c1 respectively in (23) and (24) for some universal constant
c1 > 0 to be specified later, we get the “smooth” and “non-smooth” regimes for (p, q) as (for brevity we omit the superscripts
in (23) and (24))
c1 ln n
c1 ln n
, 1] = (p, q) ∈ [0, 1]2 :
≤ q ≤ 1, p ≤ u(S)q
(90)
Θs = Θ ∩ [0, 1] × [
2n
2n
2c1 ln n
2c1 ln n
] = (p, q) ∈ [0, 1]2 : 0 ≤ q ≤
, p ≤ u(S)q .
(91)
Θns = Θ ∩ [0, 1] × [0,
n
n
Further, by (25) and (26), the ultimate “smooth” and “non-smooth” regimes are given by
Θ̂s = [0, 1] × [
c1 ln n
, 1],
n
Θ̂ns = [0, 1] × [0,
c1 ln n
]
n
(92)
i.e., we are in the “non-smooth” regime if q̂ ≤ c1 nln n , and are in the “smooth” regime otherwise.
Next we construct the estimator in each regime. First, if we are in the “smooth” regime, our bias-corrected estimator (31)
of order T = 3 becomes
k
3
X
g (k) (q̂1 ) X k
Sj (q̂2 )(−q̂1 )k−j
(93)
T (3) (q̂1 , q̂2 ) =
j
k!
j=0
k=0
= ln q̂1 +
q̂2 − q̂1
(q̂2 − q̂1 )2
3q̂2
(q̂2 − q̂1 )3
q̂ 2
2q̂2
−
+
+
− 23 + 2 3
2
2
3
q̂1
2q̂1
2nq̂1
3q̂1
nq̂1
n q̂1
for estimating g(q) = ln q. Note that in the Poisson model nq̂2 ∼ Poi(nq), by (87) we have Sj (q̂2 ) =
for estimating f (p, q) = p ln q in the “smooth” regime, our estimator becomes
Ts (p̂1 , q̂1 ; p̂2 , q̂2 ) = p̂1 · T (3) (q̂1 , q̂2 ) = p̂1 (ln q̂1 +
(94)
Qj−1
k=0 (q̂2
− nk ). Then
q̂2 − q̂1
(q̂2 − q̂1 )2
3q̂2
(q̂2 − q̂1 )3
q̂22
2q̂2
+
+
−
+ 2 3 ).
−
q̂1
2q̂12
2nq̂12
3q̂13
nq̂13
n q̂1
(95)
To ensure that Ts is well-defined, it suffices to define an additional value of Ts (e.g., zero) when q̂1 = 0. Note that sample
splitting here is only used for the simplicity of analysis, and it is indeed not necessary in implementation. We can also replace
p̂2
p̂1 with p̂1 +
here to further reduce the variance.
2
Now consider the case where we are in the “non-smooth” regime, i.e., q̂ ≤ c1 nln n . By our general recipe, we should
approximate f (p, q) = p ln q in the approximation region given by the confidence set
ln m
[0, 2c1mln m ]
if p̂ ≤ c1 m
,
4c
ln
n
1
q
q
U (p̂, q̂) = Θ ∩
× [0,
] .
(96)
[p̂ − 1 c1 p̂ ln m , p̂ + 1 c1 p̂ ln m ] if c1 ln m < p̂ ≤ 1.
n
2
m
2
m
m
As a result, we further distinguish the “non-smooth” regime into two sub-regimes depending on p̂ ≤
ln m
localization via confidence sets is essentially equivalent to p ≤ c1 m
or not.
c1 ln m
m
or not, which by
14
If p̂ >
c1 ln m
m ,
the approximation region is given by
(
)
r
r
1
1
4c
ln
n
c
p̂
ln
m
c
p̂
ln
m
1
1
1
(p, q) ∈ [0, 1]2 : p̂ −
≤ p ≤ p̂ +
,0 ≤ q ≤
, p ≤ u(S)q
2
m
2
m
n
"
# "
!
#
r
r
r
1 c1 p̂ ln m
1 c1 p̂ ln m
1
1 c1 p̂ ln m
4c1 ln n
⊂ p̂ −
, p̂ +
×
p̂ −
,
2
m
2
m
u(S)
2
m
n
(97)
where the latter is a rectangle. Since q cannot hit zero in this approximation regime, and f (p, q) = p ln q is a product of p
and ln q, we can consider the best polynomial approximation of ln q in this regime. As a result, in this regime, we use the
approximation-based estimator
K
k−1
Y
c1 ln m X
j
Tns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) = 1(p̂2 ≥
)·
(98)
gK,k (p̂2 ) · p̂1
q̂1 −
3m
n
j=0
k=0
where
K
X
gK,k (p̂)z k = arg min 1
P ∈polyK
k=0
1
(p̂− 12
z∈[ u(S)
max
q
c1 p̂ ln m
4c ln n
), 1n
]
m
| ln z − P (z)|
(99)
is the best 1D order-K polynomial approximation of g(q) = ln q, where K = c2 ln n with universal constant c2 > 0 to be
ln m
ensures that the 1D approximation interval does not contain zero and is thus valid. We
specified later. Note that p̂2 ≥ c13m
call this regime as “non-smooth” regime I.
ln m
If p̂ ≤ c1 m
, the approximation region is given by
2c1 ln m
4c1 ln n
R = (p, q) ∈ [0, 1]2 : 0 ≤ p ≤
,0 ≤ q ≤
, p ≤ u(S)q .
(100)
m
n
Since q may be zero in R, the usual best 1D polynomial approximation of g(q) = ln q over this region does not work, and the
best 2D polynomial approximation of f (p, q) = p ln q should be employed here. Hence, in this regime the approximation-based
estimator is
l−1
k−1
X
Y
i Y
j
Tns,II (p̂1 , q̂1 ) =
hK,k,l
p̂1 −
q̂1 −
(101)
m j=0
n
i=0
k,l≥0,0<k+l≤K
where
X
hK,k,l wk z l = arg min 2
max |w ln z − P (w, z)|
P ∈polyK (w,z)∈R
k,l≥0,k+l≤K
(102)
is the best 2D order-K polynomial approximation of f (p, q) = p ln q in R, where K = c2 ln n. Note that the condition k +l > 0
in the summation ensures that the estimator is zero for unseen symbols.
We call this regime as “non-smooth” regime II.
PS
In summary, we have the following estimator construction for i=1 pi ln qi .
Estimator Construction 1. Conduct three-fold sample splitting to obtain i.i.d. samples (p̂i,1 , p̂i,2 , p̂i,3 ) and (q̂i,1 , q̂i,2 , q̂i,3 ).
PS
The estimator D̂0 for the cross entropy i=1 pi ln qi is constructed as follows:
S
X
c1 ln m
c1 ln n
c1 ln m
0
) + T̃ns,II (p̂i,1 , q̂i,1 )1(p̂i,3 ≤
) 1(q̂i,3 ≤
)
D̂ =
T̃ns,I (p̂i,1 , q̂i,1 ; p̂i,2 , q̂i,2 )1(p̂i,3 >
m
m
n
i=1
c1 ln n
+T̃s (p̂i,1 , q̂i,1 ; p̂i,2 , q̂i,2 )1(q̂i,3 >
) ,
(103)
n
where
T̃ns,I (x, y; x0 , y 0 ) , (Tns,I (x, y; x0 , y 0 ) ∧ 1) ∨ (−1)
T̃ns,II (x, y) , (Tns,II (x, y; x , y ) ∧ 1) ∨ (−1)
0
0
T̃s (x, y; x , y ) , Ts (x, y; x , y ) · 1(y 6= 0)
0
0
0
0
(104)
(105)
(106)
and Tns,I , Tns,II , Ts are given by (98), (101) and (95), respectively. A pictorial illustration of three regimes and our estimator
is displayed in Figure 3.
For the estimation of entropy, we essentially follow the estimator in [1]. Specifically, let LH (x) be the lower part function
15
p
1
(q̂1 , p̂1 )
p̂2 +
1
2
q
c1 ln m
m
· p̂2
“Smooth” regime:
(q̂2 , p̂2 )
plug-in approach with
“Non-smooth” regime I:
order-three bias correction
p̂2 × unbiased estimate of best
1D polynomial approximation of ln q
p̂2
p̂2 −
1
2
q
c1 ln m
m
· p̂2
c1 ln m
m
0
(q̂3 , p̂3 ) “Non-smooth” regime II:
unbiased estimate of best 2D
polynomial approximation of p ln q
q
c1 ln m
1
1
· p̂2
u(S) p̂2 − 2
m
c1 ln n
n
1
u(S)
q
PS
Fig. 3: Pictorial explanation of three regimes and our estimator for i=1 pi ln qi . The point (q̂1 , p̂1 ) falls in the “smooth”
regime, (q̂2 , p̂2 ) falls in the “non-smooth” regime I, and (q̂3 , p̂3 ) falls in the “non-smooth” regime II.
defined in [1], and UH (x) be defined as
1
(107)
2m
which gets rid of the interpolation function compared with the upper part function defined in [1]. Then the entropy estimator
is defined as
S
X
c1 ln m
c1 ln m
Ĥ =
UH (p̂i,1 )1(p̂i,3 >
) + LH (p̂i,1 )1(p̂i,3 ≤
) .
(108)
m
m
i=1
UH (x) , −x ln x +
Finally, the overall estimator D̂ for D(P kQ) is defined as
D̂ = −D̂0 − Ĥ
(109)
where c1 , c2 > 0 are suitably chosen universal constants.
B. Estimator analysis
In this subsection we will prove that the estimator constructed above achieves the minimax rate in Theorem 1. Recall that
the mean squared error of any estimator D̂ in estimating D(P kQ) can be decomposed into the squared bias and the variance
as follows:
E(P,Q) (D̂ − D(P kQ))2 = |Bias(D̂)|2 + Var(D̂)
(110)
where the bias and the variance are defined as
Bias(D̂) , E(P,Q) D̂ − D(P kQ)
(111)
Var(D̂) , E(P,Q) (D̂ − E(P,Q) D̂)
2
(112)
respectively. Hence, it suffices to analyze the bias and the variance in these three regimes.
ln n
.
1) “Smooth” regime: First we consider the “smooth” regime where the true parameter (p, q) belongs to Θs , i.e., q > c12n
In this regime, the estimator we employ is the plug-in approach whose bias is corrected by Taylor expansion, e.g., (94). Recall
16
that the bias of our bias-corrected plug-in estimator can be expressed as
|Eq T (r) (q̂1 , q̂2 ) − g(q)| = Eq
r
X
g (k) (q̂)
k!
k=0
g (r+1) (ξ)
(q − q̂)k+1
(r + 1)!
(q − q̂)k − g(q) ≤ Eq
(113)
where nq̂ ∼ Poi(nq), and ξ ∈ [q ∧ q̂, q ∨ q̂] depends on q̂. For smooth g(·) with |g (r+1) (ξ)| bounded everywhere, it suffices to
consider maxξ |g (r+1) (ξ)|, the upper bound of the (r + 1)-th derivative. However, the reason why the plug-in approach and
its bias-corrected version are both strictly suboptimal for the estimation of non-smooth functionals (e.g., the empirical entropy
[38]) is that the functional g(·) may have non-analytic points where the high-order derivatives may be unbounded. Hence, a
direct application of the Taylor expansion does not work for a general non-smooth g(·). However, now we are at the “smooth”
regime (i.e., (p, q) ∈ Θs ), by our general recipe we know that with high probability q̂ will not fall into the non-analytic region
Θ̂0 of g(·), thus g(·) is sufficiently smooth on the segment connecting q̂ and q, and maxq∧q̂≤ξ≤q∨q̂ |g (r+1) (ξ)| can be well
controlled. In other words, the bias can be upper bounded with the help of localization via confidence sets.
Motivated by the previous insights, we begin with the following general lemma.
(1)
Lemma 4. Assume that the estimator in (31) is well-defined, Eθ θ̂n = θ, and let {V (θ)}θ∈Θ be a reverse confidence set of
(1) (2)
level 1 − δ with δ ∈ (0, 1). Further suppose that for any k = 0, · · · , r, the function Hk (θ̂n , θ̂n ) coincides with
k
(1)
G(k) (θ̂n ) X k
Sj (θ̂n(2) )(−θ̂n(1) )k−j
(114)
Gk (θ̂n(1) , θ̂n(2) ) ,
k!
j
j=0
(2)
(1)
(1)
whenever θ̂n ∈ V (θ), and define H(θ̂n , θ̂n ) ,
(1)
Pr
(1)
k=0
(2)
Hk (θ̂n , θ̂n ). Then
Eθ |θ̂n − θ|r+1
|Eθ H(θ̂n(1) , θ̂n(2) ) − G(θ)| ≤
· sup |G(r+1) (θ̂)| + δ ·
(r + 1)!
θ̂∈V (θ)
and for any k = 0, 1, · · · , r,
Varθ (Hk (θ̂n(1) , θ̂n(2) )) ≤ Ar δ · sup |Hk (θ1 , θ2 )| +
+
k−1
X
j=0
θ1 ,θ2 ∈Θ̂
k
X
j=0
|G(θ)| + sup |H(θ1 , θ2 )|
θ1 ,θ2 ∈Θ̂
Eθ (θ̂n(1) − θ)2 · sup |G0k,j (θ̂)|2 + δ|Gk,j (θ)|2
θ̂∈V (θ)
!2
|Gk,j (θ)| + Eθ (θ̂n(1) − θ)2 · sup |G00k,j (θ̂)| + δ(|θ| + sup |θ̂|) · |G0k,j (θ)|
|Eθ Hk (θ̂n(1) , θ̂n(2) )| ≤
θ̂∈V (θ)
Eθ (θ̂n(1) − θ)2 · sup
Eθ |θ̂n(1) −θ|k
k!
!
θ̂∈Θ̂
!
2
· Eθ Sk−j
(θ̂n(2) )
· Varθ (Sk−j (θ̂n(2) ))
00
0
|G
(
θ̂)|
+
δ
·
sup
|H
(θ
,
θ
)|
+
|G
(θ)|(|θ|
+
sup
|
θ̂|)
1
1
2
θ1 ,θ2 ∈Θ̂
θ̂∈V (θ)
θ̂∈Θ̂
· supθ̂∈V (θ) |G(k) (θ̂)| + δ · supθ1 ,θ2 ∈Θ̂ |Hk (θ1 , θ2 )|
(115)
(116)
if k = 1,
if k ≥ 2.
(117)
where Gk,j (x) , xj G(k) (x), and Ar > 0 is a universal constant which depends on r only.
It can be seen from the previous lemma that the upper bounds of both the bias and the variance are very easy to compute,
for we only need to calculate the finite-order derivatives of G(·) and the moments of some usually well-behaved estimators
(2)
(i.e., Sj (θ̂n )). Moreover, with the help of localization via confidence sets, all bounds only depend on the local behavior of
(1) (2)
(1) (2)
(1)
function G(·) (so we only require that Hk (θ̂n , θ̂n ) coincide with Gk (θ̂n , θ̂n ) when θ̂n ∈ V (θ)) plus a negligible term
(1)
corresponding to the event that θ̂n ∈
/ V (θ). Note that this was the major difficult part in the analysis of the bias-corrected plugin estimator in [1], whose proof is quite lengthy (over four pages in the proof of Lemma 2) and requires the explicit construction
of the interpolation function in estimator construction. Note that in Lemma 4 we implicitly use the following “interpolation”
idea: we essentially condition on the event that θ̂n ∈ V (θ), which is similar as we “interpolate” the function G(θ̂n ) using
the rectangle window 1(θ̂n ∈ V (θ)) so as to prevent maxξ |G(r+1) (ξ)| becoming infinity. Note that this interpolation is done
only in the analysis but not in the construction of our estimator, and thus we remark that the explicit interpolation in [1] is
indeed unnecessary given the implicit interpolation by localization via confidence sets. Following this idea, although UH (·) in
(107) does not follow the same idea of our bias correction (31), the result in [1] can still be easily recovered without explicit
interpolation:
17
Lemma 5. Let p ≥
c1 ln m
2m ,
and mp̂ ∼ Poi(mp). If c1 ln m ≥ 4, the following inequalities hold:
6
+ 4m−c1 /24+2
c1 m ln m
p(2 − ln p)2
+ 4m−c1 /24
Var(UH (p̂)) ≤ A0
m
(118)
|EUH (p̂) + p ln p| ≤
(119)
where A0 is the universal constant appearing in Lemma 4.
Now we apply Lemma 4 to analyze the estimation performance of the bias-corrected plug-in estimator T (3) (q̂1 , q̂2 ) in (94).
ln n
, a natural reverse confidence set is given by
In the Poisson model nq̂ ∼ Poi(nq) with q ≥ c12n
#
"
r
r
c1 ln n
1 c1 q ln n
1 c1 q ln n
,
q≥
V (q) = q −
,q +
.
(120)
2
2n
2
2n
2n
By Lemma 28 we know that this reverse confidence set has level 1 − δ with
s
!2
1 1 c1 ln n
1
δ ≤ sup Pq (q̂ ∈
/ V (q)) ≤ exp −
· nq + exp −
3
2
2nq
2
c1 ln n
q≥
2n
1
2
s
c1 ln n
2nq
!2
· nq ≤ 2n−c1 /24
(121)
which can decay faster than any polynomial rate provided that c1 is large enough. In this special case we can simplify the
expressions in Lemma 4.
ln n
, (nq̂1 , nq̂2 ) ∼ Poi(nq) × Poi(nq) and c1 ln n ≥ 2, and g(·) be an (r + 1) times differentiable function
Lemma 6. Let q ≥ c12n
c1 ln n
on [ 4n , 1]. Suppose that for any k = 0, · · · , r, the function hk (q̂1 , q̂2 ) coincides with
k
g (k) (q̂1 ) X k
hk (q̂1 , q̂2 ) ,
Sj (q̂2 )(−q̂1 )k−j
(122)
j
k!
j=0
whenever q̂1 ∈ V (q), and define h(q̂1 , q̂2 ) ,
only such that
k=0
q r+1
2
|Eh(q̂1 , q̂2 ) − g(q)| ≤ Br
and for any k ≤ r,
Pr
n
·
hk (q̂1 , q̂2 ). Then there exists a universal constant Br > 0 depending on r
sup
ξ∈[q/2,2q]
Var(hk (q̂1 , q̂2 )) ≤ Br n−c1 /24 · sup |hk (q1 , q2 )| +
+
q1 ,q2
k−1
X
j=0
|Ehk (q̂1 , q̂2 )| ≤ Br
where gk,j (q) , q j g (k) (q).
q 2(k−j)−1
n
q k∨2
2
n
·
|g
(r+1)
k
X
j=0
(ξ)| + n
−c1 /24
!
· |g(q)| + sup |h(q1 , q2 )|
q
2(k−j)
q
sup |g 0 (ξ)|2 + n−c1 /24 |gk,j (q)|2
n ξ∈[q/2,2q] k,j
!
q
0
|gk,j (q)| +
sup |g 00 (ξ)| + n−c1 /24 |gk,j
(q)|
n ξ∈[q/2,2q] k,j
sup
ξ∈[q/2,2q]
(123)
q1 ,q2
2
,
!
|g (k∨2) (ξ)| + n−c1 /24 · (|g 0 (q)| + sup |hk (q1 , q2 )|) ,
q1 ,q2
!
k≥0
(124)
k≥1
(125)
Note that due to the nice property of the Poisson model, the previous lemma greatly simplifies the expression involving
Sj (q̂), the unbiased estimate of the monomial functions. Moreover, if g (s) (q) becomes a power function of q for some s,
all summands in Lemma 6 with k ≥ s will have the same order of magnitude and can thus be merged into one term. An
interesting observation is that, if we change r to r + 1 in this case, the order of the bias of our bias-corrected estimator is
ln n
1
multiplied by √1nq , which is at most of the order √ln
since q ≥ c12n
. Hence, by continuing this bias correction approach,
n
we can improve the bias of the plug-in approach by any desired logarithmic multiplicative factor.
ln n
Next we apply Lemma 6 to the bias-corrected estimator T̃s (p̂1 , q̂1 ; p̂2 , q̂2 ) in the smooth regime, where q ≥ c12n
and
0
g(q) = ln q satisfied the previous property (i.e., g (q) = 1/q is a power of q).
ln n
Lemma 7. Let p ∈ [0, 1], q ≥ c12n
, p ≤ u(S)q, and Poisson random variables m(p̂1 , p̂2 ) ∼ Poi(mp) × Poi(mp), n(q̂1 , q̂2 ) ∼
Poi(nq) × Poi(nq) be independent. Moreover, let c1 ln m ≥ 4 and c1 ln n ≥ 4.
18
If p ≤
2c1 ln m
m
is small, we have
192B3 u(S)
C
(2c1 ln m)4
+ 6B3 pn−c1 /24+3 +
+ 2−8c2 ln 2
c1 n ln n
m ln m
m
125
2(2c1 ln m)4
p
2
−c1 /24+3
Var(T̃s (p̂1 , q̂1 ; p̂2 , q̂2 ) + LH (p̂1 )) ≤
+ 1600B3 p +
+n
m2−8c2 ln 2
m
nq
2
p
B3 48 + 6n−c1 /24+3 − ln q
+
m
|E[T̃s (p̂1 , q̂1 ; p̂2 , q̂2 ) + LH (p̂1 )] + p ln(p/q)| ≤
where B3 , C are universal constants given in Lemma 6 and [1, Lemma 4], respectively. If p ≥
c1 ln m
2m
(126)
(127)
is large, we have
6
192B3 u(S)
+ 6B3 pn−c1 /24+3 +
+ 4m−c1 /24+2
(128)
c1 n ln n
c1 m ln m
8
204
4q 4u(S)
Var(T̃s (p̂1 , q̂1 ; p̂2 , q̂2 ) + UH (p̂1 )) ≤ 2 +
p + p(ln u(S))2 + 2 +
m
m
e
en
2800u(S)
1
p 125
2
−c1 /24+3
+
p+
+ 900B3 p +
+n
n
m
m
nq
2
9B32 p
48 + 3n−c1 /24+3 .
(129)
+ 4(1 + ln n)2 · n−c1 /2 +
m
|E[T̃s (p̂1 , q̂1 ; p̂2 , q̂2 ) + UH (p̂1 )] + p ln(p/q)| ≤
In particular, if c1 > 96 and 8c2 ln 2 < ∈ (0, 1), the previous bounds imply that for p ≤
2c1 ln m
,
m
u(S)
1
+
n ln n m ln m
p(1 + ln u(S))2
u(S) pu(S)
1
+
+
Var(T̃s (p̂1 , q̂1 ; p̂2 , q̂2 ) + LH (p̂1 )) . 2− +
m
m
mn
n
|E[T̃s (p̂1 , q̂1 ; p̂2 , q̂2 ) + LH (p̂1 )] + p ln(p/q)| .
and for p ≥
(130)
(131)
c1 ln m
2m ,
1
u(S)
+
(132)
n ln n m ln m
1
p(1 + ln u(S))2
q
u(S) pu(S)
Var(T̃s (p̂1 , q̂1 ; p̂2 , q̂2 ) + UH (p̂1 )) . 2 +
+
+
+
.
(133)
m
m
m
mn
n
Note that the variance bound given by Lemma 7 is a non-asymptotic result whose order coincides with that given by classical
asymptotics, where the asymptotic variance is the leading term and can be obtained easily via the delta method [23]. Now we
use Lemma 7 to analyze the property of the overall estimator
|E[T̃s (p̂1 , q̂1 ; p̂2 , q̂2 ) + UH (p̂1 )] + p ln(p/q)| .
T s (p̂, q̂) = T̃s (p̂1 , q̂1 ; p̂2 , q̂2 ) + LH (p̂1 )1(p̂3 ≤
in the “smooth” regime q ≥
c1 ln n
2n ,
c1 ln m
c1 ln m
) + UH (p̂1 )1(p̂3 >
)
m
m
(134)
where p̂, q̂ are the vector representations of p̂1 , p̂2 , p̂3 and q̂1 , q̂2 , q̂3 , respectively.
2c1 ln n
,
n
Lemma 8. Let p ∈ [0, 1], q ≥
p ≤ u(S)q, and mp̂ = m(p̂1 , p̂2 , p̂3 ) ∼ Poi(mp)3 , nq̂ = n(q̂1 , q̂2 , q̂3 ) ∼ Poi(nq)3 be
independent. Moreover, let c1 > 96 and 8c2 ln 2 < ∈ (0, 1), we have
1
u(S)
+
m ln m n ln n
2
1
p(1 + ln u(S))2
q
u(S) pu(S)
u(S)
Var(T s (p̂, q̂)) . 2− +
+
+
+
+
.
m
m
m
mn
n
n ln n
|ET s (p̂, q̂) + p ln(p/q)| .
(135)
(136)
ln m
2) “Non-smooth” regime I: Next we consider the “non-smooth” regime I where p ≥ c12m
, q ≤ 2c1nln n . By construction
c1 ln m
of the approximation-based estimator Tns,I (p̂1 , q̂1 ; p̂2 , q̂2 ), when p̂2 ≥ 3m and the approximation region
"
!
#
r
1
1 c1 p̂2 ln m
4c1 ln n
p̂2 −
,
(137)
u(S)
2
m
n
contains the true parameter q, the bias of this estimator is essentially the product of p and the best polynomial approximation
error of ln q in the previous approximation region. This approximation error can be easily obtained, for the 1D polynomial
approximation is well-understood (Lemma 23 gives
q an upper bound for the approximation error of ln x). Moreover, note that
ln m
the previous event occurs if c13m
≤ p̂2 ≤ p+ 12 c1 p̂2mln m , which holds with overwhelming probability by confidence sets. As
Qs−1
for the variance, it suffices to bound the variance of each term of the form l=0 (Y − nl ), where nY ∼ Poi(nq). Complicated
as it may seem, the present authors showed in [24] that the variance has an explicit expression in Poisson models, which is
19
the so-called Charlier polynomial [42].
Hence, we have good tools for the analysis of both the bias and the variance of T̃ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ), which is presented in
the following lemma.
ln m
≤ p ≤ u(S)q, q ≤ 2c1nln n , and Poisson random variables m(p̂1 , p̂2 ) ∼ Poi(mp) × Poi(mp), n(q̂1 , q̂2 ) ∼
Lemma 9. Let c12m
Poi(nq) × Poi(nq) be independent. If c1 ≥ 2c2 and c2 ln n ≥ 1, we have
42c1 u(S)
|E[T̃ns,I (p̂1 , q̂1 ; p̂2 , q̂2 )] − p ln q| ≤ Cln pW
·
+ 2m−c1 /36 (1 − p ln q)
c22
pn ln n
1
16c1 u(S) ln n 2c1 u(S) ln n
2
2
+
42Cln
+ 1−11c2 ln 2
+ (c2 ln n)2 (Cln
+ (ln n)2 ) (138)
n
n
m
1
16c1 u(S) ln n 2c1 u(S) ln n
2
2
+
42Cln
+ (c2 ln n)2 (Cln
+ (ln n)2 ) + 2m−c1 /36
Var(T̃ns,I (p̂1 , q̂1 ; p̂2 , q̂2 )) ≤
n1−11c2 ln 2
n
m
(139)
where W (·) and Cln > 0 are given in Lemma 23. In particular, by Lemma 5, if c1 > 72 and 11c2 ln 2 < ∈ (0, 1), we have
1
u(S)
u(S)(ln n)5 u(S) ln n
1
|E[T̃ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) + UH (p̂1 )] + p ln(p/q)| .
+ pW (
)+
+
(140)
m ln m
pn ln n
n1−
n
m
1
u(S)(ln n)5 u(S) ln n
1
p(1 + (ln p)2 )
+ 3+
+
(141)
Var(T̃ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) + UH (p̂1 )) .
m
m
n1−
n
m
u(S)(ln n)3
p
1
u(S)(ln n)5 u(S) ln n
1
.
+
+ 3+
+
.
(142)
mn
m m
n1−
n
m
u(S)
Here pW ( pn
ln n ) corresponds to the polynomial approximation error, which will become the leading term in the bias.
3) “Non-smooth” regime II: Now we consider the “non-smooth” regime II where p ≤ 2c1mln m , q ≤ 2c1nln n and p ≤ u(S)q.
By the estimator construction, it is necessary to deal with the best 2D polynomial approximation of p ln q in
4c1 ln n
2c1 ln m
2
,0 ≤ q ≤
, p ≤ u(S)q .
(143)
R = (p, q) ∈ [0, 1] : 0 ≤ p ≤
m
n
We emphasize that the polynomial approximation in general multivariate case is extremely complicated. Rice [43] wrote:
“The theory of Chebyshev approximation (a.k.a. best approximation) for functions of one real variable has
been understood for some time and is quite elegant. For about fifty years attempts have been made to generalize
this theory to functions of several variables. These attempts have failed because of the lack of uniqueness of best
approximations to functions of more than one variable. ”
We also show in [24] that the non-uniqueness can cause serious trouble: some polynomial that achieves the best approximation
error cannot be used in our general methodology in functional estimation. What if we relax the requirement of computing the
best approximation in the multivariate case, and merely analyze the best approximation rate (i.e., the best approximation error
up to a multiplicative constant)? That turns out also to be extremely difficult. Ditzian and Totik [44, Chap. 12] obtained the
error rate estimate on simple polytopes3 , balls, and spheres, and it remained open until very recently Totik [45] generalized
the results to general polytopes. For results in balls and spheres, the readers are referred to Dai and Xu [46]. We still know
little about regimes beyond polytopes, balls, and spheres.
Complicated as the general multivariate case is, it is still possible to solve our problem since the approximation region R
in (143) is a convex polytope. Now we review the general theory of polynomial approximation in convex polytopes [45]. In
Rd we call a closed set K ⊂ Rd a convex polytope if it is the convex hull of finitely many points. Let x ∈ K and e ∈ Rd be
a direction (i.e., a unit vector). For continuous function f on K, we define the r-th symmetric difference in the direction e as
r
X
r
r
k r
(144)
∆he f (x) =
(−1)
f x + ( − k)he
k
2
k=0
with the understanding that
x with direction e intersects K at
= 0 if x + 2r he or
point Ae,x , Be,x , we
∆rhe f (x)
3A
x − 2r he does not belong to K. Moreover, letting the line le,x through
define the normalized distance as
q
d˜K (e, x) = kx − Ae,x k2 · kx − Be,x k2 .
(145)
simple polytope in Rd is a polytope such that each vertex has d edges.
20
Denoting by Sd−1 the set of all unit vectors in Rd , we define the Ditzian–Totik modulus of smoothness as follows:
r
ωK
(f, t) = sup sup sup |∆rhd˜
e∈S d−1 x∈K h≤t
K (e,x)e
f (x)|.
(146)
The significance of this quantity is presented in the following lemma.
Lemma 10. [45] Let K ⊂ Rd be a d-dimensional convex polytope and r = 1, 2, · · · . Then, for n ≥ rd, we have
r
En [f ; K] ≤ M ωK
(f,
1
)
n
n
M X
1
r
(k + 1)r−1 Ek [f ; K] ≥ ωK
(f, )
r
n
n
(147)
(148)
k=0
where the constant M > 0 only depends on r and d.
r
Hence, Lemma 10 shows that once we compute the Ditzian–Totik modulus of smoothness ωK
(f, 1/n) for f , we immediately
obtain an upper bound for the best polynomial approximation error. Moreover, Lemma 10 also shows that this is essentially
also the lower bound. In our case, K = R, and f (p, q) = p ln q. Choosing r = 2, Lemma 24 gives an upper bound for the
Ditzian–Totik modulus of smoothness. Moreover, tracing back to the proof for the simple polytope case in [44], it suffices to
take the supremum in (146) over all directions e which are parallel to some edge of the simple polytope K, which makes the
r
evaluation of ωK
(f, t) much simpler.
Now we are in position to bound the bias and the variance of T̃ns,II (p̂1 , q̂1 ), which are summarized in the following lemma.
Lemma 11. Let p ≤ 2c1mln m ∧u(S)q, q ≤ 2c1nln n , and Poisson random variables m(p̂1 , p̂2 ) ∼ Poi(mp)×Poi(mp), n(q̂1 , q̂2 ) ∼
Poi(nq) × Poi(nq) be independent. If c1 ≥ 2c2 and c2 ln n ≥ 1, we have
2c2 ln n
2c2 ln n !
213 c21 c42 (u(S))2 (ln n)4
ln n
n(ln m + ln n)
2M C0 u(S)
+
1+ 1+
+
|E[T̃ns,II (p̂1 , q̂1 )] − p ln q| ≤
c22 n ln n
n2−26c2 ln 2
ln m
mu(S) ln n
(149)
!
2c
ln
n
2c
ln
n
2
2
213 c21 c42 (u(S))2 (ln n)4
ln n
n(ln m + ln n)
Var(T̃ns,II (p̂1 , q̂1 )) ≤
1
+
1
+
+
.
(150)
2−26c
ln
2
2
n
ln m
mu(S) ln n
where the universal constant M > 0 is given by Lemma 10 (with r = d = 2), and the constant C0 which only depends on c1
is given by Lemma 24. In particular, by [1, Lemma 5], if lnnn . mu(S)
ln m , there exists some universal constant B > 0 such that
1
u(S)
(u(S))2
+
+ 2−c2 B
m ln m n ln n
n
1
(u(S))2
Var(T̃ns,II (p̂1 , q̂1 ) + LH (p̂1 )) . 2−c2 B + 2−c2 B .
m
n
|E[T̃ns,II (p̂1 , q̂1 ) + LH (p̂1 )] + p ln(p/q)| .
(151)
(152)
We remark that the condition lnnn . mu(S)
ln m can be removed later in the construction of the adaptive estimator. In fact, the
reason why we need this condition here is that we use an arbitrary best 2D polynomial approximation, which is not unique in
general. This point is very subtle: as was shown by the present authors in [24], not all polynomials which can achieve the best
uniform approximation error can be used to construct the rate-optimal estimator. Actually, we will show in the next subsection
that a special approximating polynomial can achieve the same rate without this condition. Moreover, a more careful design
of the approximating polynomial should require different degrees on p and q (instead of fixing a total degree K = c2 ln n),
but it has yet been unknown to approximation theorists that how to analyze the corresponding approximation error in general
polytopes.
4) Overall performance: Now we analyze the performance of the entire estimator D̂0 . For simplicity, we define
Tns (p̂i , q̂i ) , (T̃ns,I (p̂i,1 , q̂i,1 ; p̂i,2 , q̂i,2 ) + UH (p̂i,1 ))1(p̂i,3 >
ξ(p̂i , q̂i ) , Tns (p̂i , q̂i )1(q̂i,3 ≤
c1 ln n
) + T s (p̂i , q̂i )1(q̂i,3
n
c1 ln m
c1 ln m
) + (T̃ns,II (p̂i,1 , q̂i,1 ) + LH (p̂i,1 ))1(p̂i,3 ≤
) (153)
m
m
c1 ln n
>
)
(154)
n
where T s is given in (134), and p̂i = (p̂i,1 , p̂i,2 , p̂i,3 ) is the vector representation of the independent components, and similarly
for q̂i . Based on the current notations, we have
D̂ = −
S
X
i=1
ξ(p̂i , q̂i )
(155)
21
and by the independence between different symbols, we have
|Bias(D̂)| ≤
Var(D̂) =
S
X
i=1
S
X
|Bias(ξ(p̂i , q̂i ))|
(156)
Var(ξ(p̂i , q̂i )).
(157)
i=1
Hence, it suffices to analyze the bias and the variance of each ξ(p̂i , q̂i ) separately and then add them all. Based on Lemma 9
and Lemma 11, the next lemma first analyzes the bias and the variance of Tns (p̂i , q̂i ).
Lemma 12. Let 0 ≤ p ≤ 1 ∧ u(S)q, 0 ≤ q ≤ 2c1nln n , and mp̂ = m(p̂1 , p̂2 , p̂3 ) ∼ Poi(mp)3 and nq̂ = n(q̂1 , q̂2 , q̂3 ) ∼ Poi(nq)3
be independent. Moreover, we assume that n & u(S), lnnn . mu(S)
ln m , c1 > 72 and c2 (B ∨ 11 ln 2) < ∈ (0, 1) (where B is
given in Lemma 11). Then,
ln m
1) when p ≤ c12m
,
1
u(S)
(u(S))2
,
+
+
m ln m n ln n
n2−
1
(u(S))2
Var(Tns (p̂, q̂)) . 2− +
.
m
n2−
|Bias(Tns (p̂, q̂))| .
2) when
c1 ln m
2m
<p<
(158)
(159)
2c1 ln m
,
m
u(S)
u(S)
(u(S))2
1
u(S)
+ pW (
)+
+
+
,
m ln m
pn ln n
n ln n
n2−
mn1−
1
(u(S))2
u(S)
u(S) 2
Var(Tns (p̂, q̂)) . 2− + 2−2 +
+ [pW (
)] .
1−
m
n
mn
pn ln n
|Bias(Tns (p̂, q̂))| .
3) when p ≥
(160)
(161)
2c1 ln m
,
m
u(S)
(u(S))2
u(S)
1
+ pW (
)+
+
,
(162)
m ln m
pn ln n
n2−
mn1−
1
(u(S))2
u(S)
Var(Tns (p̂, q̂)) . 2− + 2−2 +
.
(163)
m
n
mn1−
Note that in Lemma 12, the condition n & u(S) is a natural requirement for the consistency of the optimal estimator in
view of Theorem 1, and lnnn . mu(S)
ln m is the additional condition in Lemma 11. Now based on Lemma 8 and Lemma 12, we
are about to analyze the bias and the variance of ξ(p̂, q̂).
|Bias(Tns (p̂, q̂))| .
Lemma 13. Let 0 ≤ p ≤ 1 ∧ u(S)q, 0 ≤ q ≤ 1, and mp̂ = m(p̂1 , p̂2 , p̂3 ) ∼ Poi(mp)3 and nq̂ = n(q̂1 , q̂2 , q̂3 ) ∼ Poi(nq)3 be
independent. Moreover, we assume that n & u(S), lnnn . mu(S)
ln m , c1 > 96 and c2 (B ∨ 11 ln 2) < ∈ (0, 1/2) (where B is
given in Lemma 11). Then,
ln n
1) when q ≤ c12n
,
1
u(S)
(u(S))2
ln m
p ≤ c12m
,
m ln m + n ln n + n2−
2
u(S)
u(S)
(u(S))
u(S)
2c1 ln m
c
ln
m
1
1
(164)
|Bias(ξ(p̂, q̂))| . m ln m + pW ( pn ln n ) + n ln n + n2− + mn1−
,
2m < p <
m
2
1
u(S)
(u(S))
u(S)
p ≥ 2c1mln m .
m ln m + pW ( pn ln n ) + n2− + mn1−
2
ln m
1
+ (u(S))
p ≤ c12m
,
n2−
m2−
2
(u(S))
u(S)
u(S)
c
ln
m
2c1 ln m
1
2
1
Var(ξ(p̂, q̂)) . m2− + n2−2 + mn1− + [pW ( pn ln n )]
(165)
,
2m < p <
m
2
1
(u(S))
u(S)
p ≥ 2c1mln m .
m2− + n2− + mn1−
2) when
c1 ln n
2n
<q<
|Bias(ξ(p̂, q̂))| .
Var(ξ(p̂, q̂)) .
2c1 ln n
,
n
1
m ln m
+
1
m ln m
+
(u(S))2
n2−
u(S)
pW ( pn ln n ) + nu(S)
ln n
u(S)
n ln n
+
+
(u(S))2
n2−
+
u(S)
mn1−
p≤
c1 ln m
2m ,
ln m
p ≥ c12m
.
u(S)
1
p(1 + ln u(S))2
q
pu(S) (u(S))2
mn
+
+
+
+ 2−2 + (u(S))2
2
2−2 + [pW ( u(S) )]2
m
m
m
n
n
n
pn ln n
(166)
p≤
p>
c1 ln m
2m ,
c1 ln m
2m .
(167)
22
3) when q ≥
2c1 ln n
,
n
1
u(S)
+
,
m ln m n ln n
p(1 + ln u(S))2
1
q
u(S) pu(S)
u(S) 2
Var(ξ(p̂, q̂)) . 2− +
+
+
+
+(
) .
m
m
m
mn
n
n ln n
|Bias(ξ(p̂, q̂))| .
(168)
(169)
Based on Lemma 13, we can analyze the total bias and variance of our estimator D̂. By differentiation, we have
pW (
and the maximum is attained at p =
|Bias(D̂)| ≤
Var(D̂) =
S
X
i=1
S
X
i=1
u(S)
en ln n .
u(S)
u(S)
)≤
pn ln n
en ln n
(170)
Hence,
|Bias(ξ(p̂i , q̂i ))| .
Var(ξ(p̂i , q̂i )) .
S
Su(S)
Su(S) S(u(S))2
+
+
+
2−2
m ln m
n ln n
n
mn1−
S(u(S))2
Su(S)
(1 + ln u(S))2
S
u(S)
+
+
+
+
.
m2−
n2−2
mn1−2
m
n
(171)
(172)
If we further require that ln S & ln(m ∨ n) and n & Su(S)/ ln S, the previous results can be further upper bounded as (let
→ 0)
Su(S)
Su(S) 2
S
S(u(S))2
S
+
+(
) +
+
(173)
|Bias(D̂)| .
m ln m
n ln n
n ln n
m2
n2−2
S
Su(S)
Su(S) 2
S
Su(S) 2
.
+
+(
) +
+(
)
(174)
2
m ln m
n ln n
n ln n
m
n ln n
Su(S)
S
+
(175)
.
m ln m
n ln n
S(u(S))2
S
S
Su(S) 2
u(S)
(1 + ln u(S))2
Var(D̂) . (
)2 + (
) +
+
+
(176)
+
m ln m
n ln n
m2
n2−4
m
n
S
Su(S) 2 (ln u(S))2
u(S)
.(
)2 + (
) +
+
.
(177)
m ln m
n ln n
m
n
Hence we come to the following theorem.
Theorem 5. Let m & lnSS , n & Su(S)
ln S , ln S & ln(m ∨ n) and
from the general recipe, we have
2
sup
E(P,Q) D̂ − D(P kQ) .
(P,Q)∈US,u(S)
n
ln n
.
mu(S)
ln m .
Then for our estimator D̂ in (103) constructed
S
Su(S)
+
m ln m
n ln n
2
+
(ln u(S))2
u(S)
+
.
m
n
(178)
Moreover, D̂ does not require the knowledge of the support size S.
C. An adaptive estimator
So far we have obtained an essentially minimax estimator via our general recipe. However, since this estimator is purely
obtained from the general method, it is not surprising that it is also subject to some disadvantages. Firstly, in the estimator
we do not specify the explicit form of the best 2D polynomial approximation in the “non-smooth” regime II. Although the
best 1D polynomial approximation is unique and can be efficiently obtained via the Remez algorithm [47], which has been
efficiently implemented in Matlab [48], the best 2D polynomial approximation is not unique and hard to compute. Moreover,
as what we have remarked before, the non-uniqueness forces us to add an unnecessary condition lnnn . mu(S)
ln m in Lemma 11
and thus in Theorem 5. Secondly, although the estimator does not require the knowledge of the support size S (we remove the
constant term in the polynomial approximation), but it requires the upper bound on the likelihood ratio u(S) (in the design of
“non-smooth” regime I). In practice, we wish to obtain an adaptive estimator which achieves the minimax rate and is agnostic to
both S and u(S). Thirdly, for the estimator construction in the “non-smooth” regime I, the approximating polynomial depends
on the empirical probabilities (i.e., we cannot store the polynomials in advance), which incurs large computational complexity.
To resolve these issues, we need to apply some tricks to explicitly construct an approximating polynomial for f (p, q) = p ln q
in the “non-smooth” regime, i.e., q ≤ 2c1nln n . We first suppose that there exists a 1D polynomial T (q) in q with degree . ln n
such that pT (q) has the desired approximation property for f (p, q) = p ln q in the entire “non-smooth” regime, i.e., we need
not to distinguish “non-smooth” regimes I and II. We remark that either the 1D approximation or only one approximation on
the entire “non-smooth” regime is not always doable in general. For example, for estimating the `1 distance, it has been shown
23
in [24] that not only any single approximation in the entire “non-smooth” regime will always fail to give the correct order of
the approximation error, but any 1D polynomial approximation of |p − q| in p − q will also not work when both p and q are
small. Nevertheless, this ambitious target can be achieved in our special example. Motivated by Lemma 9 and Lemma 11, the
correct order of the approximation error is nu(S)
ln n , i.e., T (q) should satisfy that
sup
0≤q≤
2c1 ln n
n
Since p ≤ u(S)q, it suffices to have
|T (q) − ln q| .
|pT (q) − p ln q| .
1
,
qn ln n
u(S)
.
n ln n
∀q ∈ (0,
2c1 ln n
]
n
(179)
(180)
i.e., to find a 1D polynomial approximation which satisfies the desired pointwise bound. However, it is easy to show that there
exists some polynomial T0 (q) on [0, 2c1nln n ] such that deg(T0 ) . ln n and
sup
0≤q≤
2c1 ln n
n
|T0 (q) − q ln q| .
1
.
n ln n
(181)
Hence, if we remove the constant term of T0 (q) and define T (q) = T0 (q)/q, then T (q) will have the desired property.
Motivated by the previous observations, we can construct an explicit estimator as follows:
Estimator Construction 2. Conduct three-fold sample splitting to obtain i.i.d. samples (p̂i,1 , p̂i,2 , p̂i,3 ) and (q̂i,1 , q̂i,2 , q̂i,3 ).
The adaptive estimator D̂A for the KL divergence D(P kQ) is
S
X
c1 ln m
c1 ln m
LH (p̂i,1 )1(p̂i,3 ≤
D̂A = −
) + UH (p̂i,1 )1(p̂i,3 >
)
m
m
i=1
c1 ln n
c1 ln n
+T̃ns (p̂i,1 , q̂i,1 )1(q̂i,3 ≤
) + T̃s (p̂i,1 , q̂i,1 ; p̂i,2 , q̂i,2 )1(q̂i,3 >
)
(182)
n
n
where T̃s is given by (106), LH (x), UH (x) are given by [1] and (108), respectively, and
T̃ns (x, y) = (Tns (x, y) ∧ 1) ∨ (−1)
−k
K
k−1
X
Y
2c1 ln n
l
Tns (x, y) =
gK,k+1
·x
y−
n
n
k=0
(184)
l=0
where the coefficients {gK,k }K+1
k=1 are given by the best polynomial approximation of x ln x as follows:
2c1 ln n
gK,1 = rK,1 + ln
,
gK,k = rK,k , 2 ≤ k ≤ K + 1
n
K+1
X
rK,k xk = arg min1
sup |P (x) − x ln x|.
k=0
(183)
P ∈polyK+1 x∈[0,1]
(185)
(186)
The parameters c1 , c2 > 0 are suitably chosen universal constants. A pictorial illustration of D̂A is displayed in Fig. 4.
Recall that the entropy estimator in [1] does not require the knowledge of S, we conclude that D̂A always sets zero to
unseen symbols and does not depend on u(S). In other words, the estimator D̂ for D(P kQ) is agnostic to both S and u(S),
and is thus adaptive. Moreover, the estimator D̂A is easy to implement in practice with near-linear computational complexity,
and the coefficients {gK,k }K+1
k=1 can be obtained offline via the Remez algorithm before observing any samples.
Now we analyze the performance of T̃ns (p̂, q̂) when q ≤ 2c1nln n .
Lemma 14. Let 0 ≤ p ≤ u(S)q, 0 ≤ q ≤
c1 ≥ 2c2 and c2 ln n ≥ 1, we have
2c1 ln n
,
n
and mp̂ ∼ Poi(mp), nq̂ ∼ Poi(nq) be independent random variables. If
Cu(S)
16c2
2u(S)
4(u(S))2
+ 11c2 2ln 2 (C + 2c1 (ln n)3 )2 ·
+
n ln n
n
c1 mn ln n
n2
2u(S)
16c2
4(u(S))2
Var(T̃ns (p̂, q̂)) ≤ 11c2 2ln 2 (C + 2c1 (ln n)3 )2 ·
+
.
n
c1 mn ln n
n2
|E[T̃ns (p̂, q̂)] − p ln q| ≤
(187)
(188)
24
p
1
“Non-smooth” regime:
p̂× unbiased estimate of a special
1D polynomial approximation of ln q
0
“Smooth” regime:
plug-in approach with
order-three bias correction
q
c1 ln n
n
Fig. 4: Pictorial explanation of our adaptive estimator for
PS
i=1
pi ln qi .
where C > 0 is a constant which only depends on c1 and c2 . In particular, if 11c2 ln 2 < ∈ (0, 1), by [1, Lemma 5] we have
(u(S))2
u(S)
u(S)
+
+
2−
n ln n
n
mn1−
2
(u(S))
u(S)
Var(T̃ns (p̂, q̂)) .
+
.
n2−
mn1−
|ET̃ns (p̂, q̂) − p ln q| .
(189)
(190)
Note that in Lemma 14 we have removed the condition lnnn . mu(S)
ln m in Lemma 11. Moreover, since the upper bounds of the
bias and variance of T̃ns presented in Lemma 14 are no worse than those in Lemma 9 and Lemma 11, by the same argument
in Lemma 12 and Lemma 13 we conclude that the adaptive estimator D̂A is rate-optimal, and thereby satisfies Theorem 1.
IV. M INIMAX L OWER B OUND
In this section, we prove the minimax lower bounds presented in Theorem 1. There are two main lemmas that we employ
towards the proof of the minimax lower bound. The first is the Le Cam two-point method, which helps to prove the minimax
lower bound corresponding to the variance, or equivalently, the classical asymptotics. Suppose we observe a random vector
Z ∈ (Z, A) which has distribution Pθ where θ ∈ Θ. Let θ0 and θ1 be two elements of Θ. Let T̂ = T̂ (Z) be an arbitrary
estimator of a function T (θ) based on Z. Le Cam’s two-point method gives the following general minimax lower bound.
Lemma 15. [5, Sec. 2.4.2] The following inequality holds:
|T (θ1 ) − T (θ0 )|
1
inf sup Pθ |T̂ − T (θ)| ≥
≥ exp (−D (Pθ1 kPθ0 )) .
2
4
T̂ θ∈Θ
(191)
The second lemma is the so-called method of two fuzzy hypotheses presented in Tsybakov [5]. Suppose we observe a
random vector Z ∈ (Z, A) which has distribution Pθ where θ ∈ Θ. Let σ0 and σ1 be two prior distributions supported on Θ.
Write Fi for the marginal distribution of Z when the prior is σi for i = 0, 1. Let T̂ = T̂ (Z) be an arbitrary estimator of a
function T (θ) based on Z. We have the following general minimax lower bound.
Lemma 16. [5, Thm. 2.15] Given the setting above, suppose there exist ζ ∈ R, s > 0, 0 ≤ β0 , β1 < 1 such that
σ0 (θ : T (θ) ≤ ζ − s) ≥ 1 − β0
σ1 (θ : T (θ) ≥ ζ + s) ≥ 1 − β1 .
(192)
(193)
25
If V (F1 , F0 ) ≤ η < 1, then
1−η−β −β
0
1
,
inf sup Pθ |T̂ − T (θ)| ≥ s ≥
2
T̂ θ∈Θ
(194)
where Fi , i = 0, 1 are the marginal distributions of Z when the priors are σi , i = 0, 1, respectively.
Here V (P, Q) is the total variation distance between two probability measures P, Q on the measurable space (Z, A).
Concretely, we have
Z
1
|p − q|dν,
(195)
V (P, Q) , sup |P (A) − Q(A)| =
2
A∈A
dQ
where p = dP
dν , q = dν , and ν is a dominating measure so that P ν, Q ν.
Su(S) 2
S
By the proof of the achievability results in previous sections, we observe that ( m ln
m + n ln n ) corresponds to the squared
(ln S)2
u(S)
bias term, and m + n corresponds to the variance term. In the sequel we will also prove the minimax lower bound for
the squared bias term and the variance term separately.
A. Minimax lower bound for the “variance”
First we prove that when n & u(S), we have
inf
D̂
2
u(S)
.
E(P,Q) D̂ − D(P kQ) &
n
(P,Q)∈US,u(S)
sup
(196)
1
1
, · · · , 2(S−1)
, 12 ). Applying Lemma 15 to our Poisson sampling model nq̂i ∼ Poi(nqi ), 1 ≤ i ≤ S, we know
Fix P = ( 2(S−1)
that for feasible θ1 = P ×Q1 = (p1 , · · · , pS )×(q1 , · · · , qS ), θ0 = P ×Q0 = (p1 , · · · , pS )×(q10 , · · · , qS0 ) with θ0 , θ1 ∈ US,u(S) ,
D (Pθ1 kPθ0 ) =
=
=
=
S
X
i=1
S
X
(197)
D(Poi(nqi )kPoi(nqi0 ))
(198)
i=1
∞
S X
X
i=1 k=0
S
X
qi
P (Poi(nqi ) = k) · k ln 0 − n(qi − qi0 )
qi
npi ln
i=1
then Markov’s inequality yields
D (Poi(mpi ) × Poi(nqi )kPoi(mpi ) × Poi(nqi0 ))
S
X
qi
(qi − qi0 )
−
n
qi0
i=1
= nD(Q1 kQ0 ),
2
|D(θ1 ) − D(θ0 )|2
E(P,Q) D̂ − D(P kQ) ≥
×
4
D̂ (P,Q)∈US,u(S)
|D(θ1 ) − D(θ0 )|
inf sup P |D̂ − D(P kQ)| ≥
2
D̂ P ∈MS
|D(P kQ1 ) − D(P kQ0 )|2
≥
exp (−nD(Q1 kQ0 ))
16
where we are operating under the Poisson sampling model.
Fix ∈ (0, 1/2) to be specified later. Letting
1
1
1
Q1 =
,··· ,
,1 −
,
(S − 1)u(S)
(S − 1)u(S)
u(S)
1+
1−
1+
1−
1
Q0 =
,
,··· ,
,
,1 −
,
(S − 1)u(S) (S − 1)u(S)
(S − 1)u(S) (S − 1)u(S)
u(S)
inf
(199)
(200)
(201)
sup
(202)
(203)
(204)
(205)
26
where without loss of generality we assume that S is an odd integer. Direct computation yields
1
1
ln(1 + ) −
ln(1 − )
2u(S)
2u(S)
1
=−
ln(1 − 2 )
2u(S)
2
,
≤
u(S)
D(Q1 kQ0 ) = −
(206)
(207)
(208)
and
Hence, by choosing =
q
1
1
|D(P kQ1 ) − D(P kQ0 )| ≥ − ln(1 + ) − ln(1 − )
4
4
1
2
= − ln(1 − )
4
2
≥ .
4
u(S)
n ,
(209)
(210)
(211)
we know that
inf
D̂
2
u(S)
E(P,Q) D̂ − D(P kQ) ≥
256en
(P,Q)∈US,u(S)
sup
under the Poisson sampling model. The result for the multinomial case can be obtained via Lemma 22.
Next we apply Lemma 15 to show that
2
(ln u(S))2
sup
E(P,Q) D̂ − D(P kQ) &
inf
.
m
D̂ (P,Q)∈US,u(S)
1
1
, · · · , 2(S−1)u(S)
,1 −
Now fix Q = ( 2(S−1)u(S)
1
2u(S) ),
(213)
and consider
1
,···
2(S − 1)
1−
,···
P0 =
2(S − 1)
P1 =
(212)
1
1
,
2(S − 1) 2
1− 1+
,
,
2(S − 1) 2
,
(214)
(215)
with ∈ (0, 21 ) to be specified later. By the same argument, for θ1 = P1 × Q ∈ US,u(S) , θ0 = P0 × Q ∈ US,u(S) , we have
2
|D(P1 kQ) − D(P0 kQ)|2
sup
E(P,Q) D̂ − D(P kQ) ≥
exp (−mD(P1 kP0 ))
(216)
inf
16
D̂ (P,Q)∈US,u(S)
under the Poisson sampling model. It is straightforward to compute that
D(P1 kP0 ) =
and
1
1
1
1
1
2
ln
+ ln
= − ln(1 − 2 ) ≤
2 1− 2 1+
2
4
1
u(S)
1−
1 + (1 + )u(S)
1
ln u(S) + ln
−
(ln u(S) + ln(1 − )) −
ln
2
2 2u(S) − 1
2
2
2u(S) − 1
1+
1−
u(S)
=
ln u(S) −
ln(1 + ) −
ln(1 − ) − ln
2
2
2
2 2u(S) − 1
ln u(S)
≥
.
2
|D(P1 kQ) − D(P0 kQ)| =
(217)
(218)
(219)
(220)
1
Combining these inequalities and setting = m− 2 completes the proof of (213).
B. Minimax lower bound for the “squared bias”
We employ Lemma 16 to prove the minimax lower bounds corresponding to the squared bias terms. First we show that
when m & lnSS and u(S) & (ln S)2 , ln S & ln m, we have
2 S 2
inf
sup
E(P,Q) D̂ − D(P kQ) &
.
(221)
m ln m
D̂ (P,Q)∈US,u(S)
27
In fact, by choosing Q to be the uniform distribution, the estimation of KL divergence reduces to the estimation of entropy of
for all i = 1, · · · , S. Since in the proof of the
discrete distribution P , subject to an additional constraint pi ≤ u(S)qi = u(S)
S
minimax lower bound in [30], all pi satisfy that pi . lnmm , and our assumption implies
(ln S)2
u(S)
ln m
.
.
(222)
m
S
S
i.e., the additional condition is automatically satisfied. Hence, we can operate as if we do not have the additional condition,
and [30] gives
2 S 2 S 2
E(P,Q) D̂ − D(P kQ) &
.
(223)
inf
sup
m ln S
m ln m
D̂ (P,Q)∈US,u(S)
pi .
where we have used the condition m & lnSS and ln S & ln m to give ln S ln m here.
2
Now we are about the prove that when m & lnSS , n & Su(S)
ln S and u(S) & (ln S) , ln S & ln n, we have
2 Su(S) 2
inf
E(P,Q) D̂ − D(P kQ) &
.
sup
n ln n
D̂ (P,Q)∈US,u(S)
(224)
We begin with a lemma to construct two measures with matching moments and large difference on the functional value,
which corresponds to the duality between function space and measure space.
Lemma 17. [1, Lemma 10, Lemma 12] For any bounded interval I ⊂ R, positive integer K > 0 and continuous function f
on I, there exist two probability measures ν0 and ν1 supported on I such that
R
R
1) R tl ν1 (dt) = tRl ν0 (dt), for all l = 0, 1, 2, · · · , L;
2) f (t)ν1 (dt) − f (t)ν0 (dt) = 2EK [f ; I].
Recall that EK [f ; I] is the distance in the uniform norm on I from the function f (x) to the space spanned by {1, x, · · · , xK }.
d1 ln n
1
Based on Lemma 17, we choose I = [ n ln
n,
n ], K = d2 ln n with universal constants d1 , d2 > 0 to be specified later,
and f (x) = ln x. The following lemma presents a lower bound of the approximation error EK [f ; I].
d1 ln n
1
Lemma 18. [30] For K = d2 ln n, I = [ n ln
n,
n ] and f (x) = ln x, we have
EK [f ; I] ≥ c0
(225)
where the constant c0 > 0 only depends on d1 , d2 .
R
R
Define µ , tν1 (dt) = tν0 (dt), by construction we have µ ≤ d1 nln n . Now the two fuzzy hypotheses σ0 , σ1 in Lemma
16 are constructed as follows: for each i = 0, 1, σi fixes
u(S)
u(S)
(S − 1)u(S)
P =
,··· ,
,1 −
(226)
n ln n
n ln n
n ln n
and assigns νiS−1 to the vector (q1 , · · · , qS−1 ), and fixes qS = 1 − (S − 1)µ. Note that by assumption,
Sµ .
S ln n
(ln S)2
.
.1
n
u(S)
(227)
thus qS takes positive value and is thus valid under proper parameter configurations. Moreover, it is straightforward to verify
that (P, Q) ∈ US,u(S) with probability one under σi . Since under σi , Q may not form a probability measure, we consider the
set of approximate probability vectors
(
)
S
X
US,u(S) () , (P, Q) : P ∈ MS , |
qi − 1| < , pi ≤ u(S)qi , ∀i
(228)
i=1
with parameter ∈ (0, 1) to be specified later. Further define the minimax under the Poisson sampling model for estimating
D(P kQ) with (P, Q) ∈ US,u(S) () as
2
RP (S, m, n, u(S), ) , inf
sup
E(P,Q) D̂ − D(P kQ) .
(229)
D̂ (P,Q)∈US,u(S) ()
The equivalence between RP (S, m, n, u(S), ) and R(S, m, n, u(S)) defined in (273) is established in the following lemma.
Lemma 19. For any S, m, n ∈ N and ∈ (0, 1/2), we have
R(S, m, n, u(S)) ≥
1
u(S)
m
n
RP (S, 2m, 2n,
, ) − (ln u(S))2 exp(− ) + exp(− ) − 22 .
2
1+
4
4
(230)
28
Then condition σi on the event
S
EK [f ; I]
1 X
(ln qj − Eσi ln qj ) ≤
,
Ei , US,u(S) () ∩ (P, Q) :
S j=1
2
i = 0, 1
(231)
and define the conditional probability distribution as
πi (·) ,
σi (· ∩ Ei )
,
σi (Ei )
(232)
i = 0, 1.
By setting
d1 = 1,
we have
σi (US,u(S) ()c ) = σi
S
X
j=1
q j − 1 ≥ ≤
d2 = 10e,
=
S
n ln n
(233)
2
S−1
S−1
1 X
d2 (ln n)4
1 X
S d1 ln n
2
= 1
Var
(q
)
≤
E
(q
)
≤
→ 0 (234)
νi j
νi j
2
2
2
j=1
j=1
n
S
and by Lemma 18,
S
S−1
X
X
(ln(n ln n))2
(ln S)2
E
[f
;
I]
4
1
K
≤ 4
(ln qj − Eσi ln qj ) ≥
Var
·
.
→ 0.
σi
(ln
q
)
≤
ν
j
i
S j=1
2
(c0 S)2 j=1
(c0 )2
S
S
Hence, by the union bound,
(235)
S
X
EK [f ; I]
1
(ln qj − Eσi ln qj ) ≥
σi (Eic ) ≤ σi (US,u(S) ()c ) + σi
→ 0.
S j=1
2
(236)
V (F0 , F1 ) ≤ V (F0 , G0 ) + V (G0 , G1 ) + V (G1 , F1 )
(237)
Denote by Fi , Gi the marginal probability under prior πi and σi , respectively, for each i = 0, 1. Now by the triangle inequality
and [1, Lemma 11], we have
≤
σ0 (E0c )
+ V (G0 , G1 ) +
S
≤ σ0 (E0c ) + 6 + σ1 (E1c )
n
→ 0.
σ1 (E1c )
(239)
(240)
Moreover, by the definition of πi , the first two conditions of Lemma 16 hold with β0 = β1 = 0 for
(S − 1)u(S)
(S − 1)u(S) Eν0 (ln q) + Eν1 (ln q)
·
− 1−
ln(1 − (S − 1)µ)
ζ = H(P ) −
n ln n
2
n ln n
(S − 1)u(S) Eν1 (ln q) − Eν0 (ln q) − 2 ·
·
n ln n
2
Hence, by Lemma 16, we conclude that
s=
EK [f ;I]
2
RP (S, m, n, u(S), ) & s &
2
(238)
=
(S − 1)u(S) EK [f ; I]
Su(S)
·
&
.
n ln n
2
n ln n
Su(S)
n ln n
2
and the desired bound (224) follows from Lemma 19.
Hence, the combination of (196), (213), (221) and (224) yields that when u(S) & (ln S)2 , n & Su(S)
ln S , m &
ln S & ln(m ∨ n), we have
2 Su(S) 2 S 2 (ln u(S))2
u(S)
inf
sup
E(P,Q) D̂ − D(P kQ) &
+
+
+
n ln n
m ln m
m
n
D̂ (P,Q)∈US,u(S)
(241)
(242)
(243)
S
ln S
and
(244)
and the proof of Theorem 1 is complete.
V. O PTIMAL E STIMATORS FOR H ELLINGER D ISTANCE AND χ2 -D IVERGENCE
Having analyzed the minimax rate-optimal estimator for the KL divergence thoroughly, in this section we apply the general
recipe to other divergence functions, i.e., the Hellinger distance and the χ2 -divergence. Specifically, we explicitly construct the
minimax rate-optimal estimators for the Hellinger distance and the χ2 -divergence, and sketch the proof of the achievability
29
part in Theorem 3 and 4. For brevity, we omit the complete proof and remark that it can be obtained in a similar fashion as
in the analysis of the KL divergence.
A. Optimal estimator for the Hellinger distance
√
√
For the Hellinger distance, the bivariate function of interest is f (p, q) = ( p − q)2 . We first classify the regime. In this
case, Θ = Θ̂ = [0, 1]2 , and the non-analytic regime is
Θ̂0 = {(p, q) ∈ [0, 1]2 : p = 0 or q = 0}.
(245)
Based on the confidence sets in Poisson models, the “smooth” and “non-smooth” regimes for (p, q) can obtained via (23) and
(24) as
c1 ln n
c1 ln m
, 1]) ∪ ([
, 1] × [0, 1])
(246)
2n
2m
2c1 ln m
2c1 ln n
]) ∪ ([0,
] × [0, 1])
(247)
Θns = ([0, 1] × [0,
n
m
where c1 > 0 is some universal constant. Further, by (25) and (26), we obtain the “smooth” and “non-smooth” regimes based
on observations (p̂, q̂) as
Θs = ([0, 1] × [
c1 ln n
c1 ln m
, 1]) ∪ ([
, 1] × [0, 1])
n
m
c1 ln m
c1 ln n
]) ∪ ([0,
] × [0, 1]).
Θ̂ns = ([0, 1] × [0,
n
m
√
√
Next we estimate the quantity f (p, q) = ( p − q)2 in each regime. In the “smooth” regime where p ≥
q ≥ c1 nln n , we simply employ the plug-in approach with no bias correction:
p
p
Ts (p̂, q̂) = ( p̂ − q̂)2 .
Θ̂s = ([0, 1] × [
(248)
(249)
c1 ln m
m
and
(250)
ln m
In the “non-smooth” regime, by symmetry it suffices to consider the case where p ≤ c1 m
. Now we need to find a proper
√
√ 2
√
polynomial P (p, q) to approximate f (p, q) = ( p − q) = p + q − 2 pq. Recall that the degree of the approximating
polynomial P (p, q) is determined by the bias-variance tradeoff, and we will have the following result after careful analysis:
c ln n
• when q̂ ≥ 1 n , the resulting polynomial P (p, q) should be of degree c2 ln m on p and of degree 0 on q;
c1 ln n
• when q̂ <
n , the resulting polynomial P (p, q) should be of degree c2 ln m on p and of degree c2 ln n on q.
Now
we
explicitly
give the expression of P (p, q) in both cases in terms of the following best approximating polynomial of
√
x:
QK (x) =
K
X
k=0
aK,k xk , arg min 1 max |Q(z) −
Q∈polyK
z∈[0,1]
√
z|.
(251)
Recall that we use the sample splitting technique to determine the approximation region and approximate the functional,
respectively, i.e., the approximation region is based on (p̂2 , q̂2 ), while
q the polynomial
q is evaluated using (p̂1 , q̂1 ). Hence,
when q̂ ≥ c1 nln n , the approximation region is [0, 2c1mln m ]×[q̂2 − c1 q̂2nln n , q̂2 + c1 q̂2nln n ], and by the degree requirements
√
√
of P (p, q), a natural choice is P (p, q) = ∆m QKm ( ∆pm ) · q̂2 with Km = c2 ln m, ∆m = 2c1mln m ;
c ln n
2c ln m
• when q̂ < 1 n , the approximation region is [0, 1m
] × [0, 2c1nln n ], and by the degree requirements of P (p, q), a
√
√
p
q
natural choice is P (p, q) = ∆m QKm ( ∆m )· ∆n QKn ( ∆n ) with Km = c2 ln m, ∆m = 2c1mln m and Kn = c2 ln n, ∆n =
2c1 ln n
.
n
In summary, the estimator is constructed as follows.
•
Estimator Construction 3. Conduct three-fold sample splitting to obtain i.i.d. samples (p̂i,1 , p̂i,2 , p̂i,3 ) and (q̂i,1 , q̂i,2 , q̂i,3 ).
The estimator T̂ for the Hellinger distance H 2 (P, Q) is given by
S
X
p
p
c1 ln m
c1 ln m
c1 ln n
c1 ln n
T̂ = 1 −
p̂i,2 1(p̂i,3 ≥
) + R̃m (p̂i,1 )1(p̂i,3 <
)
q̂i,2 1(q̂i,3 ≥
) + R̃n (q̂i,1 )1(q̂i,3 <
)
m
m
n
n
i=1
(252)
where for l = m, n
R̃l (x) , (Rl (x) ∧ 1) ∨ (−1)
−k+ 12 k−1
cX
2 ln l
Y
2c1 ln l
j
Rl (x) ,
ac2 ln l,k
(x − )
l
l
j=0
k=1
(253)
(254)
30
coefficients {aK,k } are given by (251), and c1 , c2 > 0 are some suitably chosen universal constants.
The previous estimator does not require the knowledge of S since it assigns zero to unseen
(we remove the constant
PS symbols
√
term in the expression of Rl (x)). Note that since the Hellinger distance H 2 (P, Q) = 1− i=1 pi qi enjoys a natural separation
in its variables (pi , qi ), the pair (pi , qi ) is also separated in our resulting estimator. Moreover, in our estimator construction we
can also merge (p̂i,1 , p̂i,2 ) and (q̂i,1 , q̂i,2 ) to result in a two-fold sample splitting.
Now we analyze the bias of the previous estimator. When p < 2c1mln m is small, by [1, Lemma 17], we know that
√
p
p
∆m
1
√
√
|ERm (p̂) − p| = | ∆m QKm (
.√
.
(255)
) − p| .
2
∆m
Km
m ln m
When p ≥
2c1 ln m
m
is large, by Lemma 6 with r = 0 we know that
√
p
p
d2 ξ
1
1
√
. √ .√
.
|E p̂ − p| .
· sup
2
m ξ∈[p/2,2p] dξ
m p
m ln m
(256)
Hence, the total bias of T̂ can be upper bounded as
s
r
r
√
√
S
X
qi
pi
S
S
S
√
|Bias(T̂ )| .
+√
≤
+
m ln m
n ln n
(m ∧ n) ln(m ∧ n)
m ln m
n ln n
i=1
(257)
as shown in Theorem 3. The variance can also be obtained in a similar fashion, and we omit the details.
B. Optimal estimator for the χ2 -divergence
2
For the χ2 -divergence χ2 (P, Q) over US,u(S) , the bivariate function of interest is f (p, q) = pq . We first classify the regime.
Since this function shares very similar analytic properties as the function p ln q used in the KL divergence case, and our
parameter set US,u(S) remains the same, here the “smooth” and “non-smooth” regimes are also given by
c1 ln n
, 1]
n
c1 ln n
Θ̂ns = [0, 1] × [0,
]
n
Θ̂s = [0, 1] × [
(258)
(259)
with some universal constant c1 2> 0.
Next we estimate f (p, q) = pq in each regime. In the “smooth” regime where q ≥ c1 nln n , we seek to correct the bias of
the plug-in estimator 1/q̂ in estimating 1/q. Based on our general bias correction technique (31), we simply use the following
order-three bias correction:
T̂ (3) (q̂1 , q̂2 ) =
1
(q̂2 − q̂1 )2
4q̂2
(q̂2 − q̂1 )3
3q̂22
6q̂2
q̂2 − q̂1
+
−
−
+
− 2 4.
−
q̂1
q̂12
q̂13
nq̂13
q̂14
nq̂14
n q̂1
(260)
1
Since p2 admits an unbiased estimate p̂(p̂ − m
) in the Poisson model mp̂ ∼ Poi(mp), the overall estimator in the “smooth”
regime is given by
1
T̂s (p̂1 , q̂1 ; p̂2 , q̂2 ) = p̂1 p̂1 −
· T̂ (3) (q̂1 , q̂2 ) · 1(q̂1 6= 0)
(261)
m
1
1
q̂2 − q̂1
(q̂2 − q̂1 )2
4q̂2
(q̂2 − q̂1 )3
3q̂ 2
6q̂2
= p̂1 p̂1 −
·
−
+
− 3−
+ 24 − 2 4 · 1(q̂1 6= 0). (262)
2
3
4
m
q̂1
q̂1
q̂1
nq̂1
q̂1
nq̂1
n q̂1
In the “non-smooth” regime, as is in the KL divergence case, we can further distinguish into “non-smooth” regime I and
“non-smooth” regime II and employ best polynomial approximation in these regimes, respectively. However, motivated by the
adaptive estimator D̂A for the KL divergence where a single polynomial approximation is enough, we wonder whether or not
it is also the case in the estimation of χ2 -divergence. Specifically, we seek a polynomial QK (q) of degree K on [0, ∆n ] such
that the following quantity
sup
q∈(0,∆n ]
q2
1
− QK (q)
q
(263)
is as small as possible, where ∆n = 2c1nln n . In other words, we seek to approximate the linear function q using q 2 , · · · , q K+2
on [0, ∆n ]. Fortunately, this task can be done with the help of the Chebyshev polynomial, and we summarize the result in the
following lemma.
31
Lemma 20. Let TK (x) = cos(K arccos x) be the degree-K Chebyshev polynomial on [−1, 1]. Then
p
K+2
− 2(K + 2)2 x/∆n
K T2(K+2) ( x/∆n ) − (−1)
QK (x) = (−1)
2
2(K + 2) (x/∆n )2
(264)
is a degree-K polynomial such that
sup
x2
x∈(0,∆n ]
1
∆n
.
− QK (x) =
x
(K + 2)2
(265)
On the other hand, using the Ditzian–Totik modulus of smoothness and Lemma 10 (or by Chebyshev’s alternating theorem
since {x2 , x3 , · · · } satisfies the Haar condition [49]), it is not hard to prove that no other degree-K polynomial can achieve
n
an approximation error of order o( ∆
K 2 ). Hence, the polynomial QK defined in Lemma 20 achieves the rate-optimal uniform
approximation error.
Motivated by Lemma 20, define Q̂K (x) be another polynomial such that EQ̂K (q̂) = QK (q) for nq̂ ∼ Poi(nq). Now in the
“non-smooth” regime, we choose K = c2 ln n, and use the following estimator:
1
T̂ns (p̂1 , q̂1 ) = p̂1 p̂1 −
· Q̂K (q̂1 ).
(266)
m
In summary, we have arrived at the following estimator construction.
Estimator Construction 4. Conduct three-fold sample splitting to obtain i.i.d. samples (p̂i,1 , p̂i,2 , p̂i,3 ) and (q̂i,1 , q̂i,2 , q̂i,3 ).
The estimator T̂ for χ2 -divergence χ2 (P, Q) is given by
S
X
c1 ln n
c1 ln n
) + T̃ns (p̂i,1 , q̂i,1 )1(q̂i,3 <
) −1
(267)
T̂s (p̂i,1 , q̂i,1 ; p̂i,2 , q̂i,2 )1(q̂i,3 ≥
T̂ =
n
n
i=1
where
T̃ns (x, y) , (T̂ns (x, y) ∧ 1) ∨ (−1)
(268)
and T̂s (x, y; x0 , y 0 ), T̂ns (x, y) are given by (262) and (266), respectively, and c1 , c2 > 0 are some suitably chosen universal
constants.
By construction, the previous estimator does not require the knowledge of S nor u(S), and is thus adaptive. For the analysis
of its performance, when q < c1 nln n is small, with the help of Lemma 20 we know that
ET̂ns (p̂, q̂) −
Moreover, for q ≥
c1 ln n
n
ET̂s (p̂1 , q̂1 ; p̂2 , q̂2 ) −
p2
1
(u(S))2
p2
= p2 Q(q) −
≤ (u(S))2 q 2 Q(q) −
.
.
q
q
q
n ln n
(269)
is large, applying Lemma 6 with r = 3 yields
p2
1
q
d4 (ξ −1 )
p2
(u(S))2
(u(S))2
= p2 ET̂ (3) (q̂1 , q̂2 ) −
. p2 · ( )2 sup
. 2 3 .
.
. (270)
4
2
q
q
n ξ∈[q/2,2q]
dξ
n q
n q
n ln n
Hence, the total bias of the previous estimator can be upper bounded as
|Bias(T̂ )| .
S
X
(u(S))2
i=1
n ln n
=
S(u(S))2
n ln n
(271)
which coincides with the term in Theorem 4. The variance can be dealt with analogously, and we omit the lengthy proofs.
VI. C ONCLUSIONS AND F UTURE W ORK
We proposed a general and detailed methodology for the construction of minimax rate-optimal estimators for low-dimensional
functionals of high-dimensional parameters, especially when the functional of interest is non-smooth in some part of its domain.
We elaborate on the insights of [1] which shows that the bias is the dominating term in the estimation of functionals and
approximation is the key for an efficient bias reduction, and find an interesting interplay between the functional itself and
the statistical model. Specifically, we show that the “smooth” and “non-smooth” regimes are determined by both the nonanalytic region of the underlying functional which is only related to the smoothness of the functional, and the confidence sets
given by concentration of measures which solely depend on the statistical model. Moreover, in the “non-smooth” regime, the
approximation region is determined by the confidence sets, while the approximation error is determined by the smoothness of
the functional in this region. Our general recipe is based on the interplay between these two factors, and successfully yields
the minimax rate-optimal estimators for various divergences including KL divergence, Hellinger distance and χ2 -divergence.
32
We have also explored the ideas behind the polynomial approximation and the plug-in approach in bias reduction. For
polynomial approximation, the uniform approximation error corresponds to the bias of the resulting estimator, and thus the
best approximating polynomials are usually used. We remark that it is a highly non-trivial task and remains open in general
to obtain and analyze the best polynomial approximation error for multivariate functionals, while for some special cases (e.g.,
general polytopes, balls and spheres) there are powerful tools from approximation theory. The plug-in approach corrects the
bias with the help of high-order Taylor expansions, which only works for the region where the functional is analytic. For bias
correction of the plug-in approach, in this paper we propose a general unbiased estimator of the Taylor series up to an arbitrary
order.
Following [1], this paper presents another second step towards a general theory of functional estimation. Despite our progress,
the interplay between the smoothness of the functional and the statistical model has yet to be completely revealed, and the
choice of the approximating polynomial in the “non-smooth” regime has thus far required functional-specific “tricks”. An
ambitious but worthy goal is to establish a general explanation of the effective sample size enlargement phenomenon in the
parametric case, and to find the counterpart in the estimation of non-smooth nonparametric functionals beyond the insights
provided by [33], [50].
A PPENDIX A
AUXILIARY L EMMAS
We first prove that the worst-case mean squared error of any estimator is infinity if we allow to choose any P which is
absolutely continuous with respect to Q.
Lemma 21. Let US = {(P, Q) : P, Q ∈ MS , P Q}. Then for any configuration (S, m, n) with S ≥ 2, we have
Rminimax (US ) = ∞.
(272)
The next lemma relates the minimax risk under the Poisson sampling model and that under the Multinomial model. We define
the minimax risk for Multinomial model with (m, n) observations with (P, Q) ∈ US,u(S) for estimating the KL divergence
D(P kQ) as
R(S, m, n, u(S)) , inf
sup
D̂ (P,Q)∈US,u(S)
EMultinomial D̂ − D(P kQ)
2
,
(273)
and the counterpart for the Poisson sampling model as
RP (S, m, n, u(S)) , inf
sup
D̂ (P,Q)∈US,u(S)
2
EPoisson D̂ − D(P kQ) .
(274)
Lemma 22. The minimax risks under the Poisson sampling model and the Multinomial model are related via the following
inequalities:
n
m n
m
(275)
RP (S, 2m, 2n, u(S)) − (ln u(S))2 exp(− ) + exp(− ) ≤ R(S, m, n, u(S)) ≤ 4RP (S, , , u(S)).
4
4
2 2
The next lemma gives the approximation properties of ln x.
Lemma 23. There exists a universal constant Cln > 0 such that for any 0 < a < b,
( b
b ≤ ean2 ,
2
b
En [ln x; [a, b]] ≤ Cln W ( 2 ) ≡ Cln · ean
an
ln( b 2 ) b > ean2 .
(276)
an
Lemma 24. For f (p, q) = p ln q and the region R given in (143), there exists a universal constant C0 only depending on c1
such that
u(S) ln n
1
2
.
(277)
ωR
(f, ) ≤ C0 ·
K
K 2n
The following lemma gives an upper bound for the second moment of the unbiased estimate of (p − q)j in Poisson model.
Lemma 25. [51] Suppose nX ∼ Poi(np), p ≥ 0, q ≥ 0. Then, the estimator
j
k−1
X
Y
j
h
j−k
gj,q (X) ,
(−q)
X−
k
n
k=0
h=0
(278)
33
is the unique unbiased estimator for (p − q)j , j ∈ N, and its second moment is given by
j 2
X
j
pk k!
2
E[gj,q (X) ] =
(p − q)2(j−k) k
n
k
k=0
p j
n(p − q)2
= j!
Lj −
assuming p > 0,
n
p
where Lm (x) stands for the Laguerre polynomial with order m, which is defined as:
m
X
m (−x)k
Lm (x) =
k!
k
(279)
(280)
(281)
k=0
If M ≥
n(p−q)2
p
∨ j, we have
E[gj,q (X)2 ] ≤
2M p
n
j
.
(282)
In order to bound the coefficients of best polynomial approximations, we need the following result by Qazi and Rahman
[52, Thm. E] on the maximal coefficients of polynomials on a finite interval.
Pn
Lemma 26. Let pn (x) = ν=0 aν xν be a polynomial of degree at most n such that |pn (x)| ≤ 1 for x ∈ [−1, 1]. Then,
|an−2µ | is bounded above by the modulus of the corresponding coefficient of Tn for µ = 0, 1, . . . , bn/2c, and |an−1−2µ | is
bounded above by the modulus of the corresponding coefficient of Tn−1 for µ = 0, 1, . . . , b(n − 1)/2c. Here Tn (x) is the n-th
Chebyshev polynomials of the first kind.
Moreover, it is shown in Cai and Low [27, Lemma 2] that all of the coefficients of Chebyshev polynomial T2m (x), m ∈ Z+
are upper bounded by 23m . Hence, we can obtain the following result when the approximation interval is not centered at zero.
Pn
Lemma 27. Let pn (x) = ν=0 aν xν be a polynomial of degree at most n such that |pn (x)| ≤ A for x ∈ [a, b], where
a + b 6= 0. Then
−ν
n
a+b
b+a
7n/2
|aν | ≤ 2
A
+1 ,
ν = 0, · · · , n.
(283)
2
b−a
The following lemma gives some tail bounds for Poisson and Binomial random variables.
Lemma 28. [53, Exercise 4.7] If X ∼ Poi(λ) or X ∼ B(n, nλ ), then for any δ > 0, we have
λ
2
eδ
P(X ≥ (1 + δ)λ) ≤
≤ e−δ λ/3 ∨ e−δλ/3
1+δ
(1 + δ)
λ
2
e−δ
≤ e−δ λ/2 .
P(X ≤ (1 − δ)λ) ≤
(1 − δ)1−δ
(284)
(285)
The following lemmas deal with the upper bound of the variance in different scenarios.
Lemma 29. For independent random variables X, Y with finite second moment, we have
Var(XY ) = (EY )2 Var(X) + (EX)2 Var(Y ) + Var(X)Var(Y ).
(286)
Lemma 30. [27, Lemma 4] Suppose 1(A) is an indicator random variable independent of X and Y , then
Var(X 1(A) + Y 1(Ac )) = Var(X)P(A) + Var(Y )P(Ac ) + (EX − EY )2 P(A)P(Ac ).
(287)
Lemma 31. [27, Lemma 5] For any two random variables X and Y ,
Var(X ∧ Y ) ≤ Var(X) + Var(Y ).
(288)
In particular, for any random variable X and any constant C,
Var(X ∧ C) ≤ Var(X).
(289)
34
A PPENDIX B
P ROOF OF M AIN L EMMAS
A. Proof of Lemma 1
First we give an upper bound of Var(gn (q̂)) for nq̂ ∼ Poi(nq). Note that gn (q) is continuously differentiable on [0, 1], we
have
Var(gn (q̂)) ≤ E(gn (q̂) − gn (q))2
(290)
q
q
= E(gn (q̂) − gn (q)) 1(q̂ ≥ ) + E(gn (q̂) − gn (q))2 1(q̂ < )
2
2
q
q
= E[gn0 (ξ1 )]2 (q̂ − q)2 1(q̂ ≥ ) + E[gn0 (ξ2 )]2 (q̂ − q)2 1(q̂ < )
2
2
q
≤ sup |gn0 (ξ1 )|2 · E(q̂ − q)2 + sup |gn0 (ξ2 )| · q 2 P(q̂ < )
2
ξ1 ∈[q/2,1]
ξ2 ∈[0,1]
4 q
≤ 2 · + n2 · q 2 e−nq/8
q n
3
4
n2
24
≤
+
·
nq
q
en
700
≤
nq
2
(291)
(292)
(293)
(294)
(295)
(296)
where in the previous steps we have used Lemma 28 and the fact
k
k
q k e−cnq ≤
ecn
(297)
for any q ∈ [0, 1].
Now we are ready to bound the bias. By independence and the triangle inequality, we have
(298)
|E[p̂gn (q̂)] − pgn (q)| = p|E[gn (q̂) − gn (q)]|
(299)
≤ u(S)q|E[gn (q̂) − gn (q)]|
(300)
≤ u(S) (|E[q̂gn (q̂)] − qgn (q)| + |E[(q̂ − q)gn (q̂)]|) .
We bound these two terms separately. For the first term, it can be obtained similar to [38] (via the second-order Ditzian–Totik
modulus of smoothness defined in [44]) that
5 ln 2
n
for any q ∈ [0, 1]. For the second term, first note that E[q̂] = q, we have
(301)
|E[q̂gn (q̂)] − qgn (q)| ≤
|E[(q̂ − q)gn (q̂)]| = |E[(q̂ − q)(gn (q̂) − Egn (q̂))]|.
(302)
|E[(q̂ − q)gn (q̂)]|2 ≤ E|q̂ − q|2 · E|gn (q̂) − Egn (q̂)|2
(303)
Hence, by the Cauchy-Schwartz inequality and the previous bound on Var(gn (q̂)), we have
= E|q̂ − q|2 · Var(gn (q̂))
q 700
≤ ·
n nq
700
= 2.
n
A combination of these two inequalities yields the bias bound
!
√
5 ln 2
700
30u(S)
|E[p̂gn (q̂)] − pgn (q)| ≤ u(S)
+
≤
n
n
n
(304)
(305)
(306)
(307)
ln 2
which together with |E[p̂ ln p̂] − p ln p| ≤ 5 m
in [38] yields the desired bias bound.
Next we bound the variance as follows:
Var(p̂(ln p̂ − gn (q̂))) ≤ E[p̂(ln p̂ − gn (q̂)) − p(ln p − gn (q))]2
2
2
2
≤ 3 E[p̂(ln p̂ − ln p)] + E[p̂(gn (q̂) − gn (q))] + E[(p̂ − p)(ln p − gn (q))]
≡ 3(A1 + A2 + A3 )
(308)
(309)
(310)
35
We bound A1 , A2 , A3 separately. To bound A1 , we further decompose A1 as
A1 = E[p̂(ln p̂ − ln p)]2 1(p̂ ≤ p) + E[p̂(ln p̂ − ln p)]2 1(p̂ > p)1(p ≥
where
1
1
) + E[p̂(ln p̂ − ln p)]2 1(p̂ > p)1(p < )
m
m
≡ B1 + B2 + B3
"
#
p̂ 2
p
B1 ≤ E sup | | · |p̂ − p|2 1(p̂ ≤ p) ≤ E|p̂ − p|2 =
ξ
m
ξ≥p̂
#
"
1
1
E[p̂2 (p̂ − p)2 ]
p̂ 2
2
1(p ≥ )
B2 ≤ E sup | | · |p̂ − p| 1(p̂ > p) 1(p ≥ ) ≤
2
m
p
m
ξ≥p ξ
p
p
1
5
1
6
+
=
+
1(p ≥ ) ≤ 2 + .
m3 p m2
m
m
m
m
(311)
(312)
(313)
(314)
(315)
Upper bounding B3 requires more delicate analysis. First note that by differentiation with respect to p, for any k ≥ 1 we have
sup
1
p≤ m
k 2
k 2
(mp)k k 2
(mp)k k 2
· 2 (ln
) ≤ sup
· 2 (2 + ln
)
k!
m
mp
k!
m
mp
p≤ 1
(316)
m
≤
(2 + ln k)2 k 2
· 2.
k!
m
(317)
Hence, expanding the expectation of B3 yields
B3 =
∞
X
e−mp
k=1
where the infinite sum converges to
∞
(mp)k k 2
k 2
1
1 X k 2 (2 + ln k)2
45
· 2 (ln
) 1(p < ) ≤ 2
< 2
k!
m
mp
m
m
k!
m
∞
X
k 2 (2 + ln k)2
k=1
Hence, A1 can be upper bounded as
(318)
k=1
k!
(319)
≈ 44.17 < 45.
A1 = B1 + B2 + B3 ≤
51
2p
+ .
m2
m
(320)
As for A2 , since we have proved that E(gn (q̂) − gn (q))2 ≤ 700
nq , by independence we have
p
700
700u(S)
1
700
= p2 +
·
≤
p+
.
A2 ≤ E(p̂2 ) ·
nq
m
nq
n
m
For A3 , it is clear that
p
2p
A3 = (ln p − gn (q))2 ≤
m
m
p
(ln )2 + (gn (q) − ln q)2
q
where we have used the fact that for p ≤ u(S)q,
2
≤
m
4q 4u(S)
p(ln u(S)) + 2 +
e
en
2
p
4q
4q
p(ln )2 ≤ p(ln u(S))2 ∨ 2 ≤ p(ln u(S))2 + 2
q
e
e
1
1
4u(S)
p(gn (q) − ln q)2 ≤ p(1 − ln(nq))2 1(q < ) ≤ u(S)q(1 − ln(nq))2 1(q < ) ≤
.
n
n
en
A combination of the upper bounds of A1 , A2 , A3 yields
51
2
4q 4u(S)
700u(S)
1
2
Var(p̂(ln p̂ − gn (q̂))) ≤ 2 +
p + p(ln u(S)) + 2 +
+
p+
.
m
m
e
en
n
m
The proof is complete.
(321)
(322)
(323)
(324)
(325)
36
B. Proof of Lemma 3
Braess and Sauer [39, Prop. 4] showed the following equalities for the Bernstein polynomials:
x0 (1 − x0 )
n
x0 (1 − x0 )(1 − 2x0 )
3
Bn [(x − x0 ) ](x0 ) =
.
n2
Bn [(x − x0 )2 ](x0 ) =
(326)
(327)
Hence, choosing x0 = x, we have
1 x(1 − x)
(1 − x)((n + 4)x − 2)
2 x(1 − x)(1 − 2x)
·
=
.
− 3·
x2
n
x
n2
n2 x2
Then the desired inequality is a direct result of Lemma 2.
(328)
Q3 (x) − Bn [Q3 ](x) =
C. Proof of Lemma 4
For the first statement, define the remainder term of the Taylor expansion as
R(θ̂n(1) ) ,
r
(1)
X
G(k) (θ̂n )
k=0
(1)
k!
(θ − θ̂n(1) )k − G(θ)
(329)
and denote by E the event that θ̂n ∈ V (θ). By the definition of reverse confidence sets, Pθ (E c ) ≤ δ, and
|Eθ H(θ̂n(1) , θ̂n(2) ) − G(θ)| ≤ |Eθ (H(θ̂n(1) , θ̂n(2) ) − G(θ))1(E)| + |Eθ (H(θ̂n(1) , θ̂n(2) ) − G(θ))1(E c )|
≤ |Eθ (Ĝ(r) (θ̂n(1) , θ̂n(2) ) − G(θ))1(E)| + δ ·
=
θ1 ,θ2 ∈Θ̂
!
θ1 ,θ2 ∈Θ̂
Eθ [|θ̂n − θ|r+1 1(E)]
≤
· sup |G(r+1) (θ̂)| + δ ·
(r + 1)!
θ̂∈V (θ)
(1)
(1)
(332)
!
|G(θ)| + sup |H(θ1 , θ2 )|
θ1 ,θ2 ∈Θ̂
(1)
Eθ |θ̂n − θ|r+1
≤
· sup |G(r+1) (θ̂)| + δ ·
(r + 1)!
θ̂∈V (θ)
(331)
|G(θ)| + sup |H(θ1 , θ2 )|
1(E)| + δ · |G(θ)| + sup |H(θ1 , θ2 )|
|Eθ R(θ̂n(1) )
(330)
!
!
|G(θ)| + sup |H(θ1 , θ2 )| .
θ1 ,θ2 ∈Θ̂
(333)
(334)
(2)
As for the variance of Hk (θ̂n , θ̂n ) with k ≥ 0, we first note by triangle inequality that
Varθ (Hk (θ̂n(1) , θ̂n(2) )) ≤ 2Varθ (Hk (θ̂n(1) , θ̂n(2) )1(E)) + 2Varθ (Hk (θ̂n(1) , θ̂n(2) )1(E c ))
≤
1(E)) + 2δ · sup |Hk (θ1 , θ2 )| .
2Varθ (Gk (θ̂n(1) , θ̂n(2) )
2
(335)
(336)
θ1 ,θ2 ∈Θ̂
Hence, it suffices to upper bound Varθ (Gk (θ̂n , θ̂n )1(E)). Note that Gk (θ̂n , θ̂n ) is a linear combination of terms of the
(1)
(1)
(2)
form G(k) (θ̂n )(θ̂n )k−j Sj (θ̂n ) with 0 ≤ j ≤ k, we employ the triangle inequality again to reduce the problem of bounding
the total variance to bounding the variance of individual terms. By independence and Lemma 29, it further suffices to upper
(1)
(1)
(1)
(1)
bound |Eθ G(k) (θ̂n )(θ̂n )k−j 1(E)| and Varθ (G(k) (θ̂n )(θ̂n )k−j 1(E)), respectively. In fact, defining Gk,j (θ) = θj G(k) (θ),
by Taylor expansion again we have
(1)
(2)
(1)
(2)
|Eθ Gk,j (θ̂n(1) )1(E)| ≤ |Eθ (Gk,j (θ̂n(1) ) − Gk,j (θ))1(E)| + |Gk,j (θ)|
1
= |Eθ (G0k,j (θ)(θ̂n(1) − θ) + G00k,j (ξ)(θ̂n(1) − θ)2 )1(E)| + |Gk,j (θ)|
2
!
1
00
(1)
2
c
0
≤ |Eθ Gk,j (ξ)(θ̂n − θ) 1(E)| + |Gk,j (θ)| + P(E ) · |Gk,j (θ)|(|θ| + sup |θ̂|)
2
θ̂∈Θ̂
!
(1)
2
Eθ (θ̂n − θ)
00
0
≤
· sup |Gk,j (θ̂)| + |Gk,j (θ)| + δ · |Gk,j (θ)|(|θ| + sup |θ̂|)
2
θ̂∈V (θ)
θ̂∈Θ̂
(337)
(338)
(339)
(340)
37
and
Varθ (Gk,j (θ̂n(1) )1(E)) ≤ Eθ (Gk,j (θ̂n(1) )1(E) − Gk,j (θ))2
≤
≤
≤
(341)
1
2Eθ ((Gk,j (θ̂n(1) ) − Gk,j (θ)) (E))2 + 2|Gk,j (θ)|2 · P(E c )
2Eθ (G0k,j (ξ)(θ̂n(1) − θ) (E))2 + 2δ · |Gk,j (θ)|2
2Eθ (θ̂n(1) − θ)2 · sup |G0k,j (θ̂)|2 + 2δ · |Gk,j (θ)|2
θ̂∈V (θ)
(342)
1
(343)
(344)
which establishes the desired variance bound.
(1) (2)
Finally it remains to bound the quantity |Eθ Hk (θ̂n , θ̂n )| for k ≥ 1. If k ≥ 2, as above, by triangle inequality, we conclude
that
|Eθ Hk (θ̂n(1) , θ̂n(2) )| ≤ |Eθ Hk (θ̂n(1) , θ̂n(2) )1(E)| + |Eθ Hk (θ̂n(1) , θ̂n(2) )1(E c )|
(345)
1(E)| + δ · sup |Hk (θ1 , θ2 )|
≤
|Eθ Gk (θ̂n(1) , θ̂n(2) )
=
1
|Eθ G(k) (θ̂n(1) )(θ − θ̂n(1) )k 1(E)| + δ · sup |Hk (θ1 , θ2 )|
k!
θ1 ,θ2 ∈Θ̂
(346)
θ1 ,θ2 ∈Θ̂
(347)
(1)
≤
Eθ |θ̂n − θ|k
· sup |G(k) (θ̂)| + δ · sup |Hk (θ1 , θ2 )|.
k!
θ1 ,θ2 ∈Θ̂
θ̂∈V (θ)
(348)
(1)
For k = 1, we further note that Eθ θ̂n = θ, and conduct order-one Taylor expansion to yield
|Eθ H1 (θ̂n(1) , θ̂n(2) )| ≤ |Eθ G0 (θ̂n(1) )(θ − θ̂n(1) )1(E)| + δ · sup |H1 (θ1 , θ2 )|
(349)
θ1 ,θ2 ∈Θ̂
= |Eθ (G0 (θ) + (θ̂n(1) − θ)G00 (ξ))(θ − θ̂n(1) )1(E)| + δ · sup |H1 (θ1 , θ2 )|
(350)
θ1 ,θ2 ∈Θ̂
≤
Eθ (θ̂n(1)
00
2
− θ) · sup |G (θ̂)| + δ ·
θ̂∈V (θ)
0
sup |H1 (θ1 , θ2 )| + |G (θ)|(|θ| + sup |θ̂|)
θ1 ,θ2 ∈Θ̂
θ̂∈Θ̂
!
(351)
as desired.
D. Proof of Lemma 5
Replacing n by m, we adopt the notations of V (p) and δ in (121). Denote by E the event p̂ ∈ V (p), we have
1
|EUH (p̂) + p ln p| = E −p̂ ln p̂ +
+ p ln p
2m
(p̂ − p)2
(p̂ − p)3
|E(p̂ − p)3 |
≤ E −p̂ ln p̂ − (1 + ln p)(p̂ − p) +
−
+
+
p
ln
p
2p
6p2
6p2
2
3
(p̂ − p)
(p̂ − p)
≤ E −p̂ ln p̂ − (1 + ln p)(p̂ − p) +
−
+ p ln p 1(E) +
2p
6p2
(p̂ − p)2
(p̂ − p)3
|E(p̂ − p)3 |
c
P(E ) · sup −p̂ ln p̂ − (1 + ln p)(p̂ − p) +
−
+
p
ln
p
+
2p
6p2
6p2
p̂∈[0,1]
4
1
1
1
1
E|p̂ − p|
sup |(−x ln x)(4) | + 2m−c1 /24 ·
− p ln p + 1 − ln p +
+ 2 +
≤
24
e
2p 6p
6pm2
x∈V (p)
≤
p + 3mp2
2
1
sup
+ 4m−c1 /24+2 +
24m3 x∈V (p) x3
6pm2
where we have used mp ≥ c1 ln m/2 ≥ 2. Since any x ∈ V (p) satisfies
r
1 c1 p ln m
p
x≥p−
≥
2
2m
2
(352)
(353)
(354)
(355)
(356)
(357)
38
by the previous inequality we have
2
1
p + 3mp2
·
+ 4m−c1 /24+2 +
24m3
(p/2)3
6pm2
2
1
4mp2
·
+ 4m−c1 /24+2 +
≤
24m3 (p/2)3
6pm2
3
≤ 2 + 4m−c1 /24+2
m p
6
≤
+ 4m−c1 /24+2
c1 m ln m
(358)
|EUH (p̂) + p ln p| ≤
(359)
(360)
(361)
as desired.
As for the variance, since the constant bias correcting term does not affect variance, applying Lemma 4 with k = 0 yields
p
(362)
Var(UH (p̂)) ≤ A0 2m−c1 /24 · 1 + (1 − ln(p/2))2 + 2m−c1 /24 · (p ln p)2
m
2
p(2 − ln p)
≤ A0
+ 4m−c1 /24 .
(363)
m
E. Proof of Lemma 6
The only non-trivial part in deducing the third inequality from Lemma 4 is to prove that for any k ∈ N and q ≥
q k2
Eq |q̂1 − q|k .
.
n
1
n,
(364)
In fact, since Eq exp(sq̂1 ) = exp(nq(es/n − 1)), we have Eq exp(s(q̂1 − q)) = exp(nq(es/n − 1 − s/n)). Hence, by comparing
the coefficient of sk at both sides of
k
∞
∞
∞
X
Eq (q̂1 − q)k k X (nq)k X 1 s j
s =
( )
(365)
k!
k!
j! n
j=2
k=0
k=0
yields that for even k, Eq (q̂1 − q) can be expressed as
k
k
k
Eq (q̂1 − q) =
2
X
ak,j
j=0
qj
nk−j
(366)
k/2
for some coefficients {ak,j }j=0 . Now for even k, the desired inequality follows from the assumption q ≥ n−1 . For odd k,
Cauchy-Schwartz inequality yields
k+1 1
1
q k2
q k−1
1
1
2 ·2+ 2 ·2
Eq |q̂1 − q|k ≤ Eq |q̂1 − q|k−1 2 Eq |q̂1 − q|k+1 2 .
=
.
(367)
n
n
Hence, the third inequality follows. The first inequality also follows from this fact, Lemma 4, δ ≤ 2n−c1 /24 and V (q) ⊂ [ 2q , 2q].
Now it remains to deduce the second inequality from Lemma 4. By (87), we know that Sj (q̂2 ) is a linear combination of
q̂2j−i
ni with constant coefficients and i = 0, 1, · · · , j. By the triangle inequality for the variance, it suffices to upper bound the
variance of each individual term
any k ≥ 0 and q ≥ n−1 ,
q̂2j−i
ni .
Using the same approach based on moment generating function, we conclude that for
Varq (q̂2k )
=
Eq (q̂22k )
As a result, for 0 ≤ i ≤ j,
Varq (
and thus Varq (Sj (q̂2 )) .
q 2j−1
n .
−
(Eq (q̂2k ))2
.
2k−1
X
j=0
qj
n2k−j
.
q 2k−1
.
n
q̂2j−i
q 2j−2i−1
q 2j−1
)
.
≤
ni
n2i+1
n
Finally it suffices to note that for q ≥
c1 ln n
2n
(369)
≥ n−1 ,
Eq [Sj2 (q̂2 )] = (Eq Sj (q̂2 ))2 + Varq (Sj (q̂2 )) . q 2j +
which completes the proof of the second inequality.
(368)
q 2j−1
. q 2j
n
(370)
39
F. Proof of Lemma 7
To invoke Lemma 6, we remark that g(q) = ln q, r = 3, and
h0 (q̂1 , q̂2 ) = ln q̂1 · 1(q̂1 6= 0)
q̂2 − q̂1
h1 (q̂1 , q̂2 ) =
· 1(q̂1 6= 0)
q̂
1
q̂2
(q̂2 − q̂1 )2
+
· 1(q̂1 6= 0)
h2 (q̂1 , q̂2 ) = −
2q̂12
2nq̂12
q̂2
q̂22
2q̂2
(q̂2 − q̂1 )3
+ 2 − 3 + 2 3 · 1(q̂1 6= 0).
h3 (q̂1 , q̂2 ) =
3q̂13
nq̂1
nq̂1
n q̂1
(371)
(372)
(373)
(374)
ln n
Noting that supξ∈[q/2,2q] |g (k) (ξ)| = |g (k) (q/2)| for any k ≥ 1 and q ≥ c12n
, we have
2
q
q −4
−c1 /24
2
3
|ET̂ (3) (q̂1 , q̂2 ) · 1(q̂1 6= 0) − ln q| ≤ B3
·
6(
)
+
n
·
−
ln
q
+
ln
n
+
n
+
n
+
2n
n2
2
96
−c1 /24+3
+
6n
≤ B3
n2 q 2
192
−c1 /24+3
≤ B3
+ 6n
c1 nq ln n
(375)
(376)
(377)
and thus by independence,
|E[T̃s (p̂1 , q̂1 ; p̂2 , q̂2 )] − p ln q| = p|ET̂ (3) (q̂1 , q̂2 ) · 1(q̂1 6= 0) − ln q|
192
−c1 /24+3
+ 6n
≤ pB3
c1 nq ln n
192B3 u(S)
≤
+ 6B3 pn−c1 /24+3 .
c1 n ln n
Moreover, for any 0 ≤ k ≤ 3,
(378)
(379)
(380)
q
24
· ( k−j+1 )2 + n−c1 /24 · q 2(j−k) (− ln q)
n q
j=0
k−1
2
X q 2(k−j)−1
q
q
+
q j−k + · 20( )j−k−2 + 4n−c1 /24 q j−k−1
n
n
2
j=0
!
2
576(k + 1) 2k
80
−c1 /24
3
2
≤ B3
+
1+
+n
n + (k + 1) ln n + 32kn
nq
nq
nq
12500
≤ B3
+ 100n−c1 /24+3
nq
Var(hk (q̂1 , q̂2 )) ≤ B3 n−c1 /24 · n3 +
k
X
q 2(k−j)
where in the last step we have used the fact that nq ≥ 2. For 1 ≤ k ≤ 3, we also have
q k∨2
q
|Ehk (q̂1 , q̂2 )| ≤ B3 ( ) 2 · 6( )−(k∨2) + n−c1 /24 · (q −1 + 2n3 )
2
n
≤ B3 48 + 3n−c1 /24+3 .
Now we are about to bound the bias and the variance for small p and large p, respectively. If p ≤
LH (x) = SK,H (x) ∧ 1 with SK,H (x) defined in [1]. It was shown in [1, Lemma 4] that
|ESK,H (p̂1 ) + p ln p| ≤
C
m ln m
(381)
(382)
(383)
(384)
(385)
2c1 ln m
,
m
first note that
(386)
4
(2c1 ln m)
(387)
m2
where we note that the constant c1 in [1] corresponds to the constant c1 /2 in our paper. Then applying Lemma 31, we have
2
ESK,H
(p̂1 ) ≤ m8c2 ln 2
2
Var(LH (p̂1 )) ≤ Var(SK,H (p̂1 )) ≤ ESK,H
(p̂1 ) ≤
(2c1 ln m)4
m2−8c2 ln 2
(388)
40
and thus
|ELH (p̂1 ) + p ln p| ≤ |ESK,H (p̂1 ) + p ln p| + E|SK,H (p̂1 )|1(SK,H (p̂1 ) ≥ 1)
(389)
2
(390)
≤ |ESK,H (p̂1 ) + p ln p| + E|SK,H (p̂1 )|
(2c1 ln m)4
C
+ 2−8c2 ln 2 .
≤
m ln m
m
Hence, the total bias can be upper bounded as
(391)
|E[T̃s (p̂1 , q̂1 ; p̂2 , q̂2 ) + LH (p̂1 )] + p ln(p/q)| ≤ |E[T̃s (p̂1 , q̂1 ; p̂2 , q̂2 )] − p ln q| + |ELH (p̂1 ) + p ln p|
192B3 u(S)
C
(2c1 ln m)4
≤
+ 6B3 pn−c1 /24+3 +
+ 2−8c2 ln 2 .
c1 n ln n
m ln m
m
(392)
(393)
As for the total variance, Lemma 29 can be used here to obtain
Var(T̃s (p̂1 , q̂1 ; p̂2 , q̂2 )) = E[p̂21 ] · Var(
3
X
k=0
hk (q̂1 , q̂2 )) + Var(p̂1 ) · (ET̂ (3) (q̂1 , q̂2 ) · 1(q̂1 6= 0))2
p
· 16B3
≤ p +
m
2
≤ 1600B3
12500
+ 100n−c1 /24+3
nq
p
+
m
B3
192
+ 6n−c1 /24+3
c1 nq ln n
(394)
2
p
p 125
−c1 /24+3
2
+n
+
B3 48 + 6n−c1 /24+3 − ln q .
p +
m
nq
m
− ln q
2
(395)
(396)
Now the desired variance bound follows from the triangle inequality Var(X + Y ) ≤ 2(Var(X) + Var(Y )).
ln m
If p ≥ c12m
, by Lemma 5 and the triangle inequality we have
|E[T̃s (p̂1 , q̂1 ; p̂2 , q̂2 ) + UH (p̂1 )] + p ln(p/q)| ≤ |E[T̃s (p̂1 , q̂1 ; p̂2 , q̂2 )] − p ln q| + |EUH (p̂1 ) + p ln p|
6
192B3 u(S)
≤
+ 6B3 pn−c1 /24+3 +
+ 4m−c1 /24+2
c1 n ln n
c1 m ln m
(397)
(398)
which is the desired bias bound. As for the variance, we have
3
T̃s (p̂1 , q̂1 ; p̂2 , q̂2 ) + UH (p̂1 ) = −p̂1 ln
and the triangle inequality gives
X
p̂1
1
· 1(q̂1 6= 0) + p̂1 ·
hk (q̂1 , q̂2 ) +
q̂1
2m
(399)
k=1
!
3
X
p̂1
Var(T̃s (p̂1 , q̂1 ; p̂2 , q̂2 ) + UH (p̂1 )) ≤ 2Var p̂1 ln
hk (q̂1 , q̂2 )
· 1(q̂1 6= 0) + 2Var p̂1 ·
q̂1
(400)
k=1
≡ 2(B1 + B2 ).
Now we bound these two terms separately. For B1 , recall that Lemma 1 gives
51
2
4q 4u(S)
700u(S)
1
Var(p̂1 (ln p̂1 − gn (q̂1 ))) ≤ 2 +
p + p(ln u(S))2 + 2 +
+
p+
m
m
e
en
n
m
(401)
(402)
and the difference between these two quantities is upper bounded by
E[p̂1 (gn (q̂1 ) − ln q̂1 · 1(q̂1 6= 0))]2 ≤ (1 + ln n)2 · P(q̂1 = 0)
2
Hence, by triangle inequality again, we have
≤ (1 + ln n) · n
−c1 /2
.
B1 ≤ 2Var(p̂1 (ln p̂1 − gn (q̂1 ))) + 2E[p̂1 (gn (q̂1 ) − ln q̂1 · 1(q̂1 6= 0))]2
102
4
4q 4u(S)
1400u(S)
1
≤ 2 +
p + p(ln u(S))2 + 2 +
+
p+
+ 2(1 + ln n)2 · n−c1 /2 .
m
m
e
en
n
m
(403)
(404)
(405)
(406)
41
As for B2 , Lemma 29 is employed to obtain
B2 = E[p̂21 ] · Var(
3
X
k=1
hk (q̂1 , q̂2 )) + Var(p̂1 ) · (E
3
X
hk (q̂1 , q̂2 ))2
(407)
k=1
2
12500
p
p
· 9B3
3B3 48 + 3n−c1 /24+3
+ 100n−c1 /24+3 +
≤ p2 +
m
nq
m
2
125
2
p
9B
p
3
= 900B3 p2 +
48 + 3n−c1 /24+3 .
+ n−c1 /24+3 +
m
nq
m
(408)
(409)
The desired variance bound then follows from the upper bounds of B1 and B2 .
For the rest of the results, the only non-trivial observation is that when p ≤ 2c1mln m , we have
p(ln q)2 ≤ p(− ln p + ln u(S))2
2
(410)
2
(411)
≤ 2p(ln p) + 2p(ln u(S))
2
m
4c1 ln m
ln
+ 2p(ln u(S))2
≤
m
2c1 ln m
4c1 (ln m)3
+ 2p(ln u(S))2
≤
m
(412)
(413)
since p ≤ u(S)q and 2c1 ln m ≥ 8.
G. Proof of Lemma 8
For simplicity, we define
T s,I (p̂, q̂) , T̃s (p̂1 , q̂1 ; p̂2 , q̂2 ) + UH (p̂1 )
(414)
T s,II (p̂, q̂) , T̃s (p̂1 , q̂1 ; p̂2 , q̂2 ) + LH (p̂1 )
(415)
then
T s (p̂, q̂) = T s,I (p̂, q̂)1(p̂3 >
c1 ln m
c1 ln m
) + T s,II (p̂, q̂)1(p̂3 ≤
).
m
m
(416)
By Lemma 7, the bias can be upper bounded as
(417)
|T s (p̂, q̂) + ln(p/q)| ≤ |ET s,I (p̂, q̂) + p ln(p/q)| + |ET s,II (p̂, q̂) + p ln(p/q)|
u(S)
1
+
.
.
m ln m n ln n
As for the variance, by Lemma 30 we have
Var(T s (p̂, q̂)) ≤ Var(T s,I (p̂, q̂)) + Var(T s,II (p̂, q̂)) + (ET s,I (p̂, q̂) − ET s,II (p̂, q̂))2
2
as desired.
≤ Var(T s,I (p̂, q̂)) + Var(T s,II (p̂, q̂)) + 2|ET s,I (p̂, q̂) + p ln(p/q)| + 2|ET s,II (p̂, q̂) + p ln(p/q)|
2
1
p(1 + ln u(S))2
q
u(S) pu(S)
1
u(S)
. 2− +
+
+
+
+
+
m
m
m
mn
n
m ln m n ln n
2
2
2
p(1 + ln u(S))
q
u(S) pu(S)
1
u(S)
1
. 2− +
+
+
+
+
+
m
m
m
mn
n
m ln m
n ln n
2
2
1
p(1 + ln u(S))
q
u(S) pu(S)
u(S)
. 2− +
+
+
+
+
m
m
m
mn
n
n ln n
(418)
(419)
2
(420)
(421)
(422)
(423)
42
H. Proof of Lemma 9
Denote by E the event that
2p
3
q
c1 p̂2 ln m
,
m
then by Lemma 28 we have
r
1 c1 p̂2 ln m
2p
c
) + P(p̂2 > p +
)
P(E ) ≤ P(p̂2 <
3 r
2
m
r
c1 p ln m
1 c1 p ln m
≤ P(p̂2 < p −
) + P(p̂2 > p +
)
18m
2
m
s
s
!2
!2
1
1
c
ln
m
c
ln
m
1
1
· mp + exp −
· mp
≤ exp −
2
18mp
3
4mp
≤ p̂2 ≤ p +
1
2
(424)
(425)
(426)
≤ 2e−c1 m/36 .
(427)
ln m
Note that conditioning on the event E, we have p̂2 ≥ c13m
, and
!
!
r
√
3
2p
1
1 c1 p̂2 ln m
p
2c1 ln n
1
0<
≤
p̂2 −
p̂2 ≤
p̂2 −
≤
≤q≤
21u(S)
u(S)
2
u(S)
2
m
u(S)
n
(428)
i.e., the approximation region contains q.
We first analyze the variance:
Var(T̃ns,I (p̂1 , q̂1 ; p̂2 , q̂2 )) ≤ E[T̃ns,I (p̂1 , q̂1 ; p̂2 , q̂2 )2 ]
(429)
1(E)] + E[T̃ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) 1(E )]
≤ E[Tns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) 1(E)] + 1 · P(E c ).
= E[T̃ns,I (p̂1 , q̂1 ; p̂2 , q̂2 )
2
2
c
2
Note that conditioning on E, we have
Tns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) = p̂1 ·
PK
By construction, k=0 gK,k (p̂2 )xk is the best polynomial
"
4c1 ln n
1
2p
,
⊃R=
p̂2 −
21u(S)
n
u(S)
K
X
k=0
gK,k (p̂2 )
k−1
Y
l=0
(q̂2 −
l
).
n
approximation of ln q on R, where
!
#
r
1 c1 p̂2 ln m
4c1 ln n
2c1 ln n 4c1 ln n
,
⊃
,
2
m
n
n
n
(430)
(431)
(432)
(433)
where we have used (428) here. Since W (·) in Lemma 23 is an increasing function, conditioning on E the approximation
error can be upper bounded as
K
X
4c1 ln n/n
42c1 u(S)
k
gK,k (p̂2 )x − ln x ≤ Cln W
sup
= Cln W
·
.
(434)
(c2 ln n)2 · (2p/21u(S))
c22
pn ln n
x∈R
k=0
Note that W (x) ≤ 1 ∨ ln x, we conclude that for any x ∈ [ 2c1nln n , 4c1nln n ] ⊂ R, we have
K
X
k=0
K
X
n
2c1 ln n
k=0
42c1 u(S)
≤ Cln ln
·
∨ 1 + ln n ≡ A.
c22
pn ln n
gK,k (p̂2 )xk ≤
gK,k (p̂2 )xk − ln x + ln
Now we are about to apply Lemma 27 to bound each coefficient |gK,k (p̂2 )|. Lemma 27 yields
−k
−k
3c1 ln n
3c1 ln n
|gK,k (p̂2 )| ≤ 27K/2 A ·
(3K + 1) ≤ 211K/2 A ·
n
n
(435)
(436)
(437)
43
for any k = 0, 1, · · · , K = c2 ln n conditioning on E. Hence, by the triangle inequality,
!2
K
k−1
X
Y
l
E[Tns,I (p̂1 , q̂1 ; p̂2 , q̂2 )2 1(E)] = E(p̂21 ) · E
gK,k (p̂2 )
(q̂2 − ) 1(E)
n
k=0
l=0
#
−k !2 "k−1
K
X
Y
3c
ln
n
l
1
≤ E(p̂21 ) · (K + 1)
211K/2 A ·
E
(q̂2 − )2
n
n
k=0
l=0
"
#
−2k
K
k−1
Y
p X 3c1 ln n
l 2
11K
2
2
·
E
=2
(K + 1)A p +
(q̂2 − ) .
m
n
n
k=0
(438)
(439)
(440)
l=0
To evaluate the expectation, Lemma 25 with q = 0 is applied here to yield
"k−1
#
k
k
2k
Y
l 2
2q(k ∨ nq)
4c1 q ln n
3c1 ln n
E
(q̂2 − ) ≤
≤
≤
n
n
n
n
(441)
l=0
thus
p
p
≤ 211K+2 K 2 A2 p2 +
.
E[Tns,I (p̂1 , q̂1 ; p̂2 , q̂2 )2 1(E)] ≤ 211K (K + 1)2 A2 p2 +
m
m
By differentiation it is easy to show
2
42c1 u(S)
84c1 u(S)
84c1 u(S)
p ln
·
∨
1
≤ 2 ·
∨p≤ 2 ·
+p
c22
pn ln n
c2
n ln n
c2
n ln n
and note that p ≤ u(S)q ≤
(442)
(443)
2c1 u(S) ln n
,
n
we have
2
1
84c1 Cln
u(S)
2
2
E[Tns,I (p̂1 , q̂1 ; p̂2 , q̂2 )2 1(E)] ≤ 211K+3 K 2 p +
·
+
C
p
+
p(ln
n)
(444)
ln
m
c22
n ln n
2
2c1 u(S) ln n
1
84c1 Cln
2c1 u(S) ln n
u(S)
2
≤ 211K+3 K 2
+
+ (Cln
+ (ln n)2 )
(445)
·
2
n
m
c
n ln n
n
2
16c1 u(S) ln n 2c1 u(S) ln n
1
2
2
=
+
42Cln
+ (c2 ln n)2 (Cln
+ (ln n)2 )
(446)
n1−11c2 ln 2
n
m
which together with (431) is the variance bound.
Now we start to analyze the bias of T̃ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ). By triangle inequality,
(447)
ET̃ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) − p ln q ≤ E T̃ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) − p ln q 1(E) + E T̃ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) − p ln q 1(E c )
≤ |E (Tns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) − p ln q) 1(E)| + E T̃ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) − Tns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) 1(E)
+ 2m−c1 /36 (1 − p ln q)
(448)
+ 2m−c1 /36 (1 − p ln q)
(449)
≤ |E (Tns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) − p ln q) 1(E)| + E |Tns,I (p̂1 , q̂1 ; p̂2 , q̂2 )1(|Tns,I (p̂1 , q̂1 ; p̂2 , q̂2 )| ≥ 1)1(E)|
−c1 /36
≡ A1 + A2 + 2m
(1 − p ln q).
(450)
Now we bound A1 and A2 separately. For A1 , since conditioning on E, the approximation region contains q, by (434) we
get
!
K
X
42c1 u(S)
k
A1 ≤ pE
gK,k (p̂2 )q − ln q 1(E) ≤ Cln pW
·
.
(451)
c22
pn ln n
k=0
As for A2 , since for any random variable X with finite second moment, we have
by (446) we get
E[|X|1(|X| ≥ 1)] ≤ E[|X|2 1(|X| ≥ 1)] ≤ E[X 2 ],
(452)
A2 ≤ E[Tns,I (p̂1 , q̂1 ; p̂2 , q̂2 )2 1(E)]
1
16c1 u(S) ln n 2c1 u(S) ln n
2
2
≤
+
42Cln
+ (c2 ln n)2 (Cln
+ (ln n)2 ) .
n1−11c2 ln 2
n
m
(453)
Now combining A1 and A2 completes the proof.
(454)
44
I. Proof of Lemma 11
First we bound the variance of Tns,II (p̂1 , q̂1 ). Recall that
X
Tns,II (p̂1 , q̂1 ) =
hK,k,l
k−1
Y
i=0
k,l≥0,k+l≤K
i
p̂1 −
m
We first bound the coefficients |hK,k,l |. It is straightforward to see that
sup
X
(x,y)∈R k,l≥0,k+l≤K
hK,k,l xk y l ≤ 2 sup |x ln y| ≤
(x,y)∈R
8c1 u(S) ln n
ln
n
l−1
Y
j
.
q̂1 −
n
j=0
n
4c1 ln n
≤
(455)
8c1 u(S)(ln n)2
≡ A.
n
(456)
We distinguish into two cases.
ln m
1) Case I: If mu(S)
≤ lnnn , we have
Hence, for any (x, y) ∈ R1 , we have
2c1 ln m
2c1 ln n 4c1 ln n
R ⊃ 0,
×
,
, R1 .
m
n
n
K
X
K−k
X
k=0
hK,k,l y l
l=0
!
(457)
xk ≤ A.
(458)
By Lemma 27, we conclude that for any y ∈ [ 2c1nln n , 4c1nln n ],
−k
K−k
X
c1 ln m
hK,k,l y l ≤ 27K/2+1 A ·
,
m
(459)
k = 0, 1, · · · , K.
l=0
Using Lemma 27 again, we have
−k
−l
3c1 ln n
c1 ln m
·
(3K−k + 1)
m
n
−k
−l
c1 ln m
3c1 ln n
≤ 29K+1 A
,
∀k, l ≥ 0, k + l ≤ K.
m
n
|hK,k,l | ≤ 27(K−k)/2 · 27K/2+1 A
2) Case II: If
ln m
mu(S)
>
ln n
n ,
define t , p/q, we have
2c1 ln n
R ⊃ (t, q) : 0 ≤ t ≤ u(S), 0 ≤ q ≤
, R2
n
and for any (t, q) ∈ R2 , we have
K
X
k=0
L−k
X
hK,k,l q k+l
l=0
!
X
tk =
k,l≥0,k+l≤K
By Lemma 27, we conclude that for any q ∈ [0, c1 nln n ],
L−k
X
hK,k,l q
k+l
l=0
By Lemma 27 again, we have
7K/2+1
≤2
A·
−k
(463)
(464)
.
−k
−(k+l)
u(S)
c1 ln n
|hK,k,l | ≤ 2
·2
A
·
2
n
−k
−l
c1 u(S) ln n
c1 ln n
= 27K+2 A
,
∀k, l ≥ 0, k + l ≤ n.
2n
n
7K/2+1
7K/2+1
Hence, combining these two cases yields
9K+1
|hK,k,l | ≤ 2
A
"
c1 u(S) ln n
2n
−k
+
c1 ln m
m
−k #
(461)
(462)
hK,k,l (qt)k q l ≤ A.
u(S)
2
(460)
c1 ln n
n
−l
.
(465)
(466)
(467)
45
Moreover, by Lemma 25, we have
#
"k−1
k
k
2k
Y
2p(k ∨ mp)
4c1 p(ln n + ln m)
3c1 (ln m + ln n)
i 2
(p̂1 − ) ≤
≤
≤
E
m
m
m
m
i=0
l
l
2l
l−1
Y
2q(l ∨ nq)
8c1 q ln n
6c1 ln n
j 2
E
≤
≤
.
(q̂1 − ) ≤
n
n
n
n
j=0
Now by the triangle inequality and previous inequalities, we have
"k−1
2 #
2
l−1
X
Y
Y
j
i
E[Tns,II (p̂1 , q̂1 )2 ] ≤ (K + 1)2
|hK,k,l |2 E
p̂1 −
E
q̂1 −
m
n
i=0
j=0
(468)
(469)
(470)
k,l≥0,0<k+l≤K
2k
2k !
n(ln m + ln n)
ln n
2k
+ 12
≤2
(K + 1) A
6
3
1+
ln m
mu(S) ln n
k,l≥0,0<k+l≤K
2K
2K !
ln n
n(ln m + ln n)
≤ 218K+3 122K (K + 1)4 A2 1 + 1 +
+
ln m
mu(S) ln n
2K
2K !
ln n
n(ln m + ln n)
26K+7 4 2
≤2
K A 1+ 1+
+
.
ln m
mu(S) ln n
18K+3
2
X
2
2l
2k
(471)
(472)
(473)
Hence, by Lemma 31 we get
Var(T̃ns,II (p̂1 , q̂1 )) ≤ Var(Tns,II (p̂1 , q̂1 )) ≤ E[Tns,II (p̂1 , q̂1 )2 ]
2K
2K !
n(ln m + ln n)
ln n
26K+7 4 2
+
≤2
K A 1+ 1+
ln m
mu(S) ln n
(474)
(475)
which is the desired variance bound.
As for the bias, Lemma 10 and Lemma 24 give
|ETns,II (p̂1 , q̂1 ) − p ln q| ≤ EK [p ln q; R] + |hK,0,0 |
2
≤ 2EK [p ln q; R] ≤ 2M ωR
(p ln q,
(476)
1
2M C0 u(S)
)≤
·
K
c22
n ln n
(477)
where |hK,0,0 | ≤ EK [p ln q; R] is obtained by setting (p, q) = (0, 0) ∈ R in
sup
X
(x,y)∈R k,l≥0,k+l≤K
hK,k,l xk y l − x ln y ≤ EK [p ln q; R].
(478)
Hence, by triangle inequality and (452), we get
|E[T̃ns,II (p̂1 , q̂1 )] − p ln q| ≤ |ETns,II (p̂1 , q̂1 ) − p ln q| + E|Tns,II (p̂1 , q̂1 )1(|Tns,II (p̂1 , q̂1 )| ≥ 1)|
2M C0 u(S)
≤
·
+ E[Tns,II (p̂1 , q̂1 )2 ]
c22
n ln n
2K
2K !
ln
n
n(ln
m
+
ln
n)
2M C0 u(S)
·
+ 226K+7 K 4 A2 1 + 1 +
+
≤
c22
n ln n
ln m
mu(S) ln n
(479)
(480)
(481)
as desired.
J. Proof of Lemma 12
We distinguish into three cases based on different values of p. For simplicity, we define
T ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) , T̃ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) + LH (p̂1 )
(482)
T ns,II (p̂1 , q̂1 ) , T̃ns,II (p̂1 , q̂1 ) + LH (p̂1 ).
(483)
46
1) Case I: We first consider the case where p ≤
c1 ln m
2m .
By the triangle inequality, the bias can be decomposed into
|Bias(Tns (p̂, q̂))| ≤ |ET ns,II (p̂1 , q̂1 ) + p ln(p/q)| + (E|T ns,II (p̂1 , q̂1 )| + E|T ns,I (p̂1 , q̂1 ; p̂2 , q̂2 )|)P(p̂3 ≥
c1 ln m
)
m
(484)
c1 ln m
2
≤ |ET ns,II (p̂1 , q̂1 ) + p ln(p/q)| + 4 · (e/4)
(485)
2
c1
1
u(S)
(u(S))
.
+
+ 2−c2 B + m− 2 ln(4/e)
(486)
m ln m n ln n
n
2
u(S)
(u(S))
1
(487)
+
+
.
m ln m n ln n
n2−
where we have used Lemma 11 and Lemma 28 here. Similarly, by Lemma 30, the variance can be upper bounded as
Var(Tns (p̂, q̂)) ≤ Var(T ns,II (p̂1 , q̂1 )) + Var(T ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ))P(p̂3 ≥
c1 ln m
≤ Var(T ns,II (p̂1 , q̂1 )) + 22 · (e/4) 2 + 42 · (e/4)
c1
(u(S))2
1
. 2−c2 B + 2−c2 B + m− 2 ln(4/e)
m
n
(u(S))2
1
.
. 2− +
m
n2−
2) Case II: Next we consider the case where
bounded as
c1 ln m
2m
<p<
c1 ln m
c1 ln m
) + |ET ns,II − ET ns,I |2 P(p̂3 ≥
) (488)
m
m
c1 ln m
2
2c1 ln m
.
m
(489)
(490)
(491)
By Lemma 9 and Lemma 11, the bias can be upper
|Bias(Tns (p̂, q̂))| ≤ |ET ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) + p ln(p/q)| + |ET ns,II (p̂1 , q̂1 ) + p ln(p/q)|
u(S)
u(S)(ln n)5 u(S) ln n
1
u(S)
(u(S))2
1
1
+ pW (
) + 1−11c2 ln 2
+
+
+ 2−c2 B
.
+
m ln m
pn ln n
n
n
m
m ln m n ln n
n
u(S)
u(S)
(u(S))2
u(S)
1
+ pW (
)+
+
+
.
.
m ln m
pn ln n
n ln n
n2−
mn1−
(492)
(493)
(494)
The variance is obtained by Lemma 30 as follows:
Var(Tns (p̂, q̂)) ≤ Var(T ns,I (p̂1 , q̂1 ; p̂2 , q̂2 )) + Var(T ns,II (p̂1 , q̂1 )) + (ET ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) − ET ns,II (p̂1 , q̂1 ))2
u(S)
u(S)(ln n)3
p
1
u(S)(ln n)5 u(S) ln n
1
(ln m)4
.
+
+ 3 + 1−11c2 ln 2
+
+ 2−c2 B + 2−c2 B
mn
m m
n
n
m
m
n
2
1
u(S)
u(S)
(u(S))2
u(S)
+
+ pW (
)+
+
+
m ln m
pn ln n
n ln n
n2−
mn1−
4
2
(u(S))
(u(S))
u(S)
u(S) 2
1
+ [pW (
)]
. 2− + 4−2 + 2−2 +
m
n
n
mn1−
pn ln n
(u(S))2
u(S)
u(S) 2
1
)]
+ [pW (
. 2− + 2−2 +
m
n
mn1−
pn ln n
where in the last step we have used that n & u(S).
3) Case III: Finally we consider the case where p ≥
2c1 ln m
.
m
(495)
(496)
(497)
(498)
By Lemma 9 and Lemma 28,
|Bias(Tns (p̂, q̂))| ≤ |ET ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) + p ln(p/q)| + (E|T ns,II (p̂1 , q̂1 )| + E|T ns,I (p̂1 , q̂1 ; p̂2 , q̂2 )|)P(p̂3 ≤
c ln m
− 12
≤ |ET ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) + p ln(p/q)| + 4 · e
1
u(S)
u(S)(ln n)5 u(S) ln n
1
.
+ pW (
) + 1−11c2 ln 2
+
+ m−c1 /2
m ln m
pn ln n
n
n
m
1
u(S)
(u(S))2
u(S)
.
+ pW (
)+
+
m ln m
pn ln n
n2−
mn1−
c1 ln m
)
m
(499)
(500)
(501)
(502)
47
and the variance is given by Lemma 30 that
c1 ln m
c1 ln m
) + |ET ns,II − ET ns,I |2 P(p̂3 ≤
) (503)
m
m
c1 ln m
c1 ln m
(504)
≤ Var(T ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) + 22 · e− 2 + 42 · e− 2
u(S)(ln n)3
u(S)(ln n)5 u(S) ln n
p
1
1
.
+ 1−11c2 ln 2
+
+
+
+ m−c1 /2
(505)
mn
m m3
n
n
m
(u(S))2
u(S)
1
+
.
(506)
. 2− +
2−
m
n
mn1−
A combination of these three cases completes the proof.
Var(Tns (p̂, q̂)) ≤ Var(T ns,I (p̂1 , q̂1 ; p̂2 , q̂2 ) + Var(T ns,II (p̂1 , q̂1 ))P(p̂3 ≤
K. Proof of Lemma 13
As in the proof of Lemma 12, we also distinguish into three cases.
ln n
1) Case I: We first consider the case where q ≤ c12n
. By Lemma 12 and Lemma 28,
|Bias(ξ(p̂, q̂))| ≤ |ETns (p̂, q̂) + p ln(p/q)| + (E|Tns (p̂, q̂)| + E|T s (p̂, q̂)|)P(q̂3 ≥
c1 ln n
)
n
1
≤ |ETns (p̂, q̂) + p ln(p/q)| + (2 + ln n + 5n3 + 1 +
+ 1) · (e/4)
2n
1
2
ln m
+ u(S) + (u(S))
p ≤ c12m
,
n2−
m ln m n ln n
2
u(S)
u(S)
(u(S))
u(S)
c
ln
m
1
1
. m ln m + pW ( pn ln n ) + n ln n + n2− + mn1−
2m < p <
2
1
u(S)
(u(S))
u(S)
p ≥ 2c1mln m .
m ln m + pW ( pn ln n ) + n2− + mn1−
(507)
c1 ln n
2
(508)
2c1 ln m
,
m
(509)
where we have used the fact that
|T s (p̂, q̂)| ≤ |T̃s (p̂1 , q̂1 ; p̂2 , q̂2 )| + |UH (p̂1 )| + |LH (p̂1 )| ≤ 5n3 + ln n + 1 +
1
+1
2n
(510)
here. Similarly, by Lemma 30, the variance can be upper bounded as
c1 ln n
)
Var(ξ(p̂, q̂)) ≤ Var(Tns (p̂, q̂)) + Var(T s (p̂, q̂)) + (ETns (p̂, q̂) − ET s (p̂, q̂))2 P(q̂3 ≥
n
p(1 + ln u(S))2
q
u(S) pu(S)
u(S) 2
1
+
+
+
+
+(
)
. Var(Tns (p̂, q̂)) +
2−
m
m
m
mn
n
n ln n
c1 ln n
1
+22 + (5n3 + ln n + 1 +
+ 1)2 · (e/4) 2
2n
(u(S))2
ln m
1
p ≤ c12m
,
m2− + n2−
2
(u(S))
u(S)
u(S)
c
ln
m
2c1 ln m
1
2
1
. m2− + n2−2 + mn1− + [pW ( pn ln n )]
,
2m < p <
m
2
1
(u(S))
u(S)
p ≥ 2c1mln m .
m2− + n2− + mn1−
2) Case II: Next we consider the case where
c1 ln n
2n
<q<
2c1 ln n
.
n
(511)
(512)
(513)
By Lemma 8 and Lemma 12,
|Bias(ξ(p̂, q̂))| ≤ |ET s (p̂, q̂) + p ln(p/q)| + |ETns (p̂, q̂) + p ln(p/q)|
1
2
+ nu(S)
+ (u(S))
2−
m
ln
m
ln
n
n
1
u(S)
u(S)
u(S)
(u(S))2
u(S)
1
.
+
+ m ln
m + pW ( pn ln n ) + n ln n + n2− + mn1−
m ln m n ln n
1
u(S)
(u(S))2
u(S)
m ln m + pW ( pn ln n ) + n2− + mn1−
2
ln m
1 + u(S) + (u(S))
p ≤ c12m
,
m ln m
n ln n
n2−
.
2
u(S)
ln m
1 + pW ( u(S) ) + u(S) + (u(S))
p ≥ c12m
.
m ln m
pn ln n
n ln n
n2− + mn1−
(514)
p≤
c1 ln m
2m ,
c1 ln m
2m
p≥
<p<
2c1 ln m
,
m
(515)
2c1 ln m
.
m
(516)
48
As for the variance, Lemma 30 is used here to yield
Var(ξ(p̂, q̂)) ≤ Var(Tns (p̂, q̂)) + Var(T s (p̂, q̂)) + |ETns (p̂, q̂) − ET s (p̂, q̂)|2
p(1 + ln u(S))2
1
q
u(S) pu(S)
u(S) 2
. Var(Tns (p̂, q̂)) + 2− +
+
+
+
+(
)
m
m
m
mn
n
n ln n
2
2
+ |ETns (p̂, q̂) + p ln(p/q)| + |ET s (p̂1 , q̂1 ; p̂2 , q̂2 ) + p ln(p/q)|
( u(S)
1
p(1 + ln u(S))2
q
pu(S) (u(S))2
mn
. 2+
+
+
+ 2−2 +
u(S)
u(S)
m
m
m
n
n
)]2
1−2 + [pW (
mn
where we have used the fact that n & u(S) here.
3) Case III: Finally we come to the case where q ≥
2c1 ln n
.
n
pn ln n
(517)
(518)
p≤
p>
c1 ln m
2m ,
c1 ln m
2m .
By Lemma 8 and Lemma 28,
|Bias(ξ(p̂, q̂))| ≤ |ET s (p̂, q̂) + p ln(p/q)| + (E|Tns (p̂, q̂)| + E|T s (p̂, q̂)|)P(q̂3 ≤
c1 ln n
)
n
c1 ln n
1
u(S)
1
+
+ (2 + 5n3 + ln n + 1 +
+ 1)e− 2n
m ln m n ln n
2n
1
u(S)
.
+
.
m ln m n ln n
The variance bound is obtained in a similar fashion via Lemma 30:
c1 ln n
)
Var(ξ(p̂, q̂)) ≤ Var(T s (p̂, q̂)) + Var(Tns (p̂, q̂)) + (ETns (p̂, q̂) − ET s (p̂, q̂))2 P(q̂3 ≤
n
2
1
p(1 + ln u(S))
q
u(S) pu(S)
u(S) 2
. 2− +
+
+
+
+(
)
m
m
m
mn
n
n ln n
"
2 #
c1 ln n
1
+ 22 + 22 + 5n3 + ln n + 1 +
+1
· e− 2n
2n
.
p(1 + ln u(S))2
q
u(S) pu(S)
u(S) 2
+
+
+
+(
) .
m
m
mn
n
n ln n
Combining these three cases yields the desired result.
.
1
m2−
(519)
+
(520)
(521)
(522)
(523)
(524)
(525)
L. Proof of Lemma 14
As before, we first analyze the variance. By [1, Lemma 20], we know that there exists some constant C > 0 such that for
any x ∈ [0, 2c1nln n ],
1−k
K+1
X
C
2c1 ln n
gK,k
xk − x ln x ≤
.
(526)
n
n ln n
k=1
2c1 ln n
],
n
By triangle inequality, for any x ∈ [0,
1−k
1−k
K+1
K+1
X
X
2c1 ln n
2c1 ln n
k
gK,k
x ≤
gK,k
xk − x ln x + |x ln x|
n
n
k=1
(527)
k=1
2c1 ln n
n
C
+
· ln
n ln n
n
2c1 ln n
C
2c1 (ln n)2
≤
+
≡ A.
n ln n
n
As a result, by Lemma 27, for any k = 1, · · · , K + 1, we have
1−k
−k
2c1 ln n
c1 ln n
|gK,k |
≤ 27K/2+1 A ·
.
n
n
≤
(528)
(529)
(530)
49
Hence, by triangle inequality again and Lemma 25, we have
Var(Tns (p̂, q̂)) ≤ E[Tns (p̂, q̂)2 ]
and by Lemma 31, we have
(531)
"k−1
#
K
Y
X
l
2c
ln
n
1
· E[p̂2 ]E
(q̂ − )2
≤ (K + 1)
|gK,k+1 |2
n
n
l=0
k=0
−2(k+1)
K
4qc ln n k
X
c1 ln n
p
1
≤ 27K+2 (K + 1)A2
·
+ p2
n
m
n
k=0
K
−2
X
p
c1 ln n
·
≤ 211K+2 (K + 1)A2
+ p2
n
m
k=0
(C + 2c1 (ln n)3 )2
2u(S)
4(u(S))2
≤ 211K+2 (K + 1)2
·
+
(ln n)2
c1 mn ln n
n2
4(u(S))2
2u(S)
≤ 211K+4 c22 (C + 2c1 (ln n)3 )2 ·
+
c1 mn ln n
n2
Var(T̃ns (p̂, q̂)) ≤ Var(Tns (p̂, q̂)) ≤
−2k
211K+4 c22 (C
3 2
+ 2c1 (ln n) ) ·
As for the bias, by construction we have
2u(S)
4(u(S))2
+
c1 mn ln n
n2
(532)
(533)
(534)
(535)
(536)
.
(537)
−k
2c1 ln n
q k − ln q
n
k=0
1−k
K+1
X
2c1 ln n
gK,k
≤ u(S)q
q k−1 − ln q
n
k=1
1−k
K+1
X
2c1 ln n
gK,k
= u(S)
q k − q ln q
n
(539)
≤
(541)
|ETns (p̂, q̂) − p ln q| = p
K
X
gK,k+1
(538)
(540)
k=1
Cu(S)
.
n ln n
Hence, by triangle inequality and (452), we get
as desired.
|Bias(T̃ns (p̂, q̂))| ≤ |ETns (p̂, q̂) − p ln q| + E|Tns (p̂, q̂)1(|Tns (p̂, q̂)| ≥ 1)|
Cu(S)
+ E[Tns (p̂1 , q̂1 )2 ]
≤
n ln n
Cu(S)
2u(S)
4(u(S))2
≤
+ 211K+4 c22 (C + 2c1 (ln n)3 )2 ·
+
n ln n
c1 mn ln n
n2
(542)
(543)
(544)
M. Proof of Lemma 19
Fix δ > 0. Let D̂(X, Y) be a near-minimax estimator of D(P kQ) under the multinomial model with an upper bound
(1 + )u(S) on the likelihood ratio. Note that the estimator D̂ obtains the sample sizes m, n from observations. By definition,
we have
2
sup
EMultinomial D̂ − D(P kQ) ≤ R(S, m, n, (1 + )u(S)) + δ.
(545)
(P,Q)∈US,u(S)
Now given (P, Q) ∈ US,u(S) (), let X = [X1 , · · · , XS ]T and Y = [Y1 , · · · , YS ]T with (Xi , Yi ) ∼ Poi(mpi ) × Poi(nqi ). Write
PS
PS
m0 = i=1 Xi and n0 = i=1 Yi , we use the estimator D̂(X, Y) to estimate D(P kQ).
Note that conditioned on m0 = M , we have X ∼ Multinomial(M, PSP p ), and similarly for Y. Moreover, (P, Q) ∈
i=1
i
50
US,u(S) () implies that (P, PSQ
i=1
qi
) ∈ US,(1+)u(S) by construction. By the triangle inequality we have
2
1
1
RP (S, m, n, u(S), ) ≤ E(P,Q) D̂ − D(P kQ)
2
2
Q
≤ E(P,Q)
≤
≤
=
∞
X
k,l=0
∞
X
k,l=0
(546)
D̂ − D P k PS
i=1 qi
E(P,Q)
!!2
Q
D̂ − D P k PS
i=1 qi
+
!
Q
D P k PS
0
0
!
i=1 qi
!2
m = k, n = l
− D(P kQ)
!2
0
0
P(m = k)P(n = l) + (ln
(547)
S
X
qi )2 (548)
i=1
(R(S, k, l, (1 + )u(S)) + δ) P(m0 = k)P(n0 = l) + 22
X
k≥ m
2 ,l≥
(549)
R(S, k, l, (1 + )u(S))P(m0 = k)P(n0 = l)
(1−)n
2
m
(1 − )n
) + P(n0 <
)) + δ + 22
(550)
2
2
(1 − )n
m (1 − )n
m
, (1 + )u(S)) + (ln[(1 + )u(S)])2 exp(− ) + exp(−
) + δ + 22
≤ R(S, ,
2
2
8
8
(551)
+ (ln[(1 + )u(S)])2 (P(m0 <
where we have used Lemma 28. Then the result follows from the arbitrariness of δ.
N. Proof of Lemma 20
The properties of Chebyshev polynomials were well studied in [54]. In particular, the Chebyshev polynomial T2(K+2) (x)
is an even function and takes the form
T2(K+2) (x) = S2K (x)x4 − 2(−1)K (K + 2)2 x2 + (−1)K
(552)
for some even polynomial S2K (x) of degree 2K. Since |T2(K+2) (x)| ≤ 1 for any x ∈ [−1, 1], by triangle inequality
(−1)K
|T2(K+2) (x)|
1
1
S2K (x)x4
− x2 ≤
+
≤
.
2(K + 2)2
2(K + 2)2
2(K + 2)2
(K + 2)2
(553)
Now the desired result follows from the variable substitution y = ∆n x2 ∈ [0, ∆n ].
A PPENDIX C
P ROOF OF AUXILIARY L EMMAS
A. Proof of Lemma 21
Fix m, n and an arbitrary (possibly randomized) estimator D̂. Denote by µ the (possibly randomized) decision made by D̂
conditioning on the event E where m first symbols and no other symbols from P , and n second symbols and no other symbols
from Q are observed. Note that µ is a probability measure on R. Choose P = (1, 0, · · · , 0) and Q = (δ, 1 − δ, 0, · · · , 0) with
δ ∈ (0, 1) to be specified in the sequel, then P Q. Hence, with probability at least (1 − δ)n , the event E holds, and thus
Z
2
n
sup E(P,Q) D̂ − D(P kQ) ≥ (1 − δ) · (a − ln(1/δ))2 µ(da).
(554)
(P,Q)∈US
R
As a result, denote by a1/2 = inf{a ∈ R : µ((−∞, a]) ≥ 12 } a median of µ, choosing δ = 12 ∧ exp(−a1/2 − M ) for any
M > 0 yields
Z
2
1
M2
sup E(P,Q) D̂ − D(P kQ) ≥ (1 − )n ·
(a − ln(1/δ))2 µ(da) ≥ n+1 .
(555)
2
2
(P,Q)∈US
(−∞,a1/2 ]
Letting M → ∞ yields the desired result.
B. Proof of Lemma 22
Similar to the proof of [1, Lemma 16], we can show that
RP (S, m, n, u(S), π) =
∞
X
k,l=0
R(S, k, l, u(S), π)P(Poi(m) = k)P(Poi(n) = l)
(556)
51
where R(·, ·, ·, ·, π) and RP (·, ·, ·, ·, π) represent the Bayes error given prior π under the Multinomial model and the Poisson
sampling model, respectively. On one hand, we have
X
RP (S, m, n, u(S), π) ≥
R(S, k, l, u(S), π)P(Poi(m) = k)P(Poi(n) = l)
(557)
0≤k≤2m,0≤l≤2n
≥ R(S, 2m, 2n, u(S), π)P(Poi(m) ≤ 2m)P(Poi(n) ≤ 2n)
1
≥ R(S, 2m, 2n, u(S), π)
4
(558)
(559)
where we have used the Markov inequality to get P(Poi(m) ≤ 2m) ≥ 21 and P(Poi(n) ≤ 2n) ≥ 12 . On the other hand, note
that D(P kQ) ≤ ln u(S) whenever (P, Q) ∈ US,u(S) , by the Poisson tail bound in Lemma 28 we also have
X
RP (S, m, n, u(S), π) ≤
R(S, k, l, u(S), π)P(Poi(m) = k)P(Poi(n) = l)
k>m/2,l>n/2
≤
m
n
+ (ln u(S))2 P(Poi(m) ≤ ) + P(Poi(n) ≤ )
(560)
2
2
X
m n
m
n
R(S, , , u(S), π)P(Poi(m) = k)P(Poi(n) = l) + (ln u(S))2 exp(− ) + exp(− )
2 2
8
8
k>m/2,l>n/2
m
n
m n
≤ R(S, , , u(S), π) + (ln u(S))2 exp(− ) + exp(− ) .
2 2
8
8
By the minimax theorem [55], taking supremum over all priors π yields the desired result.
(561)
(562)
C. Proof of Lemma 23
We apply the general approximation theory on convex polytopes to our one-dimensional case where [a, b] is an interval.
Note that by polynomial scaling,
a
En [ln x; [a, b]] = En [ln ((b − a)x + a) ; [0, 1]] = En [ln(x +
); [0, 1]]
(563)
b−a
a
it suffices to consider the function h(x) = ln(x + ∆) defined on [0, 1], where ∆ = b−a
> 0. In this case, the second-order
Ditzian–Totik modulus of smoothness in (146) is reduced to [44]
u+v
u+v
2
2
: u, v ∈ [0, 1], |u − v| ≤ 2tϕ(
)
(564)
ω[0,1] (f, t) = ωϕ (f, t) , sup f (u) + f (v) − 2f
2
2
p
where ϕ(x) = x(1 − x). For the evaluation of ωϕ2 (h, t) for t ∈ [0, 1], we write u = r + s, v = r − s with u, v ∈ [0, 1] and
0 ≤ s ≤ tϕ(r) in the definition. Then for ∆ > t2 , by Taylor expansion we have
k
∞
∞
∞
X
X
|h(2k) (r)| 2k X 1
s2k
1 t2 r(1 − r)
|h(r + s) + h(r − s) − 2h(r)| ≤ 2
s =
·
≤
.
(565)
(2k)!
k (r + ∆)2k
k (r + ∆)2
k=1
By differentiation, it is easy to show that the maximum of
1
is 4∆(1+∆)
. Hence, by (565) we have
|h(r + s) + h(r − s) − 2h(r)| ≤
2
∞
X
k=1
t2
4∆(∆ + 1)
k=1
r(1−r)
(r+∆)2
k
k=1
is attained at r =
∞
X
t2
≤
4∆(∆ + 1)
k=1
∆
2∆+1 ,
and the corresponding maximum
k−1
1
t2
t2
=
≤
4
3∆(∆ + 1)
3∆
(566)
t
i.e., we conclude that ωϕ2 (h, t) ≤ 3∆
when ∆ > t2 .
2
For ∆ ≤ t , the concavity of ln(·) yields that the maximum-achieving pair (u, v) must satisfy one of the following: (1)
u = 1; (2) v = 0; (3) s = tϕ(r).
t2
1
We start with the case where s = tϕ(r), then 1+t
2 ≤ r ≤ 1+t2 . In this case (565) still holds, but now the maximum of
2
r(1−r)
t
(r+∆)2 is attained at r = 1+t2 , and the corresponding inequality becomes
k X
k
∞
∞
X
1
t4
1
t4
≤
k (t2 + (1 + t2 )∆)2
k (t2 + ∆)2
k=1
k=1
2
t4
(t2 + ∆)2
2t + ∆
= − ln 1 − 2
= ln
≤ ln
.
(t + ∆)2
∆(∆ + 2t2 )
∆
|h(r + s) + h(r − s) − 2h(r)| ≤
Note that this inequality only requires r ≥
t2
1+t2 ,
hence it also holds for the case where u = 1.
(567)
(568)
52
Now we are only left with the case where v = 0, then s = r and r ≤
t2
1+t2 .
As a result,
|h(r + s) + h(r − s) − 2h(r)| = 2 ln(r + ∆) − ln(2r + ∆) − ln(∆)
t2
r2
r
≤ ln 1 +
= ln 1 +
≤ ln 1 +
.
∆(2r + ∆)
2∆
2∆
In summary, for ∆ ≤ t2 we can obtain that
ωϕ2 (h, t)
2t2
≤ ln 1 +
∆
(569)
(570)
(571)
and Lemma 23 follows from the previous upper bounds on ωϕ2 (h, n−1 ) and Lemma 10.
D. Proof of Lemma 24
It suffices to prove the claim for ωT2 (f, 1/K), where T is the following triangle containing R:
2c1 ln n
T , (x, y) : 0 ≤ y ≤
, 0 ≤ x ≤ u(S)y .
n
(572)
Denote by E1 , E2 , E3 three edges of this triangle (excluding endpoints):
2c1 ln n
2c1 u(S) ln n
,y =
}
(573)
n
n
2c1 ln n
E2 , {(x, y) : x = 0, 0 < y <
}
(574)
n
2c1 ln n
E3 , {(x, y) : x = u(S)y, 0 < y <
}.
(575)
n
Since |∆2hd˜ (e,x,y)e f (x, y)| is a continuous function with respect to (x, y, e, h) ∈ T × S 1 × [0, 1], which is a compact set, we
T
can assume that (x0 , y0 , e0 , h0 ) achieves the supremum. Let A, B be the intersection of the line ` passing through (x0 , y0 )
with direction e0 with the triangle T .
If either A or B belongs to E1 , say, B ∈ E1 , then for sufficiently small > 0, the line connecting A and (x0 + , y0 )
(resp. (x0 − , y0 )) intersects E1 with direction e1 (resp. e2 ). Hence, by the similarity relation in geometry, the y-coordinates
of (x0 , y0 ) + h0 d˜T (e0 , x0 , y0 ) and (x0 + , y0 ) + h0 d˜T (e1 , x0 + , y0 ) are equal, and similarly for others. Hence, by linearity
of f (x, y) = x ln y in x,
E1 , {(x, y) : 0 < x <
2|∆2h
˜
0 dT (e0 ,x0 ,y0 )e0
f (x0 , y0 )| = |∆2h
˜
f (x0 + , y0 ) + ∆2h
˜
f (x0 + , y0 )| + |∆2h
0 dT (e1 ,x0 +,y0 )e1
≤ |∆2h
0 dT (e1 ,x0 +,y0 )e1
˜
0 dT (e2 ,x0 −,y0 )e2
f (x0 − , y0 )|
˜
0 dT (e2 ,x0 −,y0 )e2
f (x0 − , y0 )|
(576)
(577)
i.e., we can always perturb (x0 , y0 , e0 ) such that ` does not intersect E1 .
Now we assume that A = (0, y1 ), B = (u(S)y2 , y2 ) with y1 , y2 ∈ [0, 2c1nln n ]. If y2 = y1 , then f (x, y) is linear on `, and
2
ωT (f, 1/K) is zero. If y2 6= y1 , the function on ` becomes
h(y) =
y − y1
y2 u(S) ln y,
y2 − y1
y ∈ [u, v]
(578)
where u , y1 ∧ y2 and v , y1 ∨ y2 . Hence, by the sub-additivity of the Ditzian–Totik modulus of smoothness, for t ∈ [0, 1]
we have
y2 u(S)
y1 y2 u(S)
2
2
ωT2 (f, t) = ω[u,v]
(h, t) ≤
· ω 2 (y ln y, t) +
· ω[u,v]
(ln y, t)
(579)
|y2 − y1 | [u,v]
|y2 − y1 |
" 2
#
ω[u,v] (y ln y, t)
u
≤ u(S)v
+
· ω 2 (ln y, t)
(580)
v−u
v − u [u,v]
By the proof of Lemma 23 (where we have used ln(1 + x) ≤ x when ∆ ≤ t2 ), we have
3t2 (v − u)
.
u
2
As for ω[u,v]
(y ln y, t), we distinguish into two cases. If v ≤ 2u, by Taylor expansion we have
2
ω[u,v]
(ln y, t) ≤
2
ω[u,v]
(y ln y, t) ≤ sup |(y ln y)00 | · (v − u)2 t2 =
y∈[u,v]
(v − u)2 t2
≤ (v − u)t2 .
u
(581)
(582)
53
2
Otherwise, if v > 2u, since it has been shown in [38] that ω[0,1]
(y ln y, t) =
2t2 ln 2
1+t2 ,
by scaling [u, v] 7→ [u/v, 1] we have
2
2
2
(y ln y, t) ≤ v · ω[u/v,1]
(y ln y, t) ≤ v · ω[0,1]
(y ln y, t) ≤ 2 ln 2 · vt2 ≤ 4 ln 2 · (v − u)t2 .
ω[u,v]
A combination of the previous three inequalities yields
4 ln 2 · (v − u)t2
u
3t2 (v − u)
ωT2 (f, t) ≤ u(S)v
+
·
v−u
v−u
u
2
= (3 + 4 ln 2)u(S)vt
(6 + 8 ln 2)c1 u(S) ln n 2
·t
≤
n
where we have used v = y1 ∨ y2 ≤
(6 + 8 ln 2)c1 .
2c1 ln n
.
n
(583)
(584)
(585)
(586)
Now the desired result follows directly by choosing t = 1/K 2 and C0 =
E. Proof of Lemma 27
First we assume that b = t + 1, a = t − 1, t 6= 0, and write
pn (x) =
n
X
aν xν =
ν=0
n
X
bν (x − t)ν .
ν=0
(587)
By Lemma 26 and the related discussions, we know that |bν | ≤ 23n/2 for any ν = 0, · · · , n. Comparing coefficients yields
n
X
µ
|aν | =
(−t)µ−ν bµ
(588)
ν
µ=ν
n
X
µ
3n/2 −ν
≤2
|t|
|t|µ
(589)
ν
µ=ν
≤ 23n/2 |t|−ν 2n (n + 1)(|t|n + 1)
7n/2
≤2
|t|
−ν
(590)
n
(591)
(|t| + 1).
In the general case, the desired result is obtained by scaling.
F. Proof of Lemma 29
It is straightforward to show
Var(XY ) = E[(XY )2 ] − (E[XY ])2
2
2
2
= E[X ]E[Y ] − (EX) (EY )
(592)
2
2
(593)
2
2
2
= (Var(X) + (EX) )(Var(Y ) + (EY ) ) − (EX) (EY )
= Var(X)(EY )2 + Var(Y )(EX)2 + Var(X)Var(Y )
(594)
(595)
as desired.
R EFERENCES
[1] J. Jiao, K. Venkat, Y. Han, and T. Weissman, “Minimax estimation of functionals of discrete distributions,” Information Theory, IEEE Transactions on,
vol. 61, no. 5, pp. 2835–2885, 2015.
[2] I. Csisz et al., “Information-type measures of difference of probability distributions and indirect observations,” Studia Sci. Math. Hungar., vol. 2, pp.
299–318, 1967.
[3] F. Liese and K.-J. Miescke, “Statistical decision theory,” in Statistical Decision Theory. Springer, 2007, pp. 1–52.
[4] T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd ed. New York: Wiley, 2006.
[5] A. Tsybakov, Introduction to Nonparametric Estimation. Springer-Verlag, 2008.
[6] S. Kullback and R. A. Leibler, “On information and sufficiency,” The annals of mathematical statistics, vol. 22, no. 1, pp. 79–86, 1951.
[7] C. E. Shannon, “A mathematical theory of communication,” The Bell System Technical Journal, vol. 27, pp. 379–423, 623–656, 1948.
[8] O. Catoni and J. Picard, Statistical learning theory and stochastic optimization: Ecole d’Eté de Probabilités de Saint-Flour, XXXI-2001. Springer
Science & Business Media, 2004, vol. 31.
[9] I. Csiszar and J. Körner, Information theory: coding theorems for discrete memoryless systems. Cambridge University Press, 2011.
[10] I. Sanov, On the probability of large deviations of random variables. United States Air Force, Office of Scientific Research, 1958.
[11] S. Kullback, Information theory and statistics. Courier Corporation, 1997.
[12] A. P. Dempster, N. M. Laird, and D. B. Rubin, “Maximum likelihood from incomplete data via the em algorithm,” Journal of the royal statistical society.
Series B (methodological), pp. 1–38, 1977.
[13] C. M. Bishop, “Pattern recognition,” Machine Learning, vol. 128, 2006.
[14] D. P. Kingma and M. Welling, “Auto-encoding variational bayes,” arXiv preprint arXiv:1312.6114, 2013.
54
[15] Q. Wang, S. R. Kulkarni, and S. Verdú, “Divergence estimation of continuous distributions based on data-dependent partitions,” Information Theory,
IEEE Transactions on, vol. 51, no. 9, pp. 3064–3074, 2005.
[16] Y. K. Lee and B. U. Park, “Estimation of Kullback–Leibler divergence by local likelihood,” Annals of the Institute of Statistical Mathematics, vol. 58,
no. 2, pp. 327–340, 2006.
[17] A. Gretton, K. M. Borgwardt, M. Rasch, B. Schölkopf, and A. J. Smola, “A kernel method for the two-sample-problem,” in Advances in neural information
processing systems, 2006, pp. 513–520.
[18] F. Pérez-Cruz, “Kullback-Leibler divergence estimation of continuous distributions,” in Information Theory, 2008. ISIT 2008. IEEE International
Symposium on. IEEE, 2008, pp. 1666–1670.
[19] Q. Wang, S. R. Kulkarni, and S. Verdú, “Divergence estimation for multidimensional densities via-nearest-neighbor distances,” Information Theory, IEEE
Transactions on, vol. 55, no. 5, pp. 2392–2405, 2009.
[20] X. Nguyen, M. J. Wainwright, and M. I. Jordan, “Estimating divergence functionals and the likelihood ratio by convex risk minimization,” Information
Theory, IEEE Transactions on, vol. 56, no. 11, pp. 5847–5861, 2010.
[21] H. Cai, S. R. Kulkarni, and S. Verdú, “Universal divergence estimation for finite-alphabet sources,” Information Theory, IEEE Transactions on, vol. 52,
no. 8, pp. 3456–3475, 2006.
[22] Z. Zhang and M. Grabchak, “Nonparametric estimation of Küllback-Leibler divergence,” Neural computation, vol. 26, no. 11, pp. 2570–2593, 2014.
[23] A. W. Van der Vaart, Asymptotic statistics. Cambridge university press, 2000, vol. 3.
[24] J. Jiao, Y. Han, and T. Weissman, “Minimax estimation of the l1 distance,” in 2016 IEEE International Symposium on Information Theory (ISIT). IEEE,
2016, pp. 750–754.
[25] Y. Bu, S. Zou, Y. Liang, and V. V. Veeravalli, “Estimation of KL divergence between large-alphabet distributions,” in 2016 IEEE International Symposium
on Information Theory (ISIT). IEEE, 2016, pp. 1118–1122.
[26] ——, “Estimation of KL divergence: Optimal minimax rate,” arXiv preprint arXiv:1607.02653, 2016.
[27] T. T. Cai and M. G. Low, “Testing composite hypotheses, Hermite polynomials and optimal estimation of a nonsmooth functional,” The Annals of
Statistics, vol. 39, no. 2, pp. 1012–1041, 2011.
[28] G. Valiant and P. Valiant, “The power of linear estimators,” in Foundations of Computer Science (FOCS), 2011 IEEE 52nd Annual Symposium on.
IEEE, 2011, pp. 403–412.
[29] P. Valiant and G. Valiant, “Estimating the unseen: improved estimators for entropy and other properties,” in Advances in Neural Information Processing
Systems, 2013, pp. 2157–2165.
[30] Y. Wu and P. Yang, “Minimax rates of entropy estimation on large alphabets via best polynomial approximation,” arXiv preprint arXiv:1407.0381, 2014.
[31] J. Acharya, A. Orlitsky, A. T. Suresh, and H. Tyagi, “The complexity of estimating Rényi entropy.” SODA, 2015.
[32] Y. Wu and P. Yang, “Chebyshev polynomials, moment matching, and optimal estimation of the unseen,” arXiv preprint arXiv:1504.01227, 2015.
[33] Y. Han, J. Jiao, R. Mukherjee, and T. Weissman, “Optimal estimation of Lr norm of functions in Gaussian white noise,” in preparation, 2016.
[34] G. A. Miller, “Note on the bias of information estimates,” Information Theory in Psychology: Problems and Methods, vol. 2, pp. 95–100, 1955.
[35] A. Carlton, “On the bias of information estimates.” Psychological Bulletin, vol. 71, no. 2, p. 108, 1969.
[36] A. Nemirovski, “Topics in non-parametric,” Ecole dEté de Probabilités de Saint-Flour, vol. 28, p. 85, 2000.
[37] M. Mitzenmacher and E. Upfal, Probability and computing: Randomized algorithms and probabilistic analysis. Cambridge University Press, 2005.
[38] J. Jiao, K. Venkat, Y. Han, and T. Weissman, “Non-asymptotic theory for the plug-in rule in functional estimation,” arXiv preprint arXiv:1406.6959,
2014.
[39] D. Braess and T. Sauer, “Bernstein polynomials and learning theory,” Journal of Approximation Theory, vol. 128, no. 2, pp. 187–206, 2004.
[40] A. Tsybakov, “Aggregation and high-dimensional statistics,” Lecture notes for the course given at the École dété de Probabilités in Saint-Flour, URL
http://www. crest. fr/ckfinder/userfiles/files/Pageperso/ATsybakov/Lecture notes SFlour. pdf, vol. 16, p. 20, 2013.
[41] C. S. Withers, “Bias reduction by Taylor series,” Communications in Statistics-Theory and Methods, vol. 16, no. 8, pp. 2369–2383, 1987.
[42] G. Peccati and M. S. Taqqu, “Some facts about Charlier polynomials,” in Wiener Chaos: Moments, Cumulants and Diagrams. Springer, 2011, pp.
171–175.
[43] J. R. Rice, “Tchebycheff approximation in several variables,” Transactions of the American Mathematical Society, pp. 444–466, 1963.
[44] Z. Ditzian and V. Totik, Moduli of smoothness. Springer, 1987.
[45] V. Totik, Polynomial Approximation on Polytopes. Memoirs of the American Mathematical Society, 2013, vol. 232.
[46] F. Dai and Y. Xu, Approximation theory and harmonic analysis on spheres and balls. Springer, 2013.
[47] E. Y. Remez, “Sur la détermination des polynômes dapproximation de degré donnée,” Comm. Soc. Math. Kharkov, vol. 10, pp. 41–63, 1934.
[48] Chebfun Version 5, The Chebfun Development Team, 2014, http://www.chebfun.org/.
[49] A. Haar, “Die minkowskische geometrie und die annäherung an stetige funktionen,” Mathematische Annalen, vol. 78, no. 1, pp. 294–311, 1917.
[50] O. Lepski, A. Nemirovski, and V. Spokoiny, “On estimation of the Lr norm of a regression function,” Probability theory and related fields, vol. 113,
no. 2, pp. 221–253, 1999.
[51] J. Jiao, Y. Han, and T. Weissman, “Minimax estimation of divergence functions,” in preparation.
[52] M. Qazi and Q. Rahman, “Some coefficient estimates for polynomials on the unit interval,” Serdica Math. J, vol. 33, pp. 449–474, 2007.
[53] M. Mitzenmacher and E. Upfal, Probability and computing: Randomized algorithms and probabilistic analysis. Cambridge University Press, 2005.
[54] J. C. Mason and D. C. Handscomb, Chebyshev polynomials. CRC Press, 2002.
[55] A. Wald, Statistical decision functions. Wiley, 1950.
| 10math.ST
|
arXiv:1605.00716v1 [cs.LG] 3 May 2016
Radio Transformer Networks: Attention Models for
Learning to Synchronize in Wireless Systems
Timothy J. O’Shea
Latha Pemula
Dhruv Batra
T. Charles Clancy
Virginia Tech
Arlington, VA
[email protected]
Virginia Tech
Blacksburg, VA
[email protected]
Virginia Tech
Blacksburg, VA
[email protected]
Virginia Tech
Arlington, VA
[email protected]
Abstract—We introduce learned attention models into the radio machine learning domain for the task of modulation recognition by leveraging spatial transformer networks and introducing
new radio domain appropriate transformations. This attention
model allows the network to learn a localization network capable
of synchronizing and normalizing a radio signal blindly with zero
knowledge of the signal’s structure based on optimization of the
network for classification accuracy, sparse representation, and
regularization. Using this architecture we are able to outperform
our prior results in accuracy vs signal to noise ratio against an
identical system without attention, however we believe such an
attention model has implication far beyond the task of modulation
recognition.
Attention models have recently been gaining widespread
adoption in the computer vision community for a number
of important reasons. They introduce a learned model for
attention capable of removing numerous variances and parametric search spaces in the input data and focuses on the
task of extracting a canonical form attention patch with these
variations removed to make downstream tasks easier and of
lower complexity. These were first introduced as recurrent
networks [4] which were quite expensive, but have made
significant progress since then.
Keywords—Radio Transformer Networks, Radio communications, Software Radio, Cognitive Radio, Deep Learning, Convolutional Autoencoders, Neural Networks, Machine Learning,
Attention Models, Spatial Transformer Networks, Synchronization,
RadioML, Signal Processing
I.
I NTRODUCTION
Cognitive radio and signal processing in general has long
relied on a relatively well defined set of expert systems and
expert knowledge to operate. Unfortunately in the realization
of cognitive radio, this has greatly limited the ability of systems
to generalize and perform real learning and adaptation to
new and unknown signals and tasks. By approaching signal
recognition, synchronization, and reasoning from a ground-up
feature learning angle, we seek to be able to build cognitive
radio systems which truly generalize and adapt without running
into barriers of expert knowledge such as many of the current
day solutions which address more narrowly scoped problems.
In our prior work, we looked at the application of deep
convolutional neural networks to the task of modulation recognition [9] through blind feature learning on time domain radio
signals. We were able to achieve excellent classification performance at both low and high SNR by learning time domain
features directly from a dataset with harsh channel impairments
(oscillator drift, clock drift, fading, noise). However we had
no notion of attention in this work and instead forced the
discriminative network to learn features invariant to each of
these channel effects. In communications receivers (and many
iterative expert modulation classification algorithms), we typically perform synchronization on the signal before performing
additional signal processing steps. This synchronization can
be thought of as a form of attention which estimates a time,
frequency, phase, and sample timing offset in order to create
a normalized version of the signal.
Figure 1.
Generalized Transformer Network Architecture
Spatial transformer networks (STNs) [8] were recently
introduced to provide an end to end feed-forward model of
attention which can be trained directly from loss on each
training example and compactly evaluated on new samples.
They consist of a trained Localization network which performs
parameter regression, a fixed parametric transform operation,
and a trained discriminative classifier to select a class estimate.
In the image domain, where these have so far been applied, a
2D Affine transform is used to extract an attention patch which
is shifted, scaled, and rotated in 2-space from the original
image according to a 2x3 parameter vector θ, generalized in
figure 1.
In this work, we propose a Radio Transformer Network
(RTN), which leverages the generalization of the STN architecture, but introduces radio-domain specific parametric
transforms. This attention model can be used to learn directly
how to synchronize in wireless systems, and enables our
modulation recognition system to outperform the attentionless version of itself by assisting in the normalization of the
received signal prior to classification. By constructing this
normalized received signal with an attention model we greatly
simplify the task of the discriminative network by relaxing
the requirements on various variations of the received signal
it must recognize, reducing the complexity and increasing the
performance necessary in a discriminative network.
This is an important result in modulation recognition but
also more widely in radio communications and signal processing, as it demonstrates that we can learn to synchronize
rather than relying on expert systems and estimators derived
through a costly analytic process. We believe attention models
will play an important and wide-spread role in forthcoming
machine learning based signal processing systems.
II.
L EARNING TO C LASSIFY S IGNALS
Figure 3.
Original ConvNet Performance vs Expert Statistics
believe the correction of fading through equalization has the
potential to also be addressed as an attention model, either
jointly or subsequently to the transformations addressed here.
A. Timing and Symbol-Rate Recovery
Figure 2.
Original ConvNet Architecture without Attention
In prior work [9] we compare supervised learning using
a deep convolutional network with no expert features, to a
handful of widely used machine learning techniques on expert
signal amplitude, phase, and envelope moments. We used the
architecture shown in figure 2 using a convolutional frontend,
a dense backend, and a softmax with categorical cross-entropy
training using Adam/SGD against a synthetic dataset.
In figure 3 we summarize the results of that experiment
without an attention model, demonstrating a significant improvement over the moment based features and conventional
classifiers.
This is an exciting result as it demonstrates that feature
learning on raw RF data does work, and in this case it is
working better than conventional widely used expert features!
III.
U SING ATTENTION TO S YNCHRONIZE
To effectively synchronize to a wireless signal, we must
develop a transform which, with the right parameters is able to
correct for channel induced variation. Within the scope of this
paper, we consider channel variation due to time offset, time
dilation, frequency offset, and phase offset. These are effects
which exist in any real system containing transmitters and
receivers whose oscillators and clocks are not locked together.
For now we do not address the problem of fading, but we
Timing and symbol-rate recovery are relatively straightforward processes involving the re-sampling of the input signal at
the correct starting offset and sampling increment. This is very
much akin to the extraction of visual pixels at the correct offset
of a 1D Affine transformation, and so we treat it as such by
directly leveraging the Affine transformation used in the image
domain. We represent our data as a 2D image, with a two rows
containing I/Q and an N columns containing samples in time.
A full 2D Affine transformation allows for translation,
rotation, and scaling in 2-dimensions given by a 2x6 element
parameter vector. To restrict this to 1-Dimensional translation
and scaling in the time dimension, we can simply introduce
the following mask 1 and then readily use 2D Affine transform
implementations from the image domain.
θ0
0
0
θ1
θ2
0
(1)
B. Phase and Frequency Offset Recovery
Phase and frequency offset recovery is a task which doesn’t
have an immediate analogue in the vision domain. However
this transform in signal processing is relatively straightforward.
We simply mix our signal with a complex sinusoid with the
proper initial phase and frequency as defined by two new
unknown parameters.
yn = xn ∗ exp(nθ3 + θ4 )
(2)
We directly implement this transform as a new layer in
Keras (on top of Theano and Tensorflow), and cascade it
before the Affine transform in the Transformer module of our
network.
C. Parameter Estimation
The task of synchronization now becomes the task of
parameter estimation of θi values passed into our transformer
module. We experimentally try a number of different neural
network architectures for performing this parameter regression
task, and ultimately introduce two new domain appropriate
layers into Keras to help assist in their estimation.
1) Complex Convolution 1D Layer: Complex neural networks are not widely used and still faced some theoretical
issues especially in automated differentiation, so we represent
our signal as a two row 2D matrix with the real component in
the first row and imaginary component in the second row. In
theory real valued convolutions in a neural network can learn
the relationship between these components to some extent, but
by introducing a complex convolution operation, we simplify
the learning task and ensure that we learn a filter with the
properties we are used to working with.
For a complex valued input vector X of size 2xN, we define
a weight vector W of M complex filters each 2xK in length.
We may then compute the output for each of the k output
values as.
conv(X0,: , Wk,0,: ) − conv(X1,: , Wk,1,: )
conv(X0,: , Wk,1,: ) + conv(X1,: , Wk,0,: )
(3)
This allows us to leverage existing, highly optimized real
convolution operations and obtain a differentiable operation
which can be trained with back-propagation.
4) Training Details: We train this network using Keras [7]
on top of Theano [2] and TensorFlow [6] using an NVidia
Geforce Titan X inside a Digits Devbox. We use dropout [5]
of 0.5 between each layer for regularization, and the Adam [3]
method of stochastic gradient descent to fit network parameters
on our training set.
We train with a batch size of 1024 and an initial learning
rate of 0.001. We train for roughly 350 epochs, reducing our
learning rate by half each validation loss stops decreasing.
Training takes about 3 hours on a Titan X GPU, but feedforward evaluation or signal classification takes less than 10ms.
IV.
DATA - SET AND M ETHODOLOGY
For our classifier performance evaluation, in this work and
in prior work, we leverage the RadioML.com 2016.04C open
source dataset and perform at 60/40 split between train and test
sets. This consists of 11 modulations (8 digital and 3 analog) at
varying SNR levels, with random walk simulations on center
frequency, sample clock rate, sample clock offset, and initial
phase, as well as limited multi-path fading. We believe it is
critically important to test with real channel effects early to
ensure realistic assumptions early in our models. This dataset
is labeled with SNR and Modulation-Type, when performing
supervised training we use only the modulation-type labels
of the training set, and evaluate the classification accuracy
performance at each SNR label step for the test set.
Training and validation loss along with learning rate are
shown throughout the trainin in figure 5.
2) Complex to Power and Phase: Creating a differentiable
Cartesian to Polar operation which makes it easier for the
network to operate directly on input phase and magnitude is
slightly more involved. We compute magnitude squared simply
as mn = pow(x0,n , 2) + pow(x1,n , 2), but for phase computation we use a simplified and differentiable approximation of
atan2 without conditionals implemented in Keras on top of
Theano and Tensorflow.
z = Xq/K.clip(K.abs(Xi),1e-3,1e6)
z = z*K.sign(xi)
zd1 = 1+0.28*K.pow(z,2)
z1 = z/zd1 + PI*K.sign(Xq)
zd2 = K.pow(z,2) + 0.28
z2 = z/zd2 + (K.sign(Xq)-1)*0.5*PI
zc = K.abs(z) - 1
atan2 = (K.sign(zc)-1)*(-0.5)*z1 +
(K.sign(zc)+1)*0.5*z2
3) Network Architecture: We evaluate dozens of localization network architectures with slight variation between dense
connections, convolutional layers, and complex-convolutional
layers, using various activation functions, and achieve our best
performance using the composite network shown in figure
4. This uses both the complex convolutional layer and the
complex to polar layers within the localization network and
an identical discriminative network to the one we used without
attention in front of it for comparison.
Figure 5.
Training Loss and Learning Rate
V.
C LASSIFICATION P ERFORMANCE
Evaluating the performance of the RTN on the test set, we
obtain slightly increased performance over the model without
attention. Similar accuracies are obtained at slightly lower SNR
values ( 1dB) and high SNR performance is slightly improved
and more stable as shown in figure 6.
We suspect the complexity of the discriminative network
could now be reduced due to lower complexity of the normalized signal but we do not investigate this work further here for
fair comparison of the same discriminative network.
Figure 4.
Radio Transformer Network Architecture
Figure 6.
Radio Transformer Network Performance
Performance of the convolutional neural network without
attention is also improved from our prior work by increasing
dropout and better learning rate policy to match that used in
our RTN training. This is reflected in figure 6.
VI.
Figure 7.
Performance of the RTN at High SNR (18dB)
Figure 8.
Density Plots of Pre- and Post-Transformed Input Constellations
ATTENTION L EARNING P ERFORMANCE
We have shown that classification performance is improved
while using a radio localization network to extract normalized
patches on the dataset. However, we can not only look at
classification performance, it is also interesting to look at the
radio sample data before and after transformation to observe
any normalization that has occurred. It is difficult to visualize
exactly what has occured here, looking at time domain data
does not yield clean, obvious performance improvement on the
data. Upon attempting to plot an eye-diagram of the QPSKclass signals, it is clear that synchronizaiton is at this point
still horribly noisy and partial. However, if we plot the the
constellation density for 50 test examples over a range of 20
time samples each, shown in figure 8, we can start to see a bit
more density forming around the constellation points vs what
we started with, which is a good sign to start with.
[5]
Clearly much work needs to be done to improve and
quantify synchronization performance, in-fact we have no real
reason to expect perfect synchronization from a classification
task, just enough normalization to make things easier on the
discriminative network. We will continue to investigate this
area, and additional tasks other than modulation recognition
which may improve the synchronization properties for demodulation beyond what has been achieved here.
[6]
VII.
C ONCLUSIONS
By developing a feed forward model for radio attention, we
have demonstrated that we can effectively learn to synchronize
using deep convolutional neural networks with domain specific
transforms and layer configurations. Normalizing out time,
time-dilation, frequency and phase offsets using learned estimators does effectively improve our modulation classification
performance and requires no expert knowledge about the
signals of interest to train.
While the training complexity of such a network is high,
the feed-forward execution of it is actually quite compact
and viable for real-world use and deployment. Platforms such
as the TX1 with highly parallel, low clock rate GPGPU
architectures further enable the low-SWaP deployment of these
algorithms for which they are exceptionally well suited.
ACKNOWLEDGMENTS
The authors would like to thank the Bradley Department
of Electrical and Computer Engineering at the Virginia Polytechnic Institute and State University,the Machine Learning &
Perception Group, the Hume Center, and DARPA all for their
generous support in this work.
This research was developed with funding from the Defense Advanced Research Projects Agency’s (DARPA) MTO
Office under grant HR0011-16-1-0002. The views, opinions,
and/or findings expressed are those of the author and should
not be interpreted as representing the official views or policies
of the Department of Defense or the U.S. Government.
R EFERENCES
[1]
C. Clancy, J. Hecker, E. Stuntebeck, and T. O’Shea,
“Applications of machine learning to cognitive radio
networks”, Wireless Communications, IEEE, vol. 14, no.
4, pp. 47–52, 2007.
[2] J. Bergstra, O. Breuleux, F. Bastien, P. Lamblin, R.
Pascanu, G. Desjardins, J. Turian, D. Warde-Farley, and
Y. Bengio, “Theano: a CPU and GPU math expression compiler”, in Proceedings of the Python for Scientific Computing Conference (SciPy), Oral Presentation,
Austin, TX, Jun. 2010.
[3] D. Kingma and J. Ba, “Adam: a method for stochastic
optimization”, arXiv preprint arXiv:1412.6980, 2014.
[4] V. Mnih, N. Heess, A. Graves, et al., “Recurrent models
of visual attention”, in Advances in Neural Information
Processing Systems, 2014, pp. 2204–2212.
[7]
[8]
[9]
N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and
R. Salakhutdinov, “Dropout: a simple way to prevent neural networks from overfitting”, The Journal of Machine
Learning Research, vol. 15, no. 1, pp. 1929–1958, 2014.
M. Abadi, A. Agarwal, et al., TensorFlow: large-scale
machine learning on heterogeneous systems, Software
available from tensorflow.org, 2015. [Online]. Available:
http://tensorflow.org/.
F. Chollet, Keras, https://github.com/fchollet/keras, 2015.
M. Jaderberg, K. Simonyan, A. Zisserman, et al., “Spatial
transformer networks”, in Advances in Neural Information Processing Systems, 2015, pp. 2008–2016.
T. J. O’Shea and J. Corgan, “Convolutional radio modulation recognition networks”, CoRR, vol. abs/1602.04105,
2016. [Online]. Available: http : / / arxiv. org / abs / 1602 .
04105.
| 3cs.SY
|
Analysis of planar ornament patterns via motif asymmetry assumption and
local connections
V. Adanova, S. Tari∗
arXiv:1710.04623v1 [cs.CV] 12 Oct 2017
Department of Computer Engineering, Middle East Technical University, 06800 Ankara
Abstract
Planar ornaments, a.k.a. wallpapers, are regular repetitive patterns which exhibit translational symmetry
in two independent directions. There are exactly 17 distinct planar symmetry groups. We present a fully
automatic method for complete analysis of planar ornaments in 13 of these groups, specifically, the groups
called p6m, p6, p4g, p4m, p4, p31m, p3m, p3, cmm, pgg, pg, p2 and p1. Given the image of an ornament
fragment, we present a method to simultaneously classify the input into one of the 13 groups and extract
the so called fundamental domain (FD), the minimum region that is sufficient to reconstruct the entire
ornament. A nice feature of our method is that even when the given ornament image is a small portion
such that it does not contain multiple translational units, the symmetry group as well as the fundamental
domain can still be defined. This is because, in contrast to common approach, we do not attempt to first
identify a global translational repetition lattice. Though the presented constructions work for quite a wide
range of ornament patterns, a key assumption we make is that the perceivable motifs (shapes that repeat)
alone do not provide clues for the underlying symmetries of the ornament. In this sense, our main target is
the planar arrangements of asymmetric interlocking shapes, as in the symmetry art of Escher.
Keywords: ornaments, wallpaper groups, mosaics, regular patterns, Escher style planar patterns
1. Introduction
Planar ornaments, a.k.a. wallpapers, are repetitive patterns which exhibit translational symmetry
in two independent directions. They form a tiling
of the plane. They are created by repeating base
unit in a predictable manner, using four primitive
planar geometric operations: translation, rotation,
reflection and glide reflection (Fig. 1). Using combinations of these primitive operations applied on
a base unit, different patterns can be generated.
An interesting fact is that the four primitive operations can be combined in exactly seventeen different
ways to tile a plane, forming the so called 17 P lane
Symmetry Groups [1].
We present an illustrative example in Fig. 2.
Firstly, observe that the pattern Fig. 2 (a) can be
generated by replicating the equilateral triangular
∗ Corresponding
author
Email addresses: [email protected]
(V. Adanova), [email protected] (S. Tari )
Preprint submitted to Elsevier
(a)
(b)
(c)
(d)
Figure 1: 4 primitive operations.(a) Translation, (b) reflection, (c) glide reflection, (d) 4 types of rotational symmetry.
fragment depicted in Fig. 2(b) by 60◦ rotations in a
systematic manner. This equilateral triangle fragment is the smallest fragment of the pattern that is
sufficient to construct the entire pattern in Fig. 2(a)
using four primitive operations. As such, it is reOctober 13, 2017
letter c which stands for centered cell. The primitive cell is a unit cell with the centers of highest
order of rotation at the vertices. The centered cell
is encountered only in two cases (cm and cmm symmetry groups), and is chosen so that the reflection
axis is normal to one or both sides of the cell. The
digit that follows the letters p or c indicates the
highest order of rotation, whereas the letter characters m and g respectively stand for mirror and glide
reflections. When there are two positions containing either of m and g, it is understood that the first
reflection is normal to x axis and the second is at an
angle α. The digit denoting the highest order of rotation in a symmetry group can take only values 1,
2, 3, 4, and 6. This restriction is introduced by the
crystallographic restriction theorem, which states
that the patterns repeating in two dimension can
only exhibit 180◦ , 120◦ , 90◦ , and 60◦ rotations.
In the present paper, given an image fragment
from an ornament belonging to either of the mentioned 13 groups, we present a robust method to
extract the fundamental domain along with the underlying symmetry operations. That is, we provide a complete analysis of an ornamental pattern
in 13 groups based on an image. An important feature of our computational scheme is even when the
given input image is only a small portion that a
full unit cell does not fit to image (e.g., Fig. 4(a)),
the symmetry group as well as the fundamental domain can still be defined. Of course, once the symmetry group and fundamental domain are defined,
it becomes trivial to deduce the translational unit
cell. We remark that most of the existing methods
rely on first discovering the underlying lattice via
a translational repetition structure. This requires
global calculations, e.g., autocorrelations. In contrast, we do not search for a translational repetition
or lattice. We directly look for local connections
among motifs (protiles) from which we deduce symmetry clues that are later integrated via a decision
tree.
Using a decision tree is indeed the classical
method for grouping tiles into symmetry groups
based on individual clues [2]; the classical decision
tree is depicted in Fig. 5; observe that the check
for mirror reflections dominate the yes/no question
set. The rational behind the given question sequence could be that it is easy for humans to spot
mirror reflection and rotational symmetries while
much harder to spot glides. While this is true, the
robustness in the computational case might not be
the same.
Figure 2: An example. (a) The ornament image, (b) fundamental domain (FD), (c) unit cell (UC), (d) symmetries
and the relation between FD and UC, (e) symmetries, UC
and FD superimposed on the ornament image.
ferred as the fundamental domain (FD). Secondly,
by rotating the FD 120◦ twice around its top corner
and then rotating 180◦ around the middle point of
its base yields the rhombus depicted in Fig. 2(c).
This is the smallest translational unit; the pattern
in (a) can be generated by simply translating it
along two independent directions; hence, it is referred as the unit cell (UC). The abstracted unit
cell of the tile, the relation between the fundamental domain and the unit cell along with the symmetries, is shown in Fig. 2 (d). The blue hexagons
on the four corners of the rhombus indicate six-fold
rotation centers, and the red triangles and the pink
diamonds located on the centers and the side midpoints of the two triangles forming the rhombus respectively indicate three-fold and two-fold rotation
centers. In the final illustration (Fig. 2(e)) a sample cell is shown as superimposed on the original
ornament image.
Through a common naming provided by Crystallographic notation, the presented example happens
to belong to a group called as p6, indicating six fold
rotations. In the Crystallographic notation, the remaining 16 groups are named as p1, pm, pg, cm,
p2, pmm, pmg, pgg, cmm, p3, p3m1, p31m, p4,
p4m, p4g and p6m. In Fig. 3, we depict the cell
structures of each of the 13 symmetry groups that
we are interested in.
In the group name, each character position defines a group property: The first position is either
the letter p which stands for primitive cell or the
2
Figure 3: Unit cell structures for 13 Wallpaper Groups. Darker regions indicate fundamental domains.
(a)
(b)
the groups, pm, pmm, cm, pmg and gives us the 13
groups listed above. For the 13 groups, our goal is
to obtain the fundamental domain robustly up to a
mirror reflection.
In accumulating symmetry clues, we only resort to
local connections among motifs (protiles). Many of
the classical ornaments, such as those found in Islamic art, are constructed from symmetric protiles
such as stars that provide a clue to the symmetry
group of the tile. In some works, the symmetries
of the protiles themselves are used as a clue to the
symmetry. However, we believe that inferring symmetries of the motifs are not robust due to possible
noise in motif extraction. Moreover, the ornament
artist may be using nearly symmetric motifs that
do not reflect the symmetries of the ornament itself (several such examples exist in Escher’s art).
Hence, we neither attempt to recover individual motifs correctly nor check their symmetries. Indeed,
we even expect the patterns we analyze contain
sufficient number of asymmetric motifs or at least
the most significant symmetries are not completely
swallowed by motifs having the same symmetry.
Motif asymmetry assumption is not as restrictive as it may strike at first. Consider two valid
examples shown in Fig. 6. The first one is of group
p6 and contains exactly three all symmetric protiles – brown, beige and gray– respectively having
six-fold, three-fold and two-fold rotational symmetries. That is, the ornament does not contain any
asymmetric motif and all three types of rotation
centers coincide with the motif centers. Nevertheless, the local relations among the two-fold rotational symmetric gray motifs reveal both the sixfold and three-fold rotational centers, providing suf-
(c)
Figure 4: An example case for a pattern with few repetitions. (a) Original ornament, (b) fundamental domain, (c)
unit cell (black quadrilateral). Observe that the ornament
fragment does not contain the full unit cell.
We propose an alternative decision tree, of which
details are given in § 3. Initially, we accumulate
indirect clues to mirror reflection as opposed to
searching for mirror reflection axis. We postpone
mirror reflection control till the last stage, and then
at the last stage use mirror reflection check about
the predicted axes only to eliminate possible false
alarms resulting from indirect clues. That is, we
use mirror reflection check only to eliminate false
alarms, not to catch missed ones. This means that
we are willing to sacrifice mirror reflections in order
not to wrongly assume that the tile has a mirror reflection. Our rational is as follows: If we only miss
the mirror reflection, say classify a p6m tile as p6,
we still get the correct unit cell and a redundant
(twice the size) fundamental domain. Hence, the
pattern can be correctly generated. If, however, we
falsely classify a p6 tile as p6m, then the extracted
fundamental domain is not sufficient, as we falsely
assume the existence of a mirror reflection. A consequence of not searching for mirror reflection is that
we can only recognize groups that contain sufficient
symmetries other than mirror. This leaves out 4 of
3
Figure 5: Classical decision tree.
e.g., [3], with a goal of revealing social structures
and their interaction via dominant symmetries used
in the ornament designs of individual cultures or
geographical regions. In mathematics, the ornament patterns are studied in terms of the groups
formed by the symmetry operations. Few examples
include [4, 5, 6]. The Dutch artist, Escher took a
particular interest in patterns formed by repeating
asymmetric shapes and discovered a local structure
leading to the same wallpaper patterns; his work
on symmetry is examined in [7]. Regular repetitive patterns such as Wallpaper and Frieze groups
are even utilized in quite practical problems; for
example, to analyze human gait [8] or to achieve
automatic fabric defect detection in 2D patterned
textures [9, 10, 11].
ficient clues for p6. The second ornament, at a first
glance, might give the impression that it contains
only a single form that has all the symmetries of the
ornament itself, i.e., three-fold rotational symmetry
and mirror reflection. Nevertheless, due to texture,
there are also other detectable motifs in the form of
circles or circle fragments, of which local relations
provide clues for various three-fold rotation centers.
In general, our constructions can not handle ornaments of single motif such that the motif contains
all the symmetries of the symmetry group; for example, a checkerboard pattern or a uniform pack
of triangles. We remark, however, that such ornaments are typically the most obvious ones to recognize. Furthermore, even for those class of ornaments, it is possible to identify the translation grid
though full analysis revealing FD can not be performed.
The rest of the paper is organized as follows. § 2
is on related work. The Method details are given in
§ 3 and the results on 100 tile set is in § 4. Finally,
§ 5 is the Summary and Conclusion.
In the general pool of works in computational
symmetry, the main focus has been finding symmetry axes in single objects. Since a single object can
exhibit only mirror reflections and rotational symmetries, the efforts are heavily focused on reflections and rotations [12, 13, 14, 15, 16, 17, 18, 19]
or finding local symmetries a.k.a shape skeletons.
To our knowledge, [20, 21] are the only works that
address finding a glide reflection axis in an image,
though the goal is to study one dimensional arrangements of symmetry, e.g., leaves. The works
targeting shape symmetry, whether directly from
an image or from a segmented region, fall out of
our focus. Our focus is on the symmetries of planar
2. Related Work
Ornament patterns have always been a source of
curiosity and interest, not only in arts and crafts
but also other fields including mathematics, computation, cultural studies etc. Early researchers
mostly examined ornaments in cultural contexts,
4
termined. Since the possible lattice types that
can be associated with are restricted by the symmetries the ornament pattern exhibits, detecting
the lattice types reduces the number of symmetry groups. Though the lattice detection is commonly performed using peak heights in autocorrelation [30], in [31] an alternative peak detection algorithm based on so called regions of dominance is
used to detect patterns translational lattice. The
region of dominance is defined as the largest circle
centered on the candidate peak such that no higher
peaks are contained in the circle. The authors argue that the region of dominance is more important
than the height of the peak. A Hough transform is
used to detect two shortest translation vectors that
best explains the majority of the point data. In
order to test whether a pattern has certain symmetry, the conjectured symmetry is applied to entire
pattern and then the similarity between the original image and the transformed one is computed.
The representative motif is chosen to be the most
symmetrical figure.
patterns formed by regular repetition of shapes via
four primitive geometric transformations.
Figure 6: Possible valid inputs.
In analyzing planar periodic patterns, translational symmetry, the most primitive repetition operation, is encountered in several works on recurring
structure discovery [22, 23, 24, 25, 26]. The general
flow of such works is to detect visual words and
cluster them based on their appearance and spatial layout. Among these works, [23, 24, 25] further
perform image retrieval based on the discovered recurring structures. In [23, 24] instead of directly using the recurring structures for image matching, the
authors first detect a translational repetition lattice
of an image. There can be multiple lattices for an
image. Thus, given a query image with various detected lattices, they search a database for images
with equivalent lattices. In each search, the matching score between two lattices is a product of two
measurements: the similarity of the grayscale mean
of the representative unit cell and the similarity of
the color histograms. In [27, 28] detection of deformed lattice in a given pattern is proposed. They
first propose a seed lattice from detected interest
points. Using those interest points a commonly occurring lattice vectors are extracted. Subsequently,
the seed lattice is refined, and grown outward until
it covers whole pattern.
In [29], for translational symmetry, model based
lattice estimation is performed where the model
comparison for hypotheses generated via peaks of
the autocorrelation is implemented using approximate marginal likelihood.
Some works move further beyond computing a
translational lattice to address classifying repeated
patterns according to the 17 plane symmetry groups
(wallpapers) [30, 31, 32, 33, 34]. As a first step,
lattice detection is performed. After the lattice
detection step, sequence of yes/no questions are
answered, until the final symmetry group is de-
Recently, [35], combined lattice extraction and
point symmetry groups of individual motifs to analyse Islamic patterns in mosaics. This method
specifically targets Islamic ornaments in which motifs such as n-stars typically provide clues to the
underlying plane symmetry group. As such, it is
not readily applicable if motifs can not be robustly
extracted or motifs do not reflect the symmetries.
In, [36], rotation groups are detected to analyze Islamic rosette patterns.
It is also possible to perform a continuous characterization of the ornament by comparing ornament images. This is for example encountered in
[37], where ornament images are classified according to a symmetry feature vector calculated based
on a prior lattice extraction and yes/no questions;
for lattice detection, they used method in [38]. In
[39], ornament images are directly compared in a
transformed domain after applying a global transformation.
Note that among the works addressing planar
patterns, there are also several interesting works
on pattern synthesis, including how to generate an
ornament in a certain symmetry group, how to use
a given motif to tile the plane in a certain style, or
how to map a given wallpaper pattern to a curved
surface [40, 41].
5
number of clusters to be specificied. (This is unlike k-means). However, it requires a bandwidth
parameter which indirectly influence the number of
detected clusters. We automate the clustering process by iteratively using mean shift clustering increasing the bandwidth at each iteration as follows.
3. The Method
Our symmetry detection system has three modules:
image processing module, local connectivity analysis, and final symmetry detection. Each of them are
separately explained below.
At the initial step, the bandwidth parameter for
mean shift algorithm is set to binit and the number
of clusters is observed. Then at each iteration, the
bandwidth is increased by bstep . For all our images
binit = Nc and bstep = binit /2. The iterations are
stopped whenever the number of clusters k drop
below Nc . The resulting k clusters are used to
define k binary images. The resulting bandwidth is
taken as the image dependent bandwidth estimate
b∗ .
3.1. Image Processing
The input to the image processing module is an arbitrary ornament I which may be a noisy scanned
image or screen shot of a part of an ornament drawn
using a computer tool. That is, input ornament images are acquired in arbitrary imaging conditions.
The processing proceeds in three stages: gamma
correction, initial clustering, and refinement. At
the end of the refinement step, k binary images for
each ornament are obtained. These binary images
will be called masks for that ornament image.
The number of masks is a result of adaptive clustering. Quite often, the number of masks coincides
with the number of colors in that ornament image.
This, however, is not always so because the image
processing module is not given the number of colors.
Refinement. The computation of initial clusters
as outlined above is performed in the color space.
Hence, spatial proximity of the pixels are not taken
into account. In the next stage, a sequential combination of median filtering in the pixel space and
mean shift clustering in the color space are applied
iteratively for the fixed bandwidth b∗ . The median
filtering is realized as follows: If a pixel of class ci
is surrounded by a pixel of class cj , it is assigned to
class cj , and L ∗ a ∗ b∗ channels of that pixel to the
cluster center of the cluster cj . This sequential application of median filtering followed by mean shift
with fixed bandwith b∗ is performed only few times.
For all of our images, five iterations seemed sufficient. More iterations may cause the components
of different colors to join.
Gamma Correction. The first step of the image processing module is gamma-correction [42] to
brighten the black lines and shadows. It is performed on the Y component of xyY color space
using the following formula:
Yout = Ymin + (Ymax − Ymin ) ∗ (
Y − Ymin γ
)
Ymax − Ymin
Resulting image depends on the γ parameter. If
one chooses γ < 1 then the lightness of an image
is higher than in original image and darker colors
have more contrast. When γ = 1 no effect on
original image is observed, while γ > 1 makes
colors darker than in original image.
Final clusters in the pixel space may have small
holes. These holes may result either from an insufficient application of the iterative and sequential filtering step outlined above or simply from a
small feature such as an eye of a bird. To remove
holes, all background (foreground) connected components with radius smaller than a given threshold
R are converted to foreground (background) pixels.
Performing elimination based on component radius
rather than component area is more reliable, because it might be the case that all (or some) of the
components join giving large areas causing the necessary but separate components to be eliminated.
Initial Clustering. The next step is an iterative
application of a clustering algorithm till the number of initial clusters drop below a pre-defined value
Nc . Here, we assume that the number of distinct
colors is less than Nc ; hence, if the number of colors is more, then some color groups are merged to
form bigger motif groups. For clustering, we use
fast and robust mean shift algorithm [43]. It produces clusters based on a given feature space. In
our case, the features are L ∗ a ∗ b∗ channels of the
gamma corrected image. The appealing feature of
this algorithm for us is that it does not require the
A sample result of the image processing module
is depicted in Fig.7.
6
fed to the mean shift. A small and fixed bandwidth,
bc∗ is used. The number of connection groups as
discovered by the mean shift clustering could be
different than the initial n.
In Fig.9, a sample connectivity graph and individual connection groups, discovered by clustering
using the connection length, is depicted.
Figure 7: A sample result for image processing module.
The input ornament image (left) and three masks.
3.2. Local connectivity analysis I: from masks to
connections
The process of local connectivity analysis starts
with consistent keypoint detection on connected
components. An obvious means is to detect centroid of each foreground component. However, this
will be very sensitive to the output of the image
processing module. Separate repeating motifs may
touch one another, for example. Furthermore, this
joining of the motifs may be inconsistent throughout the ornament plane. What is important for the
purpose of further analysis is that the detected keypoints are consistent throughout the pattern. It is,
however, not critical whether they really coincide
with the true motif centers. Hence, we call these
keypoints as nodes.
Towards robustly locating nodes, a continuous labelling on each binary image, namely mask, is performed, yielding a continuous image label∗ , whose
values are in (−1, 1). The labelling stage is detailed at the end of this subsection as a separate
paragraph. The nodes are calculated as the centroids of the positive valued connected components
of the label∗ image. Some sample label images are
depicted in Fig.8. A node is merely a robustly computed keypoint.
Once the nodes are detected, a graph called connectivity graph is constructed via an iterative extraction of local node relations. In the first iteration, the minimal pairwise distance is found, and
then all connections with similar distances are extracted (using a fixed tolerance tol). In the next
iteration, excluding the extracted connections, next
minimal distance is computed to extract new connections. After n iterations, connections of various
sizes are obtained. Note that the connections with
large distances are not much meaningful; at best
they provide redundant information. Hence, it is
better to keep n small. Neither the choice of the
parameter n nor the tolerance tol is critical, because we later re-classify the connections using the
mean shift algorithm.
Given a set of connections stored at the connectivity graph, the connection length as the feature is
Figure 8: Sample label images. Observe that the motif
centers obtain the highest values.
Continuous labelling on the binary masks.
For each mask of each ornament, each pixel p on
each foreground connected component is assigned
an initial label, label(0, p), reflecting whether or not
the probability of the pixel belonging to a centroid
is higher than that of the pixel belonging to the
component boundary. For this purpose, distance
from each foreground pixel to the nearest background pixel is computed, and then those which
have bigger distance than the half of the maximum
of all distances are assigned a positive constant a
where the others −a.
After this label initialization, a relaxation is performed. In the relaxation step, the value is increased (decreased) depending on whether the current label at a pixel p is less (more) than the average of neighboring labels. Formula-wise, relaxation
is expressed as follows:
label(i + 1, p) = label(i, p) + r ∗ relaxation
where r is the relaxation constant which we take as
positive, and the relaxation is
relaxation = Avg (label(i, p))−label(i, p)+label(0, p)
where the Avg (label(i, p)) is computed as the average of 4-neighboors. At convergence or after sufficient number iterations, whichever comes first, the
continuous labelling of binary masks is achieved as
label∗ (p) ← label(K, p)
where K is last performed iteration.
7
a
b
Figure 9: Connectivity graph. (a) Extracted connections for each mask of the ornament, (b) connection groups.
3.3. Local connectivity analysis II: from connections to symmetry elements
The connection groups extracted as described above
are further analyzed in order to detect node relations. The way the nodes are related gives a hint on
various symmetry elements. Recall that the connections with small sizes are favored, since larger connections repeat the same node relations at a larger
scale. Thus, the analyses begin with the connection
group of the smallest size and continue in ascending
order. The analyses are done as following.
Each individual connection group is divided into
connected graphs. Afterwards, each connected
graph is further analyzed independent of the other
connected graphs in the connection group. Given a
connected graph, the following decisions are made.
tation. Since two-node connections might
occur by accident, the two-fold centers are
accepted only if the number of nodes involved in such connection in a connection
group is more than 60% of entire node
number in a mask.
2b If the graph contains more than three
nodes, the polynomial of order one is fit
to the given nodes. For a graph of zigzag
structure the line should pass through the
centers of the edges between two adjacent
nodes. In this case, the distances between
the centers of the edges of two adjacent
nodes and a line are computed. The
probability of the graph being of zigzag
structure is computed by taking the product of the above distance ratios. If the
probability is more than 0.5, then there
is a glide reflection axis passing through
edge centers. On the contrary, if the
nodes themselves (not the edge centers)
lie on the fit polynomial, then this is a
line, representing translational symmetry.
1 If a graph is a cycle graph, i.e., the nodes are
connected in a closed chain, then the probability of the graph being either equilateral triangle, square or regular hexagon is computed
(Fig.10(top row)). The probability is the product of ratios of polygon edges. Thus, if a graph
is constructed from the connection of three
(four, six) nodes, and the probability computed as a product of its edge ratios is higher
than by chance ( i.e., 0.5), the center of the
triangle (square, hexagon) is taken as a center
of three-fold (four-fold, six-fold) rotation.
Detecting implicit node relations. After defining symmetry centers, elimination of repeating
symmetry centers is performed. For example, if
from early connection group a point on a mask has
been marked as a center of four-fold rotation, and
the same point is again marked as four-fold rotation center from subsequent connection group, the
later one is discarded. This means that a symmetry
center of one type is obtained only from one connection group. However, the symmetry center of
one type may coincide with the symmetry centers
of other types. For example, the symmetry center
2 If the graph is acyclic then the nodes might
be related either by two-fold rotation (a graph
containing only two nodes) or glide reflection (a graph containing nodes connected in
a zigzag form) (Fig.10(bottom row)).
2a If the graph contains only two nodes, their
center is taken as the center of two-fold ro8
Figure 10: Examplar connections. Top row illustrates
cyclic graphs, while acyclic ones are shown at the bottom row. Equilateral triangles indicate three-fold rotations,
squares indicate four-fold rotations, and regular hexagons
indicate six-fold rotations. Two-point connections represent
two-fold rotations and zigzag structures indicate glide reflections.
(a)
(b)
(c)
(d)
Figure 11: Implicit node relations. (a) Double two-fold rotation centers, (b) triple two-fold rotation centers, (c) double
three-fold rotation centers, (d) double glide reflections.
marked as four-fold rotation center from some connection group, may also be the symmetry center
of two-fold rotation derived from some other connection group. A point in a mask may represent
multiple symmetry centers of the same type, if and
only if they are derived from the same connection
group. Thus, two three-fold rotation centers (double triangle) at the same point might occur only
when those are detected from the same connection
group. Such repetitions are used to detect implicit
node relations. If there is a double triangle at a
point, this indicates that there is a six-fold rotation
around that point. Similarly, if there is double twofold (triple two-fold) rotation center at the point
this is an indicator of four-fold (six-fold) rotation
around that point if the angle between two-point
lines is 90◦ (60◦ ). Double glide reflection axes represent reflection symmetry which is perpendicular
to the glide reflection axis. Samples of such connections are shown in Fig.11.
Another case is paired two-point connections (see
Fig.12). They too indicate reflection symmetry.
Actual two-fold centers lie at the centers of those
paired lines. Moreover, they are the indicators of reflection axis passing through two-fold rotation centers. The algorithm detects them by computing the
minimal distance between two-fold rotation centers
and connecting nodes that are in this minimal distance from each other. If a graph of maximal degree
four is obtained then these are actual two-fold rotation centers. However, if two-point connections
occur then these are paired two-fold rotation centers and are handled accordingly.
Figure 12: Samples for paired two-fold connections. The
actual two-fold rotational centers lie at the centers of paired
lines.
Refinement. Notice that up to now the symmetries for each mask are detected. After these steps,
the algorithm yields a mask structure which contains fields for various symmetry centers and their
classes. For example, if a mask contains three-fold
rotation centers, the structure contains their centers and classes. The class of symmetry element is
the number of connection group from which it was
extracted. Thus, all three-fold rotational centers
extracted from the same connection group are of
the same class. The next step is to collect all symmetries detected on individual masks. This is a necessary step, since each mask may contain only one
class of some symmetry type, while a whole pattern
contains more classes of that symmetry type. Initially, all symmetries of the same type are collected
without considering their classes. Say, the threefold rotation centers extracted from all masks are
marked on an ornament. Then for each center, the
algorithm defines which classes fall into that particular center. Thus, if three-fold rotation centers of
9
the first mask are of class 2, 5 for mask two and 3 for
mask three, the centers contain classes 2 and 5 (25),
2 and 3 (23), and, 5 and 3 (53). These numbers define the classes of the symmetry centers and they
are classified accordingly into three groups. This
example is illustrated in Fig.13. It might be the
case that the symmetry center is detected only for
one mask, and that center has not been detected for
another masks. Then this center forms a group on
its own, leading to fourth symmetry class. To eliminate such groups, the algorithm counts the number
of centers of each class, sorts them in ascending
order, computes the minimal distance between the
nodes in one class, and beginning with the largest
class propagates its group to the nodes that are of
similar distance. This is done iteratively, until no
changes occur.
Once all the symmetry types are combined and
(a)
(b)
(c)
(d)
roneously, two classes were detected, the class intersecting with the unit cell edges is left, the other
type is eliminated. If the maximal order of rotation
is six and there are more than one classes of threefold rotations, then the one intersecting with the
unit cell centers is left, and the others eliminated.
3.4. Final symmetry group detection
Individual cues in the form of symmetry elements as
described in the previous subsection are integrated
to yield the final symmetry group decision via a decision tree which we propose for the reduced set of
13 groups, The tree is shown in Fig. 14. Comparing
our tree to the classical decision tree in Fig. 5, observe that mirror reflection checks are postponed to
be performed at the last stage and their number is
significantly reduced. Furthermore, with the exception of two-fold rotations case, a mirror reflection
check is performed only when other cues indirectly
imply it. For example, if the maximal order of rotation is six and glide reflections or paired two-fold rotations are detected, then a mirror reflection check
is in order. If the probability of mirror reflection
is calculated to be more than 0.5 then the ornament is classified as belonging to p6m group and
else to p6 group. The reason has been explained
before in the Introduction section: An erroneously
detected mirror reflection is less desirable than a
missed one. In case of a missed mirror reflection,
the fundamental domain will just be twice as big as
it really should be, the half of it being the mirror
of the other half; hence, the whole pattern can be
correctly generated.
There is one exception: The case when two twofold classes are detected. In this case, there are two
possibilities. The first possibility is that the ornament is of group pgg. The second possibility is that
the ornament is a cmm pattern formed by all mirror symmetric protiles. In the latter case, the third
two-fold center for cmm is missed because it happens to be on the glide reflection axis and cannot
be captured from the connection graphs. Hence, a
cmm tile is classified as pgg due to a missed third
two-fold center. This is not tolerable because unlike p6m versus p6 or p4m versus p4, the mirror
reflection is not the only distinction between the
two groups of cmm and pgg, hence, the fundamental domain is not correct up to a mirror. For this
reason, in the case of two two-fold centers, the mirror reflection check is performed even if it is not
implied via indirect cues.
Figure 13: (a-c) An example of symmetries detected for
three masks of an ornament. For each mask one class of
three-fold rotation centers are detected. (d) when the symmetries of all three masks are collected, three classes of threefold rotation centers are obtained.
their classes are determined the maximal order of
rotation is defined. If no rotations are observed
then the maximal order of rotation is taken as 1
and it is checked whether the pattern contains glide
reflections. If no glide reflection observed then the
tile is of p1 group, i.e., contains only translational
symmetry. After defining the maximal order of rotation, further elimination is done using the symmetry group information. Thus, if the maximal
order of rotation is four or six then there can be
only one class of two-fold rotation centers. If, er10
Figure 14: Proposed decision tree.
Mirror Reflection. Mirror reflection checks are
performed on a single unit cell. Note that, in case
of rotational groups of three, four or six fold orders,
the unit cells of the regular and reflectional groups
are identical, the difference being in the fundamental domain. In the case of two-fold rotations, the
unit cell of the pgg group is employed. At any rate,
given a unit cell, all the objects lying in it are extracted using the masks of the ornament pattern.
Then the unit cell is divided into two along the expected reflection axis (based on group information).
For each object lying on both sides, the area (A),
the perimeter (P ), the distance of the object center
to the reflection axis (dRef ), the distance of the
farthest point on the object to the reflection axis
(fdRef) and the point on the reflection axis which
is the closest to the object center (pRef ) are computed. A pair of objects, one from the first part of
the unit cell (obj1) and the other from the second
(obj2), is picked. The probability of the first object
being a reflection symmetry of the second object
is estimated via the product of the corresponding
feature ratios:
prob =
Aobj1
Aobj2
∗
Pobj1
Pobj2
∗ exp(
∗
dRefobj1
dRefobj2
∗
mirror object on the other side. Then, the mean
of all the highest scores in the first part is taken
to indicate with what probability the unit cell is
symmetrical along the given reflection axis. Note
that there might be more than one reflection axes
for a given symmetry group. The final probability
is the mean value computed for all reflection axes.
Unit Cell. Recall that, in all rotational groups,
the corners of the units cells are the points of
maximal order of rotation. With the exception of
p4g and pgg, the unit cell is readily constructed by
connecting the nearest maximal rotation centers of
the same class. For the two groups, p4g and pgg,
however, the maximal rotational symmetry center
appearing on the unit cell corners also appears
on the unit cell center. Therefore, for the latter
two groups, a point pt of certain class is chosen,
then four closest points to pt of similar class are
selected. Among these four points pt1 and pt4 are
selected such that the length of (pt, pt1) equals
to the length of (pt, pt4) and are in opposing
directions. Then the rest two points pt3 and pt2
should also be at equal distance to the point pt
and be in opposing directions. If all points are
exhausted, the algorithm reports a failure.
f dRefobj1
f dRefobj2
−d(pRefobj1 ,pRefobj2 )
)
σ
In all experiments, σ = 10. For each object in
the first part, the above probability is computed
for all its pairs. The highest score is picked. It
indicates with what probability the object has a
If there are no rotations but glide reflections,
then the lattice nodes are centers of two-point
connections of the zigzag structure with similar
directions. To detect a unit cell, a point (pt1)
11
three-fold center (pt2) that is closest to the six-fold
center. A point pt3 is selected so that the length
(pt3, pt2) is equal to the length of (pt1, pt2) and
the angle between these two lines is 120◦ . If no
three-fold centers are found then two-fold centers
are searched. Then the two-fold center (p) closest
to the six-fold center is used to extract the rest of
the fundamental domain. In this case pt2 is a point
which is equal to d(pt1, p) and in opposing direction. This new point is actually a six-fold center.
Then pt3 is found using the first case where two
six-fold centers are known. If no other symmetries
detected except for one six-fold center then algorithm fails to detect the fundamental domain. Note
that it might be the case that two six-fold centers
are found in two different locations so that in between six-fold centers are missed by the algorithm.
In such cases the first case gives large fundamental
domain. If more than one type of symmetries detected so that more than one cases described above
hold, then the fundamental domain is computed for
all of the cases. The final fundamental domain is
the one with the smallest region.
This approach is extended to other symmetry
groups using their own properties.
of particular class is chosen as a first node for
unit cell. Then two closest points (pt2 and pt3)
to pt1 are chosen so that the angle between lines
(pt1, pt2) and (pt1, pt3) is less than or equal to 90◦
and bigger than or equal to 60◦ . The last point pt4
is chosen so that the angle between lines (pt4, pt2)
and (pt4, pt3) is equal to the angle between lines
(pt1, pt2) and (pt1, pt3), and the length of lines
(pt4, pt2) and (pt4, pt3) are equal to lines (pt1, pt3)
and (pt1, pt2), respectively. Recall that all lattice
nodes are of the same class. If no such points
detected, then another point is chosen as pt1 and
the same operations performed according to this
point. If all points have been exhausted, then the
algorithm reports a failure. If an ornament pattern
has neither rotations nor glide reflections then the
unit cell nodes are merely the motif centers.
Fundamental Domain. If the unit cell is successfully constructed, then the fundamental domain
extraction is straightforward, recall Fig. 3. For example, the fundamental domain for a p6 ornament
is 1/6th of its unit cell whereas it is 1/12th for a
p6m ornament. If, however, the algorithm reports a
failure during unit cell construction, then algorithm
returns to the stage before the attempt to construct
a unit cell to make use of all the previously collected
information on individual symmetries. (Note that
failure during unit cell construction may arise due
to lack of sufficient translational repetition.) Let us
explain the fundamental domain extraction step in
case of failure via an example.
Suppose only two centers of six-fold rotation (pt1,
pt2) are found, hence, the unit cell cannot be constructed. Assuming that this two centers are both
nodes of the same unit cell the distance rd between
these two points is computed. Since it is known
that the unit cell for ornaments with six-fold rotations is composed of two equilateral triangles, there
should be a three-fold center (pt3) which is in a
√
3rd distance from the both points.
In order to
√
detect pt3, two circles of radius 3rd centering at
pt1 and pt2 are drawn. There will be two points at
which this two circles intersect. Any one of them
can be selected as pt3. In this manner, three points
indicating nodes of a fundamental domain are computed. For the cases when more than two six-fold
rotations exist, two closest nodes are selected as pt1
and pt2. If, on the other hand, only one six-fold
rotation center (pt1) is found, then three-fold centers are searched. Then the fundamental domain is
extracted using the relation of six-fold center and
4. Experiments
4.1. Data
We formed a labelled ornament data set produced
under different imaging conditions by a variety of
ornament artists including the authors using iOrnament tool [44]. This set is enriched with 14 representative ornament fragments that are equivalent to
p1, p2,pg, pgg, p4, p4g, p3, p3m1, p31m if color permutations are ignored. The total number of ornaments in the set add up to 100. In forming the data
set, we paid attention to cover a variety of styles in
terms of brush, color, tone, and motif choice. We
further paid attention that half of the ornaments
are mimicking Escher’s style with asymmetric interlocking forms and the set contains enough representative elements in each of the 13 groups.
4.2. Parameters
For all 100 ornaments, identical parameter values
are used as detailed below.
Gamma correction. γ is set to 0.5.
12
Clustering. Nc is set to 10. For the refinement
stage, R is set to R = 0.3 ∗ maxR, where maxR is
the maximum radius of the connected components.
For the last two ornaments, respectively in pgg
and pg groups, the collected cues are not sufficient.
In each case, only one of the glide axes are detected.
Hence, these two cases are inconclusive. The reason
for the failure is that it is harder to detect glides in
the absence of sufficient repetition. As we demonstrate in later examples, detecting pg or pgg is possible when there are slightly more samples.
The rest of the results for the remaining 85 tiles
are organized as follows. (Note that the result for
one p6 ornament had been shown previously in the
Introduction.) To save space, 45 samples are placed
in the Appendix. They are split into three figures
each showing the results for 15 patterns. To be
illustrated in this section, 25 illustrative samples
from 8 groups of higher order rotations are selected.
The remaining 15 are selected from the remaining
5 groups. The patterns with higher order rotations
are further organized into two groups. The first one
contains the groups with triangular lattice structures (p6m, p6, p31m, p3m, p3); for these groups
the unit cell consists of two equilateral triangles.
The other contains the groups with square lattice
(p4m, p4g, p4). The results are respectively shown
in Figs. 16 and 17. Original ornaments are shown
in their full sizes whereas the ones depicting the results are cropped in order to make the symmetries,
unit cells and fundamental domains visible.
In all samples of the higher order rotation groups,
the symmetry groups are correctly identified, except up to mirror reflection in some samples. Because a p31m ornament has two three-fold rotation
centers, it is automatically classified correctly without a need for mirror reflection check. In our p6m
examples, the mirror reflections were implied as a
result of detected glides, so the flow in the decision
tree proceeded to mirror reflection check; hence, the
fundamental domains are correctly identified. The
fundamental domain for a p6m ornament is half the
size of a p6 one, and that of a p3m ornament is half
the size of a p3 one. This is because the other halves
can be obtained by mirror reflection. In our p3m
examples, the fundamental domains are double the
size they should be. This is because the samples
are classified as belonging to p3 as a consequence of
missed mirror reflections. Nevertheless, using the
generation the rules for the p3 group, instead of for
the p3m, the original tiles can still be recreated.
As for the two samples of p4m (Fig. 17), the first
one successfully passed the reflection double check
(implied via glides and then checked). But for the
second sample, the mirror reflection test is not per-
Connection extraction. The connectivity graph
is constructed using n = 5 iterations with tol = 5.
The bandwidth fed to mean shift for connection
group clustering is set to bc∗ = 2.
4.3. Results
We first present our result on 14 representative ornaments taken from Escher’s collection (Fig. 15).
For the first 12 out of 14 ornaments, depicted in
Fig. 15 (a) through (l), our method works successfully. In each group, (a) through (l), the first rows
show the original input. The second rows show the
detected symmetries, the unit cells and the fundamental domains superimposed on the input. The
third rows show the fundamental domains cut out
automatically from the original patterns. Unit cells
(in the forms as previously described in Fig. 3) are
shown by red quadrilaterals.
For illustration purposes, the region belonging to
the fundamental domain is made lighter while the
rest of the pattern is made slightly darker. In case
an ornament image is too small to fit a whole unit
cell in it, only the fundamental domain is shown.
Half of the cases (6 out of 12) are like this.
Notice that in some cases, (d)-(f), the letter m
of the group names are in red color. This is to indicate that our method in these three cases missed
the mirror reflection. For none of these three examples, mirror reflection checks at the last stage
are performed because indirect clues did not imply
mirror reflection. As a result, the fundamental domains are twice as big; though, the unit cells are
correct. Recall that in general mirror symmetry
can not cause any problems, since the centers of
the maximal order of rotations do not reside on the
centers of the respective protiles.
For the famous mariposas pattern (Fig. 15 (a))
only three three-fold rotation centers all from different classes are detected. For the second p4
tile (Fig. 15 (h)) only two four-fold rotation centers both from different classes are detected. Yet,
for both patterns we obtain enough information to
identify their symmetry groups and detect fundamental domains. The results in Fig. 15 (h)-(i) show
two-fold rotation centers that are detected in wrong
places. Nevertheless, since the symmetry group depends on the maximal rotation order, incorrect twofold centers do not influence final decision.
13
(a) p3
(b) p3
(c) p31m
(g) p4
(h) p4
(i) p4
(m)
(d) p3m
(j) p4g
(e) p3m
(k) p2
(f) p3m
(l) p1
(n)
Figure 15: Symmetries detected for ornaments painted by Escher. Observe that although most of the images are small and
have few repetitions of the symmetries, we are able to find the fundamental domains. Having insufficient repetition seems to
pose a problem only to two glide group ornaments shown in the last row. The letter m in the group names under the ornaments
are shown in red if the mirror reflection is missed. In those cases, the fundamental domains are double the sizes they should
be.
14
p6
p6
p6m
p6m
p6m
p3
p3
p3
p3
p3
p3m
p3m
p31m
p31m
p31m
Figure 16: Results for the ornaments with six- and three-fold rotations.
formed because indirect clues did not indicate its
existence. Hence, for this particular ornament of
the p4m group, the fundamental domain is double
the size that it should be. Similar to the previously
discussed cases of p3m ornaments, using the generation the rules for the p4 group, instead of for the
p4m, the original p4m pattern can still be recreated.
As for the p4g ornaments, their fundamental do-
mains are accurately identified. In this group of
ornaments, we observed that glide reflections are
easily detected, while for a human it is hard to perceive this type of symmetry. For an ornament to
be classified to p4g group it is enough to detect one
class of four-fold rotation centers. Hence, mirror
reflection check is unnecessary.
25 more results on tiles with higher order rota15
p4
p4
p4g
p4g
p4
p4g
p4m
p4m
p4g
p4g
Figure 17: Symmetries detected for ornaments with four-fold rotations.
p6m
p6m
p6m
p31m
p31m
p31m
p3m
p4m
p4m
p4g
p4g
p4g
p4g
p3m
p31m
p31m
p4m
p4m
Figure 18: Fundamental domains for ornaments with mirror reflections.
16
p3m
p4g
p4g
p2
p2
pgg
pgg
pg
pg
p2
pgg
pg
p2
p2
cmm
cmm
p1
p1
Figure 19: Sample results for ornaments in p2, pgg, cmm, pg, p1 groups.
tions are given in Appendix Figs. A1 and A2. There
are in total 50 ornaments out of 100 with higher
order rotations (excluding Escher ornaments), and
21 of them contain mirror reflections. The detected fundamental domains for these 21 ornaments
are given in Fig. 18. The fundamental domains
of the ornaments for which mirror reflections have
not been detected are framed in black boxes. Ob-
serve that for 5 ornaments, the mirror reflections
are missed. Hence, they are classified as belonging to the corresponding reflection-less groups, and
their fundamental domains are double the sizes they
should be.
Fig. 19 shows results for the samples of the remaining five symmetry groups with lower order rotations: p2, pgg, cmm, pg, p1. The first five orna17
ments belong to p2 group. This group of ornaments
contain four distinct classes of two-fold symmetry
centers. The second and the third groups respectively contain ornaments with two and three distinct classes of two-fold centers. Both of the groups
(pgg and cmm) have two distinct classes of glide
reflection axes perpendicular to each other. The
second sample of cmm group (yellow and purple
ornament) shows a case when the third class of the
two-fold centers is not detected. This is because we
employ two-point connections to indicate any binary connections, i.e., both the two-fold rotations
and the glide fragments forming zigzag structures.
In this particular cmm example, our algorithm detects zigzag structures and defines them as glide
reflection axes. During this process, however, our
algorithm loses track of the two-fold rotations that
are also indicated by the same two-point connections.
In general, we observe that when two-fold rotation centers lie on the glide axes and all the protiles are mirror symmetric (as in the case of the
present cmm sample), our algorithm loses track of
the one of the two-fold rotation centers. When one
of the two-fold rotation centers is lost, the symmetries of the cmm pattern becomes similar to the
symmetries of pgg one except for the mirror reflection symmetry: while the pgg group does not have
mirror reflections, the cmm group does. Thus, if
exactly two two-fold rotation centers detected, we
always need to perform mirror reflection check. For
the present cmm sample, checking for the mirror reflection identifies the correct group. We performed
further tests with 6 additional samples as presented
in the Appendix Fig. A3. With the help of mirror
reflection checks, our algorithm achieves pgg and
cmm separation.
Finally, the last row of Fig. 19 illustrates the results for ornaments without rotational symmetries.
If two distinct classes of glides which are all parallel to each other are detected, then the ornament
is classified as pg. For the p1 group, the group of
pure translation symmetry, the algorithm detects
all grids or lines indicating translations.
tiling, the pattern formed by repeating shapes. As
long as an ornament contains sufficient number of
motifs (protiles) that are either rotationally asymmetric, or strongly concave, or at least less symmetric than the higher order rotational symmetry of the
group, our method works. The asymmetry assumption is not a serious restriction. Even in cases where
all motifs are symmetric, as long as they do not all
centered at the corners of the translational unit,
the method still works. If all motifs are symmetric and centered at the corners of the translational
unit, our method can not determine the symmetry
group. Nevertheless, it is still possible to extract a
translational repetition lattice.
As a proof of concept, to show a range of ornaments for which our method works, we have compiled an ornament database of 100 images. In the
set, 14 of the ornaments are images painted by Escher. All of them are classics, such as the famous
Mariposas, Angles and Damons and Lizards. The
remaining 86 ornament images are constructed via
iOrnament software either by the authors or by several iOrnament artists.
Because we do not explicitly check for the existence of mirror symmetry, unless indirectly implied
by other clues, we sometimes miss mirror reflections. This causes for 3 groups (p6m, p4m, p3m)
to be classified as belonging to respective reflectionless groups of lower symmetry (p6, p4, p3). Nevertheless, since their fundamental domains (double the sizes they should be) contain mirror reflected copies, recreation of the original patterns using the generation rule of the respective reflectionless groups is possible. Indeed, this forms our motivation for postponing the hard mirror reflection
checks till they are implied by indirect clues, such
as glide reflections.
Acknowledgements
The work is funded by TUBITAK Grant 114E204.
References
[1] G. Polya, Über die analogie der kristallsymmetrie in
der ebene, Zeitschrift für Kristallographie 60 (1) (1924)
278–282.
[2] D. Schattschneider, The plane symmetry groups: their
recognition and notation, The American Mathematical
Monthly 85 (6) (1987) 439–450.
[3] D. K. Washburn, D. W. Crowe, Symmetries of culture:
theory and practice of plane pattern analysis, University of Washington Press, 1988.
5. Summary and Conclusion
We have presented a fully automated method to detect the symmetry group and extract fundamental
domains of ornaments belonging to 13 symmetry
groups. We have focused on ornaments where motifs do not hint the symmetries of the underling
18
[4] B. Grünbaum, Z. Grünbaum, G. C. Shepard, Symmetry
in Moorish and other ornaments, Computers and Mathematics with Applications 12 (3-4) (1986) 641–653.
[5] M. Senechal, Color symmetry, Computers and Mathematics with Applications 16 (5-8) (1988) 545–553.
[6] H. S. M. Coxeter, Coloured symmetry, in: M. C. Escher:
Art and Science, North-Holland, 1986, pp. 15–33.
[7] D. Schattschneider, M.C. Escher: Visions of Symmetry,
Thames & Hudson, 2004.
[8] Y. Liu, R. T. Collins, Y. Tsin, Gait sequence analysis using frieze patterns, in: European Conference on
Computer Vision, 2002, pp. 657–671.
[9] H. Y. T. Ngan, G. K. H. Pang, N. H. C. Yung, Motifbased defect detection for patterned fabric, Pattern
Recognition 41 (6) (2008) 1878–1894.
[10] V. Asha, P. Nagabhushan, N. U. Bhajantri, Automatic
extraction of texture-periodicity using superposition of
distance matching functions and their forward differences, Pattern Recognition Letters 33 (5) (2012) 629–
640.
[11] H. Y. T. Ngan, G. K. H. Pang, N. H. C. Yung, Ellipsoidal decision regions for motif-based patterned fabric defect detection, Pattern Recognition 43 (6) (2010)
2132–2144.
[12] C. Sun, J. Sherrah, 3D symmetry detection using the
extended Gaussian image, IEEE Transactions on Pattern Analysis and Machine Intelligence 19 (2) (1997)
164–169.
[13] C. Sun, D. Si, Fast reflectional symmetry detection using orientation histograms, Real-Time Imaging 5 (1)
(1999) 63–74.
[14] Y. Keller, Y. Shkolnisky, A signal processing approach
to symmetry detection, Transactions on Image Processing 15 (8) (2006) 2198–2207.
[15] G. Loy, J. Eklundh, Detecting symmetry and symmetric
constellations of features, in: European Conference on
Computer Vision, 2006, pp. 508–521.
[16] B. Prasad, V. S. N. amd Yegnanarayana, Finding axes
of symmetry from potential fields, IEEE Transactions
on Image Processing 13 (12) (2004) 1559–1566.
[17] V. S. N. Prasad, L. S. Davis, Detecting rotational symmetries, in: IEEE International Conference on Computer Vision, 2005, pp. 954–961.
[18] S. Lee, R. Collins, Y. Liu, Rotation symmetry group
detection via frequency analysis of frieze-expansions,
in: IEEE Conference on Computer Vision and Pattern
Recognition, 2008, pp. 1–8.
[19] S. Lee, Y. Liu, Skewed rotation symmetry group detection, IEEE Transactions on Pattern Analysis and Machine Intelligence 32 (9) (2010) 1659–1672.
[20] J. Liu, Y. Liu, Curved reflection symmetry detection
with self-validation, in: Asian Conference on Computer
Vision, 2010, pp. 102–114.
[21] S. Lee, Y. Liu, Curved glide-reflection symmetry detection, IEEE Transactions on Pattern Analylsis and
Machine Intelligence 34 (2) (2012) 266–278.
[22] J. Liu, Y. Liu, GRASP recurring patterns from a single
view, in: Computer Vision and Pattern Recognition,
2013, pp. 2003–2010.
[23] P. Doubek, J. Matas, Detection of 2D lattice patterns
of repetitive elements and their use for image retrieval,
Tech. Rep. CTU-CMP-2009-16, Department of Cybernetics, Czech Technical University (2009).
[24] P. Doubek, J. Matas, M. Perdoch, O. Chum, Image
matching and retrieval by repetitive patterns, in: Inter-
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
19
national Conference on Pattern Recognition, 2010, pp.
3195–3198.
A. Torii, J. Sivic, T. Pajdla, M. Okutomi, Visual place
recognition with repetitive structures, in: Computer Vision and Pattern Recognition, 2013, pp. 883–890.
J. Gao, Y. Hu, J. Liu, R. Yang, Unsupervised learning of higher-order structural semantics from images,
in: International Conference on Computer Vision, 2009,
pp. 2122–2129.
M. Park, R. T. Collins, Y. Liu, Deformed lattice discovery via efficient mean-shift belief propagation, in:
European Conference on Computer Vision, 2008, pp.
474–485.
M. Park, K. Brocklehurst, R. T. Collins, Y. Liu,
Deformed lattice detection in real-world images using mean-shift belief propagation, IEEE Transactions
on Pattern Analysis and Machine Intelligence 31 (10)
(2009) 1804–1816.
J. Han, S. J. Mckenna, Lattice estimation from images
of patterns that exhibit translational symmetry, Image
and Vision Computing 32 (1) (2014) 64–73.
Y. Liu, R. Collins, Frieze and wallpaper symmetry
groups classification under affine and perspective distortion, Tech. rep., Robotics Institute (1998).
Y. Liu, R. T. Collins, A computational model for repeated pattern perception using frieze and wallpaper
groups, in: Computer Vision and Pattern Recognition,
2000, pp. 537–544.
Y. Liu, R. Collins, Periodic pattern analysis under affine
distortions using wallpaper groups, in: International
Workshop on Algebraic Frames for the Perception Action Cycle, Springer-Verlag Belin, 2000, pp. 241 – 250.
Y. Liu, R. T. Collins, Y. Tsin, A computational model
for periodic pattern perception based on frieze and wallpaper groups, IEEE Transactions on Pattern Analysis
and Machine Intelligence 26 (3) (2004) 354–371.
Y. Liu, R. T. Collins, Skewed symmetry groups, in:
Computer Society Conference on Computer Vision and
Pattern Recognition, 2001, pp. 872–879.
F. Albert, J. M. Gomis, J. Blasco, J. M. Valiente,
N. Aleixos, A new method to analyse mosaics based on
Symmetry Group theory applied to Islamic Geometric
Patterns, Computer Vision and Image Understanding
130 (2015) 54–70.
A. El-Ouaazizi, A. Nasri, R. Benslimane, A rotation
symmetry group detection technique for the characterization of Islamic Rosette Patterns, Pattern Recognition
Letters 68 (P1) (2015) 111–117.
M. Agusti-Melchor, A. Rodas-Jorda, J. M. ValienteGonzalez, Computational framework for symmetry
classification of repetitive patterns, in: International
Conference on Computer Vision Theory and Applications, 2013, pp. 257–270.
M. Agusti-Melchor, J. M. Valiente-Gonzalez, A. RodasJorda, Lattice extraction based on symmetry analysis,
in: International Conference on Computer Vision Theory and Applications, 2008, pp. 396–402.
V. Adanova, S. Tari, Beyond symmetry groups: a
grouping study on Escher’s Euclidean ornaments,
Graphical Models 83 (C) (2016) 15–27.
C. S. Kaplan, D. H. Salesin, Escherization, in: Computer Graphics and Interactive Techniques, 2000, pp.
499–510.
M. von Gagern, J. Richter-Gebert, Hyperbolization of
Euclidean ornaments, The Electronic Journal of Com-
binatorics 16 (2) (2009) 1–29.
[42] J. Dijk, P. W. Verbeek, Lightness filtering in color images with respect to the gamut, in: European Conference on Color in Graphics, Imaging, and Vision, 2006,
pp. 330–335.
[43] K. Fukunaga, L. Hostetler, The estimation of the gradient of a density function, with applications in pattern
recognition, IEEE Transactions on Information Theory
(1975) 32–40.
[44] J. Richter-Gebert, Science-to-touch, http://www.
science-to-touch.com/en/index.html (2012).
Appendix
The Appendix contains the results for the 45 ornaments that are not included in the main sections of
the paper. They are organized according to their
symmetry groups and placed in three figures.
20
p6
p3
p3
p6
p6
p3
p3
p3
p3
p3
p3
p3
p3m
p31m
p31m
Figure A1: Remaining ornaments - 1
21
p4
p4
p4
p4
p4
p4
p4
p4m
p4m
p4g
p2
p2
p2
p2
p2
Figure A2: Remaining ornaments - 2
22
p2
pgg
pgg
pgg
pgg
cmm
cmm
pg
pg
pg
pg
p1
p1
p1
p1
Figure A3: Remaining ornaments - 3
23
| 1cs.CV
|
1
Distributed second order methods with variable
number of working nodes
arXiv:1709.01307v2 [cs.IT] 15 Dec 2017
Nataša Krklec Jerinkić, Dušan Jakovetić, Nataša Krejić, Dragana Bajović
Abstract—Recently, an idling mechanism has been introduced
in the context of distributed first order methods for minimization
of a sum of nodes’ local convex costs over a generic, connected
network. With the idling mechanism, each node i, at each
iteration k, is active – updates its solution estimate and exchanges
messages with its network neighborhood – with probability pk ,
and it stays idle with probability 1 − pk , while the activations
are independent both across nodes and across iterations. In
this paper, we demonstrate that the idling mechanism can be
successfully incorporated in distributed second order methods
also. Specifically, we apply the idling mechanism to the recently
proposed Distributed Quasi Newton method (DQN). We first
show theoretically that, when pk grows to one across iterations
in a controlled manner, DQN with idling exhibits very similar
theoretical convergence and convergence rates properties as
the standard DQN method, thus achieving the same order of
convergence rate (R-linear) as the standard DQN, but with
significantly cheaper updates. Simulation examples confirm the
benefits of incorporating the idling mechanism, demonstrate the
method’s flexibility with respect to the choice of the pk ’s, and
compare the proposed idling method with related algorithms
from the literature.
Index Terms—Distributed optimization, Variable sample
schemes, Second order methods, Newton-like methods, Linear
convergence.
I. I NTRODUCTION
Context and motivation. The problem of distributed minimization of a sum of nodes’ local costs across a (connected)
network has received a significant and growing interest in
the past decade, e.g., [1], [2], [3], [4]. Such problem arises
in various application domains, including wireless sensor
networks, e.g., [5], smart grid, e.g., [6], distributed control
applications, e.g., [7], etc.
In the recent paper [8], a class of novel distributed first
order methods has been proposed, motivated by the so-termed
“hybrid”
Pn methods in [9] for (centralized) minimization of a
sum
i=1 fi (x) of convex component functions. The main
idea underlying a hybrid method in [9] is that it is designed
as a combination of 1) an incremental or stochastic gradient
method (or, more generally, an incremental or stochastic
Newton-like method) and 2) a full (standard) gradient method
Part of results of this paper was presented at the IEEE Global Conference
on Signal and Information Processing (GlobalSIP), Washington, DC, VA,
USA, Dec. 2016. The work of first three authors is supported by the Serbian
Ministry of Education, Science, and Technological Development, Grant no.
174030. The first three authors are with the Department of Mathematics
and Informatics, Faculty of Sciences, University of Novi Sad, Trg Dositeja
Obradovića 4, 21000 Novi Sad, Serbia. The fourth author is with the
Department of Power, Electronics and Communication Engineering, Faculty
of Technical Sciences, University of Novi Sad, Trg Dositeja Obradovića
6, 21000 Novi Sad, Serbia. Authors’ emails: [email protected],
[email protected], [email protected], [email protected].
(or a standard Newton-like method); it behaves as the stochastic method at the initial algorithm stage, and as the standard
method at a later stage. An advantage of the hybrid method
is that it potentially inherits some favorable properties of
both incremental/stochastic and standard methods, while eliminating their important drawbacks. For example, the hybrid
exhibits fast convergence at initial iterations k while having
inexpensive updates, just like incremental/stochastic methods.
On the other hand, it eliminates the oscillatory behavior of
incremental methods around the solution for large k’s (because
for large k’s it behaves as a full/standard method). Hybrid
methods calculate a search direction at iteration k based on a
subset (sample) of the fi ’s, where the sample size is small
at the initial iterations (mimicking a stochastic/incremental
method), while it approaches the full sample n for large k’s
(essentially matching a full, standard method).
With distributed first order methods in [8], the sample size at
iteration k translates into the number of nodes that participate
in the distributed algorithm at k. More precisely, therein we
introduce an idling mechanism where each node in the network
at iteration k is active with probability pk and stays idle
with probability 1 − pk , where pk is nominally increasing
to one with k, while the activations are independent both
across nodes and through iterations. Reference [8] analyzes
convergence rates for a distributed gradient method with the
idling mechanism and demonstrates by simulation that idling
brings significant communication and computational savings.
Contributions. The purpose of this paper is to demonstrate
that the idling mechanism can be incorporated in distributed
second order, i.e., Newton-like methods also, by both 1)
establishing the corresponding convergence rate analytical
results, and 2) showing through simulation examples that
idling continues to bring significant efficiency improvements.
Specifically, we incorporate here the idling mechanism in the
Distributed Quasi Newton method (DQN) [10]. (The DQN
method has been proposed and analyzed in [10], only for the
scenario when all nodes are active at all times.) DQN and its
extension PMM-DQN are representative distributed second order methods that exhibit competitive performance with respect
to the current distributed second order alternatives, e.g., [4],
[11], [16].
Our main results are as follows. We first carry out a
theoretical analysis of the idling-DQN assuming that the fi ’s
are twice continuously differentiable with bounded Hessians.
We show that, as long as pk converges to one at least as fast
as 1 − 1/k 1+ζ (ζ > 0 arbitrarily small), the DQN method with
idling converges in the mean square sense and almost surely to
the same point as the standard DQN method that activates all
2
nodes at all times. Furthermore, when pk converges to one at a
geometric rate, then the DQN algorithm with idling converges
to its limit at a R-linear rate in the mean square sense.
Simulation examples demonstrate that idling can bring to DQN
significant improvements in computational and communication
efficiencies.
We further demonstrate by simulation significant flexibility
of the proposed idling mechanism in terms of tuning of the
activation sequence pk . The simulations show that the idlingDQN method is effective for scenarios when pk increases but
does not eventually converge to one (stays bounded away
from one), even when pk is kept constant across iterations.
The latter two cases are relevant in practice when, due to
node/link failures or asynchrony, the networked nodes do
not have a full control over designing the pk ’s, or when an
increasing sequence of the pk ’s may be difficult to implement.
We also compare by simulation the proposed idling-DQN
method with a very recent distributed second order method
with randomized nodes’ activations in [17]. With constant
activation probabilities, idling-DQN performs very similarly
to [17], while when the activation probabilities are tuned as
proposed here, idling-DQN performs favorably over [17].
From the technical side, extending the analysis of either
distributed gradient methods with idling [8] or DQN without
idling [10] to the scenario considered here is highly nontrivial.
With respect to the standard DQN (without idling), here we
need to cope with inexact variants of the DQN-type second
order search directions. With respect to gradient methods
with idling, showing boundedness of the sequence of iterates
and consequently bounding the “inexactness amounts” of
the search directions are considerably more challenging and
require a different approach.
Brief literature review. There has been a significant
progress in the development of distributed second order methods in past few years. Reference [4] proposes a method based
on a penalty-like interpretation [18] of the problem of interest,
by applying Taylor expansions of the Hessian of the involved
penalty function. In [11], the authors develop a distributed
version of the Newton-Raphson algorithm based on consensus
and time-scale separation principles. References [16] and [19]
propose distributed second order methods based on the alternating direction method of multipliers and the proximal
method of multipliers, respectively. References [20], [30]
develop distributed second order methods for the problem formulations that are related but different than what we consider
in this paper, namely they study network utility maximization
type problems. All the above works [4], [11], [10], [16], [19],
[20], [30] assume that all nodes are active across all iterations,
i.e., they are not concerned with designing nor analyzing
methods with randomized nodes’ activations.
More related with our work are papers that study distributed
first and second order methods with randomized nodes’ or
links’ activations. References [1], [21] consider distributed
first order methods with deterministically or randomly varying communication topologies. Reference [29] proposes a
distributed gossip-based first order method where only two
randomly picked nodes are active at each iteration. The authors
of [22], [23] carry out a comprehensive analysis of (first order)
diffusion methods, e.g., [2], under a very general model of
asynchrony in nodes’ local computations and communications.
Reference [24] proposes a proximal distributed first order
method that provably converges to the exact solution under
a very general model of asynchronous communication and
asynchronous computation. Other relevant works on first order
or alternating direction methods include, e.g., [26], [25].
The authors of [17] propose an asynchronous version of
the (second order) Network Newton method in [4], wherein
a randomly selected node becomes active at a time and
performs a Network Newton-type second order update. The
paper [12], see also [13], [14], proposes and analyzes an
asynchronous distributed quasi-Newton method that is based
on an asynchronous implementation of the BroydenFletcherGoldfarbShanno (BFGS) matrix update.
Among the works discussed above, perhaps the closest to
our randomized activation model are the models studied in,
e.g., [22], [23], [24], [12]. However, these works are still very
different from ours. While they are primarily concerned with
establishing convergence guarantees under various asynchrony
effects that are not in control of the networked nodes, our
aim here is to demonstrate that a carefully designed, nodecontrolled “sparsification” of the workload across network –
as inspired by work [9] from centralized optimization – can
yield significant savings in communication and computation.
Importantly, and as demonstrated in simulations here, significant savings can be achieved even when nodes have only a
partial control over the network-wide workload orchestration,
due to, e.g., asynchrony, link failures, etc.
Finally, in a companion paper [15], we presented a brief
preliminary version of the current paper, wherein a subset of
the results here are presented without proofs. Specifically, [15]
considers convergence of DQN with idling only when the
activation probabilities geometrically converge to one, while
here we also consider the scenarios where the activation
probability converges to one sub-linearly; we also include here
extensions where this parameter stays bounded away from one
or is kept constant (and less than one) across iterations.
Paper organization. Section 2 describes the model that
we assume and gives the necessary preliminaries. Section 3
presents the DQN algorithm with idling, while Section 4
analyzes its convergence and convergence rate. Section 5
considers DQN with idling in the presence of persisting idling,
i.e., it considers the extension when pk does not necessarily
converge to one. Section 6 provides numerical examples.
Finally, we conclude in Section 7.
II. M ODEL AND PRELIMINARIES
Subsection 2.1 gives preliminaries and explains the network
and optimization models that we assume. Subsection 2.2
briefly reviews the DQN algorithm proposed in [10].
A. Optimization–network model
We consider distributed optimization where n nodes in a
connected network solve the following unconstrained problem:
minx∈Rp f (x) =
n
X
i=1
fi (x).
(1)
3
Here, fi : Rp → R is a convex function known only by node i.
We impose the following assumptions on the fi ’s.
Assumption A1. Each function fi : Rp → R, i = 1, . . . , n
is twice continuously differentiable, and there exist constants
0 < µ ≤ L < ∞ such that for every x ∈ Rp
µI ∇2 fi (x) LI.
Here, I denotes the p × p identity matrix, and P Q
(where P and Q are symmetric matrices) means that Q − P is
positive semidefinite. Assumption A1 implies that each fi is
strongly convex with strong convexity parameter µ, and it also
has Lipschitz continuous gradient with Lipschitz constant L,
i.e., for all i = 1, ..., n, for every x, y ∈ Rp , there holds:
µ
fi (y) ≥ fi (x) + ∇fi (x)T (y − x) + kx − yk2
2
k∇fi (x) − ∇fi (y)k ≤ L kx − yk.
Here, notation k · k stands for the Euclidean norm of its vector
argument and the spectral norm of its matrix argument. Under
Assumption A1, problem (1) is solvable and has the unique
solution x∗ ∈ Rp .
Nodes i = 1, ..., n constitute an undirected network G =
(V, E), where V is the set of nodes and E is the set of
edges. Denote by m the total number of (undirected) edges (the
cardinality of E). The presence of edge {i, j} ∈ E means that
the nodes i and j can directly exchange messages through a
communication link. Further, let Oi be the set of all S
neighbors
of a node i (excluding i), and define also Ōi = Oi {i}.
Assumption A2. The network G = (V, E) is connected,
undirected and simple (no self-loops nor multiple links).
We associate with network G a n × n weight matrix that
has the following properties.
Assumption A3. Matrix W = W T ∈ Rn×n is stochastic,
with elements wij such that
wij > 0 if {i, j} ∈ E, wij = 0 if {i, j} ∈
/ E, i 6= j,
X
and wii = 1 −
wij ;
j∈Oi
further, there exist constants wmin and wmax such that for
i = 1, . . . , n, there holds:
0 < wmin ≤ wii ≤ wmax < 1.
np
p
Let x
∈ R , with xi ∈ R , and denote
by Z ∈ R
the Kronecker product of W and the identity
I ∈ Rp×p , Z = W ⊗ I.1 We will make use of the following
penalty reformulation of (1) [18]:
n
X
Wd
Z
Zd
= diag(W ), Wu = W − Wd
(3)
= Z(W ) = Zd + Zu , where
= Wd ⊗ I = diag(Z), and Zu = Wu ⊗ I.
(Here, diag(P ) is the diagonal matrix with the diagonal
elements equal to those of matrix P .)
Further, decompose the Hessian of Φ as:
∇2 Φ(x) = A(x) − G,
with A : R
np
→R
(np)×(np)
(4)
given by:
A(x) = α∇2 F (x) + (1 + θ)(I − Zd ),
(5)
G = G(Z, θ) = Zu + θ(I − Zd ),
(6)
and
for some θ ≥ 0.
We close this subsection with the following result that
will be needed in subsequent analysis. For claim (a), see
Lemma 3.1 in [28]; for claim (b), see, e.g., Lemma 4.2 in
[27].
Lemma II.1 Consider a deterministic sequence {ak } converging to zero, with ak > 0, k = 0, 1, ..., and let ν ∈ (0, 1).
(a) Then, there holds:
Denote by λ1 ≥ . . . ≥ λn the eigenvalues of W. Then,
we have that λ1 = 1, all the remaining eigenvalues of W
are strictly less than one in modulus, and the eigenvector that
corresponds to the unit eigenvalue is e := √1n (1, . . . , 1)T .
= (xT1 , . . . , xTn )T
np×np
Here, α > 0 is a constant that, as we will see ahead, plays
the role of a step size with the distributed algorithms that we
consider. The rationale behind introducing problem (2) and
function Φ is that they enable one to interpret the distributed
first order method in [1] to solve (1) as the (ordinary) gradient
method applied on Φ, which in turn facilitates the development
of second order methods;
[4], for details. Denote by
Tsee, e.g.,
x∗ = (x∗1 )T , ..., (x∗n )T
∈ Rnp the solution to (2), where
x∗i ∈ Rp , for all i = 1, ..., n. It can be shown that, for all
i = 1, ..., n, kx∗i − x∗ k = O(α), i.e., the distance from the
desired solution x∗ of (1) and x∗i is of the order
step size α,
Pof
n
e.g., [4]. Define also F : Rnp → R, F (x) = i=1 fi (xi ).
We study distributed second order algorithms to minimize
function Φ (and hence, find a near optimal solution of (1)).
Therein, the Hessian of function Φ and its splitting into a
diagonal and an off-diagonal part will play an important role.
Specifically, first consider the splitting:
1
minx∈Rnp Φ(x) := α
fi (xi ) + xT (I − Z)x.
2
i=1
(2)
1 Throughout, we shall use “blackboard bold” upper-case letters for matrices
of size (np) × (np) (e.g., Z), and standard upper-case letters for matrices of
size n × n or p × p (e.g., W ).
k
X
ν k−t at−1 → 0 as k → ∞.
(7)
t=1
(b) If, moreover, {ak } converges to zero R-linearly, then the
sum in (7) also converges to zero R-linearly.
B. Algorithm DQN
We will incorporate the idling mechanism in the algorithm
DQN proposed in [10]. The main idea behind DQN is to
approximate the Newton direction with respect to function Φ
in (2) in such a way that distributed implementation is possible,
while the error in approximating the Newton direction is not
large. For completeness, we now briefly review DQN. All
nodes are assumed to be synchronized according to a global
4
clock and perform in parallel iterations k = 0, 1, ... The algorithm maintains iterates xk = ( (xk1 )T , ..., (xkn )T )T ∈ Rnp ,
over iterations k = 0, 1, ..., where xki ∈ Rp plays the role of
the solution estimate of node i, i = 1, ..., n. DQN is presented
in Algorithm 1 below. Therein, Ak := A(xk ), where A(x)
is given in (5); also, notation k · k stands for the Euclidean
norm of its vector argument and spectral norm for its matrix
argument.
Algorithm 1: DQN in vector format
Given x0 ∈ Rnp , ε, ρ, θ, α > 0. Set k = 0.
(1) Chose a diagonal matrix Lk ∈ Rnp×np such that
Algorithm 2: DQN – distributed implementation
At each node i, require x0i ∈ Rp , ε, ρ, θ, α > 0.
(1) Initialization: Each node i sets k = 0 and x0i ∈ Rp .
(2) Each node i transmits xki to all its neighbors j ∈ Oi and
receives xkj from all j ∈ Oi .
(3) Each node i calculates
X
−1
α ∇fi (xki ) +
wij xki − xkj .
dki = Aki
j∈Oi
kLk k ≤ ρ.
(8)
k
sk = −(I − Lk G)A−1
k ∇Φ(x ).
(9)
(2) Set
(3) Set
xk+1 = xk + εsk , k = k + 1.
Lk and Ak . Similarly, Gij is the p × p block at the (i, j)-th
position of G.
(10)
We now briefly comment on the algorithm and the involved
parameters. DQN takes the step in the direction sk scaled
with a positive step size ε > 0; direction sk in (9) is an
approximation of the Newton direction
−1
skN = − ∇2 Φ(xk )
∇Φ(xk ).
Unlike Newton direction skN , direction sk admits an efficient
distributed implementation. Inequality (8) corresponds to a
safeguarding step that is needed to ensure that sk is a descent
direction with respect to function Φ; the nonnegative parameter
ρ controls the safeguarding (see [10] for details on how to set
ρ for a given problem). The diagonal matrix Lk controls the
off-diagonal part of the Hessian inverse approximation [10].
Various choices for Lk that are easy to implement and do
not induce large extra computational and communication costs
have been introduced in [10]. Possible and easy-to-implement
choices are Lk = 0 and Lk = −ρ I.
As it is usually the case with second order methods, step
size ε should be in general strictly smaller than one to ensure
global convergence. However, extensive numerical simulations
on quadratic and logistic losses demonstrate that both DQN
and DQN with idling converge globally with the full step size
ε = 1 and choices Lk = 0, and Lk = −I.
The remaining algorithm parameters are as follows. Quantity θ ≥ 0 controls the splitting (5); reference [10] shows
by simulation that it is usually beneficial to adopt a small
positive value of θ or θ = 0. Finally, α > 0 defines the penalty
function Φ in (2) and results in the following tradeoff in the
performance of DQN: a smaller value of α leads to a better
asymptotic accuracy of the algorithm, while it also slows down
the algorithm’s convergence rate. By asymptotic accuracy, we
assume here the distance between the point of convergence
of DQN x∗ (which is actually equal to the solution of (2) –
see [10]) and the solution x∗ of (1). (As noted before, the
corresponding distance is O(α) [4].)
In Algorithm 2, we present DQN from the perspective of
distributed implementation. Therein, we denote by Λki and Aki ,
respectively, the p×p block on the (i, i)-th position of matrices
(4) Each node i transmits dki to all its neighbors j ∈ Oi and
receives dkj from all j ∈ Oi .
(5) Each node i chooses a diagonal p × p matrix Λki , such
that kΛki k ≤ ρ.
(6) Each node i calculates:
X
ski = −dki + Λki
Gij dkj .
j∈Ōi
(7) Each node i updates its solution estimate as:
xk+1
= xki + ε ski .
i
(8) Set k = k + 1 and go to step 2.
Note that, when Λki ≡ 0, for all i, k, steps 4-6 are skipped,
and the algorithm involves a single communication round per
iteration, i.e., a single transmission of a p-dimensional vector
(step 2) by each node; when Λki ≡ −ρk I, ρk 6= 0, then two
communication rounds (steps 2 and 4) per k are involved.
III. A LGORITHM DQN WITH IDLING
Subsection 3.1 explains the idling mechanism, while Subsection 3.2 incorporates this mechanism in the DQN method.
A. Idling mechanism
We incorporate in DQN the following idling mechanism.
Each node i, at each iteration k, is active with probability pk ,
and it is inactive with probability 1−pk .2 Active nodes perform
updates of their solution estimates (xki )’s and participate in
each communication round of an iteration, while inactive
nodes do not perform any computations nor communications,
i.e., their solution estimates (xki )’s remain unchanged. Denote
by ξik the Bernoulli random variable that governs the activity
of node i at iteration k. Then,
we have that probability
P ξik = 1 = 1 − P ξik = 0 = pk , for all i. We furthermore
assume that ξik and ξj` are mutually independent over all i 6= j
and k 6= `. Throughout the paper, we impose the following
Assumption on sequence {pk }.
Assumption A4. Consider the sequence of activation probabilities {pk }. We assume that pk ≥ pmin , for all k, for some
pmin > 0. Further, {pk } is a non-decreasing sequence with
limk→∞ pk = 1. Moreover, we assume that
0 ≤ uk ≤
Cu
,
(k + 1)1+ζ
(11)
2 We continue to assume that all nodes are synchronized according to a
global iteration counter k = 0, 1, ...
5
where uk = 1 − pk , Cu is a positive constant and ζ > 0 is
arbitrarily small.
Assumption A4 means that, on average, an increasing number of nodes becomes involved in the optimization process;
that is, intuitively, in a sense the precision of the optimization
process increases with the increase of the iteration counter k.
(Extensions to the scenarios when pk does not necessarily
converge to one is provided in Section 5.) We also assume
that pk converges to one sufficiently fast, where sublinear
convergence 1 − 1/k 1+ζ is sufficient.
For future reference, we also define the diagonal (np)×(np)
(random) matrix Yk = diag(ξ1k , . . . , ξnk ) ⊗ I, where I is the
p × p identity matrix. Also, we define the p × p random matrix
k
k k
k
k
k
W
ij ] by wij = wij ξi ξj for i 6= j, and wii = 1 −
P = [w
k
k
k
i6=j wij . Further, we let Z := W ⊗ I, and, analogously to
(3) and (6), we let:
Wdk
(12)
Zk
= Z(W k ) = Zkd + Zku , where
Zkd
= Wdk ⊗ I = diag(Zk ), and Zku = Wuk ⊗ I.
Gk
= G(Zk , θ) = Zku + θ(I − Zkd ).
(13)
P
P
k
k k
Notice that wii = 1 − i6=j wij ξi ξj ≥ 1 − i6=j wij =
wii ≥ wmin . Further, recall A : Rnp → R(np)×(np) in (5).
Using results from [10], we obtain the following important
bounds:3
kA
(x)k
≤
(αµ + (1 + θ)(1 − wmax ))
:= CA , x ∈ R
k
kG k
Gk A−1 (x)
≤
Algorithm 3: DQN with idling – distributed implementation
At each node i, require x0i ∈ Rp , ε, ρ, θ, α > 0, {pk }.
(1) Initialization: Node i sets k = 0 and x0i ∈ Rp .
(2) Each node i generates ξik ; if ξik = 0, node i is idle, and
goes to step 9; else, if ξik = 1, node i is active and goes
to step 3; all active nodes do steps 3-8 below in parallel.
(3) (Active) node i transmits xki to all its active neighbors
j ∈ Oi and receives xkj from all active j ∈ Oi .
(4) Node i calculates
X
α
−1
k
dki = Aki
∇fi (xki ) +
wij
xki − xkj .
pk
j∈Oi
= diag(W k ), Wuk = W k − Wdk
−1
Aki is the p × p block at the (i, i)-th position in Ak , while Gkij
is the p × p block of Gk at the (i, j)-th position.
−1
(14)
np
(1 + θ)(1 − wmin )
:= CG , k = 0, 1, ...
(1 + θ)(1 − wmin )
≤
,
αµ + (1 + θ)(1 − wmin )
x ∈ Rnp , k = 0, 1, ...
(15)
(16)
More generally, for A(x) there holds:
(αµ + (1 + θ)(1 − wmax ))I A(x)
(αL + (1 + θ)(1 − wmin ))I, x ∈ Rnp .
(17)
Also, notice that kYk k ≤ 1, and Zk I, for every k.
B. DQN with idling
We now incorporate the idling mechanism in the DQN
method. To avoid notational
T clutter, we continue to denote by
the algorithm iterates, k = 0, 1, ...,
xk = (xk1 )T , ..., (xkn )T
where xki is node i’s estimate of the solution to (1) at
iteration k. DQN with idling operates as follows. If the
activation variable ξik = 1, node i performs an update; else, if
ξik = 0, node i stays idle and lets xk+1
= xki . The algorithm
i
is presented in Algorithm 3 below. Therein, Ak := A(xk ), and
3 Throughout subsequent analysis, we shall state several relations (equalities
and inequalities) that involve random variables. These relations hold either
surely (for every outcome), or in expectation. E.g., relation (15) holds surely.
It is clear from notation which of the two cases is in force. Also, auxiliary
constants that arise from the analysis will be frequently denoted by the capital
calligraphic letter C with a subscript that indicates a quantity related with the
constant in question; e.g., see CA in (14).
dki
(5) Node i transmits
to all its active neighbors j ∈ Oi
and receives dkj from all the active j ∈ Oi .
(6) Node i chooses a diagonal p × p matrix Λki , such that
kΛki k ≤ ρ.
(7) Node i calculates:
X
ski = −dki + Λki
Gkij dkj .
j∈Ōi
(8) Node i updates its solution estimate as:
xk+1
= xki + ε ski .
i
(9) Set k = k + 1 and go to step 2.
We make a few remarks on Algorithm 3. First, note that,
unlike Algorithm 2, the iterates xki with Algorithm 3 are
random variables. (The initial iterates x0i , i = 1, ..., n, in
Algorithm 3 are assumed deterministic.) Next, note that we
implicitly assume that all nodes have agreed beforehand on
scalar parameters ε, ρ, θ, α; this can actually be achieved in a
distributed way with a low communication and computational
overhead (see Subsection 4.2 in [10]). Nodes also agree
beforehand on the sequence of activation probabilities {pk }.
In other words, sequence {pk } is assumed to be available at all
nodes. For example, as discussed in more detail in Sections 4
and 6, we can let pk = 1−σ k+1 , k = 0, 1, ..., where σ ∈ (0, 1)
is a scalar parameter known by all nodes. As each node is
aware of the global iteration counter k, each node is then able
to implement the latter formula for pk . The nodes’ beforehand
agreement on σ can be achieved similarly to the agreement
on other parameters ε, ρ, θ, α [10]. Tuning of parameter σ is
discussed in Remark 3 further ahead.
Parameters , ρ, and α, and the diagonal matrices Λki play
the same role as in DQN. An important difference with respect
to standard DQN appears in step 4, where the local active
node i’s gradient contribution is pαk ∇fi (xki ) = pαk ξik ∇fi (xki ),
while with standard DQN this contribution equals α ∇fi (xki ).
Note that the division by pk for DQN with idling makes the
terms of the two algorithms balanced on average, because
E[ξik ] = pk .
Using notation (12), we represent DQN with idling in Algo
rithm 4 in a vector format. (Therein, Lk = diag Λk1 , ..., Λkn .)
6
controlled by the activation probability pk . In order to simplify
notation in the analysis, we introduce the following quantities:
Algorithm 4: DQN with idling in vector format
Given x0 ∈ Rnp , ε, ρ, θ, α > 0, {pk }. Set k = 0.
(1) Chose a diagonal matrix Lk ∈ Rnp×np such that
Hk
bk
H
kLk k ≤ ρ.
g
(2) Set
sk = −(I−Lk Gk ) A−1
k
α
Yk ∇F (xk ) + (I − Zk ) xk .
pk
(3) Set
xk+1 = xk + εsk , k = k + 1.
IV. C ONVERGENCE ANALYSIS
In this Section, we carry out convergence and convergence
rate analysis of DQN with idling. We have two main results,
Theorems IV.4 and IV.5. The former result states that, under
Assumptions A1-A4, DQN with idling converges to the solution x∗ of (2) in the mean square sense and almost surely.
We then show that, when activation probability pk converges
to one at a geometric rate, the mean square convergence
towards x∗ occurs at a R-linear rate. Therefore, the order of
convergence (R-linear rate) of the DQN method is preserved
despite the idling. We note that the above result does not
explicitly establish computational and communication savings
with respect to standard DQN. An explicit quantification of
these savings is very challenging even for distributed first
order methods [8], and even more so here. However, the
theoretical results in the current section are complemented
in Section 6 with numerical examples; they demonstrate that
communication and computational savings usually occur in
practice.
The analysis is organized as follows. In Subsection 4.1, we
relate the search direction of DQN with idling and the search
direction of DQN, where the former is viewed as an inexact
version of the latter. Subsection 4.2 establishes the mean
square boundedness of the iterates of DQN with idling and its
implications on the “inexactness” of search directions. Finally,
Subsection 4.3 makes use of the results in Subsections 4.1
and 4.2 to prove the main results on the convergence and
convergence rate of DQN with idling.
A. Quantifying inexactness of search directions
We now analyze how “inexact” is the search direction of the
DQN with idling with respect to the search direction of the
standard DQN. For xk the iterate of DQN with idling, denote
by ŝk the search direction as with the standard DQN evaluated
at xk , i.e.:
k
k
ŝk = −(I − Lk G)A−1
k (α∇F (x ) + (I − Z)x ).
(18)
Then, the search direction sk of DQN with idling can be
viewed as an approximation, i.e., an inexact version, of ŝk .
We will show ahead that the error of this approximation is
k
ĝ k
= I − Lk Gk
= I − Lk G
α
= A−1
Yk ∇F (xk ) + (I − Zk )xk )
k (
pk
k
k
= A−1
k (α∇F (x ) + (I − Z)x ).
b k ĝ k and sk = −Hk g k . Notice that
Therefore, ŝk = −H
k
b k.
kH k ≤ 1 + ρCG := CH and that the same is true for H
We have the following result on the error in approximating ŝk
with sk . In the following, we denote by either ai or [a]i the
i-th p × 1 block of a (np)-dimensional vector a; for example,
we write gik for the i-th p-dimensional block of g k .
In the following Theorem, claims (20) and (21) are from
Theorem 3.2 in [10]; claim (19) is a straightforward generalization of (20), mimicking the proof steps of Theorem 3.2
in [10]; hence, proof details are omitted.
Theorem IV.1 [10] Let assumptions A1-A3 hold. Further, let,
ρ ∈ [0, ρDQN ] where
αµ + (1 + θ)(1 − wmax )
ρDQN =
(1 − wmin )(1 + θ)
1
×
−δ ,
αL + (1 + θ)(1 − wmin )
for some constant δ ∈ (0, 1/(αL + (1 + θ)(1 − wmin ))).
b
b k −1
Consider random matrices Rk := Hk A−1
k and Rk := H Ak .
Then, there holds:
Rk + RTk
λmin
≥ δ
(19)
2
!
bk + R
bT
R
k
λmin
≥ δ,
(20)
2
where λmin (·) denotes the minimal eigenvalue. Moreover,
quantity ŝk in (18) satisfies the following bounds:
∇T Φ(xk )ŝk ≤ −δk∇Φ(xk )k2 and kŝk k ≤ βk∇Φ(xk )k,
(21)
1+ρ(1+θ)(1−wmin )
.
where constant β = αµ+(1+θ)(1−w
max )
Moreover, it was shown in [10] that δ < β, which we use
in the proof of the subsequent result. Furthermore, using the
Mean value theorem and Lipschitz continuity of ∇Φ we obtain
(see the proof of Theorem 3.3 in [10] for instance):
Φ xk + ε sk − Φ(x∗ ) ≤ Φ(xk )
(22)
1
−Φ(x∗ ) + ε2 LΦ ksk k2 + ε∇T Φ(xk )sk , (23)
2
∗
where we recall that x is the (unique) solution of (2) and
LΦ is a Lipschitz gradient continuity parameter of Φ, which
equals LΦ = αL + 2(1 − wmin ). Next, we prove that DQN
with idling exhibits a kind of nonmonotone behavior where the
“nonmonotonicity” term depends on the difference between
the search directions sk and ŝk .
7
Theorem IV.2 Let assumptions A1-A3 hold, ρ ∈ [0, ρDQN ]
and ε ≤ εDQN , where
εDQN =
δ−q
,
2LΦ (β 2 + q 2 )
q ∈ (0, δ).
(24)
comes from the fact that ϕ̂(ε) ≤ ϕ(ε) for every ε > 0.
Finally, taking into account both cases and the fact that ek is
nonnegative, we conclude that the following inequality holds
with ν(ε) ∈ (0, 1) for all ε ∈ (0, εDQN ]
Φ(xk+1 ) − Φ(x∗ ) ≤ (Φ(xk ) − Φ(x∗ ))ν(ε) + ek .
Then
2
Φ(xk+1 ) − Φ(x∗ ) ≤ (Φ(xk ) − Φ(x∗ ))ν(ε) + ek ,
where ν(ε) ∈ (0, 1) is a constant, and ek = (ε2 LΦ +ε/q)ksk −
ŝk k2 .
Proof. We start by considering sk in (22) and using the bounds
from Theorem IV.1, i.e.:
Φ(xk+1 ) − Φ(x∗ ) ≤ Φ(xk ) − Φ(x∗ )
1 2
+
ε LΦ ksk ± ŝk k2 + ε∇T Φ(xk )(sk ± ŝk )
2
≤ Φ(xk ) − Φ(x∗ ) + ε2 LΦ ksk − ŝk k2 + ε2 LΦ kŝk k2 +
+
ε∇T Φ(xk )(sk − ŝk ) + ε∇T Φ(xk )ŝk
≤
Φ(xk ) − Φ(x∗ ) + ε2 LΦ ksk − ŝk k2
+
ε2 LΦ β 2 k∇Φ(xk )k2 +
+
εk∇Φ(xk )kk(sk − ŝk )k − εδk∇Φ(xk )k2
(25)
We distinguish two cases. First, assume that ksk − ŝk k ≤
qk∇Φ(xk )k. In this case, (25) implies that
Φ(xk+1 ) − Φ(x∗ ) ≤ Φ(xk ) − Φ(x∗ ) + ϕ(ε)k∇Φ(xk )k2
where ϕ(ε) = ε2 LΦ (β 2 + q 2 ) − ε(δ − q). Notice that ϕ is
convex, ϕ(0) = 0 and it attains its minimum at εDQN given in
(24) with ϕ(εDQN ) = −((δ − q)2 )/(4LΦ (β 2 + q 2 )). This also
implies that ϕ(ε) is negative for all ε ∈ (0, εDQN ]. Moreover,
Φ is strongly convex and there holds Φ(xk ) − Φ(x∗ ) ≤
1
k 2
where µΦ = αµ is the strong convexity
µΦ k∇Φ(x )k
parameter. Putting all together we obtain
Φ(xk+1 ) − Φ(x∗ ) ≤ (Φ(xk ) − Φ(x∗ ))ν(ε)
(26)
where ν(ε) = 1 + µΦ ϕ(ε). Notice that ν(ε) < 1 for all ε ∈
(0, εDQN ]. Moreover,
ν(ε) ≥ 1 + µΦ ϕ(εDQN ) = 1 −
µΦ (δ − q)2
.
4LΦ (β 2 + q 2 )
2
2
B. Mean square boundedness of the iterates and search directions
We next show that the iterates xk of DQN with idling are
uniformly bounded in the mean square sense. Below, E(·)
denotes the expectation operator.
Lemma IV.1 Let the sequence of random variables {xk } be
generated by Algorithm 4, and let assumptions A1-A4 hold.
Then, there exist positive constants ρ and ε depending on
α, µ, L, θ, wmin , wmax and pmin , such
that, for all ρ ∈ [0, ρ]
and ε ∈ (0, ε], there holds: E kxk k2 ≤ Cx , k = 0, 1, ..., for
some positive constant Cx .
Proof. It suffices to prove that E Φ(xk ) is uniformly
bounded for all k = 0, 1, ..., since Φ is strongly convex and
therefore it holds that Φ(x) ≥ Φ(x∗ )+ µ2Φ kx−x∗ k2 , x ∈ Rnp .
Further, for the sake of proving boundedness, without loss of
generality we can assume that fi (x) ≥ 0, for all x ∈ Rp ,
for every i = 1, ..., n.4 For k = 0, 1, ..., define function
Φk : Rnp → R, by
n
α
α X
1
F (x) + xT (I − Z)x =
fi (xi )
pk
2
pk i=1
X
wij kxi − xj k2 .
Φk (x) =
+
1
2
{i,j}∈E,i<j
Notice that Φk (x) = Φ(x), x ∈ Rnp , if pk = 1. Also note
that, for every k = 0, 1, ..., we have:
Φ(x) ≤ Φk+1 (x) ≤ Φk (x) ≤ Φ0 (x),
2
As µΦ = αµ < αL < LΦ and (δ − q) < δ < β <
β 2 + q 2 we conclude that ν(ε) is positive. Therefore, for all
ε ∈ (0, εDQN ], (26) holds with ν(ε) ∈ (0, 1).
Now, assume that ksk − ŝk k > qk∇Φ(xk )k, i.e.
k∇Φ(xk )k < ksk − ŝk k/q. Together with (25), this implies
Φ(xk+1 ) − Φ(x∗ ) ≤ Φ(xk ) − Φ(x∗ ) + ϕ̂(ε)k∇Φ(xk )k2 + ek
(27)
where ϕ̂(ε) = ε2 LΦ β 2 −εδ and ek = (ε2 LΦ +ε/q)ksk −ŝk k2 .
The function ϕ̂ has similar characteristics as ϕ and it retains
its minimum at ε0 = δ/(2LΦ β 2 ) with ϕ̂(ε0 ) = −δ 2 /(4LΦ β 2 ).
Since εDQN ≤ ε0 , ϕ̂(ε) < 0 holds for all ε ∈ (0, εDQN ].
Again, strong convexity of Φ and (27) imply that for all ε ∈
(0, εDQN ]
since pk is assumed to be non-decreasing.
The core of the
proof isto upper bound Φk+1 xk+1 with a quantity involving
Φk xk (see ahead (34)), and after that to “unwind” the
resulting recursion.
To start, notice that Φk is strongly convex and has Lipschitz
continuous gradient for every k. More precisely, for every k =
0, 1, ..., and for every x ∈ Rnp , we have that
µ̄I ∇2 Φk (x) L̄I,
where µ̄ = αµ and L̄ = αL/pmin + 1. Denote by
α
yk = ∇Φk (xk ) =
∇F (xk ) + (I − Z) xk .
pk
Φ(xk+1 ) − Φ(x∗ ) ≤ (Φ(xk )
−Φ(x∗ ))(1 + µΦ ϕ̂(ε)) + ek ≤ (Φ(xk ) − Φ(x∗ ))ν(ε) + ek ,
where we recall µΦ = αµ, and where the last inequality
4 Otherwise,
since each of the fi ’s is lower bounded, we can re-define
each fi as fbi (x) = fi (x) + c, where c is a constant larger than or equal
maxi=1,...,n |inf x∈Rp fi (x)|, and work with the fbi ’s throughout the proof.
8
Further, let us define two more auxiliary maps, as follows. Let
b k : Rnp × {0, 1}m → R, and Φ
e k : Rnp × {0, 1}m → R, be
Φ
given by:
b k (x; ξ)
Φ
e k (x; ξ)
Φ
=
α
pk
+
1
2
n
X
1
2
k
b k is strongly convex (with respect to x)
If ξmax
= 1 then Φ
with the same parameters as Φk , i.e.,
b k (x) L̄I.
µ̄I ∇2 Φ
X
b k with respect
wij ξi ξj kxi − xj k2Now, denote by x̂∗k = x̂∗k (ξ k ) the minimizer of Φ
b k is nonnegative, and that it has
i=1
{i,j}∈E,i<j
to x; using the fact that Φ
n
a
Lipschitz
continuous
gradient
and is strongly convex, we
X
b k (x) = α
= Φk (x) − Φ
(1 − ξi )fi (xi )
obtain
p
ξi fi (xi ) +
k i=1
X
2
wij (1 − ξi ξj )kxi − xj k ,
{i,j}∈E,i<j
where {0, 1}m denotes the set of all m-dimensional vectors
with the entries from set {0, 1}. Introduce also the short-hand
notation
n
X
b k (x) = Φ
b k (x; ξ k ) = α
Φ
ξ k fi (xi )
pk i=1 i
X
1
wij ξik ξjk kxi − xj k2
+
2
kb
yk k2 ≤ L̄2 kxk −x̂∗k k2 ≤
2
2L̄2 b
b k (x̂∗ )) ≤ 2L̄ Φ
b k (xk ).
(Φk (xk )−Φ
k
µ̄
µ̄
b k (x) ≤ Φk (x), for all x, the previous
Using the fact that Φ
inequality yields
q
p
kb
yk k ≤ L̄ 2/µ̄ Φk (xk ).
(28)
k
On the other hand, if ξmax
= 0 then Yk = 0 and Zk = I
which implies ybk = 0 and the previous inequality obviously
holds.
{i,j}∈E,i<j
e k (x)
Φ
e k (x; ξ k ) = Φk (x) − Φ
b k (x)
= Φ
n
α X
=
(1 − ξik )fi (xi )
pk i=1
X
1
+
wij (1 − ξik ξjk )kxi − xj k2 ,
2
{i,j}∈E,i<j
where we recall that ξ k = (ξ1k , ..., ξnk )T is the node activation
vector at iteration k. Hence, note that, for any fixed x ∈ Rnp ,
b k (x) is a random variable, measurable with respect to the
Φ
σ-algebra generated by ξ k . On the other hand, for any fixed
b k (x) is a (deterministic)
value that variable ξ k takes, x 7→ Φ
function, mapping Rnp to R; analogous observations hold for
b k (xk ), Φ
e k (xk )
Φ̂k as well. We will be interested in quantities Φ
k+1
k+1
b k (x
e k (x
Φ
), and Φ
). Note that they are all random
variables, measurable with respect to the σ-algebra generated
bk
by {ξ s }s=0,1,...,k . We will also work with the gradients of Φ
e k with respect to x, evaluated at xk , that we denote by
and Φ
b k (xk ) =
ybk = ∇Φ
α
Yk ∇F (xk ) + (I − Zk )xk
pk
and
e k (xk ).
ỹk = yk − ybk = ∇Φ
These quantities are also valid random variables, measurable
with respect to the σ-algebra generated by {ξ s }s=0,1,...,k .
Now, recall that, for each fixed i, ξik , k = 0, 1, ..., are
independent identically distributed (i.i.d.) Bernoulli random
variables. The same is true for the minimum and the maximum
k
ξmin
= min ξik ,
i=1,...,n
k
ξmax
= max ξik .
i=1,...,n
k
Also, notice that E(ξmin
) = pnk and
q
k
k
k
1 − ξmin
= 1 − ξmin
, 1 − ξik ≤ 1 − ξmin
,
e k and ỹk . First,
We perform a similar analysis considering Φ
k
e
notice that Φk is also non-negative. Furthermore, if ξmin
=0
e
bk
then Φk is strongly convex with the same parameters as Φ
and the following holds
q
p
e k (xk ).
kỹk k ≤ L̄ 2/µ̄ Φ
Moreover, notice that
e k (xk ) ≤ (1 − ξ k )Φk (xk )
Φ
min
and thus
q
p
k
)Φk (xk )
kỹk k ≤ L̄ 2/µ̄ (1 − ξmin
q
p
k
= (1 − ξmin
)L̄ 2/µ̄ Φk (xk ).
(29)
(30)
Let us return to Φk . This function also satisfies (22), i.e.,
1
Φk xk + ε sk ≤ Φk (xk ) + ε2 L̄ksk k2 + εykT sk . (31)
2
For the search direction sk in step 2 of Algorithm 4, and
recalling Rk = (I−Lk Gk ) A−1
k from Theorem IV.1, we obtain
that
sk = −Rk ybk .
Using the bounds (14) and (15) we conclude that kRk k ≤
(1 + ρCG )CA := CR and therefore
ksk k ≤ CR kb
yk k.
(32)
Also, by Theorem IV.1, the following holds for ε ≤ εDQN , and
ρ ≤ ρDQN (where ρDQN and εDQN are given in Theorems
IV.1 and IV.2, respectively):
Rk + RTk
T
T
ybk Rk ybk = ybk
ybk ≥ δkb
yk k 2 .
(33)
2
k
1 − ξik ξjk ≤ 1 − ξmin
.
b k and ybk , regarded as functions of x ∈ Rnp .
Consider now Φ
From now on, we assume that ε ≤ εDQN , and ρ ≤ ρDQN .
9
the following inequality holds for every k and some positive
constant Cs :
1
Φk (xk+1 ) ≤ Φk (xk ) + ε2 L̄R2 kb
yk k2 − ε(b
yk + ỹk )T Rk ybk
2
E(ksk − ŝk k2 ) ≤ (1 − pk )Cs .
(39)
1
k
2
2
2
≤ Φk (x ) + ε L̄R kb
yk k
(34)
2
Proof.
2
− εδkb
yk k + εCR kb
yk kkỹk k
We first split the error as follows:
1 2 2
k
= Φk (x ) + ( ε L̄CR
E ksk − ŝk k2
2
b k ĝ k + H
b k gk − H
b k g k k2
− εδ)kb
yk k2 + εCR kb
yk kkỹk k
(35)
= E kHk g k − H
2δ
2
− εδ) ≤ 0 for ε ≤ L̄C
Since ( 12 ε2 L̄CR
2 , we conclude that
b k )g k k2
b k k2 k(g k − ĝ k )k2 + E k(Hk − H
≤ 2 E kH
R
Φk (xk+1 ) ≤ Φk (xk ) + εCR kb
yk kkỹk k
≤ 2 (CH )2 E k(ĝ k − g k )k2
2
2εL̄CR
k
b k )g k k2 .
(40)
+E k(Hk − H
≤ Φk (xk ) +
(1 − ξmin
)Φk (xk ),
µ̄
We will estimate the expectations above separately. Start by
for
2δ
observing that:
(36)
, εDQN , ρ ≤ ρDQN ,
ε ≤ min
2
L̄CR
X
wij (xki − xkj )
ĝik − gik = −(Aki )−1 α∇fi (xki ) +
where εDQN and ρDQN are given in Theorems IV.1 and IV.2.
Substituting (32) and (33) into (31) we obtain
2εL̄C 2
j∈Oi
R
Denoting B =
µ̄ , and using the fact that Φk+1 (x) ≤
np
Φk (x), for all x ∈ R , we obtain
k
Φk+1 (xk+1 ) ≤ (1 + B(1 − ξmin
))Φk (xk ).
X
α
+ ξik (Aki )−1 ∇fi (xki ) +
wij ξjk (xki − xkj )
pk
(37)
j∈Oi
ξk
= ( i − 1)α(Aki )−1 ∇fi (xki )
pk
X
+ (Aki )−1
wij (ξik ξjk − 1)(xki − xkj ).
Applying expectation we obtain
E(Φk+1 (xk+1 )) ≤ (1 + B(1 − pnk ))E(Φk (xk )),
k
where we use independence between ξmin
and xk . Furthermore, recall that uk = 1 − pk and notice that 1 − pnk ≤ nuk .
Moreover, 1 + t ≤ et for t > 0 and thus
ξk
Next, by unwinding the recursion, we obtain
Pk−1
j=0
uj
ξk
Notice that (14) implies k( pik − 1)α(Aki )−1 ∇fi (xki )k2 ≤
2( pik −1)2 α2 (CA )2 k∇fi (xki )k2 , with CA defined in (14). Also,
the assumptions on the wij ’s (Assumption A3) and convexity
of the scalar quadratic function V(µ) = µ2 yield:
E(Φk+1 (xk+1 )) ≤ enBuk E(Φk (xk )).
E(Φk (xk )) ≤ enB
j∈Oi
Φ0 (x0 ) := CΦ,2 .
2
X
By assumption, {uk } is summable, and since Φ(x) ≤ Φk (x),
for all x, we conclude that
j∈Oi
2
E(Φ(xk )) ≤ CΦ,2 .
≤
Finally, since Φ is strongly convex, the desired result holds.
2
Notice that an immediate consequence of Lemma IV.1 is
that the gradients are uniformly bounded in the mean square
sense. Indeed,
E k∇F (xk )k2
= E k∇F (xk ) − ∇F (x̃∗ )k2
≤ E L2 kxk − x̃∗ k2
≤ 2L2 (E kxk k2 + kx̃∗ k2 )
≤ 2L2 (Cx + kx̃∗ k2 ) := CF ,
wij (ξik ξjk − 1)(xki − xkj )
(38)
where we recall Cx in Lemma IV.1.
Next, we show that the “inexactness” of the search directions of DQN with idling are “controlled” by the activation
probabilities pk ’s.
Theorem IV.3 Let assumptions A1-A4 hold, and consider ρ
and ε as in Lemma IV.1. Then, for all ρ ∈ [0, ρ] and ε ∈ (0, ε],
X
wij (1 − ξik ξjk )kxki − xkj k
j∈Oi
≤
X
wij (1 − ξik ξjk )2 kxki − xkj k2 .
j∈Oi
Therefore,
ξk
kĝik − gik k2 ≤ 2( i − 1)2 α2 (CA )2 k∇fi (xki )k2
pk
X
2
+2(CA )
wij (1 − ξik ξjk )2 kxki − xkj k2 .
j∈Oi
Applying the expectation and using the fact that ξik ’s are
independent, identically distributed (i.i.d.) across i and across
iterations, the fact that
E((
ξik
− 1)2 ) = (1 − pk )/pk ≤ (1 − pk )/pmin ,
pk
and
E((1 − ξik ξjk )2 ) = 1 − p2k = (1 − pk )(1 + pk ) ≤ 2(1 − pk )
10
we obtain the following inequality
Moreover,
2
α
E(kĝik − gik k2 ) ≤ 2(CA )2 (1 − pk )(
E(k∇fi (xki )k2 )
pmin
X
wij E(kxki − xkj k2 )).
+2
E(kg k k2 )
j∈Oi
Pn
k
k 2
Further, note that E(kĝ k − g k k2 ) =
i=1 E(kĝi − gi k ).
Moreover,
as
a
consequence
of
Lemma
IV.1
we
have
Pn
k 2
k 2
E(k∇f
(x
)k
)
=
E(k∇F
(x
)k
)
≤
C
,
and
i i
F
i=1
n X
X
i=1 j∈Oi
n X
X
≤
and thus
wij E(kxki
−
xkj k2 )
b k )g k k2 ) ≤ (1 − pk )ρ2 4(1 + θ2 )Cg,2 .
E(k(Hk − H
Finally, returning to (40), the previous inequality and (42)
imply
E ksk − ŝk k2 ≤ (1−pk )2((CH )2 Cg +ρ2 Cg,2 ) := (1−pk )Cs .
wij 2 E(kxki k2 + kxkj k2 )
i=1 j∈Oi
n
X
=
α
Yk ∇F (xk ) + (I − Zk )xk )k2 )
pk
α2
≤ (CA )2 2( 2 E(kYk k2 )E(k∇F (xk )k2 )
pmin
+ E(kI − Zk k2 )E(kxk k2 )) )
α2
(44)
≤ (CA )2 2( 2 CF + Cx ) := Cg,2
pmin
= E(kA−1
k (
2(E(
kxki k2
i=1
k 2
X
wij ) + E(
X
kxkj k2
j∈Oi
j∈Oi
k 2
n
X
wij ))
i=1
2
≤ 2(E(kx k + E(kx k ))
≤ 4Cx ,
(41)
C. Main results
The next result – first main result – follows from the
theorems stated above. Let us define constants ρidl =
min{ρ, ρDQN } and εidl = min{ε, εDQN } where ρ and ε are
2
k
k 2
2 α
E(kĝ −g k ) ≤ (1−pk )2(CA ) (
CF +8Cx ) := (1−pk )Cg . as in Theorem IV.3 and ρDQN and εDQN are as in Theorem
pmin
(42) IV.2.
Now, we will estimate the second expectation term in (40).
Again, consider an arbitrary block i of the vector under Theorem IV.4 Let {xk } be the sequence of random variables
expectation. We obtain the following:
generated by Algorithm 4. Further, let assumptions A1-A4
hold. In addition, let ρ ∈ [0, ρidl ] and ε ∈ (0, εidl ]. Then:
k
k k
k k
b
[(H − H )g ]i = [Lk (G − G )g ]i
E Φ(xk+1 ) − Φ(x∗ ) ≤ E Φ(xk ) − Φ(x∗ ) ν + CΦ (1 − pk ),
= [Lk (Zu − Zku + θ(Zkd − Zd ))g k ]i
X
(45)
k
k
= Λki
(wij − wij
)gjk + Λki θ(wii
− wii )gik
where ν ∈ (0, 1) is a constant, and CΦ is a positive constant.
j∈Oi
Moreover, the iterate sequence {xk } converges to the soluX
X
k
k k k
k
k
k
= Λi
wij (1 − ξi ξj )gj + Λi θ
(wij − wij )gi
tion x∗ of (2) in the mean square sense and almost surely.
where Cx is given in Lemma IV.1. Combining the bounds
above, we conclude
j∈Oi
=
Λki
X
j∈Oi
wij (1 −
ξik ξjk )(gjk
+
θgik ).
j∈Oi
Moreover, applying the norm and the convexity argument like
above we get
X
b k )g k ]i k2 ≤ kΛk k2 k
k[(Hk − H
wij (1 − ξik ξjk )(gjk + θgik )k2
i
j∈Oi
≤
ρ
2
X
wij (1 −
ξik ξjk )2 kgjk
+ θgik k2 .
(43)
Proof. Claim (45) follows by taking expectation in Theorem IV.3. The remaining two claims follow similarly to
the proof of Theorem 2 in [8]. We briefly demonstrate the
main arguments for completeness. Namely, unwinding the
recursion (45), we obtain for k = 1, 2, ...:
E(Φ(xk ) − Φ(x∗ )) ≤ Φ(x0 ) − Φ(x∗ ) ν k
(46)
+ CΦ
j∈Oi
k
X
ν k−t (1 − pt−1 ).
t=1
k
b k )g k ]i k2 ) ≤ ρ2 P
Therefore, E(k[(H − H
j∈Oi wij 2(1 −
pk )Ekgjk + θgik k2 ) and using the steps similar to the ones
in (41) we obtain the inequality
b k )g k k2 ) ≤ (1 − pk )ρ2 4(1 + θ2 )E(kg k k2 ).
E(k(Hk − H
Now, we apply Lemma IV.1. From this result and (46), it
follows directly that E Φ(xk ) − Φ(x∗ ) → 0 as k → ∞,
because it is assumed that pk → 1. Furthermore, using
inequality Φ(xk ) − Φ(x∗ ) ≥ µ2Φ kxk − x∗ k2 , the mean square
convergence of xk towards x∗ follows. It remains to show
that xk → x∗ almost surely, as well. Using condition (11),
inequality (46) implies that:
E Φ(xk ) − Φ(x∗ ) ≤ Φ(x0 ) − Φ(x∗ ) ν k (47)
+
CΦ Cu
k
X
ν k−t
t=1
t1+ζ
.
11
It can be shown
that (47) implies (see, e.g., [8]):
E Φ(xk ) − Φ(x∗ ) = O 1/k 1+ζ , which further implies:
E kxk − x∗ k2 = O 1/k 1+ζ .
(48)
Applying the Markov inequality for the random variable kxk −
x∗ k2 , we obtain, for any κ > 0:
1
P kxk − x∗ k2 > κ ≤ E kxk − x∗ k2 = O 1/k 1+ζ .
κ
(49)
Inequality (49) implies that:
∞
X
P kxk − x∗ k2 > κ < ∞,
k=0
and so, by the first Borel-Cantelli
lemma, we get
P kxk − x∗ k2 > κ, infinitely often = 0, which implies
that xk → x∗ , almost surely. 2
Next, we state and prove our second main result.
Theorem IV.5 Let {xk } be the sequence of random variables
generated by Algorithm 4. Further, let assumptions of Theorem IV.4 hold, and let pk = 1 − σ k+1 , with σ ∈ (0, 1). Then,
{xk } converges to the solution x∗ of problem (2) in the mean
square sense at an R-linear rate.
Proof. Denote zk = CΦ (1 − pk ). For the specific choice of
pk we obtain zk = CΦ σ k+1 which obviously converges to zero
R-linearly. Furthermore, repeatedly applying the relation (45)
we obtain
E Φ(xk ) − Φ(x∗ ) ≤ (Φ(x0 ) − Φ(x∗ ))ν k + ak
Pk
where ak = j=1 ν j−1 zk−j . Moreover, it can be shown (see
Lemma II.1) that ak also converges to zero R-linearly which
implies the R-linear convergence of E Φ(xk ) − Φ(x∗ ) . Now,
using the strong convexity of Φ (with strong convexity constant µΦ = αµ), we get: kxk −x∗ k2 ≤ (Φ(xk )−Φ(x∗ ))2/µΦ ,
which in turn implies:
E kxk − x∗ k2 ≤ E Φ(xk ) − Φ(x∗ ) 2/µΦ .
The last inequality means that E kxk − x∗ k2 also converges
to zero R-linearly. 2
Theorem IV.5 shows that the DQN method with idling
converges at an R-linear rate when pk = 1−σ k+1 . Parameter σ
plays an important role in the practical performance of the
method. We recommend the tuning σ = 1 − c α µ, with
c ∈ [30, 80], for α < 1/(80L). 5 The rationale for the
tuning above comes from distributed first order methods with
idling [8], where we showed analytically that it is optimal (in
an appropriate sense) to set σ • = (1 − αµ)2 ≈ 1 − 2αµ. The
value σ • is set to balance 1) the linear convergence factor of
the method without idling and 2) the convergence factor of
the convergence of pk to one. As DQN has a better (smaller)
convergence factor than the distributed first order method (due
to incorporation of the second order information), one has to
adjust the rule 1 − 2αµ, replacing 2 with a larger constant c;
5 Condition α < 1/(80L) is not restrictive, as we observed experimentally
that usually one needs to take an α smaller than 1/(80L) in order to achieve
a satisfactory limiting accuracy.
experimental studies suggest values for c on the order 30-80. In
addition, for very small values of αµ, in order to prevent very
small pk ’s at initial iterations on the one hand and the σ’s very
close to one on the other hand,
we can utilize a “safeguarding”
and modify pk to pk = max p, 1 − (min{σ, σ})k+1 , where
p can be taken, e.g., as 0.2, and σ as 0.9999.
V. E XTENSIONS : DQN UNDER PERSISTING IDLING
This section investigates DQN with idling when activation
probability pk does not converge to one asymptotically, i.e.,
the algorithm is subject to persisting idling. This scenario
is of interest when activation probability pk is not in full
control of the algorithm designer (and the networked nodes
during execution). For example, in applications like wireless
sensor networks, inter-node messages may be lost, due to, e.g.,
random packet dropouts. In addition, an active node may fail
to perform its solution estimate update at a certain iteration,
because the actual calculation may take longer than the time
slot allocated for one iteration, or simply due to unavailability
of sufficient computational resources.
Henceforth, consider the scenario when pk may not converge to one. In other words, regarding Assumption A4, we
only keep the requirement that the sequence {pk } is uniformly
bounded from below. We make here an additional assumption
that the iterates
are bounded in the mean square sense, i.e.,
E kxk k2 is uniformly bounded from above by a positive
constant. Now, consider relation (45); it continues to hold
under the assumptions of the Theorem IV.4, i.e., we have
E Φ(xk ) − Φ(x∗ ) ≤ (Φ(x0 ) − Φ(x∗ ))ν k
+
k
X
ν j−1 CΦ (1 − pk−j ).
j=1
Therefore, using the previous inequality we obtain
CΦ (1 − pmin )
.
E Φ(xk ) − Φ(x∗ ) ≤ (Φ(x0 ) − Φ(x∗ ))ν k +
1−ν
Using strong convexity of Φ (with strong convexity constant
µΦ ) and letting k go to infinity we obtain
2CΦ (1 − pmin )
lim sup E kxk − x∗ k2 ≤
:= E.
µΦ (1 − ν)
k→∞
Therefore, the proposed algorithm converges (in the mean
square sense) to a neighborhood of the solution x∗ of (2).
Hence, an additional limiting error (in addition to the error
due to the difference between the solutions of (1) and (2))
is introduced with respect to the case pk → 1. In order to
analyze further quantity E, we unfold CΦ to get
E = (1 − pmin )h(ε)l(ρ),
where
h(ε) =
4
ε2 LΦ + ε/q
, l(ρ) =
((1 + ρCG )2 Cg + ρ2 Cg,2 );
1 − ν(ε)
µΦ
and ν(ε) is as in the proof of Theorem IV.2. (Recall CG , Cg ,
and Cg,2 in (15), (42), and (44), respectively.) It can be shown
that h(ε) is an increasing function of ε so taking smaller
step size ε brings us closer to the solution. However, the
12
10
0
all nodes working at all iter.
variable num. of working nodes
rel. error
convergence factor ν(ε) is also increasing with ε; thus, there
is a tradeoff between the precision and the convergence rate.
Furthermore, considering l(ρ), we can see that it is also an
increasing function. However, as it is expected, l(0) is strictly
positive. In other words, the error remains positive when the
safeguarding parameter ρ = 0. Finally, the size of the error is
proportional to (1−pmin ) – the closer pmin to one, the smaller
the error. Simulation examples in Section 6 demonstrate that
the error is only moderately increased (with respect to the case
pk → 1), even in the presence of very strong persisting idling.
10
-1
VI. N UMERICAL RESULTS
n
1 X kxi − x∗ k ∗
, x 6= 0,
n i=1 kx∗ k
evolves with the elapsed total number of activations per node.
Note that the number of activations relates directly to both the
communication and computational costs of the algorithm.
The parameters for both algorithms are set in the same way,
and the only difference is in the activation schedule. For the
method with idling, we set pk = 1 − σ k+1 , k = 0, 1, ... We
set σ = 1 − c α µ, with c = 40. (Clearly, for the method
without idling, pk ≡ 1, for all k.) The remaining algorithm
parameters are as follows. We set α = 1/(100 L), where L
is the Lipschitz constant of the gradients of the fi ’s that we
take as maxi=1,...,n kAi k. Further, we let θ = 0, and = 1
(full step size). We consider two choices for Λki in step 6
of Algorithm 3: Λki = 0, for all i, k; and Λki = −I, for all
i, k. (We apply no safeguarding on the above choices of Λki ,
0
100
200
300
400
total cost (# activations per node)
(a)
10
0
variable num. of working nodes
all nodes working at all iter.
rel. error
This section demonstrates by simulation significant computational and communication savings incurred through the
idling mechanism within DQN. It also shows that persisting
idling (pk not converging to one) induces only a moderate
additional limiting error, i.e., the method continues to converge
to a solution neighborhood even under persisting idling.
We consider the problem with strongly convex local
quadratic costs; that is, for each i = 1, ..., n, we let fi : Rp →
R, fi (x) = 12 (x − bi )T Ai (x − bi ), p = 10, where bi ∈ Rp
and Ai ∈ Rp×p is a symmetric positive definite matrix.
The data pairs Ai , bi are generated at random, independently
across nodes, as follows. Each bi ’s entry is generated mutually
independently from the uniform distribution on [1, 31]. Each
Bi is generated as Bi = Qi Di QTi ; here, Qi is the matrix of
bi + B
b T ), and B
bi is a matrix
orthonormal eigenvectors of 21 (B
i
with independent, identically distributed (i.i.d.) standard Gaussian entries; and Di is a diagonal matrix with the diagonal
entries drawn in an i.i.d. fashion from the uniform distribution
on [1, 31].
The network is a n = 100-node instance of the random
geometric
graph model with the communication radius r =
q
ln(n)
n , and it is connected. The weight matrix W is set as
1
follows: for {i, j} ∈ E, i 6= j, wij = 2(1+max{d
, where
i ,dj })
di is the node
i’s
degree;
for
{i,
j}
∈
/
E,
i
=
6
j,
w
=
0; and
ij
P
wii = 1 − j6=i wij , for all i = 1, ..., n.
We compare the standard DQN method and the DQN
method with incorporated idling mechanism. Specifically, we
study how the relative error (averaged across nodes):
10
-1
0
50
100
150
200
250
300
total cost (# activations per node)
(b)
Fig. 1. Relative error versus total cost (number of activations per node) for
quadratic costs and n = 100-node network; Figure (a): Λki = 0; Figure (b):
Λki = −I. The solid lines correspond to all nodes working at all iterations;
the dashed lines correspond to the method with idling (increasing number of
working nodes).
i.e., we let ρ = 1.) Note that the former choice corresponds
to the algorithms with a single communication round per
iteration k, while the latter corresponds to the algorithms with
two communication rounds per k.
Figure 1 (a) plots the relative error versus total cost (equal to
total number of activations per node up to the current iteration)
for one sample path realization, for Λki = 0. We can see
that incorporating the idling mechanism significantly improves
the efficiency of the algorithm: for the method to achieve the
limiting accuracy of approximately 0.025, the method without
idling takes about 410 activations per node, while the method
with idling takes about 310 activations. Hence, the idling
mechanism reduces total cost by approximately 24%. Figure 1
(b) repeats the plots for Λki = −I, still showing clear gains of
idling, though smaller than with Λki = 0.
To account for randomness of the DQN method with idling
that arises due to the random nodes’ activation schedule,
13
14
10
0
pk = 1-k+1
12
all nodes working at all iterations
variable num. of working nodes
pk = 0.7 ( 1-k+1 )
rel. error
10
8
6
all nodes working at all iter.
pk = 0.7 = const
10
-1
4
2
0
180
10
200
220
240
260
total cost to reach rel. error 0.04
-2
280
0
(a)
10
0
pk = 1 - k+1
pk = 1 = const
variable num. of working nodes
pk = 0.7 ( 1 - k+1 )
rel. error
10
8
6
1000
(a)
14
12
200
400
600
800
total cost (# activations per node)
all nodes working all iter.
pk = 0.5 ( 1 - k+1 )
10
-1
pk = 0.9 ( 1 - k+1 )
4
2
0
140
10
160
180
total cost to reach rel. error 0.04
200
-2
0
200
400
600
800
total cost (# activations per node)
1000
(b)
(b)
Fig. 2. Total cost (number of activations per node) to reach relative error 0.04
for quadratic costs and n = 100-node network; Figure (a): Λki = 0;
Figure (b): Λki = −I. The histograms corresponds to the DQN algorithm
with idling; the arrow indicates the total cost needed by standard DQN.
Fig. 3. Relative error versus total cost (number of activations per node) for
strongly convex quadratic costs, n = 40-node network, and Λki = 0. The
Figures compare the following scenarios: 1)
pk ≡ 1 (standard DQN); 2)
pk = 1 − σ k+1 ; 3) pk = pmax 1 − σ k+1 ; and 4) pk = pmax , for all k.
we include histograms of the total cost needed to achieve a
fixed level of relative error. Specifically, in Figure 2 we plot
histograms of the total cost (corresponding to 50 generated
sample paths – 50 different realizations of the ξik ’s along
iterations) needed to reach the relative error equal 0.04;
Figure 2 (a) corresponds to Λki = 0, while Figure 2 (b)
corresponds to Λki = −I. The Figures also indicate with
arrows the total cost needed by standard DQN to achieve the
same accuracy. The results confirm the gains of idling. Also,
the variability of total cost across different sample paths is
small relative to the gain with respect to standard DQN.
Figures 3 and 4 investigate the scenarios when the activation
probability pk may not asymptotically converge to one. The
network is a (connected)
q random geometric graph instance
with n = 40 and r = ln(n)
n ; step size α = 1/(200L); the
remaining system and algorithmic parameters are the same
as with the previous simulation example. We consider the
following choices for pk : 1) pk ≡ 1 (standard DQN); 2)
pk = 1 − σ k+1 ; 3) pk = pmax 1 − σ k+1 ; and 4) pk = pmax ,
for all k. With the third and fourth choices, the presence of
pmax models external effects on the pk (out of control of the
networked nodes), e.g., due to link failures and unavailability
of computing resources at certain iterations; it is varied within
the set {0.5, 0.7, 0.9}. Figure 3 (a) compares the methods for
one sample path realization with the four choices of pk above,
with pmax = 0.7, for Λki = 0. Figure 3 (b) compares for the
same experiment the standard DQN (pk ≡ 1), pk = 1 − σ k+1 ,
and pk = pmax 1 − σ k+1 , with pmax ∈ {0.5, 0.7, 0.9}.
Several important observations stand out from the experiments.
First, we can see that the limiting error increases when pk
does not converge to one with respect to the case when it
converges to one. However, this increase (deterioration) is
moderate, and the algorithm still manages to converge to a
good solution neighborhood despite the persisting idling. In
14
10
0
pk = 1-k+1
pk = 1 = const
rel. error
pk = 0.7 ( 1-k+1 )
10
10
pk = 0.7 = const
-1
-2
0
200
400
600
total cost (# activations per node)
(a)
(a)
10
0
pk = 1 - k+1
pk = 1= const
rel. error
pk = 0.9 ( 1 - k+1 )
10
10
pk = 0.7 ( 1 - k+1 )
-1
pk = 0.5 ( 1 - k+1 )
-2
0
200
400
600
total cost (# activations per node)
(b)
(b)
Fig. 4. Relative error versus total cost (number of activations per node) for
strongly convex quadratic costs, n = 40-node network, and Λki = −I. The
Figures compare the following scenarios: 1)
pk ≡ 1 (standard DQN); 2)
pk = 1 − σ k+1 ; 3) pk = pmax 1 − σ k+1 ; and 4) pk = pmax , for all k.
Fig. 5. Relative error versus total cost (number of activations per node)
for strongly convex quadratic costs and n = 30-node network. Figure (a):
α = 1/(100 L); Figure (b): α = 1/(200 L). The red, dotted line corresponds
to the proposed DQN with idling and pk = 1−σ k+1 ; blue, solid line to [17];
green, dashed line to the proposed DQN with idling and pk = 0.8 = const;
and black, dashed line to the method in [29].
particular, from Figure 3 (b), we can see that the limiting
relative error increases from about 10−2 (with pk → 1) to
about 3.5 · 10−2 with pmax = 0.5–a case with a strong
persisting idling. This corroborates that DQN with idling is
an effective method even when activation probability pk is
not in full control of the algorithm designer. Second, the
limiting error decreases when pmax increases, as it is expected
– see Figure 3 (b). Finally, from Figure 3 (a),
we can
see that the method with pk = pmax 1 − σ k+1 performs
significantly better than the method with pk = pmax , for all
k. In particular, the methods have the same limiting error
(approximately 2 · 10−2 ), while the former approaches this
error much faster. This confirms that the proposed judicious
design of increasing pk ’s, as opposed to just keeping them
constant, significantly improves the algorithm performance.
Figure 4 repeats the same experiment for Λki = −I. We can
see that the analogous conclusions can be drawn.
In the next experiment, we compare the proposed DQN
method with idling with other existing methods that utilize
randomized activations of nodes. Specifically, we consider
the very recent asynchronous (second order) network Newton
method proposed in [17] that is an asynchronous version of the
method in [4]. We refer to this method here as asynchronous
Network Newton (NN). We also consider the first order gossipbased method in [29]. The method in [17] and the DQN with
idling and matrix L = −I both utilize two p-dimensional
communications per node activation (they have equal communication cost per node activation). The two methods also have
a similar computational cost per activation. The method in [29]
has a twice cheaper communication cost per activation, and it
has in general a lower computational cost per activation (due
to incorporating only the first order information into updates).
The comparison is carried out on a n = 30-node (con-
15
nected) random geometric graph instance with 91 links, for the
variable dimension p = 5 and strongly convex quadratic fi ’s
generated analogously to the previous experiments. With the
proposed idling-DQN, we consider two choices of activation
probabilities: 1) pk = 1 − σ k+1 , with σ = 1 − c α µ, c = 40,
as in the previous experiment; and 2) pk = 0.8 = const.
The weight matrices of the proposed method and that in [17]
are set in the same way, as in prior experiments. With both
idling-DQN and the method in [17], we set step size = 1. We
consider two different choices of parameter α: α = 1/(100 L),
and α = 1/(200 L). This is how step-sizes are set for the
method in [17] and for the idling-DQN with pk = 1 − σ k+1 .
Quantity α for the method in [29] (the algorithm’s step size)
and for the idling-DQN with pk = 0.8 are then adjusted
(decreased) for a fair comparison, so that the four different
methods achieve the same asymptotic relative error; we then
look how many per-node activations each method takes to
reach the saturating relative error.
Figure 5 plots the relative error versus total number of
activations for the four methods; Figure (a) corresponds to
α = 1/(100 L) and Figure (b) is for α = 1/(200 L). We
can see from Figure 5 (a) that the proposed idling-DQN with
pk = 1 − σ k+1 outperforms the other methods: it takes about
400 per-node activations to reach the relative error 0.025;
the method in [17] and the idling-DQN with pk = 0.8
take about 600; and the method in [29] needs at least 1600
activations for the same accuracy. Note that, even when we
half the number of activations for [29] to account for its
twice cheaper communication cost, the proposed idling-DQN
is still significantly faster – it compares versus [29] as 400
versus 800 “normalized activations.” Interestingly, the idling
DQN with constant pk and the method in [17] practically
match in performance. Figure 5 (b) repeats the comparison for
α = 1/(200 L); we can see that similar conclusions can be
drawn from this experiment. In summary, the idling-DQN reduces communication cost with respect to the method in [29],
which is expected as it utilizes more (second order) computations at each activation. The two second order methods
with randomized activations, the idling-DQN and the method
in [17], exhibit very similar performance when the idlingDQN uses constant pk policy. With the increasing pk policy,
the idling-DQN performs better than [17]. This, together with
previous experiments, demonstrates that a carefully designed
workload orchestration with idling-DQN leads to performance
improvements both with respect to a “pure” random activation
policy and with respect to the all-nodes-work-all-time policy.
VII. C ONCLUSION
We incorporated an idling mechanism, recently proposed
in the context of distributed first order methods [8], into
distributed second order methods. Specifically, we study the
DQN algorithm [10] with idling. We showed that, as long
as pk converges to one at least as fast as 1/k 1+ζ , ζ > 0
arbitrarily small, the DQN algorithm with idling converges in
the mean square sense and almost surely to the same point
as the standard DQN method that activates all nodes at all
iterations. Furthermore, when pk grows to one at a geometric
rate, DQN with idling converges at a R-linear rate in the mean
square sense. Therefore, DQN with idling achieves the same
order of convergence (R-linear) as standard DQN, but with
significantly cheaper iterations. Simulation examples corroborate communication and computational savings incurred by
incorporating the idling mechanism and show the method’s
flexibility with respect to the choice of activation probabilities.
The proposed idling-DQN method, and also other existing
distributed second order methods (involving local Hessian’s
computations) with randomized nodes’ activations, e.g., [17],
[12], are not exact in the sense that they converge to a solution
neighborhood. An interesting future research direction is to
develop and analyze an idling-based second order method with
exact convergence.
R EFERENCES
[1] A. Nedić, A. Ozdaglar, “Distributed subgradient methods for multi-agent
optimization,” IEEE Transactions on Automatic Control, vol. 54, no. 1,
pp. 48–61, 2009.
[2] F. Cattivelli, A. H. Sayed, “Diffusion LMS strategies for distributed
estimation,” IEEE Transactions on Signal Processing, vol. 58, no. 3,
pp. 1035–1048, 2010.
[3] W. Shi, Q. Ling, G. Wu, W. Yin, “EXTRA: an Exact First-Order
Algorithm for Decentralized Consensus Optimization,” SIAM Journal
on Optimization, vol. 2, no. 25, pp. 944-966, 2015.
[4] A. Mokhtari, Q. Ling, A. Ribeiro, “Network Newton Distributed Optimization Methods,” IEEE Trans. Signal Processing, vol. 65, no. 1, pp.
146-161, 2017.
[5] L. Xiao, S. Boyd, S. Lall, “A scheme for robust distributed sensor fusion
based on average consensus,” in IPSN ’05, Information Processing in
Sensor Networks, 63–70, Los Angeles, California, 2005.
[6] G. Hug, S. Kar, C. Wu, “Consensus + Innovations Approach for
Distributed Multiagent Coordination in a Microgrid,” IEEE Trans. Smart
Grid, vol. 6, no. 4, pp. 1893-1903, 2015.
[7] F. Bullo, J. Cortes, S. Martnez, “Distributed Control of Robotic Networks: A Mathematical Approach to Motion Coordination Algorithms,”
Princeton University Press, 2009.
[8] D. Bajović, D. Jakovetić, N. Krejić, N. Krklec Jerinkić, “Distributed
Gradient Methods with Variable Number of Working Nodes,” IEEE
Trans. Signal Processing, vol. 64, no. 15, pp. 4080-4095, 2016.
[9] M. P. Friedlander, M. Schmidt, “Hybrid deterministic-stochastic methods for data fitting,” SIAM Journal on Scientific Computing, vol. 34,
pp. 1380-1405, 2012.
[10] D. Bajović, D. Jakovetić, N. Krejić, N. Krklec Jerinkić, “Newton-like
method with diagonal correction for distributed optimization,” SIAM J.
Opt., vol. 27, no. 2, pp. 11711203. 2017.
[11] D. Varagnolo, F. Zanella, A. Cenedese, G. Pillonetto, and L. Schenato,
“Newton-Raphson Consensus for Distributed Convex Optimization,”
IEEE Trans. Aut. Contr., vol. 61, no. 4, 2016.
[12] M. Eisen, A. Mokhtari, A. Ribeiro, “Decentralized quasi-Newton methods,” IEEE Transactions on Signal Processing, vol. 65, no. 10, pp. 2613–
2628, May 2017.
[13] M. Eisen, A. Mokhtari, A. Ribeiro, “A Decentralized Quasi-Newton
Method for Dual Formulations of Consensus Optimization,” IEEE 55th
Conference on Decision and Control (CDC), Las Vegas, NV, Dec. 2016.
[14] M. Eisen, A. Mokhtari, A. Ribeiro, “An asynchronous quasi-Newton
method for consensus optimization,” IEEE Global Conference on Signal
and Information Processing (GlobalSIP), Washington, DC, VA, USA,
Dec. 2016.
[15] D. Bajović, D. Jakovetić, N. Krejić, N. Krklec Jerinkić, “Distributed
first and second order methods with variable number of working
nodes,” IEEE Global Conference on Signal and Information Processing,
Washington DC, VA, USA, Dec. 2016
[16] A. Mokhtari, W. Shi, Q. Ling, A. Ribeiro, “DQM: Decentralized
Quadratically Approximated Alternating Direction Method of Multipliers,” IEEE Trans. Signal Processing, vol. 64, no. 19, pp. 5158-5173,
2016.
[17] F. Mansoori, E. Wei, “Superlinearly Convergent Asynchronous
Distributed Network Newton Method,” 2017, available at
https://arxiv.org/abs/1705.03952
16
[18] D. Jakovetić, J. M. F. Moura, J. Xavier, “Distributed Nesterov-like
gradient algorithms”, CDC’12, 51st IEEE Conference on Decision and
Control, Maui, Hawaii, December 2012, pp. 5459–5464.
[19] A. Mokhtari, W. Shi, Q. Ling, A. Ribeiro, “A Decentralized Second
Order Method with Exact Linear Convergence Rate for Consensus
Optimization,” IEEE Trans. Signal and Information Processing over
Networks, vol. 2, no. 4. pp. 507-522, 2016.
[20] M. Zargham, A. Ribeiro, A. Jadbabaie, “Accelerated dual descent for
constrained convex network flow optimization,” Decision and Control
(CDC), 2013 IEEE 52nd Annual Conference on, Firenze, Italy, 2013.
pp. 1037-1042.
[21] I. Lobel, A. Ozdaglar, D. Feijer, “Distributed Multi-agent Optimization
with State-Dependent Communication,” Mathematical Programming,
vol. 129, no. 2, pp. 255-284, 2014.
[22] X. Zhao, A. H. Sayed, “Asynchronous Adaptation and Learning Over
Networks–Part I: Modeling and Stability Analysis,” IEEE Transactions
on Signal Processing, vol. 63, no. 4, Feb. 2015.
[23] X. Zhao, A. H. Sayed, “Asynchronous Adaptation and Learning Over
Networks–Part II: Performance Analysis,” IEEE Transactions on Signal
Processing, vol. 63, no. 4, Feb. 2015.
[24] T. Wu, K. Yuan, Q. Ling, W. Yin, A. H, Sayed, “Decentralized Consensus Optimization with Asynchrony and Delays,” IEEE Transactions
on Signal and Information Processing over Networks, to appear, 2017,
DOI: 10.1109/TSIPN.2017.2695121
[25] J. Liu, S. Wright, “Asynchronous stochastic coordinate descent: Parallelism and convergence properties,” SIAM J. Opt., vol. 25, no. 1, 2015.
[26] T. H. Chang, L. Wei-Cheng, M. Hong, X. Wang, “Distributed ADMM
for large-scale optimization part II: Linear convergence analysis and
numerical performance,” IEEE Trans. Sig. Proc., vol. 64, no. 12, 2016.
[27] N. Krejić, N. Krklec Jerinkić, “Nonmonotone line search methods with
variable sample size,” Numerical Algorithms, vol. 68, pp. 711–739, 2015.
[28] S. Ram, A. Nedic, V. Veeravalli, “Distributed stochastic subgradient
projection algorithms for convex optimization,” J. Optim. Theory Appl.,
vol. 147, no. 3, pp. 516-545, 2011.
[29] S. S. Ram, A. Nedić, V. Veeravalli, “Asynchronous gossip algorithms for
stochastic optimization,” CDC ’09, 48th IEEE International Conference
on Decision and Control, Shanghai, China, December 2009, pp. 3581 –
3586.
[30] E. Wei, A. Ozdaglar, A. Jadbabaie, “A distributed Newton method for
network utility maximization–I: Algorithm,” IEEE Transactions on
Automatic Control, vol. 58, no. 9, pp. 2162- 2175, 2013.
| 7cs.IT
|
Leveraging Diversity and Sparsity in Blind Deconvolution
Ali Ahmed and Laurent Demanet∗
arXiv:1610.06098v2 [cs.IT] 15 Dec 2017
December 18, 2017
Abstract
This paper considers recovering L-dimensional vectors w, and x1 , x2 , . . . , xN from their
circular convolutions yn = w ∗ xn , n = 1, 2, 3, . . . , N . The vector w is assumed to be S-sparse
in a known basis that is spread out in the Fourier domain, and each input xn is a member of a
known K-dimensional random subspace.
We prove that whenever K + S log2 S . L/ log4 (LN ), the problem can be solved effectively
by using only the nuclear-norm minimization as the convex relaxation, as long as the inputs are
sufficiently diverse and obey N & log2 (LN ). By “diverse inputs”, we mean that the xn ’s belong
to different, generic subspaces. To our knowledge, this is the first theoretical result on blind
deconvolution where the subspace to which w belongs is not fixed, but needs to be determined.
We discuss the result in the context of multipath channel estimation in wireless communications. Both the fading coefficients, and the delays in the channel impulse response w are
unknown. The encoder codes the K-dimensional message vectors randomly and then transmits
coded messages xn ’s over a fixed channel one after the other. The decoder then discovers all of
the messages and the channel response when the number of samples taken for each received message are roughly greater than (K + S log2 S) log4 (LN ), and the number of messages is roughly
at least log2 (LN ).
1
Introduction
This paper addresses the problem of recovering a vector w from its circular convolutions individually
with a series of unknown vectors {xn }n := x1 , x2 , . . . , xN . Consider a linear, time-invariant (LTI)
system, characterized by some unknown impulse response w. The system is driven by a series of
inputs {xn }n and one wants to identify the system by observing only the outputs, which in this case
are the convolutions of the inputs with the system impulse response. This problem is referred to as
the blind system identification: jointly discover the inputs, and the system impulse response from
the outputs, and is one of the core problems in the field of system theory and signal processing.
∗
Ali Ahmed is currently with the Information Technology University, Lahore, Pakistan. He was associated until
recently with the Department of Mathematics, MIT, Cambridge, MA. Laurent Demanet is with the Department
of Mathematics, MIT, Cambridge, MA. Email for the corresponding author: [email protected]. Both authors are
sponsored by AFOSR grants FA9550-12-1-0328 and FA9550-15-1-0078. LD is also funded by NSF, ONR, and Total
SA. We thank Augustin Cosse for interesting discussions. Some preliminary results in this direction were presented
in an earlier conference publication, namely, A convex approach to blind deconvolution with diverse inputs, in Proc.
IEEE CAMSAP, Cancun, December 2015. c This work has been submitted to the IEEE Transactions on Information
Theory for possible publication. Copyright may be transferred without notice, after which this version may no longer
be accessible.
1
DRAFT – December 18, 2017 – 2:26
When w is expected to be sparse, the problem can be recast in a now standard fashion as the
recovery of a simultaneously sparse and rank-1 matrix. We relax this formulation by dropping the
sparsity contraint and using nuclear-norm minimization.
We then leverage results in the well understood area of low-rank recovery from underdetermined
systems of equations to give the conditions on the unknown impulse response, and inputs under
which they can be deconvolved exactly.
Roughly, the results say the input vectors x1 , x2 , . . . , xN , each of which lives in some known
“generic” K-dimensional subspace of RL , and a vector w ∈ RL that is “incoherent” in the Fourier
domain, and is only assumed to be S-sparse is some known basis, are separable with high probability provided K + S ∼ L, up to log factors, and with appropriate coherences appearing in the
constants.
More precisely, we state the problem as follows. Assume that each of the input xn lives in a known
K-dimensional subspace of RL , i.e.,
xn = Cn mn ,
n = 1, 2, 3, . . . , N
(1)
for some L×K basis matrix Cn with K ≤ L, whose columns span the subspace in which xn resides.
Moreover, the vector w is only assumed to be S-sparse in an L × L basis matrix B, i.e.,
w = Bh, such that khk0 ≤ S.
(2)
(It can be convenient to think of B as the identity upon first reading.) Given the basis matrices
B and Cn , all we need to know are the expansion coefficients mn , and h to discover the inputs
xn for each n, and w. The structural assumptions on w are much weaker than on xn , in that we
only need w to be sparse in some known basis, whereas each xn resides in a generic and known
subspace.
We observe the circular convolutions:
yn = w ∗ xn , n = 1, 2, 3, . . . , N.
(3)
An entry in the length-L observation vector yn , for each n ∈ {1, 2, 3, . . . , N } is
yn [`] =
L
X
`0 =1
w[`0 ]xn [` − `0 + 1 mod L], (`, n) ∈ {1, 2, 3, . . . , L} × {1, 2, 3, . . . , N },
where modulo L is what makes the convolution circular. Given no information about the inputs xn
and the impulse response w, it is clear that both of these quantities cannot be uniquely identified
from the observations (3).
We want to put this result in perspective from the outset by comparing it with a related result
in [2], where a single (N = 1) input blind deconvolution problem is analyzed. Mathematically, the
main result in [2] shows that in a single input deconvolution problem, the vectors x, and w can
be recovered from the circular convolution y = w ∗ x when x lives in a known generic subspace as
above, however, unlike above the incoherent vector w also lives in a known subspace. In this paper,
we do not have a known subspace assumption on w, which makes it a significant improvement over
the results in [2] and has concrete implications in important applications as will be explained in
Section 1.4
2
DRAFT – December 18, 2017 – 2:26
1.1
Notations
We use upper, and lower case bold letters for matrices and vectors, respectively. Scalars are
represented by upper, and lower case, non-bold letters. The notation x∗ (xT ) denotes a row vector
formed by taking the transpose with (without) conjugation of a column vector x. By x̄, we mean a
column vector obtained from x by conjugating each entry. Linear operators are represented using
script letters. We repeatedly use the notation k ∼K n to indicate that the index k takes value in
the range {(n − 1)K + 1, . . . , nK} for some scalar K. We use [N ] to denote the set {1, 2, 3, . . . , N }.
The notation IK denotes K × K identity matrix for a scalar K. For a set Ω ⊂ [L], IL×Ω denotes an
L × |Ω| submatrix of an L × L identity obtained by selecting columns indexed by the set Ω. Also
we use Dn to represent a KN × KN matrix IK ⊗ en e∗n with ones along the diagonal at locations
k ∼K n and zeros elsewhere, where {en }n denote standard N -dimensional basis vectors, and ⊗
is the conventional Kronecker product. We write vec(A) for the vector formed by stacking the
columns of a matrix A. Given two matrices A, and B, we denote by A B, the rank-1 matrix:
[vec(A)][vec(B)]∗ . Similarly, P : CL×M → CL×M for some L, and M takes an L × M matrix X
∗
to IL×Ω IL×Ω
X. We will use L ∼ a → b to show that a variable L varies between scalar a, and b.
Lastly, the operator E refers to the expectation operator, and P represents the probability measure.
1.2
Lifting and convex relaxation
In this section, we recast the blind system identification from diverse inputs as a simultaneously
sparse, and rank-1 matrix recovery problem, and set up a semidefinite program (SDP) to solve it.
Begin with defining F , the L × L discrete Fourier transform (DFT) matrix,
1
F [ω, `] = √ e−j2π(ω−1)(`−1)/L ,
L
(ω, `) ∈ [L] × [L],
(4)
and let f`∗ denote the `th row of F . In the Fourier domain, the convolutions in (3) are
√
√
ŷn = Lŵ x̂n , or ŷn [`] = Lhf` , wihf` , xn i, (`, n) ∈ [L] × [N ],
where ŵ = F w, x̂n = F xn , and
denotes the Hadamard product. Using the fact that xn =
Cn mn , and w = Bh, we obtain
√
ŷn [`] = LhB ∗ f` , hihCn∗ f` , mn i = hb` , hihmn , c`,n i, (`, n) ∈ [L] × [N ],
where the last equality follows by substituting b` = B ∗ f` , c̄`,n =
hx, yi = hy, xi∗ . This can be equivalently expressed as
ŷn [`] = hb` c∗`,n , hm∗n i = hb` φ∗`,n , hm∗ i,
√
LCn∗ f` , and using the fact that
(`, n) ∈ [L] × [N ],
(5)
where with matrices as its arguments, the notation h·, ·i denotes the usual trace inner product,
m = [m∗1 , m∗2 , . . . , m∗N ]∗ , and φ`,n denotes a length KN vector of zeros except the c`,n in the
position indexed by k ∼K n, i.e.,
φ`,n = c`,n ⊗ en ,
(`, n) ∈ [L] × [N ]
(6)
with en denoting the standard N -dimensional basis vectors. It is clear that the measurements
are non-linear in h ∈ RL and m ∈ RKN but are linear in their outer product X0 = hm∗ .
3
DRAFT – December 18, 2017 – 2:26
Since the expansion coefficients h are S-sparse, this shows that the inverse problem in (3) can
be thought of as the question of recovering hm∗ ; a rank-1 matrix with S-sparse columns, from
its linear measurements obtained by trace inner products against known measurement matrices
A`,n = b` φ∗`,n .
Define a linear map A : RL×KN → CLN as
A(X) : = {hb` φ∗`,n , Xi | (`, n) ∈ [L] × [N ]}
(7)
The number of unknowns in X are LKN and there are only LN linear measurements available. This
means that the linear map A is severely underdetermined except in the trivial case when K = 1. In
all other cases when K > 1, infinitely many candidate solutions satisfy the measurements constraint
owing to the null space of A.
Of course, we can take advantage of the fact that the unknown matrix will always be simultaneously
sparse, and rank-1 and hence the inherent dimension is much smaller. Information theoretically
speaking, the number of unknowns is only ∼ S log L + KN , and if we can effectively solve for the
simultaneously, sparse and rank-1 matrices then inverting the system of equations for xn ’s, and w
might be possible for a suitable linear map A when LN & S log L + KN . If it were possible, a
single unknown input (N = 1) under certain structural assumptions would suffice to identify the
system completely.
However, it is only known how to individually relax the low-rank and sparse structures [7, 9, 10,
14, 24], namely using nuclear and `1 norms, but it remains an open question to efficiently relax
those structures simultaneously.1 Instead, if we ignore the sparsity altogether and only cater to the
rank-1 structure, the problem remains in principle solvable because the inherent number L+KN of
unknowns in this case become smaller than the number LN of observations as soon as the number
L
N of inputs exceeds L−K
> 1. Therefore, the main idea of this paper is to use multiple inputs,
which allow us to forego the use of a sparsity penalty in the relaxed program.
Before we formulate the optimization program, it is worth mentioning that the recovery of the
rank-1 matrix X0 only guarantees the recovery of h and m to within a global scaling factor α, i.e.,
we can only recover h̃ = αh, and m̃ = α−1 m, which is not of much concern in practice.
The inverse problem in (3) can be cast into a rank-1 matrix recovery problem from linear measurements as follows:
find
X
subject to ŷn [`] = hb` φ∗`,n , Xi,
rank(X) = 1.
(`, n) ∈ [L] × [N ]
The optimization program is non convex and in general NP hard due to the combinatorial rank
constraint. Owing to the vast literature [7,13,15,24] on solving optimization programs of the above
1
The most natural choice of combining the nuclear and `1 norms to constitute a convex penalty for simultaneously
sparse and low-rank is known to be suboptimal [22]. In fact, for the special case of rank-1, and sparse matrices, no
effective convex relaxation exists [1]. Thus, even if the low-rank and sparse structures can be individually handled
with effective convex relaxations, no obvious convex penalty is known for the simultaneously spase, and low-rank
structure.
4
DRAFT – December 18, 2017 – 2:26
form, it is well known that a good convex relaxation is
X̂ := argmin
X
kXk∗
(8)
subject to ŷn [`] = hb` φ∗`,n , Xi,
(`, n) ∈ [L] × [N ],
where the nuclear norm kXk∗ is the sum of the singular values of X. The system identification
problem is successfully solved if we can guarantee that the minimizer to the above convex program
equals hm∗ . Low-rank recovery from under determined linear map has been of interest lately in
several areas of science and engineering, and a growing literature [7, 15, 23, 24] has been concerned
with finding the properties of the linear map A under which we can expect to obtain the true
solution after solving the above optimization program.
1.3
Main results
In this section, we state the main result claiming that the optimization program in (8) can recover
the sparse, and rank-1 matrix hm∗ almost always when the inputs xn ’s reside in relatively dense
“generic” K dimensional subspaces of RL , and that w ∈ RL satisfies the nominal conditions of
S-sparsity in some known basis, and “incoherence” in the Fourier domain. Before stating our main
theorem, we define the terms “generic” and “incoherence” concretely below. Recall that w = Bh.
The incoherence of the basis B̂ = F B introduced in (2) is quantified using a coherence parameter
µ2max ,
µ2max := L · kB̂k2∞ ,
(9)
where k · k∞ is the entrywise uniform norm. Using the fact that B̂ is an L × L orthonormal matrix,
it is easy to see that 1 ≤ µ2max ≤ L. A simple example of a matrix that achieves minimum µ2max
would be the DFT matrix.
The incoherence of w in the Fourier domain is measured by µ20 ,
(
)
00 k2
0 k2
2
k
B̂h
k
B̂h
0 ∞
k
B̂hk
n,p
∞
n,n
∞
µ20 := L · max
,
,
,
khk22
kh0n,p k22
kh00n,n0 k22
where each ratio is a measure of diffusion in the Fourier domain. The spirit of the definition is
2
∞
mainly captured by the first term, L · kB̂hk
— scaled peak value of w in the Fourier domain.
khk2
2
The other terms involve quantities h0n,p and h00n,n0 that are defined in the sequel (they are random
perturbations of h), and are only present for technical reasons. Notice that the first term is small,
O(1), when w is diffuse in the frequency domain, and can otherwise be as large as L.
To keep our results as general as possible, we introduce an extra incoherence parameter ρ20 that
quantifies the distribution of energy among the inputs {mn }n , and is defined as
ρ20 := N · max
n
kmn k22
,
kmk22
(10)
which is bounded as 1 ≤ ρ20 ≤ N . The coherence ρ20 achieves the lower bound when the energy is
equally distributed among the inputs, and the upper bound is attained when all of the energy is
localized in one of the inputs, and the rest of them are all zero.
5
DRAFT – December 18, 2017 – 2:26
As mentioned earlier, we want each of the inputs to reside in some “generic” K-dimensional subspace, which we realize by choosing Cn ’s to be iid Gaussian matrices, i.e.,
Cn [`, k] ∼ Normal 0, L1 ∀(`, n, k) ∈ [L] × [N ] × [K].
(11)
A “generic” K-dimensional subspace refers to most of the K-dimensional subspaces in the entire
continuum of K-dimensional subspaces of RL , however, one must also be mindful that such generic
subspaces may not arise naturally in applications, and may have to be introduced by design as will
be demonstrated in a stylized channel-estimation application in Section 1.4.
√
Ultimately, we are working with the rows c`,n ’s of the matrix LF Cn as defined in (5). As the
columns of Cn are real and F is an orthonormal matrix, the columns of F Cn are also Gaussian
vectors with a conjugate symmetry. Hence, the rows c`,n are distributed as2
(
Normal(0, I)
` = 1, (L/2) + 1, n ∈ [N ]
c`,n =
(12)
−1/2
−1/2
Normal(0, 2
I) + jNormal(0, 2
I) ` = 2, . . . , (L/2), n ∈ [N ]
c`,n = c̄L−`+2,n , ` = (L/2) + 2, . . . , L, n ∈ [N ].
Note that the vectors c`,n ’s are independently instantiated for every n ∈ [N ]. On the other hand,
the vectors c`,n are no longer independent for every ` ∈ [L], rather the independence is retained
only for ` ∈ {1, 2, . . . , L/2 + 1}. However, the c`,n ’s are still uncorrelated for ∀` ∈ [L]; a fact which
is crucial in the analysis to follow later. We are now ready to state the main result.
2
2
Theorem 1. Suppose the bases {Cn }N
n=1 are constructed as in (12) , and the coherences µmax , µ0 ,
2
N
and ρ0 of the basis matrix B, and the expansion coefficients h, and {mn }n=1 are as defined above.
Furthermore, to ease the notation, set
α1 = log(K log(LN )),
and
α2 = log(S log(LN )).
Then for a fixed β ≥ 4, there exists a constant Cβ0 = O(β), such that if
max(µ20 α1 K, µ2max Sα2 log2 S) ≤
L
Cβ0 α1 log2 (LN )
and N ≥ Cβ0 ρ20 α1 log(LN ),
then X0 = h(m∗1 , m∗2 , . . . , m∗N ) is the unique solution to (8) with probability at least 1−O((LN )4−β ),
and we can recover N inputs {xn }N
n=1 and w (within a scalar multiple) from N convolutions
N
{yn = w ∗ xn }n=1 .
The result above crudely says that in an L dimensional space, an incoherent vector, S-sparse
in some known basis, can be separated successfully almost always from N vectors (with equal
energy distribution) lying in known random subspaces of dimension K whenever K + S log2 S .
L/ log4 (LN ), and N & log2 (LN ).
1.4
Application: Blind channel estimation using random codes
A stylized application of the blind system identification directly arises in multipath channel estimation in wireless communications. The problem is illustrated in Figure 1. A sequence of length-K
2
The construction in (12) is explicitly for even L but can be easily adapted to the case when L is odd.
6
DRAFT – December 18, 2017 – 2:26
messages m1 , m2 , . . . , mN are coded using taller L × K coding matrices C1 , C2 , . . . , CN , respectively. The coded messages xn = Cn mn , n ∈ 1, 2, 3, . . . , N are then transmitted one after the
other over an unknown multipath channel, characterized by a sparse impulse response w ∈ RL .
The transmitted message xn arrives at the receiver through multiple paths. Each path introduces
its own delay and fading. All the delayed and scaled copies of xn overlap in the free space communication medium. The received signal is modeled as the convolution of xn with w. This action
is repeated with same delay and fading coefficients for every xn . In other words, we are assuming
here that the channel’s impulse response is more or less fixed over the duration of the transmission
of these N coded messages, which justifies the use of a fixed impulse response w in each of the
convolutions. The task of the decoder is to discover both the impulse response and the messages
by observing their convolutions yn = w ∗ xn , n = 1, 2, 3, . . . , N , and using the knowledge of the
coding matrices.
Our main result in Theorem 1 took w as a vector that is sparse in some incoherent basis B. In the
application discussed in the last paragraph, we can simply take the basis B to be the standard basis;
perfectly incoherent. The location of each non-zero entry in w depicts the delay in the arrival time
of a copy of coded message at the receiver from a certain path and the value of the entry known
as the fading coefficient incorporates the attenuation and the phase change encountered in that
path. The coherence parameter µ20 is roughly just the peak value of the normalized frequency in
the spectrum of the channel response. For this particular application, we can assume that ρ20 ≈ 1
as the transmitter energy is equally distributed among the message signals. Our results prove
that if each of the message is coded using a random coding matrix, and the channel response has
approximately a flat spectrum, then we can recover the messages and the channel response jointly
almost always by solving (8), whenever the length K of the messages, the sparsity S of the channel
impulse response w, and the codeword length L obey K + S log2 S . L/ log4 (LN ), and the number
N of messages that convolve with the same instantiation of the channel roughly exceed log2 (LN ).
Our results here can be thought of as an extension to the blind deconvolution result that appeared
in [2], where we only have a one-time look at the unknown channel — we observe only a single
convolution of the impulse response with a randomly coded message. Consequently, only fading
coefficients could be resolved in [2] and not the delays in the impulse response w of the channel. In
other words, one needs to know the subspace or support of w in advance. In general, both fading
coefficient, and delays are equally important pieces of information to decipher the received message
in wireless communications. In this paper, we take advantage of several looks at the same channel
as it remains fixed during the transmission of N messages. This enables us to estimate both the
fading coefficients and the unknown delays at the same time. In general, we do not assume that
the vector w lives in a known subspace as was the case in [2].
1.5
Related work
In a nutshell, and to our knowledge, this paper is the first in the literature to theoretically deal
with an impulse response that belongs to a low-dimensional subspace that is not fixed ahead of
time but needs to be discovered.
The lifting strategy to linearize the bilinear blind deconvolution problem was proposed in [2],
and it was rigorously shown that two convolved vectors in RL can be separated blindly if their
K, and S dimensional subspaces are known and one of the subspace is generic and the other is
incoherent in the Fourier domain. It is further shown using the dual certificate approach in low7
DRAFT – December 18, 2017 – 2:26
x1
x2
..
.
..
.
C N mN
yN
.
.
y2
..
..
.
..
.
..
.
xN
=
y1
C 1 m1
C 2 m2
..
=
{y n }n
channel
.
x1
x2
{xn }n
..
encode
{mn }n
xN
decode
{m̃n }n
h̃
⇤
h
Figure 1: Blind channel estimation. Each meassage mn in the block {mn }n = {m1 , m2 , . . . , mN } of
messages is coded with a corresponding tall coding matrix Cn and the block of coded messages {xn }n is
sequentially transmitted over an arbitrary unknown channel. This results in convolution of each of the coded
messages {xn }n with an unknown impulse response h. The decoder receives the convolutions {yn }n and it
discovers both the messages {mn }n and the unknown channel h (within a global scalar).
rank matrix recovery literature [7, 15, 23] that both the vectors can be deconvolved exactly when
(K + S) . L/ log3 L. This paper extends the single input blind deconvolution result to multiple
diverse inputs, where we observe the convolutions of N vectors with known subspaces with a fixed
vector only known to be sparse in some known basis.
A natural question that arises is whether multiple (N > 1) inputs xn ’s are necessary in our problem
to identify w in (2). The answer is no in this specific case as even in the single input case N = 1,
under the same random subspace assumption on x1 , and replacing the nuclear norm in (8) with the
standard `1 norm (sum of absolute entries) will separate x1 , and w, however, the sample complexity
L will be suboptimal, and of the order of SK to within log factors. In the general single input case;
under no random subspace assumption on x1 , it is shown in [12] that w, and x1 are not identifiable
from y = w ∗ x1 .
A related question, in a sense dual to that presented in the previous section, is multichannel
blind deconvolution. See Figure 2. In discrete time this problem can be modeled as follows. An
unknown noise source w ∈ RL feeds N unknown multipath channels characterized by K-sparse
impulse responses xn ∈ RL , n = 1, 2, 3, . . . , N . The receiver at each channel observes several
delayed copies of w overlapped with each other, which amounts to observing the convolutions
yn = w ∗ xn , n = 1, 2, 3, . . . , N . The noise w can be modeled as a Gaussian vector, and is well
dispersed in the frequency domain, i.e., the vector w is incoherent according to the definition
(26). The fading coefficients of the multipath channels are unknown, however, we assume that
the delays are known. This amounts to knowing the subspace of the channels and the unknown
impulse responses can be expressed as xn = Cn mn for every n ∈ [N ], where the columns of the
known L × K coding matrices are now the trivial basis vectors and mn contain K unknown fading
coefficients in each channel. The indices (delays) of the non-zeros of every impulse response xn can
be modeled as random, in which case the coding matrices are composed of the random subset of
the columns of the identity matrix. With the coding matrix known and random, the multichannel
blind deconvolution problem is in spirit the dual of the blind system identification from diverse
inputs presented in this paper, where the roles of the channel and the source signal are reversed.
However, the results in Theorem 1 are explicitly derived for dense Gaussian coding matrices and
8
DRAFT – December 18, 2017 – 2:26
not for random sparse matrices. It is worth mentioning here that in many practical situations
the non zeros in the channel impulse response are concentrated in the top few indices making the
assumption of known subspaces (delays) plausible.
After [2], a series of results on blind deconvolution appeared under different sets of assumptions on
the inputs. For example, the result in [3] considers an image debluring problem, where the receiver
observes the N subsampled circular convolutions of an L-dimensional image x, modulated with
random binary waveforms, with an L-dimensional bandpass blur kernel h that lives in a known
K-dimensional subspace. Then it is possible to recover both the image and a incoherent blur kernel
using lifting and nuclear norm minimization, whenever N & log3 L log log K, where N/L is also
the number of subsampling factor of each convolution. The result shows that it is possible to
deconvolve two unknown vectors by observing multiple convolutions—each time one of the vectors
is randomly modulated and is convolved with the other vector living in a known subspace. We are
also observing multiple convolutions but one of the vectors in the convolved pair is changing every
time and the subspace of the other is also unknown, this makes our result much broader.
Another relevant result is blind deconvolution plus demixing [20], where one observes sum of N
different convolved pairs of L-dimensional vectors lying in K, and S dimensional known subspaces;
one of which is generic and the other is incoherent in the Fourier domain. Each generic basis is
chosen independently of others. The blind deconvolution plus the demixing problem is again cast
as a rank-N matrix recovery problem. The algorithm is successful when N 2 (K + S) . L/ log4 L.
An important recent article from the same group settles the recovery guarantee for a regularized
gradient descent algorithm for blind deconvolution, in the single-input case and with the scaling
K + S . L/ log2 L [19]. This result, however, makes the assumption of a fixed subspace for the
sparse impulse response. Note that gradient descent algorithms are expected to have much more
favorable runtimes than semidefinite programming, when their basin of attraction can be established
to be wide enough, as in [19].
The multichannel blind deconvolution was first modeled as a rank-1 recovery problem in [25] and the
experimental results show the successful joint recovery of Gaussian channel responses with known
support that are fed with a single Gaussian noise source. Other interesting works include [16, 33],
where a least squares method is proposed. The approach is deterministic in the sense that the input
statistics are not assumed to be known though the channel subspaces are known. Some of the results
with various assumptions on input statistics can be found in [29]. Owing to the importance of the
blind deconvolution problem, an expansive literature is available and the discussion here cannot
possibly cover all the related material, however, an interested reader might start with the some
nice survey articles [18, 21, 28] and the references therein.
It is also worth mentioning here a related line of research in the phase recovery problem from
phaseless measurements [6, 11], which happen to be quadratic in the unknowns. As in bilinear
problems, it is also possible to lift the quadratic phase recovery problem to a higher dimensional
space, and solve for a positive-definite matrix with minimal rank that satisfies the measurement
constraints.
9
DRAFT – December 18, 2017 – 2:26
x1
y 1 = w ⇤ x1
x2
..
.
w
y 2 = w ⇤ x2
xN
y N = w ⇤ xN
Figure 2: Blind multichannel estimation. An unknown noise source w feeds N unknown multipath channels
characterized by sparse impulse responses {x1 , x2 , . . . , xN }. We observe the convolutions at the receivers
and the task is to recover the channel responses together with the noise signal. The problem can be thought
of as the dual to the blind channel estimation problem where the roles of channels and the source signals
are reversed: a fixed incoherent vector is now fed into all the channels. The channel impulse responses can
be reliably modeled with Bernoulli Gaussian distribution.
2
Numerical Simulations
As an alternative to the computationally expensive semidefinite program in (8), we rely on a
heuristic non-linear program:
Ĥ, M̂ := argmin
H,M
kHk2F + kM k2F
subject to ŷn [`] = hb` φ∗`,n , HM ∗ i,
(13)
(`, n) ∈ [L] × [N ],
which solves for matrices H ∈ CL×R , and M ∈ CKN ×R . The semidefinite constraint in (8)
is always satisfied under the substitution X = HM ∗ . The non-linear program was proposed
in [4], and the results therein showed that all the local minima of (13) are the global minima of
(8) when R > rank(X̂), where X̂ is the optimal solution of (8). Since in our case the optimal
solution hm∗ is rank-1, we solve (13) with R = 2, and declare recovery when Ĥ, and M̂ are rank
deficient. The best rank-1 approximation of Ĥ M̂ ∗ constitutes the solution of (8). The non-linear
program considerably speeds up the simulations as instead of operating in the lifted space like (8)
with LKN variables involved, it operates almost in the natural parameter space with much fewer
number 2(L + KN ) of variables. We use an implementation of LBFGS available in [27] to solve
(13). An additional advantage of (13) is that no suitable initialization is required. Comparatively,
the recently proposed gradient descent scheme [19] for bilinear problems not only requires to solve
a separate optimization program to initialize well but also the gradient updates involve additional
unnatural regularizer to control the incoherence.
We present phase transitions that validate the sample complexity results in Theorem 1. The shade
in the phase transitions represents the probability of failure determined by counting the frequency of
failures in twenty five experiments for each pixel in the phase transitions. We classify the recovered
solution X̂ as a failure if kX̂ − hm∗ kF > 10−1 .
10
DRAFT – December 18, 2017 – 2:26
In all of the phase transitions, we take w, and m to be Gaussian vectors. Observe that w is
constructed to be a dense vector with no sparse model. Recall that Theorem 1 restricts w to be
a sparse vector, however, our simulation results show successful recovery in a more general case of
dense w. This observation is in conformation with our belief that the sparsity assumption on w is
a result of merely a technical requirement due to the proof method. Very similar phase transitions
can be obtained under restrictive sparse model on w.
We will present two sets of phase transitions. Each set contains three phase transition diagrams; in
each diagram, we fix one of the variables L, K, and N , and vary the other two in small increments
and compute the probability of failure every time as outlined earlier in this section.
In the first set, we mimic the channel estimation problem discussed in Section 1.4, and shown in
Figure 1. We take Cn ’s to be Gaussian matrices as in (11). Figure 3(a) shows that for a fixed
N = 40, we are able to recover all of the inputs xn ’s, and w as soon as L ≥ 10K. The phase
diagrams in Figure 3(b) and 3(c) mainly show that the performance of the algorithm become
roughly oblivious to the number N of inputs as soon as N ≥ 10 for the particular range of K, and
L considered in the phase transition diagrams.
In the second set shown in Figure 4, we simulate the blind channel estimation problem discussed in
Section 1.5, and shown in Figure 2. This set contains similar phase diagrams as in first set under
the same assumptions, the only difference is that the matrices Cn ’s are now the random subsets
of the columns of identity. In other words, we take the support of xn ’s to be random and known.
The results are almost exactly the same as in the first set.
3
Proof of Theorem 1
We are observing the linear measurements as in (5) of an unknown X0 = hm∗ such that h is an
S-sparse vector. Define Ω := supp(h), where |Ω| = S. To show that the solution to the SDP in (8)
equals X0 with high probability, we establish the existence of a valid dual certificate [7, 15]. The
proof of low-rank recovery using dual certificate method is a standard approach now and has been
employed in the literature [2, 15, 23] many times before. Our construction of the dual certificate
uses the golfing scheme [15], but is unusually technical in that there is a probabilistic dependence
between the iterates, which in turn precludes the use of matrix concentration inequalities.
Let u ∈ RL , and v ∈ RKN be arbitrary vectors, and h, and m be as defined earlier. Let T1 be the
linear space of matrices with rank at most two defined as
T1 := {X|X = αhv ∗ + βum∗ , and α, β ∈ R},
and T2 be the space of matrices with rows supported on index set Ω, and is defined as
T2 := {X | X ∈ RL×KN , X[`, j] = 0 for ` ∈ Ω⊥ },
where Ω⊥ = [L]\Ω. Then we have
T1 ∩ T2 := {X|X = αhv ∗ + βum∗ , uΩ⊥ = 0, and α, β ∈ R}.
Note that the matrix of interest X0 is a member of the space T1 ∩ T2 . Let us now define the related
projection operators. We start by defining P that takes a matrix or a vector with L rows and sets
11
DRAFT – December 18, 2017 – 2:26
L = 800
N = 40
1
5
10
1
50
0.8
90
0.6
30
0.8
K
K
55
130
0.4
170
0.2
200
0.6
80
0.4
105
500
800
1100
1400
1700
2000
0.2
130
0
5
30
55
80
105
L
130
155
180
0
N
(a)
(b)
K = 40
1
100
0.8
200
300
L
0.6
400
500
0.4
600
0.2
700
800
10
30
50
70
90
110 130 150 170 190
0
N
(c)
Figure 3: Empirical success rate for the deconvolution of w and x1 , x2 , . . . , xN . Recall that xn = Cn mn
for every n = 1, 2, 3, . . . , N . In these experiments, the vectors w, mn are Gaussian, and L × K matrices
Cn , n = 1, 2, 3, . . . , N are also independent, and Gaussian. (a) Fix N = 40, and vary L ∼ 200 → 2000,
K ∼ 10 → 190. Successful reconstruction is obtained with probability one when L ≥ 10K. (b) Fix L = 800,
and vary K ∼ 5 → 150, N ∼ 5 → 200. Successful reconstruction is obtained with probability one when
K ≤ L/10, and N ≥ 10. (c) Fix K = 40, and vary L ∼ 50 → 800, N ∼ 10 → 200. Successful reconstruction
occurs with probability one when L ≥ 10K, and N ≥ 10.
all the rows that are not indexed by the index set Ω ⊂ [L] to zero. Mathematically, we can define
the projection on the index set Ω as
∗
X
P(X) := IL×Ω IL×Ω
(14)
where IL×Ω denotes the submatrix of the L × L identity matrix with columns indexed by set Ω.
The orthogonal projector R onto T1 ∩ T2 is then defined as
R(Z) := hh∗ Z + P(Zmm∗ ) − hh∗ Zmm∗ ,
(15)
and the projector R⊥ onto the orthogonal complement T1⊥ ∪ T2⊥ of T1 ∩ T2 is then simply R⊥ (Z) =
Z − R(Z). Note that in the definition of the projection above, we assume without loss of generality
12
DRAFT – December 18, 2017 – 2:26
L = 800
N = 40
5
1
50
0.8
90
0.6
130
0.4
170
0.2
30
1
0.8
55
0.6
K
K
10
80
0.4
105
0.2
130
0
200
500
800 1100 1400 1700 2000
5
L
30
55
80
105 130 155 180
0
N
(a)
(b)
K = 40
1
100
0.8
200
300
0.6
L
400
500
0.4
600
0.2
700
800
10
50
90
130
170
0
N
(c)
Figure 4: Empirical success rate for the deconvolution of w and x1 , x2 , . . . , xN . In these experiments, the
vector w is Gaussian, and every xn is a sparse vector with random support and its K non-zero entries are
Gaussian. (a) Fix N = 40, and vary L ∼ 200 → 2000, K ∼ 10 → 190. Successful reconstruction is obtained
with probability one when L ≥ 10K. (b) Fix L = 800, and vary K ∼ 5 → 150, N ∼ 5 → 200. Successful
reconstruction is obtained with probability one when K ≤ L/10, and N ≥ 10. (c) Fix K = 40, and vary
L ∼ 50 → 800, N ∼ 10 → 200. Successful reconstruction occurs with probability one when L ≥ 10K, and
N ≥ 10.
that kmk2 = khk2 = 1 as the optimality conditions, presented in Lemma 1 below, for the success
of nuclear norm minimization 8 only involve normalized h, and m.
The following lemma gives sufficient conditions on a dual certificate Y ∈ Range(A∗ ) to guarantee
that nuclear-norm minimization program in (8) produces X0 = hm∗ as the solution. The proof
of the lemma is almost exactly the same as in [7], the only difference is that now instead of just
working with a space of rank-2 matrices T1 , we are dealing with the space T1 ∩ T2 of rank-2 and
row-sparse matrices. We repeat the proof here to show that all the details in [7] also work out for
the space T1 ∩ T2 .
13
DRAFT – December 18, 2017 – 2:26
Lemma 1 (Optimality Conditions). Let A be as defined in (7), and γ > 0 be a positive number
such that kAk ≤ γ, and
√
2kAR(Z)kF ≥ kR(Z)kF
(16)
for all Z ∈ Null(A). Then the matrix X0 = hm∗ is the unique minimizer of (8) if there exists a
Y ∈ Range(A∗ ) such that
khm∗ − R(Y )kF ≤
1
,
4γ
1
kR⊥ (Y )k ≤ .
2
(17)
Proof. Let X̂ denote the solution to the optimization program in (8). This implies that kX̂k∗ ≤
kX0 k∗ . Given this, it is enough to show
kX0 + Zk∗ > kX0 k∗ , ∀Z ∈ Null(A), Z 6= 0,
where Z = X̂ − X0 , to establish exact recovery, since the two conflicting requirements on X̂ above
would directly mean that X̂ = X0 , or Z = 0.
The sub-differential of nuclear norm at point X0 is (see [32] for details)
∂kX0 k∗ := {hm∗ + W : R⊥ (W ) = W , and kW k ≤ 1}.
Since by the definition of sub-differentials
kX0 + Zk∗ − kX0 k∗ ≥ h∆, Zi, for every ∆ ∈ ∂kX0 k∗ ,
we obtain
kX0 + Zk∗ − kX0 k∗ ≥ hhm∗ , Zi + hR⊥ (W ), Zi
= hhm∗ − Y , Zi + hW , R⊥ (Z)i, for every Y ∈ Range(A∗ ).
Using the fact that hm∗ ∈ T1 ∩ T2 , and also maximizing the inner product hW , R⊥ (Z)i with
respect to kW k ≤ 1 gives us
kX0 + Zk∗ − kX0 k∗ ≥ hhm∗ − R(Y ), R(Z)i − hR⊥ (Y ), R⊥ (Z)i + kR⊥ (Z)k∗
≥ −khm∗ − R(Y )kF kR(Z)kF − kR⊥ (Y )kkR⊥ (Z)k∗ + kR⊥ (Z)k∗ .
Now the inequality kAR(Z)kF ≥ 2−1/2 kR(Z)kF for any Z ∈ Null(A) implies that
0 = kA(Z)kF ≥ kAR(Z)kF − kAR⊥ (Z)kF
≥ 2−1/2 kR(Z)kF − γkR⊥ (Z)kF .
2 ≤ (2γ 2 +1)kR (Z)k2 , which in turn means R (Z) 6=
The above inequality implies firstly that kZk√
⊥
⊥
F
F
0 whenever Z 6= 0; secondly, kR(Z)kF ≤ 2γkR⊥ (Z)k∗ . Using these results, the bound in the
earlier inequality gives
√
kX0 + Zk∗ − kX0 k∗ ≥ −khm∗ − R(Y )kF 2γ − kR⊥ (Y )k + 1 kR⊥ (Z)k∗ .
Now under the conditions in (17), the right hand side above is strictly positive, which means
kX0 + Zk∗ > kX0 k∗ ; enough to exhibit the uniqueness.
14
DRAFT – December 18, 2017 – 2:26
The next lemma provides an upper bound γ on the operator norm of the linear map A.
Lemma 2 (Operator norm of A). Let A be as defined in (7). For any β ≥ 1,
p
kAk ≤ βK log(LN )
with probability at least 1 − (LN )−β+2 .
Proof. The operator norm can be calculated by using the fact that hA`1 ,n1 , A`2 ,n2 i = 0, ∀`1 6=
`2 ∈ [L], or ∀n1 P
6= n2 ∈ [N ]. This implies that kAk = max`,n kA`,n kF . We can write kA`,n k2F =
2
2
kb` k2 kφ`,n k2 = k∼K n |c`,n [k]|2 , where |c`,n [k]|2 are chi-squared random variables with degree 2
when 2 ≤ ` ≤ L/2, and degree 1 when ` = 1, or ` = L/2 + 1. In both cases E |c`,n [k]|2 = 1, and
P{|c`,n [k]|2 > u} ≤ e−u .
The maximum is taken over (L/2 + 1) · 2 · KN unique c`,n [k] and
P{max |c`,n [k]|2 ≥ u} ≤ (L + 2)KN · e−u ⇒ P{max kA`,n k2F ≥ Ku} ≤ (LN )2 e−u ,
`,n,k
`,n
where the last
Choose u = β log(LN ), which gives
p inequality follows from the fact that K ≤ L. −β+2
kAk ≤ γ := βK log(LN ) with probability at least 1 − (LN )
.
In the following section, we focus on constructing a dual certificating using golfing scheme, which
is then shown to satisfy the uniqueness conditions in the lemma above.
3.1
Linear operators on golfing partition
To prove the uniqueness conditions in (17), we use a dual certificate Y constructed using a variation
of the golfing scheme [15]. To this end, we partition the index set [L] × [N ] into P disjoint sets
Γ1 , Γ2 , . . . , ΓP defined as
Γp := (`, n) | (`, n) ∈ {(∆n,p , n)}N
(18)
n=1 ,
where ∆n,p is a subset of [L], chosen uniformly at random
S for every n and p, such that |∆n,p | = Q =
0
0
L/P , and for every n, ∆n,p ∩ ∆n,p = ∅ for p 6= p , and p ∆n,p = [L]. The parameter Q is adjusted
through the proof, and we assume here without loss of generality that it is an integer3 . In words,
the partition of the set {1, 2, 3, . . . , L} × {1, 2, 3, . . . , N } is obtained by dividing {1, 2, 3, . . . , L} into
P randomly chosen disjoint sets for a given n, and then we repeat this process independently for
every n to obtain a total of P N sets ∆1,1 , . . . , ∆N,1 , ∆1,2 , . . . , ∆N,P . We then define Γp as in (18).
For every n, the disjointness among the sets ∆n,1 , ∆n,2 , . . . , ∆n,P is of critical importance as it
ensures that no dependence arises due to reuse of the same φ`,n in different partitioned sets. We
define a linear map Ap : RL×KN → CQN that returns the measurements indexed by (`, n) ∈ Γp :
X
Ap (Z) := {hb` φ∗`,n , Zi : (`, n) ∈ Γp },
A∗p Ap (Z) :=
hb` φ∗`,n , Zib` φ∗`,n .
(19)
(`,n)∈Γp
3
We are assuming here that P is a factor of L; this can be achieved in the worst case by increasing the number
L of measurements in each convolution by no more than a factor 2, which only affects the measurements bounds in
Theorem 1 by a multiplicative constant.
15
DRAFT – December 18, 2017 – 2:26
In tandem with this partitioning of the measurements, we also require to partition the L rows of
B̂ into P sets of Q × L submatrices that behave roughly as an isometry on the sparse vectors.
Quantitatively, we want the rows b∗` of matrix B̂ in each of the sets ∆n,p to obey
(1 − δ)kzk22 ≤
L X ∗ 2
|b` z| ≤ (1 + δ)kzk22
Q
(20)
`∈∆n,p
for all vectors z supported on the set Ω such that |Ω| ≤ S. A reader familiar with compressive
sensing will readily recognize this as the restricted isometry property (RIP) [5] on the submatrices
of B̂. A result [26] from compressive sensing says that for each submatrix of rows b` with coherence
µ2max , defined in (9) if the index set ∆n,p is chosen uniformly at random, then there exists a constant
C such that for any 0 < δ < 1, and 0 < < 1,
S log L
S log L
−1 2
Q ≥ Cδ µmax
log
log2 S
2
2
2
implies that the RIP in (20) holds with probability exceeding 1 − e−c(δ/) . Given the partition
{∆n,p }n,p is chosen uniformly at random, the above result with δ = 1/4, and −2 = β log(LN )
means that if
Q ≥ Cβµ2max S log2 (LN ) log(βS log(LN )) log2 S,
(21)
then
sup
X
|Ω|≤S `∈∆
n,p
|b∗` z|2 ≤
5Q
kzk22 ,
4L
with probability at least 1 − O((LN )−β ), for all z supported on Ω for a given ∆n,p . A simple union
bound over all P N number of sets {∆n,p }n,p shows that
X
X
5Q
Q
Q
|b∗` z|2 ≤
max sup
kzk22 =⇒ max
Pb` b∗` P − P ≤
(22)
n,p
n,p
4L
L
4L
|Ω|≤S
`∈∆n,p
`∈∆n,p
holds with probability at least 1 − (P N )O((LN )−β ) ≥ 1 − O((LN )1−β ). In the rest of the article,
we take the results in (22) as given.
Before constructing a dual certificate, we define some nomenclature. Let
X
−1 ∗
‡
∗
Sn,p :=
(Pb` )(Pb` )∗ , and Sn,p
:= IL×Ω IL×Ω
Sn,p IL×Ω
IL×Ω ,
(23)
`∈∆n,p
where IL×Ω is an L × |Ω| matrix containing the columns of an L × L identity matrix indexed by
set Ω. A direct conclusion of (22) gives
max kSn,p k ≤
n,p
5Q
,
4L
‡
max kSn,p
k≤
n,p
4L
.
3Q
(24)
In addition, set Dn = IK ⊗ en e∗n . A linear operator Sp‡ is then defined by its action on an L × KN
matrix X as follows
X
‡
Sp‡ (X) =
Sn,p
XDn .
(25)
n
16
DRAFT – December 18, 2017 – 2:26
3.2
Coherence
With all the development above, we are now in position to precisely define the coherence parameter
µ20 that was first introduced in Section 1.3. The diffusion of the impulse response w is quantified
using the following definition
(
)
‡
‡
kB̂Sn,2
Sn0 ,1 hk2∞
kB̂Sn,p
hk2∞
kB̂hk2∞ Q2
2
· max
µ0 := L · max
,
, max0
.
(26)
n,n
khk22 L2 n,p
khk22
khk22
The quantities h00n,n0 and h00n,n0 from Section 1.3 can be easily read off from this expression, and
from `2 norm equivalences resulting from (24)4 . The following lemma presents upper and lower
bounds on µ20 .
Lemma 3 (Range of µ20 ). Let µ20 , and µ2max be as defined in (26), and (9), respectively. Assume
that (24) holds. Then
20
5
≤ µ20 ≤ µ2max S.
3
9
Proof. We assume without loss of generality that khk22 = 1. Since B̂ is an orthonormal matrix, it
‡
is easy to see that 1/L ≤ kB̂hk2∞ ≤ 1. As far as kB̂Sn,p
hk2∞ is concerned, an upper bound on it is
‡
‡
‡
h|2 ≤ max kb` k2∞ max kSn,p
hk21
max kB̂Sn,p
hk2∞ = max max |b∗` Sn,p
n,p
`
n,p
`
n,p
1
16
L
‡
≤ µ2max SkSn,p
hk22 ≤ µ2max S 2 ,
L
9
Q
where the first inequality is Hölder’s result; the second one follows from the definition of coherence
‡
µ2max in (9), the equivalence of `1 , and `2 -norms, and the fact that the vector Sn,p
h is S-sparse;
and the last one is the result of (24). A lower bound can be obtained by summing over ` ∈ [L] as
follows:
X
16 L2
‡
‡
‡
h|2 = max kSn,p
hk22 ≥
h|2 ≥ max
|b∗` Sn,p
L · max max |b∗` Sn,p
,
n,p
n,p
n,p
`
25 Q2
`
where the equality is due to the fact that B̂ is an orthonormal matrix, and last inequality follows
‡
from (24). In a similar manner, we can compute the upper and lower bounds on kB̂Sn,2
Sn0 ,1 hk2∞ ,
and the result is
5
20
‡
≤ max0 kB̂Sn,2
Sn0 ,1 hk2∞ ≤ µ2max S.
n,n
3
9
Combining all these results, the claim in the lemma follows.
The spirit of the incoherence is captured by the first term in the maximum; namely, kB̂hk2∞ , which
is small when w is diffuse in the frequency domain, and large otherwise. The other two terms are
mainly due to technical reasons in the proof presented later. It is a hard question to characterize
them exactly, but they are qualitatively expected to be of the same order as the first term because
‡
the matrices, Sn,p , and Sn,p
are random by construction and are not expected to make the vectors
‡
‡
Sn,p
h, and Sn,2
Sn0 ,1 h more aligned with the rows of B̂ than h was.
4
So that µ20 as defined here, and its illustration listed in the introduction, are equivalent to within an inconsequential
multiplicative factor.
17
DRAFT – December 18, 2017 – 2:26
3.3
Construction of a dual certificate via golfing
We now iteratively build a dual certificate Y ∈ Range(A∗ ) in P iterations with initial value Y0 = 0
as follows
Y1 =
L ∗
A A1 (hm∗ )
Q 1
and
Yp = Yp−1 + A∗p Ap Sp‡ (hm∗ − R(Yp−1 ))
for p ≥ 2.
(27)
Note that in (27), Yp ∈ Range(A∗ ) for every p. This approach to build the dual certificate was
first developed in [15]. Projecting both sides on T1 ∩ T2 results in
L
RA∗1 A1 (hm∗ )
Q
R(Yp ) = R(Yp−1 ) − RA∗p Ap Sp‡ (R(Yp−1 ) − hm∗ ) ,
R(Y1 ) =
p ≥ 2.
Denoting
W0 = −hm∗ ,
and Wp : = R(Yp ) − hm∗ for p ≥ 1
results in a recursion
L
∗
RA1 A1 R − R W0 ,
W1 =
Q
Wp = (RA∗p Ap Sp‡ R − R)Wp−1 for p ≥ 2,
(28)
(29)
which in turn implies
Wp0
p0
Y
(RA∗p Ap Sp‡ R
p=2
= −
L
∗
RA1 A1 R − R W0 .
− R)
Q
(30)
Running the iteration (27) till p = P gives us our candidate for dual certificate Y := YP . To
establish that X0 is the unique solution to (8), we need only show that kWP kF ≤ 1/4γ and
kR⊥ (YP )k < 1/2 in light of (17).
The Frobenius norm of WP is upper bounded by
P
Y
kWP kF ≤
kRA∗p Ap Sp‡ R − Rk
p=2
L
RA∗1 A1 R − R
Q
kW0 kF .
The difference in the construction of iterates for p = 1, and p ≥ 2 is mainly to avoid technical
difficulties that arise in the proofs later owing to the dependencies between Yp−1 and Ap for p ≥ 2.
The dependencies stem from the fact that although for every p, the random set ∆n,p is independent
of ∆n0 ,p , where n 6= n0 . However, for every n, the sets ∆n,p , and ∆n,p0 are dependent by construction.
This directly implies that the sets Γ1 , . . . , ΓP are dependent; therefore, Yp−1 , and hence Wp−1 are
dependent on Ap for p ≥ 2. As is shown in detail in the proofs to follow that the introduction of
Sp‡ for p ≥ 2 is to avoid this dependence problem and it ensures that
E RA∗p Ap Sp‡ (Wp−1 ) = Wp−1 ,
which is of critical importance in controlling some of the random quantities in the proofs to follow.
For p = 1, however, we do not introduce S1‡ as unlike Wp for p ≥ 1, the matrix W0 = hm∗ is fixed,
and there is no bias between (L/Q)RA∗1 A1 (hm∗ ), and hm∗ .
18
DRAFT – December 18, 2017 – 2:26
A bound on the operator norm for the term with p = 1 above can be achieved by using a simple
triangle inequality followed by an application of Lemma 5, and 6, in Section 3.5 below, to obtain
L
L
L
RA∗1 A1 R − R ≤ kRA∗1 A1 R − E RA∗1 A1 Rk +
E RA∗1 A1 R − R
Q
Q
Q
r
1 Q
≤
4 L
(31)
with probability at least 1 − 2(LN )−β+1 (the constant 2 upfront comes from the union bound), for
a parameter β > 2 that controls the choice of Q, and N . Note that the expectation E is only w.r.t.
the random construction of c`,n in (12), and not w.r.t. to the randomness due to the sets ∆n,p .
The operator norm of the remaining terms (p ≥ 2) in the expression (30) can all be bounded using
Lemma 4 in Section 3.5 below to conclude that
r
Q
−p−1
kWp kF ≤ 2
, for every p ∈ {1, . . . , P },
(32)
L
holds with probability
at least 1 − O(L−β+1 ). This means using the crude union bound that
p
−P
−1
Q/L holds with probability at least 1 − O(P L−β+1 ) ≥ 1 − O(L−β+2 ). Now
kWP kF ≤ 2
choosing P = (L/Q) = 0.5 log2 (4βK log(LN )) is more than sufficient to imply that kWP kF ≤
(4γ)−1 , where the value of γ is dictated by Lemma 2. This proves the first half of (17).
To prove the second half of (17), use the construction in (27) to write
P
X
L
YP = − A∗1 A1 (hm∗ ) +
A∗p Ap Sp‡ (Wp−1 ) .
Q
p=2
Since Wp ∈ T1 ∩ T2 , for every p ∈ {1, 2, 3, . . . , P }, this means
R⊥ (YP ) = −R⊥
L ∗
A A1 (hm∗ ) − hm∗
Q 1
−
P
X
p=2
R⊥ A∗p Ap Sp‡ (Wp−1 ) − Wp−1 .
Taking the operator norm and a triangle inequality, followed by an application of the fact that
kR⊥ k ≤ 1, shows that
P
X
L ∗
kR⊥ (YP )k ≤
A A1 (hm∗ ) − hm∗ +
A∗p Ap Sp‡ (Wp−1 ) − Wp−1 .
Q 1
p=2
Note that by adding and subtracting (L/Q) E A∗1 A1 (hm∗ ) in the first term and similarly adding
and subtracting E A∗p Ap Sp‡ (Wp−1 ) from every term in the summation above, and subsequently using
the triangle inequality, we obtain
L
L
kA∗1 A1 (hm∗ ) − E A∗1 A1 (hm∗ )k +
E A∗1 A1 (hm∗ ) − hm∗ +
Q
Q
P h
i
X
A∗p Ap Sp‡ (Wp−1 ) − E A∗p Ap Sp‡ (Wp−1 ) + E A∗p Ap Sp‡ (Wp−1 ) − Wp−1 .
kR⊥ (YP )k ≤
p=2
Note that the expectation E is only w.r.t. the random construction of c`,n in (12), and not w.r.t.
to the randomness due to the sets ∆n,p . Now each of the term on the right hand side above can
19
DRAFT – December 18, 2017 – 2:26
be controlled using Corollary 2; and Lemma 12, 10, and 11 in Section 3.5 below, respectively that
hold under the choices of Q, and N that conform to Theorem 1 to give us the upper bound
P
kR⊥ (YP )k ≤
1 1 1 X −p 1
+ +
2 ≤ ,
8 8 2
2
p=2
which, using the union bound, holds with probability at least 1 − O((LN )−β+1 ).
Remark 1. Lemma 11 to control E A∗p Ap Sp‡ (Wp−1 ) − Wp−1 relies on the uniform result in
(20) for sparse vectors to overcome the statistical dependence between Ap , and Wp−1 . Being able
to control this term is one of the main reasons of working with T1 ∩ T2 instead of T1 . Since
Wp−1 ∈ T1 ∩ T2 , the columns of Wp−1 are always S-sparse enabling us to employ the uniform
result. This technical requirement restricts our results to only S-sparse w. However, we think that
the proof technique may be improved to work for a completely dense vector w as is suggested by the
numerical experiments in Section 2.
We also need to show that (16) holds. To that end, note that by Corollary 1 in Section 3.5 below,
the linear map A is well-conditioned on T1 ∩ T2 , and hence, for Z ∈ Null(A), we have
kAR(Z)k2F = |hZ, RA∗ AR(Z)i|
≥ |hZ, (RA∗ AR − R)Zi + hZ, R(Z)i|
≥ kR(Z)k2F − kRA∗ AR − RkkR(Z)k2F .
Corollary 1 shows that kRA∗ AR − Rk ≤ 1/8. Using this fact in the inequality above proves (16).
Finally, the choice of upper bounds on L and N in the statement of the theorem is the tightest
upper bound that conforms to all the lemmas and corollaries, and uses the fact that L/Q = P =
0.5 log2 (4βK log(LN )) derived above. The nuclear norm minimization recovers the true solution
when all of the above conclusion hold true. The failure probability of each of the lemmas and
corollaries is less than or equal to (LN )−β+4 , and hence, using the union bound, the probability
that none of the above items fail is 1 − O((LN )−β+4 ).
This completes the proof of Theorem 1.
3.4
Concentration Inequalities
Most of the lemmas below require an application of either the uniform version, or the Orlicz-norm
version of the matrix Bernstein inequality to control the operator norm of the sum of independent
random matrices. Before stating them, we give an overview of the Orlicz-norm results that are
used later in the exposition.
We begin by giving basic facts about subgaussian and subexponential random variables that are
used throughout the proofs. The proofs of these facts can be found in any standard source; see, for
example, [31].
The Orlicz norms of a scalar random X are defined as
|X|α
kXkψα := inf u > 0 : E exp
≤ 2 , α ≥ 1.
uα
20
DRAFT – December 18, 2017 – 2:26
The Orlicz-norm of a vector kzkψα , and a matrix kZkψα are then defined by setting X = kzk2 ,
and X = kZk, respectively, in the above definition. Therefore, we restrict our discussion below to
scalar random variables, and it can trivially extended to vectors and matrices using above mentioned
equivalence.
Some of the key facts relating the Orlicz norms of subgaussian and subexponential random variables
are as follows. A subgaussian random variable X can be characterized by the fact that its Orlicz-2
norm is always finite, i.e., kXkψ2 < ∞. Similarly, for a subexponential r.v., we have kXkψ1 < ∞.
A random variable X is subgaussian iff X 2 is subexponential. Furthermore,
kXk2ψ2 ≤ kX 2 kψ1 ≤ 2kXk2ψ2 .
(33)
At some points in the proof, we are interested in bounding kX − E Xkψα . A coarse bound is
obtained by using the triangle inequality,
kX − E Xkψα ≤ kXkψα + k E Xkψα
followed by Jensen’s inequality, k E Xkψα ≤ E kXkψα = kXkψα , which further implies that
kX − E Xkψα ≤ 2kXkψα .
(34)
We also find it handy to have a generalized version of the above fact; namely, the product of two
subgaussian random variables X1 , and X2 is subexponential, and
kX1 X2 kψ1 ≤ CkX1 kψ2 kX2 kψ2 ,
(35)
for some C > 0.
As we are working with Gaussian random variables mostly in the proofs, some of the useful identities
for a Gaussian vector g ∼ Normal(0, IM ) are: For a fixed vector z, the random variable hg, zi is
also Gaussian, and hence, |hg, zi|2 must have a subexponential tail behavior, and it can be easily
verified that
2
P{|hg, zi|2 > λ} ≤ e−λ/kzk2
for every scalar λ ≥ 0. Moreover, the `2 -norm of g is strongly concentrated about its mean, and
there exists C > 0 such that
P{kgk22 > λM } ≤ Ce−λ .
This tail behavior of a random variable completely defines its Orlicz-norm. Specifically, for a
subexponential random variable X,
P{X > u} ≤ αe−βu =⇒ kXkψ1 ≤ (1 + α)/β.
(36)
This completes the required overview.
We now state the matrix Bernstein inequalities, which is heavily used in the proofs below.
Proposition 1 (Uniform Version [30], [17]). Let Z1 , Z2 , . . . , ZQ be iid random matrices with dimensions M × N that satisfy E(Zq ) = 0. Suppose that kZq k < U almost surely for some constant
U , and all q = 1, 2, 3, . . . , Q. Define the variance as
Q
Q
X
X
2
σZ
= max
(E Zq Zq∗ ) ,
(E Zq∗ Zq )
.
(37)
q=1
q=1
21
DRAFT – December 18, 2017 – 2:26
Then, there exists C > 0 such that , for all t > 0, with probability at least 1 − e−t ,
n p
o
kZ1 + Z2 + · · · + ZQ k . max σZ t + log(M + N ), U (t + log(M + N )) .
(38)
The version of Bernstein listed below depends on the Orlicz norms kZkψα , α ≥ 1 of a matrix Z,
defined as
kZkα
≤ 2}, α ≥ 1.
(39)
kZkψα = inf{u > 0 : E exp
uα
Proposition 2 (Orlicz-norm Version [17]). Let Z1 , Z2 , . . . , ZQ be iid random matrices with dimensions M × N that satisfy E(Zq ) = 0. Suppose that kZq kψα ≤ Uα for some constant Uα > 0, and
2 as in (37). Then, there exists C > 0 such that, for all
q = 1, 2, 3, . . . , Q. Define the variance σZ
−t
t > 0, with probability at least 1 − e ,
p
1
QUα2
α
kZ1 + Z2 + · · · + ZQ k . max σZ t + log(M + N ), Uα log
(t + log(M + N )) . (40)
2
σZ
3.5
Key lemmas
This section provides the important lemmas that constitute the main ingredients to establish the
uniqueness conditions (16), and (17) for our construction of the dual certificate Y in the previous
section.
Conditioning on T1 ∩ T2
The results in this section concern the conditioning of the linear maps A, and Ap when restricted
to the space T1 ∩ T2 .
Lemma 4. Let the coherences µ2max , µ20 , and ρ20 be as defined in (9), (26), and (10), respectively.
Fix β ≥ 2. Choose the subsets Γp := {(∆n,p , n)}n constructed as in Section 3.1, so that, for
p ∈ {2, 3, . . . , P },
|∆n,p | = Q ≥ Cβ(µ20 K + µ2max S) log2 (LN ),
for some sufficiently large C > 0. Then the linear operators Ap , and Sp‡ defined in (19) and (25),
obey
max
2≤p≤P
RA∗p Ap Sp‡ R − R ≤
1
2
(41)
with probability at least 1 − (P − 1)(LN )−β ≥ 1 − (LN )−β+1 .
Lemma 5. Let the coherences µ2max , µ20 , ρ20 be as in Lemma 4. Fix β ≥ 1. Choose ∆n,1 such that
|∆n,1 | = Q ≥ Cβ(µ20 K + µ2max S)(L/Q)1/2 log2 (LN ),
for some sufficiently large C > 0. Then the linear operator A1 defined in (19) obeys
r
L
1 Q
∗
∗
kRA1 A1 R − E RA1 A1 Rk ≤
Q
8 L
with probability at least 1 − (LN )−β .
22
DRAFT – December 18, 2017 – 2:26
(42)
(43)
Corollary 1 (Corollary of Lemma 5). Let the coherences µ2max , µ20 , and ρ20 be as in Lemma 4. Fix
β ≥ 1. Assume that
L ≥ Cβ(µ20 K + µ2max S) log2 (LN ),
for some sufficiently large C > 0. Then the linear operator A defined in (7) obeys
1
8
kRA∗ AR − Rk ≤
with probability at least 1 − (LN )−β .
Lemma 6. Let µ2max be as in Lemma 4. Fix β ≥ 2. Then there exists a constant C such that
|∆n,1 | = Q ≥ Cβµ2max S(L/Q) log(LN )
implies that the linear operator A1 defined in (19) obeys
L
1
E RA∗1 A1 R − R ≤
Q
8
r
Q
L
with probability at least 1 − (LN )−β+1 .
Coherences of iterates
In this section, we define the coherences of the iterates Wp in (29), and show that these coherences
can be bounded in terms of µ0 , and ρ0 in (26), and (10), respectively. The coherences are defined,
‡
among other variables, in terms of Sn,p
in (23), and Dn := IK ⊗ en e∗n . The partition {(∆n,p , n)}n,p
is as defined in Section 3.1, and we assume the implications of restricted isometry property in (22)
as given. Moreover, we also take the results of Lemma 4, 5, and 6 as true. The following results
are in order then.
Lemma 7. Define5
ρ2p :=
Q
N max
L 1≤n0 ≤N
b∗`0 Sn‡ 0 ,p+1 Wp Dn0
X
`0 ∈∆n0 ,p+1
Then
r
−p
ρp ≤ 2
2
2
for every p ∈ {1, 2, 3, . . . , P }.
Q
ρ0 for every p ∈ {1, 2, 3, . . . , P }.
L
(44)
(45)
Lemma 8. Define
Q2
νp2 :=
N max
L 1≤n0 ≤N
"
max
`0 ∈∆n0 ,p+1
b∗`0 Sn‡ 0 ,p+1 Wp Dn0
2
2
#
, for every p ∈ {1, 2, 3, . . . , P }.
(46)
Fix β ≥ 1. Then there exists a constant C such that
Q ≥ Cβ(µ20 K + µ2max S) log2 (LN )
implies
νp ≤ 2−p+3 µ0 ρ0 for every p ∈ {1, 2, 3, . . . , P }
with probability at least 1 −
(47)
(LN )−β .
5
We use the index variables `0 , and n0 as ` and n are already reserved to index the set Γp in the proofs of these
lemmas.
23
DRAFT – December 18, 2017 – 2:26
Lemma 9. Define
µ2p
N
Q2 X
:=
L 0
n =1
"
max
`0 ∈∆n0 ,p
b∗`0 Sn‡ 0 ,p+1 Wp Dn0
2
2
#
for every p ∈ {1, 2, 3, . . . , P }.
(48)
Let Q, and N be the same as in Lemma 8 for sufficiently large C. Then
µp ≤ 2−p+2 µ0 for every p ∈ {1, 2, 3, . . . , P }
(49)
with probability at least 1 − (LN )−β .
Range of A∗
Finally, the results in this section help us establish that the dual certificate Y mostly lies in T1 ∩ T2 ,
that is, kR⊥ (Y )k ≤ 1/2; one of the uniqueness conditions in (17). Let Ap , Sp‡ and Wp be as in
(19), (25), and (29), respectively. In addition, let the coherences µp , ρp , and νp be as defined in
(48), (44), and (46), respectively. We shall take (49), (45), and (47) as given. The following results
are in order then.
Lemma 10. Fix β ≥ 4. Then there exists a constant C such that
Q ≥ Cβµ20 K max{(L/Q), log2 (LN )} log(LN ), and N ≥ Cβρ20 (L/Q) log(LN )
implies that
A∗p Ap Sp‡ (Wp−1 ) − E A∗p Ap Sp‡ (Wp−1 ) ≤ 2−p−1 for all p ∈ {2, 3, . . . , P }
holds with probability at least 1 − (LN )−β+4
Corollary 2 (Corollary of Lemma 10). Let A1 be as in (19), and coherences µ20 , and ρ20 be as in
(26), and (10), respectively. Fix β ≥ 1. Then there exist a constant C such that
Q ≥ Cβµ20 K max{(L/Q), log2 (LN )} log(LN ), and N ≥ Cβρ20 (L/Q) log(LN )
implies that
L
1
kA∗1 A1 (hm∗ ) − E A∗1 A1 (hm∗ )k ≤
Q
8
with probability exceeding 1 − (LN )−β .
Lemma 11. Assume further that the restricted isometry property in (22) holds. Then
k E A∗p Ap Sp‡ (Wp−1 ) − Wp−1 k ≤ 2−p−1 for all p ∈ {2, 3, . . . , P }
with probability at least 1 − (LN )−β+1
Lemma 12. Let A1 , µ2max , and ρ20 be as in (19), (9), and (10), respectively. Fix β ≥ 1. Then
there exists a constant C such that
L ≥ Cβµ2max S(L/Q) log(LN ), and N ≥ Cβρ20 (L/Q) log(LN )
implies that
L
1
E A∗1 A1 (hm∗ ) − hm∗ ≤
Q
8
with probability at least 1 − (LN )−β .
24
DRAFT – December 18, 2017 – 2:26
4
Proofs of the Key Lemmas
This section provides the proofs of all the key lemmas laid out in Section 1.3. All of the main
lemmas involve bounding the operator norm of a sum of independent random matrices with high
probability. The matrix Bernstein inequality is used repeatedly to compute such probability tail
bounds.
In the proof of the lemma below, the following calculations come in handy. Using the definition of
the projection R in (15), we can see that
R(b` φ∗`,n ) = (hh∗ b` )φ∗`,n + Pb` (mm∗ φ`,n )∗ − (hh∗ b` )(mm∗ φ`,n )∗ .
It also follows from the definition (15) that PR = RP = R. Another quantity of interest is
kR(b` φ∗`,n )k2F = hR(b` φ∗`,n ), b` φ∗`,n i, which can be expanded as
R(b` φ∗`,n )
2
F
= hhh∗ b` φ∗`,n , b` φ∗`,n i + hPb` φ∗`,n mm∗ , b` φ∗`,n i − hhh∗ b` φ∗`,n mm∗ , b` φ∗`,n i
= kφ`,n k22 |b∗` h|2 + kPb` k22 |m∗ φ`,n |2 − |b∗` h|2 |m∗ φ`,n |22
≤ kφ`,n k22 |b∗` h|2 + kPb` k22 |m∗ φ`,n |2 .
(50)
Moreover,
‡
R(Sn,p
b` φ∗`,n )
2
F
‡
‡
‡
‡
b` φ∗`,n i
b` φ∗`,n mm∗ , Sn,p
b` φ∗`,n i + hPSn,p
= hhh∗ Sn,p
b` φ∗`,n , Sn,p
‡
‡
b` φ∗`,n i
− hhh∗ Sn,p
b` φ∗`,n mm∗ , Sn,p
‡
‡
‡
h|2 |m∗ φ`,n |22
h|2 + kSn,p
b` k22 |m∗ φ`,n |2 − |b∗` Sn,p
= kφ`,n k22 |b∗` Sn,p
‡
‡
h|2 + kSn,p
b` k22 |m∗ φ`,n |2 .
≤ kφ`,n k22 |b∗` Sn,p
(51)
We are now ready to move on to the proof of Lemma 4 given below.
4.1
Proof of Lemma 4
Proof. The lemma concerns bounding the quantity kRA∗p Ap Sp‡ R−Rk for p ≥ 2. Using the definition
of Ap , and Sp‡ in (19), and (25), respectively, we expand the quantity RA∗p Ap Sp‡ R and evaluate its
expectation with the sets Γp fixed as follows
h
i
X
‡
E RA∗p Ap Sp‡ R =
R b` b∗` Sn,p
⊗ E φ`,n φ∗`,n R
(`,n)∈Γp
=
X
(`,n)∈Γp
h
i
‡
R b` b∗` Sn,p
⊗ Dn R.
From the construction of the sets Γp in Section 3.1, it is clear that (`, n) ∈ Γp means that for every
n, the index ` traverses the set ∆n,p . This means we can split the summation over Γp into an outer
‡
‡
sum over n and an inner sum over ` ∈ ∆n,p . Moreover, by definition R = RP, and PSn,p
= Sn,p
.
The following equality is now in order.
h
i
X X
‡
E RA∗p Ap Sp‡ R =
R Pb` b∗` PSn,p
⊗ IKN R.
n `∈∆n,p
25
DRAFT – December 18, 2017 – 2:26
‡
It is now easy to see by using the definition of Sn,p
in Section 1.3 that for p ≥ 2,
X
‡
Pb` b∗` PSn,p
= P,
`∈∆n,p
which implies that E RA∗p Ap Sp‡ R = R. Given this, we only need to control the term kRA∗p Ap Sp‡ R−
R(E A∗p Ap )Sp‡ Rk. By definitions of Ap , Sp‡ , and R in Section 3.1, we can write
h
i
X
‡
R b` b∗` Sn,p
⊗ φ`,n φ∗`,n R.
RA∗p Ap Sp‡ R =
(`,n)∈Γp
‡
Note that the action of the linear map Z`,n := R(b` b∗` Sn,p
⊗ φ`,n φ∗`,n )R on an L × KN matrix
h
i
‡
‡
X is Z`,n (X) = R b` b∗` Sn,p
⊗ φ`,n φ∗`,n R(X) = hX, R(Sn,p
b` φ∗`,n )iR(b` φ∗`,n ). It is clear from
this definition that Z`,n are rank-1 operators. Thus, we are asking the question of bounding the
operator norm of sum of independent operators Z`,n . Subtracting the expectation, we get
h
X
i
‡
R(A∗p Ap − E A∗p Ap )Sp‡ R =
⊗ φ`,n φ∗`,n − E φ`,n φ∗`,n R
R b` b∗` Sn,p
(`,n)∈Γp
=
X
(`,n)∈Γp
Z`,n − E Z`,n .
2 ; the
The operator norm of the sum can be controlled using Bernstein’s inequality. The variance σZ
main ingredient to compute the Bernstein bound, is in this case
X
X
2
∗
∗
σZ
:= max
− (E Z`,n )(E Z`,n )∗ ,
Z`,n − (E Z`,n )∗ (E Z`,n )
E Z`,n Z`,n
E Z`,n
(`,n)∈Γp
(`,n)∈Γp
X
X
∗
∗
≤ max
E Z`,n Z`,n
,
Z`,n
,
(52)
E Z`,n
(`,n)∈Γp
(`,n)∈Γp
where the last inequality follows from the fact that for two positive semidefinite (PSD) matrices
A, and B, kA − Bk ≤ kAk, whenever A − B is a PSD matrix. The first term in the maximum
in the variance expression is simplified below. As mentioned earlier, the linear operator Z`,n can
‡
be visualized as a rank-1 matrix R(b` φ∗`,n ) R(Sn,p
b` φ∗`,n ), and Z`,n (X) is just the product of the
rank-1 matrix above with the vectorized X, i.e.,
h
i
‡
Z`,n (X) = R(b` φ∗`,n ) R(Sn,p
b` φ∗`,n ) vec(X).
It is then easy to see that
∗
‡
Z`,n Z`,n
= kR(Sn,p
b` φ∗`,n )k2F · R(b` φ∗`,n ) R(b` φ∗`,n ) ,
where
R(b` φ∗`,n ) R(b` φ∗`,n ) = R b` b∗` ⊗ φ`,n φ∗`,n R.
Thus,
X
(`,n)∈Γp
∗
E Z`,n Z`,n
=
X
(`,n)∈Γp
‡
E kR(Sn,p
b` φ∗`,n )k2F R b` b∗` ⊗ φ`,n φ∗`,n R .
26
DRAFT – December 18, 2017 – 2:26
We remind the reader that the expectation is only over φ`,n , not over the randomness in the
construction of the partition Γp . Using the expansion in (50), the above quantity is upper bounded
by
X
(`,n)∈Γp
‡
‡
E kφ`,n k22 |b∗` Sn,p
h|2 + kSn,p
b` k22 |m∗ φ`,n |2 R b` b∗` ⊗ φ`,n φ∗`,n R
‡
≤ max kB̂Sn,p
hk2∞
X
n
(`,n)∈Γp
E kφ`,n k22 R b` b∗` ⊗ φ`,n φ∗`,n R
‡
+ max kSn,p
b` k22
`,n
‡
= max kB̂Sn,p
hk2∞
X
n
+
(`,n)∈Γp
X
(`,n)∈Γp
E |m∗ φ`,n |2 R b` b∗` ⊗ φ`,n φ∗`,n R
R b` b∗` ⊗ E(kφ`,n k22 φ`,n φ∗`,n ) R
16 2 SL
µ
9 max Q2
X
(`,n)∈Γp
R b` b∗` ⊗ E |m∗ φ`,n |2 φ`,n φ∗`,n R ,
(53)
where in the last equality, we made use of the linearity of Kronecker operator, and the bound
‡
‡
max kSn,p
b` k22 ≤ max kPb` k22 kSn,p
k22 ≤
`,n
`,n
16 2 SL
µ
,
9 max Q2
where we have in turn used the Cauchy Schwartz inequality; the fact that the non-zero rows and
‡
columns of Sn,p
are supported on the index set Ω; and the last inequality is the result of (9),
together with (24). It is then easy to verify that
E kφ`,n k22 φ`,n φ∗`,n = (K + 2)Dn ,
and
E |m∗ φ`,n |2 φ`,n φ∗`,n = (kmn k22 + 2mn m∗n )Dn .
Applying this and the facts that R = RP, and kRk ≤ 1, the above expression simplifies to
X
‡
∗
E Z`,n Z`,n
≤ (K + 2) max kB̂Sn,p
hk2∞
X
n
(`,n)∈Γp
+
(`,n)∈Γp
16 2 SL
µmax 2 max kmn k22
n
3
Q
Pb` b∗` P ⊗ Dn
X
(`,n)∈Γp
Using the definition of coherences in (26), and (10) and the fact that
that for an arbitrary matrix A, kA ⊗ Ik = kAk,
X X
n `∈∆n,p
P
(K + 2)L
2
2 SL
µ20
+
µ
ρ
· max
max 0 2
n
Q2
Q N
5 2 K + 2 20 2
2 S
≤
µ
+ µmax ρ0
,
4 0 Q
3
QN
∗
E Z`,n Z`,n
≤
27
DRAFT – December 18, 2017 – 2:26
Pb` b∗` P ⊗ Dn .
n IK
⊗ en e∗n = IKN , and
X
`∈∆n,p
Pb` b∗` P
where the last inequality follows from (22). The computation for the second term in the maximum
of variance expression (52) follows a very similar route. In short,
X
(`,n)∈Γp
∗
E Z`,n
Z`,n =
X
(`,n)∈Γp
‡
E kR(b` φ∗`,n )k2F R(b` b∗` Sn,p
⊗ φ`,n φ∗`,n )R
2
2 S
2K
· max
≤ 3 µ0 + µmax ρ0
n
L
LN
K
S
,
≤ 3 µ20 + µ2max ρ20
L
LN
X
`∈∆n,p
‡
Pb` b∗` PSn,p
(54)
‡
the last line is the result of the definition of Sn,p
in (23). This completes the calculation of the
variance term.
The second ingredient in the Bernstein bound is the calculation of the Orlicz norms of the summands. From (34), it follows that
kZ`,n − E Z`,n kψ1 ≤ 2kZ`,n kψ1 .
(55)
Since Z`,n is rank-1, its operator norm simplifies to
‡
kZ`,n k = kR(b` φ∗`,n )kF kR(Sn,p
b` φ∗`,n )kF ,
and it is also easy to show that k E Z`,n k = 1. Let us begin by showing that the random variable
kR(b` φ∗`,n )kF is subgaussian. For this it is enough to prove that kkR(b` φ∗`,n )kF k2ψ2 < ∞. Now
using (33), we have
kkR(b` φ∗`,n )kF k2ψ2 ≤ kkR(b` φ∗`,n )k2F kψ1
S
2
2
2
2
≤ khk∞ · kkφ`,n k2 kψ1 + µmax k|hm, φ`,n i| kψ1
L
K
S
≤ C µ20 + µ2max ρ20
.
L
LN
(56)
In a very similar manner, one shows that
‡
‡
b` φ∗`,n )kF k2ψ2 ≤ kkR(Sn,p
b` φ∗`,n )k2F kψ1
kkR(Sn,p
S
‡
2
2
2
2
≤ C kBSn,p hk∞ · kkφ`,n k2 kψ1 + µmax k|hm, φ`,n i| kψ1
L
KL
SL
≤ C µ20 2 + µ2max ρ20 2
.
Q
Q N
Using (35), we now obtain
‡
kZ`,n kψ1 ≤ CkkR(Sn,p
b` φ∗`,n )kF kψ2 · kkR(b` φ∗`,n )kF kψ2
L
2K
2
2 S
≤C
µ0 + µmax ρ0
.
Q
L
LN
Thus kZ`,n − E Z`,n k is a sub-exponential random variable; hence, α = 1 in (40), which gives
(QN )U12
log
≤ C log M,
(57)
2
σZ
28
DRAFT – December 18, 2017 – 2:26
where M = µ20 KN + µ2max ρ20 S ≤ C(LN ), the last inequality being the result of µ20 ≤ L, µ2max ≤ L,
and ρ20 ≤ N , and that L ≥ S, K.
Plugging the upper bound on the variance in (54), and (57) in (40), we have by using t = β log(LN )
that
kRA∗p Ap Sp‡ R − Rk ≤
(s
)
K
K
S
S
C max
log(LN ), β µ20 + µ2max ρ20
log2 (LN )
β µ20 + µ2max ρ20
Q
QN
Q
QN
(58)
with probability at least 1 − (LN )−β . The result in the statement of the lemma follows by choosing
Q, and N as in the statement of the lemma for a sufficiently large constant C.
4.2
Proof of Lemma 5
Proof. Lemma 4 considers bounding the quantity kRA∗p Ap Sp‡ R − Rk for p ≥ 2. The proof of this
corollary is very similar to the proof of Lemma 4, and basically follows by replacing Ap with A1 ,
and Sp‡ with (L/Q)P. Therefore, we lay out the steps very briefly. Start by expressing the quantity
of interest as a sum of independent random linear maps
L
L X
R(A∗1 A1 − E A∗1 A1 )R =
R b` b∗` ⊗ φ`,n φ∗`,n − E φ`,n φ∗`,n R,
Q
Q
(`,n)∈Γ1
Define Z`,n := (L/Q)R b` b∗` ⊗ φ`,n φ∗`,n R. Since the linear maps Z`,n can be thought of as
symmetric matrices
Z`,n = R(b` φ∗`,n ) R(b` φ∗`,n ),
∗
∗ Z
this means Z`,n
`,n = Z`,n Z`,n . Therefore, for the variance it suffices to compute
X
(`.n)∈Γ1
∗
Z`,n =
Z`,n
L2
Q2
X
(`.n)∈Γ1
kR(b` φ∗`,n )k2F R b` b∗` ⊗ φ`,n φ∗`,n R .
Using (50), and a calculation that goes along the same lines as before, and employing (52), we can
compute the upper bound on the variance
2
σZ
L2
S
2
2
2
≤ 2 3KkB̂hk∞ + 3Cµmax
max kmn k2 · max
n
n
Q
L
µ2
S 1
≤ 3 K 0 + µ2max ρ20
.
Q
Q N
X
`∈∆n,1
Pb` b∗` P
The Orlicz norm turns out to be kZ`,n − E Z`,n kψ1 ≤ 2kZ`,n kψ1 ≤ C(L/Q)kkR(b` φ∗`,n )k2F kψ1 , which
from (56) is
2K
2
2 S
kZ`,n − E Z`,n kψ1 ≤ C µ0 + µmax ρ0
.
Q
QN
This shows that Z`,n are sub-exponential, and thus using α = 1 in the definition of U1 in Proposition
2, one obtains
QN U12
log
≤ C log µ20 KN + µ2max ρ20 S ≤ C log(LN ).
2
σZ
29
DRAFT – December 18, 2017 – 2:26
With this, we have all the ingredients to compute the deviation bound. Apply Bernstein inequality
in Proposition 2, and choose t = (β − 1) log(LN ) to obtain
L
kRA∗1 A1 R − E RA∗1 A1 Rk
Q
(s
)
K
K
S
S
2
2
2
2
≤ C max
β µ20 + µ2max ρ20
log(LN ), β µ0 + µmax ρ0
log (LN )
Q
QN
Q
QN
(59)
with probability at least 1−(LN )−β . The choice of Q, and N in (42)
q for a sufficiently large constant
C in there guarantees that the right hand side is smaller than 18 Q
L.
4.3
Proof of Corollary 1
Proof. The proof is exactly same as in Lemma 5 except now instead of using A1 that is defined
over a the subset Γ1 ⊂ [L] × [N ], we instead use a linear operator A defined over the entire set
Γ := {(`, n) ∈ [L] × [N ]} of measurements. This means, we only need to replace A1 with A, defined
in (7), and Q = |∆n,1 | with L = |Γ|. In addition, note that E A∗ A = I, where I is an identity
operator, i.e., I(X) = X for a matrix X. Making these changes in the proof of Lemma 5, one
obtains the result claimed in the statement of the corollary.
4.4
Proof of Lemma 6
Proof. Note that by using the definition of A1 in (19), we have
X
R E A∗1 A1 R =
R b` b∗` ⊗ E φ`,n φ∗`,n R
(`,n)∈Γ1
=
X
n
R
X
`∈∆n,1
6 R.
b` b∗` ⊗ Dn R =
The operator norm of the quantity of interest can then be simplified using the definition of Sn,1 in
Section 3.1, and the facts that R = PR = RP, and RPR = R as follows
X
X
L
L
R E A∗1 A1 R − R =
R
b` b∗` ⊗ Dn R − R
Q
Q
n
`∈∆n,1
XL
X
=
R
Pb` b∗` P ⊗ Dn R − R
Q
n
`∈∆n,1
≤
X X
L
Q
L
Pb` b∗` P ⊗ Dn − P kRk ≤
kRk
· max
n
Q
L
Q
n
`∈∆n,1
X
`∈∆n,1
Pb` b∗` P −
Q
P . (60)
L
We can apply the uniform result in (22) to bound the last quantity above, but really a weaker
nonuniform result from the compressive sensing literature [8] suffices, and also results in an overall
30
DRAFT – December 18, 2017 – 2:26
tighter bound on Q than a simple application of the uniform result in (21) would give. The nonuniform result says that there exists a constant C, such that for any 0 < < 1, and 0 < δ < 1,
whenever
µ2 S
max{log L, log(1/δ)},
Q ≥ C max
2
then
X
Q
Q
Pb` b∗` P − P ≤
L
L
`∈∆n,1
p
with probability at least 1 − δ. Specifically, taking = 1/8 Q/L, δ = (LN )−β says that taking
Q ≥ Cβµ2max S(L/Q) log(LN ),
is enough to guarantee that
X
`∈∆n,1
Pb` b∗` P
Q
1
− P ≤
L
8
Q
L
3/2
with probability at least 1 − (LN )−β . Now a union bound over N sets in the partition {∆n,1 }n
means that
X
1 Q 3/2
Q
∗
max
Pb` b` P − P ≤
n
L
8 L
`∈∆n,1
with probability at least 1 − N (LN )−β ≥ 1 − (LN )1−β .
Plugging this result in (60) proves the lemma.
4.5
Proof of Lemma 7
Proof. As a direct implication of the restricted isometry property in (22), and later using (24), one
obtains
X
5Q ‡
20 L
kb∗`0 Sn‡ 0 ,p Wp Dn0 k22 ≤
kSn0 ,p Wp Dn0 k22 ≤
kWp Dn0 k2F .
4L
9
Q
0
` ∈∆n0 ,p
From the definition of Wp in (29), and Cauchy Schwartz inequality, we have
" p
#"
#
2
Y
L
kWp Dn0 k2F ≤
kRA∗p Ap Sp‡ R − Rk2
max
kW0 Dn0 k2F .
RA∗1 A1 R − R
n0
Q
k=2
Using (31), and (41), we can verify that
ρ2p ≤ 4−p
Q
N max
kW0 Dn0 k2F , for each p ∈ {1, 2, 3, . . . , P }.
n0
L
Finally, from the definition of ρ20 , and that W0 = −hm∗ , we can conclude that
kW0 Dn0 k2F = khk22 km∗ Dn0 k22 = kmn0 k22 ≤ ρ20 /N,
which, if plugged back in the above bound on ρ2p , completes the proof of the lemma.
31
DRAFT – December 18, 2017 – 2:26
4.6
Proof of Lemma 8
Proof. Our exposition is different for p ∈ {2, 3, . . . , P }, and p = 1 owing to the difference in the
iterative construction of the dual certificate for these choice of p. We start by considering νp2 for
p ∈ {2, 3, . . . , P }. The following lemma provides an upper bound on kb∗`0 Sn‡ 0 ,p+1 Wp Dn0 k22 that is in
turn used to bound νp2 .
Lemma 13. Let
Π2p
Q
:= C K|b∗`0 Sn‡ 0 ,p+1 h|2
L
"
#
max
`∈∆n0 ,p
kb∗` Sn‡ 0 ,p Wp−1 Dn0 k22
+
S
Cµ2max
Q
km
n0
k22
max max
n
`∈∆n,p
‡
kb∗` Sn,p
Wp−1 Dn k22
,
(61)
and
Λ2p := C
µ20 K ∗ ‡
S2
|b`0 Sn0 ,p+1 h|2 + µ4max ρ20 2 kmn0 k22
L
Q N
"
max
`∈∆n0 ,p
b∗` Sn‡ 0 ,p Wp−1 Dn0
2
2
#
.
(62)
‡
Let Wp , Sn,p
be as defined in (28), and (23); and assume that the restricted isometry property in
(22) holds. Fix β ≥ 1. Then there exists a constant C such that
kb∗`0 Sn‡ 0 ,p+1 Wp Dn0 k22 ≤ C max βΠ2p log(LN ), β 2 Λ2p log4 (LN ) , for every p ∈ {2, 3, . . . , P }. (63)
with probability at least 1 − (LN )−β .
Lemma 8 is established in Section 5. Using (63), it is clear that the upper bound on νp2 in (46)
can be obtained by evaluating the maximum of the quantities Πp , and Λp over `0 ∈ ∆n0 ,p+1 , and
n0 ∈ [N ].
Putting this together with (26), (10), and (46) directly implies that
"
#
L
2
2K
2
2 S
2
max
max Πp ≤ C µ0 + µmax ρ0
νp−1
,
n0
`0 ∈∆n0 ,p+1
Q
QN
Q2 N
and
"
max
0
n
#
max
`0 ∈∆n0 ,p+1
Λ2p
S2
L
4 K
4 4
2
≤ C µ0 2 + ρ0 µmax 2 2 νp−1
.
Q
Q N
Q2 N
Choosing Q, and N as in Lemma 8 results in
1 2
νp2 ≤ νp−1
for each p ∈ {2, 3, . . . , P }
4
(64)
with probability at least 1 − (LN )−β .
For the remaining case of p = 1,
Q2
ν12 =
N max
n0
L
"
max
`0 ∈∆n0 ,2
b∗`0 Sn‡ 0 ,2 W1 Dn0
32
DRAFT – December 18, 2017 – 2:26
2
2
#
,
and using the definition of W1 in (29)
#
"
2
2
L
Q
ν12 =
N max
max b∗`0 Sn‡ 0 ,2
RA∗1 A1 (hm∗ ) − hm∗ Dn0
n0
`0 ∈∆n0 ,2
L
Q
2
"
#
2
2
L
Q
L
∗
∗
∗
∗
∗ ‡
≤ 2 N max
max b`0 Sn0 ,2
RA1 A1 (hm ) − E RA1 A1 (hm ) Dn0
+
n0
`0 ∈∆n0 ,2
L
Q
Q
2
#
"
2
L
Q2
∗ ‡
∗
∗
∗
.
max b`0 Sn0 ,2
E RA1 A1 (hm ) − hm Dn0
2 N max
n0
`0 ∈∆n0 ,2
L
Q
2
(65)
The following corollary provides a bound on the first term in the sum above.
Corollary 3 (Corollary of Lemma 13). Let
Q
∗L
2
∗ ‡
2
2
Π1 := C K|b`0 Sn0 ,2 h| max max kb` PW0 Dn0 k2
n `∈∆n,1
L
Q
S
2
2
2
∗L
+ Cµmax kmn0 k2 max max kb` PW0 Dn k2 ,
n `∈∆n,1
Q
Q
(66)
and
Λ21 := C
µ20 K ∗ ‡
S2
|b`0 Sn0 ,2 h|2 + µ4max ρ20 2 kmn0 k22
L
Q N
"
max max
n
`∈∆n,1
L
b∗` PW0 Dn0
Q
2
#
.
(67)
2
Let Q be as in Lemma 13. Let
s∗`0 ,n0 := b∗`0 Sn‡ 0 ,2
L
L
RA∗1 A1 (hm∗ ) − E RA∗1 A1 (hm∗ ) Dn0 ,
Q
Q
(68)
Assume that the restricted isometry property in (22) holds. Fix β ≥ 1. Then there exists a constant
C such that
ks`0 ,n0 k22 ≤ C max βΠ21 log(LN ), β 2 Λ21 log4 (LN )
with probability at least 1 − (LN )−β .
The proof of this corollary is provided in Section 5.
It is easy to see using the definitions (26), and (10) that
L
2
2K
2
2 S
max Π1 ≤ C µ0 + µmax ρ0
max
µ20 ρ20 2 ,
0
0
n ` ∈∆n0 ,2
Q
QN
Q N
and
max
max
0
0
n
` ∈∆n0 ,2
Λ21
S
L
4 K
4 4
≤ C µ0 2 + ρ0 µmax
µ20 ρ20 2 .
Q
QN
Q N
Using these calculations, the first term in (65) can be bounded by applying Corollary 3, and choosing
Q as in Lemma 47 for a large enough constant C to achieve
"
#
Q2
1
2
(69)
N max
max ks`0 ,n0 k2 ≤ µ20 ρ20 .
n0
`0 ∈∆n0 ,2
L
4
As for the second term in the sum in (65), the lemma below provides an upper bound.
33
DRAFT – December 18, 2017 – 2:26
Lemma 14. Define
r`∗0 ,n0
:=
b∗`0 Sn‡ 0 ,2
L
∗
∗
∗
E RA1 A1 (hm ) − hm Dn0 ,
Q
and assume that (24) holds. Then
9 ∗ ‡
L2
2
2
∗ ‡
2
kr`0 ,n0 k2 ≤
kb 0 S 0 hk + 2 2 max kb`0 Sn0 ,2 Sn,1 hk2 kmn0 k22 .
2 ` n ,2 2
Q n
(70)
(71)
Proof. The proof of this lemma is provided in Section 5.
As for the second term in (65), we appeal to Lemma 14, and directly obtain after evaluating the
maximum over `0 ∈ ∆n0 ,2 , and n0 ∈ [N ] in (71), and using the definition of coherences µ20 , and ρ20 ,
that
"
#
Q2
2
N max
max kr`0 ,n0 k2 ≤ 6.5µ20 ρ20 .
(72)
n0
`0 ∈∆n0 ,2
L
Plugging (69), and (72) in (65) shows that ν1 ≤ 4µ0 ρ0 . Combining this fact with (64) completes
the proof of the lemma.
4.7
Proof of Lemma 9
Proof. We first consider the case for p ∈ {2, 3, . . . , P }. Using Lemma 13, we have a bound on the
‡
Wp Dn0 k22 for p ≥ 2 in terms of Λ2p , and Π2p in (62), and (61), respectively. A
quantity kb∗`0 Sn,p
corresponding bound on µ2p above is then
µ2p
(
"
#
"
#
)
X
X
Q2
2
2
2
4
≤C
max
max Πp β log(LN ),
max Λp β log (LN ) .
`0 ∈∆n0 ,p
`0 ∈∆n0 ,p
L
0
0
n
(73)
n
Using the definitions of the coherences νp2 , and µ2p of P
the iterates Wp in (46), and (48); the definition
2
of the coherence µ0 of h in (26); and the fact that n0 kmn0 k22 = 1, one can verify from (62), and
(61) that
"
#
X
L
16 2
SL
2
2 2
2
max Πp ≤ C µ0 µp−1 K 3 + µmax νp−1 3
,
`0 ∈∆n0 ,p
Q
9
Q N
0
n
and
"
X
n0
#
max
`0 ∈∆n0 ,p
Λ2p
≤C
µ40
2
K
4
4 S
+
µ
ρ
max 0 2 2
Q2
Q N
µ2p−1
L
.
Q2
Plugging back in (73), and choosing Q and N as in Lemma 8 for a large enough C is sufficient to
guarantee that
1 2
2
2
(74)
µp ≤ δ µp−1 + νp−1 , for each p ∈ {2, 3, . . . , P }.
N
34
DRAFT – December 18, 2017 – 2:26
for arbitrarily small number δ that lies between zero and one. Bounding µ2p iteratively using the
2 , p ∈ {2, 3, . . . , P }, and now using (47), and the fact
above relation gives µ2p ≤ δ p−1 µ21 + (2δ/N )νp−1
2
that ρ0 ≤ N , we have
µ2p ≤ δ p−1 µ21 + 2δ4−p+3 µ20 , for each p ∈ {2, 3, . . . , P }.
All that remains now is to bound µ21 , which from (48) is
"
2 X
Q
µ21 :=
max b∗0 S ‡ 0 W1 Dn0
L 0 `0 ∈∆n0 ,2 ` n ,2
n
2
2
(75)
#
.
Using the definition of W1 in (28) followed by an application of a simple identity (a+b)2 ≤ 2(a2 +b2 ),
we have
2
L
L
∗ ‡
∗ ‡
∗
∗
∗
∗
b`0 Sn0 ,2 W1 Dn0 ≤ 2 b`0 Sn0 ,2
RA1 A1 (hm ) − E RA1 A1 (hm ) Dn0 +
Q
Q
2
2
2
L
E RA∗1 A1 (hm∗ ) − hm∗ Dn0 .
2 b∗`0 Sn‡ 0 ,2
Q
2
An application of Corollary 3 gives
2
Q2 X
L
L
∗
∗
∗
∗
∗ ‡
0
max
S
RA
A
(hm
)
−
E
RA
A
(hm
)
D
b
0
0
n
1 1
1 1
L 0 `0 ∈∆n0 ,2 ` n ,2 Q
Q
2
n
(
)
N
Q2 X
max β 0 max Π21 log(LN ), β 2 0 max Λ21 log4 (LN ) .
≤C
` ∈∆n0 ,2
` ∈∆n0 ,2
L 0
(76)
n =1
Using the fact that W0 = hm∗ , it is easy to see that
"
#
!
N
Q2 X
SL
2
∗ ‡
2
2
2
∗ 2
max Π ≤ C KQ max
max |b`0 Sn0 ,2 h| + µmax
max kmn k2
max max |b` h| ,
n `∈∆n,1
n0 `0 ∈∆n0 ,2
L 0 `0 ∈∆n0 ,2 1
Q n
n =1
where we have used the fact that the fact that
have the upper bound
P
n0
kmn0 k22 = 1. By definitions (26), and (10), we
N
Q2 X
2
4K
2
2 2 S
max Π ≤ C µ0 + µmax µ0 ρ0
.
L 0 `0 ∈∆n0 ,2 1
Q
QN
n =1
In a similar manner, one can show that
N
Q2 X
S2 4 1 2
2
4 K
4
max Λ ≤ C µ0 2 + µmax 2 ρ0 2 µ0 .
L 0 `0 ∈∆n0 ,2 1
Q
Q
N
n =1
Now with the choice of Q, and N in the statement of lemma for some suitably large constant, one
can show that
2
Q2 X
1
L
L
∗ ‡
∗
∗
∗
∗
0
max
b
S
RA
A
(hm
)
−
E
RA
A
(hm
)
D
≤ µ20 ,
0
0
n
1 1
1 1
L 0 `0 ∈∆n0 ,2 ` n ,2 Q
Q
2
2
n
35
DRAFT – December 18, 2017 – 2:26
where the last inequality follows from ρ20 ≤ N . For the remaining term, using Lemma 14, and taking
summation over n0 followed by maximum over `0 ∈ ∆n0 ,2 on both sides, and using the definition
(26), we obtain
"
#
2
Q2 X
9 2
L
∗
∗
∗
2
∗ ‡
max b 0 S 0
E RA1 A1 (hm ) − hm Dn0
µ0 + 2µ0 = 6.5µ20 .
≤
L 0 `0 ∈∆n0 ,2 ` n ,2 Q
2
2
n
Plugging back returns µ21 ≤ 14µ20 . Combining this with (75) for a small enough δ means that we
can bound
µ2p ≤ 4−p+2 µ20 , for each p ∈ {1, 2, 3, . . . , P }.
This completes the proof.
4.8
Proof of Lemma 10
Proof. The proof concerns bounding deviation of A∗p Ap Sp‡ (Wp−1 ) from its mean, and we resort to
the matrix Bernstein inequality to control it. By definition of Ap , and Sp‡ in Section 1.3, we have
X
X
‡
‡
Wp−1 φ`,n φ∗`,n ,
b` b∗` Sn,p
⊗ φ`,n φ∗`,n )(Wp−1 ) =
A∗p Ap Sp‡ (Wp−1 ) =
(b` b∗` Sn,p
(`,n)∈Γp
(`,n)∈Γp
and its expected value is
E A∗p Ap Sp‡ (Wp−1 ) =
X
X
‡
Wp−1 E φ`,n φ∗`,n =
b` b∗` Sn,p
‡
Wp−1 Dn .
b` b∗` Sn,p
(77)
(`,n)∈Γp
(`,n)∈Γp
Given this, the quantity of interest can now be expressed as the sum
X
‡
‡
A∗p Ap Sp‡ (Wp−1 ) − E A∗p Ap Sp‡ (Wp−1 ) =
b` b∗` Sn,p
Wp−1 φ`,n φ∗`,n − b` b∗` Sn,p
Wp−1 Dn
(`,n)∈Γp
of mean zero, independent random matrices
‡
‡
Wp−1 Dn .
Z`,n := b` b∗` Sn,p
Wp−1 φ`,n φ∗`,n − b` b∗` Sn,p
An application of the matrix Bernstein inequality in Proposition 2 requires us to compute a bound
2 . To this end
on the variance σZ
X
(`,n)∈Γp
∗
E Z`,n
Z`,n ≤
=
X
∗
‡
‡
E b` b∗` Sn,p
Wp−1 φ`,n φ∗`,n
b` b∗` Sn,p
Wp−1 φ`,n φ∗`,n
(`,n)∈Γp
X
(`,n)∈Γp
‡
E |b∗` Sn,p
Wp−1 φ`,n |2 φ`,n φ∗`,n ,
where again the first inequality is the result of the fact that kA − Bk ≤ kAk when A, B, and
A − B are PSD. An application of Lemma 15 shows that
‡
‡
E |b∗` Sn,p
Wp−1 φ`,n |2 φ`,n φ∗`,n 4 3kb∗` Sn,p
Wp−1 Dn k22 Dn ,
36
DRAFT – December 18, 2017 – 2:26
and taking the summation through returns
X
X
‡
‡
kb∗` Sn,p
Wp−1 Dn k22 Dn ,
E |b∗` Sn,p
Wp−1 φ`,n |2 φ`,n φ∗`,n 4 3
(`,n)∈Γp
(`,n)∈Γp
and thus the operator norm produces the variance
X
(`,n)∈Γp
∗
≤3
E Z`,n Z`,n
X
‡
kb∗` Sn,p
Wp−1 Dn k22 Dn
(`,n)∈Γp
= 3 max
n
X
`∈∆n,p
‡
kb∗` Sn,p
Wp−1 Dn k22 ≤ 3ρ2p−1
L
,
QN
(78)
where the last line follows from the definition of ρ2p in (44). In a similar manner, we can compute
X
(`,n)∈Γp
∗
≤
E Z`,n Z`,n
∗
‡
‡
Wp−1 φ`,n φ∗`,n
E b` b∗` Sn,p
Wp−1 φ`,n φ∗`,n b` b∗` Sn,p
,
X X
n `∈∆n,p
where the first inequality follows for exact same reasoning as before. The summand simplifies to
‡
Wp−1 φ`,n |2 kφ`,n k22 ,
b` b∗` E |b∗` Sn,p
and once the expectation is moved inside, we obtain
‡
Wp−1 φ`,n |2 kφ`,n k22 = 3Kkb∗` Sn,p Wp−1 Dn k22 ,
E |b∗` Sn,p
and using the orthogonality of {b` }` , the operator norm simplifies to
X
X
∗
‡
E Z`,n Z`,n
≤ 3K · max max
kb∗` Sn,p
Wp−1 Dn k22 ·
(`,n)∈Γp
1≤p≤P `∈∆n,p
≤ 3µ2p−1
n
X
b` b∗`
`∈∆n,p
KL
,
Q2
(79)
which follows by the definition of the coherence µ2p in (48). As per (37), the maximum of (78), and
(79) is the variance
KL
L
2
2
2
σZ ≤ 3 µp−1 2 + ρp−1
.
(80)
Q
QN
The fact that Z`,n are sub-exponential can be proven by showing that max`,n kZ`,n kψ1 < ∞. First,
note that
‡
kZ`,n kψ1 = kb` b∗` Sp‡ Wp−1 φ`,n φ∗`,n − b` b∗` Sp‡ Wp−1 Dn kψ1 ≤ 2kb` b∗` Sn,p
Wp−1 φ`,n φ∗`,n kψ1 .
Second, the operator norm of the matrix under consideration is
‡
‡
kb` b∗` Sn,p
Wp−1 φ`,n φ∗`,n k = kb` k2 kφ`,n k2 |b∗` Sn,p
Wp−1 φ`,n |.
37
DRAFT – December 18, 2017 – 2:26
‡
It is well-known that |b∗` Sn,p
Wp−1 φ`,n | is a subgaussian random variable for an arbitrary matrix
p
‡
‡
∗
Wp−1 with kb` Sn,p Wp−1 φ`,n√
kψ2 ≤ Ckb∗` Sn,p
Wp−1 Dn k2 ≤ Cνp−1 L/Q2 N . Also kφ`,n k2 is subgaussian with kkφ`,n k2 kψ2 ≤ K. This implies Uα in Proposition 2 is
∗ ‡
U1 := max max kkφ`,n k2 |b` Sn,p Wp−1 φ`,n |kψ1
n
`∈∆n,p
s
KL
‡
Wp−1 φ`,n kψ2 kkφ`,n kkψ2 ≤ Cνp−1
≤ max max kb∗` Sn,p
,
(81)
n
`∈∆n,p
Q2 N
which means
log
(QN )U12
2
σZ
2 KQN
νp−1
≤ C log M, where M :=
µ2p−1 KN + ρ2p−1 Q
.
Applying the coherence bounds in (45), (47), and (49), we have
M ≤ C(ρ20 Q + µ20 KN ) ≤ CLN,
where the last inequality follows from the fact that ρ20 ≤ N , µ20 ≤ L, and L ≥ K. Combining all the
ingredients gives us the final result and choosing t = (β − 1) log(LN ) in the Bernstein inequality
shows that
kA∗p Ap Sp‡ (Wp−1 ) − E A∗p Ap Sp‡ (Wp−1 )k ≤
s
s
2 ν 2 KL log4 (LN )
β
KL
L
p−1
C max
β µ2p−1 2 + ρ2p−1
log(LN ),
Q
QN
Q2 N
(82)
holds with probability at least 1 − (LN )−β . Using the union bound, it follows from Lemma 9, 7,
and 8 that at least one of the coherence bounds in (45), (47), and (49) fails with probability at
most (P − 1)3 (LN )−β . This means that all of the coherence bounds hold with probability at least
1 − (P − 1)3 (LN )−β ≥ 1 − (LN )−β+3 . Plugging the coherence bounds in (82), and choosing Q, and
N as in Lemma 10 for appropriately large constant C ensures that
kA∗p Ap Sp‡ (Wp−1 ) − E A∗p Ap Sp‡ (Wp−1 )k ≤ 2−p−1 , for each p ∈ {2, 3, . . . , P }
holds with probability at least 1 − (LN )−β+3 . Using union bound for P − 1 choices of p, we can
show that the above conclusion holds for all p ∈ {2, 3, . . . , P } with probability at least 1 − (P −
1)(LN )−β+3 ≥ 1 − (LN )−β+4 .
4.9
Proof of Corollary 2
Proof. The proof follows essentially from the proof of Lemma 10 by taking p = 1, and afterwards
‡
taking S1‡ = (L/Q)P, or equivalently, Sn,1
= (L/Q)P. The final bound is obtained by making the
above changes in (82), and is
kA∗1 A1 (L/Q)P(hm∗ ) − E A∗1 A1 (L/Q)P(hm∗ )k ≤
s
s
4
2
2
L
β ν0 KL log (LN )
KL
β µ20 2 + ρ20
log(LN ),
C max
Q
QN
Q2 N
(83)
for some constant C that may differ from the one in (82). Choosing Q, and N as in Corollary 2 for
a large enough C proves the corollary.
38
DRAFT – December 18, 2017 – 2:26
4.10
Proof of Lemma 11
Proof. Begin by noting that it is clear from (77) that for a fixed Γp , we have
E A∗p Ap Sp‡ (Wp−1 ) 6= Wp−1 ,
and if one takes the random construction of Γp into account, the dependence between Γ1 , Γ2 , . . . , Γp−1 ,
and Γp that in turn means that Wp−1 is dependent on Γp . This means there is no simple way to
write this quantity as a sum of independent random matrices and apply the matrix Bernstein inequality to control the size as before. Fortunately, we can work a uniform bound using restricted
isometry property that works for all matrices Wp−1 , and thus overcome the issues of intricate dependencies between Wp−1 and Γp . By the equivalence between operator, and Frobenius norm, we
have
k E A∗p Ap Sp‡ (Wp−1 ) − Wp−1 k2 ≤ k E A∗p Ap Sp‡ (Wp−1 ) − Wp−1 k2F
h
i 2
h
i
+ P⊥ E A∗p Ap Sp‡ (Wp−1 )
= P E A∗p Ap Sp‡ (Wp−1 ) − Wp−1
F
2
F
,
(84)
where the projection operator P is defined in (14), and P⊥ is the orthogonal complement. Note
that
h
i X X
‡
Wp−1 Dn .
P E A∗p Ap Sp‡ (Wp−1 ) =
Pb` b∗` PSn,p
n
`∈∆n,p
‡
Using the definition of Sn,p
in (23), it is clear that
X
‡
Pb` b∗` PSn,p
= P,
`∈∆n,p
h
i
which implies, using the fact that PWp−1 = Wp−1 , P E A∗p Ap Sp‡ (Wp−1 ) = Wp−1 . This means
(84) reduces to
h
i
k E A∗p Ap Sp‡ (Wp−1 ) − Wp−1 k2 ≤ P⊥ E A∗p Ap Sp‡ (Wp−1 )
2
F
.
As far as the second term in the above expression is concerned, using (77), one obtains
(`,n)∈Γp
‡
P⊥ b` b∗` Sn,p
Wp−1 Dn
2
2
2
X
=
X
‡
b` b∗` Sn,p
Wp−1 Dn
(`,n)∈Γp
F
=
X
(`,n)∈Γp
−
F
‡
kb∗` Sn,p
Wp−1 Dn k22
−
X
(`,n)∈Γp
‡
Pb` b∗` Sn,p
Wp−1 Dn
F
kWp−1 k2F .
The last equality follows from the fact that {b` }` are orthonormal vectors, Wp−1 Dn is orthogonal
‡
to Wp−1 Dn0 for n 6= n0 and by the definition of Sn,p
in (23). The matrix Wp−1 is dependent on
the sets ∆n,1 , ∆n,2 , . . . , ∆n,p−1 that are in turn dependent on ∆n,p by construction. However, we
can avoid this dependence issue here as the result in (22) is uniform in nature in the sense that it
39
DRAFT – December 18, 2017 – 2:26
holds for all S-sparse vectors. Employing this result on every column of Wp−1 ∈ Ω, we obtain
X
(`,n)∈Γp
‡
kb∗` Sn,p
Wp−1 Dn k22 =
≤
X X
n `∈∆n,p
‡
kb∗` Sn,p
Wp−1 Dn k22 ≤
5Q X ‡
kSn,p Wp−1 Dn k2F
4L n
X
5Q
20 L
‡
max kSn,p
k22
kWp−1 Dn k2F ≤
kWp−1 k2F ,
n
4L
9
Q
n
which holds with probability at least 1 − (LN )−β . This implies using the calculation above that
2
X
(`,n)∈Γp
‡
P⊥ b` b∗` Sn,p
Wp−1 Dn
≤
20 L
− 1 kWp−1 k2F .
9 Q
Now the decay rate of kWp kF in the statement of the lemma is sufficient to guarantee that
k E A∗p Ap Sp‡ (Wp−1 ) − Wp−1 k ≤ 2−p−1
for every p ∈ {2, 3, . . . , P }. Using the union bound as before, the statement can be extended to all
p ∈ {2, 3, . . . , P } with probability at least 1 − (LN )−β+1 .
4.11
Proof of Lemma 12
Proof. Using the definition of A1 , and after evaluating the expectation, it is easy to see that
X
E A∗1 A1 (hm∗ ) =
b` b∗` hm∗ Dn .
(`,n)∈Γ1
From Section 3.1, we know that Γ1 = {(∆n,1 , n)}n , where the sets |∆n,1 | = Q for every n, and are
˜ n,1 , n)}n , where ∆
˜ n,1 for each n are independent
chosen uniformly at random. Define a set Γ̃1 := {(∆
Bernoulli sets defined as
˜ n,1 := {` ∈ [L] | δ`,n = 1},
∆
where δ`,n is an independently chosen Bernoulli number for every `, and n that takes value one
with probability Q/L. Since the probability of failure the event
LX X
b` b∗` hm∗ Dn − hm∗ ≤
Q n
`∈∆n,1
for some number > 0 is a nonincreasing function of Q = |∆n,1 | for every n; this follows by
the orthogonality
of {b` }` , and by the fact that increasing |∆n,1 | only increases the range of the
P
projector `∈∆n,1 b` b∗` , and hence the distance in the operator norm above can either decrease or
stay the same. It now follows using Lemma 2.3 in [9] that the probability of failure of the event
above is less than or equal to twice the probability of failure of the event
L
Q
X
(`,n)∈Γ̃1
b` b∗` hm∗ Dn − hm∗ ≤ .
40
DRAFT – December 18, 2017 – 2:26
(85)
Therefore, in the rest of the proof it suffices to only consider the event above where the index sets
˜ n,1 defined above, we can write
˜ n,1 }n . Using the definition of the Bernoulli sets ∆
are {∆
X X
X
b` b∗` hm∗ Dn =
δ`,n b` b∗` hm∗ Dn ,
n `∈∆
˜ n,1
`,n
where on the right hand side the summation is over all ` ∈ [L]. Note that
X
L X
E
δ`,n b` b∗` hm∗ Dn =
b` b∗` hm∗ Dn = hm∗ ,
Q
∀(`,n)
∀(`,n)
where we have used the fact that E δ`,n =
Q
L.
A simple application of matrix Bernstein is now enough to show that the event in (85) holds for the
desired with high probability. To this end, the calculation for the variance is laid out as follows.
Denote the centered random matrices
L
∗
∗
∗
∗
δ`,n b` b` hm Dn − b` b` hm Dn .
Z`,n :=
Q
The matrices Z`,n are independent not only for ` ∈ ∆n,1 but for every n as the set ∆n,1 is chosen
2 is as before the maximum of the operator norms of two
independently for each n. The variance σZ
quantities; firstly,
L2 X 2 ∗ 2
E δ`,n |b` h| kmn k22 b` b∗`
Q2
`,n
`,n
"
#
X
X
S
L
2
∗ 2
kmn k2
≤ max |b` h|
b` b∗` ≤ µ2max ,
Q `
Q
n
X
∗
E Z`,n Z`,n
≤
`
2 =
where the second last inequality follows from the fact that E δ`,n
obtained by applying the definitions in (26), and (10); secondly,
Q
L,
and the last inequality is
L2 X 2 ∗ 2
E δ`,n |b` h| kb` k22 Dn mm∗ Dn
Q2
`,n
`,n
#
"
L X ∗ 2 X
L
Lρ20
≤
Dn mm∗ Dn ≤ max kmn k22 ≤
,
|b` h|
Q
Q n
QN
n
X
∗
Z`,n ≤
E Z`,n
`
where we have used the facts that {b` }` is a complete orthonormal basis, and that the operator
norm of a block diagonal matrix with nth block being mn m∗n is upper bounded by maxn kmn k22 .
2 being the maximum of the operator
The last inequality is the result of (10). Thus, the variance σZ
norm of the two results above is bounded by
2
σZ
≤ µ2max
L
1
S
+ · ρ20 .
Q Q
N
The last ingredient required to apply the Bernstein inequality in Proposition 1 is then
L
L
δ`,n b` b∗` hm∗ Dn − b` b∗` hm∗ Dn ≤ 2 max kb` b∗` hm∗ Dn k
`,n Q
Q
r
L
L
S
1
≤ 2 max(kb` k2 |b∗` h|) · max kmn k2 ≤ 2 · µmax
· ρ0 √ .
n
Q `
Q
L
N
max kZ`,n k = max
`,n
`,n
41
DRAFT – December 18, 2017 – 2:26
With all the ingredients in place, an application of the uniform version of the Bernstein bound with
t = (β − 1) log(LN ) tells us that
k(L/Q) E A∗1 A1 (hm∗ ) − hm∗ k ≤
!
)
(s
r
S
1
L
S
L
µ2max + · ρ20
β log(LN ), 2 µmax ρ0
β log(LN ) .
max
Q Q
N
Q LN
The right hand side can be driven to the desired small number by choosing N ≥ Cρ20 (L/Q) log(LN ),
and L ≥ Cβµ2max S(L/Q) log(LN ) for an appropriately large constant C. The probability that the
above inequlaity holds is 1 − (LN )−β and follows by plugging in the choice t = (β − 1) log(LN ) in
Proposition 1.
5
Supporting Lemmas
This section proves Lemma 13, Corollary 3, and Lemmas 14, 15.
5.1
Proof of Lemma 13
Proof. We start with the proof of Lemma 13 that concerns bounding the quantity 6 kb∗`0 Sn‡ 0 ,p+1 Wp Dn0 k22
for p ≥ 2. Let q ∗ := b∗`0 Sn‡ 0 ,p+1 Wp Dn0 . The quantity can be expanded using the definition of Wp
for p ≥ 2 in (29)
h
i
q ∗ = b∗`0 Sn‡ 0 ,p+1 RA∗p Ap Sp‡ (Wp−1 ) − Wp−1 Dn0
h
i
= b∗`0 Sn‡ 0 ,p+1 RA∗p Ap Sp‡ (Wp−1 ) − R E A∗p Ap Sp‡ (Wp−1 ) Dn0 ,
where the second equality follows from a previously shown fact that E RA∗p Ap Sp‡ (Wp−1 ) = Wp−1 .
Thus q is just a zero-mean random vector that can be expanded further as a sum of zero-mean,
independent random vectors using the definition of map A∗p Ap in (19) as follows
q∗ =
X
(`,n)∈Γp
i
h
‡
‡
Wp−1 E φ`,n φ∗`,n Dn0 .
b∗`0 Sn‡ 0 ,p+1 R b` b∗` Sn,p
Wp−1 φ`,n φ∗`,n − R b` b∗` Sn,p
(86)
From here on, we use the matrix Bernstein inequality to find the range in which the `2 -norm of the
random vector q lies with high probability. Let us define random vectors
∗
‡
z`,n
:= b∗`0 Sn‡ 0 ,p+1 R b` b∗` Sn,p
Wp−1 φ`,n φ∗`,n Dn0
then by Proposition 2, it suffices to compute the following upper bound on the variance
X
X
X
2
∗
2
σz ≤ max
E z`,n z`,n ,
E kz`,n k2
≤
E kz`,n k22 .
(`,n)∈Γp
(`,n)∈Γp
(`,n)∈Γp
The use of `0 , and n0 as index variables is to avoid conflict with `, and n that are reserved to index the set Γp in
the proof below.
6
42
DRAFT – December 18, 2017 – 2:26
Note that the vectors z`,n can be rewritten as a scalar times a vector as follows
∗
‡
z`,n
= b∗` Sn,p
Wp−1 φ`,n · b∗`0 Sn‡ 0 ,p+1 R b` φ∗`,n Dn0 ,
and using (15), the vector part above can be expanded as
b∗`0 Sn‡ 0 ,p+1 R(b` φ∗`,n )Dn0 = (b∗` h)∗ (b∗`0 Sn‡ 0 ,p+1 h)φ∗`,n Dn0 + (φ∗`,n m)(b∗`0 Sn‡ 0 ,p+1 b` )m∗ Dn0
− (b∗` h)∗ (φ∗`,n m)(b∗`0 Sn‡ 0 ,p+1 h)m∗ Dn0 ,
and its the `2 -norm can then easily be shown to be upper bounded as
kb∗`0 Sn‡ 0 ,p+1 R b` φ∗`,n Dn0 k22
≤ 3|b∗` h|2 |b∗`0 Sn‡ 0 ,p+1 h|2 φ∗`,n Dn0 Dn∗ 0 φ`,n + 3|φ∗`,n m|2 |b∗`0 Sn‡ 0 ,p+1 b` |2 kmn0 k22
+ 3|b∗` h|2 |φ∗`,n m|2 |b∗`0 Sn‡ 0 ,p+1 h|2 kmn0 k22
≤ 3|b∗` h|2 |b∗`0 Sn‡ 0 ,p+1 h|2 φ∗`,n Dn0 Dn∗ 0 φ`,n + 6|φ∗`,n m|2 |b∗`0 Sn‡ 0 ,p+1 b` |2 kmn0 k22 ,
∗ 2
where the last line follows from the fact
that |b2` h| 2≤ 1. For a standard Gaussian vector g, it can
∗
2
∗
2
easily be verified that E |g x| |g y| ≤ 3kxk2 kyk2 . Using this fact, one has
‡
‡
Wp−1 Dn k22 ,
Wp−1 φ`,n |2 ≤ 3kmn k22 kb∗` Sn,p
E |φ∗`,n m|2 |b∗` Sn,p
and
N
X
n=1
`∈∆n,p
#
"
‡
Wp−1 φ`,n |2 ≤ 3K
max E φ∗`,n Dn0 Dn∗ 0 φ`,n |b∗` Sn,p
max kb∗` Sn‡ 0 ,p Wp−1 Dn0 k22 .
`∈∆n0 ,p
Note the change of index variable from n to n0 on the right hand side. Moreover, using (22)
X
`∈∆n,p
|b∗`0 Sn‡ 0 ,p+1 b` |2 ≤
5Q ∗ ‡
5Q
kb`0 Sn0 ,p+1 k22 ≤
kPb`0 k22 kSn‡ 0 ,p+1 k22 ,
4L
4L
where the inclusion of the projection operator P, defined in (14), on the vector b`0 is due to the
‡
fact that the rows of matrix Sn,p
are supported on Ω. Furthermore, using definitions in (9), and
(24), we can finally bound the above result as
X
`∈∆n,p
|b∗`0 Sn‡ 0 ,p+1 b` |2 ≤
20 2 S
µ
.
9 max Q
Putting the above identities together with
N
X
n=1
kmn k22 = kmk22 = 1,
and
X
`∈∆n,p
|b∗` h|2 ≤
5Q
5Q
khk22 =
4L
4L
one directly obtains
X
(`,n)∈Γp
kz`,n k22
=
N
X
X
n=1 `∈∆n,p
"
#
Q
∗ ‡
2
∗ ‡
2
≤ 4 K|b`0 Sn0 ,p+1 h|
max kb` Sn0 ,p Wp−1 Dn0 k2
`∈∆n0 ,p
L
S
2
2
∗ ‡
2
0
+ 14µmax kmn k2 max max kb` Sn,p Wp−1 Dn k2 := Π2p . (87)
n `∈∆n,p
Q
kz`,n k22
43
DRAFT – December 18, 2017 – 2:26
The only ingredient left to apply the Bernstein bound in Proposition 2 is the Orlicz norm of the
‡
summands z`,n . To this end, the ψ2 norm of the vector b∗`0 Sn,p+1
R(b` φ∗`,n )Dn0 can be evaluated as
follows
kb∗`0 Sn‡ 0 ,p+1 R(b` φ∗`,n )Dn0 kψ2 ≤ |b∗` h||b∗`0 Sn‡ 0 ,p+1 h|kφ`,n kψ2 + 2kφ∗`,n mkψ2 |b∗`0 Sn‡ 0 ,p+1 b` |kmn0 k2 .
Since φ`,n are Gaussian vectors, the discussion
on the Orlicz-norms in Section 3.4 tells us that
√
kφ∗`,n mkψ2 ≤ Ckmn k2 , and kφ`,n kψ2 ≤ C K. This means
√
kb∗`0 Sn‡ 0 ,p+1 R(b` φ∗`,n )Dn0 kψ2 ≤ C
K|b∗` h| · |b∗`0 Sn‡ 0 ,p+1 h| + kmn k2 |b∗`0 Sn‡ 0 ,p+1 b` |kmn0 k2
√
K|b∗` h||b∗`0 Sn‡ 0 ,p+1 h| + kPb` k2 kb∗`0 Sn‡ 0 ,p+1 k2 kmn k2 kmn0 k2 ,
≤C
where we have used the fact that kb∗`0 Sn‡ 0 ,p+1 b` k2 = kb∗`0 PSn‡ 0 ,p+1 Pb` k2 ≤ kPb` k2 kb∗`0 Sn‡ 0 ,p+1 k2 .
Again as φ`,n is a Gaussian vector, the Orlicz norm of its inner product with a fixed vector
‡
b∗` Sn,p
Wp−1 is
‡
b∗` Sn,p
Wp−1 φ`,n
ψ2
‡
≤ C b∗` Sn,p
Wp−1 Dn
2
.
Using these facts, we can show that random summands in (86) are sub-exponential vectors by
computing their ψ1 -norm and showing that it is bounded. Note that
i
h
‡
‡
Wp−1 E φ`,n φ∗`,n Dn0
Wp−1 φ`,n φ∗`,n − R b` b∗` Sn,p
b∗`0 Sn‡ 0 ,p+1 R b` b∗` Sn,p
ψ1
‡
‡
≤ 2 b∗`0 Sn0 ,p+1 R b` b∗` Sn,p
Wp−1 φ`,n φ∗`,n Dn0
,
ψ1
where the inequality follows by using the identity in (34). Now note that
‡
Wp−1 φ`,n φ∗`,n Dn0
max max b∗`0 Sn‡ 0 ,p+1 R b` b∗` Sn,p
n `∈∆n,p
ψ1
≤ max b∗`0 Sn‡ 0 ,p+1 R b` b∗` Sn‡ 0 ,p Wp−1 φ`,n0 φ∗`,n0
`∈∆n0 ,p
ψ1
,
and the change of indices from n to n0 is justified as φ`,n [k 0 ] is zero when k 0 ∈
/ {(K−1)n0 +1, . . . , n0 K}.
Now using the result in (35), we can write
b∗` Sn‡ 0 ,p Wp−1 φ`,n0
b∗`0 Sn‡ 0 ,p+1 R b` b∗` Sn‡ 0 ,p Wp−1 φ`,n0 φ∗`,n0
≤ b∗`0 Sn‡ 0 ,p+1 R b` φ∗`,n0
ψ1
ψ2
ψ2
√
∗
∗ ‡
∗ ‡
2
∗ ‡
≤
b` Sn0 ,p Wp−1 Dn0
.
K|b` h||b`0 Sn0 ,p+1 h| + kPb` k2 kb`0 Sn0 ,p+1 k2 kmn0 k2
2
Setting α = 1 in Proposition 2, one obtains the upper bound U1
2
µ0 K ∗ ‡
2
2
2
2
2 S
2 ∗ ‡
2
U1 = max max kz`,n kψ1 ≤ C
|b`0 Sn0 ,p+1 h| + µmax ρ0
kmn0 k2 kb`0 Sn0 ,p+1 k2
n `∈∆n,p
L
LN
#
"
max
`∈∆n0 ,p
≤C
2
b∗` Sn‡ 0 ,p Wp−1 Dn0
µ20 K ∗ ‡
S2
|b`0 Sn0 ,p+1 h|2 + µ4max ρ20 2 kmn0 k22
L
Q N
"
max
`∈∆n0 ,p
2
b∗` Sn‡ 0 ,p Wp−1 Dn0
44
DRAFT – December 18, 2017 – 2:26
2
2
#
:= Λ2p ,
(88)
where the last inequality follows from plugging in the bound for kb∗`0 Sn‡ 0 ,p+1 k22 calculated earlier in
the proof of this lemma. The logarithmic factor in the Bernstein bound can be crudely bounded
as follows
(QN )U12
≤ C log(LN )
log
σz2
for some constant C, which follows from the fact that U12 ≤ |Γp |σz2 . This completes all the ingredients to apply the Bernstein bound with t = β log(LN ) to obtain
kb∗`0 Sn‡ 0 ,p+1 Wp Dn0 k22 ≤ C max βΠ2p log(LN ), β 2 Λ2p log4 (LN ) ,
which holds with probability at least 1 − (LN )−β . This completes the proof of the lemma.
5.2
Proof of Corollary 3
Proof. Note that from (68), we can equivalently write
s∗`0 ,n0 := b∗`0 Sn‡ 0 ,2 [RA∗1 A1 (L/Q)P(hm∗ ) − E RA∗1 A1 (L/Q)P(hm∗ )] Dn0 .
using the fact that hm∗ ∈ Ω. In comparison, Lemma 13 was concerned with bounding the `2 norm
of the term
h
i
b∗`0 Sn‡ 0 ,p+1 RA∗p Ap Sp‡ (Wp−1 ) − E RA∗p Ap Sp‡ (Wp−1 ) Dn0 .
All we need to do over here is to replace Sn0 ,p+1 , Ap , Sp‡ , and Wp−1 with Sn0 ,2 , A1 , (L/Q)P, and
hm∗ and repeat the same argument as in the proof of Lemma 13. This leads to the bound on the
`2 norm of s`,n in the statement of the corollary in terms of Π21 , and Λ21 defined in (66), and (67),
respectively. Compared to Lemma 13 the Π2p , and Λ2p are replaced in the result by Π21 , and Λ21 ,
‡
respectively. The quantities Π21 and Λ21 are just Π2p , and Λ2p evaluated at p = 1, and afterwards Sn,1
therein replaced by (L/Q)P.
5.3
Proof of Lemma 14
Proof. Using the definition (70), and the triangle inequality, we have
kr`∗0 ,n0 k2 ≤
L ∗ ‡
b 0 S 0 R E A∗1 A1 (hm∗ )Dn0
Q ` n ,2
2
+ kb∗`0 Sn‡ 0 ,2 hm∗ Dn0 k2 ,
where using the definition of Sn,1 defined in Section 3.1, we have
"
#
X
L ∗ ‡
L ∗ ‡
∗
∗
∗
b 0 S 0 R E A1 A1 (hm )Dn0 = b`0 Sn0 ,2
R (Sn,1 hm Dn ) Dn0 =
Q ` n ,2
Q
n
"
#
X
L ∗ ‡
∗
∗
∗
2
∗
∗
2
b 0S 0
(h Sn,1 h) hm Dn + Sn,1 hm kmn k2 − (h Sn,1 h) hm kmn k2 Dn0 ≤
Q ` n ,2 n
"
#
X
X
X
L ∗ ‡
5Q
3Q
b 0S 0
hm∗
Dn + max Sn,1 hm∗
kmn k22 −
hm∗
kmn k22 Dn0 ,
n
Q ` n ,2 4L
4L
n
n
n
45
DRAFT – December 18, 2017 – 2:26
(89)
where the second last equality results from the definition of R in (15), and from (24) that directly
imply that
3Q
5Q
≤ h∗ Sn,1 h ≤
,
4L
4L
P
P
for the choice of Q in the lemma. Since n kmn k22 = 1, and n Dn = IKN , the result above
simplifies to
Q
L ∗ ‡
L ∗ ‡
∗
∗
∗
∗
b 0 S 0 R E A1 A1 (hm )Dn0 ≤ b`0 Sn0 ,2
hm + max Sn,1 hm Dn0 .
n
Q ` n ,2
Q
2L
Finally, the operator norm of the above quantity returns
L
L ∗ ‡
1 ∗ ‡
∗
∗
∗ ‡
b 0 S 0 R E A1 A1 (hm )Dn0 ≤
|b 0 S 0 h| + max |b`0 Sn0 ,2 Sn,1 h| kmn0 k2 .
Q ` n ,2
2 ` n ,2
Q n
2
Using (89), we obtain
kr`0 ,n0 k2 ≤
3 ∗ ‡
L
∗ ‡
|b 0 S 0 h| + max |b`0 Sn0 ,2 Sn,1 h| kmn0 k2 ,
2 ` n ,2
Q n
and squaring both sides results in
9 ∗ ‡
L2
kr`0 ,n0 k22 ≤
|b`0 Sn0 ,2 h|2 + 2 2 max |b∗`0 Sn‡ 0 ,2 Sn,1 h|2 kmn0 k22 .
2
Q n
This completes the proof.
Lemma 15. Let φ`,n be as in defined in (5), and X be a fixed matrix. Then
E |hX, b` φ∗`,n i|2 φ`,n φ∗`,n 4 3kb∗` XDn k22 Dn .
Proof. Note that
E |hX, b` φ∗`,n i|2 φ`,n φ∗`,n = E |b∗` Xφ`,n |2 φ`,n φ∗`,n
2
X
= E
{b∗` Xφ`,n }[k] φ`,n φ∗`,n
k∼K n
=
kb∗` XDn k22 Dn
+ 2b∗` XX ∗ b` Dn 4 3kb∗` XDn k22 Dn .
References
[1] A. Aghasi, S. Bahmani, and J. Romberg. A tightest convex envelope heuristic to row sparse
and rank one matrices. In GlobalSIP, page 627, 2013.
[2] A. Ahmed, B. Recht, and J. Romberg. Blind deconvolution using convex programming. IEEE
Trans. Inform. Theory, 60(3):1711–1732, 2014.
46
DRAFT – December 18, 2017 – 2:26
[3] S. Bahmani and J. Romberg. Lifting for blind deconvolution in random mask imaging: Identifiability and convex relaxation. SIAM J. Imag. Sci., 8(4):2203–2238, 2015.
[4] S. Burer and R.D.C. Monteiro. A nonlinear programming algorithm for solving semidefinite
programs via low-rank factorization. Math. Prog., 95(2):329–357, 2003.
[5] E. Candès. The restricted isometry property and its implications for compressed sensing.
Comptes Rendus Mathematique, 346(9):589–592, 2008.
[6] E. Candès, Y. Eldar, T. Strohmer, and V. Voroninski. Phase retrieval via matrix completion.
SIAM Review, 57(2):225–251, 2015.
[7] E. Candès and B. Recht. Exact matrix completion via convex optimization. Found. Comput.
Math., 9(6):717–772, 2009.
[8] E. Candès and J. Romberg. Sparsity and incoherence in compressive sampling. Inverse problems, 23(3):969, 2007.
[9] E. Candès, J. Romberg, and T. Tao. Robust uncertainty principles: Exact signal reconstruction
from highly incomplete frequency information. IEEE Trans. Inform. Theory, 52(2):489–509,
February 2006.
[10] E. Candès, J. Romberg, and T. Tao. Stable signal recovery from incomplete and inaccurate
measurements. Commun. Pure Appl. Math., 59(8):1207–1223, 2006.
[11] E. Candès, T. Strohmer, and V. Voroninski. Phaselift: Exact and stable signal recovery from
magnitude measurements via convex programming. Commun. Pure Appl. Math., 66(8):1241–
1274, 2013.
[12] Sunav Choudhary and Urbashi Mitra. Sparse blind deconvolution: What cannot be done. In
IEEE Int’l. Symp. Inform. Theory (ISIT), pages 3002–3006, 2014.
[13] M. Fazel. Matrix rank minimization with applications. PhD thesis, Stanford University, March
2002.
[14] M. Fazel, H. Hindi, and S.P. Boyd. A rank minimization heuristic with application to minimum
order system approximation. In American Control Conf., Proc., volume 6, pages 4734–4739.
IEEE, 2001.
[15] D. Gross. Recovering low-rank matrices from few coefficients in any basis. IEEE Trans. Inform.
Theory, 57(3):1548–1566, 2011.
[16] M. Gürelli, C. Nikias, et al. EVAM: An eigenvector-based algorithm for multichannel blind
deconvolution of input colored signals. IEEE Trans. Sig. Process., 43(1):134–149, 1995.
[17] V. Koltchinskii, K. Lounici, and A. Tsybakov. Nuclear-norm penalization and optimal rates
for noisy low-rank matrix completion. Ann. Stat., 39(5):2302–2329, 2011.
[18] A. Levin, Y. Weiss, F. Durand, and W. Freeman. Understanding blind deconvolution algorithms. IEEE Trans. Patt. Analys. Mach. Intell., 33(12):2354–2367, 2011.
[19] X. Li, S. Ling, T. Strohmer, and K. Wei. Rapid, robust, and reliable blind deconvolution via
nonconvex optimization. arXiv preprint arXiv:1606.04933, 2016.
47
DRAFT – December 18, 2017 – 2:26
[20] Shuyang Ling and Thomas Strohmer. Blind deconvolution meets blind demixing: Algorithms
and performance bounds. IEEE Trans. Inform. Theory, 2017.
[21] H. Liu, G. Xu, L. Tong, and T. Kailath. Recent developments in blind channel equalization:
From cyclostationarity to subspaces. IEEE Trans. Sig. Process., 50(1):83–99, 1996.
[22] S. Oymak, A. Jalali, M. Fazel, Y. Eldar, and B. Hassibi. Simultaneously structured models
with application to sparse and low-rank matrices. IEEE Trans. Inform. Theory, 61(5):2886–
2908, 2015.
[23] B. Recht. A simpler approach to matrix completion. J. Mach. Learn. Res., 12(12):3413–3430,
2011.
[24] B. Recht, M. Fazel, and P. Parrilo. Guaranteed minimum-rank solutions of linear matrix
equations via nuclear norm minimization. SIAM Rev., 52(3):471–501, 2010.
[25] J. Romberg, N. Tian, and K. Sabra. Multichannel blind deconvolution using low rank recovery.
In SPIE Defense, Security, and Sensing, pages 87500E–87500E. Int. Soc. Opt. Phot., 2013.
[26] M. Rudelson and R. Vershynin. On sparse reconstruction from fourier and gaussian measurements. Commun. Pure Appl. Math., 61(8):1025–1045, 2008.
[27] M. Schmidt. minFunc: unconstrained differentiable multivariate optimization in Matlab. http:
//www.di.ens.fr/~mschmidt/Software/minFunc.html, 2012.
[28] L. Tong and S. Perreau. Multichannel blind identification: From subspace to maximum likelihood methods. Proc. IEEE, 86:1951–1968, 1998.
[29] L. Tong, G. Xu, and T. Kailath. Blind identification and equalization based on second-order
statistics: A time domain approach. IEEE Trans. Inform. Theory, 40(2):340–349, 1994.
[30] J. Tropp. User-friendly tail bounds for sums of random matrices. Found. Comput. Math.,
12(4):389–434, 2012.
[31] R. Vershynin. Compressed sensing: theory and applications. Cambridge University Press,
2012.
[32] G. Watson. Characterization of the subdifferential of some matrix norms. Linear Algebra and
its Appl., 170:33–45, 1992.
[33] G. Xu, H. Liu, L. Tong, and T. Kailath. A least-squares approach to blind channel identification. IEEE Trans. Sig. Process., 43(12):2982–2993, 1995.
48
DRAFT – December 18, 2017 – 2:26
| 7cs.IT
|
JSJ decompositions of groups
Vincent Guirardel, Gilbert Levitt
arXiv:1602.05139v2 [math.GR] 28 Jul 2017
Abstract
This is an account of the theory of JSJ decompositions of finitely generated groups,
as developed in the last twenty years or so.
We give a simple general definition of JSJ decompositions (or rather of their BassSerre trees), as maximal universally elliptic trees. In general, there is no preferred JSJ
decomposition, and the right object to consider is the whole set of JSJ decompositions,
which forms a contractible space: the JSJ deformation space (analogous to Outer
Space).
We prove that JSJ decompositions exist for any finitely presented group, without
any assumption on edge groups. When edge groups are slender, we describe flexible vertices of JSJ decompositions as quadratically hanging extensions of 2-orbifold
groups.
Similar results hold in the presence of acylindricity, in particular for splittings
of torsion-free CSA groups over abelian groups, and splittings of relatively hyperbolic
groups over virtually cyclic or parabolic subgroups. Using trees of cylinders, we obtain
canonical JSJ trees (which are invariant under automorphisms).
We introduce a variant in which the property of being universally elliptic is replaced
by the more restrictive and rigid property of being universally compatible. This yields
a canonical compatibility JSJ tree, not just a deformation space. We show that it
exists for any finitely presented group.
We give many examples, and we work throughout with relative decompositions
(restricting to trees where certain subgroups are elliptic).
Introduction
JSJ decompositions first appeared in 3-dimensional topology with the theory of the characteristic submanifold by Jaco-Shalen and Johannson [JS79, Joh79] (the terminology JSJ
was popularized by Sela). We start with a quick review (restricting to manifolds without
boundary).
From 3-manifolds to groups
Let M be a closed orientable 3-manifold. Given a finite collection of disjoint embedded
2-spheres, one may cut M open along them, and glue balls to the boundary of the pieces
to make them boundaryless. This expresses M as a connected sum of closed manifolds Mi .
The prime decomposition theorem (Kneser-Milnor) asserts that one may choose the spheres
so that each Mi is either irreducible (Mi 6= S 3 , and every embedded 2-sphere bounds a
ball) or homeomorphic to S 2 × S 1 ; moreover, up to a permutation, the summands Mi are
uniquely determined up to homeomorphism.
On the group level, one obtains a decomposition of G = π1 (M ) as a free product
G = G1 ∗ · · · ∗ Gp ∗ Fq , with Gi the fundamental group of an irreducible Mi and Fq a free
group of rank q coming from the S 2 × S 1 summands. This decomposition is a Grushko
decomposition of G, in the following sense: each Gi is freely indecomposable (it cannot be
written as a non-trivial free product), non-trivial, and not isomorphic to Z (non-triviality of
Gi is guaranteed by the Poincaré conjecture, proved by Perelman). Any finitely generated
1
group has a Grushko decomposition, with q well-defined and the Gi ’s well-defined up to
conjugacy (and a permutation).
The prime decomposition implies that one should focus on irreducible manifolds. Since
all spheres bound balls, one now considers embedded tori. In order to avoid trivialities (such
as a torus bounding a tubular neighborhood of a curve), tori should be incompressible: the
embedding T 2 → M induces an injection on fundamental groups.
The theory of the characteristic submanifold now says that, given an irreducible M ,
there exists a finite family T of disjoint non-parallel incompressible tori such that each
component Nj of the manifold (with boundary) obtained by cutting M along T is either
atoroidal (every incompressible torus is boundary parallel) or a Seifert fibered space, i.e.
a 3-manifold having a singular fibration by circles over a 2-dimensional surface Σ (better
viewed as a 2-dimensional orbifold).1 Moreover, any incompressible torus may be isotoped
to be disjoint from T .
With groups in mind, let us point out an important feature of this decomposition. If
two incompressible tori cannot be made disjoint by an isotopy, they may be isotoped to be
contained in a Seifert piece. Conversely, in a Seifert fibered space, preimages of intersecting
simple curves on Σ are intersecting tori.
We thus see that the presence of intersecting tori in M forces some surface Σ to appear.
One of the remarkable facts about JSJ theory for groups is that a similar phenomenon
occurs. For instance, if a finitely generated one-ended group admits two splittings over
Z that “intersect” each other in an essential way,2 then it must contain the fundamental
group of a compact surface, attached to the rest of the group along the boundary (see
Theorem 4 below and Section 6, in particular Proposition 6.25).
We also point out that the family T mentioned above is unique up to isotopy. On the
other hand, a family of spheres defining the prime decomposition is usually not unique.
Similarly, the Grushko decompositions of a group usually form a large outer space [CV86,
GL07b], whereas one may often construct canonical splittings of one-ended groups, which
are in particular invariant under automorphisms (see Theorems 6 and 8 below).
These topological ideas were carried over to group theory by Kropholler [Kro90] for
some Poincaré duality groups of dimension at least 3, and by Sela for torsion-free hyperbolic groups [Sel97b]. Constructions of JSJ decompositions were given in more general
settings by many authors (Rips-Sela [RS97], Bowditch [Bow98], Dunwoody-Sageev [DS99],
Fujiwara-Papasoglu [FP06], Dunwoody-Swenson [DS00], Scott-Swarup [SS03], PapasogluSwenson [PS09]. . . ). This has had a vast influence and range of applications, from the isomorphism problem and the structure of the group of automorphisms of hyperbolic groups,
to diophantine geometry over groups, and many others.
In this group-theoretical context, one has a finitely generated group G and a class
of subgroups A (such as cyclic groups, abelian groups, ...), and one tries to understand
splittings (i.e. graph of groups decompositions) of G over groups in A. The family of tori
T of the 3-manifold is replaced by a splitting of G over groups in A. The authors construct
a splitting enjoying a long list of properties, rather specific to each case.
Our first goal is to give a simple general definition of JSJ decompositions stated by
means of a universal maximality property, together with general existence and uniqueness statements in terms of deformation spaces (see below). The JSJ decompositions
constructed in [RS97, Bow98, DS99, FP06] are JSJ decompositions in our sense (see Subsection 2.6).
The regular neighbourhood of [SS03] is of a different nature. In [DS00, SS03], one looks
1
Thurston’s geometrization conjecture, whose proof was completed by Perelman, asserts that each Nj
has a geometric structure. In particular, every atoroidal Nj with infinite fundamental group is hyperbolic
(its interior admits a complete metric with finite volume and constant curvature −1).
2
More precisely: the edge groups of each splitting should be hyperbolic in the Bass-Serre tree of the
other splitting.
2
at almost invariant sets rather than splittings, in closer analogy to a 3-manifold situation
where one wants to understand all immersed tori, not just the embedded ones. One obtains
a canonical splitting of G rather than just a canonical deformation space. See Parts IV
and V for canonical splittings, and [GL10] for the relation between [SS03] and usual JSJ
decompositions.
Definition of JSJ decompositions
To motivate the definition, let us first consider free decompositions of a group G, i.e.
decompositions of G as the fundamental group of a graph of groups with trivial edge
groups, or equivalently actions of G on a simplicial tree T with trivial edge stabilizers.
Let G = G1 ∗ · · · ∗ Gp ∗ Fq be a Grushko decomposition, as defined above (Gi is nontrivial, not Z, freely indecomposable). One may view G as the fundamental group of one
of the graphs of groups pictured on Figure 1. The corresponding Bass-Serre trees have
trivial edge stabilizers, and the vertex stabilizers are precisely the conjugates of the Gi ’s;
we call a tree with these properties a Grushko tree (if G is freely indecomposable, Grushko
trees are points).
t1
G2
t2
..
.
G1
tq
Gp
G1
G2
..
.
b
b
b
G3
b
G5
b
G4
p = 5, q = 6
Figure 1: Graph of groups decompositions corresponding to two Grushko trees.
Since the Gi ’s are freely indecomposable, Grushko trees T0 have the following maximality property: if T is any tree on which G acts with trivial edge stabilizers, Gi fixes a
point in T , and therefore T0 dominates T in the sense that there is a G-equivariant map
T0 → T . In other words, among free decompositions of G, a Grushko tree T0 is as far as
possible from the trivial tree (a point): its vertex stabilizers are as small as possible (they
are conjugates of the Gi ’s). This maximality property does not determine T0 uniquely, as
it is shared by all Grushko trees; we will come back to this key fact later, when discussing
uniqueness.
When more general decompositions are allowed, for instance when one considers splittings over Z, there may not exist a tree with the same maximality property. The fundamental example is the following. Consider an orientable closed surface Σ, and two simple
closed curves c1 , c2 in Σ with non-zero intersection number. Let Ti be the Bass-Serre tree
of the associated splitting of G = π1 (Σ) over Z ' π1 (ci ). Since c1 and c2 have positive
intersection number, π1 (c1 ) is hyperbolic in T2 (it does not fix a point) and vice-versa.
Using the fact that π1 (Σ) is freely indecomposable, it is an easy exercise to check that
there is no splitting of π1 (Σ) which dominates both T1 and T2 . In this case there is no
hope of having a splitting over cyclic groups similar to T0 above.
To overcome this difficulty, one restricts to universally elliptic splittings, defined as
follows.
We consider trees with an action of a finitely generated group G, and we require that
edge stabilizers be in A (a given family of subgroups of G, closed under conjugating and
taking subgroups); we call such a tree an A-tree. By Bass-Serre theory, this corresponds
to splittings of G over groups in A. Unless otherwise indicated, all trees are assumed to
be A-trees.
Definition. An A-tree is universally elliptic if its edge stabilizers are elliptic in every
A-tree.
3
Recall that H is elliptic in T if it fixes a point in T (in terms of graphs of groups, H is
contained in a conjugate of a vertex group). Free decompositions are universally elliptic,
but the trees T1 , T2 introduced above are not.
Definition. A JSJ decomposition (or JSJ tree) of G over A is an A-tree T such that:
• T is universally elliptic;
• T dominates any other universally elliptic tree T 0 .
We call the quotient graph of groups Γ = T /G a JSJ splitting, or a JSJ decomposition.
Recall that T dominates T 0 if there is an equivariant map T → T 0 ; equivalently, any
group which is elliptic in T is also elliptic in T 0 . The second condition in the definition is a
maximality condition expressing that vertex stabilizers of T are as small as possible (they
are elliptic in every universally elliptic tree).
If A consists of all subgroups with a given property (being cyclic, abelian, slender, ...),
we refer to, say, cyclic trees, cyclic JSJ decompositions when working over A.
When A only contains the trivial group, JSJ trees are the same as Grushko trees. If
G = π1 (Σ) as above, and A is the family of cyclic subgroups, the JSJ decomposition is
trivial (the point is the only JSJ tree).
Existence.
JSJ trees do not always exist: the finitely generated inaccessible group D constructed by
Dunwoody [Dun93] has no JSJ tree over finite groups, and D × Z is a one-ended group
with no JSJ decomposition over virtually cyclic subgroups. On the other hand, it follows
rather easily from Dunwoody’s accessibility [Dun85] that a finitely presented group has
JSJ decompositions over any class A of subgroups (we emphasize that no assumption on
A, such as smallness, is needed).
Theorem 1 (Theorem 2.16). Let A be an arbitrary family of subgroups of G, stable under
taking subgroups and under conjugation. If G is finitely presented, it has a JSJ decomposition over A. In fact, there exists a JSJ tree whose edge and vertex stabilizers are finitely
generated.
In Part IV we shall present a different way of constructing JSJ decompositions, based on
Sela’s acylindrical accessibility, which applies in some more general situations (the existence
of such JSJ decompositions for limit groups is mentioned and used in [Sel01], and we give a
complete proof). We will give more details later in this introduction, but we mention two
typical results here. A group is CSA if maximal abelian subgroups are malnormal, small
if it has no free non-abelian subgroup (see Subsection 1.5.2 for variations).
Theorem 2 (Theorem 9.5). Let G be a torsion-free finitely generated CSA group. There
is a JSJ decomposition of G over abelian subgroups.
Theorem 3 (Theorem 9.18). Let G be hyperbolic relative to a finite family of finitely
generated small subgroups. If A is either the family of all virtually cyclic subgroups of G,
or the family of all small subgroups, there is a JSJ decomposition of G over A.
Uniqueness.
JSJ trees are not unique. . . Returning to the example of free decompositions, one
obtains trees with the same maximality property as T0 by precomposing the action of G on
T0 with any automorphism of G. One may also change the topology of the quotient graph
T0 /G (see Figure 1). The canonical object is not a single tree, but the set of all Grushko
trees (trees with trivial edge stabilizers, and non-trivial vertex stabilizers conjugate to the
Gi ’s), a deformation space.
4
Definition (Deformation space [For02]). The deformation space D of a tree T is the set
of trees T 0 such that T dominates T 0 and T 0 dominates T . Equivalently, two trees are in
the same deformation space if and only if they have the same elliptic subgroups.
More generally, given a family of subgroups Ae ⊂ A, one considers deformation spaces
e
over Ae by restricting to trees in D with edge stabilizers in A.
For instance, Culler-Vogtmann’s outer space (the set of free actions of Fn on trees) is
a deformation space. Just like outer space, any deformation space may be viewed as a
complex in a natural way, and it is contractible (see [Cla05, GL07a]).
If T is a JSJ tree, another tree T 0 is a JSJ tree if and only if T 0 is universally elliptic, T
dominates T 0 , and T 0 dominates T . In other words, T 0 should belong to the deformation
space of T over Aell , where Aell is the family of universally elliptic groups in A.
Definition. If non-empty, the set of all JSJ trees is a deformation space over Aell called
the JSJ deformation space (of G over A). We denote it by DJSJ .
The canonical object is therefore not a particular JSJ decomposition, but the JSJ
deformation space. For instance, the JSJ deformation space of Fn over any A is outer
space (see Subsection 3.1).
It is a general fact that two trees belong to the same deformation space if and only if
one can pass from one to the other by applying a finite sequence of moves of certain types,
see [For02, GL07a, For06, CF09] and Remark 2.13 (this may be viewed as a connectedness
statement, but as mentioned above deformation spaces are actually contractible). The
statements about uniqueness of the JSJ decomposition up to certain moves which appear
in [RS97, DS99, FP06], as well as the non-uniqueness results of [For03], are special cases
of this general fact.
Another general fact is the following: two trees belonging to the same deformation
space over A have the same vertex stabilizers, provided one restricts to groups not in A. It
thus makes sense to study vertex stabilizers of JSJ trees. We do so in Part III (see below).
If A is invariant under the group of automorphisms of G (in particular if A is defined
by restricting the isomorphism type), then so is the deformation space DJSJ . As in the
case of outer space, precomposing actions on trees with automorphisms of G yields an
action of Aut(G) on DJSJ , a contractible complex. This action factors through an action
of Out(G), thus providing information about Out(G) [CV86, MM96, GL07b, Cla09].
We stress once again that, in general, the canonical object associated to G and A is
the deformation space consisting of all JSJ trees, and it may be quite large.
. . . but sometimes there is a canonical JSJ tree. In some nice situations one can
construct a canonical JSJ tree T in DJSJ .
By canonical, we essentially mean “defined in a natural, uniform way”. In particular,
given any isomorphism α : G → G0 sending A to A0 , canonicity implies that there is a
unique α-equivariant isomorphism Hα : T → T 0 between the canonical JSJ trees. Applying
this with G0 = G (assuming that A is invariant under automorphisms), one gets an action
of Aut(G) on T . The canonical tree T is a fixed point for the action of Out(G) on the JSJ
deformation space.
The existence of such a canonical splitting gives precise information about Out(G), see
[Sel97b, Lev05a, GL11] for applications. A particularly nice example, due to Bowditch
[Bow98], is the construction of a canonical JSJ decomposition of a one-ended hyperbolic
group over virtually cyclic subgroups, from the structure of local cut points in the Gromov
boundary.
This is not a consequence of the sole fact that G is one-ended, and that one considers
splittings over virtually cyclic groups: the cyclic splittings of G = Fn × Z are in one-toone correspondence with the free splittings of Fn , and the JSJ deformation space of G is
5
the outer space of Fn . Generalized Baumslag-Solitar groups are other striking examples
where a strong non-uniqueness occurs, with surprising algebraic consequences like the
fact (due to Collins-Levin [CL83]) that the group Out(BS(2, 4)) of outer automorphisms
of the Baumslag-Solitar group BS(2, 4) = ha, t | ta2 t−1 = a4 i is not finitely generated
[For06, Cla09].
A method to produce a canonical tree from a deformation space will be given in Part
IV, using a construction called the tree of cylinders [GL11]. In particular, it yields canonical JSJ decompositions of one-ended CSA groups and relatively hyperbolic groups (see
Theorems 6 and 8 below). The compatibility JSJ decomposition introduced below also
yields a canonical tree.
Description: Quadratically hanging vertex groups.
As mentioned above, Grushko trees have a strong maximality property: their vertex stabilizers are elliptic in any free splitting of G. This does not hold any longer when one
considers JSJ decompositions over infinite groups, in particular cyclic groups: a vertex
stabilizer Gv of a JSJ tree may fail to be elliptic in some splitting (over the chosen family
A).
If this happens, we say that the vertex stabilizer Gv (or the corresponding vertex v, or
the vertex group of the quotient graph of groups) is flexible. The other stabilizers (which
are elliptic in every splitting over A) are called rigid. In particular, all vertices of Grushko
trees are rigid (because their stabilizers are freely indecomposable). On the other hand, in
the example of G = π1 (Σ), the unique vertex stabilizer Gv = G is flexible.
Because all JSJ decompositions lie in the same deformation space over Aell , they have
the same flexible vertex stabilizers (and the same rigid vertex stabilizers not in A).
The essential feature of JSJ theory is the description of flexible vertices, in particular
the fact that flexible vertex stabilizers are often “surface-like” ([RS97, DS99, FP06]; see
below, and Theorem 6.2, for more precise statements). In other words, the example of
trees T1 , T2 given above using intersecting curves on a surface is often the only source of
flexible vertices.
This is formalized through the notion of quadratically hanging (QH) groups, a terminology due to Rips and Sela [RS97].
For cyclic splittings of a torsion-free group, a vertex group Gv is QH if it may be viewed
as the fundamental group of a (possibly non-orientable) compact surface with boundary
Σ, in such a way that any incident edge group is trivial or contained (up to conjugacy) in a
boundary subgroup, i.e. the fundamental group B = π1 (C) of a boundary component C of
Σ. The terminology “quadratically hanging” describes the way in which π1 (Σ) is attached
to the rest of the group, since boundary subgroups are generated by elements which are
quadratic words in a suitable basis of the free group π1 (Σ).
In a more general setting, one extends this notion as follows: Gv is an extension
1 → F → Gv → π1 (Σ) → 1, where Σ is a compact hyperbolic 2-orbifold (usually with
boundary), and F is an arbitrary group called the fiber. The condition on the attachment
is that the image of any incident edge group in π1 (Σ) is finite or contained in a boundary
subgroup (see Section 5 for details).
Recall that a group is slender if all its subgroups are finitely generated.
Theorem 4 ([FP06], see Corollary 6.3). Let A be the class of all slender subgroups of a
finitely presented group G. Let Gv be a flexible vertex group of a JSJ decomposition of G
over A. Then Gv is either slender or QH with slender fiber.
One may replace A by a subfamily, provided that it satisfies a suitable stability condition. In particular, A may be the family of cyclic subgroups, virtually cyclic subgroups,
polycyclic subgroups. Failure of this stability condition explains why the result does not
6
apply to JSJ decompositions over abelian groups in general (see Subsection 5.5). On the
other hand, non-abelian flexible vertex groups in Theorem 2 are QH with trivial fiber, and
in Theorem 3 non-small flexible vertex groups are QH with finite fiber.
Theorem 4 says that flexible subgroups of the JSJ decomposition are QH, but one can
say more: they are maximal in the following sense.
Proposition 5 (see Corollary 5.30). Let G be one-ended, and let A be the class of all
virtually cyclic groups. Let Q be a QH vertex stabilizer with finite fiber in an arbitrary
A-tree.
Then Q is contained in a QH vertex stabilizer of any cyclic JSJ decomposition of G.
This does not hold without the one-endedness assumption: non-abelian free groups
contain many non-trivial QH subgroups.
Our proof of Theorem 4 is based on the approach by Fujiwara and Papasoglu using
products of trees [FP06], but with several simplifications. In particular, we do not have to
construct a group enclosing more than two splittings.
The characteristic property of slender groups is that, whenever they act on a tree with
no fixed point, there is an invariant line. Using these lines, one may construct subsurfaces
in the product of two trees and this explains (at least philosophically) the appearance of
surfaces, hence of QH vertex groups, in Theorem 4. This is the content of Proposition
6.25.
This approach does not work if edge groups are not slender (unless there is acylindricity,
as in Theorem 8 below), and the following problem is open.
Problem. Describe flexible vertices of JSJ decompositions of a finitely presented group
over small subgroups.
Relative decompositions
For many applications, it is important not to consider all A-trees, but only those in which
subgroups of G belonging to a given family H are elliptic (i.e. every H ∈ H fixes a point in
the tree). We say that such a tree is relative to H, and we call it an (A, H)-tree. Working
in a relative setting is important for applications (see e.g. [Sel01, Section 9], [Pau04, Per11],
and Theorems 6 and 8 below), and also needed in our proofs. In the proof of Theorem 4
describing flexible vertex groups Gv of slender JSJ decompostions, for instance, we do not
work with splittings of G, but rather with splittings of Gv relative to incident edge groups.
Definitions extend naturally to relative trees: a tree is universally elliptic if its edge
groups are elliptic in every (A, H)-tree, and a JSJ decomposition of G over A relative to
H is an (A, H)-tree which is universally elliptic and maximal for domination.
The theorems stated above remain true, but H must be a finite family of finitely
generated subroups in Theorems 1 and 4, and one must take H into account when defining
QH vertices (see Definition 5.13).
In this text we consistently work in a relative setting, so the reader does not have to
take it as an act of faith that arguments also work for relative trees. For simplicity, though,
we limit ourselves to the non-relative case in this introduction (except in Theorems 6 and
8 where obtaining canonical trees definitely requires working in a relative setting).
Acylindricity
We have explained how Dunwoody’s accessibility may be used to construct the JSJ deformation space, which contains no preferred tree in general. In Part IV we use a different
approach, based on the trees of cylinders of [GL11] and on Sela’s acylindrical accessibility
7
[Sel97a], which yields more precise results when applicable. Unlike Dunwoody’s accessibility, acylindrical accessibility only requires finite generation of G (see Subsection 1.6).
Let G be a one-ended group, and T any tree with (necessarily infinite) virtually cyclic
edge stabilizers. Say that two edges of T are equivalent if their stabilizers are commensurable (i.e. have infinite intersection). One easily checks that equivalence classes are
connected subsets of T , which we call cylinders. Two distinct cylinders intersect in at most
one point. Dual to this partition of T into subtrees is another tree Tc called the tree of
cylinders (it is sometimes necessary to use a collapsed tree of cylinders, see Definition 7.2,
but we neglect this here).
This construction works with other equivalence relations among infinite edge stabilizers.
Here are two examples: G is a relatively hyperbolic group, and the equivalence relation
is co-elementarity among infinite elementary subgroups (A ∼ B if and only if hA, Bi is
elementary, i.e. virtually cyclic or parabolic), or G is a torsion-free CSA group and the
relation is commutation among non-trivial abelian subgroups.
Z
b
Z
b
Z
b
Z
Z
Z
b
Z
Z2
Z
Figure 2: A JSJ splitting of a toral relatively hyperbolic group and its tree of cylinders.
Here is an example (which already appears in [GL11]). Let T be the Bass-Serre tree of
the graph of groups Γ pictured on the left of Figure 2 (all punctured tori have the same
boundary subgroup, equal to the edge groups of Γ). The fundamental group of Γ is a
torsion-free one-ended group G (which is toral relatively hyperbolic and CSA), and T is a
cyclic JSJ decomposition of G. In this case all previous equivalence relations on the set of
edge stabilizers of T (commensurability, co-elementarity, commutation) reduce to equality,
and the quotient graph of groups of the tree of cylinders Tc is pictured on the right of
Figure 2; there is a new vertex group, isomorphic to Z2 .
There are three main benefits in passing from the JSJ tree T to Tc . First, two trees
in the same deformation space always have the same tree of cylinders. In particular, the
tree Tc is invariant under all automorphisms of G (whereas T is only invariant up to
deformation). Second, Tc is acylindrical: all segments of length 3 have trivial stabilizer
(whereas T contains lines with infinite cyclic pointwise stabilizer). Third, trees of cylinders
enjoy nice compatibility properties, which will be important later. There is a small price
to pay in order to replace T by the better tree Tc , namely changing the deformation space
by creating a new vertex group Z2 .
This example is typical of the method we use in Part IV to prove Theorems 2 and 3.
Using trees of cylinders, we show that one may associate to any tree T an acylindrical
tree T ∗ in such a way that groups elliptic in T are also elliptic in T ∗ , and groups elliptic
in T ∗ but not in T are small (T ∗ is smally dominated by T in the sense of Definition
7.10). Applying acylindrical accessibility to trees T ∗ is one of the key ingredients in our
construction of JSJ decompositions, but the proof involves much more than a bound on
the complexity of acylindrical splittings.
In the example, the tree T is a cyclic JSJ tree, but the preferred tree Tc is in a slightly
different deformation space; it is a JSJ tree relative to the Z2 subgroup. In general, we
show:
Theorem 6 (Theorem 9.5). Let G be a torsion-free finitely generated one-ended CSA
group. There is a canonical JSJ tree over abelian subgroups relative to all non-cyclic abelian
subgroups. Its non-abelian flexible vertex stabilizers are QH with trivial fiber.
8
The CSA property (maximal abelian subgroups are malnormal) holds for any torsionfree hyperbolic group Γ, and any Γ-limit group. If Γ is a hyperbolic group with torsion, Γ
and all Γ-limit groups have the weaker property of being K-CSA (for some integer K), as
defined in Subsection 9.2. Theorem 6 generalizes to this setting (see Theorem 9.14) and
implies the following result:
Theorem 7. Let Γ be a hyperbolic group, and let G be a one-ended Γ-limit group. Then
G has a canonical JSJ tree over virtually abelian subgroups relative to all virtually abelian
subgroups which are not virtually cyclic. Its flexible vertex stabilizers are virtually abelian
or QH with finite fiber.
We have a similar statement for relatively hyperbolic groups.
Theorem 8 (Theorem 9.18). Let G be one-ended and hyperbolic relative to a finite family of
finitely generated small subgroups. If A is either the family of all virtually cyclic subgroups
of G, or the family of all small subgroups, there is a canonical JSJ tree over A relative to
all parabolic subgroups. Its flexible vertex stabilizers are small or QH with finite fiber.
The trees produced by these theorems are defined in a uniform, natural way, and are
canonical (as discussed above). In particular, they are invariant under automorphims.
When G is a one-ended hyperbolic group, the canonical JSJ tree (non-relative in this case)
coincides with the tree constructed by Bowditch [Bow98] using the topology of ∂G.
Compatibility JSJ
A refinement T̂ of a tree T is a tree obtained by blowing up vertices of T (beware that
in [FP06] a refinement of T is what we call a tree dominating T ; on the other hand, their
elementary unfoldings are refinements in our sense). There is a map p from T̂ to T , so
T̂ dominates T , but this map is very special: it maps any segment [x, y] of T̂ onto the
segment [p(x), p(y)] of T (in particular, it does not fold). We call such a map a collapse
map, as it is obtained by collapsing certain edges to points.
If a tree T1 is universally elliptic, then given any tree T2 there is a refinement T̂1 of T1
which dominates T2 : there is an equivariant map f : T̂1 → T2 (see Proposition 2.2). If T2
has finitely generated edge stabilizers, one may obtain T2 from T̂1 by a finite sequence of
folds and collapses [BF91]. In this sense, one can read T2 from T1 . In particular, one may
read any tree T2 from any JSJ tree T1 .
In general, the map f : T̂1 → T2 is not a collapse map (there are folds). We say that
T1 and T2 are compatible if there exists a refinement T̂1 with a collapse map f : T̂1 → T2 .
In other words, T1 , T2 are compatible when they have a common refinement. This implies
that edge stabilizers of each tree are elliptic in the other, but is much more restrictive.
For instance, if Σ is a compact surface with boundary, free splittings of π1 (Σ) dual
to properly embedded arcs are always elliptic with respect to each other (edge groups are
trivial), but they are compatible only if the arcs are disjoint (up to isotopy). On the other
hand, splittings of a hyperbolic surface group associated to two simple closed geodesics
γ, γ 0 are compatible if and only if γ and γ 0 are disjoint or equal; in this specific case,
compatibility is equivalent to the trees being elliptic with respect to each other.
In Part V we introduce another type of JSJ decomposition, which encodes compatibility
of splittings rather than ellipticity. The new feature is that, except in degenerate cases, it
will lead to a canonical tree Tco (not just a deformation space). As above, we fix a family
A and all trees are assumed to be A-trees.
We say that a tree T (or the corresponding graph of groups Γ) is universally compatible
if it is compatible with every tree. One may then obtain any tree from T by refining and
collapsing, and view any one-edge splitting of G as coming from an edge of Γ or from a
splitting of a vertex group of Γ.
9
Definition. The compatibility JSJ deformation space Dco is the maximal deformation
space (for domination) containing a universally compatible tree (such a maximal deformation space, if it exists, is unique).
In other words, Dco contains a universally compatible tree T , and T dominates all
universally compatible trees.
Theorem 9 (Theorem 10.3). Let G be finitely presented, and let A be any conjugacyinvariant class of subgroups of G, stable under taking subgroups. Then the compatibility
JSJ deformation space Dco of G over A exists.
Although existence of the usual JSJ deformation space is a fairly direct consequence of
accessibility, proving existence of the compatibility JSJ deformation space is more delicate.
Among other things, we use a limiting argument, and we need to know that a limit of
universally compatible trees is universally compatible. This is best expressed in terms of
R-trees (see the appendix).
As mentioned above, the deformation space Dco contains a canonical element Tco ,
except in degenerate cases. Recall that a tree T is irreducible if G acts on T with no fixed
point, no fixed end, and no invariant line; we say that a deformation space D is irreducible
if some (equivalently, every) T ∈ D is irreducible.
Theorem 10 (Corollary 10.8). If Dco exists and is irreducible, it contains a canonical tree
Tco , the compatibility JSJ tree. In particular, if A is invariant under automorphisms of
G, so is Tco .
This is because a deformation space D containing an irreducible universally compatible
tree has a preferred element.
We develop an analogy with arithmetic, viewing a refinement of T as a multiple of T ,
and one-edge splittings as primes. We define the greatest common divisor (gcd) of two
trees, the least common multiple (lcm) of a family of pairwise compatible trees, and Tco is
the lcm of the reduced universally compatible trees contained in Dco (see Subsection 1.4.2
for the definition of “reduced”).
This tree Tco is similar to the canonical tree TSS constructed by Scott and Swarup
[SS03], which has the property of being compatible with almost-invariant sets (Scott and
Swarup use the word enclosing, which generalizes compatibility). In general, Tco dominates
TSS , but it may be non-trivial when TSS is trivial (this happens for instance for the
Baumslag-Solitar group BS(m, n) when none of m, n divides the other). See [GL10] for
the relation between TSS and JSJ decompositions.
Being invariant under automorphisms sometimes forces Tco to be trivial (a point).
This happens for instance when G is free. On the other hand, we give simple examples
with Tco non-trivial: certain virtually free groups, generalized Baumslag-Solitar groups,
Poincaré duality groups... Trees of cylinders also provide many examples. In particular,
the canonical trees of Theorems 6 and 8 are very closely related to Tco .
Contents of the paper
For the reader’s convenience we now describe the detailed contents of each section. This
includes a few results not directly related to JSJ decompositions, which are of independent
interest: relative finite presentation (4.2.2), small orbifolds (5.1.3), orbifolds with finite
mapping class group (5.1.4), K-CSA groups (9.2), compatibility and length functions (A.3),
arithmetic of trees (A.5).
This is meant as a description, so statements may be imprecise or incomplete.
• In the preliminary section (Section 1), we collect basic facts about groups acting on
trees, and we define (A, H)-trees (trees with edge stabilizers in A relative to H), collapse
10
maps and refinements, compatibility, domination, deformation spaces. We discuss slenderness and smallness of subgroups, one-endedness, and we recall the main accessibility
results. We also define and discuss relative finite generation and presentation (relative
finite presentation of vertex groups is studied in Subsection 4.2.2).
• Section 2 starts with a very useful fact: if all edge stabilizers of T1 are elliptic in T2 ,
there is a refinement of T1 which dominates T2 . After defining universal ellipticity, we define
JSJ trees and the JSJ deformation space by a maximality property, as explained above.
We prove the existence of JSJ decompositions under a finite presentability assumption,
first in the non-relative case and then in general. This relies on a version of Dunwoody’s
accessibility due to Fujiwara-Papasoglu [FP06] which we state and prove. We also explain
why the JSJ decompositions constructed by Rips-Sela [RS97], Dunwoody-Sageev [DS99],
Fujiwara-Papasoglu [FP06] are JSJ decompositions in our sense.
• Section 3 is devoted to simple examples. We first consider Grushko decompositions
(over the trivial group) and Stallings-Dunwoody decompositions (over finite groups), explaining how to interpret them as JSJ decompositions. We also consider small groups, and
locally finite trees (such as those associated to cyclic splittings of generalized BaumslagSolitar groups). All these examples of JSJ decompositions only have rigid vertices. At the
end of the section we work out an example where the JSJ decomposition has QH flexible
vertices.
• Section 4 contains various useful technical results. Given a vertex of a graph of
groups or of a tree, we define the incident edge groups and we point out that any splitting
of the vertex group which is relative to the incident edge groups extends to a splitting of
G. Given a universally elliptic splitting of G, one may obtain a JSJ decomposition of G
from relative JSJ decompositions of vertex groups. In particular, one may usually restrict
to one-ended groups when studying JSJ decompositions.
• Section 5 is devoted to QH groups. We first study 2-dimensional hyperbolic orbifolds
Σ, in particular the relation between splittings of π1 (Σ) and simple closed geodesics on Σ.
We classify orbifolds Σ with no essential simple closed geodesic (their groups do not split
over a cyclic subgroup relative to the fundamental groups of boundary components, so they
do not appear in QH vertices of JSJ decompositions); when Σ is a surface, only the pair
of pants (thrice-punctured sphere) occurs, but the classification is more complicated for
singular, possibly non-orientable, orbifolds. We also classify orbifolds with finite mapping
class group.
We then define QH subgroups, and study their basic properties (universal ellipticity
of the fiber, used boundary components, existence of simple geodesics, universally elliptic
subgroups). In particular, we show that, if Q is a QH vertex group in a JSJ decomposition
over slender groups, and G acts on a tree with slender edge stabilizers, then either Q fixes
a point or its action on its minimal subtree is dual to a family of simple closed geodesics
of Σ. We also prove a more general version of Proposition 5 showing that, under suitable
assumptions, any QH vertex stabilizer Q of any tree is elliptic in JSJ trees.
Using a filling construction, we give examples of possible peripheral structures of QH
vertex groups, and we show that flexible vertex groups of JSJ decompositions over abelian
subgroups do not have to be QH (the filling construction was introduced in Section 4, in
order to provide an alternative construction of relative splittings).
• In Section 6 we study flexible vertices of JSJ decompositions over slender groups;
in particular, we prove Theorem 4. For completeness we also describe slender flexible
subgroups. We allow edge stabilizers which are only “slender in trees”: whenever G acts on
a tree, they fix a point or leave a line invariant. This is useful when working in a relative
setting, as groups in H are automatically slender in trees.
To prove Theorem 4, we follow the approach by Fujiwara-Papasoglu [FP06], with simplifications. In particular, the a priori knowledge that JSJ decompositions exist allows us
to reduce to totally flexible groups. Following [FP06], we define the core, and the enclosing
11
group of two splittings (which we call their regular neighborhood). We then construct a
filling pair of splittings, and we show that their regular neighborhood is the required QH
group. For technical reasons we replace Fujiwara-Papasoglu’s notion of minimal splittings
by the slightly stronger notion of minuscule splittings.
In Theorem 4 the family A does not have to be the family of all slender subgroups of G.
The theorem holds if A is a family of slender groups satisfying one of two stability conditions
(SC) and (SCZ ); the familly of cyclic (resp. virtually cyclic) subgroups satisfies (SCZ )
(resp. (SC)). These conditions ensure that the regular neighborhood of two splittings with
edge groups in A also has edge groups in A.
• Section 7 is devoted to the tree of cylinders. Given an admissible equivalence relation
on the set A∞ of infinite groups in A, one may associate a tree of cylinders Tc to any
tree T with stabilizers in A∞ . This tree only depends on the deformation space of T . We
give conditions ensuring that Tc is acylindrical and smally dominated by T (this means in
particular that groups elliptic in Tc but not in T are small). We also study the compatibility
properties of Tc .
• In Section 8 we show that JSJ decompositions exist, and non-small flexible vertex
groups are QH with finite fiber, under the assumption that one may associate to any tree
T an acylindrical tree T ∗ smally dominated by T . We first construct a relative tree as in
Theorems 6 and 8, and we refine it in order to get the required JSJ tree.
• This is applied in Section 9, with T ∗ the tree of cylinders, and used to prove Theorems
6 and 8. We study torsion-free CSA groups, relatively groups, as well as cyclic splittings
of commutative transitive groups. We introduce K-CSA groups, for K an integer, which
are better suited than CSA groups to study groups with torsion, and we prove Theorem
7. We also discuss a slightly different type of JSJ decompositions of one-ended hyperbolic
groups, where edge groups are required to be maximal virtually cyclic subgroups with
infinite center.
• In Section 10 we define universal compatibility and we show Theorem 9 (existence of
the compatibility JSJ deformation space Dco ). We then construct the compatibility JSJ
tree Tco and we give examples. In particular, we use the compatibility properties of the
tree of cylinders to identify Dco for abelian splittings of CSA groups, elementary splittings
of relatively hyperbolic groups, and cyclic splittings of commutative transitive groups.
• In the appendix we view trees as metric rather than combinatorial objects, and we
actually consider R-trees. We first give simple proofs of two standard results: a tree is
determined by its length function ([AB87], [CM87]), the axes topology agrees with the
equivariant Gromov-Hausdorff topology [Pau89]. We then study compatibility (which is
defined for R-trees using collapse maps): we prove that two R-trees are compatible if and
only if the sum of their length functions is a length function (i.e. it comes from some Rtree). In particular, compatibility is a closed property in the space of trees (this is used in
the proof of Theorem 9).
Using the core introduced by the first author [Gui05], we then show that a finite family
of pairwise compatible R-trees has a common refinement. Going back to simplicial trees,
we develop an analogy with basic arithmetics: we define the prime factors of a tree T (the
one-edge splittings corresponding to edges of the quotient graph T /G), we show that trees
are square-free, and we define gcd’s and lcm’s.
We conclude by some remarks about combining JSJ theory and Rips theory to describe
small actions on R-trees. This gives another, more general, approach to the main result of
[Gui00b].
What is new
JSJ theory was developed by several people, but to the best of our knowledge the following
is original material:
12
• The definition of JSJ decompositions as a deformation space satisfying a maximality
property.
• The systematic study of relative JSJ decompositions.
• Most of Section 4.
• The classification of small orbifolds and orbifolds with finite mapping class group in
Section 5.
• The stability conditions (SC) and (SCZ ) (but compare [DS99]), and the description
of slender flexible groups.
• Everything from Subsection 7.3 on, with the exception of A.1 and A.2. In particular
the detailed proof of existence of the JSJ decomposition under acylindricity assumptions
(compare [Sel99, Sel01]), the compatibility JSJ tree, the arithmetic of trees.
• The K-CSA property (but see also [RW10]).
Acknowledgements
The first author acknowledges support from the Institut universitaire de France, ANR
project ANR-11-BS01-013, and membership to the Henri Lebesgue center 11-LABX-0020.
The second author acknowledges support from ANR-07-BLAN-0141-01 and ANR-2010BLAN-116-03.
Contents
I
Preliminaries
15
1 Preliminaries
1.1 Basic notions and notations . . . . . . . . . . . . . . .
1.2 Trees . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3 (A, H)-trees, one-endedness . . . . . . . . . . . . . . .
1.4 Maps between trees, compatibility, deformation spaces
1.5 Slenderness, smallness . . . . . . . . . . . . . . . . . .
1.6 Accessibility . . . . . . . . . . . . . . . . . . . . . . . .
1.7 Relative finite generation and presentation . . . . . . .
II
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
The JSJ deformation space
15
15
16
18
18
19
20
21
22
2 Definition and existence
2.1 Standard refinements . . . . . . . . . . . . . . . . . . . . . . .
2.2 Universal ellipticity . . . . . . . . . . . . . . . . . . . . . . .
2.3 The JSJ deformation space . . . . . . . . . . . . . . . . . . .
2.4 Existence of the JSJ deformation space: the non-relative case
2.5 Existence: the relative case . . . . . . . . . . . . . . . . . . .
2.6 Relation with other constructions . . . . . . . . . . . . . . . .
3 Examples of JSJ decompositions
3.1 Free groups . . . . . . . . . . . . . . . . . . . . . . .
3.2 Free splittings: the Grushko deformation space . . .
3.3 Splittings over finite groups: the Stallings-Dunwoody
3.4 Splittings of small groups . . . . . . . . . . . . . . .
3.5 Generalized Baumslag-Solitar groups . . . . . . . . .
3.6 Locally finite trees . . . . . . . . . . . . . . . . . . .
3.7 RAAGs . . . . . . . . . . . . . . . . . . . . . . . . .
13
.
.
.
.
.
.
.
.
.
.
.
.
. . . . . . .
. . . . . . .
deformation
. . . . . . .
. . . . . . .
. . . . . . .
. . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. . . .
. . . .
space
. . . .
. . . .
. . . .
. . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
22
22
24
25
26
27
29
.
.
.
.
.
.
.
30
30
30
31
31
32
32
32
3.8
3.9
Parabolic splittings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Non-rigid examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
4 A few useful facts
4.1 Changing edge groups . . . . . . . .
4.2 Incidence structures of vertex groups
4.3 JSJ decompositions of vertex groups
4.4 Relative JSJ decompositions through
III
. . . .
. . . .
. . . .
fillings
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Flexible vertices
6 JSJ
6.1
6.2
6.3
6.4
6.5
6.6
6.7
6.8
6.9
decompositions over slender groups
Statement of results . . . . . . . . . . . . . . . . . .
Reduction to totally flexible groups . . . . . . . . . .
Fujiwara-Papasoglu’s core . . . . . . . . . . . . . . .
The regular neighborhood . . . . . . . . . . . . . . .
Constructing a filling pair of splittings . . . . . . . .
Flexible groups are QH when trees are minuscule . .
All splittings of a totally flexible group are minuscule
Slenderness in trees . . . . . . . . . . . . . . . . . . .
Slender flexible groups . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
41
41
47
50
52
54
.
.
.
.
.
.
.
.
.
55
55
57
59
62
65
68
68
70
71
Acylindricity
7 Trees of cylinders
7.1 Definition . . . .
7.2 Acylindricity . .
7.3 Small domination
7.4 Compatibility . .
34
34
35
37
39
40
5 Quadratically hanging vertices
5.1 2-orbifolds and their splittings . . . . . . . . . . . . . . . . . .
5.2 Definition and properties of quadratically hanging subgroups
5.3 Quadratically hanging subgroups are elliptic in the JSJ . . . .
5.4 Peripheral structure of quadratically hanging vertices . . . . .
5.5 Flexible vertices of abelian JSJ decompositions . . . . . . . .
IV
.
.
.
.
73
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
73
74
76
77
79
8 Constructing JSJ decompositions using acylindricity
80
8.1 Uniform acylindricity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
8.2 Acylindricity up to small groups . . . . . . . . . . . . . . . . . . . . . . . . . 86
9 Applications
9.1 CSA groups . . . . . . . . . . . . .
9.2 Γ-limit groups and K-CSA groups
9.3 Relatively hyperbolic groups . . . .
9.4 Virtually cyclic splittings . . . . .
9.5 The Zmax -JSJ decomposition . . .
V
.
.
.
.
.
Compatibility
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
89
90
91
94
96
97
100
14
10 The compatibility JSJ tree
100
10.1 Existence of the compatibility JSJ space . . . . . . . . . . . . . . . . . . . . 101
10.2 The compatibility JSJ tree Tco . . . . . . . . . . . . . . . . . . . . . . . . . 103
11 Examples
11.1 Free groups . . . . . . . . . . . . . . . . . . . . . .
11.2 Algebraic rigidity . . . . . . . . . . . . . . . . . . .
11.3 Free products . . . . . . . . . . . . . . . . . . . . .
11.4 (Generalized) Baumslag-Solitar groups . . . . . . .
11.5 The canonical decomposition of Scott and Swarup
11.6 Poincaré duality groups . . . . . . . . . . . . . . .
11.7 Trees of cylinders . . . . . . . . . . . . . . . . . . .
A R-trees, length functions, and compatibility
A.1 Metric trees and length functions . . . . . .
A.2 From length functions to trees . . . . . . . .
A.3 Compatibility and length functions . . . . .
A.4 Common refinements . . . . . . . . . . . . .
A.5 Arithmetic of trees . . . . . . . . . . . . . .
A.6 Reading actions on R-trees . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
104
. 104
. 104
. 105
. 105
. 105
. 106
. 106
.
.
.
.
.
.
109
. 109
. 110
. 113
. 115
. 116
. 118
Part I
Preliminaries
1
Preliminaries
In this paper, G will always be a finitely generated group. Sometimes finite presentation
will be needed, for instance to prove existence of JSJ decompositions in full generality.
1.1
Basic notions and notations
Two subgroups H, H 0 of a group G are commensurable if H ∩ H 0 has finite index in H and
in H 0 . The commensurator of H (in G) is the set of elements g ∈ G such that gHg −1 is
commensurable to H.
We denote by Fn the free group on n generators.
A group H is virtually cyclic if it has a cyclic subgroup of finite index: H is finite or has
a finite index subgroup isomorphic to Z (infinite virtually cyclic groups are characterized
as being two-ended). There are two types of infinite virtually cyclic groups: those with
infinite center map onto Z with finite kernel K, those with finite center map onto the
infinite dihedral group D∞ = (Z/2) ∗ (Z/2) with finite kernel K (see [SW79]). The kernel
K is the unique maximal finite normal subgroup of H. In Subsection 7.2 we shall say that
H is C-virtually cyclic for some constant C ≥ 1 if K has cardinality at most C.
A group G is relatively hyperbolic with respect to a family of finitely generated subgroups P = {P1 , . . . , Pn } if it acts properly by isometries on a proper Gromov hyperbolic
space with an invariant collection of disjoint horoballs, the action is cocompact on the complement of these horoballs, and the stabilizers of the horoballs are exactly the conjugates
of the Pi ’s [Bow12, Far98, Osi06, Hru10]. A subgroup is called parabolic if it is conjugate
to a subgroup of some Pi , elementary if it is parabolic or virtually cyclic. Non-elementary
subgroups contain free subgroups acting by hyperbolic isometries.
15
A group is CSA (for conjugately separated abelian) if its maximal abelian subgroups
are malnormal. For example, torsion-free hyperbolic groups are CSA. See Subsection 9.2
for a generalisation in presence of torsion.
1.2
Trees
We consider actions of G on simplicial trees T . We identify two trees if there is an equivariant isomorphism between them. In the appendix we will view trees as metric spaces
and work with R-trees, but in most of the paper trees are considered as combinatorial
objects. Still, it is useful to think of a tree as a geometric object, for instance to define the
arc between any two points, or the midpoint of an edge. See [Ser77, SW79, DD89, Sha91,
Sha87, Chi01] for basic facts about trees.
Given two points a, b ∈ T , there is a unique segment [a, b] joining them; it is degenerate
if a = b. Non-degenerate segments are also called arcs (they are homeomorphic to [0, 1]).
If A, B are disjoint simplicial subtrees, the bridge between them is the unique segment
I = [a, b] such that A ∩ I = {a} and B ∩ I = {b}.
We always assume that G acts without inversion (if e = vw is an edge, no element of G
interchanges v and w), and often that T has no redundant vertex : if a vertex has valence
2, it is the unique fixed point of some element of G. We denote by V (T ) and E(T ) the
set of vertices and (non-oriented) edges of T respectively, by Gv or Ge the stabilizer of a
vertex v or an edge e, by Gx the stabilizer of an arbitrary point x ∈ T .
By Bass-Serre theory, the action of G on T can be viewed as a splitting of G as a
marked graph of groups, i.e. an isomorphism between G and the fundamental group of a
graph of groups Γ. A one-edge splitting (when Γ has one edge) is an amalgam G = A ∗C B
or an HNN-extension G = A∗C . We also denote by Gv or Ge the groups carried by vertices
and edges of Γ.
The action G y T is trivial if G fixes a point (hence a vertex since we assume that
there is no inversion), minimal if there is no proper G-invariant subtree.
Unless otherwise indicated, all trees are endowed with a minimal action of G without
inversion (we allow the trivial case when T is a point). Finite generation of G implies that
the quotient graph Γ = T /G is finite. Note, however, that the restriction of the action to
a subgroup of G does not have to be minimal.
An element g or a subgroup H of G is elliptic in T if it fixes a point. This is equivalent
to g or H being contained in a conjugate of a vertex group of Γ. We denote by Fix g or
Fix H its fixed point set in T . If H is elliptic, any H-invariant subtree meets Fix H. If
H1 ⊂ H2 ⊂ G with H1 of finite index in H2 , then H1 is elliptic if and only if H2 is.
Finite groups, and groups with Kazhdan’s property (T), have Serre’s property (FA):
there is a fixed point in every tree on which they act.
If H is finitely generated, it is elliptic if and only if all its elements are. This follows
from Serre’s lemma [Ser77, 6.5, corollaire 2]: if g1 , . . . , gn , as well as all products gi gj , are
elliptic, then hg1 , . . . , gn i is an elliptic subgroup.
An element g which is not elliptic is hyperbolic, it has a unique axis A(g) on which it
acts by translation. We also denote by A(g) the characteristic set of g: its fixed point set
if it is elliptic, its axis if it is hyperbolic.
Translation lengths and length functions will only be used in Subsections 8.1 and 10.1,
we discuss them in the appendix (for R-trees).
We will need to consider the restriction of the action of G to subgroups. Let therefore
H be an arbitrary group (possibly infinitely generated) acting on a tree T . We only assume
that the action is not trivial (there is no global fixed point).
If H contains no hyperbolic element, it is not finitely generated by Serre’s lemma, and
it fixes a unique end of T : there is a ray ρ such that each finitely generated subgroup of H
fixes a subray of ρ (an end of T is an equivalence class of rays, with ρ, ρ0 equivalent if their
16
intersection is a ray). In this case there are H-invariant subtrees, but no minimal one.
Assume now that H contains a hyperbolic element (we sometimes say that H acts hyperbolically, or is hyperbolic); by Serre’s lemma, this always holds if H is finitely generated
and acts non-trivially. Then there is a unique minimal H-invariant subtree µT (H), namely
the union of axes of hyperbolic elements of H.
The tree T (with the action of H) is irreducible if there exist two hyperbolic elements
g, h ∈ H whose axes are disjoint or intersect in a finite segment. Suitable powers of g and
h then generate a non-abelian free group F2 ⊂ H acting freely on T . It follows that T is
irreducible if and only if there exist two hyperbolic elements g, h whose commutator [g, h]
is hyperbolic.
If T is not irreducible, then H preserves a line of T or fixes a unique end (recall that by
assumption there is no global fixed point, and note that there is an invariant line if there
are two fixed ends).
There are two types of non-trivial actions on a line. If orientation is preserved, the
action is by translations and both ends of the line are invariant. All points and edges
have the same stabilizer. If not, there are reflections. The action is said to be dihedral,
it factors through an action of the infinite dihedral group D∞ = Z/2 ∗ Z/2. There is no
invariant end. All edges have the same stabilizer, but vertex stabilizers may contain the
edge stabilizer with index 2.
If H fixes an end of T , there is an associated homomorphism χ : H → Z measuring
how much an element h pushes towards the end. More precisely, for h ∈ H, one defines
χ(h) as the difference between the number of edges in ρ \ (ρ ∩ hρ) and the number of edges
in hρ \ (ρ ∩ hρ), with ρ any ray going to the end.
The map χ is non-trivial if and only if H contains a hyperbolic element. In this case
the quotient graph of groups Γ is homeomorphic to a circle, and one may orient the circle
so that the inclusion Ge → Gv is onto whenever e = vw is a positively oriented edge.
When Γ is a single edge, it defines an ascending HNN extension and χ is (up to sign) the
exponent sum of the stable letter.
To sum up:
Proposition 1.1. If H acts on a tree, one of the following holds:
(1) there is a global fixed point;
(2) there are hyperbolic elements h ∈ H, and T contains a unique minimal H-invariant
subtree µT (H);
(3) H is infinitely generated and fixes a unique end.
Proposition 1.2. If H acts minimally on a tree T (i.e. there is no proper H-invariant
subtree), there are five possibilities:
(1) T is a point (trivial action);
(2) T is a line, and H acts by translations; the action factors through Z;
(3) T is a line, and some h ∈ H reverses orientation (dihedral action); the action factors
through D∞ = Z/2 ∗ Z/2;
(4) there is a unique invariant end, but no global fixed point; the quotient graph of groups
is homeomorphic to a circle;
(5) T is irreducible (this implies F2 ⊂ H).
In all cases except (1), some h ∈ H is hyperbolic.
In particular:
17
Corollary 1.3. If H acts on T , and T is not irreducible, then there is a fixed point, or a
unique fixed end, or a unique invariant line.
Proof. Existence follows from the propositions. We prove the uniqueness statements. If
there are two invariant ends, the line joining them is invariant. We show that there is a
fixed point if there exist two invariant lines `1 , `2 .
If `1 and `2 are disjoint, the midpoint of the bridge between them is fixed. If their
intersection is a segment of finite length, its midpoint is fixed. If the intersection is a ray,
its origin is a fixed point.
1.3
(A, H)-trees, one-endedness
Besides G, we usually also fix a (nonempty) family A of subgroups of G which is stable
under conjugation and under taking subgroups. An A-tree is a tree T whose edge stabilizers
belong to A. We often say that T , or the corresponding splitting of G, is over A, or over
groups in A. We say cyclic tree (abelian tree, slender tree, . . . ) when A is the family of
cyclic (abelian, . . . ) subgroups.
We also fix an arbitrary set H of subgroups of G, and we restrict to A-trees T such that
each H ∈ H is elliptic in T (in terms of graphs of groups, H is contained in a conjugate
of a vertex group; if H is not finitely generated, this is stronger than requiring that every
h ∈ H be elliptic). We call such a tree an (A, H)-tree, or a tree over A relative to H. The
set of (A, H)-trees does not change if we replace a group of H by a conjugate, or if we
enlarge H by making it invariant under conjugation.
If G acts non-trivially on an (A, H)-tree, we say that G splits over A (or over a group
of A) relative to H.
The group G is freely indecomposable relative to H if it does not split over the trivial
group relative to H. Equivalently (unless G = Z and H is trivial), one cannot write
G = G1 ∗ G2 with G1 , G2 non-trivial, and every group in H contained in a conjugate of G1
or G2 .
One says that G is one-ended relative to H if G does not split over a finite group relative
to H (when H is empty, this is equivalent to G being finite or one-ended by a theorem of
Stallings, see e.g. [SW79]).
1.4
1.4.1
Maps between trees, compatibility, deformation spaces
Morphisms, collapse maps, refinements, compatibility
Maps between trees will always be G-equivariant, send vertices to vertices and edges to
edge paths (maybe a point). By minimality of the actions, they are always surjective; each
edge of T 0 is contained in the image of an edge of T . Any edge stabilizer Ge0 of T 0 contains
an edge stabilizer Ge of T . Also note that any edge or vertex stabilizer of T is contained
in a vertex stabilizer of T 0 .
We mention two particular classes of maps.
A map f : T → T 0 between two trees is a morphism if and only if one may subdivide
T so that f maps each edge onto an edge; equivalently, no edge of T is collapsed to a
point. Folds are examples of morphisms (see [Sta83, BF91]). If f is a morphism, any edge
stabilizer of T is contained in an edge stabilizer of T 0 .
A collapse map f : T → T 0 is a map obtained by collapsing certain edges to points,
followed by an isomorphism (by equivariance, the set of collapsed edges is G-invariant).
Equivalently, f preserves alignment: the image of any arc [a, b] is a point or the arc
[f (a), f (b)]. Another characterization is that the preimage of every subtree is a subtree.
In terms of graphs of groups, one obtains T 0 /G by collapsing edges in T /G. If T 0 is
irreducible, so is T . If T is irreducible, one easily checks that T 0 is trivial (a point) or
irreducible (compare Lemma A.21).
18
A tree T 0 is a collapse of T if there is a collapse map T → T 0 ; conversely, we say that
T refines T 0 . In terms of graphs of groups, one passes from Γ = T /G to Γ0 = T 0 /G by
collapsing edges; for each vertex v of Γ0 , the vertex group Gv is the fundamental group of
the graph of groups Γv occurring as the preimage of v in Γ.
Conversely, suppose that v is a vertex of a splitting Γ0 , and Γv is a splitting of Gv in
which incident edge groups are elliptic. One may then refine Γ0 at v using Γv , so as to
obtain a splitting Γ whose edges are those of Γ0 together with those of Γv (see Lemma
4.12). Note that Γ is not uniquely defined because there is flexibility in the way edges of
Γ0 are attached to vertices of Γv ; this is discussed in [GL16, Section 4.2].
Two trees T1 , T2 are compatible if they have a common refinement: there exists a tree
T̂ with collapse maps gi : T̂ → Ti . There is such a T̂ with the additional property that no
edge of T̂ gets collapsed in both T1 and T2 (this is discussed in Subsection A.5).
1.4.2
Domination, deformation spaces [For02, GL07a]
A tree T1 dominates a tree T2 if there is an equivariant map f : T1 → T2 from T1 to T2 .
We call f a domination map. Equivalently, T1 dominates T2 if every vertex stabilizer of T1
fixes a point in T2 : every subgroup which is elliptic in T1 is also elliptic in T2 . In particular,
every refinement of T1 dominates T1 . Beware that domination is defined by considering
ellipticity of subgroups, not just of elements (this may make a difference if vertex stabilizers
are not finitely generated).
Deformation spaces are defined by saying that two trees belong to the same deformation
space D if they have the same elliptic subgroups (i.e. each one dominates the other). When
we restrict to A-trees, we say that D is a deformation space over A. If a tree in D is
irreducible, so are all others, and we say that D is irreducible.
For instance, all trees with a free action of Fn belong to the same deformation space
D = CVn , Culler-Vogtmann’s outer space [CV86]. Note, however, that only finitely many
trees are compatible with a given T ∈ CVn .
We have defined deformation spaces as combinatorial objects, but (just like outer space)
they may be viewed as geometric objects (see e.g. [GL07a]). We will not use this point of
view.
A deformation space D dominates a space D0 if trees in D dominate those of D0 . Every
deformation space dominates the deformation space of the trivial tree, which is called the
trivial deformation space. It is the only deformation space in which G is elliptic.
A tree T is reduced [For02] if no proper collapse of T lies in the same deformation
space as T (this is different from being reduced in the sense of [BF91]). Observing that the
inclusion from Gv into Gu ∗Ge Gv is onto if and only if the inclusion Ge → Gu is, one sees
that T is reduced if and only if, whenever e = uv is an edge with Ge = Gu , then u and v
belong to the same orbit (i.e. e projects to a loop in Γ = T /G). Another characterization
is that, for any edge uv such that hGu , Gv i is elliptic, there exists a hyperbolic element
g ∈ G sending u to v (in particular the edge maps to a loop in Γ).
If T is not reduced, one obtains a reduced tree T 0 in the same deformation space by
collapsing certain orbits of edges (T 0 is not uniquely defined in general).
1.5
1.5.1
Slenderness, smallness
Slenderness
A group H is slender if H and all its subgroups are finitely generated. Examples of slender
groups include finitely generated virtually abelian groups, finitely generated virtually nilpotent groups, and virtually polycyclic groups. A slender group cannot contain a non-abelian
free group.
19
Slender groups have the characteristic property that, whenever they act on a tree, they
fix a point or there is an invariant line.
Lemma 1.4 ([DS99], Lemma 1.1). Let H be a slender group acting on a tree T . If H does
not fix a point, there is a unique H-invariant line ` ⊂ T .
Since H is finitely generated, there is a minimal subtree µT (H), and with the terminology of Proposition 1.2, only cases (1), (2), (3) are possible for µT (H).
Proof. The action of H cannot be irreducible since H does not contain F2 . If there is no
fixed point and no invariant line, there is a fixed end, and the associated χ : H → Z is
non-trivial because H is finitely generated. Each element of ker χ fixes a ray going to the
fixed end. Being finitely generated, ker χ is elliptic by Serre’s lemma. Its fixed point set is
a subtree T0 , which is H-invariant because ker χ is normal in H. The action of H on T0
factors through an action of the cyclic group H/ ker χ, so T0 contains an H-invariant line.
Uniqueness follows from Corollary 1.3.
It is convenient to use this lemma to define a weaker notion for subgroups of G. We
say that a subgroup H ⊂ G (possibly infinitely generated) is slender in (A, H)-trees if,
whenever G acts on an (A, H)-tree T , there is a point fixed by H or an H-invariant line.
In particular, any slender group, any group contained in a group of H, any group with
property (FA), is slender in (A, H)-trees.
The following lemma will be used in Subsection 6.8.
Lemma 1.5. Let A C A0 be subgroups of G, with A0 /A slender and A slender in (A, H)trees. Then A0 is slender in (A, H)-trees.
Proof. Let T be an (A, H)-tree. If A is elliptic, its fixed point set is an A0 -invariant subtree
because A is normal in A0 . The action of A0 /A on this subtree fixes a point or leaves a line
invariant, so the same is true for A0 . If A is not elliptic, it preserves a unique line, which
is A0 -invariant since A C A0 .
1.5.2
Smallness
One defines an abstract group as being small if it does not contain F2 . Such a group cannot
act irreducibly on a tree. As above, we use trees to give a weaker definition for subgroups
of G. In particular, we want groups of H to be small.
Given a tree T on which G acts, we say (following [BF91] and [GL07a]) that a subgroup
H < G is small in T if its action on T is not irreducible. As mentioned above, H then
fixes a point, or an end, or leaves a line invariant (see Corollary 1.3). We say that H is
small in (A, H)-trees if it is small in every (A, H)-tree on which G acts. Every subgroup
not containing F2 , and every group contained in a group of H, is small in (A, H)-trees.
Moreover, H is small in (A, H)-trees if and only if all its finitely generated subgroups are.
1.6
Accessibility
Constructions of JSJ decompositions are based on accessibility theorems stating that, given
suitable G and A, there is an a priori bound for the number of orbits of edges of A-trees,
under the assumption that there is no redundant vertex (if v has valence 2, it is the unique
fixed point of some g ∈ G). This holds in particular:
(1) if G is finitely generated and all groups in A are finite with bounded order [Lin83];
(2) if G is finitely presented and all groups in A are finite [Dun85];
(3) if G is finitely presented, all groups in A are small, and the trees are reduced in the
sense of [BF91];
20
(4) if G is finitely generated and the trees are k-acylindrical for some k [Sel97a];
(5) if G is finitely generated and the trees are (k, C)-acylindrical [Wei12] ([Del99] for
finitely presented groups).
A tree is k-acylindrical (resp. (k, C)-acylindrical ) if the pointwise stabilizer of any
segment of length > k is trivial (resp. has order ≤ C).
In this paper, we use a version of Dunwoody’s accessibility given in [FP06] (see Proposition 2.17). In Section 8 we use acylindrical accessibility.
1.7
Relative finite generation and presentation
As mentioned above, we always assume that G is finitely generated, or finitely presented.
However, these properties are not always inherited by vertex groups. We therefore consider relative finite generation (or presentation), which behave better in that respect (see
Subsection 4.2.2).
Let G be a group with a finite family of subgroups H = {H1 , . . . , Hp }.
Definition 1.6. One says that G is finitely generated relative to H if there exists a finite
set Ω ⊂ G such that G is generated by Ω ∪ H1 · · · ∪ Hp . Such a subset Ω is a relative
generating set.
Clearly, if G is finitely generated, then it is finitely generated relative to any H. If the
Hi ’s are finitely generated, relative finite generation is equivalent to finite generation.
By adding the conjugators to Ω, one sees that relative finite generation does not change
if one replaces the subgroups Hi by conjugate subgroups.
As in Subsection 1.2, we have:
Proposition 1.7. Suppose that G is finitely generated relative to H, and acts on a tree T
relative to H. If there is no global fixed point, then G contains hyperbolic elements, there is
a unique minimal invariant subtree µT (G), and the quotient µT (G)/G is a finite graph.
Recall that T is relative to H if every Hi is elliptic in T .
We now consider relative finite presentation (see [Osi06]). Note that, if Ω is a relative
finite generating set, then the natural morphism F(Ω)∗H1 ∗· · ·∗Hp → G is an epimorphism
(with F(Ω) the free group on Ω).
Definition 1.8. One says that G is finitely presented relative to H if there exists a finite
relative generating set Ω ⊂ G, such that the kernel of the epimorphism F(Ω)∗H1 ∗· · ·∗Hp
G is normally generated by a finite subset R ⊂ F(Ω) ∗ H1 ∗ · · · ∗ Hp .
In particular, any group which is hyperbolic with respect to a finite family H is finitely
presented relative to H [Osi06].
One easily checks that relative finite presentation does not depend on the choice of Ω,
and is not affected if one replaces the subgroups Hi by conjugate subgroups. If G is finitely
presented, then it is finitely presented relative to any finite collection of finitely generated
subgroups. Note, however, that the free group F2 is not finitely presented relative to an
infinitely generated free subgroup H1 (only finitely many generators of H1 may appear in
R). Conversely, if G is finitely presented relative to any finite collection of finitely presented
subgroups, then G is finitely presented.
The following lemma will be used in Subsection 4.2.2.
Lemma 1.9. Suppose that G is finitely presented relative to {H1 , . . . , Hp }, and Hp ⊂ Hi
for some i < p. Then G is finitely presented relative to {H1 , . . . , Hp−1 }.
21
Proof. We show that Hp is finitely generated. The lemma then follows by applying Tietze
transformations.
Let x1 , . . . , xq be the set of elements of Hp which appear as a letter in one of the relators
of R (expressed as elements of F(Ω)∗H1 ∗· · ·∗Hp ). Each xj is equal to an element yj ∈ Hi .
We define a new finite set of relators by replacing each xj by yj and adding the relations
xj = yj . This new presentation expresses G as the amalgam of hΩ, H1 , . . . , Hp−1 i with Hp
over a finitely generated group H. The inclusion Hp ⊂ Hi now implies Hp = H.
Suppose that a finitely generated group G splits as a finite graph of groups. It is
well-known (see for instance [Coh89], Lemma 8.32 p. 218) that vertex groups are finitely
generated if one assumes that edge groups are finitely generated, but this is false in general
without this assumption. However, vertex groups are always finitely generated relative to
the incident edge groups, and there is a similar statement for relative finite presentation
(see Subsection 4.2.2).
Part II
The JSJ deformation space
We start this part by introducing standard refinements: if edge stabilizers of T1 are elliptic
in T2 , there is a tree T̂1 which refines T1 and dominates T2 . We then define the JSJ
deformation space, and we show that it exists under some finite presentability assumption.
We give examples in cases when there is no flexible vertex (flexible vertices are the subject
of Part III). We conclude this part by collecting a few useful facts. In particular, given
a tree T , we discuss finite presentation of vertex stabilizers, and we relate their splittings
relative to incident edge groups to splittings of G. We also explain why one may usually
restrict to one-ended groups when studying JSJ decompositions.
We fix a finitely generated group G, a family A of subgroups of G (closed under
conjugating and taking subgroups), and another family H. All trees will be minimal
(A, H)-trees (see Subsection 1.3). Whenever we construct a new tree (for instance in
Propositions 2.2 and 2.17) we check that it is a minimal (A, H)-tree.
2
Definition and existence
2.1
Standard refinements
Let T1 , T2 be trees.
Definition 2.1 (Ellipticity of trees). T1 is elliptic with respect to T2 if every edge stabilizer
of T1 fixes a point in T2 .
Note that T1 is elliptic with respect to T2 whenever there is a refinement T̂1 of T1 that
dominates T2 (see Subsection 1.4 for the difference between refinement and domination):
edge stabilizers of T1 are elliptic in T̂1 , hence in T2 . We show a converse statement.
Proposition 2.2. If T1 is elliptic with respect to T2 , there is a tree T̂1 with maps p : T̂1 →
T1 and f : T̂1 → T2 such that:
(1) p is a collapse map;
(2) for each v ∈ T1 , the restriction of f to the subtree Yv = p−1 (v) is injective.
In particular:
(i) T̂1 is a refinement of T1 that dominates T2 ;
22
(ii) the stabilizer of any edge of T̂1 fixes an edge in T1 or in T2 ;
(iii) every edge stabilizer of T2 contains an edge stabilizer of T̂1 ;
(iv) a subgroup of G is elliptic in T̂1 if and only if it is elliptic in both T1 and T2 .
Assertions (ii) and (iv) guarantee that T̂1 is an (A, H)-tree since T1 and T2 are.
Remark 2.3. If edge stabilizers of T2 are finitely generated, then T2 can be obtained from
T̂1 by a finite number of collapses and folds [BF91].
Proof. We construct T̂1 as follows.
For each vertex v ∈ V (T1 ), with stabilizer Gv , choose any Gv -invariant subtree Ỹv of
T2 (for instance, Ỹv can be a minimal Gv -invariant subtree, or the whole of T2 ). For each
edge e = vw ∈ E(T1 ), choose vertices pv ∈ Ỹv and pw ∈ Ỹw fixed by Ge ; this is possible
because Ge is elliptic in T2 by assumption, so has a fixed point in any Gv -invariant subtree.
We make these choices G-equivariantly.
We can now define a tree T̃1 by blowing up each vertex v of T1 into Ỹv ,Fand attaching
edges of T1 using the points pv . Formally, we consider the disjoint union ( v∈V (T1 ) Ỹv ) ∪
F
( e∈E(T1 ) e), and for each edge e = vw of T1 we identify v with pv ∈ Ỹv and w with
pw ∈ Ỹw . We define p̃ : T̃1 → T1 by sending Yv to v, and sending e ∈ E(T1 ) to itself. We
also define a map f˜ : T̃1 → T2 as equal to the inclusion Ỹv ,→ T2 on Ỹv , and sending the
edge e = vw to the segment [pv , pw ] ⊂ T2 .
In general, T̃1 may fail to be minimal, so we define T̂1 ⊂ T̃1 as the unique minimal
G-invariant subtree µT̃1 (G) (the action of G on T̂1 is non-trivial unless T1 and T2 are both
points). We then define p and f as the restrictions of p̃ and f˜ to T̂1 . These maps clearly
satisfy the first two requirements.
Let us check that the other properties follow. Assertion (i) is clear.
If e is an edge of T̂1 that is not collapsed by p, then Ge fixes an edge of T1 . Otherwise,
f maps e injectively to a non-degenerate segment of T2 , so Ge fixes an edge in T2 , and
Assertion (ii) holds.
Assertion (iii) is true for any surjective map f between trees.
To prove the non-trivial direction of Assertion (iv), assume that H is elliptic in T1 and
T2 . Then H ⊂ Gv for some v ∈ T1 , so H preserves the subtree Yv ⊂ T̂1 . Since f is injective
in restriction to Yv , it is enough to prove that H fixes a point in f (Yv ). This holds because
H is elliptic in T2 .
Remark 2.4. One may think of this construction in terms of graphs of groups, as follows.
Starting from the graph of group Γ1 = T1 /G, one replaces each vertex v ∈ Γ1 by the graph
of groups Λv dual to the action of Gv on its minimal subtree in T2 , and one attaches each
edge e of Γ1 incident to v onto a vertex of Λv whose group contains a conjugate of Ge .
Since any vertex group Gv of Γ1 is finitely generated relative to its incident edge groups
(see Lemma 4.7), and these edge groups are elliptic in T2 , there is a minimal Gv -invariant
subtree in T2 by Lemma 1.7. Thus, one may require that Gv act minimally on the preimage
Yv ⊂ T̂1 .
Definition 2.5 (Standard refinement). Any tree T̂1 as in Proposition 2.2 will be called a
standard refinement of T1 dominating T2 .
In general, there is no uniqueness of standard refinements. However, by Assertion (iv)
of Proposition 2.2, all standard refinements belong to the same deformation space, which
is the lowest deformation space dominating the deformation spaces containing T1 and T2
respectively. If T1 dominates T2 (resp. T2 dominates T1 ), then T̂1 is in the same deformation
space as T1 (resp. T2 ). Moreover, there is some symmetry: if T2 also happens to be elliptic
with respect to T1 , then any standard refinement T̂2 of T2 dominating T1 is in the same
deformation space as T̂1 .
23
Lemma 2.6.
(1) If T1 refines T2 and does not belong to the same deformation space, some g ∈ G is
hyperbolic in T1 and elliptic in T2 .
(2) If T1 is elliptic with respect to T2 , and every g ∈ G which is elliptic in T1 is also
elliptic in T2 , then T1 dominates T2 .
(3) If T1 is elliptic with respect to T2 , but T2 is not elliptic with respect to T1 , then G
splits over a group which has infinite index in an edge stabilizer of T2 .
Recall that all trees are assumed to be (A, H)-trees; the splitting obtained in (3) is
relative to H.
Proof. One needs only prove the first assertion when T2 is obtained from T1 by collapsing
the orbit of an edge e = uv. If u and v are in the same orbit, or if Ge 6= Gu and Ge 6= Gv ,
then some hyperbolic element of T1 becomes elliptic in T2 . Otherwise, T1 and T2 are in
the same deformation space (see Subsection 1.4.2).
For the second assertion, assume that T1 does not dominate T2 , and let T̂1 be a standard
refinement of T1 dominating T2 . It does not belong to the same deformation space as
T1 . Since it is a refinement of T1 , we have just seen that some g ∈ G is elliptic in T1
and hyperbolic in T̂1 . By assumption g is elliptic in T2 , contradicting Assertion (iv) of
Proposition 2.2.
For (3) (which is Remark 2.3 of [FP06]), let T̂1 be as in Proposition 2.2. Let Ge be
an edge stabilizer of T2 which is not elliptic in T1 . It contains an edge stabilizer J of T̂1 .
Since J is elliptic in T1 and Ge is not, the index of J in Ge is infinite.
2.2
Universal ellipticity
Definition 2.7 (Universally elliptic). A subgroup H ⊂ G is universally elliptic if it is
elliptic in every (A, H)-tree. A tree T is universally elliptic if its edge stabilizers are
universally elliptic, i.e. if T is elliptic with respect to every (A, H)-tree.
When we need to be specific, we say universally elliptic over A relative to H, or (A, H)universally elliptic. Otherwise we just say universally elliptic, recalling that all trees are
assumed to be (A, H)-trees.
Groups with Serre’s property (FA), in particular finite groups, are universally elliptic.
If H is universally elliptic and H 0 contains H with finite index, then H 0 is universally
elliptic.
Lemma 2.8. Consider two trees T1 , T2 .
(1) If T1 is universally elliptic, then some refinement of T1 dominates T2 .
(2) If T1 and T2 are universally elliptic, any standard refinement T̂1 of T1 dominating T2
is universally elliptic. In particular, there is a universally elliptic tree T̂1 dominating
both T1 and T2 .
(3) If T1 and T2 are universally elliptic and have the same elliptic elements, they belong
to the same deformation space.
Proof. The first two assertions follow directly from Assertions (i) and (ii) of Proposition
2.2. The last one follows from the second assertion of Lemma 2.6.
The following lemma will be used in Subsection 10.1.
24
Lemma 2.9. Let (Ti )i∈I be any family of trees. There exists a countable subset J ⊂ I
such that, if T is elliptic with respect to every Ti (i ∈ I), and T dominates every Tj for
j ∈ J, then T dominates Ti for all i ∈ I.
Proof. Since G is countable, we can find a countable J such that, if an element g ∈ G is
hyperbolic in some Ti , then it is hyperbolic in some Tj with j ∈ J. If T dominates every
Tj for j ∈ J, any g which is elliptic in T is elliptic in every Ti . By (2) of Lemma 2.6, the
tree T dominates every Ti .
For many purposes, it is enough to consider one-edge splittings, i.e. trees with only one
orbit of edges.
Lemma 2.10. Let S be a tree.
(1) S is universally elliptic if and only if it is elliptic with respect to every one-edge
splitting.
(2) S dominates every universally elliptic tree if and only if it dominates every universally
elliptic one-edge splitting.
Proof. For the non-trivial direction, one proves that S is elliptic with respect to T (resp.
dominates T ) by induction on the number of orbits of edges of T , using the following
lemma.
Lemma 2.11. Let T be a tree, and H a subgroup of G. Let E1 t E2 be a partition of E(T )
into two G-invariant sets. Let T1 , T2 be the trees obtained from T by collapsing E1 and E2
respectively.
(1) If a subgroup H is elliptic in T1 and T2 , then H is elliptic in T .
(2) If a tree T 0 dominates T1 and T2 , then it dominates T .
Proof. Let x1 ∈ T1 be a vertex fixed by H. Let Y ⊂ T be its preimage under the collapse
map T → T1 . It is a subtree. Now Y is H-invariant and embeds into T2 . Since H is elliptic
in T2 , it fixes a point in Y , so is elliptic in T . One shows (2) by applying (1) to the vertex
stabilizers of T 0 .
2.3
The JSJ deformation space
Having fixed A, we define Aell ⊂ A as the set of groups in A which are universally elliptic
(over A relative to H); Aell is stable under conjugating and taking subgroups. A tree is
universally elliptic if and only if it is an Aell -tree.
Definition 2.12 (JSJ deformation space). If there exists a deformation space DJSJ of
(Aell , H)-trees which is maximal for domination, it is unique by the second assertion of
Lemma 2.8. It is called the JSJ deformation space of G over A relative to H.
Trees in DJSJ are called JSJ trees (of G over A relative to H). They are precisely
those trees T which are universally elliptic, and which dominate every universally elliptic
tree. We also say that trees T ∈ DJSJ , and the associated graphs of groups Γ = T /G, are
JSJ decompositions.
We will show that the JSJ deformation space exists if G is finitely presented (Theorems
2.16 and 2.20), or in the presence of acylindricity (see Section 8). See Subsection 3.3 for
an example where there is no JSJ deformation space.
In general there are many JSJ trees, but they all belong to the same deformation space
and therefore have a lot in common (see Section 4 of [GL07a]). In particular [GL07a,
Corollary 4.4], they have the same vertex stabilizers, except possibly for vertex stabilizers
in Aell .
25
Remark 2.13. There are results saying that two trees belong to the same deformation space
D if and only if one can pass from one to the other by a finite sequence of moves of a certain
type ([For02], see also [CF09]); in particular, if D is non-ascending as defined in [GL07a,
Section 7], for instance when all groups in A are finite, any two reduced trees in D may be
joined by a finite sequence of slide moves. These results may be interpreted as saying that
a JSJ tree is unique up to certain moves. This is the content of the uniqueness statements
of [Sel97b, DS99, For03, FP06].
Definition 2.14 (Rigid and flexible vertices). Let H = Gv be a vertex stabilizer of a JSJ
tree T (or a vertex group of the graph of groups Γ = T /G). We say that H is rigid if it is
universally elliptic, flexible if it is not. We also say that the vertex v is rigid (flexible). If
H is flexible, we say that it is a flexible subgroup of G (over A relative to H).
The definition of flexible subgroups of G does not depend on the choice of the JSJ tree
T . The heart of JSJ theory is to understand flexible groups. They will be discussed in
Part III.
We record the following simple facts for future reference.
Lemma 2.15. Let T be a JSJ tree, and S any tree.
• There is a tree T̂ which refines T and dominates S.
• If S is universally elliptic, it may be refined to a JSJ tree.
Proof. Since T is elliptic with respect to S, one can construct a standard refinement T̂ of
T dominating S (Proposition 2.2). It satisfies the first assertion.
For the second assertion, since S is elliptic with respect to T , we can consider a standard
refinement Ŝ of S dominating T . It is universally elliptic by the second assertion of Lemma
2.8, and dominates T , so it is a JSJ tree.
There sometimes exists a universally compatible JSJ tree (see Sections 9 and 11). In
this case, one may require that T̂ also be a refinement of S.
2.4
Existence of the JSJ deformation space: the non-relative case
We prove the existence of JSJ decompositions, first assuming H = ∅.
Theorem 2.16. If G is finitely presented, then the JSJ deformation space DJSJ of G over
A exists. It contains a tree whose edge and vertex stabilizers are finitely generated.
There is no hypothesis, such as smallness or finite generation, on the elements of A.
Recall that, G being finitely generated, finite generation of edge stabilizers implies finite
generation of vertex stabilizers.
The existence of DJSJ will be deduced from the following version of Dunwoody’s accessibility, whose proof will be given in the next subsection.
Proposition 2.17 (Dunwoody’s accessibility). Let G be finitely presented. Assume that
T1 ← · · · ← Tk ← Tk+1 ← . . . is a sequence of refinements of trees. There exists a tree S
such that:
(1) for k large enough, there is a morphism S → Tk (in particular, S dominates Tk );
(2) each edge and vertex stabilizer of S is finitely generated.
Note that the maps Tk+1 → Tk are required to be collapse maps.
Recall (Subsection 1.4) that f : S → Tk is a morphism if S may be subdivided so that
f maps edges to edges (a collapse map is not a morphism). In particular, edge stabilizers
of S fix an edge in Tk , so S is an A-tree since every Tk is. It is universally elliptic if every
Tk is.
26
Remark 2.18. Unfortunately, it is not true that the deformation space of Tk must stabilize
as k increases, even if all edge stabilizers are cyclic. For example (as on pp. 449-450 of
[BF91]), let A be a group with a sequence of nested infinite cyclic groups A % C1 % C2 %
. . . , let G = A ∗ B with B non-trivial, and let Tk be the Bass-Serre tree of the iterated
amalgam
G = A ∗C1 C1 ∗C2 C2 ∗C3 · · · ∗Ck−1 Ck−1 ∗Ck hCk , Bi.
These trees refine each other, but are not in the same deformation space since hCk , Bi is
not elliptic in Tk+1 . They are dominated by the tree S dual to the free decomposition
G = A ∗ B, in accordance with the proposition.
Applying Proposition 2.17 to a constant sequence yields the following standard result:
Corollary 2.19. If G is finitely presented, and T is a tree, there exists a morphism f :
S → T where S is a tree with finitely generated edge and vertex stabilizers.
If T is a universally elliptic A-tree, so is S.
Proposition 2.17 is basically Proposition 5.12 of [FP06]. We omit its proof, and refer
to the more general Proposition 2.24.
Proof of Theorem 2.16. Let U be the set of universally elliptic trees with finitely generated
edge and vertex stabilizers, up to equivariant isomorphism. It is non-empty since it contains
the trivial tree. An element of U is described by a finite graph of groups with finitely
generated edge and vertex groups. Since G only has countably many finitely generated
subgroups, and there are countably many homomorphisms from a given finitely generated
group to another, the set U is countable.
By Corollary 2.19, every universally elliptic tree is dominated by one in U, so it suffices
to produce a universally elliptic tree dominating every U ∈ U. Choose an enumeration
U = {U1 , U2 , . . . , Uk , . . . }. We define inductively a universally elliptic tree Tk which refines
Tk−1 and dominates U1 , . . . , Uk (it may have infinitely generated edge or vertex stabilizers). We start with T1 = U1 . Given Tk−1 which dominates U1 , . . . , Uk−1 , we let Tk be a
standard refinement of Tk−1 which dominates Uk (it exists by Proposition 2.2 because Tk−1
is universally elliptic). Then Tk is universally elliptic by the second assertion of Lemma
2.8, and it dominates U1 , . . . , Uk−1 because Tk−1 does.
Apply Proposition 2.17 to the sequence Tk . The tree S is universally elliptic and it
dominates every Tk , hence every Uk . It follows that S is a JSJ tree over A.
2.5
Existence: the relative case
In this section, we prove the existence of a relative JSJ deformation space under a relative
finite presentation assumption.
Theorem 2.20. Assume that G is finitely presented relative to H = {H1 , . . . , Hp }. Then
the JSJ deformation space DJSJ of G over A relative to H exists. It contains a tree with
finitely generated edge stabilizers.
Recalling that a finitely presented group is finitely presented relative to any finite
collection of finitely generated subgroups, we get:
Corollary 2.21. Let G be finitely presented. Let H = {H1 , . . . , Hp } be a finite family of
finitely generated subgroups. Then the JSJ deformation space DJSJ of G over A relative
to H exists. It contains a tree with finitely generated edge (hence vertex) stabilizers.
Remark 2.22. We will give a different approach to existence in Subsection 4.4, by comparing
the relative JSJ decomposition of G to a non-relative JSJ decomposition of a larger group
Ĝ.
27
Remark 2.23. The corollary does not apply when groups in H are infinitely generated. See
Section 8 for existence results with H arbitrary.
The theorem is proved as in the non-relative case (Theorem 2.16), with U the set
of (A, H)-trees with finitely generated edge stabilizers. It is countable because vertex
stabilizers are relatively finitely generated by [Gui08, Lemmas 1.11, 1.12] (this is explained
in Remark 4.8). Proposition 2.17 is replaced by the following result.
Proposition 2.24 (Relative Dunwoody’s accessibility). Let G be finitely presented relative
to H = {H1 , . . . , Hp }. Assume that T1 ← · · · ← Tk ← Tk+1 ← . . . is a sequence of
refinements of (A, H)-trees. There exists an (A, H)-tree S such that:
(1) for k large enough, there is a morphism S → Tk ;
(2) each edge stabilizer of S is finitely generated.
As above, applying the proposition to a constant sequence, we get:
Corollary 2.25. If G is finitely presented relative to H, and T is an (A, H)-tree, there
exists a morphism f : S → T where S is an (A, H)-tree with finitely generated edge
stabilizers.
Before proving the proposition, we recall that G is finitely presented relative to its
subgroups H1 , . . . , Hp if there exists a finite subset Ω ⊂ G such that the natural morphism
F(Ω) ∗ H1 ∗ · · · ∗ Hp → G is onto, and its kernel is normally generated by a finite subset R.
Here is an equivalent definition: G is finitely presented relative to H if and only if
it is the fundamental group of a connected 2-complex X (which may be assumed to be
simplicial) containing disjoint connected subcomplexes Y1 , . . . , Yp (possibly infinite) with
the following properties: X \ (Y1 ∪ · · · ∪ Yp ) contains only finitely many open cells, π1 (Yi )
embeds into π1 (X), and its image is conjugate to Hi .
The fact that G is relatively finitely presented if such a space X exists follows from Van
Kampen’s theorem. Conversely, if G is finitely presented relative to H, one can construct
X as follows. Let (Yi , ui ) be a pointed 2-complex with π1 (Yi , ui ) ' Hi . Starting from
the disjoint union of the Yi ’s, add p edges joining the ui ’s to an additional vertex u, and
#Ω additional edges joining u to itself. We get a complex whose fundamental group is
isomorphic to the free product F(Ω) ∗ H1 ∗ · · · ∗ Hp . Represent each element of R by a loop
in this space, and glue a disc along this loop to obtain the desired space X.
Proof of Proposition 2.24. Let π : X̃ → X be the universal cover of a simplicial 2-complex
X as above, with G acting on X̃ by deck transformations. For i ∈ {1, . . . , p}, consider a
connected component Ỹi of π −1 (Yi ) whose stabilizer is Hi . Also fix lifts v1 , . . . , vq ∈ X̃ of
all the vertices in X \ Y1 ∪ · · · ∪ Yp .
We denote by pk : Tk+1 → Tk the collapse map. Note that the preimage of the midpoint
of an edge ek of Tk is a single point, namely the midpoint of the edge of Tk+1 mapping
onto ek .
We shall now construct equivariant maps fk : X̃ → Tk such that fk maps each Ỹi to a
vertex fixed by Hi , sends each vj to a vertex, and sends each edge of X̃ either to a point
or injectively onto a segment in Tk . We further require that pk (fk+1 (x)) = fk (x) if x is a
vertex of X̃ or if fk (x) is the midpoint of an edge of Tk .
We construct fk inductively. We start with T0 a point, and f0 , p0 the constant maps.
We then assume that fk : X̃ → Tk has been constructed, and we construct fk+1 .
To define fk+1 on Ỹi , note that fk (Ỹi ) is a vertex of Tk fixed by Hi . Since pk preserves
alignment, p−1
k (fk (Ỹi )) is an Hi -invariant subtree. Since Hi is elliptic in Tk+1 , it fixes some
vertex in this subtree, and we map Ỹi to such a vertex. We then define fk+1 (vj ) as any
vertex in p−1
k (fk (vj )), and we extend by equivariance.
28
Now consider an edge e of X not contained in any Yi , and a lift ẽ ⊂ X̃. The map fk+1
is already defined on the endpoints of ẽ, we explain how to define it on ẽ.
The restriction of pk to the segment of Tk+1 joining the images of the endpoints of ẽ
is a collapse map. In particular, the preimage of the midpoint of an edge ek of Tk is the
midpoint of the edge of Tk+1 mapping onto ek . Recalling that fk is constant or injective
on ẽ, this allows us to define fk+1 on ẽ, as a map which is either constant or injective,
and satisfies pk (fk+1 (x)) = fk (x) if fk (x) is the midpoint of an edge of Tk . Doing this
equivariantly, we have now defined fk+1 on the 1-skeleton of X̃.
We then extend fk+1 in a standard way to every triangle abc not contained in a π −1 (Yi );
in particular, if fk+1 is not constant on abc, preimages of midpoints of edges of Tk+1 are
straight arcs joining two distinct sides. This completes the construction of the maps fk .
We now define τ̃k ⊂ X̃ as the preimage (under fk ) of the midpoints of all edges of Tk .
This is a pattern in the sense of Dunwoody [Dun85]. It does not intersect any Ỹi , and the
maps fk were constructed so that τ̃k ⊂ τ̃k+1 . We denote by τk = π(τ̃k ) the projection in
X. It is a finite graph because it is contained in the complement of Y1 ∪ · · · ∪ Yp .
Let Sk be the tree dual to the pattern τ̃k in X̃. We claim that it is an (A, H)-tree
with finitely generated edge stabilizers. By construction, fk induces a map ϕk : Sk → Tk
sending edge to edge, so edge stabilizers of Sk are in A. They are finitely generated because
they are generated by fundamental groups of components of τk . Every Hi is elliptic in Sk
because Ỹi does not intersect τ̃k . This proves the claim.
Let X 0 ⊂ X be the closure of the complement of Y1 ∪ · · · ∪ Yp . By construction, this is a
finite complex. By [Dun85, Theorem 2.2], there is a bound on the number of non-parallel
tracks in X 0 . This implies that there exists k0 such that, for all k ≥ k0 , for every connected
component σ of τk \ τk0 , there exists a connected component σ 0 of τk0 such that σ ∪ σ 0
bounds a product region containing no vertex of X 0 . It follows that, for k ≥ k0 , one can
obtain Sk from Sk0 by subdividing edges. We then take S = Sk0 .
2.6
Relation with other constructions
Several authors have constructed JSJ splittings of finitely presented groups in various
settings. We explain here (in the non-relative case) why those splittings are JSJ splittings
in the sense of Definition 2.12 (results in the literature are often stated only for one-edge
splittings, but this is not a restriction by Lemma 2.10).
In [RS97], Rips and Sela consider cyclic splittings of a one-ended group G (so A consists
of all cyclic subgroups of G, including the trivial group). Theorem 7.1 in [RS97] says that
their JSJ splitting is universally elliptic (this is statement (iv)) and maximal (statement
(iii)). The uniqueness up to deformation is statement (v).
In the work of Dunwoody-Sageev [DS99], the authors consider splittings of a group G
over slender subgroups in a class ZK such that G does not split over finite extensions of
infinite index subgroups of ZK (there are restrictions on the class ZK, but one can typically
take ZK = V P Cn , see [DS99] for details). In our notation, A is the set of subgroups of
elements of ZK. Universal ellipticity of the splitting they construct follows from statement
(3) in the Main Theorem of [DS99], and from the fact that any edge group is contained
in a white vertex group. Maximality follows from the fact that white vertex groups are
universally elliptic (statement (3)) and that black vertex groups either are in ZK (in which
case they are universally elliptic by the non-splitting assumption made on G), or are Kby-orbifold groups and hence are necessarily elliptic in any JSJ tree (see Proposition 5.27
below).
In [FP06], Fujiwara and Papasoglu consider all splittings of a group over the class A of
its slender subgroups. Statement (2) in [FP06, Theorem 5.13] says that the JSJ splitting
they obtain is elliptic with respect to any splitting which is minimal (in their sense). By
Proposition 3.7 in [FP06], any splitting is dominated by a minimal splitting, so universal
29
ellipticity holds. Statement (1) of Theorem 5.15 in [FP06] implies maximality.
As mentioned in the introduction, the regular neighbourhood of Scott-Swarup [SS03]
is closer to the decompositions constructed in Parts IV and V.
3
Examples of JSJ decompositions
Recall that we have fixed A and H, and we only consider (A, H)-trees. Unless otherwise
indicated, G is only assumed to be finitely generated.
At the end of this section we shall give two examples of JSJ decompositions having
flexible vertices, but most examples here will have all vertices rigid. The fact that they are
indeed JSJ decompositions will be a consequence of the following simple fact.
Lemma 3.1. Any tree T with universally elliptic vertex stabilizers is a JSJ tree.
Proof. By assumption, T dominates every tree. In particular, T is universally elliptic and
dominates every universally elliptic tree, so it is a JSJ tree.
We also note:
Lemma 3.2. Assume that all groups in A are universally elliptic. If T is a JSJ tree, then
its vertex stabilizers are universally elliptic.
This applies in particular to splittings over finite groups.
Proof. If a vertex stabilizer Gv of T is flexible, consider T 0 such that Gv is not elliptic in
T . Since T is a JSJ decomposition, it is universally elliptic, so one can consider a standard
refinement T̂ of T dominating T 0 . By our assumption on A, the tree T̂ is universally
elliptic, so by definition of the JSJ deformation space T dominates T̂ . This implies that
Gv is elliptic in T̂ , hence in T 0 , a contradiction.
3.1
Free groups
Let G = Fn be a finitely generated free group, let A be arbitrary, and H = ∅. Then the
JSJ deformation space of Fn over A is the space of free actions (unprojectivized CullerVogtmann’s outer space [CV86]).
More generally, if G is virtually free and A contains all finite subgroups, then DJSJ is
the space of trees with finite vertex stabilizers.
3.2
Free splittings: the Grushko deformation space
Let A consist only of the trivial subgroup of G, and H = ∅. Thus A-trees are trees with
trivial edge stabilizers, also called free splittings. Then the JSJ deformation space exists,
it is the outer space introduced in [GL07b] (see [CV86] when G = Fn , and [MM96] when
no free factor of G is Z). We call it the Grushko deformation space. It consists of trees T
such that edge stabilizers are trivial, and vertex stabilizers are freely indecomposable and
different from Z (one often considers Z as freely decomposable since it splits as an HNN
extension over the trivial group).
Denoting by G = G1 ∗ · · · ∗ Gp ∗ Fq a decomposition of G given by Grushko’s theorem
(with Gi non-trivial and freely indecomposable, Gi 6= Z, and Fq free), the quotient graph
of groups T /G is homotopy equivalent to a wedge of q circles; it has one vertex with group
Gi for each i, and all other vertex groups are trivial (see Figure 1 in the introduction).
If H 6= ∅, the JSJ deformation space is the Grushko deformation space relative to H.
Edge stabilizers of JSJ trees are trivial, groups in H fix a point, and vertex stabilizers are
freely indecomposable relative to their subgroups which are conjugate to a group in H.
30
3.3
Splittings over finite groups: the Stallings-Dunwoody deformation
space
If A is the set of finite subgroups of G, and H = ∅, we call the JSJ deformation space the
Stallings-Dunwoody deformation space. It is the set of trees whose edge groups are finite
and whose vertex groups have 0 or 1 end (one deduces from Stallings’s theorem that a tree
is maximal for domination if and only if its vertex stabilizers have at most one end).
The JSJ deformation space exists if G is finitely presented by Dunwoody’s original
accessibility result [Dun85]. If G is only finitely generated, it exists if and only if G
is accessible. In particular, the inaccessible group constructed in [Dun93] has no JSJ
decomposition over finite groups.
Remark 3.3. Even if G is inaccessible, there is a JSJ deformation space over A if A is a
family of finite subgroups of bounded order. The reason is that Proposition 2.17 remains
true, because Tk+1 is just a subdivision of Tk for k large by Linnell’s accessibility [Lin83].
If H 6= ∅, the JSJ deformation space is the Stallings-Dunwoody deformation space
relative to H. Edge stabilizers are finite, groups in H fix a point, and vertex stabilizers are
one-ended relative to their subgroups which are conjugate to a group in H (one-endedness
is in the sense of Subsection 1.3: they do not split over finite subgroups relative to their
subgroups which are conjugate to a group in H).
As above, the relative JSJ space exists if G is finitely generated and A consists of finite
groups with bounded order (and H is arbitrary). If A contains finite groups of arbitrary
large order, the JSJ space exists if relative accessibility holds.
3.4
Splittings of small groups
Recall that G is small in (A, H)-trees if G has no irreducible action on a tree: there always
is a fixed point, or a fixed end, or an invariant line (see Corollary 1.3 and Subsection 1.5.2).
This is in particular the case if G is small, i.e. contains no non-abelian free group. If G
acts with a fixed end or an invariant line, then every vertex stabilizer has a subgroup of
index at most 2 fixing an edge (the index is 2 if G acts dihedrally on a line).
Lemma 3.4. If G is small in (A, H)-trees, and T is a non-trivial universally elliptic tree,
then T dominates every tree.
Proof. Since the action of G on T is non-trivial but is not irreducible, every vertex stabilizer
contains an edge stabilizer with index at most 2. It follows that every vertex stabilizer is
universally elliptic, so T dominates every tree.
Corollary 3.5. If G is small in (A, H)-trees, there is at most one non-trivial deformation
space containing a universally elliptic tree.
In this situation, the JSJ deformation space always exists: if there is a deformation
space as in the corollary, it is the JSJ space; otherwise, the JSJ space is trivial.
Consider for instance (non-relative) cyclic splittings of solvable Baumslag-Solitar groups
BS(1, n) = ha, t | tat−1 = an i. If n = 1 (so G ' Z2 ), there are infinitely many deformation
spaces (corresponding to epimorphisms G → Z) and there is no non-trivial universally
elliptic tree. If n = −1 (Klein bottle group), there are exactly two non-trivial deformation
spaces: one contains the Bass-Serre tree of the HNN extension ha, t | tat−1 = a−1 i, the
other contains the tree associated to the amalgam hti ∗t2 =v2 hvi, with v = ta. None of
these trees is universally elliptic (t and v are hyperbolic in the HNN extension, and a is
hyperbolic in the amalgam).
Thus for n = ±1 (when G is Z2 or the Klein bottle group) the cyclic JSJ deformation
space of BS(1, n) is the trivial one, and G is flexible (see Subsection 6.9 for generalizations
of these examples). If n 6= ±1, the JSJ space is non-trivial, as we shall now see.
31
3.5
Generalized Baumslag-Solitar groups
Let G be a generalized Baumslag-Solitar group, i.e. a finitely generated group which acts
on a tree T with all vertex and edge stabilizers infinite cyclic. Let A be the set of cyclic
subgroups of G (including the trivial subgroup), and H = ∅. Unless G is isomorphic to
Z, Z2 , or the Klein bottle group, the deformation space of T is the JSJ deformation space
[For03].
Here is a short proof (the arguments are contained in [For03]). We show that every
vertex stabilizer H of T is universally elliptic. The commensurator of H is G because
the intersection of any pair of vertex stabilizers has finite index in both of them. If H
acts hyperbolically in a tree T 0 , its commensurator G preserves its axis, so T 0 is a line.
Edge stabilizers being cyclic, vertex stabilizers are virtually cyclic, hence cyclic since G is
torsion-free. This implies that G is Z, Z2 , or a Klein bottle group.
3.6
Locally finite trees
We generalize the previous example to locally finite trees with small edge stabilizers.
We suppose that G acts irreducibly on a locally finite tree T with small edge stabilizers
(local finiteness is equivalent to edge stabilizers having finite index in neighboring vertex
stabilizers; in particular, vertex stabilizers are small). In [GL07a, Lemma 8.5], we proved
that all such trees T belong to the same deformation space. This happens to be the JSJ
deformation space.
Proposition 3.6. Suppose that all groups of A are small in (A, H)-trees. Then any locally
finite irreducible tree T belongs to the JSJ deformation space.
Proof. We show that every vertex stabilizer H of T is universally elliptic. Since T is locally
finite, H contains an edge stabilizer with finite index, so is small (for simplicity we do not
write “small in (A, H)-trees” in this proof). By way of contradiction, assume that H is not
elliptic in some tree T 0 . Being small, H fixes a unique end of T 0 or preserves a unique line
(see Corollary 1.3). Any finite index subgroup of H preserves the same unique end or line.
As in the previous subsection, local finiteness implies that G commensurates H, so G
preserves the H-invariant end or line of T 0 (in particular, T 0 is not irreducible). We now
define a small normal subgroup G0 ⊂ G. If G does not act dihedrally on a line, there is
a fixed end and we let G0 = [G, G] be the commutator subgroup. It is small because any
finitely generated subgroup pointwise fixes a ray of T 0 , so is contained in an edge stabilizer
Ge ∈ A. If G acts dihedrally, we let G0 be the kernel of the action, so that G/G0 is an
infinite dihedral group.
Consider the action of the normal subgroup G0 on T . If it is elliptic, its fixed point set
is G-invariant, so by minimality the action of G factors through the action of an abelian
or dihedral group; this contradicts the irreducibility of T . Otherwise G0 preserves a unique
end or line; this end or line is G-invariant because G0 is normal, again contradicting the
irreducibility of T .
3.7
RAAGs
Let ∆ be a finite graph. The associated right-angled Artin group A∆ (RAAG, also called
graph group, or partially commutative group) is the group presented as follows: there is
one generator av per vertex, and a relation av aw = aw av if there is an edge between v and
w. See [Cha07] for an introduction.
The decomposition of ∆ into connected components induces a decomposition of A∆
as a free product of freely indecomposable RAAGs (which may be infinite cyclic), so to
study JSJ decompositions of A∆ one may assume that ∆ is connected (see Corollary 4.16
below). M. Clay [Cla14] determines the (non-relative) cyclic JSJ decomposition of A∆ ;
32
he gives a characterization of RAAGs with non-trivial cyclic JSJ decomposition, and he
shows that there is no flexible vertex. See [GH15] for abelian splittings of RAAGs relative
to the generators.
3.8
Parabolic splittings
Assume that G is hyperbolic relative to a family of finitely generated subgroups H =
{H1 , . . . , Hp }. Recall that a subgroup of G is parabolic if it is contained in a conjugate of
an Hi . We let A be the family of parabolic subgroups.
JSJ trees over parabolic subgroups, relative to H (equivalently, to A), exist by Theorem
2.20 because G is finitely presented relative to H [Osi06]. Parabolic subgroups are universally elliptic (all splittings are relative to H!), so JSJ trees do not have flexible vertices by
Lemma 3.2. See [Bow01], where such a JSJ decomposition is related to the cut points of
the boundary of G.
See Subsection 9.3 for the case when virtually cyclic groups are added to A.
3.9
Non-rigid examples
Unlike the previous subsections, we now consider examples with flexible vertices. This may
be viewed as an introduction to Part III. We consider cyclic splittings with H = ∅.
Suppose that G is the fundamental group of a closed orientable hyperbolic surface
Σ. Any simple closed geodesic γ on Σ defines a dual cyclic splitting (an amalgam or an
HNN-extension, depending on whether γ separates or not). A non-trivial element g ∈ G,
represented by an immersed closed geodesic δ, is elliptic in the splitting dual to γ if and
only if δ ∩ γ = ∅ or δ = γ. Since any δ meets transversely some simple γ, this shows that
1 is the only universally elliptic element of G, so the JSJ decomposition of G is trivial and
its vertex is flexible. Similar considerations apply to splittings of fundamental groups of
compact hyperbolic surfaces with boundary which are relative to the fundamental groups
of boundary components (the pair of pants is special because it contains no essential simple
geodesic, see Subsection 5.1).
The content of Section 6 is that this example is somehow a universal example.
ha2 , b2 i
ha1 , b1 i
[a1 ,b1 ]=c
hci
c
c=
[a
]
,b 2
a2
[
=
3,
b3
]
ha3 , b3 i
Figure 3: Three punctured tori attached along their boundaries, and the corresponding
JSJ decomposition.
Now suppose that G is the fundamental group of the space pictured on Figure 3 (consisting of three punctured tori attached along their boundaries). A presentation of G is
ha1 , b1 , a2 , b2 , a3 , b3 | [a1 , b1 ] = [a2 , b2 ] = [a3 , b3 ]i.
It is the fundamental group of a graph of groups Γ with one central vertex v and three
terminal vertices vi . All edges, as well as v, carry the same cyclic group C = hci. We claim
that Γ is a JSJ decomposition of G, with 3 flexible vertices vi .
Let us first show that Γ is universally elliptic, i.e. that C is universally elliptic. Using
Lemma 2.10, we consider a one-edge cyclic splitting Λ of G in which C is not elliptic,
33
and we argue towards a contradiction. The group G12 generated by Gv1 and Gv2 is the
fundamental group of a closed surface (of genus 2), in particular it is one-ended. It follows
that the edge group hai of Λ is non-trivial and has non-trivial intersection with some
conjugate of G12 , so some ak lies in a conjugate of G12 .
We now consider the action of ak on the Bass-Serre tree T of Γ. If ak fixes an edge in
T , then hak i has finite index in some conjugate of C, so C is elliptic in Λ, a contradiction.
Denote by A(ak ) the characteristic set of ak in T , i.e. its unique fixed point or its axis.
Then A(ak ) is contained in the minimal subtree of a conjugate of G12 , so contains no lift
of the vertex v3 . Permuting indices shows that all vertices in A(ak ) are lifts of v, so A(ak )
is a single point (a lift of v). This implies that hak i has finite index in some conjugate of
C, which is again a contradiction.
To prove maximality, consider a universally elliptic tree S dominating T . If the domination is strict (i.e. S and T are in different deformation spaces), some Gvi is non-elliptic
in S. Being universally elliptic, C is elliptic in S, so by a standard fact (see Proposition
5.4) the action of Gvi on its minimal subtree in S is dual to an essential simple closed curve
γi ⊂ Σi (there is only one curve because Σi is a punctured torus). Considering the splitting
of G dual to a curve γ ⊂ Σi intersecting γi non-trivially shows that S is not universally
elliptic, a contradiction.
4
A few useful facts
In this section, we first describe the behavior of the JSJ deformation space when we change
the class A of allowed edge groups. We then introduce the incidence structure inherited
by a vertex group of a graph of groups, and we relate JSJ decompositions of G to JSJ
decompositions of vertex groups relative to their incidence structure. We also discuss
relative finite presentation of vertex groups. Finally, we give an alternative construction
of relative JSJ decompositions, obtained by embedding G into a larger group.
4.1
Changing edge groups
We fix two families of subgroups A and B, with A ⊂ B, and we compare JSJ splittings
over A and over B (universal ellipticity, and all JSJ decompositions, are relative to some
fixed family H). For example:
• A consists of the finitely generated abelian subgroups of G, and B consists of the slender subgroups. This will be useful to describe the abelian JSJ decomposition in Subsection
5.5.
• groups in B are locally slender (their finitely generated subgroups are slender), and
A is the family of slender subgroups.
• G is relatively hyperbolic, A is the family of parabolic subgroups, and B is the family
of elementary subgroups (subgroups which are parabolic or virtually cyclic).
• A consists of the trivial group, or the finite subgroups of G (see Corollary 4.16).
There are now two notions of universal ellipticity, so we shall distinguish between Auniversal ellipticity (being elliptic in all (A, H)-trees) and B-universal ellipticity (being
elliptic in all (B, H)-trees).
Of course, B-universal ellipticity implies A-universal ellipticity.
Recall that two trees are compatible if they have a common refinement.
Proposition 4.1. Assume A ⊂ B. Let TB be a JSJ tree over B.
(1) If there is a JSJ tree over A, there is one which is compatible with TB . It may be
obtained by refining TB , and then collapsing all edges whose stabilizer is not in A.
(2) If every A-universally elliptic A-tree is B-universally elliptic, the tree T̄B obtained
from TB by collapsing all edges whose stabilizer is not in A is a JSJ tree over A.
34
Note that (2) applies if A consists of finite groups (more generally, of groups with
Serre’s property (FA)).
Proof. Let TA be a JSJ tree over A. Since B ⊃ A, the tree TB is elliptic with respect to
TA . Let T̂B be a standard refinement of TB dominating TA . Consider an edge e of T̂B
whose stabilizer is not in A. Then Ge fixes a unique point of TA , so any equivariant map
from T̂B to TA is constant on e. It follows that the tree obtained from T̂B by collapsing all
edges whose stabilizer is not in A dominates T2 . Being A-universally elliptic by Assertion
(ii) of Lemma 2.2, it is a JSJ tree over A.
For (2), first note that T̄B is an A-universally elliptic A-tree. If T 0 is another one, it is
B-universally elliptic, hence dominated by TB . As above, any map from TB to T 0 factors
through T̄B , so T̄B is a JSJ tree over A.
Proposition 4.2. Let A ⊂ B. Assume that every finitely generated group in B belongs to
A. If G is finitely presented relative to H, then any JSJ tree over A (relative to H) is a
JSJ tree over B (relative to H).
Proof. By Corollary 2.25, for every B-tree T (as always, relative to H), there is a morphism
S → T with S a tree with finitely generated edge stabilizers. Edge stabilizers of S fix an
edge in T , so S is an A-tree. The proposition easily follows.
This applies in particular if B is the family of all groups which are locally in A (their
finitely generated subgroups are in A). For instance, B may be the family of all locally
cyclic (resp. locally abelian, resp. locally slender) subgroups, and A the family of cyclic
(resp. finitely generated abelian, resp. slender) subgroups.
4.2
Incidence structures of vertex groups
Given a vertex stabilizer Gv of a tree, it is useful to consider splittings of Gv relative to
incident edge stabilizers, as they extend to splittings of G (Lemma 4.12). In this subsection
we give definitions and we show that Gv is finitely presented relative to incident edge groups
if G is finitely presented and edge stabilizers are finitely generated (Proposition 4.9).
4.2.1
Definitions
Let T be a tree (minimal, relative to H, with edge stabilizers in A). Let v be a vertex,
with stabilizer Gv .
Definition 4.3 (Incident edge groups Incv ). Given a vertex v of a tree T , there are finitely
many Gv -orbits of edges with origin v. We choose representatives ei and we define Incv
(or IncGv ) as the family of stabilizers Gei . We call Incv the set of incident edge groups.
It is a finite family of subgroups of Gv , each well-defined up to conjugacy.
Alternatively, one can define Incv from the quotient graph of groups Γ = T /G as the
image in Gv of the groups carried by all oriented edges with origin v. The peripheral structure, defined in [GL07a] and studied in Subsection 5.4, is a more sophisticated invariant
derived from Incv ; unlike Incv , it does not change when we replace T by another tree in
the same deformation space.
Definition 4.4 (Restriction H|Gv ). Given v, consider the family of conjugates of groups
in H that fix v and no other vertex of T . We define the restriction H|Gv by choosing a
representative for each Gv -conjugacy class in this family.
H
Definition 4.5 (IncH
v ). We define Incv = Incv ∪ H|Gv . We will sometimes write Inc|Q
H
H
and Inc|Q rather than Incv and Incv , with Q = Gv .
35
We also view H|Gv and IncH
v as families of subgroups of Gv , each well-defined up to
conjugacy.
Remark 4.6. We emphasize that H|Gv only contains groups having v as their unique fixed
point. Two such groups are conjugate in Gv if they are conjugate in G. In particular, the
number of Gv -conjugacy classes of groups in H|Gv is bounded by the number of G-conjugacy
classes of groups in H.
Also note that any subgroup of Gv which is conjugate to a group of H is contained
(up to conjugacy in Gv ) in a group belonging to IncH
v , so is elliptic in any splitting of Gv
H
relative to Incv .
4.2.2
Finiteness properties
Assume that G is the fundamental group of a finite graph of groups. It is well-known that,
if G and all edge groups are finitely generated (resp. finitely presented), then so are all
vertex groups.
The goal of this subsection is to extend these results to relative finite generation (resp.
finite presentation), as defined in Subsection 1.7. This is not needed if all groups in A are
assumed to be finitely presented.
Lemma 4.7 ([Gui08, Lemmas 1.11, 1.12]). If a finitely generated group G acts on a tree
T , then every vertex stabilizer Gv is finitely generated relative to the incident edge groups.
More generally, if G is finitely generated relative to H, and T is a tree relative to H,
then Gv is finitely generated relative to IncH
v .
Remark 4.8. If H = {H1 , . . . , Hp }, then the family H|Gv consists of at most p groups, each
conjugate to some Hi . It follows that the set of vertex stabilizers of (A, H)-trees with
finitely generated edge stabilizers is countable. This was used in the proof of Theorem
2.20.
There is a similar statement for relative finite presentation.
Proposition 4.9. If G is finitely presented, and T is a tree with finitely generated edge
stabilizers, then every vertex stabilizer Gv is finitely presented relative to the incident edge
groups.
More generally, if G is finitely presented relative to H, and T is a tree relative to H
with finitely generated edge stabilizers, then Gv is finitely presented relative to IncH
v .
We will use the following fact.
Lemma 4.10. Let X be a cellular complex, and let U ⊂ X be a compact connected subcomplex. Let G = π1 (X), and let H < G be the image of π1 (U ) in G.
Then H is finitely presented relative to the image of the fundamental groups of the
connected components of the topological boundary ∂U .
More generally, if U is not compact but there exist finitely many connected disjoint
subcomplexes Z1 , . . . , Zr ⊂ U , disjoint from ∂U , such that U \ (Z1 ∪ · · · ∪ Zr ) has compact
closure, then H is finitely presented relative to the images of the fundamental groups of
Z1 , . . . , Zr and of the connected components of ∂U .
Proof. Denote by B1 , . . . , Br the connected components of ∂U . In the special case when
each map π1 (Bi ) → π1 (X) is injective, a standard argument shows that the map π1 (U ) →
π1 (X) is also injective, so H ' π1 (U ) is finitely presented, and finitely presented relative to
its finitely generated subgroups π1 (Bi ). One reduces to the special case by gluing (possibly
infinitely many) discs to the Bi ’s. The proof of the second assertion is similar.
36
Proof of Proposition 4.9. Assume that G is finitely presented relative to {H1 , . . . , Hp }. As
in the proof of Proposition 2.24, we consider a 2-complex X and disjoint subcomplexes
Y1 , . . . , Yp with X \ (Y1 , . . . , Yp ) compact and π1 (Yi ) ' Hi . We let π : X̃ → X be the
universal cover, and Ỹi a connected component of π −1 (Yi ) whose stabilizer is Hi . Let
f : X̃ → T be an equivariant map which sends vertex to vertex, sends each Ỹi to a vertex
fixed by Hi , is constant or injective on each edge, and is standard on each triangle.
Consider the pattern τ̃ ⊂ X̃ obtained as the preimage of all midpoints of edges of T ,
and its projection τ ⊂ X. Let W ⊂ X be the closure of the complement of a regular
neighborhood of τ .
Let S be the tree dual to τ̃ . First suppose that S = T . Applying Lemma 4.10 to the
component U of W corresponding to v shows that Gv is finitely presented relative to the
family Hv0 consisting of Incv and those Hi ’s for which Yi is contained in U . If H 6= ∅ this
may not be quite the required family IncH
v : we have to remove Hi if it fixes an edge of T
(see Subsection 4.2.1). But such an Hi is contained (up to conjugacy in Gv ) in a group
belonging to IncH
v , and we can use Lemma 1.9.
Now suppose S 6= T , and recall that edge stabilizers of T are finitely generated. When
H = ∅ we may use [LP97, Theorem 0.6], saying that T is geometric, to construct X̃ and
f such that S = T . In general, we may write the induced map g : S → T as a finite
composition of folds (see the proposition on page 455 of [BF91]). It therefore suffices to
show that, given a factorization g = h◦ρ with ρ a fold, we may change X̃ to a new complex
X̃1 , with f1 : X̃1 → T , so that the associated map g1 equals h.
Let e, e0 be adjacent edges of S which are folded by ρ. They are dual to components
of τ̃ adjacent to a component Z of X̃ \ τ̃ . Let ab and a0 b0 be edges of X̃ mapping to e and
e0 in S respectively, with a and a0 in Z (subdivide X if needed). Let γ be an edge path
joining a to a0 in Z. Note that γ is mapped to a single vertex in S, and that b, b0 have the
same image in T .
Now glue a square [0, 1] × [0, 1] to X̃, with vertical edges glued to e, e0 and the edge
[0, 1] × {0} glued to γ (the edge [0, 1] × {1} is free). The map f : X̃ → T extends to
the square, with all vertical arcs {t} × [0, 1] mapped to the edge f (e) = f (e0 ). Doing this
gluing G-equivariantly yields the desired X̃1 .
4.3
JSJ decompositions of vertex groups
Given an (A, H)-tree T , we compare splittings of G and relative splittings of vertex stabilizers Gv .
Recall that IncH
v is the family of incident edge stabilizers together with H|Gv (see
Subsection 4.2.1), and that Gv is finitely generated relative to IncH
v . In particular, whenever
Gv acts on an (A, H)-tree S relative to Incv with no global fixed point, there is a unique
minimal Gv -invariant subtree µS (Gv ) ⊂ S by Proposition 1.7. We view µS (Gv ) as a tree
with an action of Gv ; if Gv is elliptic in S, we let µS (Gv ) be any fixed point.
Definition 4.11 (Av ). We denote by Av the family consisting of subgroups of Gv belonging
to A. All splittings of Gv will be over groups in Av .
Lemma 4.12. Let Gv be a vertex stabilizer of an (A, H)-tree T . Any splitting of Gv
relative to IncH
v extends (non-uniquely) to a splitting of G relative to H.
More precisely, given an (Av , IncH
v )-tree Sv , there exist an (A, H)-tree T̂ and a collapse
−1
map p : T̂ → T such that p (v) is Gv -equivariantly isomorphic to Sv .
We say that T̂ is obtained by refining T at v using Sv . More generally, one may choose
a splitting for each orbit of vertices of T , and refine T using them. Any refinement of T
may be obtained by this construction (possibly with non-minimal trees Sv ).
37
Proof. We construct T̂ as in the proof of Proposition 2.2 , with Yv = Sv . It is relative
to H because any group in H which is conjugate to a subgroup of Gv is conjugate to a
subgroup of a group belonging to IncH
v . Non-uniqueness comes from the fact that there
may be several ways of attaching edges of T to Sv (see [GL16, Section 4.2]).
Lemma 4.13. Let Gv be a vertex stabilizer of a universally elliptic tree T .
• The groups in IncH
v are elliptic in every (A, H)-tree S.
• A subgroup H < Gv is (A, H)-universally elliptic (as a subgroup of G) if and only if
it is (Av , IncH
v )-universally elliptic (as a subgroup of Gv ).
The second assertion says that H is elliptic in every (A, H)-tree on which G acts if
and only if it is elliptic in every (Av , Incv ∪ H|Gv )-tree on which Gv acts. If this holds, we
simply say that H is universally elliptic.
Proof. The first assertion is clear: S is relative to H|Gv , and also to Incv because T is
universally elliptic.
Suppose that H is (Av , IncH
v )-universally elliptic, as a subgroup of Gv . Let S be any
(A, H)-tree. It is relative to IncH
v by the first assertion. Since Gv is finitely generated
H
relative to Incv , it has a minimal subtree Sv ⊂ S by Proposition 1.7. The action of Gv on
Sv is an (Av , IncH
v )-tree, so by assumption H fixes a point in Sv , hence in S.
We have proved the “if” direction in the second assertion, and the converse follows from
Lemma 4.12.
Corollary 4.14. Let Gv be a vertex stabilizer of a JSJ tree TJ .
(1) Gv does not split over a universally elliptic subgroup relative to IncH
v .
(2) Gv is flexible if it splits relative to IncH
v , rigid otherwise.
Proof. If there is a splitting as in (1), we may use it to refine TJ to a universally elliptic
tree (see Lemma 4.12). This tree must be in the same deformation space as TJ , so the
splitting of Gv must be trivial. (2) follows from Lemma 4.13 applied with H = Gv .
Proposition 4.15. Let T be a universally elliptic (A, H)-tree.
(1) Assume that every vertex stabilizer Gv of T has a JSJ tree Tv relative to IncH
v . One
can then refine T using these decompositions so as to obtain a JSJ tree of G relative
to H.
(2) Conversely, if TJ is a JSJ tree of G relative to H, and Gv is a vertex stabilizer of T ,
one obtains a JSJ tree for Gv relative to IncH
v by considering the action of Gv on its
minimal subtree Tv = µTJ (Gv ) in TJ (with Tv a point if Gv is elliptic).
Proof. To prove (1), let T̂ be the tree obtained by refining T using the Tv ’s as in Lemma
4.12. It is relative to H, and universally elliptic by Lemma 4.13 since its edge stabilizers are
edge stabilizers of T or of some Tv . To show maximality, we consider another universally
elliptic (A, H)-tree T 0 , and we show that any vertex stabilizer H of T̂ is elliptic in T 0 . It is
a vertex stabilizer of some Tv , with v a vertex of T . If Gv is not elliptic in T 0 , its minimal
subtree Yv is a universally elliptic (Av , IncH
v )-tree. Since Tv is a JSJ tree, it dominates Yv
so H is elliptic in T 0 . This proves (1).
Now let TJ and Tv ⊂ TJ be as in (2). By Lemma 4.13 Tv is relative to IncH
v , and it is
H
(Hv , Incv )-universally elliptic because its edge stabilizers are contained in edge stabilizers
of TJ . To prove maximality of Tv , consider another tree Sv with an action of Gv which is
relative to IncH
v and universally elliptic. Use it to refine T to a tree T̂ as in Lemma 4.12.
38
As above, T̂ is relative to H, and universally elliptic by Lemma 4.13. Being a JSJ tree,
TJ dominates T̂ . Vertex stabilizers of Tv are elliptic in TJ , hence in T̂ , hence in Sv , so Tv
dominates Sv . This proves (2).
The following corollary says that one may usually restrict to one-ended groups when
studying JSJ decompositions.
Corollary 4.16. Suppose that A contains all finite subgroups of G.
If H = ∅, refining a Grushko decomposition of G using JSJ decompositions of free
factors yields a JSJ decomposition of G.
Similarly, refining a Stallings-Dunwoody decomposition of G using JSJ decompositions
of the vertex groups Gv yields a JSJ decomposition of G.
If H 6= ∅, one must use relative Grushko or Stallings-Dunwoody decompositions, and
JSJ decompositions of vertex groups Gv relative to H|Gv .
Every flexible subgroup of G is a flexible subgroup of some Gv .
As mentioned in Subsection 3.3, Stallings-Dunwoody decompositions only exist under
some accessibility assumption.
Proof. This follows from the proposition, applied with T in the Grushko or StallingsDunwoody deformation space: finite groups are universally elliptic, and every splitting
of Gv is relative to Incv . The assertion about flexible subgroups follows from Corollary
4.14.
4.4
Relative JSJ decompositions through fillings
Fix a finitely presented group G and a family A. In Subsection 2.5 we have shown the
existence of the JSJ deformation space of G relative to a finite set H = {H1 , . . . , Hp } of
finitely generated subgroups. We now give an alternative construction, using (absolute) JSJ
decompositions of another group Ĝ obtained by a filling construction. This construction
will be used in Subsections 5.4 and 5.5 to provide examples of flexible groups.
G
H1 × R 1
H1
H2
..
.
Hp
H2 × R 2
Hp × R p
Figure 4: The group Ĝ obtained by the filling construction.
The filling construction. Let G and H be as above. For i ∈ {1, . . . , p}, we let Ri
be a non-trivial finitely presented group with property (FA), and we define a group Ĝ by
amalgamating G with Ki = Hi × Ri over Hi for i = 1, . . . , p (see Figure 4); in other words,
Ĝ = ((G ∗H1 K1 ) ∗ . . . ) ∗Hp Kp . It is finitely presented. We denote by T the Bass-Serre
tree of this amalgam, and by v the vertex of T with stabilizer G. The stabilizer of an edge
with origin v is conjugate to one of the Hi ’s in G.
Fix a family B of subgroups of Ĝ such that Bv = A and Ri ∈
/ B, for instance the
family of subgroups of Ĝ having a conjugate in A (note that two subgroups of G which
are conjugate in Ĝ are also conjugate in G because Hi is central in Ki , so this family B
induces A).
A subgroup of G is (A, H)-universally elliptic if it is elliptic in all splittings of G over
A relative to H. A subgroup of Ĝ is B-universally elliptic if it is elliptic in all splittings of
Ĝ with edge groups in B (splittings of Ĝ are non-relative).
39
Lemma 4.17. Hi × Ri is B-universally elliptic. A subgroup J ⊂ G is (A, H)-universally
elliptic if and only if J (viewed as a subgroup of Ĝ) is B-universally elliptic.
Proof. Consider any B-tree. The group Ri fixes a point by property (FA), which is unique
since Ri ∈
/ B. This point is also fixed by Hi since Hi commutes with Ri . This proves the
first assertion. Since T is B-universally elliptic, and H is the family of incident edge groups
at v, the second assertion follows from Lemma 4.13.
Being finitely presented, Ĝ has a JSJ decomposition TJ over B by Theorem 2.16. We
let TG = µTJ (G) be the minimal G-invariant subtree (a point if G is elliptic in TJ ).
Proposition 4.18. The tree TG is a JSJ tree of G over A relative to H.
Proof. The tree TG has edge stabilizers in Bv = A, is relative to H and (A, H)-universally
elliptic by Lemma 4.17. We have to show that it dominates any universally elliptic (A, H)tree SG . Use SG to refine T at v into a tree T̂ , as in Lemma 4.12. The tree T̂ has two
types of edges, those coming from T and those in the Ĝ-orbit of SG .
Define a new tree T 0 by collapsing all edges of T̂ coming from T , and note that a
subgroup of G is elliptic in T 0 if and only if it is elliptic in SG . Indeed, a subgroup H of
Ĝ is elliptic in T̂ if and only if it is elliptic in both T 0 and T ; for H < G (hence elliptic in
T ), being elliptic in T 0 is equivalent to being elliptic in T̂ , i.e. in SG .
The tree T 0 is a B-tree, and it is universally elliptic by Lemma 4.17, so it is dominated
by TJ . Vertex stabilizers of TG are then elliptic in T 0 , hence in SG , so TG dominates
SG .
Part III
Flexible vertices
Flexible vertex groups of JSJ decompositions are most important, as understanding their
splittings conditions the understanding of the splittings of G. The key result is that, in
many cases, flexible vertex groups are “surface-like”.
For instance, first consider cyclic splittings of a torsion-free group G. We will see that,
if Gv is a flexible vertex group of a JSJ decomposition Γ = T /G, then Gv may be viewed as
π1 (Σ), with Σ a compact (possibly non-orientable) surface. Moreover, incident edge groups
are trivial or contained (up to conjugacy) in a boundary subgroup, i.e. the fundamental
group B = π1 (C) of a boundary component C of Σ. Boundary subgroups being generated
by elements which are quadratic words in a suitable basis of the free group π1 (Σ), Rips
and Sela called the subgroup Gv quadratically hanging (QH).
If Σ is not too simple, there are infinitely many isotopy classes of essential two-sided
simple closed curves. Each such curve defines a cyclic splitting of π1 (Σ) relative to incident
edge groups, which extends to a cyclic splitting of G by Lemma 4.12. Two curves which
cannot be made disjoint by an isotopy define two splittings with are not elliptic with
respect to each other, and this makes Gv flexible (see Corollary 4.14). It turns out that
this construction is basically the only source of flexible vertices.
If G is allowed to have torsion, or if non-cyclic edge groups are allowed, the definition
of “surface-like” must be adapted. First, Σ may be a 2-dimensional orbifold rather than a
surface. Second, Gv is not always equal to π1 (Σ); it only maps onto π1 (Σ), with a possibly
non-trivial kernel F (called the fiber).
Various authors have called such groups Gv hanging surface groups, hanging Fuchsian
groups, hanging K-by-orbifold groups, V P C-by-Fuchsian type vertex groups... We choose
to extend Rips and Sela’s initial terminology of QH groups, to emphasize the way in which
Gv is attached to the rest of the group G (in Rips-Sela [RS97], F is trivial and Σ has no
40
mirror, see Theorem 6.6; on the other hand, we insist that a QH group be based on a
hyperbolic orbifold, not on a Euclidean one).
In Section 5 we formalize the definition of QH vertices, and prove general properties of
such vertices. In Section 6 we show that, indeed, flexible vertices of the JSJ deformation
space over nice classes of slender subgroups are QH.
As before, we fix a family A closed under conjugating and passing to subgroups, and
another family H. All trees are assumed to be (A, H)-trees.
5
Quadratically hanging vertices
In this section, after preliminaries about 2-orbifold groups, we give a definition of QH
subgroups. We study their basic properties, in particular we relate their splittings to
families of simple geodesics on the underlying orbifold Σ.
We then show that, under natural hypotheses, any QH subgroup has to be elliptic in
the JSJ deformation space.
In Subsection 5.4 we give examples of possible incident edge groups for QH vertex
groups of a JSJ decomposition. This will be relevant in Section 6, where we show that
flexible subgroups of the slender JSJ decomposition are QH. We also show that flexible
subgroups of abelian JSJ decompositions do not have to be QH.
5.1
5.1.1
2-orbifolds and their splittings
Hyperbolic 2-orbifolds
Most compact 2-dimensional orbifolds Σ, including all those that will concern us, are
Euclidean or hyperbolic (we refer to [Sco83] and [Thu80, Ch. 13] for basic facts about
orbifolds). Euclidean orbifolds whose fundamental group is not virtually cyclic have empty
boundary, so they can only arise from flexible vertices in a trivial way. For instance, in
the case of cyclic splittings of torsion-free groups, Z2 = π1 (T 2 ) and the Klein bottle group
may appear as flexible vertex groups (see Subsections 3.4 and 6.9), but only as free factors
(all incident edge groups must be trivial).
We therefore restrict to hyperbolic orbifolds: Σ is a compact 2-dimensional orbifold,
equipped with a hyperbolic metric with totally geodesic boundary. It is the quotient of
a convex subset Σ̃ ⊂ H2 by a proper discontinuous group of isometries GΣ ⊂ Isom(H2 )
(isometries may reverse orientation); we denote by p : Σ̃ → Σ the quotient map. By
definition, the (orbifold) fundamental group of Σ is π1 (Σ) = GΣ . We may also view Σ as
the quotient of a compact orientable hyperbolic surface Σ0 with geodesic boundary by a
finite group of isometries Λ. A point of Σ is singular if its preimages in Σ̃ (or in Σ0 ) have
non-trivial stabilizer.
If we forget the orbifold structure, Σ is homeomorphic to a surface Σtop (a disc in Figure
5). The boundary of Σtop comes from the boundary ∂ Σ̃, and from mirrors corresponding
to reflections in GΣ (see below). We define the boundary ∂Σ of Σ as the image of ∂ Σ̃ in
Σ (thus excluding mirrors). Equivalently, it is the image of ∂Σ0 . Each component C of
∂Σ is either a component of ∂Σtop (a circle) or an arc contained in ∂Σtop . The (orbifold)
fundamental group of C is Z or an infinite dihedral group D∞ accordingly. A boundary
subgroup is a subgroup B ⊂ π1 (Σ) which is conjugate to the fundamental group of a
component C of ∂Σ. Equivalently, it is the setwise stabilizer of a connected component of
∂ Σ̃.
The closure of the complement of ∂Σ in ∂Σtop is a union of mirrors: a mirror is the
image of a component of the fixed point set of an orientation-reversing element of π1 (Σ)
in Σ̃. Equivalently, a mirror is the image of a component of the fixed point set of an
orientation-reversing element of Λ in Σ0 . Each mirror is itself a circle or an arc contained
41
Z/2
{1}
Z/2
Z/2
Z/2
D4
D4
Z/2
Z/2
Z/2
{1}
Z/2
Figure 5: An orbifold with 4 mirrors (in bold), 2 boundary components, and 2 corner
reflectors carrying D4 . Its fundamental group is the Coxeter group generated by reflections
over 4 sides of a right-angled hexagon in H2 .
in ∂Σtop . Mirrors may be adjacent in ∂Σtop , whereas boundary components of Σ are
disjoint.
Singular points not contained in mirrors are conical points; the stabilizer of their preimages in H2 is a finite cyclic group consisting of orientation-preserving maps (rotations).
Points belonging to two mirrors are corner reflectors; the associated stabilizer is a finite
dihedral group D2r of order 2r.
As in the case of surfaces, hyperbolic orbifolds may be characterized in terms of their
Euler characteristic (see [Thu80, Sco83]).
Definition 5.1 (Euler characteristic). The Euler characteristic χ(Σ) is defined as the
Euler characteristic of the underlying topological surface Σtop , minus contributions coming
from the singularities: a conical point of order q (with isotropy group Z/qZ) contributes
1 − 1q , a corner reflector with isotropy group the dihedral group D2r of order 2r contributes
1
1
1
2 (1 − r ), and a point adjacent to a mirror and a component of ∂Σ contributes 4 .
Proposition 5.2. A compact 2-dimensional orbifold Σ is hyperbolic if and only if χ(Σ) <
0.
5.1.2
Curves and splittings
We now generalize the fact that any essential 2-sided simple closed curve on a surface Σ
defines a cyclic splitting of π1 (Σ).
Let Σ be a hyperbolic 2-orbifold as above. A closed geodesic γ ⊂ Σ is the image in Σ
of a bi-infinite geodesic γ̃ ⊂ Σ̃ whose image in Σ is compact. It is simple if hγ̃ and γ̃ are
equal or disjoint for all h ∈ π1 (Σ). If γ̃ 6⊂ ∂ Σ̃, we say that γ is an essential simple closed
geodesic in Σ (possibly one-sided). For brevity we often just call γ a geodesic.
If γ is an essential simple closed geodesic, then p−1 (γ), the orbit of γ̃ under π1 (Σ), is
a family of disjoint geodesics. There is a simplicial tree Tγ dual to this family: vertices of
Tγ are components of Σ̃ \ p−1 (γ), edges are components of p−1 (γ). The group π1 (Σ) acts
non-trivially on Tγ , but there are inversions if γ is one-sided; in this case we subdivide
edges so as to get an action without inversions (this may viewed as replacing γ by the
boundary of a regular neighborhood, a connected 2-sided simple 1-suborbifold bounding a
Möbius band).
We have thus associated to γ a one-edge splitting of π1 (Σ), which is clearly relative to
the boundary subgroups. We call it the splitting dual to the essential simple closed geodesic
γ (or the splitting determined by γ). Its edge group (well-defined up to conjugacy) is the
subgroup Hγ ⊂ GΣ consisting of elements which preserve γ̃ and each of the half-spaces
bounded by γ̃. It is isomorphic to Z or D∞ (the infinite dihedral group).
42
More generally, there is a splitting dual to any family L of disjoint essential simple
closed geodesics γi . For simplicity, we sometimes just say that the splitting is dual to a
family of geodesics.
Recall that a group is small if it does not contain F2 . The next result says that this
construction yields all small splittings of π1 (Σ) relative to the boundary subgroups (note
that all small subgroups of π1 (Σ) are virtually cyclic).
Remark 5.3. Also note that any subgroup of π1 (Σ) that preserves a line or an end in such
a splitting is virtually cyclic.
Proposition 5.4. Let Σ be a compact hyperbolic 2-orbifold. Assume that π1 (Σ) acts on
a tree T non-trivially, without inversions, minimally, with small edge stabilizers, and with
all boundary subgroups elliptic.
Then T is equivariantly isomorphic to the Bass-Serre tree of the splitting dual to a
family L of disjoint essential simple closed geodesics of Σ.
If edge stabilizers are not assumed to be small, T is still dominated by a tree dual to a
family of geodesics.
Remark 5.5. In this statement, we assume that T has no redundant vertex, and we do
not allow multiple parallel simple closed curves (because we consider geodesics). If T is
allowed to have redundant vertices, then it is only isomorphic to a subdivision of the tree
dual to a family of geodesics.
Proof. When Σ is an orientable surface, this follows from Theorem III.2.6 of [MS84]. If Σ
is a 2-orbifold, we consider a covering surface Σ0 as above. The action of π1 (Σ0 ) on T is
dual to a family of closed geodesics on Σ0 . This family is Λ-invariant and projects to the
required family on Σ. The action of π1 (Σ) on T is dual to this family.
The second statement follows from standard arguments (see the proof of [MS84, Theorem III.2.6]).
Corollary 5.6. π1 (Σ) has a non-trivial splitting relative to the boundary subgroups if and
only if Σ contains an essential simple closed geodesic.
Orbifolds with no essential simple closed geodesic are classified in the next subsection.
Proposition 5.4 implies in particular that π1 (Σ) is one-ended relative to its boundary
subgroups. This does not remain true if we set one boundary component aside.
Lemma 5.7. Let C be a boundary component of a compact hyperbolic 2-orbifold Σ. There
exists a non-trivial splitting of π1 (Σ) over {1} or Z/2Z relative to the fundamental groups
Bk of all boundary components distinct from C.
Proof. Any arc γ properly embedded in Σtop and with endpoints on C defines a free splitting
of π1 (Σ) relative to the groups Bk . In most cases one can choose γ so that this splitting
is non-trivial. We study the exceptional cases: Σtop is a disc or an annulus, and Σ has no
conical point.
If Σtop is a disc, its boundary circle consists of components of ∂Σ and mirrors. Since Σ
is hyperbolic, there must be a mirror M not adjacent to C (otherwise ∂Σtop would consist
of C and one or two mirrors, or two boundary components and two mirrors, and χ(Σ)
would not be negative). An arc γ with one endpoint on C and the other on M defines a
splitting over Z/2Z, which is non-trivial because M is not adjacent to C.
If Σtop is an annulus, there are two cases. If C is an arc, one can find an arc γ from
C to C as in the general case. If C is a circle in ∂Σtop , the other circle contains a mirror
M (otherwise Σ would be a regular annulus) and an arc γ from C to M yields a splitting
over Z/2Z.
43
Remark 5.8. If the splitting constructed is over K = Z/2Z, then Σ contains a mirror and
K is contained in an infinite dihedral subgroup (generated by K and a conjugate).
Definition 5.9 (Filling geodesics). Let Σ be a compact hyperbolic 2-orbifold, and let C be a
non-empty collection of (non-disjoint) essential simple closed geodesics in Σ. We say that
C fills Σ if the following equivalent conditions hold:
(1) For every essential simple closed geodesic α in Σ, there exists γ ∈ C that intersects
α non-trivially (with γ 6= α).
(2) For every element g ∈ π1 (Σ) of infinite order that is not conjugate into a boundary
subgroup, there exists γ ∈ C such that g acts hyperbolically in the splitting of π1 (Σ)
dual to γ.
(3) The full preimage C˜ of C in the universal covering Σ̃ is connected.
The equivalence between these conditions is well known. We include a proof for completeness.
Proof. (2) ⇒ (1) is clear, using a g representing α.
˜ and its convex hull A in
To prove (1) ⇒ (3), consider a connected component C0 of C,
Σ̃ ⊂ H2 . If C˜ is not connected, then A 6= Σ̃; indeed, A is contained in a half space bounded
by a geodesic in C˜ \ C0 . Let α be a connected component of the boundary of A in Σ̃, a
˜ Indeed, if γ ∈ C˜ cuts α, then
bi-infinite geodesic. We note that α cuts no geodesic of C.
γ∈
/ C0 , so all elements of C0 are disjoint from γ, and A is contained in a half-space bounded
by γ, contradicting α ⊂ Ā. Now α projects to a simple closed geodesic in Σ (if gα did
intersect α transversely, then A would be contained in the intersection of the half spaces
bounded by α and gα, a contradiction). Assumption (1) ensures that α is a boundary
component of Σ̃. This implies that A = Σ̃, and that C˜ is connected.
To prove (3) ⇒ (2), consider g ∈ π1 (Σ) of infinite order, and let A(g) be its axis in Σ̃.
˜ By connectedness, C˜ is contained in
If (2) does not hold, it intersects no geodesic in C.
one of the half-spaces bounded by A(g). It follows that the convex hull A of C˜ is properly
contained in Σ̃. Since A is π1 (Σ)-invariant, this is a contradiction.
Corollary 5.10. If Σ contains at least one essential simple closed geodesic, then the set
of simple closed geodesics fills Σ.
Using the first definition of filling, this follows immediately from the following lemma.
Lemma 5.11 (Lemma 5.3 of [Gui00b]). If γ0 is any essential simple closed geodesic, there
exists another essential simple closed geodesic γ1 intersecting γ0 non-trivially.
5.1.3
Small orbifolds
It is well-known that the pair of pants is the only compact hyperbolic surface containing no
essential simple closed geodesic. In this subsection we classify hyperbolic 2-orbifolds which
do not contain an essential geodesic. Their fundamental groups do not split relative to the
boundary subgroups (Corollary 5.6), and they do not appear in flexible vertex groups of
JSJ decompositions (see Subsection 5.2).
As above, we work with compact orbifolds with geodesic boundary, but we could equally
well consider orbifolds with cusps.
Proposition 5.12. A compact hyperbolic 2-orbifold with geodesic boundary contains no
simple closed essential geodesic if and only if it belongs to the following list (see Figure 6):
44
r
2
2
2
p
p
2p
2r
2
2
q
2
2
2p
p
2
2
2
p
2
2
2q
2
q
2p
2
2
2
2
2
2q
2
2
2
2
2
2
2
2
2
2
2
2
Figure 6: Orbifolds with no splittings (mirrors in bold, labels = isotropy size).
(1) a sphere with 3 conical points, a disc with 2 conical points, an annulus with 1 conical
point, a pair of pants (Σ has no mirror);
(2) a disk whose boundary circle is the union of a single mirror with a single boundary
segment, with exactly one conical point;
(3) an annulus with one mirror and no conical point;
(4) a disk whose boundary circle is the union of three mirrors, together with at most 3
boundary segments (no conical point).
Orbifolds Σ in this list are hyperbolic if and only if χ(Σ) < 0 (see Proposition 5.2).
Proof. Let Σ be an orbifold with no closed geodesic, and let Σ∗top be the underlying topological surface with the conical points removed. It has to be orientable, since otherwise it
contains an embedded Möbius band, whose core yields an essential simple closed geodesic.
Similarly, Σ∗top has to be planar, with at most 3 boundary components or punctures.
If Σ has no mirror, we must be in case (1): the total number of conical points and
boundary components must be three because χ(Σ) is negative.
We therefore assume that Σ has a mirror m. Recall that each component c of ∂Σ
is contained in a component b of ∂Σ∗top (a circle). If c 6= b, then c is a segment whose
endpoints belong to (possibly equal) mirrors contained in b.
The classification when there are mirrors relies on the inequality χ(Σ) < 0 and the
following basic observation. Consider a properly embedded arc joining m to a mirror n
(possibly equal to m). Since it cannot be isotopic to an essential simple closed geodesic,
it may be isotoped (in the complement of the conical points, with its endpoints remaining
on m and n respectively) to a boundary segment of Σ or to an arc contained in m.
This implies that the connected component b of ∂Σtop containing m is the only connected component of ∂Σtop containing a mirror, and b cannot contain more than 3 mirrors.
Considering arcs joining m to m, it also implies that Σ∗top is a disc or an annulus (not a
pair of pants).
If Σ∗top is an annulus, the only possibility is that b = m ∪ s with s a boundary segment
of Σ. This corresponds to cases (2) and (3), depending on whether Σ has a conical point
(necessarily of order > 2) or a second boundary component.
The only remaining possibility is that Σtop is a disc with boundary b, and there is
no conical point. Any pair of mirrors in b have to be adjacent, or joined by a boundary
segment of Σ. It follows that b contains at most 3 mirrors, and at most as many boundary
segments. There must be 3 mirrors in order for χ(Σ) to be negative.
45
5.1.4
Orbifold with finite mapping class group
Suppose that Σ is a compact hyperbolic surface. Unless it is a pair of pants, it contains
a simple closed geodesic γ. If γ is 2-sided, it defines a splitting of π1 (Σ) over a maximal
cyclic subgroup Hγ , and the Dehn twist around γ defines an infinite order element of the
mapping class group. If γ is one-sided, the dual splitting is over an index 2 subgroup of
π1 (γ), corresponding to the boundary curve γ̂ of a regular neighborhood; the Dehn twist
around γ̂ is homotopically trivial.
The pair of pants and the twice-punctured projective plane contain no 2-sided geodesic
and have finite mapping class group. All other hyperbolic surfaces contain a 2-sided
geodesic and have infinite mapping class group (note that the once-punctured Klein bottle
contains a unique 2-sided geodesic; like the closed non-orientable surface of genus 3, it has
no pseudo-Anosov mapping class).
In this subsection we generalize this discussion to orbifolds.
There are more examples of simple closed geodesics which do not yield non-trivial
twists. If γ is a mirror which is a full circle in ∂Σtop , its fundamental group is isomorphic
to Z ⊕ Z/2Z; it defines a splitting of π1 (Σ) over the index 2 subgroup isomorphic to Z, but
the associated Dehn twist is once again trivial. If γ is a geodesic arc whose endpoints belong
to mirrors, its fundamental group is the dihedral group D∞ and there is no associated Dehn
twist (because D∞ has trivial center). If γ is a mirror joining two corner reflectors carrying
D4 , it yields a splitting over D∞ but no twist.
We refer to [GL15b] (especially Theorem 7.14) for a general discussion of the relations
between splittings and automorphisms (see also [DG11] or [Lev05a], and the discussion
in Subsection 9.5). Here we limit ourselves to classifying orbifold groups which do not
split over a maximal cyclic subgroup relative to the boundary subgroups; equivalently, we
classify orbifolds Σ such that the interior of Σ∗top contains no 2-sided geodesic. These are
the orbifolds whose mapping class group is finite.
Let Σ be such an orbifold. We first note that Σ must be planar with at most 3 conical
points or boundary components, or be a Möbius band with one conical point, or a Möbius
band with one open disc removed, or a projective plane with 2 conical points.
Now say that a component b of ∂Σtop is simple if b contains no mirror (it is a component
of ∂Σ) or b is a single mirror; we say that b is a circular boundary component or a circular
mirror accordingly. Note that a simple boundary component does not contribute to χ(Σ)
(see Definition 5.1). In particular, if Σ is planar and all boundary components of Σtop are
simple, the total number of boundary components and conical points is 3.
If b is a non-simple boundary component, consider a simple closed curve parallel to it
inside Σtop . Since it is not isotopic to a geodesic, it must be parallel to a simple boundary
component b0 6= b, or bound a Möbius band containing no conical point, or bound a disc
containing at most one conical point.
One can now check that Σ must be in the following list. We write, e.g., (S 2 , 3) to mean
that the surface obtained from Σtop by removing the boundary and the conical points is a
sphere minus 3 points.
• (S 2 , 3): a sphere with a choice of 3 conical points, circular boundary components, or
circular mirrors;
• (S 2 , 2): an annulus one of whose boundary component is non-simple, and the other
is either a conical point or a circular boundary component or a circular mirror;
• (S 2 , 1): a disc whose boundary is non-simple, with no conical point;
• (P 2 , 2): a projective plane with a choice of 2 conical points, circular boundary components, or circular mirrors;
• (P 2 , 1): a Möbius band whose boundary is non-simple (no conical point).
46
5.2
Definition and properties of quadratically hanging subgroups
As usual, we fix G, A, and H. Let Q be a subgroup of G.
Definition 5.13 (QH subgroup, fiber, extended boundary subgroup). We say that Q is a
QH subgroup (over A, relative to H) if:
(1) Q = Gv is the stabilizer of a vertex v of an (A, H)-tree T ;
(2) Q is an extension 1 → F → Q → π1 (Σ) → 1, with Σ a compact hyperbolic 2-orbifold;
we call F the fiber, and Σ the underlying orbifold;
(3) each incident edge stabilizer, and each intersection Q ∩ gHg −1 for H ∈ H, is an
extended boundary subgroup: by definition, this means that its image in π1 (Σ) is
finite or contained in a boundary subgroup B of π1 (Σ).
Condition (3) may be rephrased as saying that all groups in IncH
v (see Definition 4.5)
are extended boundary subgroups.
In full generality, the isomorphism type of Q does not necessarily determine F and Σ;
when we refer to a QH subgroup, we always consider F and Σ as part of the structure. If
F is small, however, it may be characterized as the largest normal subgroup of Q which
is small; in particular, any automorphism of Q leaves F invariant. The group Q does not
have to be finitely generated if F is not, but it is finitely generated relative to IncH
v by
Lemma 4.7, so Proposition 1.7 (guaranteeing the existence of a minimal subtree) applies
to actions of Q relative to IncH
v .
A vertex v as above, as well as its image in Γ = T /G, is called a QH vertex. It is the
only point of T fixed by Q because extended boundary subgroups are proper subgroups
of Q. Also note that the preimage in Q of the finite group carried by a conical point or a
corner reflector of Σ is an extended boundary subgroup.
Any incident edge stabilizer Ge is contained in an extension of F by a virtually cyclic
subgroup of π1 (Σ). But, even if G is one-ended, Ge may meet F trivially, or have trivial
image in π1 (Σ) (see Subsection 5.4). In particular, in full generality, F does not have to
belong to A, or be universally elliptic if T is a JSJ tree.
Definition 5.14 (Dual splitting of G, group Qγ ). A splitting of π1 (Σ) dual to a family
of geodesics L as in Subsection 5.1.2 induces a splitting of Q relative to F . By the third
condition of Definition 5.13, this splitting is also relative to IncH
|Q (see Definition 4.5), so
extends to a splitting of G relative to H by Lemma 4.12. We say that this splitting of G is
dual to L (or determined by L). The edge group associated to γ ∈ L is denoted Qγ .
The edge groups Qγ are extensions of the fiber F by Z or D∞ , and in general they do
not have to be in A. For many natural classes of groups A, though, such extensions are
still in A (this is the content of the stability conditions of Subsection 6.1).
Conversely, we have seen (Proposition 5.4) that small splittings of an orbifold group
relative to the boundary subgroups are dual to families of geodesics. We will prove a similar
statement (Lemma 5.18) for splittings of QH groups relative to incident edge stabilizers
and groups in H|Q (i.e. to IncH
|Q ), but one has to make additional assumptions.
First, the fiber has to be elliptic in the splitting; this is not automatic in full generality,
but this holds as long as F and groups in A are slender, see Lemma 5.23 below. Next, we
need to ensure that boundary subgroups are elliptic; this motivates the following definition.
Definition 5.15 (Used boundary component). A boundary component C of Σ is used if
the group B = π1 (C) (isomorphic to Z or D∞ ) contains with finite index the image of an
incident edge stabilizer or of a subgroup of Q conjugate (in G) to a group in H.
47
Equivalently, C is used if there exists some subgroup H ∈ IncH
v whose image in π1 (Σ)
is infinite and contained in π1 (C) up to conjugacy.
Using Lemma 5.7, we get:
Lemma 5.16. Let Q = Gv be a QH vertex group of a tree T , with fiber F . If some
boundary component is not used, then G splits relative to H over a group F 0 containing F
with index at most 2. Moreover, T can be refined at v using this splitting.
Remark 5.17. F 0 = F whenever the underlying orbifold has no mirror. In general, F 0 does
not have to be in A.
Proof. Let C be a boundary component of Σ. Lemma 5.7 yields a non-trivial splitting of
Q over a group F 0 containing F with index ≤ 2 (with F 0 = F if there is no mirror). If
C is not used, this splitting is relative to IncH
|Q . By Lemma 4.12, one may use it to refine
T at v. One obtains a splitting of G relative to H, which may be collapsed to a one-edge
splitting over F 0 .
Proposition 5.4 implies:
Lemma 5.18. Let Q be a QH vertex group, with fiber F .
(1) Any non-trivial (minimal) splitting of Q relative to F factors through a splitting of
π1 (Σ) = Q/F .
(2) If the splitting is also relative to IncH
|Q , and every boundary component of Σ is used,
then the splitting of π1 (Σ) is dominated by a splitting dual to a family of geodesics.
In particular, Σ contains an essential simple closed geodesic.
(3) If, moreover, the splitting of Q has small edge groups, the splitting of π1 (Σ) is dual
to a family of geodesics.
Remark 5.19. The induced splitting of π1 (Σ) is relative to the boundary subgroups if (2)
holds, but not necessarily if only (1) holds.
Proof. Let S be the Bass-Serre tree of the splitting of Q. The group F acts as the identity
on S: its fixed point set is nonempty, and Q-invariant because F is normal in Q. We
deduce that the action of Q on S factors through an action of π1 (Σ).
Under the assumptions of (2), this action is relative to all boundary subgroups because
all boundary components of Σ are used (by an incident edge stabilizer or a conjugate of a
group in H). We apply Proposition 5.4.
Flexible QH vertex groups Gv of JSJ decompositions have non-trivial splittings relative
to IncH
v (see Corollary 4.14). As in Corollary 5.6 we wish to deduce that Σ contains an
essential simple closed geodesic, so as to rule out the small orbifolds of Proposition 5.12.
Proposition 5.20. Let Q = Gv be a QH vertex stabilizer of a JSJ tree over A relative to
H. Assume that F , and any subgroup of Gv containing F with index 2, belongs to A. Also
assume that F is universally elliptic. Then:
(1) every boundary component of Σ is used;
(2) if Q is flexible, then Σ contains an essential simple closed geodesic;
(3) let T be an (A, H)-tree such that Q acts on T with small edge stabilizers; if Q is not
elliptic in T , then the action of Q on its minimal subtree is dual, up to subdivision,
to a family of essential simple closed geodesics of Σ.
48
Proof. If some boundary component of Σ is not used, Lemma 5.16 yields a refinement of
the JSJ tree. The new edge stabilizers contain F with index at most 2, so belong to A and
are universally elliptic. This contradicts the maximality of the JSJ tree.
If Q = Gv is flexible, it acts non-trivially on an (A, H)-tree. This tree is also relative
to F because F is universally elliptic. This yields a splitting of Gv relative to F , which is
relative to H|Gv and to incident edge stabilizers because they are universally elliptic. Since
every boundary component is used, we obtain a geodesic by Lemma 5.18.
Applying the previous argument to T as in (3) shows that the splitting of Q is dual to
a family of geodesics by the third assertion of Lemma 5.18.
The first part of the following proposition shows that, conversely, the existence of an
essential geodesic implies flexibility.
Proposition 5.21. Let Q be a QH vertex group. Assume that Σ contains an essential
simple closed geodesic, and that, for all essential simple closed geodesics γ, the group Qγ
(see Definition 5.14) belongs to A.
(1) Any universally elliptic element (resp. subgroup) of Q is contained in an extended
boundary subgroup. In particular, Q is not universally elliptic.
(2) If J < Q is small in (A, H)-trees, its image in π1 (Σ) is virtually cyclic.
Remark 5.22. This holds under the weaker assumption that the set of essential simple
closed geodesics γ such that Qγ ∈ A fills Σ (in the sense of Definition 5.9).
Proof. Any subgroup of Q contained in the union of all extended boundary subgroups is
contained in a single extended boundary subgroup, so to prove (1) it suffices to show that,
if an element g does not lie in an extended boundary subgroup, then g is not universally
elliptic.
The image of g in π1 (Σ) has infinite order, so acts non-trivially in a splitting of π1 (Σ)
dual to a geodesic γ (see Definition 5.9). The splitting of G dual to γ is relative to H, and
the edge group Qγ is assumed to be in A, so g is not universally elliptic.
If J as in (2) has infinite image in π1 (Σ), it acts non-trivially in a splitting of G dual
to γ as above. The action preserves a line or an end by smallness of J, so the image of J
in π1 (Σ) is virtually cyclic by Remark 5.3.
Proposition 5.20 requires F to be universally elliptic. We show that this is automatic
for splittings over slender groups.
Lemma 5.23. Let Q be a QH vertex group. If F and all groups in A are slender, then F
is universally elliptic.
Proof. Suppose that F is slender but not universally elliptic. It acts non-trivially on some
tree, and there is a unique F -invariant line `. This line is Q-invariant because F is normal
in Q. It follows that Q is an extension of a group in A by its image in Isom(`), a virtually
cyclic group. If groups in A are slender, we deduce that Q is slender, a contradiction
because Q maps onto π1 (Σ) with Σ hyperbolic.
Corollary 5.24. Let Q be a QH vertex group Gv of a JSJ tree T . Assume that all groups
in A are slender, and that every extension of the fiber F by a virtually cyclic group belongs
to A. Then:
(1) F is universally elliptic; it is the largest slender normal subgroup of Q;
(2) all boundary components of the underlying orbifold Σ are used;
49
(3) if G acts on a tree S, and Q does not fix a point, then the action of Q on its minimal
subtree is dual to a family of essential simple closed geodesics of Σ;
(4) Q is flexible if and only if Σ contains an essential simple closed geodesic;
(5) if Q is flexible, than any universally elliptic subgroup of Q is an extended boundary
subgroup.
This follows from results proved above.
5.3
Quadratically hanging subgroups are elliptic in the JSJ
The goal of this subsection is to prove that, under suitable hypotheses, any QH vertex
group is elliptic in the JSJ deformation space (if we do not assume existence of the JSJ
deformation space, we obtain ellipticity in every universally elliptic tree).
We start with the following fact:
Lemma 5.25. If G splits over a group K ∈ A, but does not split over any infinite index
subgroup of K, then K is elliptic in the JSJ deformation space.
Proof. Apply Assertion 3 of Lemma 2.6 with T1 a JSJ tree and T2 a one-edge splitting
over K.
Remark 5.26. If K is not universally elliptic, it fixes a unique point in any JSJ tree. Also
note that being elliptic or universally elliptic is a commensurability invariant, so the same
conclusions hold for groups commensurable with K.
In [Sel97b, RS97, DS99] it is proved that, if Q is a QH vertex group in some splitting
(in the class considered), then Q is elliptic in the JSJ deformation space.
This is not true in general, even if A is the class of cyclic groups: Fn contains many
QH subgroups, none of them elliptic in the JSJ deformation space (which consists of free
actions, see Subsection 3.1). This happens because G = Fn splits over groups in A having
infinite index in each other, something which is prohibited by the hypotheses of the papers
mentioned above (in [FP06], G is allowed to split over a subgroup of infinite index in a
group in A, but Q has to be the enclosing group of minimal splittings, see [FP06, Definition
4.5 and Theorem 5.13(3)]).
A different counterexample will be given in Example 5.39 of Subsection 5.5, with A
the family of abelian groups. In that example the QH subgroup Q only has one abelian
splitting, which is universally elliptic, so Q is not elliptic in the JSJ space.
These examples explain the hypotheses in the following result.
Theorem 5.27. Let Q be a QH vertex group. Assume that, if Jˆ ⊂ Q is the preimage of
a virtually cyclic subgroup J ⊂ π1 (Σ), then Jˆ belongs to A and G does not split over a
ˆ If one of the following conditions holds, then Q is elliptic
subgroup of infinite index of J.
in the JSJ deformation space:
(1) Σ contains an essential simple closed geodesic γ;
(2) H = ∅, and the boundary of Σ is nonempty;
(3) the fiber F is elliptic in the JSJ deformation space;
(4) all groups in A are slender.
Note that Jˆ contains F , so F ∈ A.
50
Proof. Fix a JSJ tree TJ . We start by proving ellipticity of Q in TJ assuming the existence
of an essential simple closed geodesic γ.
Given a lift γ̃ ⊂ Σ̃, we have denoted by Hγ the subgroup of π1 (Σ) consisting of elements
which preserve γ̃ and each of the half-spaces bounded by γ̃, and by Qγ the preimage of Hγ
in Q. We now write Qγ̃ rather than Qγ because we want it to be well-defined, not just up
to conjugacy.
The group Qγ̃ belongs to A, and G splits over Qγ̃ . By Proposition 5.21, Qγ̃ is not
universally elliptic. By Lemma 5.25 and Remark 5.26, Qγ̃ fixes a unique point cγ̃ in TJ .
Lemma 5.28. Let γ̃, γ̃ 0 ⊂ Σ̃ \ ∂ Σ̃ be lifts of simple geodesics. If γ̃ and γ̃ 0 intersect, then
cγ̃ = cγ̃ 0 .
Proof. We can assume γ̃ 6= γ̃ 0 . Let T 0 be the Bass-Serre tree of the splitting of G determined
by γ̃ 0 . It contains a unique edge e0 with stabilizer Qγ̃ 0 . Since γ̃ and γ̃ 0 intersect, the group
Qγ̃ acts hyperbolically on T 0 , and its minimal subtree M (a line) contains e0 . Let T1 be a
refinement of TJ which dominates T 0 , as in Lemma 2.2, and let M1 ⊂ T1 be the minimal
subtree of Qγ̃ .
The image of M1 in TJ consists of the single point cγ̃ (because T1 is a refinement of
TJ ), and its image by any equivariant map f : T1 → T 0 contains M . Let e1 be an edge of
M1 such that f (e1 ) contains e0 . The stabilizer Ge1 of e1 is contained in Qγ̃ 0 , so Ge1 fixes
cγ̃ 0 . Since G does not split over infinite index subgroups of Qγ̃ 0 , the index of Ge1 in Qγ̃ 0 is
finite. The group Qγ̃ 0 is not universally elliptic (it acts non-trivially in the splitting dual to
γ), so cγ̃ 0 is the unique fixed point of Ge1 in TJ by Remark 5.26. But Ge1 fixes cγ̃ because
e1 is mapped to cγ̃ in TJ , so cγ̃ = cγ̃ 0 .
We can now conclude. Since the set of all essential simple geodesics of Σ fills Σ (Corollary 5.10), the union of their lifts is a connected subset of Σ̃ (Definition 5.9). In particular,
given any pair γ̃, γ̃ 0 of such lifts, there exists a finite sequence γ̃ = γ̃0 , γ̃1 , . . . , γ̃p = γ̃ 0 where
γ̃i intersects γ̃i+1 . Lemma 5.28 implies that cγ̃ = cγ̃ 0 , so cγ̃ does not depend on γ̃. It is
fixed by Q, so Q is elliptic.
We have proved the theorem in case (1) (when Σ contains a geodesic). We reduce cases
(2) and (3) to this one, using Lemma 5.18 to find a geodesic (case (4) reduces to (3) by
Lemma 5.23).
We first show that every boundary component of Σ is used (see Definition 5.15). If not,
Lemma 5.16 yields a splitting of G over a group F 0 containing F with index 1 or 2. By
Remark 5.8, the group F 0 is contained in the preimage Jˆ of a 2-ended subgroup J ⊂ π1 (Σ),
ˆ
and this contradicts the assumptions of the theorem since F 0 has infinite index in J.
If H = ∅ and ∂Σ 6= ∅, every boundary component C is used by an incident edge
stabilizer Ge whose image in π1 (Σ) is contained in B = π1 (C) with finite index. Let
B̂ ⊂ Q be the preimage of B. Folding yields a non-trivial splitting of G over B̂ (if for
instance G = R ∗Ge Q, then G = (R ∗Ge B̂) ∗B̂ Q). Since B̂ ∈ A, Lemma 5.25 implies that
B̂ is elliptic in the JSJ deformation space; in particular, F is elliptic. If Q is not elliptic,
Lemma 5.18 implies that Σ contains a geodesic.
Now suppose that F is elliptic in the JSJ space, but Q is not. The action of Q on
any JSJ tree then factors through π1 (Σ) by Assertion (1) of Lemma 5.18. Every boundary
subgroup B = π1 (C) is elliptic: this follows from the previous argument if C is used by
an incident edge stabilizer, and holds if C is used by a group in H because splittings are
relative to H. Proposition 5.4 yields a geodesic.
Remark 5.29. Under the assumptions of Theorem 5.27, assume moreover that all groups
in A are slender, and that G does not split over a subgroup of Q whose image in π1 (Σ) is
finite. Then Q fixes a unique point vJ ∈ TJ , so Q ⊂ GvJ . We claim that, if GvJ (hence
also Q) is universally elliptic, then vJ is a QH vertex of TJ . This is used in [GL10] (proof
of Theorem 4.2).
51
Let T be a tree in which Q is a QH vertex group Gw . Note that Q = GvJ because GvJ
is elliptic in T . We have to show that, if e is an edge of TJ containing v, then Ge is an
extended boundary subgroup of Q. Let T̂ be a refinement of TJ which dominates T . Let
ŵ be the unique point of T̂ fixed by Q, and let f : T̂ → T be an equivariant map. Let ê
be the lift of e to T̂ .
If f (ê) 6= {w}, then Ge fixes an edge of T adjacent to w, so is an extended boundary
subgroup of Q. Otherwise, consider a segment xŵ, with f (x) 6= w, which contains ê.
Choose such a segment of minimal length, and let ε = xy 6= ê be its initial edge (so
f (y) = w). We have Gε ⊂ Gy ⊂ Gw = Q, and Gε fixes an edge of T adjacent to w.
Since G does not split over groups mapping to finite groups in π1 (Σ), the image of Gε in
π1 (Σ) is a finite index subgroup of a boundary subgroup B ⊂ π1 (Σ). But we also have
Gε ⊂ Gw = Gŵ , so that Gε ⊂ Gê = Ge . Being slender and containing a finite index
subgroup of B, the image of Ge in π1 (Σ) has to be contained in B.
Corollary 5.30. Let A = V P C≤n be the class of all virtually polycyclic groups of Hirsch
length ≤ n. Assume that G does not split over a group in V P C≤n−1 . Let Q be a QH vertex
group with fiber in V P C≤n−1 , in some splitting of G over V P C≤n .
If T is any JSJ tree of G over A, then Q is contained in a QH vertex stabilizer of T .
Proposition 5 of the introduction is the case n = 1.
Proof. The group Q fixes a point v in T by Theorem 5.27. If Gv is universally elliptic,
we apply Remark 5.29. If not, v is flexible and we will prove in Theorem 6.2 that Gv is
QH.
5.4
Peripheral structure of quadratically hanging vertices
Suppose that Q is a QH vertex group of a JSJ decomposition. The incident edge groups
are extended boundary subgroups (see Definition 5.13). However, the collection of incident
edge groups (the family Incv of Definition 4.3) may change when the JSJ tree T varies in
the JSJ deformation space (though the collection of extended boundary subgroups usually
does not change, see Assertion (6) of Theorem 6.2).
In Section 4 of [GL07a] we introduced a collection M0 of subgroups of Q, which is
related to the incident edge groups, but which does not depend on the tree in the JSJ
deformation space. We called this collection the peripheral structure of Q.
The goal of this subsection is to show that the peripheral structure contains more
information than the collection of all extended subgroups, and may be fairly arbitrary.
In the examples, A is the class of slender groups, and no slender group is conjugate to
a proper subgroup of itself. In this context, the peripheral structure M0 of a non-slender
vertex stabilizer Gv of a tree T may be determined as follows. We first collapse edges so
as to make T reduced (see Subsection 1.4.2). The image of v has the same stabilizer, and
we still denote it by v. Then M0 is the set of conjugacy classes of incident edge stabilizers
Ge ⊂ Gv that are not properly contained in another incident edge stabilizer of Gv (see
[GL07a] for details).
We have seen (Proposition 5.20) that M0 often uses every boundary component of Σ.
Apart from that, the peripheral structure of Q may be fairly arbitrary. We shall now give
examples. In particular, Example 5.34 will show the following proposition:
Proposition 5.31. If Q is a QH vertex group of a slender JSJ decomposition of a oneended group, it is possible for an incident edge group to meet F trivially, or to have trivial
image in π1 (Σ).
We work with H = ∅ and A the family of slender subgroups.
52
H1 × R 1
H1
H2 × R 2 H
2
H3
H3 × R3 ..
.
Hp × R p H p
Figure 7: An example of a QH group in a JSJ decomposition.
To give examples, we use the filling construction described in Subsection 4.4, see Figure
7. We start with an extension 1 → F → Q → π1 (Σ) → 1, with F slender and Σ a
compact orientable surface (with genus ≥ 1, or with at least 4 boundary components). Let
H1 , . . . , Hp be a finite family of infinite extended boundary subgroups of Q as defined in
Definition 5.13 (note that they are slender). We impose that, for each boundary subgroup
B of π1 (Σ), there is an i such that Hi maps onto a finite index subgroup of B (i.e. every
boundary component is used by some Hi in the sense of Definition 5.15). Let Ri be a nonslender finitely presented group with Serre’s property (FA) (it has no non-trivial action on
a tree), for instance SL(3, Z). As in Subsection 4.4, we define a finitely presented group Ĝ
by amalgamating Q with Ki = Hi × Ri over Hi for each i.
Lemma 5.32. The Bass-Serre tree T of the amalgam defining Ĝ is a slender JSJ tree, Q
is a flexible QH subgroup, and Ĝ is one-ended. If no Hi is conjugate in Q to a subgroup of
Hj for i 6= j, the peripheral structure M0 consists of the conjugacy classes of the Hi ’s.
Proof. Let T 0 be any tree. Each Ri fixes a unique point because it is not slender, and this
point is also fixed by Hi . In particular, Hi × Ri , Hi and T are universally elliptic. To prove
that T is a JSJ tree, it suffices to see that Q is elliptic in any universally elliptic tree T 0 .
By Lemma 5.23, F is universally elliptic. If Q is not elliptic in T 0 , then by Lemma
5.18 the action of Q on its minimal subtree TQ ⊂ T 0 factors through a nontrivial action of
π1 (Σ) with slender (hence cyclic) edge stabilizers. Since every Hi , hence every boundary
subgroup of π1 (Σ), is elliptic, this action is dual to a system of disjoint geodesics on Σ
by Proposition 5.4. By Proposition 5.21, no edge stabilizer of TQ is universally elliptic,
contradicting universal ellipticity of T 0 .
This shows that T is a JSJ tree, and Q is flexible because Σ was chosen to contain
intersecting simple closed curves (see Corollary 5.24).
By Proposition 4.1, one obtains a JSJ tree of Ĝ over finite groups by collapsing all
edges of T with infinite stabilizer. Since each Hi is infinite, this JSJ tree is trivial, so Ĝ is
one-ended.
The assertion about M0 follows from the definition of M0 given in [GL07a].
Example 5.33. Let Σ be a punctured torus, with fundamental group ha, bi. Write u = [a, b].
Let Q = F × ha, bi, with F finite and non-trivial. Let H1 = hF, u2 i and H2 = hui. The
peripheral structure of Q in the JSJ tree T consists of two elements, though Σ only has one
boundary component. There is a JSJ tree T 0 such that incident edge groups are conjugate
to hF, ui (the quotient T 0 /G is a tripod), but it does not display the peripheral structure
of Q.
Example 5.34. Let Σ, a, b, u be as above. Again write Q = F × ha, bi, but now F = hti is
infinite cyclic. Let H1 = hui and H2 = hti. Then H1 meets F trivially, while H2 maps
trivially to π1 (Σ).
53
Example 5.35. Assume that the orbifold Σ has a conical point x carrying a finite cyclic
group Fx and that the fiber F is infinite. Then one can attach an edge to x: one chooses
any infinite subgroup Hx of the preimage of Fx in Q, and one constructs an amalgam
Q ∗Hx (Hx × Rx ). Similar constructions are possible with x a corner reflector, a point on
a mirror, or even a point with trivial isotropy.
5.5
Flexible vertices of abelian JSJ decompositions
We shall see in Section 6 that, if A is the family of cyclic subgroups, or virtually cyclic
subgroups, or slender subgroups, then non-slender flexible vertex groups Q of JSJ decompositions over A are QH with slender fiber (we say that Q is slender-by-orbifold). Things
are more complicated when A is the family of abelian subgroups (or equivalently of finitely
generated abelian subgroups, see Proposition 4.2).
The basic reason is the following: if a group Q is an extension 1 → F → Q → π1 (Σ) → 1
with F a finitely generated abelian group and Σ a surface, a splitting of π1 (Σ) dual to a
simple closed curve induces a splitting of Q over a subgroup which is slender (indeed
polycyclic) but not necessarily abelian.
Using the terminology of Definition 6.23, the regular neighbourhood of two abelian
splittings is not necessarily an abelian splitting.
In fact, we shall now construct examples showing:
Proposition 5.36. (1) Flexible subgroups of abelian JSJ trees are not always slenderby-orbifold groups.
(2) One cannot always obtain an abelian JSJ tree by collapsing edges of a slender JSJ
tree.
By Proposition 4.1, one can obtain an abelian JSJ tree by refining and collapsing a
slender JSJ tree. The point here is that collapsing alone is not always sufficient. It may
be shown that collapsing suffices when G is torsion-free, finitely presented, and CSA (see
Proposition 8.12 of [GL09]).
We use the same construction as in the previous subsection, but now π1 (Σ) will act
non-trivially on the fiber F .
Example 5.37. In this example F ' Z. Let Σ be obtained by gluing a once-punctured torus
to one of the boundary components of a pair of pants. Let M be a circle bundle over Σ
which is trivial over the punctured torus but non-trivial over the two boundary components
of Σ. Let Q = π1 (M ), and let H1 , H2 be the fundamental groups of the components of
∂M (homeomorphic to Klein bottles). Note that H1 , H2 are non-abelian. Construct Ĝ by
amalgamation with Hi × Ri as above. We claim that the abelian JSJ decomposition of Ĝ
is trivial, and Ĝ is flexible (but not slender-by-orbifold).
We argue as in the proof of Lemma 5.32. We know that H1 × R1 and H2 × R2 (hence
also F ) are universally elliptic. If T is any tree with abelian edge stabilizers, the action
of Q on its minimal subtree factors through π1 (Σ), and the action of π1 (Σ) is dual to a
system of simple closed curves. But not all simple closed curves give rise to an abelian
splitting of Q: they have to be “positive”, in the sense that the bundle is trivial over them.
To prove that none of these splittings is universally elliptic, hence that the abelian JSJ
space of Ĝ is trivial and Ĝ is flexible, it suffices to see that any positive curve intersects
(in an essential way) some other positive curve. This is true for the curve δ separating the
pair of pants from the punctured torus (one easily constructs a positive curve meeting δ
in 4 points). It is also true for curves meeting δ. Curves disjoint from δ are contained in
the punctured torus, and the result is true for them.
Every map from SL(3, Z) to a 2-orbifold group has finite image, so Ĝ is not isomorphic
to a slender-by-orbifold group if we choose Ri = SL(3, Z).
54
Remark 5.38. If one performs the construction adding a third group H3 = F , then Ĝ
becomes a flexible vertex group in a group whose JSJ decomposition is non-trivial.
Example 5.39. Now F = Z2 . Let Σ be a surface of genus ≥ 2 with two boundary components C1 , C2 . Let γ be a simple closed curve separating C1 from C2 . Let Σ0 be the
space obtained from Σ by collapsing γ to a point. Map π1 (Σ) to SL(2, Z) ⊂ Aut(Z2 ) by
projecting to π1 (Σ0 ) and embedding the free group π1 (Σ0 ) into SL(2, Z). Let Q be the
associated semi-direct product Z2 o π1 (Σ), and Hi = Z2 o π1 (Ci ). Construct Ĝ as before.
Abelian splittings of Ĝ now come from simple closed curves on Σ belonging to the
kernel of ρ : π1 (Σ) → SL(2, Z). But it is easy to see that γ is the only such curve. It
follows that the one-edge splitting dual to γ is an abelian JSJ decomposition of Ĝ. It has
two rigid vertex groups. It cannot be obtained by collapsing a slender JSJ splitting.
6
JSJ decompositions over slender groups
The main result of this section is the description of JSJ decompositions over slender groups.
Recall (Subsection 1.5) that a subgroup A ⊂ G is slender if A and all its subgroups are
finitely generated. Whenever G acts on a tree, A fixes a point or leaves a line invariant.
Our approach essentially follows Fujiwara and Paposoglu [FP06], but with simplifications. In particular, we do not have to “deal with a third splitting” (see below for further
discussion).
6.1
Statement of results
Let G be a finitely generated group, A a family of subgroups stable under conjugation and
taking subgroups, and H a finite set of finitely generated subgroups of G such that G is
finitely presented relative to H.
The goal of this section is to show that non-slender flexible vertex groups Q of JSJ
decompositions over A relative to H are QH (see Subsection 5.2). We need two assumptions on A. First, groups in A should be slender (or at least slender in (A, H)-trees, see
Subsection 6.8). The second is a stability condition involving a subfamily F ⊂ A (we will
show that fibers of QH flexible vertex groups belong to F).
Definition 6.1 (Stability Condition (SC)). We say that A satisfies the stability condition
(SC), with fibers in a family of subgroups F, if the following hold for every short exact
sequence
1→F →A→K→1
with A < G:
(1) if A ∈ A, and K is isomorphic to Z or D∞ , then F ∈ F;
(2) if F ∈ F and K is isomorphic to a quotient of Z or D∞ , then A ∈ A.
The group Z acts on the line in an orientation-preserving way. The infinite dihedral
group D∞ also acts on the line, but orientation is not preserved. In (2), the group K may
be finite (cyclic or dihedral) or infinite (isomorphic to Z or D∞ ).
If Q is a QH subgroup with fiber F , recall that any simple geodesic γ on Σ defines
a splitting of G over a group Qγ which is an extension of F by Z or D∞ . If there is a
geodesic γ0 such that Qγ0 ∈ A, the stability condition ensures first that F ∈ F, and then
that Qγ ∈ A for every γ (compare the assumptions of Proposition 5.21, Corollary 5.24 and
Theorem 5.27). Failure of the stability condition explains why Theorem 6.2 below does
not apply to abelian JSJ splittings (see Subsection 5.5).
On the other hand, one easily checks that the stability condition holds in the following
cases:
55
• A={slender} (i.e. A consists of all slender subgroups of G), with F = A;
• A={virtually cyclic}, with F={finite};
• A={virtually polycyclic}, with F = A;
• A = {V P C≤n }, the virtually polycyclic subgroups of Hirsch length at most n, with
F={VPC≤n−1 };
• G is a torsion-free CSA group, A={finitely generated abelian}, with F = A (recall
that a group is CSA if all maximal abelian subgroups are malnormal).
See Definition 6.4 for a different condition, which applies to A={cyclic}. Also recall that,
since G is relatively finitely presented, a JSJ decomposition over A is also one over groups
locally in A (Proposition 4.2).
Theorem 6.2. Suppose that all groups in A are slender, and A satisfies the stability
condition (SC), with fibers in a family F. Let H be a finite family of finitely generated
subgroups. Let G be finitely presented (or only finitely presented relative to H).
If Q is a non-slender flexible vertex group of a JSJ decomposition of G over A relative
to H, then:
(1) Q is QH with fiber in F (it maps onto π1 (Σ), where Σ is a compact hyperbolic 2orbifold, with kernel F ∈ F; the image of an incident edge group in π1 (Σ) is finite
or contained in a boundary subgroup);
(2) if G acts on a tree and Q does not fix a point, the action of Q on its minimal subtree
is dual to a family of geodesics of Σ;
(3) F and extended boundary subgroups are universally elliptic;
(4) every boundary component of Σ is used;
(5) Σ contains an essential closed geodesic;
(6) every universally elliptic subgroup of Q is an extended boundary subgroup.
Once (1) is known, Assertions (2)-(6) are direct consequences of the results of Subsection
5.2. See Subsection 5.1.3 for the list of orbifolds containing no essential closed geodesic,
and Subsection 6.9 for a description of slender flexible vertex groups.
Corollary 6.3. Let A be the class of all slender subgroups of G. Let H be a finite family of
finitely generated subgroups. Let G be finitely presented (or only finitely presented relative
to H).
Then every flexible vertex of any JSJ decomposition over A relative to H is either
slender or QH with slender fiber.
In view of the examples given above, one has a similar description of JSJ decompositions
over virtually cyclic groups (non-slender flexible groups are QH with finite fiber), over
V P C≤n -groups (non-slender flexible groups are QH with V P C≤n−1 fiber), etc.
The result by Fujiwara-Papasoglu [FP06] is the case when H = ∅ and A is the class of
all slender groups. Dunwoody-Sageev [DS99] consider (a generalisation of) the case when
H = ∅ and A = {V P C≤n }; if G does not split over a V P C≤n−1 -subgroup, flexible vertex
groups are QH with V P Cn−1 fiber.
If groups in A are only assumed to be slender in (A, H)-trees, the conclusions of the
theorem apply to groups Q which are not slender in (A, H)-trees (see Subsection 6.8).
The class of all (finite or infinite) cyclic groups does not satisfy the stability condition (SC) if G contains dihedral subgroups. To recover Rips and Sela’s description of
JSJ decompositions over cyclic groups, we introduce a modified stability condition (SCZ )
preventing groups in A from acting dihedrally on a line.
56
Definition 6.4 (Stability Condition (SCZ )). We say that A satisfies the stability condition
(SCZ ), with fibers in F, if the following hold:
(1) no group of A maps onto D∞ ; given a short exact sequence 1 → F → A → Z → 1
with A ∈ A, we have F ∈ F;
(2) given a short exact sequence 1 → F → A → K → 1 with F ∈ F and K isomorphic
to a quotient of Z, we have A ∈ A.
This condition is satisfied by the classes consisting of
• all cyclic subgroups, with F = {1},
• all subgroups which are finite or cyclic, with F = {1},
• all virtually cyclic subgroups which do not map onto D∞ (i.e. are finite or have
infinite center), with F ={finite},
and any class satisfying (SC) and consisting of groups which do not map onto D∞ .
Theorem 6.5. Theorem 6.2 holds if A satisfies the stability condition (SCZ ) rather than
(SC). In this case the underlying orbifold Σ has no mirror (all singular points are conical
points).
In particular:
Theorem 6.6 ([RS97]). Let G be finitely presented relative to a finite family H of finitely
generated subgroups. Let A be the class of all finite or cyclic subgroups of G.
If Q is a flexible vertex group of a JSJ decomposition of G over A relative to H, and
Q is not virtually Z2 , then Q is QH with trivial fiber. Moreover, the underlying orbifold Σ
has no mirror, every boundary component of Σ is used, and Σ contains an essential simple
closed geodesic.
Indeed, it follows from (RN1) of Proposition 6.25, or from Proposition 6.38, that slender
flexible groups are virtually Z2 .
In the next subsection we shall reduce Theorems 6.2 and 6.5 to Theorem 6.8, which
will be proved in Subsections 6.3 through 6.7.
In Subsections 6.3 through 6.5, and 6.7, we only assume that G is finitely generated (not
finitely presented), and H may be arbitrary (we use finite presentability only in Lemma
6.12 and Subsection 6.6). This will be useful in Subsection 8.1, where finite presentability
will not be assumed. In particular, we will see (Theorem 8.6) that Theorem 6.6 is true if
G is only finitely generated and H is an arbitrary family of subgroups.
6.2
Reduction to totally flexible groups
Unlike Fujiwara-Papasoglu, we know in advance that JSJ decompositions exist, and we
only need to show that flexible vertex groups Gv are QH. This allows us to forget G and
concentrate on Gv , but we have to remember the incident edge groups and we therefore
consider splittings of Gv that are relative to IncH
v (see Definition 4.3): since incident edge
groups are universally elliptic, these are exactly the splittings that extend to splittings
of G relative to H (see Lemma 4.12). Even if we are interested only in non-relative JSJ
decompositions of G (H = ∅), it is important here that we work in a relative context. In
Subsection 8.1.2 we will even have to allow groups in H to be infinitely generated.
The fact that Gv is a flexible vertex of a JSJ decomposition says that Gv splits relative
to IncH
v , but not over a universally elliptic subgroup (Corollary 4.14). This motivates the
following general definition.
57
Definition 6.7 (Totally flexible). G is totally flexible (over A relative to H) if it admits
a non-trivial splitting, but none over a universally elliptic subgroup. Equivalently, the JSJ
decomposition of G is trivial, and G is flexible.
The example to have in mind is the fundamental group of a compact hyperbolic surface
other than a pair of pants, with A the class of cyclic groups and H consisting of the
fundamental groups of the boundary components.
We shall deduce Theorems 6.2 and 6.5 from the following result, which says that totally
flexible groups are QH.
Theorem 6.8. Let G be finitely presented relative to a finite family H of finitely generated
subgroups. Let A be a class of slender groups satisfying the stability condition (SC) or
(SCZ ) with fibers in F (see Definitions 6.1 and 6.4).
Assume that G is totally flexible over A relative to H, and not slender. Then G is QH
with fiber in F, and Σ has no mirror in the SCZ case.
Since there are no incident edge groups, being QH means that G is an extension of a
group F ∈ F by the fundamental group of a hyperbolic orbifold Σ, and the image of each
group H ∈ H in π1 (Σ) is either finite or contained in a boundary subgroup. By Corollary
5.24, every component of ∂Σ is used by a group of H (if H = ∅, then Σ is a closed orbifold).
This theorem implies Theorems 6.2 and 6.5: we apply it to Gv , with A = Av (the
H
family of subgroups of Gv belonging to A) and H = IncH
v (Definition 4.3). Note that Incv
is a finite family of finitely generated subgroups by Theorem 2.20 and Remark 4.6, that
Gv is finitely presented relative to IncH
v by Proposition 4.9, and that Av satisfies (SC) or
(SCZ ) with fibers in Fv .
There are three main steps in the proof of Theorem 6.8.
• Given two trees T1 , T2 such than no edge stabilizer of one tree is elliptic in the other,
we follow Fujiwara-Papasoglu’s construction of a core C ⊂ T1 × T2 . This core happens to
be a surface away from its vertices. More precisely, if one removes from C its cut vertices
and the vertices whose link is homeomorphic to a line, one gets a surface whose connected
components are simply connected. The decomposition of C dual to its cut points yields
a tree R having QH vertices coming from the surface components. Borrowing Scott and
Swarup’s terminology [SS03], we call this tree R the regular neighborhood of T1 and T2 (see
Example 6.24 for an explanation of this name). The stability condition is used to ensure
that edge stabilizers of R are in A.
• Given a totally flexible G, we construct two splittings U and V of G which “fill” G,
and we show that their regular neighborhood is the trivial splitting of G. We deduce that
G itself is QH, as required (in the case of cyclic splittings of a torsion-free group, G is
the fundamental group of a compact surface and one should think of U and V as dual to
transverse pair of pants decompositions, see Example 6.29).
• The previous steps require that splittings of Q be minuscule. This is a condition
which controls the way in which Q may split over subgroups A, A0 with A0 ⊂ A, and we
check that it is satisfied.
Our first step is the same as [FP06]. But total flexibility allows us to avoid the more
complicated part of their paper where, given a QH vertex group of a tree (obtained for
instance as the regular neighborhood of two splittings), one has to make it larger to enclose
a third splitting.
In the second step, the first splitting U is obtained by a maximality argument which
requires finite presentability.
Fujiwara and Papasoglu work with a minimality condition for splittings that allows the
construction of regular neighborhoods. This condition is not sufficient for our purpose,
and we replace it by a stronger condition (minuscule).
58
6.3
Fujiwara-Papasoglu’s core
As mentioned earlier, we let H be arbitrary and we only assume that G is finitely generated.
Groups in A are slender, and one of the stability conditions (SC) or (SCZ ) is satisfied.
6.3.1
Minuscule splittings
Definition 6.9 (Minuscule). Given A, A0 ∈ A, we say that A0 A if A0 ⊂ A and there
exists a tree S such that A0 is elliptic in S but A is not. We also write A A0 .
We say that A ∈ A is minuscule if, whenever a subgroup A0 A fixes an edge e of a
tree, A0 has infinite index in the stabilizer Ge . Equivalently, A is minuscule if and only if
no A0 A is commensurable with an edge stabilizer.
A tree is minuscule if its edge stabilizers are minuscule. We say that all trees (or all
splittings) are minuscule if all (A, H)-trees are minuscule.
If A0 A, then A0 has infinite index in A. If A0 ⊂ A B ⊂ B 0 , then A0 B 0 . In
particular, the relation is transitive.
Being minuscule is a commensurability invariant. It is often used in the following way:
if an edge stabilizer Ge of a tree T is elliptic in another tree S, then any minuscule A
containing Ge is also elliptic in S.
Remark 6.10. If G does not split (relative to H) over a subgroup commensurable with a
subgroup of infinite index of a group in A, then every A ∈ A is minuscule (because, if
A is not minuscule, some Ge has a finite index subgroup A0 contained in A with infinite
index). This holds for instance under the assumptions of [DS99], in particular for splittings
of one-ended groups over virtually cyclic subgroups. The reader interested only in this case
may therefore ignore Subsection 6.7, where we prove that all splittings of a totally flexible
group are minuscule.
The following lemma says that ellipticity is a symmetric relation among minuscule trees
(in the terminology of [FP06], minuscule one-edge splittings are minimal ).
Lemma 6.11. If T1 is elliptic with respect to T2 , and T2 is minuscule, then T2 is elliptic
with respect to T1 .
Proof. Let T̂1 be a standard refinement of T1 dominating T2 (Definition 2.5). Let e2 be an
edge of T2 , and e an edge of T̂1 with Ge ⊂ Ge2 . The group Ge is elliptic in T1 , and since
Ge2 is minuscule Ge2 itself is elliptic in T1 . This argument applies to any edge of T2 , so T2
is elliptic with respect to T1 .
Lemma 6.12. Assume that H is a finite family of finitely generated subgroups, G is finitely
presented relative to H, and all trees are minuscule. There exists a tree T which is maximal
for domination: if T 0 dominates T , then T dominates T 0 (so T and T 0 are in the same
deformation space).
Finite presentation is necessary as evidenced by Dunwoody’s inaccessible group [Dun93],
with H = ∅ and A the family of finite subgroups.
Example 6.13. If we consider cyclic splittings of the fundamental group of a closed orientable surface Σ, then T is maximal if and only if it is dual to a pair of pants decomposition
of Σ.
Proof. Let T be the set of all trees with finitely generated edge and vertex stabilizers, up
to equivariant isomorphism. By Dunwoody’s accessibility (Corollary 2.25) every tree is
dominated by a tree in T , so it suffices to find a maximal element in T .
As pointed out in the proof of Theorem 2.16, the set T is countable, so it suffices
to show that, given any sequence Tk such that Tk+1 dominates Tk , there exists a tree T
dominating every Tk .
59
We produce inductively a tree Sk in the same deformation space as Tk which refines
Sk−1 . Start with S0 = T0 , and assume that Sk−1 is already defined. Since Tk dominates
Tk−1 , hence Sk−1 , it is elliptic with respect to Sk−1 . All trees being assumed to be minuscule, Sk−1 is elliptic with respect to Tk by Lemma 6.11. We may therefore define Sk as a
standard refinement of Sk−1 dominating Tk . It belongs to the same deformation space as
Tk by Assertion (iv) of Proposition 2.2.
By Dunwoody’s accessibility (Proposition 2.24), there exists a tree T ∈ T dominating
every Sk , hence every Tk .
6.3.2
Definition of the core
Let T1 and T2 be trees. Recall that T1 is elliptic with respect to T2 if every edge stabilizer
of T1 is elliptic in T2 (Definition 2.1). If T1 has several orbits of edges, it may happen that
certain edge stabilizers are elliptic in T2 and others are not (being slender, they act on T2
hyperbolically, leaving a line invariant). This motivates the following definition.
Definition 6.14 (Fully hyperbolic). T1 is fully hyperbolic with respect to T2 if every edge
stabilizer of T1 acts hyperbolically on T2 .
This implies that edge stabilizers of T1 are infinite, and no vertex stabilizer of T1 is
elliptic in T2 (except if T1 and T2 are both trivial).
Example 6.15. Suppose that G is a surface group and T1 , T2 are dual to families of disjoint
geodesics L1 , L2 as in Subsection 5.1. Then T1 is elliptic with respect to T2 if each curve
in L1 is either contained in L2 or disjoint from L2 . It is fully hyperbolic with respect to
T2 if each curve in L1 meets L2 and every intersection is transverse.
Let T1 be fully hyperbolic with respect to T2 . We consider the product T1 × T2 . We
view it as a complex made of squares e1 × e2 , with the diagonal action of G. An edge of
the form e1 × {v2 } is horizontal, and an edge {v1 } × e2 is vertical.
Following [FP06], we define the asymmetric core C(T1 , T2 ) as follows. For each edge e
and each vertex v of T1 , let µT2 (Ge ) and µT2 (Gv ) be the minimal subtrees of Ge and Gv
respectively in T2 (with µT2 (Ge ) a line since Ge is slender).
ˇ 1 , T2 )). Let T1 be fully hyperbolic with
Definition 6.16 (Asymmetric cores C(T1 , T2 ), C(T
respect to T2 . The asymmetric core C(T1 , T2 ) ⊂ T1 × T2 is
[
[
C(T1 , T2 ) =
{v} × µT2 (Gv ) ∪
e × µT2 (Ge ) .
v∈V (T1 )
e∈E(T1 )
ˇ 1 , T2 ) ⊂
If we also assume that T2 is fully hyperbolic with respect to T1 , we denote by C(T
T1 × T2 the opposite construction:
[
[
ˇ 1 , T2 ) =
C(T
µT1 (Gv ) × {v} ∪
µT1 (Ge ) × e .
v∈V (T2 )
e∈E(T2 )
ˇ 1 , T2 ).
When no confusion is possible, we use the notations C, Cˇ instead of C(T1 , T2 ), C(T
Note that C consists of all (x, y) ∈ T1 × T2 such that y belongs to the minimal subtree of
Gx .
Every µT2 (Gv ), µT2 (Ge ) being a non-empty subtree, with µT2 (Ge ) ⊂ µT2 (Gv ) if v is an
endpoint of e, a standard argument shows that C(T1 , T2 ) is simply connected.
The group G acts diagonally on T1 ×T2 , and C is G-invariant. Since Ge acts cocompactly
on the line µT2 (Ge ) for e ∈ E(T1 ), there are finitely many G-orbits of squares in C.
Remark 6.17. If H ⊂ G is elliptic in T1 and T2 , it fixes a vertex in C (because H fixes some
v1 ∈ T1 , and being elliptic in T2 it fixes a point in the Gv1 -invariant subtree µT2 (Gv1 ) ⊂ T2 ).
60
6.3.3
Symmetry of the core
The goal of this subsection is to prove that the asymmetric core of minuscule splittings is
actually symmetric: Cˇ = C. Before doing so, we note the following basic consequence of
symmetry.
Lemma 6.18. Let T1 , T2 be fully hyperbolic with respect to each other. Assume that Cˇ = C.
Then C is a pseudo-surface: if V (C) is its set of vertices, then C \ V (C) is a surface (which
does not have to be connected or simply connected).
Proof. By construction, C ∩ (˚
e1 × T2 ) = e˚1 × µT2 (Ge1 ) ' e˚1 × R if e1 is an edge of T1 and
e˚1 denotes the open edge. It follows that all horizontal edges of C are contained in exactly
two squares. The symmetric argument shows that all vertical edges of Cˇ are contained in
ˇ Since Cˇ = C, all open edges of C are contained in exactly two
exactly two squares of C.
squares, so C \ V (C) is a surface.
Proposition 6.19. Let T1 , T2 be two minuscule trees that are fully hyperbolic with respect
to each other. Then Cˇ = C.
In other words, the relation “y belongs to the minimal subtree of Gx ” is symmetric.
The remainder of this subsection is devoted to the proof of the proposition. We always
assume that T1 and T2 are fully hyperbolic with respect to each other, but they are only
assumed to be minuscule when indicated.
We denote by C (2) ⊂ C the union of all closed squares e1 × e2 of T1 × T2 which are
contained in C, or equivalently such that e2 ⊂ µT2 (Ge1 ). It contains all horizontal edges
e × {v2 } of C, but only contains those vertical edges {v} × e2 which bound a square in C.
Any open edge {v} × e̊2 which does not bound a square in C disconnects C.
We define Cˇ(2) analogously.
Remark. The minimality condition of [FP06] is weaker than requiring trees to be minuscule,
and they only conclude Cˇ(2) = C (2) .
(2)
If y is a point of T2 , define Yy = C ∩ (T1 × {y}) and Yy = C (2) ∩ (T1 × {y}). They
are invariant under Gy (we do not claim that they are connected). If y is not a vertex,
(2)
(2)
Yy \ Yy is a union of isolated vertices, so any connected component of Yy is a connected
component of Yy .
Lemma 6.20. Let m be the midpoint of an edge e2 of T2 . If Ym is not connected, then
(2)
T2 is not minuscule. Moreover, if Ym is not connected, then some edge stabilizer of T1 is
hyperbolic in a one-edge splitting over a group A Ge2 .
The “moreover” will only be needed in Subsection 6.7.2.
Proof. Assuming that Ym is not connected, let Z be a connected component that does not
contain µT1 (Ge2 ) × {m} (there exists one since µT1 (Ge2 ) × {m} is connected; we do not
(2)
(2)
claim µT1 (Ge2 ) × {m} ⊂ C). If Ym is disconnected, we choose Z ⊂ Ym . Let GZ ⊂ Ge2
be the global stabilizer of Z.
We first show that GZ is elliptic in T1 , so in particular, GZ Ge2 . If GZ contains an
element h which is hyperbolic in T1 , the projection of Z in T1 contains the axis µT1 (h).
Since Ge2 is slender, µT1 (h) = µT1 (Ge2 ), contradicting our choice of Z.
To prove that T2 is not minuscule, it is therefore enough to construct a (minimal) tree S
in which GZ is an edge stabilizer. Consider Z̃ = G.Z ⊂ C, and note that Z is a connected
component of Z̃. Since C is simply connected, each connected component of Z̃ separates C
(Z is a track in C). Let S be the tree dual to Z̃: its vertices are the connected components
of C \ Z̃, and its edges are the connected components of Z̃.
61
By construction, S is a one-edge splitting, GZ is the stabilizer of the edge corresponding
to Z, so in particular S is an A-tree. Since any H ∈ H fixes a vertex in C (see Remark
6.17), S is an (A, H)-tree.
There remains to check that S is non-trivial (hence minimal). Let {v1 } × {m} be a
vertex of Z. By definition of C, the point m belongs to µT2 (Gv1 ), so there is g ∈ Gv1
whose axis in T2 contains m. The line {v1 } × µT2 (g) ⊂ C naturally defines an embedded
g-invariant line in S, on which g acts as a non-trivial translation. This proves that g is
hyperbolic in S, so S is non-trivial. It follows that T2 is not minuscule.
(2)
Under the stronger assumption that Ym is disconnected, there is an edge e1 × {m} in
Z, and we can choose the element g in Ge1 . The tree S provides the required splitting,
with edge group GZ Ge2 .
Lemma 6.21. If Ym is connected whenever m is the midpoint of an edge of T2 , then Yy
is connected for every y ∈ T2 .
Proof. Clearly Yy is homeomorphic to some Ym if y belongs to the interior of an edge, so
assume that y is a vertex of T2 . We sketch the argument, which is standard. Consider
a, b ∈ Yy , and join them by a piecewise linear path γ in C. The projection of γ to T2 is a loop
based at y. If this projection is not {y}, then γ has a subpath γ0 whose endpoints project
to y and whose initial and terminal segments project to the same edge e2 = yv. Using
connectedness of Ym , for m the midpoint of e2 , we may replace γ0 by a path contained in
Yy . Iterating yields a path joining a and b in Yy .
Lemma 6.22. Assume that T1 , T2 are fully hyperbolic with respect to each other, and that
T2 is minuscule. Then Cˇ ⊂ C.
Proof. Lemmas 6.20 and 6.21 imply that Yy is connected for every y ∈ T2 . Being connected
ˇ
and Gy -invariant, Yy contains µT1 (Gy ) × {y}, so C contains C.
Proposition 6.19 follows immediately from Lemma 6.22 by symmetry.
6.4
The regular neighborhood
In this subsection we assume that T1 , T2 are non-trivial, fully hyperbolic with respect to
each other, and that Cˇ = C. We use the core to construct a tree R, which we call the
regular neighborhood of T1 and T2 . Its main properties are summarized in Proposition
6.25.
We have seen (Lemma 6.18) that C is a surface away from its vertices. It follows
that the link of any vertex v ∈ C is a one-dimensional manifold, i.e. a disjoint union of
lines and circles. Since C is simply connected, the vertices whose link is disconnected are
precisely the cut points of C. We define the regular neighborhood R as the tree dual to
the decomposition of C by its cut points.
Definition 6.23 (Regular neighborhood). The regular neighborhood R = RN (T1 , T2 ) =
RN (T2 , T1 ) is the bipartite tree with vertex set V t S, where V is the set of cut vertices x
of C, and S is the set of connected components Z of C \ V. There is an edge between x and
Z in R if and only if v is in the closure Z̄ of Z.
V may be empty, but S is always non-empty (unless T1 , T2 are trivial).
Example 6.24. The basic example is the following. As in Example 6.15, let T1 , T2 be cyclic
splittings of the fundamental group of a closed orientable surface Σ dual to families of
geodesics L1 , L2 . Then R is dual to the family L defined as follows (more precisely, R
is a subdivision of the tree dual to L): consider the boundary of a regular neighborhood
of L1 ∪ L2 , disregard homotopically trivial curves, and isotope each non-trivial one to a
geodesic. Orbits of vertices in S correspond to components of Σ \ L meeting L1 ∪ L2 . The
other components correspond to orbits of vertices in V.
62
Proposition 6.25. Suppose that all groups in A are slender, and A satisfies (SC) or
(SCZ ). Let T1 , T2 be non-trivial trees that are fully hyperbolic with respect to each other,
with Cˇ = C.
The bipartite tree R is a minimal (A, H)-tree satisfying the following properties:
(RN1) If v ∈ S, then Gv acts hyperbolically in T1 and T2 . It is an extension 1 → F → Gv →
O → 1, where the fiber F is in F, is contained in every incident edge stabilizer, and
fixes an edge in T1 and in T2 . There are two possibilities.
If Gv is not slender, it is QH with fiber F . The underlying orbifold Σ is hyperbolic,
with fundamental group O, and contains an essential simple closed geodesic. There
is no mirror if (SCZ ) holds. Extended boundary subgroups of Gv are elliptic in T1
and T2 .
If Gv is slender, then O is virtually Z2 (it is the fundamental group of a Euclidean
orbifold Σ without boundary). Incident edge stabilizers are finite extensions of F .
(RN2) The stabilizer of a vertex v ∈ V is elliptic in T1 and T2 ; in particular, R is elliptic
with respect to T1 and T2 . Conversely, any group H ⊂ G elliptic in T1 and T2 is
elliptic in R; more precisely, H fixes a vertex v ∈ V, or H fixes a vertex v ∈ S and
the image of H in O is finite or contained in a boundary subgroup.
(RN3) For i = 1, 2, one passes from R to Ti by refining R at vertices v ∈ S using families
of essential simple closed geodesics in the underlying orbifolds, and then collapsing
all original edges of R. In particular, R is compatible with Ti . Any edge stabilizer of
Ti fixes some v ∈ S, and no other vertex of R; it contains the associated fiber.
The tree R may be trivial (in Example 6.24, this happens precisely when L1 and L2
fill Σ). In this case, G itself is slender or QH with fiber in F.
Proof. The action of G on C induces an action of G on R. It is not obvious that R is
minimal or has edge stabilizers in A. Note, however, that R is relative to H. In fact, any
subgroup H which is elliptic in T1 and T2 is elliptic in R, because H fixes a vertex of C by
Remark 6.17.
The stabilizer of a vertex v ∈ V fixes a point in C, so is elliptic in T1 and T2 . In
particular, edge stabilizers of R are elliptic in T1 and T2 ; in other words, R is elliptic with
respect to T1 and T2 .
The heart of the proof is to show that Gv is QH or slender for v ∈ S (RN1). Along
the way we will show that R is an A-tree and complete the proof of (RN2). We will then
prove (RN3) and minimality of the action of G on R.
If v ∈ S, the group Gv acts on Z̄, the closure of the connected component Z of C \ V
associated to v. Thus Z̄ may be viewed as one of the pieces one obtains when cutting C
open at its cut points. Stabilizers of edges of R incident to v fix a vertex in Z̄. The group
Gv contains an edge stabilizer of T1 (resp. T2 ), so acts hyperbolically in T2 (resp. T1 ).
Recall that Z̄ is made of squares. Since G acts on T1 and T2 without inversions, any
g ∈ Gv leaving a square S invariant is the identity on S, hence on adjacent squares (because
Z̄ is a pseudo-surface), and therefore on the whole of Z̄. We let F be the pointwise stabilizer
of Z̄, so that O = Gv /F acts on Z̄.
We have pointed out in Subsection 6.3.2 that G acts on C with finitely many orbits
of squares, so the same is true for the action of Gv (and O) on Z̄. The action of O on
Z̄ is proper in the complement of vertices, and free in the complement of the 1-skeleton
(an element may swap two adjacent squares). We consider this action near a vertex x.
Since we now view x as a vertex of Z̄ rather than one of C, its link Lx is connected. The
stabilizer Ox of x for the action of O acts on Lx with trivial edge stabilizers.
63
If Lx is a circle (so Z̄ is a surface near x), Ox is a finite group (cyclic or dihedral) and
the action is proper near x. If Lx is a line, the stabilizer Ox acts on it by translations or
dihedrally, and the image of x in Z̄/O must be viewed as a puncture. Since we want a
compact orbifold with boundary, we remove an Ox -invariant open neighborhood of x from
Z̄.
After doing this Gv -equivariantly near all vertices of Z̄ whose link is a line, we get
an effective proper action of O on a simply connected surface, with quotient a compact
orbifold Σ. The fundamental group of Σ is isomorphic to O.
If H is a subgroup of Gv which is elliptic in T1 and T2 (in particular if H ∈ H), it fixes
a vertex x ∈ Z̄, so its image in π1 (Σ) is finite (if the link of x is a circle) or contained in a
boundary subgroup of π1 (Σ) (if the link is a line). Conversely, any subgroup of Gv whose
image in π1 (Σ) is finite or contained in a boundary subgroup of π1 (Σ) is elliptic in T1 and
T2 . This completes the proof of (RN2).
Before concluding that Gv is slender or QH, we use (SC) or (SCZ ) to prove that edge
stabilizers of R are in A.
We first show F ∈ F. Given any square e1 × e2 ⊂ Z̄, the group F is the stabilizer of
e2 for the action of Ge1 on the line µT2 (Ge1 ); in particular, F fixes an edge in T2 (and in
T1 ). Moreover, F is the kernel of an epimorphism from Ge1 to Z or D∞ . The stability
condition implies F ∈ F. If (SCZ ) holds, Ge1 acts on µT2 (Ge1 ) by translations, and Ge2
acts on µT1 (Ge2 ) by translations. This is true for all squares e1 × e2 ⊂ Z̄, so the orbifold
Z̄/O contains no mirror.
Any incident edge stabilizer of v in R is the stabilizer Gx of a vertex x ∈ Z̄ for the
action of Gv on Z̄ (as pointed out earlier, it is elliptic in T1 and T2 ). It contains F , and
Ox = Gx /F acts on the link of x with trivial edge stabilizers, so is cyclic or dihedral (finite
or infinite). The stability condition (SC) implies Gx ∈ A. If (SCZ ) holds, Ox is cyclic
because there is no mirror and we also get Gx ∈ A. The tree R being bipartite, it is an
A-tree.
Given v ∈ S, we would have proved that Gv is a QH subgroup (in the sense of Definition
5.13) if we knew that the orbifold Σ is hyperbolic. Assume otherwise. Since Σ is the
quotient of a simply connected surface by the infinite group O = π1 (Σ), it is Euclidean.
Its fundamental group is not virtually cyclic because it contains the image of Ge1 and Ge2
for any square e1 × e2 in Z̄. This implies that Σ is a quotient of the torus. In particular,
Σ has empty boundary, and incident edge stabilizers of v in R are finite extensions of F .
We also deduce that π1 (Σ) contains Z2 with finite index, so Gv is slender because it is an
extension of F by π1 (Σ).
To sum up: for v ∈ S, the group Gv is slender (if Σ is Euclidean) or QH (if Σ is
hyperbolic).
We now prove (RN3) for i = 1 (the proof for i = 2 is the same). In the process we
will show that all orbifolds Σ contain an essential geodesic, thus completing the proof of
(RN1), and that the action of G on R is minimal.
Let M1 ⊂ C be the preimage of all midpoints of edges of T1 under the first projection
p1 : C → T1 . It is a G-invariant collection of disjoint properly embedded lines containing
no vertex. One may view T1 as the tree dual to M1 , with vertices the components of
C \ M1 and edges the components of M1 : the projection p1 induces a map from the dual
tree to T1 , which is an isomorphism because point preimages of p1 are connected.
It immediately follows that any edge stabilizer Ge1 of T1 fixes a vertex v ∈ S (associated
to the component of C \V containing the preimage by p1 of the midpoint of e1 ) and contains
the associated fiber; in particular, T1 is elliptic with respect to R. Since Ge1 is hyperbolic
in T2 and edge stabilizers of R are elliptic, v is the only vertex of R fixed by Ge1 . This
shows that, for any v ∈ S, there exists a subgroup of G (an edge stabilizer of T1 ) having
v as its unique fixed point. Minimality of R easily follows from this observation, since no
vertex in V is terminal.
64
We define T̂1 refining both T1 and R as the tree dual to the decomposition of C given
by its cut points and M1 . Its vertices are the elements of V together with the components
of C \ (V ∪ M1 ), its edges are those of R and components of M1 . One obtains T1 from T̂1
by collapsing edges coming from edges of R, and T̂1 from T1 by refining at vertices v ∈ S.
There remains to show that the refinement at v is dual to a family of geodesics on the
associated orbifold Σ.
Recall that v is associated to a component Z of C \ V. Consider a component `1 of
M1 contained in Z. Its stabilizer (an edge stabilizer Ge1 of T1 ) acts cocompactly on `1 , so
the image of `1 in the orbifold Σ associated to v is a simple 1-suborbifold (simple closed
curve if there is no mirror). This suborbifold is not homotopically trivial, so is isotopic
to a geodesic; it is not boundary parallel because Ge1 is hyperbolic in T2 but extended
boundary subgroups of Gv are elliptic. Components of M1 contained in Z thus yield the
required non-empty family of disjoint essential simple closed geodesics in Σ.
Remark 6.26. Note that a given orbifold Σ is filled by the images of M1 (defined above)
and M2 (defined similarly using T2 ). The proof also shows that the number of orbits of
vertices in S is bounded by the number of orbits of edges of T1 . If T1 and T2 are one-edge
decompositions, then R only has one orbit of vertices in S, and T1 , T2 are dual to single
geodesics.
Proposition 6.27. Under the assumptions of Proposition 6.25, suppose furthermore that
T1 is minuscule and G is not slender. If v ∈ S, then Gv is not slender; it is QH, and every
boundary component of the underlying orbifold is used (see Definition 5.15).
Proof. Recall that F fixes an edge ei in Ti . Since T1 is fully hyperbolic with respect to T2 ,
we have F Ge1 . If Gv is slender but G is not, then R 6= {v}, so there exists an edge in
R incident to v. Its stabilizer is a finite extension of F , so Ge1 cannot be minuscule. This
contradiction implies that Gv is QH.
By Lemma 5.16, if some boundary component is unused, G splits over a group containing F with index ≤ 2 (hence in A by the stability condition), again a contradiction.
6.5
Constructing a filling pair of splittings
In this subsection, as well as the next one, we assume that all trees are minuscule. This
guarantees symmetry of the core (Proposition 6.19), so any two trees fully hyperbolic with
respect to each other have a regular neighborhood. It also implies that ellipticity is a
symmetric relation among trees (Lemma 6.11).
The goal of this subsection is the following result showing the existence of a pair of
splittings U , V that fill G.
Proposition 6.28. Assume that G is totally flexible and all trees are minuscule. Given
a tree U , there exists a tree V such that U and V are fully hyperbolic with respect to each
other.
In the next subsection we will apply this proposition to a maximal U (given by Lemma
6.12).
Example 6.29. In the surface case (Examples 6.13 and 6.15), if U is dual to a family L
decomposing Σ into pairs of pants, then V is dual to a family meeting (transversely) every
curve in L.
More generally, suppose that G is the fundamental group of a compact hyperbolic 2orbifold Σ, and H is the set of boundary subgroups, with A consisting of all virtually
cyclic subgroups. Then U is dual to a family of geodesics L by Proposition 5.4, and the
proposition claims that there exists a family L0 such that every geodesic in L meets L0
and every geodesic in L0 meets L (but no geodesic belongs to both L and L0 ). To prove
65
this, consider a maximal family L0 such that each geodesic in L0 meets L (transversely).
Applying Lemma 5.11 to the orbifold obtained by cutting Σ along L0 shows that every
geodesic in L meets L0 .
Proof. The difficulty is to find V with U fully hyperbolic with respect to V . Once this
is done, we redefine V by collapsing all edges which do not belong to the axis of an edge
stabilizer of U . This makes U hyperbolic with respect to each one-edge splitting underlying
V . By Lemma 6.11, each one-edge splitting underlying V is hyperbolic with respect to U
and therefore V is fully hyperbolic with respect to U .
We argue by induction on the number n of orbits of edges of U . For n = 1, the existence
of V is just the fact that, G being totally flexible, U is not universally elliptic.
U
|
G1
{z
Gn−1 Gn
}| {z }
hyp. in W
ell. in W
hyp. in T
T
W
q
WE + WH
| {z } | {z }
R = RN (WH , T )
| {z }
hyp. in WH
ell. in T hyp. in T
ell. in WE
Q
Figure 8: The first players in the proof of Proposition 6.28.
Denote by G1 , . . . , Gn representatives of the edge stabilizers of U (see Figure 8, where
we represent the quotient graphs of groups). By induction, there is a tree W in which
G1 , . . . , Gn−1 are hyperbolic. We can assume that Gn is elliptic in W . By the case n = 1
there exists T in which Gn is hyperbolic, and we can assume that T has a single orbit
of edges. If W is elliptic with respect to T , we take for V a standard refinement of W
dominating T .
Otherwise, let WE , WH be obtained from W by collapsing edges, keeping only those
edges whose stabilizer is elliptic or hyperbolic in T respectively (WE may be trivial, but
WH is not). Note that WH is fully hyperbolic with respect to T . By symmetry of the
ellipticity relation among minuscule trees, T is (fully) hyperbolic with respect to WH . On
the other hand, WE and T are elliptic with respect to each other, and so are WE and WH
(they are both collapses of W ).
Let R = RN (WH , T ) be the regular neighborhood. Recall that the set of vertices of
R is bipartite, with V the set of cut points of C = C(WH , T ) ⊂ WH × T , and S the set
of connected components of C \ V. Since T has a single orbit of edges, there is a single
orbit of vertices in S. We fix q ∈ S, and denote by Q its stabilizer. It is a QH vertex by
Proposition 6.27.
Lemma 6.30. The QH vertex group Q is elliptic in WE .
ε⊂Axis(Ge )
ŴE
ê′ ⊂Axis(Ge )
R̂T
e′ ⊂Axis(Ge )
WE
| {z }
ce ,ce′ ∈
ell. in T, WH , R, R̂T
T
Ge′
| {z }
R = RN (WH , T )
hyp. in WH
Figure 9: Proof that Q is elliptic in WE ( represents a collapse map).
66
Proof. In spirit, the proof is somewhat analogous to that of Theorem 5.27.
Let e be an edge of WH , and e0 an edge of T . Since WH is elliptic with respect to WE ,
the stabilizer Ge fixes a point ce ∈ WE . This point is unique because otherwise Ge would
fix an edge of WE . But WE is elliptic with respect to T , so Ge would be elliptic in T ,
contradicting the fact that WH is fully hyperbolic with respect to T . Similarly, Ge0 fixes a
unique point ce0 ∈ WE .
As above, consider the core C = C(WH , T ) ⊂ WH × T . We claim that ce = ce0 if the
square e × e0 is contained in C. Assuming this, we associate to any square e × e0 ⊂ C the
point ce = ce0 ∈ WE . Since adjacent squares are mapped to the same point, all squares
in a given connected component of C \ V are mapped to the same point. Since Q is the
stabilizer of such a component, it fixes a point in WE , as required.
To conclude the proof, we have to prove our claim that ce = ce0 if e × e0 ⊂ C. Let R̂T
be a common refinement of R and T as in (RN3) (see Figure 9). By definition of the core,
e0 lies in the axis (=minimal subtree) of Ge in T . Since R̂T collapses to T , the edge ê0 of
R̂T projecting to e0 lies in the axis of Ge in R̂T . Note that Gê0 = Ge0 .
Since WE is elliptic with respect to WH and T , it is elliptic with respect to R by
(RN2), hence also with respect to R̂T . Let therefore ŴE be a standard refinement of WE
dominating R̂T as in Proposition 2.2.
Let M ⊂ ŴE be the axis of Ge . Since R̂T does not have to be a collapse of ŴE , we
cannot claim that M maps to the axis of Ge in R̂T , but we can find an edge ε ⊂ M whose
image in R̂T contains ê0 , so that Gε ⊂ Gê0 = Ge0 . Since Ge fixes ce and only this point in
WE , the image of M under the collapse map ŴE → WE is {ce }. In particular, Gε fixes ce .
Since Gε ⊂ Ge0 fixes ce0 , it is enough to prove that Gε fixes no edge in WE . If it does, then
Gε is elliptic in WH (because WE is elliptic with respect to WH ), but Ge0 is not (because
T is hyperbolic with respect to WH ), so Gε Ge0 . This contradicts the fact that T is
minuscule and proves the claim.
V
U
|
G1
Gn−1
} Gn
| {z }
in W
{z
hyp.
U
| {zE }
ell. in R̂
dual to L′
R̂
hyp. in T
WE
Q
L ⋔ L′
R = RN (WH , T )
W = WE + WH
Q
Figure 10: End of the proof of Proposition 6.28.
Using the lemma, we can construct a standard refinement R̂ of R dominating WE (see
Figure 10) without refining at vertices in the orbit of q. In particular, q is still a QH vertex
of R̂. The tree V will be obtained by refining R̂ at q. Recall that we want every edge
stabilizer Gi of U to be hyperbolic in V . Since this will be automatic if Gi is hyperbolic
in R̂, we consider the tree UE obtained by collapsing edges of U , keeping only those edges
whose stabilizer is elliptic in R̂.
If UE is trivial, we simply take V = R̂, so we assume the contrary. We claim that
Q cannot be elliptic in UE , nor in any collapse ŪE which is not a point. Otherwise, the
edge stabilizers of T and WH , which are conjugate to subgroups of Q by (RN3), would be
elliptic in ŪE , so ŪE would be elliptic with respect to T and WH . This is a contradiction
because every Gi is hyperbolic in T or W , hence in T or WH because it is elliptic in WE
(which is dominated by R̂).
67
We now consider the action of Q on its minimal subtree µUE (Q). Note that µUE (Q)
meets every G-orbit of edges (otherwise Q would be elliptic in some ŪE ), so every Gi which
is elliptic in R̂ contains (up to conjugacy) an edge stabilizer of the action of Q on µUE (Q).
It follows from previous results that the action of Q on µUE (Q) is (up to subdivision)
dual to a family L of geodesics on the underlying orbifold Σ. To see this, view Q as a QH
vertex stabilizer of R or R̂. Every boundary component of Σ is used (Proposition 6.27),
the fiber is universally elliptic (Lemma 5.23), and incident edge groups are elliptic in UE
because UE and R̂ are elliptic with respect to each other. The existence of L then follows
from Lemma 5.18.
Now let L0 be a family of geodesics transverse to L as in Example 6.29. Define V by
refining R̂ at q using the splitting of Q dual to L0 , and observe that every edge stabilizer
Gi of U is hyperbolic in V , as required. This is clear if Gi is hyperbolic in R̂. Otherwise,
it contains (up to conjugacy) an edge stabilizer J ⊂ Q of µUE (Q), and J is hyperbolic in
V because every curve in L meets L0 .
6.6
Flexible groups are QH when trees are minuscule
We can now prove Theorem 6.8 under the assumption that all trees are minuscule. We
will prove in the next subsection that this assumption is always fulfilled.
Proof of Theorem 6.8, assuming that all trees are minuscule. Using finite presentability (which
is assumed in Theorem 6.8), we fix a maximal splitting U as in Lemma 6.12. Proposition
6.28 yields V such that U and V are fully hyperbolic with respect to each other. We may
therefore consider the regular neighborhood R of U and V . We claim that R is trivial (a
point). This implies that G is QH, as required.
Assume that R is non-trivial. Let R̂ be a common refinement of R and U (it exists by
Proposition 6.25(RN3)). Since R is elliptic with respect to V , while U is fully hyperbolic
with respect to V , each edge of R̂ must be collapsed in R or in U (possibly in both). Being
non-trivial, R contains an edge ε, and we let ε̂ be the edge of R̂ that is mapped to ε. Define
U 0 by collapsing all edges of R̂ which are not collapsed in U , except those in the orbit of ε.
Since U 0 collapses to U , maximality of U (Lemma 6.12) implies that U and U 0 belong
to the same deformation space. Thus ε̂ (viewed as an edge of U 0 ) has an endpoint v ∈ U 0
with Gv = Gε̂ , and its other endpoint is in a different orbit. Since the action of G on U 0
is minimal, there is an edge e of U 0 with origin v which does not belong to the orbit of ε̂.
This edge has the same stabilizer as an edge of U , so Ge is hyperbolic with respect to V .
This is a contradiction since Ge ⊂ Gv = Gε̂ = Gε , and Gε is elliptic in V because R is
elliptic with respect to V by (RN2).
6.7
All splittings of a totally flexible group are minuscule
In this subsection, we complete the proof of Theorems 6.2 and 6.5 by showing that all
splittings of G are minuscule if G is totally flexible (Proposition 6.35). As mentioned in
Remark 6.10, this is sometimes not needed.
In a few words, the proof goes as follows. Given an edge stabilizer Ge of a tree T , we
first find a minuscule tree T1 with an edge stabilizer Ge1 commensurable with a subgroup
of Ge . The goal is to show that Ge and Ge1 are in fact commensurable. This is proved
by showing that Ge1 and Ge are slender subgroups of a QH vertex group, both containing
the fiber. So ultimately, the argument relies on the fact that two nested infinite slender
subgroups of a hyperbolic orbifold group are commensurable. To embed Ge1 and Ge into
a QH group, we use a tree T2 in which Ge1 is hyperbolic and we construct the core. Since
we do not know that T2 is minuscule, we have to choose it carefully, to ensure that the
core is symmetric (hence a surface).
68
6.7.1
Complexity of edge groups
Recall that A consists of slender groups; in particular, they are finitely generated.
Lemma 6.31. Let A0 ∈ A. There is a bound, depending only on A0 , for the length n of
a chain A0 A1 A2 · · · An . In particular, there is no infinite descending chain.
Proof. Since Ai−1 Ai , we can find a tree Ti in which Ai is elliptic, and Ai−1 is not.
Let B0 be the intersection of all subgroups of index 2 of A0 . For each i, the action of A0
on Ti has an invariant line, and B0 acts on this line as a translation, given by a non-zero
homomorphism ϕi : B0 → Z. Letting Bi = Ai ∩ B0 , we have ϕi (Bj ) = 0 if and only if
j ≥ i. This implies that the ϕi ’s are linearly independent, and the lemma follows since B0
is finitely generated.
Using this lemma, we can associate a complexity c(A0 ) to any A0 ∈ A: it is the maximal
length n of a chain A0 A1 · · · An where A1 , . . . , An are commensurable with edge
stabilizers of trees T1 , . . . , Tn . Thus A0 is minuscule if and only if c(A0 ) = 0. Note that
c(B) ≤ c(A) if B ⊂ A, and c(B) = c(A) if A, B are commensurable.
Lemma 6.32. Given an edge stabilizer Ge of a tree T , there exists a tree T 0 with an edge
stabilizer Ge0 such that Ge0 is minuscule and Ge0 ∩ Ge has finite index in Ge0 .
Proof. The result is trivial if c(Ge ) = 0, with T 0 = T . If c(Ge ) > 0, we argue by induction.
By definition of the complexity, there exists A Ge with A commensurable with an edge
stabilizer Ge1 . We have c(Ge1 ) = c(A) < c(Ge ), so by the induction hypothesis there exists
a minuscule edge stabilizer Ge0 such that Ge0 ∩ Ge1 has finite index in Ge0 . Since A and
Ge1 are commensurable, and A ⊂ Ge , the index of Ge0 ∩ Ge in Ge0 is finite.
6.7.2
Symmetry of the core
Recall (Proposition 6.19) that the core of minuscule trees is symmetric.
In order to prove that all trees are minuscule, we need to establish some weaker symmetry statements. We use the same notations as in Subsection 6.3.
Lemma 6.33. Let T1 , T2 be fully hyperbolic with respect to each other. If Cˇ ⊂ C and
C (2) ⊂ Cˇ(2) , then Cˇ = C.
Proof. Note that Cˇ ⊂ C implies Cˇ(2) ⊂ C (2) , so we have Cˇ(2) = C (2) . Assuming Cˇ =
6 C, we
get C (2) = Cˇ(2) ⊆ Cˇ C. As pointed out in Subsection 6.3.3, C \ C (2) is a union of open
vertical edges and each such edge disconnects C. Our assumption Cˇ 6= C says that C \ Cˇ
contains such an edge ε̊ = {v} × e̊2 .
The set of edges e of µT2 (Gv ) such that {v} × e bounds a square in C is a non-empty
Gv -invariant set which does not contain e2 . By minimality of the action of Gv on µT2 (Gv ),
this set intersects both components of µT2 (Gv ) \ e̊2 . In particular, there exist a, b ∈ C (2)
that are not in the same connected component of C \ ε̊. But a and b may be joined by a
ˇ a contradiction since Cˇ ⊂ C \ ε̊.
path in C,
Lemma 6.34. Let T1 be a minuscule one-edge splitting. Assume that T1 is not universally
elliptic. Among all one-edge splittings T such that T1 is not elliptic with respect to T ,
consider T2 whose edge stabilizers have minimal complexity.
ˇ 1 , T2 ).
Then C(T1 , T2 ) = C(T
Note that T1 and T2 are fully hyperbolic with respect to each other by Lemma 6.11, so
ˇ 1 , T2 ) are defined.
C(T1 , T2 ) and C(T
69
Proof. Let m be the midpoint of an edge e2 of T2 . Since edge stabilizers of T2 have minimal
(2)
complexity, the second assertion of Lemma 6.20 shows that Ym = C (2) ∩ (T1 × {m}) is
(2)
connected. In particular, Ym contains µT1 (Ge2 ) × {m}, and C (2) therefore contains all
squares e1 × e2 with e1 ⊂ µT1 (Ge2 ). This shows Cˇ(2) ⊂ C (2) .
ˇ We conclude by
On the other hand, T1 being minuscule, Lemma 6.22 implies C ⊂ C.
Lemma 6.33.
6.7.3
All splittings are minuscule
Proposition 6.35. If G is totally flexible and not slender, then every tree T is minuscule.
Proof. We may assume that T is a one-edge splitting. Denoting by Ge an edge stabilizer,
Lemma 6.32 yields a minuscule one-edge tree T1 with an edge stabilizer Ge1 such that
Ge1 ∩ Ge has finite index in Ge1 . Since G is totally flexible, T1 is not universally elliptic,
so we can choose T2 as in Lemma 6.34. The core of T1 and T2 being symmetric, we can
consider the regular neigbourhood decomposition R = RN (T1 , T2 ).
By (RN3), we know that Ge1 fixes a unique vertex v of R, and v ∈ S. Its finite index
subgroup Ge1 ∩ Ge also has v as its unique fixed point (it is hyperbolic in T2 , while edge
stabilizers of R are elliptic by (RN2)).
First assume that Gv is not slender, so that it is QH with fiber F . Consider any slender
group A containing Ge1 ∩ Ge , for instance Ge . We claim that Ge1 ∩ Ge has finite index in
A. First, A is elliptic in R: otherwise Ge1 ∩ Ge acts on the axis of A, and (being elliptic)
has a subgroup of index ≤ 2 fixing the axis, a contradiction since Ge1 ∩ Ge fixes only v.
We deduce A ⊂ Gv . Since Gv is QH, its slender subgroups are contained in extensions
of F by virtually cyclic groups. As Ge1 contains F with infinite index, and Ge1 ∩ Ge has
finite index in Ge1 , the index of Ge1 ∩ Ge in A is finite, so A is commensurable with Ge1 .
Applied to A = Ge , this argument shows that Ge is minuscule.
If Gv is slender, there has to be at least one edge incident to v since we assume that
G is not slender. By (RN1), the stabilizer of this edge is commensurable with F . On the
other hand, F is contained in Ge1 ; it is elliptic in T2 , but Ge1 is not, so F Ge1 . This
shows that Ge1 is not minuscule, a contradiction.
6.8
Slenderness in trees
We have proved that non-slender flexible vertex groups of JSJ decompositions are QH
when A satisfies a stability condition and consists of slender groups. We now consider
edge groups which are only slender in trees.
Recall that A is slender in (A, H)-trees if, whenever G acts on a tree, A fixes a point
or leaves a line invariant.
We now have the following generalization of Theorems 6.2 and 6.5:
Theorem 6.36. Let G be finitely presented relative to a finite family H of finitely generated
subgroups. Suppose that all groups in A are slender in (A, H)-trees, and A satisfies (SC)
or (SCZ ), with fibers in a family F.
If Q is a flexible vertex group of a JSJ decomposition of G over A relative to H, and
Q is not slender in (A, H)-trees, then (as in Theorems 6.2 and 6.5) Q is QH with fiber in
F (and the orbifold has no mirror in the (SCZ ) case).
This applies whenever groups in A are assumed to be slender or contained in a group
of H (up to conjugacy), for instance to splittings of relatively hyperbolic groups over
elementary subgroups relative to parabolic subgroups.
Theorem 6.36 is proved as in the slender case, with just a few changes which we now
describe.
70
The arguments in Subsections 6.3 through 6.5 extend directly, replacing “slender” by
“slender in (A, H)-trees” and using Lemma 1.5. The proof of Proposition 6.28 uses Lemma
5.23, which we replace by the following statement:
Lemma 6.37. Let Q be a QH vertex group. If F and all groups in A are slender in
(A, H)-trees, but Q is not, then F is universally elliptic.
Proof. If F is not universally elliptic, then as in the proof of Lemma 5.23 Q is an extension
of a group in A by a virtually cyclic group, so is slender in (A, H)-trees by Lemma 1.5.
In Subsection 6.7, Lemma 6.31 requires A0 to be finitely generated, but the other groups
Ai may be arbitrary. Complexity may be infinite, but Lemmas 6.32 and 6.34 remain valid
because every tree is dominated by a tree with finitely generated stabilizers (see Corollary
2.25).
At the end of the proof of Proposition 6.35 we need to know that a subgroup A ⊂ Gv
which is slender in (A, H)-trees is contained in an extension of F by a virtually cyclic
group. More generally, suppose that Q is QH and the underlying orbifold Σ contains an
essential simple geodesic. We claim that, if A ⊂ Q is slender in (A, H)-trees, then its
image in π1 (Σ) is virtually cyclic.
To see this, assume that A is not an extended boundary subgroup. As in Proposition
5.21, we consider a splitting of Q dual to a geodesic γ, in which A is not elliptic. The
group A/(A ∩ F ) acts on a line with virtually cyclic edge stabilizers, so is virtually abelian,
hence virtually cyclic because it embeds into π1 (Σ). This proves the claim.
6.9
Slender flexible groups
In this subsection we consider a slender flexible vertex group Q of a JSJ tree. Whenever G
acts on a tree and Q does not fix a point, there is a unique Q-invariant line and the action
of Q on this line gives rise to a map ϕ : Q → D∞ ' Isom(Z) whose image is isomorphic to
Z (if orientation is preserved) or to D∞ .
A natural analogue of Theorem 6.2 would be the following statement:
(1) Q maps onto the fundamental group of a compact Euclidean 2-orbifold Σ, with fiber
in F;
(2) incident edge groups have finite image in π1 (Σ) (note that Euclidean 2-orbifolds
whose fundamental group is not virtually cyclic have empty boundary);
(3) if G acts on a tree and Q does not fix a point, the action of Q on its invariant line
factors through π1 (Σ).
Unfortunately, Assertion (3) of this statement is not correct (consider splittings of Zn ,
with n ≥ 3). We replace it by two assertions.
Proposition 6.38. Let G, H, A be as in Theorem 6.2 or Theorem 6.5. Let Q be a slender
flexible vertex group of a JSJ tree.
(1) Q is an extension 1 → F → Q → O → 1, with F ∈ F and O virtually Z2 . Incident
edge groups are contained in finite extensions of F (they are finite if groups in A are
virtually cyclic).
(2) there is a map ψ : Q → (D∞ )n , for some n ≥ 2, whose image has finite index;
incident edge groups have finite image; if G acts on a tree and Q does not fix a point,
the action of Q on its invariant line factors through ψ.
71
In the first assertion, we do not claim that actions of Q factor through the fundamental
group of the 2-orbifold O (the fiber does not have to be universally elliptic). In the second
one, Q maps to an n-dimensional Euclidean orbifold, but we do not claim that the kernel
is in F.
The first assertion only requires the first half of the stability condition, the second one
requires no stability condition.
The proposition remains true if Q is only assumed to be slender in (A, H)-trees.
Example 6.39. The group Zn has infinitely many slender splittings, given by its morphisms
to Z. The Klein bottle group ha, t | tat−1 = a−1 i = hti ∗t2 =v2 hvi has exactly two splittings, corresponding to these two presentations (see Subsection 3.4). They correspond to
morphisms to D∞ and Z respectively.
In [Bee14], Beeker classified all flexible groups that occur in the abelian JSJ decomposition of the fundamental group of a graph of free abelian groups. In particular, he
exhibits a twisted Klein bottle group K 0 = hb0 , b1 | [b0 , b21 ] = 1, [b20 , b1 ] = 1i which splits as
an amalgam hb0 , b21 i ∗hb20 ,b21 i hb20 , b1 i and also as an HNN extension (see Proposition 4.1 in
[Bee14]).
Proof. We sketch the proof of (1). Being flexible, Q admits two different splittings relative
to IncH
|Q . They are given by epimorphisms ϕi : Q → Ki , with Ki equal to Z or D∞ . The
image O of ϕ : Q → K1 × K2 is not virtually cyclic, so is virtually Z2 . The kernel F is in
F because it is also the kernel of ϕ| ker ϕ1 , with ker ϕ1 ∈ A. If Ge is an incident edge group,
its image by ϕi has order at most 2 because Ge is universally elliptic, hence elliptic in the
corresponding splitting of Q.
For (2), we consider all non-trivial actions of Q on the line which are restrictions of
actions of G on trees. We view them as non-trivial homomorphisms ϕα : Q → D∞ (there
may be infinitely many of them). Let J = ∩ ker ϕα be the subgroup of Q consisting of
elements always acting as the identity, and let D = Q/J. We shall show that D embeds
with finite index in some (D∞ )n .
The maps ϕα induce maps ϕ̄α : D → D∞ , and ∩ ker ϕ̄α is trivial. Let D0 be the
subgroup of D consisting of elements always acting as translations. It is abelian, torsionfree, has finite index (it contains the intersection of all subgroups of index 2), and contains
the commutator subgroup. Let n be its rank.
Each ϕ̄α induces pα : D0 → Z. The subgroup of Hom(D0 , Z) generated by the pα ’s has
finite index because ∩ ker pα is trivial, and we choose a finite family ϕ̄αi (1 ≤ i ≤ n) such
that the corresponding pαi ’s are a basis over Q. We show that the product map
Φ=
n
Y
i=1
ϕ̄αi : D → (D∞ )n
is injective and its image has finite index.
Let x ∈ D. If it has infinite order, there is a non-trivial xk in D0 . This xk is mapped
non-trivially by some pα , hence by some pαi , hence by ϕ̄αi , hence by Φ, so x ∈
/ ker Φ. If x
has finite order and x 6= 1, the order is 2 and some ϕ̄α maps it to a nontrivial reflection.
We can find y ∈ D such that z = [x, y] is mapped by ϕ̄α to a non-trivial translation. The
element z is in D0 , and as in the previous case z ∈
/ ker Φ. It follows that Φ is injective. Its
image has finite index because D and (D∞ )n are both virtually Zn .
Composing Φ with the quotient map Q → D yields a map ψ : Q → (D∞ )n whose
image has finite index. As in Assertion (1), incident edge groups are universally elliptic,
so their image by any ϕα has order at most 2. This implies that their image by ψ is finite.
The last claim is obvious from the way D was defined.
72
Remark 6.40. Similar arguments show that a finitely generated group is residually D∞ if
and only if it is a finite index subgroup of a direct product whose factors are isomorphic
to D∞ or Z/2Z.
Part IV
Acylindricity
In the previous chapters we have studied the JSJ deformation space. Its existence was
guaranteed by Dunwoody’s accessibility, which requires finite presentability. In this chapter
we propose a construction based on the idea of acylindrical accessibility.
Sela [Sel97a] defined a tree to be k-acylindrical if fixed point sets of non-trivial elements
have diameter bounded by k. Since we allow G to have torsion, the following definition is
better adapted [Del99].
Definition (Acylindrical). A tree T is (k, C)-acylindrical if the pointwise stabilizer of
every arc of length ≥ k + 1 is finite, of cardinality ≤ C.
Example. Let Σ be a 2-orbifold as in Subsection 5.1. The splitting of π1 (Σ) dual to a
family L of geodesics is 2-acylindrical (1-acylindrical if all geodesics are 2-sided). If Σ is
the underlying orbifold of a QH vertex group Q, the splitting of Q dual to L is (2, C)acylindrical if and only if the fiber F is finite with order ≤ C.
Acylindrical accessibility bounds the number of orbits of edges in any (k, C)-acylindrical
tree, under the assumption that G is finitely generated [Sel97a, Del99, Wei12].
Since finite presentability is no longer required, this allows us for instance to construct
JSJ decompositions of hyperbolic groups relative to an infinite collection of infinitely generated subgroups, and JSJ decompositions of finitely generated torsion-free CSA groups.
In order for our approach to work, we must be able to produce a (k, C)-acylindrical
tree, for some uniform constants k and C, out of an arbitrary tree. We do so using the
tree of cylinders introduced in [GL11].
As an additional benefit, this construction (when available) produces a canonical tree
T out of a deformation space D. If D is invariant under automorphisms of G, so is T (see
[GL10, GL15b] for applications of this construction, [Bow98, SS03, KM05, PS09] for other
constructions of canonical decompositions, and [Lev05a, DG08, BKM07, DG11, DT13] for
other uses of such a canonical decomposition). A general construction of another invariant
tree, based on compatibility of splittings, will be given in Part V (compatibility JSJ tree).
The tree of cylinders is introduced in Section 7, and Section 8 describes our construction
of JSJ decompositions based on acylindricity. Applications are given in Section 9.
Unless indicated otherwise, we only assume that G is finitely generated, and H may be
arbitrary.
7
Trees of cylinders
In the previous chapters we have defined and studied the JSJ deformation space, consisting
of all JSJ trees. It is much better to be able to find a canonical tree. A key example is provided by one-ended hyperbolic groups: Bowditch [Bow98] constructs a virtually cyclic JSJ
tree using only the topology of the boundary ∂G; it is Out(G)-invariant by construction.
Unfortunately, it is not always possible to find an invariant JSJ tree. If for instance G is
free, the JSJ deformation space consists of all trees with a free action of G (see Subsection
3.1), but (see Subsection 11.1) it is easy to check that the only Out(G)-invariant tree is
the trivial one (a point).
73
In this section we describe a construction, the (collapsed) tree of cylinders [GL11],
which, under certain conditions, associates a new, nicer tree to a given tree T . The first
feature of this new tree is that it depends only on the deformation space D of T . Its second
feature of interest to us here is that, under suitable assumptions, it is acylindrical with
uniform constants, and it lies in D or at least in a deformation space not too different from
D (the new tree is smally dominated by T in the sense of Definition 7.10). Its third feature
lies in its compatibility properties (in the sense of common refinements, see Subsection
1.4.1); this will be used in Chapter V to provide examples of compatibility JSJ trees.
The results of this section and the next (where JSJ decompositions are constructed) will
be summed up in Corollary 9.1, which gives conditions ensuring that there is a canonical
JSJ tree, and that its flexible vertices are QH with finite fiber.
7.1
Definition
We recall the definition and some basic properties of the tree of cylinders (see [GL11] for
details).
As usual, we fix A and H and we restrict to (A, H)-trees. We let A∞ be the family of
infinite groups in A. In applications we assume that G is one-ended relative to H, so all
trees have edge stabilizers in A∞ . The family A∞ is not stable under taking subgroups,
but it is sandwich closed : if A, B ∈ A∞ and A < H < B, then H ∈ A∞ .
Definition 7.1 (Admissible equivalence relation). An equivalence relation ∼ on A∞ is
admissible (relative to H) if the following axioms hold for any A, B ∈ A∞ :
(1) If A ∼ B and g ∈ G, then gAg −1 ∼ gBg −1 (invariance under conjugation).
(2) If A ⊂ B, then A ∼ B (nesting implies equivalence).
(3) Let T be a tree (relative to H) with infinite edge stabilizers. If A ∼ B, and A, B fix
a, b ∈ T respectively, then for each edge e ⊂ [a, b] one has Ge ∼ A ∼ B.
The equivalence class of A ∈ A∞ will be denoted by [A]. We let G act on A∞ /∼ by
conjugation, and the stabilizer of A will be denoted by G[A] .
Here are a few examples. They will be studied in detail later (see Section 9).
(1) If G is a torsion free CSA group (for instance a limit group, or more generally a toral
relatively hyperbolic group), we can take for A∞ the set of infinite abelian subgroups,
and for ∼ the commutation relation: A ∼ B if hA, Bi is abelian. The group G[A] is
the maximal abelian subgroup containing A.
(2) If G is a relatively hyperbolic group with small parabolic subgroups, we can take
for A∞ the set of infinite elementary subgroups (a subgroup is elementary if it is
virtually cyclic or parabolic; in this case, this is equivalent to being small). The
relation ∼ is co-elementarity: A ∼ B if and only if hA, Bi is elementary. The group
G[A] is the maximal elementary subgroup containing A. We may also allow nonsmall parabolic subgroups, provided that we include them in H (i.e. we only consider
splittings relative to the parabolic groups).
(3) A∞ is the set of infinite virtually cyclic subgroups, and ∼ is the commensurability
relation (A ∼ B if and only if A ∩ B has finite index in A and B). The group G[A]
is the commensurator of A.
Given an admissible equivalence relation ∼ on A∞ , we now associate a tree of cylinders
Tc to any tree T with infinite edge stabilizers.
We declare two edges e, f to be equivalent if Ge ∼ Gf (these groups are assumed to
be in A, and they are in A∞ because they are infinite). The union of all edges in an
74
equivalence class is a subtree by axiom (3). Such a subtree Y is called a cylinder of T ; two
distinct cylinders meet in at most one point. The equivalence class in A∞ /∼ containing
the stabilizers of edges of Y will be denoted by [Y ].
Definition 7.2 (Tree of cylinders). Given a tree T with edge stabilizers in A∞ , its tree of
cylinders Tc is the bipartite tree with vertex set V0 (Tc ) t V1 (Tc ), where V0 (Tc ) is the set of
vertices v of T which belong to at least two cylinders, V1 (Tc ) is the set of cylinders Y of
T , and there is an edge ε = (v, Y ) between v and Y in Tc if and only if v ∈ Y in T .
Equivalently, one obtains Tc from T by replacing each cylinder Y by the cone over the
set of vertices v ∈ Y belonging to another cylinder.
The collapsed tree of cylinders Tc∗ is the tree obtained from Tc by collapsing all edges
whose stabilizer does not belong to A (Warning: Tc is not always an A-tree).
It is clear from the equivalent definition that Tc is a tree, but its edge stabilizers do not
always belong to A; this is why we also consider Tc∗ . The next lemma will say that Tc∗ is
relative to H (i.e. it is an (A, H)-tree).
The trees Tc and Tc∗ are minimal. We claim that they are always irreducible or trivial
(i.e. they consist of a single point). Indeed, if Tc or Tc∗ is non-trivial and not irreducible,
then so is T because it is compatible with them (Lemma 7.14 below). This implies that
there is only one cylinder in T , so Tc and Tc∗ are trivial, a contradiction.
The stabilizer of a vertex v ∈ V0 (Tc ) is the stabilizer of v, viewed as a vertex of T ; it
does not belong to A. The stabilizer GY of a vertex Y ∈ V1 (Tc ) is the stabilizer of the
equivalence class [Y ]. The stabilizer of an edge ε = (v, Y ) of Tc is Gε = Gv ∩ GY ; it is
elliptic in T , and infinite because it contains Ge if e ⊂ T is any edge of Y with origin v. If
Gε lies in A∞ , it is a representative of [Y ].
Lemma 7.3.
(1) T dominates Tc and Tc∗ , so Tc∗ is an (A, H)-tree.
(2) If H < G is a vertex stabilizer of Tc which is not elliptic in T , it is the stabilizer of
the equivalence class [Y ] associated to some cylinder Y ⊂ T . If e is an edge of Y ,
the equivalence class of Ge is H-invariant (hGe h−1 ∼ Ge for h ∈ H).
(3) Tc and Tc∗ only depend on the deformation space D containing T (we sometimes say
that Tc is the tree of cylinders of D).
(4) Suppose that the stabilizer of every equivalence class [A] belongs to A. Then edge
stabilizers of Tc belong to A, and therefore Tc = Tc∗ .
(5) The tree Tc∗ is equal to its collapsed tree of cylinders: (Tc∗ )∗c = Tc∗ .
Assertion (4) applies in particular to Examples (1) and (2) above (CSA groups, relatively hyperbolic groups).
Proof. Consider a vertex v of T . If v belongs to two cylinders, it defines a vertex in V0 (Tc ),
and this vertex is fixed by Gv . If v belongs to a single cylinder Y , then Gv fixes the vertex
of V1 (Tc ) corresponding to Y . This shows that T dominates Tc , hence also its collapse Tc∗ .
The second assertion follows from remarks made above: the stabilizer of a vertex in
V0 (Tc ) is a vertex stabilizer of T , the stabilizer of a vertex in V1 (Tc ) is the stabilizer of an
equivalence class [Y ]. Also note that (4) is clear since the stabilizer of an edge ε = (v, Y )
of Tc is contained in the stabilizer of [Y ]. Assertion (5) is Corollary 5.8 of [GL11].
[GL11] contains three proofs of the third assertion. We sketch one. A domination map
f : T → T 0 induces a map fc : Tc → Tc0 mapping each edge onto a vertex or an edge. The
image of x ∈ V0 (Tc ) by fc is the unique point of T 0 fixed by Gx , viewed as a vertex of
V0 (Tc0 ); the image of Y ∈ V1 (Tc ) is either the unique cylinder whose edge stabilizers are
75
equivalent to those of Y , viewed as a vertex of V1 (Tc0 ), or the unique point of T 0 fixed by
stabilizers of edges of Y , viewed as a vertex of V0 (Tc0 ). If T and T 0 belong to the same
deformation space, the map gc : Tc0 → Tc induced by a map g : T 0 → T is the inverse of fc ,
so Tc0 = Tc .
Assertion (3) implies that trees of cylinders are canonical elements of their deformation
space. In particular:
Corollary 7.4. If T is a JSJ tree over A relative to H, then Tc and Tc∗ are invariant
under any automorphism of G which preserves A and H.
Z
b
Z
b
Z
b
Z
Z
Z
b
Z
Z2
Z
Figure 11: A tree and its tree of cylinders.
In the following examples, ∼ may be viewed at will as commutation, or co-elementarity,
or commensurability. Indeed, two edge stabilizers will be equivalent if and only if they are
equal.
Example 7.5. The Bass-Serre tree of the graph of groups Γ of Subsection 3.9 (three punctured tori glued along their boundaries, see Figure 3 in the introduction) is equal to its
tree of cylinders (cylinders are tripods projecting bijectively onto Γ).
Example 7.6. Now let T be the Bass-Serre tree of the graph of groups pictured on the left
hand side of Figure 11 (reproducing Figure 2). There are four QH vertices vi , which are
fundamental groups of punctured tori Σi . There is an edge between vi and vi+1 (mod 4),
each carrying the same group Ge , equal to the boundary subgroup of Σi . Any cylinder Y
is a line, with vertices ui (i ∈ Z) which are lifts of vi (mod 4). The setwise stabilizer of Y ,
which we shall call P , is isomorphic to Z2 , it acts on Y by translations with edge stabilizers
equal to Ge (up to conjugacy). The group G is hyperbolic relative to this subgroup P (it
is a toral relatively hyperbolic group).
In Tc∗ (which is equal to Tc ), each line Y is collapsed to a point u (a vertex of type
V1 ) and is replaced by edges joining that point to each of the ui ’s. The stabilizer of u is
isomorphic to P , which is the centralizer (and the commensurator) of Ge . Unlike T , the
tree Tc∗ is invariant under all automorphisms of G.
7.2
Acylindricity
Recall that T is (k, C)-acylindrical if the pointwise stabilizer of every arc of length ≥ k + 1
has cardinality ≤ C (see the beginning of part IV).
Lemma 7.7. Assume that there exists C > 0 such that, if two groups of A∞ are inequivalent, then their intersection has order ≤ C. If T is any (A, H)-tree, then Tc∗ is a
(2, C)-acylindrical (A, H)-tree.
This applies in particular in Examples (1) and (2) above (CSA groups, relatively hyperbolic groups); note that in a relatively hyperbolic group there is a bound C for the order
of finite non-parabolic subgroups (see Lemma 9.15). In Example 7.6, the tree T is not
acylindrical (cylinders are lines fixed by an infinite cyclic group) but Tc∗ is 2-acylindrical.
76
Proof. We have seen that Tc∗ is an (A, H)-tree. Let I be a segment of length 3 in Tc∗ . Its
edges are images of edges εi = (xi , Yi ) of Tc . Let ei be an edge of Yi with origin xi . The
stabilizer Gεi of εi belongs to A and contains Gei , so Gεi belongs to A∞ and is equivalent
to Gei .
Since Tc∗ is a collapse of Tc , we can find i, j with Yi 6= Yj . This implies Gei 6∼ Gej , so
Gεi 6∼ Gεj . The stabilizer of I fixes εi and εj , so has cardinality at most C.
Virtually cyclic groups play a particular role in this context. An infinite group H is
virtually cyclic if some finite index subgroup is infinite cyclic. Such a group maps onto Z
or D∞ (the infinite dihedral group Z/2 ∗ Z/2) with finite kernel.
Definition 7.8 (C-virtually cyclic). Given C ≥ 1, we say that H is C-virtually cyclic if
it maps onto Z or D∞ with kernel of order at most C. Equivalently, H acts non-trivially
on a simplicial line with edge stabilizers of order ≤ C.
An infinite virtually cyclic group is C-virtually cyclic if the order of its maximal finite
normal subgroup is ≤ C. On the other hand, finite subgroups of a C-virtually cyclic group
have cardinality bounded by 2C.
Recall (Subsection 1.5.2) that J < G is small in T (resp. in (A, H)-trees) if it fixes a
point, or an end, or leaves a line invariant in T (resp. in all (A, H)-trees on which G acts).
A group not containing F2 , or contained in a group of H, is small in (A, H)-trees.
The following lemma is simple, but conceptually important. It says that subgroups
which are small but not virtually cyclic are elliptic in acylindrical trees.
Lemma 7.9. If a subgroup J ⊂ G is small in a (k, C)-acylindrical tree T , but J is not
elliptic in T , then J is C-virtually cyclic.
Proof. By smallness, J preserves a line or fixes an end. The result is clear if it acts on
a line, since edge stabilizers for this action have order ≤ C. If it fixes an end, the set
of elliptic elements of J is the kernel J0 of a homomorphism from J to Z. Every finitely
generated subgroup of J0 is elliptic. It fixes a ray, so has order ≤ C by acylindricity. Thus
J0 has order ≤ C.
7.3
Small domination
We have seen that T dominates Tc and Tc∗ (Lemma 7.3), and that Tc∗ is (2, C)-acylindrical
under the assumptions of Lemma 7.7. This domination may be strict: in particular, as
shown by Lemma 7.9, small groups which are not virtually cyclic tend to be elliptic in
Tc and Tc∗ . For instance, in Example 7.6, the subgroup P = Z2 becomes elliptic in Tc∗ .
This is unavoidable according to Lemma 7.9, but P (together with its subgroups and their
conjugates) is the only group that is elliptic in Tc∗ and not in T .
We want the deformation space of Tc∗ to be as close to that of T as possible, as in this
example, and this motivates the following definition; it applies to an arbitrary pair of trees
(T, T ∗ ).
Definition 7.10 (smally dominates). Let T, T ∗ be (A, H)-trees. We say that T smally
dominates T ∗ if:
(i) T dominates T ∗ ;
(ii) edge stabilizers of T ∗ are elliptic in T .
(iii) any group which is elliptic in T ∗ but not in T is small in (A, H)-trees.
More generally, let S be a family of subgroups closed under conjugation and taking
subgroups, with every J ∈ S small in (A, H)-trees. If T smally dominates T ∗ , and every
group which is elliptic in T ∗ but not in T belongs to S, we say that T S-dominates T ∗ .
77
Remark 7.11. S-domination will be useful to describe flexible vertex stabilizers of JSJ trees
(as in the proof of Theorem 9.5).
Note that the first two conditions of the definition are always satisfied if T is a tree
and T ∗ is its collapsed tree of cylinders Tc∗ . The following proposition basically says that
the third condition holds when the groups G[A] are small in (A, H)-trees. In this case we
can make every tree acylindrical without changing its deformation space more than forced
by Lemma 7.9.
Proposition 7.12. Let ∼ be an admissible equivalence relation on A∞ , and let C be an
integer. Assume that:
(1) if two groups of A∞ are inequivalent, their intersection has order ≤ C;
(2) every stabilizer G[A] is small in (A, H)-trees;
(3) one of the following holds:
(a) every stabilizer G[A] belongs to A;
(b) if A ⊂ A0 has index 2, and A ∈ A, then A0 ∈ A;
(c) no group G[A] maps onto D∞ .
If T is any (A, H)-tree with infinite edge stabilizers, then Tc∗ is a (2, C)-acylindrical
(A, H)-tree smally dominated by T .
Assume furthermore that all subgroups which are small in (A, H)-trees but not virtually
cyclic are elliptic in T . Then Tc∗ belongs to the same deformation space as T .
Proof. Acylindricity comes from Lemma 7.7, and conditions (i) and (ii) of small domination
are always satisfied by pairs (T, Tc ) and (T, Tc∗ ).
Vertex stabilizers of Tc are vertex stabilizers of T or equal to some G[A] , so by Assumption (2) subgroups elliptic in Tc satisfy condition (iii). In other words, T would smally
dominate Tc if Tc were an A-tree. To conclude that Tc∗ is smally dominated by T , we show
that Tc and Tc∗ belong to the same deformation space under Assumptions (2) and (3) (see
[GL11, Remark 5.11]).
Note that Tc∗ = Tc when (3a) holds, so we may assume that (3b) or (3c) holds. Let
ε = (x, Y ) be an edge of Tc such that Gε ∈
/ A. It suffices to prove that Gε = GY (so
that collapsing the orbit of ε does not change the deformation space) and that Gε0 ∈ A for
every edge ε0 = (x0 , Y ) with x0 6= x (so no further collapse occurs in the star of the vertex
Y of Tc ).
The group GY is small in (A, H)-trees by (2). We claim that it is elliptic in T . Assume
otherwise, and consider its subgroup Gε , which is elliptic in T . If GY fixes an end of T ,
then Gε fixes a ray, so Gε ∈ A, a contradiction. The remaining possibility (which is ruled
out if (3c) holds) is that GY acts dihedrally on a line. In this case some subgroup of Gε of
index at most 2 fixes an edge, so is in A, contradicting (3b).
We have proved that GY is elliptic in T , hence fixes a (unique) vertex v ∈ Y ⊂ T . We
claim x = v. If x 6= v, let e be the initial edge of the segment [x, v]. Then
Gε = Gx ∩ GY ⊂ Gx ∩ Gv ⊂ Ge ,
contradicting Gε ∈
/ A. Thus x = v, so ε = (v, Y ) is the only edge of Tc incident to Y ∈
V1 (Tc ) with stabilizer not in A. Moreover, since GY fixes x, we have Gε = Gx ∩ GY = GY .
This proves that Tc and Tc∗ lie in the same deformation space, and that T smally dominates
Tc∗ .
For the furthermore, we need to show that every GY is elliptic in T . By Assumption
(2) it is small in (A, H)-trees, so the only case to consider is when GY is virtually cyclic. If
e is any edge of T contained in Y , its stabilizer Ge is infinite so is a finite index subgroup
of GY . It follows that GY is elliptic in T .
78
Remark 7.13. Given S as in Definition 7.10, assume that every G[A] belongs to S. Then
T S-dominates Tc∗ . If all groups of S which are not virtually cyclic are elliptic in T , then
Tc∗ belongs to the same deformation space as T . The proof is exactly as above.
7.4
Compatibility
The tree of cylinders has strong compatibility properties, which will be useful to construct
the compatibility JSJ tree (see Theorem 11.4).
The following fact is a general property of the tree of cylinders. Recall that two trees
are compatible if they have a common refinement.
Lemma 7.14 ([GL11, Proposition 8.1]). Tc and Tc∗ are compatible with any (A, H)-tree
dominated by T .
We will also need the following more technical statement.
Lemma 7.15. Let G be one-ended relative to H (see Subsection 1.3). Let ∼ be an admissible equivalence relation on A∞ such that every stabilizer G[A] (in particular, every
group in A) is small in (A, H)-trees. Let C be an integer, and suppose that A contains all
C-virtually cyclic groups.
Let S, T be (A, H)-trees, with S refining T . Assume that each vertex stabilizer Gv of T
is small in S (possibly elliptic) or QH with finite fiber of cardinality ≤ C. Then Sc∗ refines
Tc∗ .
The assumption on vertex stabilizers of T holds in particular if T is a JSJ decomposition
whose flexible vertices are small or QH with fiber of cardinality ≤ C.
When S dominates T , any map f : S → T sends cylinder to cylinder and induces a
cellular map f ∗c from Sc∗ to T ∗c (it maps a vertex to a vertex, an edge to a vertex or an
edge, and is independent of f ) [GL11, Lemma 5.6]. The point of the lemma is that f ∗c is
a collapse map if f is.
Proof. One passes from S to T by successively collapsing orbits of edges, in an arbitrary
order. Starting from S, perform collapses which do not change the deformation space
as long as possible. Since trees in the same deformation space have the same tree of
cylinders, this allows us to assume that no proper collapse of S refining T belongs to the
same deformation space as S. This ensures that, for each vertex v of T , the action of Gv
on the preimage Sv of v in S is minimal (Sv may be a point).
Fix v, and consider the tree S 0 obtained from S by collapsing all edges mapped to a
vertex of T not in the orbit of v. Thus Sv embeds in S 0 , and we view Sv as the minimal
subtree of Gv in both S or S 0 . We show that Sc0 ∗ refines Tc∗ , and vertex stabilizers of S 0 are
small in S or QH with fiber of cardinality ≤ C. The lemma then follows by an inductive
argument, considering S and S 0 . We may assume that Sv is not a point (otherwise S 0 = T ).
First suppose that Gv is small in S. This implies that Sv is a line or a subtree with a Gv fixed end, so all edges in Sv belong to the same cylinder of S 0 . In particular, Gv is elliptic
f1
f2
in the tree of cylinders of S 0 , hence in Sc0∗ . We thus have domination maps S 0 −→ T −→ Sc0∗ .
As recalled above, by [GL11, Lemma 5.6], these maps induce (equivariant) cellular maps
f∗
f∗
0∗
Sc0∗ −−1c
→ Tc∗ −−2c
→ (Sc0∗ )0∗
c = Sc between collapsed trees of cylinders (see Lemma 7.3 for
0∗
∗
∗
the equality (Sc0∗ )0∗
c = Sc ). The maps f1c and f2c cannot increase translation lengths,
so it follows from Theorem A.5 that they are isomorphisms (one may also show directly
that they are injective on any segment joing two vertices with stabilizer not in A). Thus
Tc∗ = Sc0∗ . Vertex stabilizers of S 0 are small in S or QH because they are vertex stabilizers
of T or contained in a conjugate of Gv .
The second case is when v is QH, with finite fiber F and underlying orbifold Σ. Consider
the action of Gv on Sv . By one-endedness, every component of ∂Σ is used (Lemma 5.16),
79
so by Lemma 5.18 the action is dominated by an action dual to a family of geodesics L on
Σ. It is in fact equal to such an action because edge stabilizers are small in (A, H)-trees
by assumption, hence virtually cyclic by Assertion (2) of Proposition 5.21 (the assumption
that C-virtually cyclic groups are in A ensures that the groups Qγ are in A). In particular,
vertices in Sv are QH with fiber F .
We claim that any cylinder of S 0 containing an edge of the preimage Sv of v is entirely
contained in Sv . This implies that Sc0 refines Tc by Remark 4.13 of [GL11], and therefore
Sc0∗ refines Tc∗ , thus completing the proof.
Let e be an arbitrary edge in Sv . Given an edge f of S 0 with Gf ∼ Ge , we have to
prove f ⊂ Sv . Suppose not. Cylinders being connected, we can assume that f has an
endpoint in Sv (so is not collapsed in T ). Since v is QH with finite fiber F , and Gf is
infinite by one-endedness, the image of Gf in the orbifold group π1 (Σ) = Gv /F is infinite,
and therefore contained with finite index in a boundary subgroup.
There is a geodesic γ ∈ L such that Ge contains the preimage Gγ of the fundamental
group of γ. Since Ge ∼ Gf , we have hGγ , Gf i ⊂ hGe , Gf i ⊂ G[Ge ] , so hGγ , Gf i is small in
(A, H)-trees. This contradicts the second assertion of Proposition 5.21 since hGγ , Gf i is
not virtually cyclic. This proves the claim, hence the lemma.
8
Constructing JSJ decompositions using acylindricity
Using acylindrical accessibility we show (Subsection 8.1) that one may construct the JSJ
deformation space of G over A relative to H, and describe its flexible subgroups, provided
that every deformation space contains an acylindrical tree (with uniform constants). In
Subsection 8.2 we prove the same results under the weaker assumption that every tree T
smally dominates an acylindrical tree T ∗ . In Section 9 we will combine this with Proposition 7.12, which ensures the existence of such trees T ∗ .
As already mentioned, acylindrical accessibility bounds the number of orbits of edges of
acylindrical trees. This does not prevent the existence of infinite sequences of refinements.
For example, consider G = A∗B with A, B torsion-free hyperbolic groups. Fix b ∈ B \{1},
k
and define Ck = hb2 i and Ak = hA, Ck i. Let Tk be the Bass-Serre tree of the amalgam G =
Ak ∗Ck B. It is 2-acylindrical and can be refined into the splitting G = Ak+1 ∗Ck+1 Ck ∗Ck B.
This refinement is not 2-acylindrical but it belongs to the same deformation space as the
2-acylindrical tree Tk+1 . The trees Tk all lie in distinct deformation spaces. Although this
is true in this example, it is not obvious in general that G splits over the intersection of
the groups Ck (or some conjugates).
The proof in Subsection 8.1.1 therefore uses not only acylindrical accessibility but also
arguments from Sela’s proof [Sel97a], involving actions on R-trees obtained by taking limits
of splittings similar to the Tk ’s considered above. We refer the reader to the appendix for
some basic facts about R-trees. In particular, we will use compactness of the space of
projectivized length functions [CM87], and Paulin’s theorem [Pau89] that the Gromov
topology and the axes topology agree on the space of irreducible R-trees (and even on the
space of semisimple trees, see Theorem A.8).
As usual, A is a family stable under conjugation and taking subgroups. The family H
may be arbitrary, and G is only assumed to be finitely generated (it would be enough to
assume that G is finitely generated relative to a finite collection of subgroups, and these
subgroups are in H).
8.1
Uniform acylindricity
Recall that a tree T is (k, C)-acylindrical if all segments of length ≥ k + 1 have stabilizer of
cardinality ≤ C. If T 0 belongs to the same deformation space as T , it is (k 0 , C)-acylindrical
for some k 0 (see [GL07a]), but in general there is no control on k 0 .
80
The main assumption of this section is the following. We fix k and C, and we assume
that for each (A, H)-tree T there is a (k, C)-acylindrical tree T ∗ in the same deformation
space. Our goal is to deduce the existence of the JSJ deformation space. This section is
a first step towards Theorem 8.7, where we allow T ∗ not to lie in the same deformation
space as T .
For example, suppose that G is a one-ended torsion-free CSA group (for instance, a
toral relatively hyperbolic group), and A is the class of abelian subgroups. One can take
T ∗ := Tc = Tc∗ to be the tree of cylinders as in the first example of Subsection 7.1, provided
that G contains no non-cyclic abelian subgroups, or more generally that these subgroups
are contained in a group of H (up to conjugacy): this guarantees that Tc lies in the same
deformation space as T (see Proposition 7.12). The general case (no assumption on abelian
subgroups) will be taken care of in Subsection 8.2.
Recall (Definition 7.8) that a group is C-virtually cyclic for some C > 0 if it maps to
Z or D∞ with kernel of cardinality ≤ C. Also recall that G is only assumed to be finitely
generated, and there is no restriction on H (it can be any collection of subgroups).
Theorem 8.1. Given A and H, suppose that there exist numbers C and k such that:
• A contains all C-virtually cyclic subgroups of G, and all subgroups of order ≤ 2C;
• for any (A, H)-tree T , there is an (A, H)-tree T ∗ in the same deformation space which
is (k, C)-acylindrical.
Then the JSJ deformation space of G over A relative to H exists.
Moreover, if all groups in A are small in (A, H)-trees, then the flexible vertices are QH
with fiber of cardinality at most C.
See Subsections 1.5, 2.3 and 5.2 for the definitions of small, flexible and QH.
Theorem 8.1 will be proved in Subsections 8.1.1 and 8.1.2. We start with a general
lemma.
Lemma 8.2. If a finitely generated group G does not split over subgroups of order ≤ C
relative to a family H, there exists a finite family H0 = {H1 , . . . , Hp }, with Hi a finitely
generated group contained in a group of H, such that G does not split over subgroups of
order ≤ C relative to H0 .
A special case of this lemma is proved in [Per11].
Proof. All trees in this proof will have stabilizers in the family A(C) consisting of all
subgroups of order ≤ C. Note that over A(C) all trees are universally elliptic, so having
no splitting is equivalent to the JSJ deformation space being trivial.
Let H1 , . . . , Hn , . . . be an enumeration of all finitely generated subgroups of G contained
in a group of H. We have pointed out in Subsection 3.3 that by Linnell’s accessibility G admits JSJ decompositions over A(C), so let Tn be a JSJ tree relative to Hn = {H1 , . . . , Hn }.
We show the lemma by proving that Tn is trivial for n large.
By Lemma 2.15 the tree Tn , which is relative to Hn−1 , may be refined to a JSJ tree
relative to Hn−1 . If we fix k, we may therefore find trees S1 (k), . . . , Sk (k) such that Si (k)
is a JSJ tree relative to Hi and Si (k) refines Si+1 (k). By Linnell’s accessibility theorem,
there is a uniform bound for the number of orbits of edges of S1 (k) (assumed to have no
redundant vertices). As Ti and Si (k) are in the same deformation space, this number is an
upper bound for the number of i0 s such that Ti and Ti+1 belong to different deformation
spaces, so for n large the trees Tn all belong to the same deformation space D (they have
the same elliptic subgroups).
Since every Hn is elliptic in D, so is every H ∈ H (otherwise H would fix a unique end,
and edge stabilizers would increase infinitely many times along a ray going to that end).
The non-splitting hypothesis made on G then implies that D is trivial.
81
We also note:
Lemma 8.3. It suffices to prove Theorem 8.1 under the additional hypothesis that G does
not split over subgroups of order ≤ 2C relative to H (“one-endedness condition”).
Proof. Let A(2C) ⊂ A denote the family of subgroups of order ≤ 2C. As mentioned in
the previous proof, Linnell’s accessibility implies the existence of a JSJ tree over A(2C)
relative to H. We can now apply Proposition 4.15.
8.1.1
Existence of the JSJ deformation space
Because of Lemma 8.3, we assume from now on that G does not split over subgroups of
order ≤ 2C relative to H.
In this subsection we prove the first assertion of Theorem 8.1 (flexible vertices will be
studied in the next subsection). We have to construct a universally elliptic tree TJ which
dominates every universally elliptic tree (of course, all trees are (A, H)-trees and universal
ellipticity is defined with respect to (A, H)-trees). Countability of G allows us to choose a
sequence of universally elliptic trees Ui such that, if g ∈ G is elliptic in every Ui , then it is
elliptic in every universally elliptic tree. By Assertion (2) of Lemma 2.6, it suffices that TJ
dominates every Ui . Inductively replacing each Ui by its standard refinement dominating
Ui−1 , as in the proof of Theorem 2.16, we may assume that Ui dominates Ui−1 for all i. In
particular, we are free to replace Ui by a subsequence when needed.
Let Ti be a (k, C)-acylindrical tree in the same deformation space as Ui , with distance
function denoted by di (we view Ti as a metric tree, with all edges of length 1). Let
`i : G → Z be the translation length function of Ti (see the appendix). The proof has
two main steps. First we assume that, for all g, the sequence `i (g) is bounded, and we
construct a universally elliptic (A, H)-tree TJ which dominates every Ui . Such a tree is
a JSJ tree. In the second step, we deduce a contradiction from the assumption that the
sequence `i is unbounded.
• If `i (g) is bounded for all g, we pass to a subsequence so that `i has a limit ` (possibly
0). Since the set of length functions of trees is closed [CM87, Theorem 4.5], ` is the length
function associated to the action of G on an R-tree T . It takes values in Z, so the tree T
is simplicial (possibly with edges of length 12 , see Example A.4). In general T is not an
A-tree, but we will show that it is relative to H.
We can assume that all trees Ti are non-trivial. By Lemma 7.9, Ti is irreducible except
if G is virtually cyclic, in which case the theorem is clear. If g ∈ G is hyperbolic in some
Ti0 , then `i (g) ≥ 1 for all i ≥ i0 (because Ti dominates Ti0 ), so g is hyperbolic in T . Since
every Ti is irreducible, there exist g, h ∈ G such that g, h, and [g, h] are hyperbolic in Ti
(for some i), hence in T , so T is also irreducible. By [Pau89], Ti converges to T in the
equivariant Gromov-Hausdorff topology (see Theorem A.6).
We will not claim anything about the edge stabilizers of T , but we study its vertex
stabilizers. We claim that a subgroup H ⊂ G is elliptic in T if and only if it is elliptic in
every Ti ; in particular, every H ∈ H is elliptic in T , and T dominates every Ti .
The claim is true if H is finitely generated, since g ∈ G is elliptic in T if and only if it
is elliptic in every Ti . If H is infinitely generated, fix a finitely generated subgroup H 0 of
cardinality > C. If H is elliptic in T , it is elliptic in Ti because otherwise it fixes a unique
end and H 0 fixes an infinite ray of Ti , contradicting acylindricity of Ti . Conversely, if H is
elliptic in every Ti but not in T , the group H 0 fixes an infinite ray in T . By convergence in
the Gromov topology, H 0 fixes a segment of length k + 1 in Ti for i large. This contradicts
acylindricity of Ti , thus proving the claim.
We now return to the trees Ui . They are dominated by T since the trees Ti are. Their
edge stabilizers are in Aell , the family of groups in A which are universally elliptic. Since
Aell is stable under taking subgroups, any equivariant map f : T → Ui factors through the
82
tree TJ obtained from T by collapsing all edges with stabilizer not in Aell . The tree TJ is
a universally elliptic (A, H)-tree dominating every Ui , hence every universally elliptic tree.
It is a JSJ tree.
• We now suppose that `i (g) is unbounded for some g ∈ G, and we work towards
a contradiction. Since the set of projectivized non-zero length functions on a finitely
generated group is compact [CM87, Theorem 4.5], we may assume that `i /λi converges to
the length function ` of a non-trivial R-tree T∞ , for some sequence λi → +∞. By Theorem
A.8, Ti /λi converges to T in the Gromov topology (all Ti ’s are irreducible, and we take
T∞ to be a line if it is not irreducible).
Lemma 8.4.
(1) Any subgroup H < G of order > C which is elliptic in every Ti fixes a unique point
in T∞ . In particular, elements of H are elliptic in T∞ .
(2) Tripod stabilizers of T∞ have cardinality ≤ C.
(3) If I ⊂ T∞ is a non-degenerate arc, its stabilizer GI has order ≤ C or is C-virtually
cyclic.
(4) Let J ⊂ I ⊂ T∞ be two non-degenerate arcs. If GI is C-virtually cyclic, then
GI = GJ .
Proof. Recall that Ti+1 dominates Ti , so a subgroup acting non-trivially on Ti also acts
non-trivially on Tj for j > i.
To prove (1), we may assume that H is finitely generated. It is elliptic in T∞ because
all of its elements are. But it cannot fix an arc in T∞ : otherwise, since Ti /λi converges to
T∞ in the Gromov topology, H would fix a long segment in Ti for i large, contradicting
acylindricity.
Using the Gromov topology, as in Example A.7, one sees that a finitely generated
subgroup fixing a tripod of T∞ fixes a long tripod of Ti for i large, so has cardinality at
most C by acylindricity. This proves (2).
To prove (3), consider a group H fixing a non-degenerate arc I = [a, b] in T∞ . We write
|I| for the length of I. It suffices to show that H is small: depending on whether H is
elliptic in every Ti or not, Assertion (1) or Lemma 7.9 then gives the required conclusion.
If H contains a non-abelian free group, choose elements {h1 , . . . , hn } generating a free
subgroup Fn ⊂ H of rank n C, and choose ε > 0 with ε |I|. For i large, there
exist approximations ai , bi of a, b in Ti at distance at least (|I| − ε)λi from each other, and
contained in the characteristic set (axis or fixed point set) of each hj . Additionally, the
translation length of every hj in Ti is at most ελi if i is large enough. Then all commutators
[hj1 , hj2 ] fix most of the segment [ai , bi ], contradicting acylindricity of Ti if n(n − 1)/2 > C.
We now prove (4). By Assertion (1), we know that GI acts non-trivially on Ti for i
large, so we can choose a hyperbolic element h ∈ GI . We suppose that some g ∈ GJ
does not fix an endpoint, say a, of I = [a, b], and we argue towards a contradiction. Let
ai , bi ∈ Ti be in the axis of h as above, with di (ai , gai ) ≥ δλi for some δ > 0. For i large
i
the translation lengths of g and h in Ti are small compared to |J|λ
C , and the elements
2
C+1
[g, h], [g, h ], . . . , [g, h
] all fix a common long arc in Ti . By acylindricity, there exist
j1 6= j2 such that [g, hj1 ] = [g, hj2 ], so g commutes with hj1 −j2 . It follows that g preserves
the axis of h, and therefore moves ai by `i (g), a contradiction since `i (g)/λi goes to 0 as
i → ∞.
Sela’s proof of acylindrical accessibility [Sel97a] now comes into play to describe the
structure of T∞ . We use the generalization given by Theorem 5.1 of [Gui08], which allows
non-trivial tripod stabilizers. Lemma 8.4 shows that stabilizers of unstable arcs and tripods
have cardinality at most C, and we have assumed that G does not split over a subgroup of
83
cardinality at most 2C relative to H, hence also relative to a finite family H0 by Lemma
8.2. It follows that T∞ is a graph of actions as in Theorem 5.1 of [Gui08]. In order to
reach the desired contradiction, we have to rule out several possibilities.
First consider a vertex action Gv y Yv of the decomposition of T∞ given by [Gui08].
If Yv is a line on which Gv acts with dense orbits through a finitely generated group, then,
by Assertion (3) of Lemma 8.4, Gv contains a finitely generated subgroup H mapping
onto Z2 with finite or virtually cyclic kernel, and acting non-trivially. The group H acts
non-trivially on Ti for i large, contradicting Lemma 7.9.
Now suppose that Gv y Yv has kernel Nv , and the action of Gv /Nv is dual to an
arational measured foliation on a 2-orbifold Σ (with conical singularities). Then Nv has
order ≤ C since it fixes a tripod. Consider a one-edge splitting S of G (relative to H)
dual to a simple closed curve on Σ. This splitting is over a C-virtually cyclic group Ge . In
particular, S is an (A, H)-tree. Since Ge is hyperbolic in T∞ , it is also hyperbolic in Ti ,
hence in Ui , for i large enough. On the other hand, being universally elliptic, Ui is elliptic
with respect to S. By Remark 2.3 of [FP06] (see Assertion (3) of Lemma 2.6), G splits
relative to H over an infinite index subgroup of Ge , i.e. over a group of order ≤ 2C (in fact
≤ C in this case), contradicting our assumptions.
By Theorem 5.1 of [Gui08], the only remaining possibility is that T∞ itself is a simplicial
tree, and all edge stabilizers are C-virtually cyclic. Then T∞ is an (A, H)-tree, and its edge
stabilizers are hyperbolic in Ti for i large. This leads to a contradiction as in the previous
case, and concludes the proof of the first assertion of Theorem 8.1.
8.1.2
Description of flexible vertices
Now that we know that the JSJ decomposition exists, we prove the second assertion of
Theorem 8.1: if all groups in A are small in (A, H)-trees, then the flexible vertices are QH
with fiber of cardinality at most C.
The arguments are similar to those used in Section 6, with one key difference: since we
do not assume finite presentability of G, we do not have Lemma 6.12 constructing a tree
which is maximal for domination using Dunwoody’s accessibility. We shall use acylindrical
accessibility instead.
As in Subsection 6.2 we may assume that G is totally flexible, i.e. that there exist nontrivial (A, H)-trees, but none of them is universally elliptic. Indeed, to prove that a flexible
vertex Gv of the JSJ decomposition of G is QH, it is enough to study (Gv , IncH
v ) instead
of (G, H). Note that we do not know in advance that JSJ trees have finitely generated
edge stabilizers, so we have to allow infinitely generated groups in IncH
v (even if groups in
H are finitely generated).
The fact that G is totally flexible implies that any edge stabilizer A of any tree is
C-virtually cyclic: since A is small in (A, H)-trees, this follows from Lemma 7.9 applied
to the action of A on T ∗ , where T is some (A, H)-tree in which A is not elliptic. We
may therefore replace A by the family consisting of all C-virtually cyclic subgroups and
all finite subgroups. It satisfies the stability condition (SC) of Definition 6.1, with F the
family of subgroups of order ≤ C, so we are free to use the results of Subsections 6.3 and
6.4, as well as Proposition 6.28 (splittings are clearly minuscule, so Subsection 6.7 is not
needed).
By acylindrical accessibility [Wei12], there is a bound on the number of orbits of edges
of a (k, C)-acylindrical tree. Among all (k, C)-acylindrical trees with no redundant vertex,
consider a tree U whose number of orbits of edges is maximal (this is a substitute for the
maximal tree provided by Lemma 6.12). Proposition 6.28 yields V such that U and V
are fully hyperbolic with respect to each other, and we let R = RN (U, V ) be their regular
neighborhood (Proposition 6.25).
Recall (Proposition 6.25 (RN1)) that the stabilizer Gv of a vertex v ∈ S is QH or
84
slender. If slender, it maps onto a group that is virtually Z2 . On the other hand, it must
be virtually cyclic by Lemma 7.9 because it acts hyperbolically on U . This contradiction
shows that Gv must be QH (with fiber of cardinality ≤ C) if v ∈ S. As in the proof of
Theorem 6.8, it thus suffices to show that R is a point.
By (RN3) one obtains U from R by refining R at vertices v ∈ S and collapsing all other
edges. We let S be a common refinement of R and U such that no edge of S is collapsed in
both R and U (it is the lcm S = R ∨ U of Subsection A.5). Let S ∗ be a (k, C)-acylindrical
tree with no redundant vertex in the deformation space of S.
We now consider commensurability classes of edge stabilizers.
Since U is dual to geodesics in QH vertices of R by (RN3), and has no redundant vertex,
edges of U in different orbits have non-commensurable stabilizers. Every edge stabilizer
of U is also an edge stabilizer of S. Next observe that, for any edge e of S, there exists
an edge e0 of S ∗ such that Ge and Ge0 are commensurable. Indeed, since S ∗ dominates
S, there exists e0 with Ge0 ⊂ Ge . By one-endedness (Lemma 8.3), the cardinality of Ge0
is greater than 2C. Since Ge is C-virtually cyclic, this implies that Ge0 is infinite, hence
commensurable to Ge .
Given a tree T , denote by |T | the number of orbits of edges, and by c(T ) the number of
equivalence classes of orbits of edges, where two orbits are equivalent if they contain edges
with commensurable stabilizers. We have just proved |U | ≤ c(U ) ≤ c(S) ≤ c(S ∗ ) ≤ |S ∗ |.
The maximality property of U now implies that these inequalities are equalities, so
every edge stabilizer of S is commensurable to an edge stabilizer of U . If R is not a point,
let A be an edge stabilizer. It is elliptic in V by (RN2). On the other hand, A is an edge
stabilizer of S, so is commensurable to an edge stabilizer of U . This contradicts the full
hyperbolicity of U with respect to V , thus completing the proof of Theorem 8.1.
8.1.3
Splittings over virtually cyclic groups
Before generalizing Theorem 8.1 in the next subsection, we give an application of the
previous arguments. In Section 6 we proved that certain flexible groups are QH when H
is a finite family of finitely generated subgroups and G is finitely presented relative to H.
Acylindricity will allow us to remove these assumptions for splittings over virtually cyclic
groups. This is based on the following lemma. The stability conditions and total flexibility
are defined in Section 6.
Lemma 8.5. Assume that all groups in A are virtually cyclic, and A satisfies one of the
stability conditions (SC) or (SCZ ). If G is totally flexible, then any tree T is (2, C)acylindrical for some C (depending on T ).
Proof. Since groups in A are virtually cyclic, we may assume (by making F smaller if
needed) that all groups in F are finite. Total flexibility implies that G is one-ended
relative to H, so all trees are minuscule (of course, this also follows from Proposition 6.35).
By Proposition 6.28, there exists a tree T 0 such that T and T 0 are fully hyperbolic with
respect to each other. Let R = RN (T, T 0 ) be their regular neighborhood. By (RN3), the
tree T is dual to families of geodesics in the orbifolds underlying the QH vertex groups of
R. It follows that T is (2, C)-acylindrical, for C the maximum order of the corresponding
fibers (see the example in the beginning of Part IV).
This lemma allows us to argue as in the previous subsection, provided that there is a
bound for the order of groups in F. In particular, we get the following strengthening of
Theorem 6.6:
Theorem 8.6. Let G be a finitely generated group, and let H be an arbitrary family of
subgroups. Let A be the class of all finite or cyclic subgroups of G. Assume that there
exists a JSJ tree T over A relative to H.
85
If Q is a flexible vertex stabilizer of T , then Q is virtually Z2 or QH with trivial fiber.
Moreover, the underlying orbifold Σ has no mirror, every boundary component of Σ is used,
and Σ contains an essential simple closed geodesic.
Proof. The argument is the same as in Subsection 8.1.2. One first reduces to the case
when G is totally flexible. Since F = {1}, all trees are 2-acylindrical by Lemma 8.5, so
acylindrical accessibility applies.
8.2
Acylindricity up to small groups
In this section we generalize Theorem 8.1. Instead of requiring that every deformation
space contains a (k, C)-acylindrical tree, we require that every tree smally dominates some
(k, C)-acylindrical tree (Definition 7.10).
Recall that G is only assumed to be finitely generated, and there is no restriction on
H (it can be any collection of subgroups).
Theorem 8.7. Given A and H, suppose that there exist numbers C and k such that:
• A contains all C-virtually cyclic subgroups, and all subgroups of cardinal ≤ 2C;
• every (A, H)-tree T smally dominates some (k, C)-acylindrical (A, H)-tree T ∗ .
Then the JSJ deformation space of G over A relative to H exists.
Assume further that all groups in A are small in (A, H)-trees. Then the flexible vertex
groups that are not small in (A, H)-trees are QH with fiber of cardinality at most C.
More generally, if S is as in Definition 7.10 and T always S-dominates T ∗ , then flexible
vertex groups that do not belong to S are QH with fiber of cardinality at most C.
Z
Z
b
Z
b
Z
b
Z
b
A non-relative abelian JSJ
decomposition T
Z
Z
Z2
Z
Z
Z
Z Z Z
Tr , the canonical relative
abelian JSJ
Z
Ta , the non-relative abelian JSJ
constructed from Tr
Figure 12: JSJ decompositions of a CSA group; relative means relative to non-cyclic abelian
subgroups.
Example 8.8. This applies for instance if G is a toral relatively hyperbolic group (more
generally, a torsion-free CSA group), A is the family of abelian subgroups, and we take for
T ∗ the tree of cylinders Tc (equal to Tc∗ ), with k = 1 and C = 2 (see Section 9 for more
examples).
In particular, let us return to Example 7.6, with H = ∅. Figure 12 shows (the quotient
graphs of groups of) three trees. The first one is an abelian JSJ tree T ; the next one is
its tree of cylinders Tc = Tc∗ = T ∗ , which is also the JSJ tree Tr relative to non-cyclic
abelian subgroups constructed in the proof of Theorem 8.7 (see Corollary 8.12); the last
one is the JSJ tree Ta constructed in the proof, obtained by refining Tr at vertices with
stabilizer Z2 (Lemma 8.14). It is another JSJ tree, in the same deformation space as T ,
and Tr = Tc∗ = (Ta )∗c .
The rest of this section is devoted to the proof of Theorem 8.7. As above, we assume
(thanks to Lemma 8.3) that G does not split over groups of order ≤ 2C relative to H
(“one-endedness” assumption).
86
We write S for the family of all subgroups of G which are small in (A, H)-trees, or for a
family as in Definition 7.10 if T S-dominates T ∗ . We write Snvc for the groups in S which
are not C-virtually cyclic.
Lemma 8.9. Suppose that T S-dominates a (k, C)-acylindrical tree T ∗ .
(1) If a vertex stabilizer Gv of T ∗ is not elliptic in T , it belongs to Snvc (in particular, it
is not C-virtually cyclic).
(2) Let H be a subgroup. It is elliptic in T ∗ if and only if it is elliptic in T or contained
in a group K ∈ Snvc . In particular, all (k, C)-acylindrical trees S-dominated by T
belong to the same deformation space.
(3) Assume that T ∗ is reduced. Then every edge stabilizer Ge of T ∗ has a subgroup of
index at most 2 fixing an edge in T . In particular, if T is universally elliptic, so is
T ∗.
Recall (see Subsection 1.4) that a tree S is reduced if no proper collapse of S lies in
the same deformation space as S. Equivalently, any edge e = uv with u, v in different
orbits satisfies Ge 6= Gu and Ge 6= Gv . Since one may obtain a reduced tree in the same
deformation space as S by collapsing edges, there is no loss of generality in assuming that
the smally dominated trees T ∗ are reduced.
Proof. Clearly Gv ∈ S because T S-dominates T ∗ . Assume that it is C-virtually cyclic.
Stabilizers of edges incident to v have infinite index in Gv since they are elliptic in T and
Gv is not, so they have order ≤ 2C. This contradicts the “one-endedness” assumption (note
that T ∗ is not trivial because then G = Gv would be C-virtually cyclic, also contradicting
one-endedness).
The “if” direction of Assertion (2) follows from Lemma 7.9. Conversely, assume that
H is elliptic in T ∗ but not in T . If v is a vertex of T ∗ fixed by H, we have H ⊂ Gv and
Gv ∈ Snvc by Assertion (1).
For Assertion (3), let u and v be the endpoints of an edge e of T ∗ . First suppose that
Gu is not elliptic in T . It is small in T , so it preserves a line or fixes an end. Since Ge
is elliptic in T , some subgroup of index at most 2 fixes an edge. If Gu fixes two distinct
points of T , then Ge fixes an edge. We may therefore assume that Gu and Gv each fix a
unique point in T .
If these fixed points are different, Ge = Gu ∩Gv fixes an edge of T . Otherwise, hGu , Gv i
fixes a point x in T , and is therefore elliptic in T ∗ . Since T ∗ is reduced, some g ∈ G acting
hyperbolically on T ∗ maps u to v and conjugates Gu to Gv (unless there is such a g,
collapsing the edge uv yields a tree in the same deformation space as T ∗ ). This element g
fixes x, so is elliptic in T ∗ , a contradiction.
Corollary 8.10.
(1) T ∗ is an (A, H ∪ Snvc )-tree.
(2) If T1 dominates T2 , then T1∗ dominates T2∗ .
(3) If T is an (A, H ∪ Snvc )-tree, then T ∗ lies in the same deformation space as T . In
particular, Theorem 8.1 applies to (A, H ∪ Snvc )-trees.
We also deduce:
Corollary 8.11.
• If a subgroup J is small in (A, H ∪ Snvc )-trees, it is also small in (A, H)-trees.
87
• If J ∈
/ S is elliptic in every tree relative to H ∪ Snvc , it is elliptic in every tree which
is only relative to H.
Proof. If J is not small in an (A, H)-tree T , it does not belong to S, and is not elliptic in
T ∗ by Assertion (2) of Lemma 8.9. By Lemma 7.9, it is not small in the (A, H ∪ Snvc )-tree
T ∗.
If J ∈
/ S is not elliptic in some (A, H)-tree T , then by Lemma 8.9 it is not elliptic in
T ∗.
Thanks to the third assertion of Corollary 8.10, we may apply Theorem 8.1 to get:
Corollary 8.12. There exists a JSJ tree Tr over A relative to H ∪ Snvc .
We can assume that Tr is reduced. We think of Tr as relative, as it is relative to Snvc
(not just to H). In Example 8.8, Snvc is the class of all non-cyclic abelian subgroups and
Tr is a JSJ tree over abelian groups relative to all non-cyclic abelian subgroups.
Lemma 8.13. If Tr is reduced, then it is (A, H)-universally elliptic.
Proof. We let e be an edge of Tr such that Ge is not elliptic in some (A, H)-tree T , and we
argue towards a contradiction. We may assume that T only has one orbit of edges. The
first step is to show that Tr dominates T ∗ .
Since T ∗ is relative to H ∪ Snvc , the group Ge fixes a vertex u ∈ T ∗ by (A, H ∪ Snvc )universal ellipticity of Tr . This u is unique because edge stabilizers of T ∗ are elliptic in T .
Also note that Gu ∈ Snvc by Assertion (1) of Lemma 8.9.
We may assume that T ∗ is not a point (if it is, then G ∈ Snvc and Tr itself is a point), so
Gu contains an edge stabilizer of T ∗ , hence the stabilizer of some edge f ⊂ T since there is
an equivariant map T → T ∗ . The group Gf is (trivially) (A, H ∪ Snvc )-universally elliptic
because Gf ⊂ Gu ∈ Snvc . Since T has a single orbit of edges, it is (A, H ∪ Snvc )-universally
elliptic (but it is not relative to H ∪ Snvc ). On the other hand, T ∗ is an (A, H ∪ Snvc )-tree,
and it is (A, H ∪ Snvc )-universally elliptic by Assertion (3) of Lemma 8.9. By maximality
of the JSJ, Tr dominates T ∗ .
Recall that u is the unique fixed point of Ge in T ∗ . Denote by a, b the endpoints of e in
Tr . Since Tr dominates T ∗ , the groups Ga and Gb fix u, so hGa , Gb i ⊂ Gu ∈ Snvc is elliptic
in Tr . As in the proof of Lemma 8.9, some g ∈ G acting hyperbolically on Tr maps a to b
(because Tr is reduced). This g fixes u, so belongs to Gu ∈ Snvc , a contradiction since Tr
is relative to H ∪ Snvc .
We shall now construct a JSJ tree Ta relative to H by refining Tr (a reduced JSJ tree
relative to H ∪ Snvc ) at vertices with small stabilizer. This JSJ tree Ta is thought of as
absolute as it is not relative to Snvc .
Lemma 8.14. There exists a JSJ tree Ta over A relative to H. It may be obtained by
refining Tr at vertices with stabilizer in S (in particular, the set of vertex stabilizers not
belonging to S is the same for Ta as for Tr ). Moreover, Ta∗ lies in the same deformation
space as Tr .
Proof. Let v be a vertex of Tr . We shall prove the existence of a JSJ tree Tv for Gv relative
to the family IncH
v consisting of incident edge groups and subgroups conjugate to a group of
H (see Definition 4.5). By Proposition 4.15, which applies because Tr is (A, H)-universally
elliptic (Lemma 8.13), one then obtains a JSJ tree Ta for G relative to H by refining Tr
using the trees Tv .
If Gv is elliptic in every (A, H)-universally elliptic tree T , its JSJ is trivial (see Lemma
4.13) and no refinement is needed at v. Assume therefore that Gv is not elliptic in such a
T . Consider the (A, H ∪ Snvc )-tree T ∗ . It is (A, H)-universally elliptic by Assertion (3) of
88
Lemma 8.9, hence (A, H ∪ Snvc )-universally elliptic, so it is dominated by Tr . In particular,
Gv is elliptic in T ∗ , so belongs to S.
Let Tv ⊂ T be the minimal Gv -invariant subtree (it exists by Proposition 1.7 and
Lemma 4.7, since the incident edge stabilizers of v in Tr are elliptic in T ). Being small
in (A, H)-trees, Gv has at most one non-trivial deformation space containing a universally
elliptic tree (Proposition 3.4). Applying this to splittings of Gv relative to IncH
v , we deduce
H
that Tv is a JSJ tree of Gv relative to Incv . This shows the first two assertions of the lemma.
We now show the “moreover”. Since Ta∗ is an (A, H ∪ Snvc )-tree, which is (A, H ∪ Snvc )universally elliptic by the third assertion of Lemma 8.9, it is dominated by Tr . Conversely,
Ta dominates Tr and therefore Ta∗ dominates Tr∗ by Corollary 8.10(2), so Ta∗ dominates Tr
since Tr and Tr∗ lie in the same deformation space by Corollary 8.10(3).
Remark 8.15. By Corollary 8.11, the type of vertex stabilizers not in S (rigid or flexible)
is the same in Ta (relative to H) and Tr (relative to H ∪ Snvc ).
We can now conclude the proof of Theorem 8.7. The JSJ deformation space relative to
H exists by Lemma 8.14. The description of flexible vertex groups follows from Theorem
8.1, since JSJ trees relative to H and H ∪ Snvc have the same vertex stabilizers not in S
by Lemma 8.14.
9
Applications
Recall that A∞ is the family of infinite groups in A. Combining Proposition 7.12 and
Theorem 8.7 yields:
Corollary 9.1. Let G be a finitely generated group. Given A and H, let ∼ be an admissible
equivalence on A∞ . Let S be the family of groups contained in some G[A] , with A ∈ A∞ .
Assume that G is one-ended relative to H, and there exists an integer C such that:
(1) A contains all C-virtually cyclic subgroups, and all subgroups of cardinal ≤ 2C;
(2) if two groups of A∞ are inequivalent, their intersection has order ≤ C;
(3) every stabilizer G[A] is small in (A, H)-trees (hence so is every element of S);
(4) one of the following holds:
(a) every stabilizer G[A] belongs to A;
(b) if A ⊂ A0 has index 2, and A ∈ A, then A0 ∈ A;
(c) no group G[A] maps onto D∞ .
Then:
(1) there is a JSJ tree Ta over A relative to H; its collapsed tree of cylinders (Ta )∗c is
a JSJ tree relative to H ∪ Snvc (with Snvc the family of groups in S which are not
C-virtually cyclic);
(2) Ta and (Ta )∗c have the same vertex stabilizers not in S; flexible vertex stabilizers that
do not belong to S are QH with fiber of cardinality at most C;
(3) (Ta )∗c is a canonical JSJ tree relative to H ∪ Snvc ; in particular, it is invariant under
any automorphism of G preserving A and H;
(4) (Ta )∗c is compatible with every (A, H)-tree.
89
Proof. By the one-endedness assumption, all (A, H)-trees T have edge stabilizers in A∞ ,
so the collapsed tree of cylinders Tc∗ is defined. By Proposition 7.12 and Remark 7.13,
it is a (2, C)-acylindrical (A, H)-tree S-dominated by T , and Theorem 8.7 applies taking
T ∗ := Tc∗ (groups in A are small in (A, H)-trees by Assumption (3)): there exists a JSJ
tree Ta , obtained as in Lemma 8.14, and its flexible vertex stabilizers are in S or QH with
fiber of cardinality at most C.
Lemma 8.14 states that (Ta )∗c belongs to the deformation space of Tr (a JSJ tree relative
to H ∪ Snvc ), and Ta is obtained by refining Tr at vertices with stabilizer in S. This proves
the first two assertions of the corollary. The third one follows from Corollary 7.4.
For the fourth assertion, let T be any (A, H)-tree. Since Ta is universally elliptic, there
exists a refinement S of Ta dominating T by Proposition 2.2. By Lemma 7.14, Sc∗ and T
have a common refinement R. Since Sc∗ is a refinement of (Ta )∗c by Lemma 7.15, the tree
R is a common refinement of T and (Ta )∗c .
Remark 9.2. The result remains true if we enlarge S (keeping it invariant under conjugating
and taking subgroups), as long as all groups in S are small in (A, H)-trees.
Remark 9.3. By Corollary 4.16, the one-endedness assumption is usually not necessary for
the assertions about Ta , provided that the relative Stallings-Dunwoody space exists.
The first assumption of the corollary ensures that Propositions 5.20 and 5.21 apply to
flexible vertex stabilizers Gv of Ta and (Ta )∗c that do not belong to S. In particular:
Corollary 9.4. If Gv is a flexible vertex stabilizer not belonging to S, then:
(1) the underlying orbifold Σ contains an essential simple geodesic;
(2) every boundary component of Σ is used;
(3) every universally elliptic subgroup of Gv is contained in an extended boundary subgroup;
(4) if T is an (A, H)-tree in which Gv does not fix a point, the action of Gv on its minimal
subtree µT (Gv ) is dual to a family of geodesics of Σ.
Proof. This follows directly from Propositions 5.20 and 5.21, noting that edge stabilizers
for the action of Gv on µT (Gv ) are virtually cyclic by the second assertion of Proposition
5.21.
In the following sections, we are going to describe examples where Corollaries 9.1 and
9.4 apply. We first treat the case of abelian splittings of CSA groups. To allow torsion,
we introduce K-CSA groups in Subsection 9.2, and describe their JSJ decomposition over
virtually abelian groups. We then consider elementary splittings of relatively hyperbolic
groups, and splittings over virtually cyclic subgroups under the assumption that these subgroups have small commensurators. We conclude by defining the Zmax -JSJ decomposition
of one-ended hyperbolic groups.
9.1
CSA groups
In our first application, G is a torsion-free CSA group, and we consider abelian or cyclic
splittings. Recall that G is CSA if the commutation relation is transitive on G \ {1},
and maximal abelian subgroups are malnormal. Toral relatively hyperbolic groups, in
particular limit groups and torsion-free hyperbolic groups, are CSA. See Example 8.8 and
Figure 12 for an illustration.
We let A be either the family of abelian subgroups of G, or the family of cyclic subgroups. If G is freely indecomposable relative to H, commutation is an admissible equivalence relation on A∞ (see [GL11], or Lemma 9.13 below), and we can define trees of
90
cylinders Tc . The groups G[A] are maximal abelian subgroups, so are small in all trees.
Over abelian groups (i.e. when A is the class of abelian subgroups), all edge stabilizers of
Tc belong to A since every G[A] is abelian, so Tc∗ = Tc . Over cyclic groups, Tc may have
non-cyclic edge stabilizers, so we have to use Tc∗ , obtained from Tc by collapsing edges with
non-cyclic stabilizers.
Theorem 9.5. Let G be a finitely generated torsion-free CSA group, and H any family of
subgroups. Assume that G is freely indecomposable relative to H.
(1) There is an abelian (resp. cyclic) JSJ tree Ta relative to H. Its collapsed tree of
cylinders (Ta )∗c (for commutation) is a JSJ tree relative to H and all non-cyclic
abelian subgroups.
(2) Ta and (Ta )∗c have the same non-abelian vertex stabilizers; non-abelian flexible vertex
stabilizers are QH (they are fundamental groups of compact surfaces).
(3) (Ta )∗c is invariant under all automorphisms of G preserving H. It is compatible with
every (A, H)-tree.
Proof. We apply Corollary 9.1, with A consisting of all abelian (resp. cyclic) subgroups,
S the family of abelian subgroups, and C = 1. Since G is torsion-free, QH vertex groups
have trivial fiber, and the underlying orbifold is a surface.
9.2
Γ-limit groups and K-CSA groups
The notion of CSA groups is not well-adapted to groups with torsion. This is why we shall
introduce K-CSA groups, where K is an integer. Every hyperbolic group Γ is K-CSA
for some K. Being K-CSA is a universal property; in particular, all Γ-limit groups are
K-CSA.
We say that a group is K-virtually abelian if it contains an abelian subgroup of index
≤ K (note that the infinite dihedral group D∞ is 1-virtually cyclic, in the sense of Definition
7.8, but only 2-virtually abelian). As usual, a group is locally K-virtually abelian if its
finitely generated subgroups are K-virtually abelian.
Lemma 9.6. If a countable group J is locally K-virtually abelian, then J is K-virtually
abelian.
Proof. Let g1 , . . . , gn , . . . be a numbering of the elements of J. Let An ⊂ hg1 , . . . , gn i be
an abelian subgroup of index ≤ K. For a given k, there are only finitely many subgroups
of index ≤ K in hg1 , . . . , gk i, so there is a subsequence Ani (k) such that Ani (k) ∩ hg1 , . . . gk i
is independent of i. By a diagonal argument, one produces an abelian subgroup A of J
whose intersection with each hg1 , . . . , gn i has index ≤ K, so A has index ≤ K in J.
Definition 9.7 (K-CSA). Say that G is K-CSA for some K > 0 if:
(1) Any finite subgroup has cardinality at most K (in particular, any element of order
> K has infinite order).
(2) Any element g ∈ G of infinite order is contained in a unique maximal virtually
abelian group M (g), and M (g) is K-virtually abelian.
(3) M (g) is its own normalizer.
A 1-CSA group is just a torsion-free CSA group. The Klein bottle group is 2-CSA but
not 1-CSA. Any hyperbolic group Γ is K-CSA for some K since finite subgroups of Γ have
bounded order, and there are only finitely many isomorphism classes of virtually cyclic
groups whose finite subgroups have bounded order (see Lemma 2.2 of [GL16] for a proof).
Corollary 9.10 will say that Γ-limit groups also are K-CSA.
91
Lemma 9.8. Let G be a K-CSA group.
(1) If g, h ∈ G have infinite order, the following conditions are equivalent:
(a) g and h have non-trivial commuting powers;
(b) g K! and hK! commute;
(c) M (g) = M (h);
(d) hg, hi is virtually abelian.
(2) Any infinite virtually abelian subgroup H is contained in a unique maximal virtually
abelian group M (H). The group M (H) is K-virtually abelian and almost malnormal:
if M (H) ∩ M (H)g is infinite, then g ∈ M (H).
Proof. (c) ⇒ (b) ⇒ (a) in Assertion (1) is clear since g K! ∈ A if A ⊂ M (g) has index
≤ K. We prove (a) ⇒ (c). If g m commutes with hn , then g m normalizes M (hn ), so
M (g m ) = M (hn ) and M (g) = M (g m ) = M (hn ) = M (h). Clearly (c) ⇒ (d) ⇒ (a). This
proves Assertion (1).
Being virtually abelian, H contains an element h0 of infinite order, and we define
M (H) = M (h0 ). By Assertion (1), M (H) does not depend on the choice of h0 . To
prove that H ⊂ M (H), consider h ∈ H. Since hh0 h−1 ∈ H has infinite order, we have
M (h0 ) = M (hh0 h−1 ) = hM (h0 )h−1 , so h ∈ M (h0 ) because M (h0 ) equals its normalizer.
A similar argument shows almost malnormality. There remains to prove uniqueness. If
A is any virtually abelian group containing H, then M (A) is defined and coincides with
M (h0 ), so A ⊂ M (A) = M (h0 ) = M (H).
One easily checks that any subgroup of a K-CSA group is still K-CSA. This is in fact
a consequence of the following proposition saying that K-CSA is a universal property. We
refer to [CG05] for the topological space of marked groups, and its relation with universal
theory.
Proposition 9.9. For any fixed K > 0, the class of K-CSA groups is defined by a set of
(coefficient-free) universal sentences (K-CSA is a universal property). In particular, the
class of K-CSA groups is stable under taking subgroups, and closed in the space of marked
groups.
Proof. For any finite group F = {a1 , . . . , an }, the fact that G does not contain a subgroup
isomorphic to F is equivalent to a universal sentence saying that for any n-tuple (x1 , . . . , xn )
satisfying the multiplication table of F , not all xi ’s are distinct. Thus, the first property
of K-CSA groups is defined by (infinitely many) universal sentences.
Now consider the second property. We claim that, given m and n, the fact that
hg1 , . . . , gn i is m-virtually abelian may be expressed by the disjunction VAm,n of finitely
many finite systems of equations in the elements g1 , . . . , gn . To see this, let π : Fn → G be
the homomorphism sending the i-th generator xi of the free group Fn = hx1 , . . . xn i to gi .
If A ⊂ hg1 , . . . , gn i has index ≤ m, so does π −1 (A) in Fn . Conversely, if B ⊂ Fn has index
≤ m, so does π(B) in hg1 , . . . , gn i. To define VAm,n , we then enumerate the subgroups of
index ≤ m of Fn . For each subgroup, we choose a finite set of generators wi (x1 , . . . , xn )
and we write the system of equations [wi (g1 , . . . , gn ), wj (g1 , . . . , gn )] = 1. This proves the
claim.
By Lemma 9.6 (and Zorn’s lemma), any g is contained in a maximal K-virtually abelian
subgroup. The second property of Definition 9.7 can be restated as follows: any finitely
generated virtually abelian group is K-virtually abelian, and if hg, hi and hg, g1 , . . . , gn i
are K-virtually abelian, with g of order > K, then hg, h, g1 , . . . , gn i is K-virtually abelian.
This is defined by a set of universal sentences constructed using the VAm,n ’s.
92
If the first two properties of the definition hold, the third one is expressed by saying
that, if g has order > K and hg, hgh−1 i is K-virtually abelian, so is hg, hi. This is a set of
universal sentences as well.
Recall that a Γ-limit group is defined as a limit of subgroups of Γ in the space of marked
groups. Proposition 9.9 implies that, if Γ is K-CSA, then any Γ-limit group is K-CSA. In
particular:
Corollary 9.10. Let Γ be a hyperbolic group. There exists K such that any Γ-limit group
is K-CSA.
Moreover, any subgroup of a Γ-limit group G contains a non-abelian free subgroup or
is K-virtually abelian.
Remark 9.11. We will not use the “moreover”. There are additional restrictions on the
virtually abelian subgroups. For instance, there exists N ≥ 1 such that, if hgh−1 = g −1
for some g of infinite order, then hg 0N h−1 = g 0−N for all g 0 of infinite order in M (g).
Proof. The first assertion is immediate from Proposition 9.9.
Now let H be an infinite subgroup of G not containing F2 . By [Kou98, Proposition
3.2], there exists a number M such that, if x1 , . . . , xM are distinct elements of Γ, some
element of the form xi or xi xj has infinite order (i.e. order > K). This universal statement
also holds in G, so H contains an element g of infinite order. Recall that there exists a
number N such that, if x, y ∈ Γ, then xN and y N commute or generate F2 (see [Del96]).
The same statement holds in G since, for each non-trivial word w, the universal statement
[xN , y N ] 6= 1 ⇒ w(xN , y N ) 6= 1 holds in Γ hence in G. Thus, for all h ∈ H, the elements
g N and hg N h−1 commute. By Lemma 9.8, H normalizes M (g), so H ⊂ M (g) and H is
K-virtually abelian.
Let G be a K-CSA group. We now show how to define a tree of cylinders for virtually
abelian splittings of G (hence also for virtually cyclic splittings).
Definition 9.12 (Virtual commutation). Let A be the family of all virtually abelian subgroups of G, and A∞ the family of infinite subgroups in A. Given H, H 0 ∈ A∞ , define
H ∼ H 0 if M (H) = M (H 0 ). This is an equivalence relation, which we call virtual commutation.
Equivalently, H ∼ H 0 if and only if hH, H 0 i is virtually abelian. The stabilizer G[H] of
the equivalence class of any H ∈ A∞ (for the action of G by conjugation) is the virtually
abelian group M (H).
Lemma 9.13. If G is one-ended relative to H, the equivalence relation ∼ on A∞ is admissible (see Definition 7.1).
Proof. By one-endedness, all (A, H)-trees have edge stabilizers in A∞ . The first two properties of admissibility are obvious. Consider A, B ∈ A∞ with A ∼ B, and an (A, H)-tree T
in which A fixes some a and B fixes some b. Since the group generated by two commuting
elliptic groups is elliptic, there are finite index subgroups A0 ⊂ A and B0 ⊂ B such that
hA0 , B0 i fixes a point c ∈ T . Given any edge e in the segment [a, b], it is contained in [a, c]
or [c, b], so, say, A0 ⊂ Ge and Ge ∼ A0 ∼ A as required.
Theorem 9.14. Let G be a K-CSA group, and H any family of subgroups. Assume that
G is one-ended relative to H.
(1) There is a JSJ tree Ta relative to H over virtually abelian (resp. virtually cyclic)
subgroups. Its collapsed tree of cylinders (Ta )∗c (for virtual commutation) is a JSJ
tree relative to H and all virtually abelian subgroups which are not virtually cyclic.
93
(2) Ta and (Ta )∗c have the same non-virtually abelian vertex stabilizers; flexible vertex
stabilizers which are not virtually abelian are QH with finite fiber.
(3) (Ta )∗c is invariant under all automorphisms of G preserving H. It is compatible with
every (A, H)-tree.
Proof. We apply Corollary 9.1, with A the family of all virtually abelian (resp. virtually
cyclic) subgroups, ∼ virtual commutation, S the family of virtually abelian subgroups, and
C = K.
9.3
Relatively hyperbolic groups
In this subsection we assume that G is hyperbolic relative to a family of finitely generated
subgroups P = {P1 , . . . , Pp }. Recall that a subgroup is parabolic if it is conjugate to a
subgroup of some Pi , elementary if it is virtually cyclic (possibly finite) or parabolic. Any
infinite elementary subgroup is contained in a unique maximal elementary subgroup.
The following lemma is folklore.
Lemma 9.15. Let G be a relatively hyperbolic group.
(1) There exists C > 0 such that any elementary subgroup A < G of cardinality > C is
contained in unique maximal elementary subgroup E(A); moreover, E(A) is parabolic
if A is finite.
(2) If A < G is virtually cyclic but not parabolic, then it is finite of cardinality ≥ C or
C-virtually cyclic.
(3) If A, B < G are elementary subgroups such that A ∩ B has cardinality > C, then
E(A) = E(B).
Proof. The first assertion is contained in [GL15b, Lemma 3.1]. If A < G is virtually cyclic
but not C-virtually cyclic, its maximal finite normal subgroup F has cardinality > C. Thus
F is parabolic by (1), and so is A since E(A) = E(F ). This proves the second assertion.
The third assertion immediately follows from the first.
Definition 9.16 (Co-elementary). We say that two infinite elementary subgroups A, B
are co-elementary if hA, Bi is elementary, or equivalently if E(A) = E(B). This is an
equivalence relation ∼ on the set of infinite elementary subgroups.
We let A be either the class of elementary subgroups, or the class of virtually cyclic
groups. In both cases, co-elementarity is an equivalence relation on A∞ .
Lemma 9.17. Let A be the family of elementary subgroups (resp. of virtually cyclic subgroups), and let H be any family of subgroups. If every Pi is small in (A, H)-trees, the
co-elementarity equivalence relation on A∞ is admissible (relative to H).
Proof. We fix an (A, H)-tree T with infinite edge stabilizers. We assume that A ∼ B, and
that A, B fix a, b respectively in T . We must show Ge ∼ A for every edge e ⊂ [a, b]. This is
clear if hA, Bi is not parabolic (hence is virtually cyclic), since then A ∩ B is infinite (it has
finite index in A and B) and contained in Ge , so A ∼ (A ∩ B) ∼ Ge . Assume therefore that
hA, Bi is contained in some Pi . By assumption Pi is small in T . We distinguish several
cases.
If Pi fixes a point c, the edge e is contained in [a, c] or [b, c], and Ge contains A or B
so is equivalent to A and B. The argument is the same if Pi fixes an end of T (with c at
infinity). The last case is when Pi acts dihedrally on a line L. Let a0 , b0 be the projections
of a, b on L. They are fixed by A and B respectively. If e is contained in [a, a0 ] or [b, b0 ],
then Ge contains A or B, so we may assume e ⊂ [a0 , b0 ]. Now a subgroup A0 ⊂ A of index
at most 2 fixes L pointwise, so A0 ⊂ Ge and Ge ∼ A0 ∼ A.
94
The lemma allows us to define trees of cylinders. The stabilizer G[A] of the equivalence
class of any A ∈ A∞ (for the action of G by conjugation) is E(A), it is small in (A, H)-trees
if every Pi is. Note that Pi is small in (A, H)-trees if it does not contain F2 , or is contained
in a group of H.
When A is the class of elementary subgroups, no collapsing is necessary: (Tc )∗ = Tc .
On the other hand, if A is the class of virtually cyclic subgroups, and some of the Pi ’s are
not virtually cyclic, one may have G[A] ∈
/ A and (Tc )∗ may be a proper collapse of Tc .
Theorem 9.18. Let G be hyperbolic relative to a family of finitely generated subgroups
P = {P1 , . . . , Pp }, with no Pi virtually cyclic. Let A be the class of all elementary subgroups
of G (resp. of all virtually cyclic subgroups). Let H be any family of subgroups.
If G is one-ended relative to H, and every Pi is small in (A, H)-trees, then:
(1) there is a JSJ tree Ta relative to H over elementary (resp. virtually cyclic) subgroups;
its collapsed tree of cylinders (Ta )∗c (for co-elementarity) is a JSJ tree relative to
H ∪ P.
(2) Ta and (Ta )∗c have the same non-elementary vertex stabilizers; flexible vertex stabilizers which are not elementary are QH with finite fiber;
(3) (Ta )∗c is invariant under all automorphisms of G preserving P and H, and is compatible with every (A, H)-tree.
When G is hyperbolic and H = ∅, the tree (Ta )∗c = (Ta )c is the virtually cyclic JSJ tree
constructed by Bowditch [Bow98] using the topology of ∂G.
Removing virtually cyclic groups from P does not destroy relative hyperbolicity; the
assumption that no Pi is virtually cyclic makes statements simpler and causes no loss of
generality.
Proof. We apply Corollary 9.1, with C as in Lemma 9.15 and S the family of all elementary
subgroups (we use Remark 9.2 if we work over virtually cyclic groups and some Pi is a
torsion group). All groups in Snvc are parabolic, and every Pi is in Snvc . In particular,
a tree is relative to Snvc if and only if it is relative to P. Automorphisms preserving P
preserve the set of elementary subgroups, so Corollary 7.4 applies.
The assumption that parabolic groups Pi are small in (A, P)-trees is automatic as soon
as H contains P, since we consider splittings relative to H. We therefore get:
Corollary 9.19. Let G be hyperbolic relative to a finite family of finitely generated subgroups P = {P1 , . . . , Pp }. Let A be the family of elementary subgroups of G. Let H be any
family of subgroups containing P.
If G is one-ended relative to H, there is a JSJ tree over A relative to H which is equal
to its tree of cylinders, invariant under automorphisms of G preserving H, and compatible
with every (A, H)-tree. Its non-elementary flexible vertex stabilizers are QH with finite
fiber.
In particular:
Corollary 9.20. Let G be hyperbolic relative to a finite family of finitely generated subgroups P = {P1 , . . . , Pp }. Let A be the family of elementary subgroups of G.
If G is one-ended relative to P, there is a JSJ tree over A relative to P which is equal
to its tree of cylinders, invariant under automorphisms of G preserving P, and compatible
with every (A, P)-tree. Its non-elementary flexible vertex stabilizers are QH with finite
fiber.
Note that G is finitely presented relative to P, so existence of a JSJ tree also follows
from Theorem 2.20.
95
9.4
Virtually cyclic splittings
In this subsection we consider splittings of G over virtually cyclic groups, assuming smallness of their commensurators.
Let A be the family of virtually cyclic (possibly finite) subgroups of G, and A∞ the
family of all infinite virtually cyclic subgroups. Recall that two subgroups A and B of G
are commensurable if A ∩ B has finite index in A and B. The commensurability relation
∼ is an admissible relation on A∞ (see [GL11]), so one can define a tree of cylinders.
The stabilizer G[A] of the equivalence class of a group A ∈ A∞ is its commensurator
Comm(A), consisting of elements g such that gAg −1 is commensurable with A.
Corollary 9.1 yields:
Theorem 9.21. Let A be the family of virtually cyclic subgroups, and let H be any set
of subgroups of G, with G one-ended relative to H. Let S be the set of subgroups of
commensurators of infinite virtually cyclic subgroups. Assume that there is a bound C for
the order of finite subgroups of G, and that all groups of S are small in (A, H)-trees. Then:
(1) There is a virtually cyclic JSJ tree Ta relative to H. Its collapsed tree of cylinders
(Ta )∗c (for commensurability) is a virtually cyclic JSJ tree relative to H and the groups
of S which are not virtually cyclic.
(2) Ta and (Ta )∗c have the same vertex stabilizers not in S; their flexible subgroups commensurate some infinite virtually cyclic subgroup, or are QH with finite fiber.
(3) (Ta )∗c is invariant under all automorphisms of G preserving H. It is compatible with
every (A, H)-tree.
Remark 9.22. This applies if G is a torsion-free CSA group, or a K-CSA group, or any relatively hyperbolic group whose finite subgroups have bounded order as long as all parabolic
subgroups are small in (A, H)-trees.
If G is K-CSA, the trees of cylinders of a given T for commutation and for commensurability belong to the same deformation space (this follows from Lemma 9.8).
We also have:
Theorem 9.23. Let G be torsion-free and commutative transitive. Let H be any family of
subgroups. If G is freely indecomposable relative to H, then:
(1) There is a cyclic JSJ tree Ta relative to H. Its collapsed tree of cylinders (Ta )∗c
(for commensurability) is a JSJ tree relative to H and all subgroups isomorphic to a
solvable Baumslag-Solitar group BS(1, s).
(2) Ta and (Ta )∗c have the same non-solvable vertex stabilizers. Their flexible subgroups
are QH (they are surface groups), unless G = Z2 .
(3) (Ta )∗c is invariant under all automorphisms of G preserving H. It is compatible with
every (A, H)-tree.
Recall that G is commutative transitive if commutation is a transitive relation on G\{1}.
Remark 9.24. We cannot apply Corollary 9.1 directly, because we cannot claim that G[A] ,
the commensurator of a cyclic subgroup A = hai, is a BS(1, s). Note however that G[A]
is metabelian: if g commensurates A, there is a relation g ap g −1 = aq ; mapping g to p/q
defines a map from G[A] to Q∗ whose kernel is the centralizer of A, an abelian group.
Proof. By Proposition 6.5 of [GL11], if T is any tree with cyclic edge stabilizers, a vertex stabilizer of its collapsed tree of cylinders Tc∗ which is not elliptic in T is a solvable
Baumslag-Solitar group BS(1, s) (with s 6= −1 because of commutative transitivity). In
96
particular, T S-dominates Tc∗ , with S consisting of all groups contained in a BS(1, s)
subgroup.
We may therefore apply Theorem 8.7, taking T ∗ := Tc∗ , and argue as in the proof
of Corollary 9.1, using Lemmas 8.14 and Lemma 7.15 (which applies since G[A] cannot
contain F2 ). No group in S can be flexible, except if Gv = G ' Z2 , so all flexible groups
are QH surface groups.
9.5
The Zmax -JSJ decomposition
In this section, G is a one-ended hyperbolic group. We consider splittings of G over
virtually cyclic subgroups (necessarily infinite), and for simplicity we assume H = ∅.
Theorem 9.18 yields a tree T = (Ta )∗c = (Ta )c , which is the tree of cylinders of any
JSJ tree. This tree is itself a JSJ tree, it is canonical (in particular, invariant under
automorphisms), and its flexible vertex stabilizers are QH with finite fiber. It is in fact the
tree constructed by Bowditch in [Bow98].
It has been noticed by several authors [Sel97b, DG08, DG11] that it is sometimes useful
to replace T by a slightly different tree whose edge stabilizers are maximal virtually cyclic
subgroups with infinite center.
To motivate this, recall that there is a strong connection between splittings and automorphisms. By Paulin’s theorem [Pau91] combined with Rips’s theory of actions on
R-trees [BF95], G splits over a virtually cyclic subgroup whenever Out(G) is infinite.
Conversely, suppose G = A ∗C B, with C virtually cyclic (there is a similar discussion
for HNN extensions). If c belongs to the center of C, it defines a Dehn twist τc : the
automorphism of G which is conjugation by c on A and the identity on B.
But this does not always imply that Out(G) is infinite (see [MNS99]). There are two
reasons for this. First, even though C is infinite by one-endedness, its center may be
finite, for instance if C is infinite dihedral (see Subsection 1.1). Second, if some power of
c centralizes A or B, then the image of τc in Out(G) has finite order.
We therefore consider the set Z of subgroups C < G that are virtually cyclic with
infinite center, and the family Zmax consisting of the maximal elements of Z (for inclusion).
It is now true that Out(G) is infinite if and only if G splits over a group C ∈ Zmax
([Sel97b, DG11, Car11, GL11]).
We say that a subgroup is a Z-subgroup or a Zmax -subgroup if it belongs to Z or
Zmax . For C ∈ Z, we denote by Ĉ the unique Zmax -subgroup of G containing C (it is the
pointwise stabilizer of the pair of points of ∂G fixed by C).
A tree is a Z-tree, or a Zmax -tree, if its edge stabilizers are in Z or Zmax .
Definition 9.25 (Zmax -JSJ tree). A Zmax -tree is a Zmax -JSJ tree if it is elliptic with
respect to every Zmax -tree, and maximal (for domination) for this property.
Beware that Z and Zmax are not stable under taking subgroups, so this does not fit in
our usual setting.
All Zmax -JSJ trees belong to the same deformation space, the Zmax -JSJ deformation
space. As in Subsection 2.3, this follows from Proposition 2.2, but we need to know that,
given Zmax -trees T1 , T2 , any standard refinement T̂1 of T1 dominating T2 is a Zmax -tree.
To see this, consider an edge e of T̂1 . If its image in T1 is an edge, then Ge is an edge
stabilizer of T1 so is Zmax . If not, e is contained in the preimage Yv of a vertex v of T1 .
The group Ĝe is elliptic in T1 (because it contains Ge with finite index). If it fixes some w,
the segment between v and w is fixed by Ge , hence by Ĝe because T1 is a Zmax -tree. We
deduce that Ĝe fixes v, and therefore leaves Yv invariant. The fact that Yv maps injectively
into the Zmax -tree T2 now implies that Ĝe fixes e, since it fixes every edge in the image of
e in T2 .
97
Remark 9.26. This argument is based on the following useful fact: if a subgroup H < G
fixes a vertex v in a Zmax -tree, and H contains a group C ∈ Z, then Ĉ fixes v.
In this section we shall construct and describe a canonical Zmax -JSJ tree. Because
of the relation between Zmax -splittings and infiniteness of Out(G) mentioned above, it is
algorithmically computable (for computability of the usual JSJ decomposition, see [Tou09]
and [Bar16]).
Lemma 9.27. Given any Z-tree T , one can construct a Zmax -tree TZmax with the following
properties:
(1) T dominates TZmax ;
(2) every Zmax -tree S dominated by T is dominated by TZmax ;
(3) every edge stabilizer of TZmax has finite index in some edge stabilizer of T .
Example 9.28. It may happen that TZmax is trivial even though T is not. This occurs for
instance for T corresponding to a splitting of the form A ∗a=ck hci.
Proof. Let T 0 be the quotient of T by the smallest equivalence relation such that, for all
edges e ⊂ T and all h ∈ Ĝe , we have h.e ∼ e. We shall give an alternative description
of T 0 , which shows that it is a Zmax -tree satisfying all the required properties; however,
it may happen that T 0 is not minimal (it may even be trivial), so we define TZmax as the
minimal G-invariant subtree of T 0 , and the lemma follows.
We construct T 0 by folding. We argue by induction on the number of G-orbits of edges
e with Ge 6= Ĝe . Let e be such an edge (if there is none, T 0 = T is a Zmax -tree). Since
[Ĝe : Ge ] < ∞, the group Ĝe is elliptic in T . If one of the endpoints of e is fixed by Ĝe ,
let T1 be the tree obtained by folding together all the edges in the Ĝf -orbit of Gf , for
every edge f in the G-orbit of e. If not, let e0 be the first edge in the shortest path joining
Fix Ĝe to e. Since this path is fixed by Ge , one has Ge ⊂ Ge0
Ĝe = Ĝe0 , and one can
fold the edges in the Ĝe0 -orbit of e0 . In both cases we obtain a tree T1 having fewer orbits
of edges with Ge 6= Ĝe , and any map T → S factors through T1 . The lemma now follows
by induction.
Remark 9.29. A similar construction is used in Section 5 of [GL15a]: G is a toral relatively
hyperbolic group, T is a tree with abelian edge stabilizers, and it is replaced by a tree
whose edge stabilizers are abelian and stable under taking roots.
We denote by A the family consisting of all subgroups C ∈ Z and all their finite
subgroups (alternatively, one could include all finite subgroups of G). It is stable under
taking subgroups, and since G is one-ended A-trees have edge stabilizers in Z. Let T =
(Ta )∗c be the canonical JSJ tree over A provided by Theorem 9.18. Its flexible vertex
stabilizers are QH with finite fiber, and the underlying orbifold has no mirrors (see Theorem
6.5).
Let TZmax be the tree associated to T by Lemma 9.27. It is a Zmax -tree, which is elliptic
with respect to every Zmax -tree by Assertion (3) of the lemma. Unfortunately, it is not
always a Zmax -JSJ tree. We illustrate this on the Klein bottle group K (of course K is
not hyperbolic, see hyperbolic examples below).
As pointed out in Subsection 3.4, the cyclic JSJ decomposition of K is trivial, and K is
flexible because it has two cyclic splittings, corresponding to the presentations K = ha, t |
tat−1 = a−1 i = hti ∗t2 =v2 hvi. Thus T and TZmax are trivial trees. Note, however, that the
amalgam is not over a Zmax -subgroup (the group generated by t2 is not a maximal cyclic
subgroup). It follows that the Bass-Serre tree of the HNN extension is elliptic with respect
to every Zmax -tree, and is a Zmax -JSJ tree.
98
Geometrically, let Σ be a flat Klein bottle, or a compact hyperbolic surface, or more
generally a hyperbolic orbifold as in Theorem 6.5 (we allow cone points, but not mirrors).
An essential simple closed geodesic γ on Σ defines a splitting over a cyclic group, which is
in Zmax if and only if γ is 2-sided (see Subsection 5.1.4). The Zmax -JSJ tree is trivial if
and only if every essential 2-sided simple closed geodesic crosses (transversely) some other
2-sided geodesic.
This happens in almost all cases, but there are exceptions: the flat Klein bottle, the
Klein bottle with one conical point, and the Klein bottle with one open disc removed. On a
flat Klein bottle, all essential 2-sided simple closed geodesics are isotopic. In the other two
exceptional cases (which are hyperbolic), there is a unique essential 2-sided simple closed
geodesic.
We can now construct a canonical Zmax -JSJ tree T̂Zmax . If no orbifold Σv underlying
a QH vertex v of the canonical JSJ tree T is an exceptional one, we let T̂Zmax be the tree
obtained by applying Lemma 9.27 to T . Now suppose that there are vertices v with Σv a
Klein bottle with one conical point (in which case Gv = G because ∂Σ = ∅), or a Klein
bottle with one open disc removed. We then refine T at these vertices, using the splitting of
Σv dual to the unique essential 2-sided geodesic, and we apply the construction of Lemma
9.27 to the tree T̂ thus obtained.
Proposition 9.30. Let G be a one-ended hyperbolic group. The tree T̂Zmax constructed
above is a canonical Zmax -JSJ tree.
Proof. First suppose that T has no exceptional QH vertex. Then T̂Zmax = TZmax , and by
Assertion (3) of Lemma 9.27 it is elliptic with respect to every Zmax -tree. It is canonical
because T is canonical and the definition of TZmax given in the first paragraph of the proof
of Lemma 9.27 does not involve choices. We only need to prove maximality: any vertex
stabilizer of TZmax is elliptic in every tree S which is elliptic with respect to every Zmax -tree.
Recall that T is a tree of cylinders, so is bipartite (see Subsection 7.1). If v ∈ V1 (T ), its
stabilizer in TZmax is the same as in T (a maximal virtually cyclic subgroup). It is elliptic
in S because it contains an edge stabilizer of T with finite index.
If two edges of T are folded when passing from T to TZmax , they have commensurable
stabilizers, so belong to the same cylinder of T (which is the star of a vertex in V1 ). This
implies that, if v ∈ V0 (T ), its stabilizer in TZmax is a multiple amalgam (i.e. a tree of
groups) Ĝv = Gv ∗B1 B̂1 · · · ∗Bk B̂k , where B1 , . . . , Bk are representatives of conjugacy
classes of incident edge stabilizers. The group Gv is clearly elliptic in S if it is rigid, and
also if it is QH with non-exceptional underlying orbifold because no Zmax -splitting of Gv
relative to its incident edge group is universally elliptic. It follows that Ĝv is elliptic by
Remark 9.26.
The argument when there are exceptional QH vertices is similar. Refining T replaces
the exceptional QH vertices by QH vertices whose underlying orbifold is a pair of pants or
an annulus with a conical point; their stabilizers do not split over a Zmax -subgroup relative
to the boundary subgroups.
Remark 9.31. The proof shows that flexible vertex groups of T̂Zmax are QH with sockets
(also called sockets [Sel97b], or orbisockets [DG11]), i.e. QH groups with roots added to
the boundary subgroups. More precisely, they are of the form Ĝv = Gv ∗B1 B̂1 · · · ∗Bk B̂k
with Gv a QH vertex group of T and B1 , . . . , Bk representatives of the conjugacy classes of
boundary subgroups of Gv . The incident edge groups of Ĝv in T̂Zmax are the B̂i ’s (some of
them may be missing when the tree T 0 defined in the proof of Lemma 9.27 is not minimal).
Remark 9.32. In applications to model theory, hyperbolic surfaces Σ which do not carry
a pseudo-Anosov diffeomorphism play a special role. There are four of them: the pair of
pants, the twice-punctured projective plane, the once-punctured Klein bottle, the closed
99
non-orientable surface of genus 3. The first two have finite mapping class group, but the
other two do not and this causes problems (see the proof of Proposition 5.1 in [GLS17]).
When a once-punctured Klein bottle appears in a QH vertex, one may refine the splitting as explained above, using the unique essential 2-sided simple closed geodesic γ (this
creates a QH vertex based on a pair of pants). The Dehn twist Tγ around γ generates a
finite index subgroup of the mapping class group of Σ. It acts trivially on every vertex
group of the refined splitting.
Similarly, if Σ is a closed non-orientable surface of genus 3, there is a unique 1-sided
simple geodesic γ whose complement is orientable (see Proposition 2.1 of [GAnMB06]). It
is the core of a Möbius band whose complement is a once-punctured torus Σ0 (unlike Σ, it
carries a pseudo-Anosov diffeomorphism). The mapping class group of Σ leaves γ invariant
and preserves the cyclic splitting of π1 (Σ) given by decomposing Σ as the union of Σ0 and
a Möbius band. It is isomorphic to GL(2, Z), the mapping class group of Σ0 ,
These refinements give a canonical way of modifying the JSJ decomposition of a torsionfree one-ended hyperbolic group (described in Subsection 9.1) so that all surfaces appearing
in QH vertices have a mapping class group which is finite or contains a pseudo-Anosov map.
Part V
Compatibility
As usual, we fix a family A of subgroups which is stable under conjugating and taking subgroups, and another family H, and we only consider (A, H)-trees. We work with simplicial
trees, but we often view them as metric trees (with every edge of length 1) in order to
apply the results from the appendix (for instance, the fact that compatibility passes to the
limit). We will freely use some concepts from the appendix, in particular the arithmetic
of trees (Subsection A.5).
In Section 2 we have defined a JSJ tree (of G over A relative to H) as a tree which
is universally elliptic and dominates every universally elliptic tree. Its deformation space
is the JSJ deformation space DJSJ . In the next section we define the compatibility JSJ
deformation space Dco and the compatibility JSJ tree Tco . The deformation space Dco
contains a universally compatible tree and dominates every universally compatible tree.
The tree Tco is a preferred universally compatible tree in Dco . In particular, it is invariant
under automorphisms of G preserving A and H. In Section 11 we give examples, provided
in particular by trees of cylinders (see Section 7).
10
The compatibility JSJ tree
Recall (Subsection 1.4.1) that two trees T1 and T2 are compatible if they have a common
refinement. In other words, there exists a tree T with collapse maps T → Ti .
Definition 10.1 (Universally compatible). A tree T is universally compatible (over A
relative to H) if it is compatible with every tree.
In particular, this means that any tree T 0 can be obtained from T by refining and
collapsing. When T 0 is a one-edge splitting, either T 0 coincides with the splitting associated
to one of the edges of T /G, or one can obtain T 0 /G by refining T /G at some vertex v using a
one-edge splitting of Gv relative to the incident edge groups, and collapsing all the original
edges of T /G.
Definition 10.2 (Compatibility JSJ deformation space). If, among deformation spaces
containing a universally compatible tree, there is one which is maximal for domination, it
100
is unique. It is denoted by Dco and it is called the compatibility JSJ deformation space of
G over A relative to H.
To prove uniqueness, consider universally compatible trees T1 , T2 . By Corollary A.22
we may assume that they are irreducible. They are compatible with each other, and T1 ∨T2
(see Lemma A.24 in the appendix) is universally compatible by Proposition A.26 (2). If
T1 and T2 belong to maximal deformation spaces, we get that T1 , T1 ∨ T2 , and T2 lie in the
same deformation space, proving uniqueness.
Clearly, a universally compatible tree is universally elliptic. This implies that Dco
is dominated by DJSJ . Also note that, if T is universally compatible and J is an edge
stabilizer in an arbitrary tree, then J is elliptic in T (i.e. any tree is elliptic with respect
to T ).
10.1
Existence of the compatibility JSJ space
Theorem 10.3. If G is finitely presented relative to a family H = {H1 , . . . , Hp } of finitely
generated subgroups, the compatibility JSJ space Dco of G (over A relative to H) exists.
The heart of the proof of Theorem 10.3 is the following proposition.
Proposition 10.4. Let G be finitely presented relative to a family H = {H1 , . . . , Hp } of
finitely generated subgroups. Let T0 ← T1 · · · ← Tk ← · · · be a sequence of refinements
of irreducible universally compatible trees. There exist collapses T k of Tk , in the same
deformation space as Tk , such that the sequence T k converges to a universally compatible
simplicial (A, H)-tree T which dominates every Tk .
We view trees as metric, with each edge of length 1, and convergence is in the space
of R-trees (unlike the proof of Theorem 8.1, no rescaling of the metric is necessary here).
The tree T may have redundant vertices.
Proof of Theorem 10.3 from the proposition. We may assume that there is a non-trivial
universally compatible tree. We may also assume that all such trees are irreducible: otherwise it follows from Corollary A.22 (see the appendix) that there is only one deformation
space of trees, and the theorem is trivially true.
Let (Sα )α∈A be the set of (isomorphism classes of) universally compatible trees. We
have to find a universally compatible tree T which dominates every Sα . By Lemma 2.9,
we only need T to dominate all trees in a countable set Sk , k ∈ N.
Let Tk be the lcm S0 ∨ · · · ∨ Sk (see Definition A.27); it is universally compatible by
Assertion (2) of Proposition A.26, and refines Tk−1 . Proposition 10.4 yields the desired
tree T : it dominates every Tk , hence every Sk , and it is universally compatible by Corollary
A.12.
Proof of Proposition 10.4. By Dunwoody’s accessibility (see Proposition 2.24), there exists
a tree S which dominates every Tk (this is where we use finite presentability). But of course
we cannot claim that it is universally compatible.
We may assume that Tk and S are minimal, that Tk+1 is different from Tk , and that
the gcd S ∧ Tk (see Definition A.23) is independent of k. We define Sk = S ∨ Tk ; it has
no redundant vertices (see Remark A.25). We denote by ∆k , Γ, Γk the quotient graphs of
groups of Tk , S, Sk , and we let πk : Γk → Γ be the collapse map (see Figure 13). We denote
by ρk the collapse map Γk+1 → Γk .
The trees Sk all belong to the deformation space of S, and Sk+1 strictly refines Sk . In
particular, the number of edges of Γk grows. The idea now is the following. Accessibility
holds within a given deformation space (see [GL07a] page 147; this is an easy form of
accessibility, which requires no smallness or finite presentability hypothesis, and in any
101
cv
A
Bk
C1
C2
...
Tk /G = ∆k
Ck
Sk /G = Γk
A
C1
C2
A
Bk
Ck
T k /G = ∆k
...
u
B
C
Ck
A
πk
B
Ck
C
Sk′ /G
A
B
C
S/G = Γ
Figure 13: Segments in the quotients of the trees Tk , S, Sk , T k , Sk0 , with C1 ⊃ C2 ⊃ · · · ⊃
Ck ⊃ C, and Bk = B ∗C Ck .
case is not used directly here). This implies that the growth of Γk occurs through the
creation of a bounded number of long segments whose interior vertices have valence 2,
with one of the incident edge groups equal to the vertex group (but the other edge group
is smaller than the vertex group, since Sk has no redundant vertices). We now make this
precise.
Fix k. For each vertex v ∈ Γ, define Yv = πk−1 ({v}) ⊂ Γk . The Yv ’s are disjoint, and
edges of Γk not contained in ∪v Yv correspond to edges of Γ.
Since Sk and S are in the same deformation space, Yv is a tree of groups, and it contains
a vertex cv whose vertex group equals the fundamental group of Yv (which is the vertex
group of v in Γ). This cv may fail to be unique, but we can choose one for every k in a
way which is compatible with the maps ρk . We orient edges of Yv towards cv . The group
carried by such an edge is then equal to the group carried by its initial vertex.
Say that a vertex u ∈ Yv is peripheral if u = cv or u is adjacent to an edge of Γk which
is not in Yv (i.e. is mapped onto an edge of Γ by πk ). By minimality of Sk , each terminal
vertex u0 of Yv is peripheral (because it carries the same group as the initial edge of the
segment u0 cv ).
In each Γk , the total number of peripheral vertices is bounded by 2|E(Γ)| + |V (Γ)|. It
follows that the number of points of valence 6= 2 in ∪v Yv is bounded. Cutting each Yv at
its peripheral vertices and its points of valence ≥ 3 produces the segments of Γk mentioned
earlier. On the example of Figure 13, there is one segment cv u in Γk , corresponding to the
edges labelled C1 , . . . , Ck . The point cv ∈ Γk is the vertex labelled by A. The vertex v of Γ
to which the segment corresponds is the vertex of Γ labelled A. The vertex u is peripheral.
Having defined segments for each k, we now let k vary. The preimage of a segment
of Γk under the map ρk is a union of segments of Γk+1 . Since the number of segments is
bounded independently of k, we may assume that ρk maps every segment of Γk+1 onto a
segment of Γk . In particular, the number of segments is independent of k.
Recall that we have oriented the edges of Yv towards cv . Each edge contained in ∪v Yv
carries the same group as its initial vertex, and edges in a given segment are coherently
oriented. Segments are therefore oriented.
There are various ways of performing collapses on Γk . Collapsing all edges contained
in segments yields Γ (this does not change the deformation space). On the other hand,
one obtains ∆k = Tk /G from Γk by collapsing some of the edges which are not contained
in any segment (all of them if S ∧ Tk is trivial).
The segments of Γk may be viewed as segments in ∆k , but collapsing the initial edge
of a segment of ∆k may now change the deformation space (if the group carried by the
initial point of the segment has increased when Γk is collapsed to ∆k ).
We define a graph of groups ∆k by collapsing, in each segment of ∆k , all edges but
the initial one. The corresponding tree T k is a collapse of Tk which belongs to the same
deformation space as Tk . Moreover, the number of edges of ∆k (prime factors of T k ) is
102
constant: there is one per segment, and one for each common prime factor of Tk and S.
Let `k : G → Z be the length function of T k .
Lemma 10.5. The sequence `k is non-decreasing (i.e. every sequence `k (g) is non-decreasing)
and converges.
Proof. The difference between `k and `k−1 comes from the fact that initial edges of segments
of ∆k may be collapsed in ∆k−1 . Fix a segment L of ∆k . Let ek be its initial edge. We
assume that ek is distinct from the edge fk mapping onto the initial edge of the image of
L in ∆k−1 .
Assume for simplicity that ek and fk are adjacent (the general case is similar). The
group carried by fk is equal to the group carried by its initial vertex vk . A given lift ṽk
of vk to Tk is therefore adjacent to only one lift of fk (but to several lifts of ek ). On
any translation axis in Tk , every occurrence of a lift of fk is immediately preceded by
an occurrence of a lift of ek . The length function of the prime factor of Tk and T k−1
corresponding to fk is therefore bounded from above by that of the prime factor of Tk and
T k corresponding to ek . Since this is true for every segment, we get `k−1 ≤ `k as required.
Let Sk0 = S ∨T k . It collapses to S, belongs to the same deformation space as S (because
it is a collapse of Sk ), and the number of edges of Sk0 /G is bounded. By an observation
due to Forester (see [GL07a, p. 169]), this implies an inequality `(Sk0 ) ≤ C`(S), with C
independent of k. Since `k ≤ `(Sk0 ), we get convergence.
We call ` the limit of `k . It is the length function of a tree T because the set of length
functions of trees is closed [CM87]. This tree is simplicial because ` takes values in Z (see
Example A.4), and irreducible because `k is non-decreasing. It is universally compatible
as a limit of universally compatible trees, by Corollary A.12. Since ` ≥ `k , every g ∈ G
elliptic in T is elliptic in Tk , and T dominates Tk by Lemma 2.6. Each Hi is elliptic in T
because it is finitely generated and its elements are elliptic.
There remains to prove that every edge stabilizer Ge of T belongs to A. If Ge is finitely
generated, there is a simple argument using the equivariant Gromov topology. In general,
we argue as follows. We may find hyperbolic elements g, h such that Ge is the stabilizer of
the bridge between A(g) and A(h) (the bridge might be e ∪ e0 as in the proof of Lemma
A.21 if an endpoint of e is a valence 2 vertex). Choose k so that the values of `k and `
coincide on g, h, gh. In particular, the axes of g and h in T k are disjoint.
Any s ∈ Ge is elliptic in T k since `k ≤ `. Moreover, `k (gs) ≤ `(gs) ≤ `(g) = `k (g).
The fixed point set of s in T k must therefore intersect the axis of g, since otherwise
`k (gs) > `k (g). Similarly, it intersects the axis of h. It follows that Ge fixes the bridge
between the axes of g and h in T k , so Ge ∈ A. This concludes the proof of Proposition
10.4.
10.2
The compatibility JSJ tree Tco
We shall now deduce from [GL07a] that Dco , if irreducible, contains a canonical tree Tco ,
which we call the compatibility JSJ tree. It is fixed under any automorphism of G that
leaves Dco invariant. Note that Tco may be refined to a JSJ tree (Lemma 2.15).
Lemma 10.6. An irreducible deformation space D can only contain finitely many reduced
universally compatible trees.
Recall (see Subsection 1.4) that T is reduced if no proper collapse of T lies in the same
deformation space as T . If T is not reduced, one may perform collapses so as to obtain a
reduced tree T 0 in the same deformation space (and T 0 is universally compatible if T is).
Proof. This follows from results in [GL07a]. We refer to [GL07a] for definitions not
given here. Suppose that there are infinitely many reduced universally compatible trees
103
T1 , T2 , . . . . Let Sk = T1 ∨ T2 ∨ · · · ∨ Tk . It is an (A, H)-tree and belongs to D by Assertion
(3) of Proposition A.26 .
As pointed out on page 172 of [GL07a], the tree Sk is BF-reduced, i.e. reduced in the
sense of [BF91], because all its edges are surviving edges (they survive in one of the Ti ’s),
and the space D is non-ascending by Assertion (4) of Proposition 7.1 of [GL07a]. Since
there is a bound CD for the number of orbits of edges of a BF-reduced tree in D ([GL07a,
Proposition 4.2]), the sequence Sk is eventually constant.
Remark 10.7. The proof shows that D only contains finitely many reduced trees which are
compatible with every tree in D.
Corollary 10.8. If D is irreducible and contains a universally compatible tree, it has a
preferred element: the lcm of its reduced universally compatible trees.
This preferred element is universally compatible by Assertion (2) of Proposition A.26.
Definition 10.9 (Compatibility JSJ tree Tco ). If the compatibility JSJ deformation space
Dco exists and is irreducible, its preferred element is called the compatibility JSJ tree Tco
of G (over A relative to H). If Dco is trivial, we define Tco as the trivial tree (a point).
It may happen that Dco is neither trivial nor irreducible. It then follows from Remark
A.22 that it is the only non-trivial deformation space of trees. If there is a unique reduced
tree T in Dco (in particular, if Dco consists of actions on a line), we define Tco = T .
Otherwise we do not define Tco . See Subsection 11.4 for an example where Dco consists of
trees with exactly one fixed end.
11
Examples
We start with various examples, and we then explain in Subsection 11.7 that the tree of
cylinders (Ta )∗c of Section 7 belongs to the compatibility deformation space if all groups
G[A] belong to A.
For simplicity we assume H = ∅ in Subsections 11.1 through 11.6.
11.1
Free groups
When A is Aut(G)-invariant, the compatibility JSJ tree Tco is Out(G)-invariant. This
sometimes forces it to be trivial. Suppose for instance that G has a finite generating set ai
such that all elements ai and ai a±1
j (i 6= j) belong to the same Aut(G)-orbit. Then the only
Out(G)-invariant length function ` is the trivial one. This follows from Serre’s lemma (see
Subsection 1.2) if the generators are elliptic, from the inequality max(`(ai aj ), `(ai a−1
j )) ≥
`(ai ) + `(aj ) (see Lemma A.1) if they are hyperbolic. In particular:
Proposition 11.1. If G is a free group and A is Aut(G)-invariant, then Tco is trivial.
11.2
Algebraic rigidity
The following result provides simple examples with Tco non-trivial.
Proposition 11.2. Assume that there is only one reduced JSJ tree TJ ∈ DJSJ , and that
G does not split over a subgroup contained with infinite index in a group of A. Then Tco
exists and equals TJ .
Proof. Let T be any A-tree. The second assumption implies that T is elliptic with respect
to TJ by Remark 2.3 of [FP06] or Assertion (3) of Lemma 2.6, so we can consider a standard
refinement T̂ of T dominating TJ as in Proposition 2.2. Any equivariant map f : T̂ → TJ
must be constant on any edge whose stabilizer is not universally elliptic, hence factors
104
through the tree T 0 obtained from T̂ by collapsing these edges. In particular, T 0 dominates
TJ hence is a JSJ tree because it is universally elliptic. Since TJ is the unique reduced JSJ
tree, T 0 is a refinement of TJ , so TJ is compatible with T . This shows that TJ is universally
compatible. Thus Tco = TJ .
A necessary and sufficient condition for a tree to be the unique reduced tree in its
deformation space is given in [Lev05b] (see also [CF09]).
The proposition applies for instance to free splittings and splittings over finite groups,
whenever there is a JSJ tree with only one orbit of edges. This provides examples of
virtually free groups with Tco non-trivial: any amalgam F1 ∗F F2 with F1 , F2 finite and
F 6= F1 , F2 has this property (with A the set of finite subgroups).
11.3
Free products
Let A consist only of the trivial group. Let G = G1 ∗· · ·∗Gp ∗Fq be a Grushko decomposition
(Gi is non-trivial, not Z, and freely indecomposable, Fq is free of rank q). If p = 2 and
q = 0, or p = q = 1, there is a JSJ tree with one orbit of edges and Tco is a one-edge
splitting as explained above. We now show that Tco is trivial if p + q ≥ 3 (of course it is
trivial also if G is freely indecomposable or free of rank ≥ 2).
Assuming p + q ≥ 3, we actually show that there is no non-trivial tree T with trivial
edge stabilizers which is invariant under a finite index subgroup of Out(G). By collapsing
edges, we may assume that T only has one orbit of edges. Since p + q ≥ 3, we can write
G = A ∗ B ∗ C where A, B, C are non-trivial and A ∗ B is a vertex stabilizer of T . Given
a non-trivial c ∈ C and n 6= 0, the subgroup cn Ac−n ∗ B is the image of A ∗ B by an
automorphism but is not conjugate to A ∗ B. This contradicts the invariance of T .
11.4
(Generalized) Baumslag-Solitar groups
We consider cyclic splittings of generalized Baumslag-Solitar groups (see Subsection 3.5).
First consider a solvable Baumslag-Solitar group BS(1, s), with |s| ≥ 2. In this case
Dco is trivial if s is not a prime power. If s is a prime power, Dco is the JSJ deformation
space (it is not irreducible).
When G = BS(r, s) with none of r, s dividing the other, Proposition 11.2 applies
by [Lev05b]. In particular, Dco is non-trivial. This holds, more generally, when G is
a generalized Baumslag-Solitar group defined by a labelled graph with no label dividing
another label at the same vertex. See [Bee13] for a systematic study of Dco for generalized
Baumslag-Solitar groups.
11.5
The canonical decomposition of Scott and Swarup
Recall that a group is VPCn (resp. VPC≤n ) if it is virtually polycyclic of Hirsch length n
(resp. ≤ n). Let G be a finitely presented group, and n ≥ 1. Assume that G does not split
over a VPCn−1 subgroup, and that G is not VPCn+1 . Let A consist of all subgroups of
VPCn subgroups.
We have shown in [GL10] that the tree of cylinders (for commensurability) of the JSJ
deformation space is (up to subdivision) the Bass-Serre tree TSS of the regular neighbourhood Γn = Γ(Fn : G) constructed by Scott-Swarup in Theorem 12.3 of [SS03].
Since TSS is universally compatible ([SS03, Definition 6.1(1)], or [GL11, Corollary 8.4]
and [GL10, Theorem 4.1]), it is dominated by the compatibility deformation space Dco .
The domination may be strict: if G = BS(r, s), the tree TSS is always trivial but, as
pointed out above, Dco is non-trivial when none of r, s divides the other.
105
11.6
Poincaré duality groups
Let G be a Poincaré duality group of dimension n (see also work by Kropholler on this
subject [Kro90]). Although such a group is not necessarily finitely presented, it is almost
finitely presented [Wal04, Proposition 1.1], which is sufficient for Dunwoody’s accessiblity,
so the JSJ deformation space and the compatibility JSJ deformation space exist. By
[KR89b, Theorem A], if G splits over a virtually solvable subgroup H, then H is VPCn−1 .
We therefore consider the family A consisting of VPC≤n−1 -subgroups.
By [KR89a, Corollary 4.3], for all VPCn−1 subgroups H, the number of coends ẽ(G, H)
is 2. By [KR89a, Theorem 1.3], if G is not virtually polycyclic, then H has finite index in its
commensurator. By Corollary 8.4(2) of [GL11], this implies that the JSJ deformation space
contains a universally compatible tree (namely its tree of cylinders for commensurability),
so equals Dco .
But one has more in this context: any universally elliptic tree is universally compatible.
Indeed, since VPCn−1 -subgroups of G have precisely 2 coends, Proposition 7.4 of [SS03]
implies that any two one-edge splittings T1 , T2 of G over A with edge stabilizers of T1 elliptic
in T2 are compatible. Indeed, strong crossing of almost invariant subsets corresponding to
T1 and T2 occurs if and only edge stabilizers of T1 are not elliptic in T2 ([Gui05, Lemme
11.3]), and the absence of (weak or strong) crossing is equivalent to compatibility of T1
and T2 [SS00]. To sum up, we have:
Corollary 11.3. Let G be a Poincaré duality group of dimension n, with G not virtually
polycyclic. Let A the family of VPC≤n−1 -subgroups. Then Tco exists and lies in the JSJ
deformation space of G over A.
In particular, G has a canonical JSJ tree over A.
11.7
Trees of cylinders
In Sections 8 and 9 we have used trees of cylinders to construct a universally compatible
tree (Ta )∗c (see the last assertion of Corollary 9.1); we always denote by Ta a JSJ tree over
A relative to H, as in Lemma 8.14. We now show that (Ta )∗c belongs to the compatibility
JSJ deformation space under the additional assumption that every stabilizer G[A] belongs
to A (this implies that trees of cylinders have edge stabilizers in A, so (see Subsection 7.1)
collapsing is not needed: Tc = Tc∗ ).
Theorem 11.4. Given A and H, let ∼ be an admissible equivalence on A∞ . Assume that
G is one-ended relative to H, and there exists an integer C such that:
(1) A contains all C-virtually cyclic subgroups, and all subgroups of cardinal ≤ 2C;
(2) if two groups of A∞ are inequivalent, their intersection has order ≤ C;
(3) every stabilizer G[A] belongs to A, but G ∈
/ A;
(4) every G[A] is small in (A, H)-trees.
Then the compatibility JSJ deformation space Dco exists and contains (Ta )c , the tree of
cylinders of JSJ trees (see Corollary 9.1). It is trivial or irreducible, so the JSJ compatibility
tree Tco is defined. Flexible vertex stabilizers of Tco belong to A or are QH subgroups with
finite fiber.
Proof. Corollary 9.1, applied with S = A, shows that (Ta )c is universally compatible and
its flexible vertex stabilizers are in A or QH. The point is to show that (Ta )c is maximal
(for domination) among universally compatible trees. This will prove that Dco exists
106
and contains (Ta )c . It is trivial or irreducible because any tree of cylinders is trivial or
irreducible (see Subsection 7.1).
We consider a universally compatible tree T , and we show that (Ta )c dominates T .
Replacing T by T ∨ (Ta )c (which is universally compatible by Assertion (2) of Proposition
A.26), we can assume that T refines (Ta )c .
We have to show that each vertex stabilizer Gv of (Ta )c is elliptic in T . If Gv is not a
G[A] , then it is elliptic in Ta , hence in T because T , being universally elliptic, is dominated
by Ta . By Assumptions (3) and (4), we can therefore assume that Gv ∈ A, and also that
Gv is small in T .
Since G ∈
/ A, the quotient graph (Ta )c /G is not a point (equivalently, there are at least
two cylinders in Ta ). There are two cases. If the image of v in (Ta )c /G has valence at least
2, we can refine (Ta )c to a minimal tree T 0 (in the same deformation space) having Gv as
an edge stabilizer. Since Gv ∈ A, this is an (A, H)-tree. Its edge group Gv is elliptic in T
because T is universally compatible.
The remaining case is when the image of v in (Ta )c /G has valence 1. We assume that
Gv is not elliptic in T , and we argue towards a contradiction.
Let e be an edge of (Ta )c containing v. We are going to prove that Gv contains a
subgroup G0 of index 2 with Ge ⊂ G0 . Assuming this fact, we can refine (Ta )c to a
minimal (A, H)-tree T 0 in which G0 is an edge stabilizer. As above, G0 is elliptic in T ,
and so is Gv . This is the required contradiction, proving that (Ta )c dominates T .
We now construct G0 . Since we have assumed that T refines (Ta )c , Proposition 1.7 and
Lemma 4.7 imply that Gv contains a hyperbolic element. We know that Gv is small in T ,
so there are only two possibilities.
If there is a fixed end, the action defines a homomorphism χ : Gv → Z (see Subsection
1.2). This homomorphism vanishes on Ge , which is elliptic in T , but is non-trivial because
there is a hyperbolic element, so we define G0 as the preimage of the index 2 subgroup of
the image of ϕ.
If the action is dihedral, we get an epimorphism χ : Gv → Z/2 ∗ Z/2. Since Ge is
elliptic in T , its image under χ is trivial or contained in a conjugate of a Z/2 factor. One
constructs G0 as the preimage of a suitable index 2 subgroup of the image of χ.
This theorem applies directly to abelian splittings of CSA groups (Subsection 9.1),
virtually abelian splittings of K-CSA groups (Subsection 9.2), elementary splittings of
relatively hyperbolic groups (Subsection 9.3), because the condition G[A] ∈ A is satisfied.
In each of these cases we conclude that (Ta )∗c = (Ta )c belongs to Dco . We get for instance:
Corollary 11.5. Let G be a finitely generated one-ended torsion-free CSA group, A the
class of abelian subgroups, and H a family of subgroups. Let ∼ be the commutation relation
among infinite abelian subgroups.
Then the compatibility JSJ deformation space Dco exists and contains the tree of cylinders of any JSJ tree.
Corollary 11.6. Let G be hyperbolic relative to a family of finitely generated subgroups
P = {P1 , . . . , Pp }. Let A be the class of elementary subgroups, and let H any family of
subgroups containing all Pi ’s which contain F2 . Let ∼ be the co-elementary relation on
A∞ .
If G is one-ended relative to H, then the compatibility JSJ deformation space Dco exists
and contains the tree of cylinders of any JSJ tree.
We now consider cyclic splittings, with ∼ the commensurability relation.
Example. Let H be a torsion-free hyperbolic group with property (FA) (it has no nontrivial action on a tree), and hai a maximal cyclic subgroup. Consider the HNN extension
G = hH, t | tat−1 = ai, a one-ended torsion-free CSA group. The Bass-Serre tree T0
107
is a JSJ tree over abelian groups. Its tree of cylinders T1 is the Bass-Serre tree of the
amalgam G = H ∗hai ha, ti, it is also the compatibility JSJ tree over abelian groups by
Theorem 11.4. Over cyclic groups, T0 is a JSJ tree, its (collapsed) tree of cylinders is T1 ,
but the compatibility JSJ tree is T0 (this follows from Proposition 11.2 and [Lev05b]; the
non-splitting assumption of Proposition 11.2 holds over cyclic groups, but not over abelian
groups).
In this example Dco strictly dominates (Ta )∗c . One obtains a tree in Dco by refining
T1 = (Ta )∗c at vertices with group Z2 . This is a general fact.
Theorem 11.7. Let G be a finitely generated torsion-free group. Let A be the family of
cyclic subgroups, and let H be any family of subgroups of G, with G one-ended relative to
H. Assume that commensurators of infinite cyclic subgroups are small in (A, H)-trees.
Then the cyclic compatibility JSJ space Dco relative to H exists. If furthermore G is
not a solvable Baumslag-Solitar group BS(1, s), one obtains a tree in Dco by refining (Ta )∗c
(the collapsed tree of cylinders for commensurability) at some vertices v with Gv virtually
Z2 .
Remark 11.8. If G has torsion, but there is a bound for the order of finite subgroups, a
similar theorem holds for virtually cyclic splittings (with the same proof). In the furthermore, one must assume that G is not virtually BS(1, s); one has to prove that an ascending
HNN extension of an infinite virtually cyclic group is virtually BS(1, s), we leave this as
an exercise to the reader (compare [FM99]).
Proof. By Theorem 9.21, (Ta )∗c is universally compatible, so Dco , if it exists, dominates
(Ta )∗c and is dominated by Ta . By [GL11, Remark 5.11], smallness of commensurators
implies that (Ta )c and (Ta )∗c are in the same deformation space. It follows that any group
elliptic in (Ta )∗c but not in Ta is contained in the commensurator of some A ∈ A∞ , hence
is small in (A, H)-trees.
We shall now show that universally elliptic trees S dominating (Ta )∗c and dominated
by Ta belong to only finitely many deformation spaces. This will prove the existence of
Dco . To determine such a tree S up to deformation, one needs to know the action on S of
vertex stabilizers Gv of (Ta )∗c (up to deformation). This action has universally elliptic edge
stabilizers by Lemma 4.13, and Gv is small in (A, H)-trees or elliptic in Ta (hence in S),
so only two deformation spaces are possible for the action of a given Gv on S by Corollary
3.5. This shows the required finiteness, hence the existence of Dco .
One may obtain a tree T 0 ∈ Dco by refining (Ta )∗c at vertices v with Gv not elliptic
in T 0 . As explained above such a Gv is small in T 0 . There are two possibilities. If Gv
fixes exactly one end, then Dco is an ascending deformation space (as defined in [GL07a,
Section 7]). By Proposition 7.1(4) of [GL07a], Dco cannot be irreducible, so G = Gv is an
ascending HNN extension of a cyclic group, hence isomorphic to some BS(1, s). The other
possibility is that Gv acts on a line, hence is virtually Z2 because edge stabilizers are cyclic
(Gv is isomorphic to Z2 or the Klein bottle group).
Corollary 11.9. Let G be torsion-free and commutative transitive. Let H be any family
of subgroups. If G is freely indecomposable relative to H, and is not a solvable BaumslagSolitar group, the cyclic compatibility JSJ deformation space Dco relative to H exists and
may be obtained by (possibly) refining (Ta )∗c at vertices with stabilizer isomorphic to Z2 .
Proof. The theorem applies because commensurators of non-trivial cyclic subgroups are
metabelian (see Remark 9.24) hence small.
108
A
R-trees, length functions, and compatibility
In this appendix we view a simplicial tree as a metric space (by giving length 1 to every
edge), and more generally we consider R-trees. See [Sha91, Chi01] for basic facts on R-trees.
Recall that two simplicial trees T1 , T2 are compatible if there is a tree that collapses
onto both T1 and T2 . In the context of R-trees (simplicial or not), collapse maps have
a natural generalisation as maps preserving alignment: the image of an arc [a, b] is the
segment [f (a), f (b)] (possibly a point). Compatibility of R-trees thus makes sense.
The length function of an R-tree T with an isometric action of G is the map ` : G → R
defined by `(g) = minx∈T d(x, gx).
The first main result of this appendix is Theorem A.10, saying that two R-trees are
compatible if and only if the sum of their length functions is again a length function. This
has a nice consequence: the set of R-trees compatible with a given tree is closed.
As a warm-up, we give a proof of the following classical facts: a minimal irreducible
R-tree is determined by its length function; the equivariant Gromov-Hausdorff topology
and the axes topology (determined by length functions) agree on the space of irreducible
R-trees (following a suggestion by M. Feighn, we extend this to the space of semi-simple
trees). Our proof does not use based length functions and extends to a proof of Theorem
A.10.
After proving Theorem A.10, we show that pairwise compatibility for a finite set of Rtrees implies the existence of a common refinement. We then define prime factors, greatest
common divisors (gcd’s), least common multiples (lcm’s) for irreducible simplicial trees.
We conclude by explaining how to obtain actions on R-trees by blowing up vertices of JSJ
trees.
We assume that G is finitely generated, but Subsections A.1 to A.4 apply to any
infinitely generated group (hypotheses such as irreducibility ensure that G contains enough
hyperbolic elements). We leave details to the reader.
A.1
Metric trees and length functions
When endowed with a path metric making each edge isometric to a closed interval, a
simplicial tree becomes an R-tree (we usually declare each edge to have length 1). An Rtree is a geodesic metric space T in which any two distinct points are connected by a unique
topological arc (which we often call a segment). Most considerations of the preliminary
section apply to R-trees as well as simplicial trees.
We denote by d, or dT , the distance in a tree T . All R-trees are equipped with an
isometric action of G, and considered equivalent if they are equivariantly isometric. If
λ > 0, we denote by T /λ the tree T equipped with the distance d/λ.
A branch point is a point x ∈ T such that T \ {x} has at least three components. A
non-empty subtree is degenerate if it is a single point, non-degenerate otherwise. If A, B
are disjoint closed subtrees, the bridge between them is the unique arc I = [a, b] such that
A ∩ I = {a} and B ∩ I = {b}.
We say that a map f : T → T 0 preserves alignment, or is a collapse map, if the image
of any segment [a, b] is the segment [f (a), f (b)] (possibly a point). The restriction of f
to [a, b] is then continuous. A map is a collapse map if and only if its restriction to any
segment is continuous, and the preimage of any point is a subtree. Two trees T1 and T2
are compatible if there exists a tree T with collapse maps fi : T → Ti .
If g ∈ G, we denote by `(g) its translation length `(g) = minx∈T d(x, gx). There is no
parabolic isometry in an R-tree, so the minimum is achieved on a non-empty subset of T ,
the characteristic set A(g): the fixed point set if g is elliptic (`(g) = 0), the axis if g is
hyperbolic (`(g) > 0).
The map ` : G → R is the length function of T ; we denote it by `T if there is a risk of
confusion. We say that a map ` : G → R is a length function if there is a tree T such that
109
` = `T .
The action is minimal if there is no proper G-invariant subtree. If G contains a hyperbolic element, there is a unique minimal subtree: the union of translation axes of hyperbolic
elements.
As in Proposition 1.2, if a group H (possibly infinitely generated) acts on an R-tree T ,
one of the following must occur:
• the action is irreducible (there are two hyperbolic elements g, h whose axes have intersection of finite length; for n large, g n and hn generate an F2 acting freely and discretely);
• there is a fixed point in T , or only in its metric completion (trivial action);
• there is an invariant line;
• there is a fixed end (an end of an R-tree is defined as an equivalence class of geodesic
rays up to finite Hausdorff distance).
If H is finitely generated (or finitely generated relative to finitely many elliptic subgroups), and fixes a point in the metric completion of T , then it fixes a point in T . When
there is a fixed end, the length function is the absolute value of a homomorphism χ : H → R
(such length functions are usually called abelian; we do not use this terminology, as it may
cause confusion).
As in [CM87], we say that a minimal T is semi-simple if there is a hyperbolic element,
and either there is an invariant line in T , or the action is irreducible.
We will use the following facts, with T an R-tree with a minimal action of G.
Lemma A.1 ([Pau89]). Let g, h be hyperbolic elements.
(1) If their axes A(g), A(h) are disjoint, then
`(gh) = `(g −1 h) = `(g) + `(h) + 2d(A(g), A(h)) > `(g) + `(h).
The intersection between A(gh) and A(hg) is the bridge between A(g) and A(h).
(2) If their axes meet, then
min(`(gh), `(g −1 h)) ≤ max(`(gh), `(g −1 h)) = `(g) + `(h).
The inequality is an equality if and only if the axes meet in a single point.
Lemma A.2 ([CM87, Theorem 2.7]). T is irreducible if and only if there exist hyperbolic
elements g, h with [g, h] hyperbolic.
Lemma A.3 ([Pau89, Lemma 4.3]). If T is irreducible, any arc [a, b] is contained in the
axis of some g ∈ G.
Example A.4. We use these lemmas to show that, if T has a minimal irreducible action of
G, and ` takes values in Z, then T is a simplicial tree. It suffices to prove that the distance
between any two branch points lies in 12 Z. Given two branch points a, b ∈ T , by Lemma A.3,
one can find hyperbolic elements g, h ∈ G with disjoint axes such that the bridge between
the axes of g and h is precisely [a, b]. By Lemma A.1(1), d(a, b) = 12 (`(gh) − `(g) − `(h)).
A.2
From length functions to trees
Let G be a finitely generated group. Let T be the set of minimal isometric actions of
G on R-trees modulo equivariant isometry. Let Tirr ⊂ T be the set of irreducible R-trees.
The following are classical results:
Theorem A.5 ([AB87, CM87]). Two minimal irreducible R-trees T, T 0 with the same
length function are equivariantly isometric.
110
Theorem A.6 ([Pau89]). The equivariant Gromov-Hausdorff topology and the axes topology agree on Tirr .
By Theorem A.5, the assignment T 7→ `T defines an embedding Tirr → RG . The axes
topology is the topology induced by this embedding. The set of length functions is closed
in RG (even if G is not finitely generated), and when G is finitely generated it is projectively
compact [CM87, Theorem 4.5].
The equivariant Gromov-Hausdorff topology (or just Gromov topology) on T is defined
by the following neighbourhood basis. Given T ∈ T , a number ε > 0, a finite subset
A ⊂ G, and x1 , . . . , xn ∈ T , define Nε,A,{x1 ,...xn } (T ) as the set of trees T 0 ∈ T such that
there exist x01 , . . . , x0n ∈ T 0 with
|dT 0 (x0i , ax0j ) − dT (xi , axj )| ≤ ε
for all a ∈ A and i, j ∈ {1, . . . , n}. We call x0i an approximation of xi in T 0 .
Example A.7. As an illustration of this definition, let us explain why, for a given g ∈ G, the
set of trees T ∈ T such that g fixes a tripod in T is open in the Gromov topology. Recall
that a tripod is the convex hull of 3 points that do not lie in a segment. Let x1 , x2 , x3
(with indices modulo 3) be the endpoints of a tripod fixed by g, and p the center of this
tripod. Let ε be very small compared to the distances dT (p, xi ), and take A = {1, g}. If
T 0 lies in Nε,A,{x1 ,x2 ,x3 } , consider approximation points x0i of xi . Since dT (xi , gxi ) = 0, we
have dT 0 (x0i , gx0i ) < ε. It follows that the midpoint m0i of [x0i , gx0i ] in T 0 is at distance at
most ε/2 from x0i . Now
dT (xi−1 , xi ) + dT (xi , xi+1 ) − dT (xi−1 , xi ) = 2dT (p, xi ) ε,
so
dT 0 (x0i−1 , x0i ) + dT 0 (x0i , x0i+1 ) − dT 0 (x0i−1 , x0i ) ε
and
dT 0 (m0i−1 , m0i ) + dT 0 (m0i , m0i+1 ) − dT 0 (m0i−1 , m0i ) > 0.
It follows that the three points m01 , m02 , m03 do not lie in a segment. But the midpoint of
[x, gx] always belongs to the characteristic set of g, so the characteristic set of g cannot be
a line. Thus g is elliptic, and therefore fixes m01 , m02 , m03 .
The fact that the axes topology is finer than the Gromov topology (which is the harder
half of Theorem A.6) should be viewed as a version with parameters of Theorem A.5: the
length function determines the tree, in a continuous way. As a preparation for the next
subsection, we now give quick proofs of these theorems. Unlike previous proofs, ours does
not use based length functions.
Proof of Theorem A.5. Let T, T 0 be minimal irreducible R-trees with the same length function `. We denote by A(g) the axis of a hyperbolic element g in T , by A0 (g) its axis in T 0 .
By Lemma A.1, A(g) ∩ A(h) is empty if and only if A0 (g) ∩ A0 (h) is empty.
We define an isometric equivariant map f from the set of branch points of T to T 0 ,
as follows. Let x be a branch point of T , and y 6= x an auxiliary branch point. By
Lemmas A.1 and A.3, there exist hyperbolic elements g, h whose axes in T do not intersect,
such that [x, y] is the bridge between A(g) and A(h), with x ∈ A(g) and y ∈ A(h).
Then {x} = A(g) ∩ A(gh) ∩ A(hg). The axes of g and h in T 0 do not intersect, so
A0 (g) ∩ A0 (gh) ∩ A0 (hg) is a single point which we call f (x).
Note that f (x) = ∩k A0 (k), the intersection being over all hyperbolic elements k whose
axis in T contains x: if k is such an element, its axis in T 0 meets all three sets A0 (g),
A0 (gh), A0 (hg), so contains f (x). This gives an intrinsic definition of f (x), independent
of the choice of y, g, and h. In particular, f is G-equivariant. It is isometric because
dT 0 (f (x), f (y)) and dT (x, y) are both equal to 1/2 `(gh) − `(g) − `(h) .
111
We then extend f equivariantly and isometrically first to the closure of the set of branch
points of T , and then to each complementary interval. The resulting map from T to T 0 is
onto because T 0 is minimal.
Proof of Theorem A.6. Given g ∈ G, the map T 7→ `T (g), from Tirr to R, is continuous in
the Gromov topology: this follows from the formula `(g) = max(d(x, g 2 x) − d(x, gx), 0).
This shows that the Gromov topology is finer than the axes topology.
For the converse, we fix ε > 0, a finite set of points xi ∈ T , and a finite set of elements
ak ∈ G. We have to show that, if the length function `0 of T 0 is close enough to ` on a
suitable finite subset of G, there exist points x0i ∈ T 0 such that
|dT 0 (x0i , ak x0j ) − dT (xi , ak xj )| < ε
for all i, j, k.
First assume that each xi is a branch point. For each i, choose elements gi , hi as
in the previous proof, with xi an endpoint of the bridge between A(gi ) and A(hi ). If `0
is close to `, the axes of gi and hi in T 0 are disjoint and we can define x0i as A0 (gi ) ∩
A0 (gi hi ) ∩ A0 (hi gi ). A different choice g̃i , h̃i may lead to a different point x̃0i . But the
distance between x0i and x̃0i goes to 0 as `0 tends to ` because all pairwise distances between
A0 (gi ), A0 (gi hi ), A0 (hi gi ), A0 (g̃i ), A0 (g̃i h̃i ), A0 (h̃i g̃i ) go to 0. It is then easy to complete the
proof.
If some of the xi ’s are not branch points, one can add new points so that each such xi
is contained in an arc bounded by branch points xbi , xci . One then defines x0i as the point
dividing [x0bi , x0ci ] in the same way as xi divides [xbi , xci ].
As suggested by M. Feighn, one may extend the previous results to reducible trees. Let
Tss consist of all minimal trees which are either irreducible or isometric to R (we only rule
out trivial trees and trees with exactly one fixed end).
Every non-zero length function is the length function of a tree in Tss .
Theorem A.8. Two minimal trees T, T 0 ∈ Tss with the same length function are equivariantly isometric. The equivariant Gromov-Hausdorff topology and the axes topology agree
on Tss .
In other words, the assignment T 7→ `T induces a homeomorphism between Tss ,
equipped with the Gromov topology, and the space of non-zero length functions.
We note that the results of [CM87] are stated for all trees in Tss , those of [Pau89] for
trees which are irreducible or dihedral.
Proof. We refer to [CM87, page 586] for a proof of the first assertion when the actions are
not irreducible. Since the set of irreducible length functions is open, it suffices to show the
following fact:
Claim A.9. If Tn is a sequence of trees in Tss whose length functions `n converge to the
length function ` of an action of G on T = R, then Tn converges to T in the Gromov
topology.
To prove the claim, we denote by An (g) the characteristic set of g ∈ G in Tn , and we
fix h ∈ G hyperbolic in T (hence in Tn for n large). We denote by In (g) the (possibly
empty or degenerate) segment An (g) ∩ An (h).
The first case is when G acts on T by translations. To show that
T Tn converges to T , it
suffices to show that, given elements g1 , . . . , gk in G, the length of i In (gi ) goes to infinity
with n. By a standard argument using Helly’s theorem, we may assume k = 2.
We first show that, for any g, the length |In (g)| goes to infinity. Let N ∈ N be arbitrary.
Since g −1 hN gh−N is elliptic in T , the distance between In (hN gh−N ) and In (g) goes to 0
as n → ∞. But In (hN gh−N ) is the image of In (g) by hN , so lim inf n→∞ |In (g)| ≥ N `(h).
112
To show that the overlap between In (g1 ) and In (g2 ) goes to infinity, we can assume
that the relative position of In (g1 ) and In (g2 ) is the same for all n’s. If they are disjoint,
In (g1 g2 g1−1 ) or In (g2 g1 g2−1 ) is empty, a contradiction. Since every |In (g)| goes to infinity,
the result is clear if In (g1 ) and In (g2 ) are nested. In the remaining case, up to changing
gi to its inverse, we can assume that g1 , g2 translate in the same direction along An (h) if
they are both hyperbolic. Then In (g1 ) ∩ In (g2 ) equals In (g1 g2 ) or In (g2 g1 ), so its length
goes to infinity.
Now suppose that the action of G on T is dihedral. Suppose that g ∈ G reverses
orientation on T . For n large, the axes of h, g −1 hg, ghg −1 in Tn have a long overlap by the
previous argument. On this overlap h translates in one direction, g −1 hg and ghg −1 in the
other (because `n (hg −1 hg) is close to 0 and `n (h−1 g −1 hg) is not). It follows that g acts as
a central symmetry on a long subarc of An (h). Moreover, if g, g 0 both reverse orientation,
the distance between their fixed points on An (h) is close to 2`(gg 0 ). The convergence of Tn
to T easily follows from these observations. This proves the claim, hence the theorem.
A.3
Compatibility and length functions
Recall that two R-trees T1 , T2 are compatible if they have a common refinement: there
exists an R-tree T̂ with (equivariant) maps gi : T̂ → Ti preserving alignment (the image of
a segment is a segment, possibly a point, see Subsections 1.4 and A.1); we call such maps
collapse maps.
If T1 and T2 are compatible, they have a standard common refinement Ts constructed
as follows.
We denote by di the distance in Ti , and by `i the length function. Let T̂ be any common
refinement. Given x, y ∈ T̂ , define
δ(x, y) = d1 (g1 (x), g1 (y)) + d2 (g2 (x), g2 (y)).
This is a pseudo-distance satisfying δ(x, y) = δ(x, z) + δ(z, y) if z ∈ [x, y] (this is also
a length measure, as defined in [Gui00a]). The associated metric space (Ts , d), obtained
by identifying x, y when δ(x, y) = 0, is an R-tree which refines T1 and T2 , with maps
fi : Ts → Ti satisfying d(x, y) = d1 (f1 (x), f1 (y))+d2 (f2 (x), f2 (y)). The fi ’s are 1-Lipschitz,
hence continuous.
The length function of Ts is ` = `1 +`2 (this follows from the formula `(g) = limn→∞ n1 d(x, g n x)).
In particular, `1 + `2 is a length function. We now prove the converse.
Theorem A.10. Two minimal irreducible R-trees T1 , T2 with an action of G are compatible if and only if the sum ` = `1 + `2 of their length functions is a length function.
Remark A.11. If T1 and T2 are compatible, then λ1 l1 + λ2 l2 is a length function for all
λ1 , λ2 ≥ 0.
Corollary A.12. Compatibility is a closed relation on Tirr × Tirr . In particular, the set of
irreducible R-trees compatible with a given T0 is closed in Tirr .
Proof. This follows from the fact that the set of length functions is a closed subset of RG
[CM87].
Proof of Theorem A.10. We have to prove the “if” direction. Let T1 , T2 be irreducible
minimal R-trees with length functions `1 , `2 , such that ` = `1 + `2 is the length function
of a minimal R-tree T . We denote by A(g), A1 (g), A2 (g) axes in T , T1 , T2 respectively.
By Lemma A.2, T is irreducible: hyperbolic elements g, h with [g, h] hyperbolic exist
in T since they exist in T1 . We want to prove that T is a common refinement of T1 and T2 .
In fact, we show that T is the standard refinement Ts mentioned earlier (which is unique
by Theorem A.5). The proof is similar to that of Theorem A.5, but we first need a few
lemmas.
113
Lemma A.13. [[Gui05, lemme 1.3]] Let S ⊂ G be a finitely generated semigroup such
that no point or line in T is invariant under the subgroup hSi generated by S. Let I be an
arc contained in the axis of a hyperbolic element h ∈ S.
Then there exists a finitely generated semigroup S 0 ⊂ S with hS 0 i = hSi such that every
element g ∈ S 0 \ {1} is hyperbolic in T , its axis contains I, and g translates in the same
direction as h on I.
Lemma A.14. Let T1 , T2 , T be arbitrary irreducible minimal trees. Given an arc I ⊂ T ,
there exists g ∈ G which is hyperbolic in T1 , T2 and T , and whose axis in T contains I.
Proof. Apply Lemma A.13 with S = G and any h whose axis in T contains I (if G is not
finitely generated, one takes for S the group generated by s1 , t1 , s2 , t2 , h, with si , ti , [si , ti ]
hyperbolic in Ti ). Since S 0 generates S as a group, it must contain an element h0 which
is hyperbolic in T1 : otherwise S would have a global fixed point in T1 by Serre’s lemma
(see Subsection 1.2). Applying Lemma A.13 to the action of S 0 on T1 , we get a semigroup
S 00 ⊂ S 0 whose non-trivial elements are hyperbolic in T1 . Similarly, S 00 contains an element
g which is hyperbolic in T2 . This element g satisfies the conclusions of the lemma.
Remark A.15. More generally, one may require that g be hyperbolic in finitely many trees
T1 , . . . , Tn .
We again assume that T1 , T2 , T are as described at the beginning of the proof of
Theorem A.10.
Lemma A.16. Let g, h be hyperbolic in T1 and T2 (and therefore in T ).
• If their axes in T meet, so do their axes in Ti .
• If their axes in T do not meet, their axes in Ti meet in at most one point. In
particular, the elements gh and hg are hyperbolic in Ti .
Proof. Assume that A(g) and A(h) meet, but A1 (g) and A1 (h) do not. Then `1 (gh) >
`1 (g)+`1 (h). Since `(gh) ≤ `(g)+`(h), we get `2 (gh) < `2 (g)+`2 (h). Similarly, `2 (g −1 h) <
`2 (g) + `2 (h). But these inequalities are incompatible by Lemma A.1.
Now assume that A(g) and A(h) do not meet, and A1 (g), A1 (h) meet in a nondegenerate arc. We may assume
`1 (gh) < `1 (g −1 h) = `1 (g) + `1 (h).
Since
`(gh) = `(g −1 h) > `(g) + `(h),
we have
`2 (gh) > `2 (g −1 h) > `2 (g) + `2 (h),
contradicting Lemma A.1.
We can now complete the proof of Theorem A.10. It suffices to define maps fi : T → Ti
such that
d(x, y) = d1 (f1 (x), f1 (y)) + d2 (f2 (x), f2 (y)).
Such maps are collapse maps (they are 1-Lipschitz, and if three points satisfy a triangular
equality in T , then their images under fi cannot satisfy a strict triangular inequality), so
T is the standard common refinement Ts .
The construction of fi is the same as that of f in the proof of Theorem A.5. Given
branch points x, y ∈ T , we use Lemma A.14 to get elements g and h hyperbolic in all
three trees, and such that the bridge between A(g) and A(h) is [x, y]. Then Lemma A.16
guarantees that Ai (g) ∩ Ai (gh) ∩ Ai (hg) is a single point of Ti , which we define as fi (x);
the only new phenomenon is that Ai (g) and Ai (h) may now intersect in a single point.
114
The relation between d, d1 , d2 comes from the equality ` = `1 + `2 , using the formula
di (fi (x), fi (y)) = 1/2(`i (gh) − `i (g) − `i (h)).
Having defined fi on branch points, we extend it by continuity to the closure of the set
of branch points of T (it is 1-Lipschitz) and then linearly to each complementary interval.
The relation between d, d1 , d2 still holds.
A.4
Common refinements
The following result is proved for almost-invariant sets in [SS03, Theorem 5.16].
Proposition A.17. Let G be a finitely generated group, and let T1 , . . . , Tn be irreducible
minimal R-trees such that Ti is compatible with Tj for i 6= j. Then there exists a common
refinement T of all Ti ’s.
Remark A.18. This statement may be interpreted as the fact that the set of projectivized
trees satisfies the flag condition for a simplicial complex: whenever one sees the 1-skeleton
of an n-simplex, there is indeed an n-simplex. Two compatible trees Ti , Tj define a 1simplex t`i + (1 − t)`j of length functions. If there are segments joining any
P pair of length
functions `i , `j , the proposition says that there is an (n − 1)-simplex
ti `i of length
functions.
To prove Proposition A.17, we need some terminology from [Gui05]. A direction in an
R-tree T is a connected component δ of T \ {x} for some x ∈ T . A quadrant in T1 × T2 is
a product Q = δ1 × δ2 of a direction of T1 by a direction of T2 . A quadrant Q = δ1 × δ2
is heavy if there exists h ∈ G hyperbolic in T1 and T2 such that δi contains a positive
semi-axis of h (equivalently, for all x ∈ Ti one has hn (x) ∈ δi for n large). We say that h
makes Q heavy. The core C(T1 ×T2 ) ⊂ T1 ×T2 is the complement of the union of quadrants
which are not heavy (this is not the same core as in Subsection 6.3).
By [Gui05, Théorème 6.1], T1 and T2 are compatible if and only if C(T1 × T2 ) contains
no non-degenerate rectangle (a product I1 × I2 where each Ii is an arc not reduced to a
point).
We first prove a technical lemma.
Lemma A.19. Let T1 , T2 be irreducible and minimal. Let f : T1 → T10 be a collapse map,
with T10 irreducible. Let δ10 × δ2 be a quadrant in T10 × T2 , and δ1 = f −1 (δ10 ). If the quadrant
δ1 × δ2 ⊂ T1 × T2 is heavy, then so is δ10 × δ2 .
Note that δ1 is a direction because f preserves alignment.
Proof. Consider an element h making δ1 × δ2 heavy. If h is hyperbolic in T10 , then h makes
δ10 × δ2 heavy and we are done. If not, assume that we can find some g ∈ G, hyperbolic
in T10 and T2 (hence in T1 ), such that for i = 1, 2 the axis Ai (g) of g in Ti intersects Ai (h)
in a compact set. Then for n > 0 large enough the element hn gh−n makes δ1 × δ2 heavy.
Since this element is hyperbolic in T10 and T2 , it makes δ10 × δ2 heavy.
We now prove the existence of g. Consider a line l in T2 , disjoint from A2 (h), and the
bridge [x, y] between l and A2 (h). Let I ⊂ l be an arc containing x in its interior. By
Lemma A.14, there exists g hyperbolic in T10 and T2 whose axis in T2 contains I, hence
is disjoint from A2 (h). Being hyperbolic in T10 , the element g is hyperbolic in T1 . Its
axis intersects A1 (h) in a compact set because A1 (h) is mapped to a single point in T10
(otherwise, h would be hyperbolic in T10 ).
Proof of Proposition A.17. We assume n = 3, as the general case then follows by a straightforward induction. Let T12 be the standard common refinement of T1 , T2 (see Subsection
A.3). Let C be the core of T12 × T3 . By [Gui05, Théorème 6.1], it is enough to prove that
115
C does not contain a product of non-degenerate arcs [a12 , b12 ] × [a3 , b3 ]. Assume otherwise. Denote by a1 , b1 , a2 , b2 the images of a12 , b12 in T1 , T2 . Since a12 6= b12 , at least one
inequality a1 6= b1 or a2 6= b2 holds. Assume for instance a1 6= b1 .
We claim that [a1 , b1 ]×[a3 , b3 ] is contained in the core of T1 ×T3 , giving a contradiction.
We have to show that any quadrant Q = δ1 × δ3 of T1 × T3 intersecting [a1 , b1 ] × [a3 , b3 ] is
heavy. Denote by f : T12 → T1 the collapse map. The preimage Q̃ = f −1 (δ1 ) × δ3 of Q in
T12 × T3 is a quadrant intersecting [a12 , b12 ] × [a3 , b3 ]. Since this rectangle in contained in
C(T12 × T3 ), the quadrant Q̃ is heavy, and so is Q by Lemma A.19.
A.5
Arithmetic of trees
In this subsection, we work with simplicial trees. We let Sirr be the set of simplicial trees
T which are minimal, irreducible, with no redundant vertices and no inversion. We also
view such a T as a metric tree, by declaring each edge to be of length 1. This makes Sirr
a subset of Tirr . By Theorem A.5, a tree T ∈ Sirr is determined by its length function `.
Definition A.20 (Prime factors). The prime factors of T are the one-edge
splittings Ti
P
obtained from T by collapsing edges in all orbits but one. Clearly ` = i `i , where `i is the
length function of Ti .
We may view a prime factor of T as an orbit of edges of T , or as an edge of the quotient
graph of groups Γ = T /G. Since G is assumed to be finitely generated, there are finitely
many prime factors (by Proposition 1.7, this remains true if G is only finitely generated
relative to a finite collection of elliptic subgroups).
Lemma A.21. Let T ∈ Sirr .
(1) Any non-trivial tree T 0 obtained from T by collapses (in particular, its prime factors)
belongs to Sirr .
(2) The prime factors of T are distinct (T is “squarefree”).
Proof. Let e be any edge of T which is not collapsed in T 0 . Since T has no redundant
vertex and is not a line, either the endpoints of e are branch points u, v, or there are
branch points u, v such that [u, v] = e ∪ e0 with e0 in the same orbit as e. Using Lemma
A.3, we can find elements g, h hyperbolic in T , whose axes are not collapsed to points in
T 0 , and such that [u, v] is the bridge between their axes. Since g, h are hyperbolic with
disjoint axes in T 0 , the tree T 0 is irreducible. It is easy to check that collapsing cannot
create redundant vertices, so T 0 ∈ Sirr .
Now suppose that e, hence [u, v], gets collapsed in some prime factor T 00 . Then `0 (gh) >
0
` (g) + `0 (h) holds in T 0 but not in T 00 , so T 0 6= T 00 .
Because of this lemma, a tree of Sirr is determined by its prime factors. In particular,
T refines T 0 if and only if every prime factor of T 0 is also a prime factor of T .
Corollary A.22. Assume that T and T 0 are compatible non-trivial trees. If T is irreducible, so is T 0 . If T is not irreducible, T 0 belongs to the same deformation space as
T.
Proof. The lemma shows that performing a collapse on an irreducible simplicial tree yields
an irreducible tree (or a point). If T is not irreducible, the quotient graph of groups is a
circle and every edge e has an endpoint v such that the inclusion Ge → Gv is onto (see
Subsection 1.2). This implies that performing a collapse on a non-irreducible tree yields a
minimal non-irreducible tree belonging to the same deformation space (or a point). The
lemma follows.
116
If T1 and T2 are compatible, the standard refinement Ts with `Ts = `T1 +`T2 constructed
in Subsection A.3 is a metric tree which should be viewed as the “product” of T1 and T2 .
We shall now define the lcm T1 ∨ T2 of simplicial trees T1 and T2 . To understand the
difference between the two, suppose T1 = T2 . Then Ts is obtained from T1 by subdividing
each edge, its length function is 2`1 . On the other hand, T1 ∨ T1 = T1 .
Definition A.23 (gcd). Consider two trees T1 , T2 ∈ Sirr , with length functions `1 , `2 .
We define `1 ∧ `2 as the sum of all length functions which appear as prime factors in
both T1 and T2 . It is the length function of a tree T1 ∧ T2 (possibly a point) which is a
collapse of both T1 and T2 . We call T1 ∧ T2 the gcd of T1 and T2 .
We define `1 ∨ `2 = `1 + `2 − `1 ∧ `2 as the sum of all length functions which appear as
prime factors in T1 or T2 (or both).
Lemma A.24. Let T1 and T2 be compatible trees in Sirr . There is a tree T1 ∨ T2 ∈ Sirr
whose length function is `1 ∨ `2 . It is a common refinement of T1 and T2 , and no edge of
T1 ∨ T2 is collapsed in both T1 and T2 .
Proof. Let T be any common refinement. We modify it as follows. We collapse any edge
which is collapsed in both T1 and T2 . We then restrict to the minimal subtree and remove
redundant vertices. The resulting tree T1 ∨ T2 belongs to Sirr (it is irreducible because it
refines T1 ). It is a common refinement of T1 and T2 , and no edge is collapsed in both T1
and T2 .
We check that T1 ∨T2 has the correct length function by finding its prime factors. Since
no edge is collapsed in both T1 and T2 , a prime factor of T1 ∨ T2 is a prime factor of T1 or
T2 . Conversely, a prime factor of Ti is associated to an orbit of edges of Ti , and this orbit
lifts to T1 ∨ T2 .
Remark A.25. Unlike the standard refinement Ts , the tree T1 ∨ T2 does not have redundant
vertices.
Proposition A.26. Let T1 , . . . , Tn be pairwise compatible trees of Sirr . There exists a tree
T1 ∨ · · · ∨ Tn in Sirr whose length function is the sum of all length functions which appear
as a prime factor in some Ti . Moreover:
(1) A tree T ∈ Sirr refines T1 ∨ · · · ∨ Tn if and only if it refines each Ti .
(2) A tree T ∈ Sirr is compatible with T1 ∨ · · · ∨ Tn if and only if it is compatible with
each Ti .
(3) A subgroup H is elliptic in T1 ∨ · · · ∨ Tn if and only if it is elliptic in each Ti . If T1
dominates each Ti , then T1 ∨ · · · ∨ Tn belongs to the deformation space of T1 .
Proof. First suppose n = 2. We show that T1 ∨ T2 satisfies the additional conditions.
If T refines T1 and T2 , it refines T1 ∨ T2 because every prime factor of T1 ∨ T2 is a prime
factor of T . This proves Assertion (1).
If T1 , T2 , T are pairwise compatible, they have a common refinement T̂ by Proposition
A.17 or [SS03, Theorem 5.16] (where one should exclude ascending HNN extensions). This
T̂ refines T1 ∨ T2 by Assertion (1), so T and T1 ∨ T2 are compatible.
Assertion (3) follows from the fact that no edge of T1 ∨ T2 is collapsed in both T1 and
T2 , as in the proof of Proposition 2.2: if H fixes a point v1 ∈ T1 and is elliptic in T2 , it
fixes a point in the preimage of v1 in T1 ∨ T2 .
The case n > 2 now follows easily by induction. By Assertion (2), the tree T1 ∨· · ·∨Tn−1
is compatible with Tn , so we can define T1 ∨ · · · ∨ Tn = (T1 ∨ · · · ∨ Tn−1 ) ∨ Tn .
Definition A.27 (lcm). We call T1 ∨ · · · ∨ Tn the lcm of the compatible trees Ti .
117
A.6
Reading actions on R-trees
Rips theory gives a way to understand stable actions on R-trees, by relating them to actions
on simplicial trees. Therefore, they are closely related to JSJ decompositions. We consider
first the JSJ deformation space, then the compatibility JSJ tree.
For simplicity, we assume H = ∅.
A.6.1
Reading R-trees from the JSJ deformation space
Proposition A.28. Let G be finitely presented. Let TJ be a JSJ tree over the family of
slender subgroups. If T is an R-tree with a stable action of G whose arc stabilizers are
slender, then edge stabilizers of TJ are elliptic in T .
Recall [BF95] that an arc I ⊂ T is stable if any g ∈ G that pointwise fixes some subarc
of I also fixes I. The action of G on T is stable if every arc is stable.
Proof. By [Gui98], T is a limit of simplicial trees Tk with slender edge stabilizers. Since
TJ is universally elliptic, each edge stabilizer Ge of TJ is elliptic in every Tk . Passing to
the limit, we deduce that each element of Ge is elliptic in T . Since Ge is finitely generated,
Ge is elliptic in T .
Remark A.29. More generally, suppose that G is finitely presented and A is stable under
extension by finitely generated free abelian groups: if H < G is such that 1 → A → H →
Zk → 1, with A ∈ A, then H ∈ A. Let TJ be a JSJ tree over A with finitely generated
edge stabilizers (this exists by Theorem 2.16). If T is a stable R-tree with arc stabilizers
in A, then edge stabilizers of TJ are elliptic in T .
Recall (Theorem 6.2) that, when G is finitely presented, flexible vertices of the slender
JSJ deformation space are either slender or QH with slender fiber.
Proposition A.30. Let G, TJ , T be as in the previous proposition. There exists an R-tree
T̂ obtained by blowing up each flexible vertex v of TJ into
(1) an action by isometries on a line if Gv is slender,
(2) an action dual to a measured foliation on the underlying 2-orbifold of Gv if v is QH,
which resolves (or dominates) T in the following sense: there exists a G-equivariant map
f : T̂ → T which is piecewise linear: every segment of T̂ can be decomposed into finitely
many subsegments, in restriction to which f preserves alignment.
Proof. Using ellipticity of TJ with respect to T , we argue as in the proof of Proposition
2.2, with T1 = TJ and T2 = T . If v ∈ V (TJ ) and Gv is elliptic in T , we let Yv ⊂ T be a
fixed point. If Gv is not elliptic in T , we let Yv be its minimal subtree. It is a line if Gv
is slender. If v is a QH vertex, then Yv is dual to a measured foliation of the underlying
orbifold by Skora’s theorem [Sko96] (applied to a covering surface Σ0 ).
Remark A.31. The arguments given above may be applied in more general situations. For
instance, assume that G is finitely generated, that all subgroups of G not containing F2
are slender, and that G has a JSJ tree TJ over slender subgroups whose flexible subgroups
are QH. Let T be an R-tree with slender arc stabilizers such that G does not split over a
subgroup of the stabilizer of an unstable arc or of a tripod in T . Then, applying [Gui08]
and the techniques of [Gui98], we see that T is a limit of slender trees, so Propositions
A.28 and A.30 apply.
118
A.6.2
Reading R-trees from the compatibility JSJ tree
In [Gui00b], the first author explained how to obtain all small actions of a one-ended
hyperbolic group G on R-trees from a JSJ tree. The proof was based on Bowditch’s
construction of a JSJ tree from the topology of ∂G. Here we give a different, more general,
approach, based on Corollary A.12 (saying that compatibility is a closed condition) and
results of Subsection 11.7 (describing the compatibility JSJ space). Being universally
compatible, Tco is compatible with any R-tree which is a limit of simplicial A-trees. We
illustrate this idea in a simple case.
Let G be a one-ended finitely presented torsion-free CSA group. Assume that G is not
abelian, and let Tco be its compatibility JSJ tree over the class A of abelian groups (see
Definition 10.9 and Subsection 11.7). Let G y T be an action on an R-tree with trivial
tripod stabilizers, and abelian arc stabilizers. By [Gui98], T is a limit of simplicial A-trees.
Since Tco is compatible with all A-trees, it is compatible with T by Corollary A.12. Let
T̂ be the standard common refinement of T and Tco with length function `T + `Tco (see
Subsection A.3). Let fco : T̂ → Tco and f : T̂ → T be maps preserving alignment such
that
dT̂ (x, y) = dTco (fco (x), fco (y)) + dT (f (x), f (y)).
−1 (v)
To each vertex v and each edge e of Tco there correspond closed subtrees T̂v = fco
and T̂e = f −1 (e̊) of T̂ . By minimality, T̂e is an arc of T̂ containing no branch point except
maybe at its endpoints. The relation between dT̂ , dTco , and dT shows that the restriction
of f to T̂v is an isometric embedding. In particular, T can be obtained from T̂ by changing
the length of the arcs T̂e (possibly making the length 0).
We shall now describe the action of Gv on T̂v . Note that Gv is infinite. Its action on
T̂v need not be minimal, but it is finitely supported, see [Gui08]. Given an edge e of Tco
containing v, we denote by xe the endpoint of T̂e belonging to T̂v . If T̂v is not minimal, it
is the convex hull of the set of points xe which are extremal (i.e. T̂v \ xe is connected).
First suppose that Gv fixes some x ∈ T̂v and that T̂v is not a point. Note that, if xe 6= x
is extremal, the stabilizer of the arc [x, xe ] contains Ge , so is infinite. We claim that, if e and
f are edges of Tco containing v with xe 6= xf both extremal, then [x, xe ] ∩ [x, xf ] = {x}. If
not, the intersection is an arc [x, y]. The stabilizer of [x, y] contains hGe , Gf i and is abelian.
It follows that any point in the Gf -orbit of xe is fixed by Ge . Since tripod stabilizers are
trivial, we deduce that Gf fixes xe , a contradiction. We have thus proved that T̂v is a cone
on a finite number of orbits of points.
If Gv does not fix a point in T̂v , then it is flexible. If it is abelian, triviality of tripod
stabilizers implies that T̂v is a line. If Gv is not abelian, it is a surface group by Theorems
9.5 and 11.4. Skora’s theorem [Sko96] asserts that the minimal subtree µTv (Gv ) is dual to a
measured lamination on a compact surface. By triviality of tripod stabilizers, Tv \ µTv (Gv )
is a disjoint union of segments, and the pointwise stabilizer of each such segment has index
at most 2 in a boundary subgroup of Gv .
It follows in particular from this analysis that T̂ and T are geometric (see [LP97]).
References
[AB87]
Roger Alperin and Hyman Bass. Length functions of group actions on Λtrees. In Combinatorial group theory and topology (Alta, Utah, 1984), pages
265–378. Princeton Univ. Press, Princeton, NJ, 1987.
[Bar16]
Benjamin Barrett. Computing JSJ decompositions of hyperbolic groups,
2016. arXiv:1611.00652.
[Bee13]
Benjamin Beeker. Compatibility JSJ decomposition of graphs of free abelian
groups. Internat. J. Algebra Comput., 23(8):1837–1880, 2013.
119
[Bee14]
Benjamin Beeker. Abelian JSJ decomposition of graphs of free abelian groups.
J. Group Theory, 17(2):337–359, 2014.
[BF91]
Mladen Bestvina and Mark Feighn. Bounding the complexity of simplicial
group actions on trees. Invent. Math., 103(3):449–469, 1991.
[BF95]
Mladen Bestvina and Mark Feighn. Stable actions of groups on real trees.
Invent. Math., 121(2):287–321, 1995.
[Bow98]
Brian H. Bowditch. Cut points and canonical splittings of hyperbolic groups.
Acta Math., 180(2):145–186, 1998.
[Bow01]
Brian H. Bowditch. Peripheral splittings of groups. Trans. Amer. Math. Soc.,
353(10):4057–4082 (electronic), 2001.
[Bow12]
Brian H. Bowditch. Relatively hyperbolic groups. Internat. J. Algebra Comput., 22(3):1250016, 66, 2012.
[BKM07]
Inna Bumagin, Olga Kharlampovich, and Alexei Miasnikov. The isomorphism
problem for finitely generated fully residually free groups. J. Pure Appl.
Algebra, 208(3):961–977, 2007.
[Car11]
Mathieu Carette. The automorphism group of accessible groups. J. Lond.
Math. Soc. (2), 84(3):731–748, 2011.
[CG05]
Christophe Champetier and Vincent Guirardel. Limit groups as limits of free
groups. Israel J. Math., 146:1–75, 2005.
[Cha07]
Ruth Charney. An introduction to right-angled Artin groups. Geom. Dedicata, 125:141–158, 2007.
[Chi01]
Ian Chiswell. Introduction to Λ-trees. World Scientific Publishing Co. Inc.,
River Edge, NJ, 2001.
[Cla05]
Matt Clay. Contractibility of deformation spaces of G-trees. Algebr. Geom.
Topol., 5:1481–1503 (electronic), 2005.
[Cla09]
Matt Clay. Deformation spaces of G-trees and automorphisms of BaumslagSolitar groups. Groups Geom. Dyn., 3(1):39–69, 2009.
[Cla14]
Matt Clay. When does a right-angled Artin group split over Z? Internat. J.
Algebra Comput., 24(6):815–825, 2014.
[CF09]
Matt Clay and Max Forester. Whitehead moves for G-trees. Bull. Lond.
Math. Soc., 41(2):205–212, 2009.
[Coh89]
Daniel E. Cohen. Combinatorial group theory: a topological approach, volume 14 of London Mathematical Society Student Texts. Cambridge University
Press, Cambridge, 1989.
[CL83]
Donald J. Collins and Frank Levin. Automorphisms and Hopficity of certain
Baumslag-Solitar groups. Arch. Math. (Basel), 40(5):385–400, 1983.
[CM87]
Marc Culler and John W. Morgan. Group actions on R-trees. Proc. London
Math. Soc. (3), 55(3):571–604, 1987.
[CV86]
Marc Culler and Karen Vogtmann. Moduli of graphs and automorphisms of
free groups. Invent. Math., 84(1):91–119, 1986.
120
[DG08]
François Dahmani and Daniel Groves. The isomorphism problem for toral
relatively hyperbolic groups. Publ. Math. Inst. Hautes Études Sci., 107:211–
290, 2008.
[DG11]
François Dahmani and Vincent Guirardel. The isomorphism problem for all
hyperbolic groups. Geom. Funct. Anal., 21(2):223–300, 2011.
[DT13]
François Dahmani and Nicholas Touikan. Isomorphisms using Dehn fillings:
the splitting case, 2013. arXiv:1311.3937 [math.GR].
[Del96]
Thomas Delzant. Sous-groupes distingués et quotients des groupes hyperboliques. Duke Math. J., 83(3):661–682, 1996.
[Del99]
Thomas Delzant. Sur l’accessibilité acylindrique des groupes de présentation
finie. Ann. Inst. Fourier (Grenoble), 49(4):1215–1224, 1999.
[DD89]
Warren Dicks and M. J. Dunwoody. Groups acting on graphs, volume 17 of
Cambridge Studies in Advanced Mathematics. Cambridge University Press,
Cambridge, 1989.
[Dun85]
M. J. Dunwoody. The accessibility of finitely presented groups. Invent. Math.,
81(3):449–457, 1985.
[DS99]
M. J. Dunwoody and M. E. Sageev. JSJ-splittings for finitely presented groups
over slender groups. Invent. Math., 135(1):25–44, 1999.
[DS00]
M. J. Dunwoody and E. L. Swenson. The algebraic torus theorem. Invent.
Math., 140(3):605–637, 2000.
[Dun93]
Martin J. Dunwoody. An inaccessible group. In Geometric group theory, Vol.
1 (Sussex, 1991), pages 75–78. Cambridge Univ. Press, Cambridge, 1993.
[Far98]
B. Farb. Relatively hyperbolic groups. Geom. Funct. Anal., 8(5):810–840,
1998.
[FM99]
Benson Farb and Lee Mosher. Quasi-isometric rigidity for the solvable
Baumslag-Solitar groups. II. Invent. Math., 137(3):613–649, 1999.
[For02]
Max Forester. Deformation and rigidity of simplicial group actions on trees.
Geom. Topol., 6:219–267 (electronic), 2002.
[For03]
Max Forester. On uniqueness of JSJ decompositions of finitely generated
groups. Comment. Math. Helv., 78(4):740–751, 2003.
[For06]
Max Forester. Splittings of generalized Baumslag-Solitar groups. Geom. Dedicata, 121:43–59, 2006.
[FP06]
K. Fujiwara and P. Papasoglu. JSJ-decompositions of finitely presented
groups and complexes of groups. Geom. Funct. Anal., 16(1):70–125, 2006.
[GAnMB06] Francisco Javier González-Acuña and Juan Manuel Márquez-Bobadilla. On
the homeotopy group of the non orientable surface of genus three. Rev. Colombiana Mat., 40(2):75–79, 2006.
[GH15]
Daniel Groves and Michael Hull. Abelian splittings of right-angled Artin
groups, 2015. arXiv:1502.00129.
[Gui98]
Vincent Guirardel. Approximations of stable actions on R-trees. Comment.
Math. Helv., 73(1):89–121, 1998.
121
[Gui00a]
Vincent Guirardel. Dynamics of Out(Fn ) on the boundary of outer space.
Ann. Sci. École Norm. Sup. (4), 33(4):433–465, 2000.
[Gui00b]
Vincent Guirardel. Reading small actions of a one-ended hyperbolic group
on R-trees from its JSJ splitting. Amer. J. Math., 122(4):667–688, 2000.
[Gui05]
Vincent Guirardel. Cœur et nombre d’intersection pour les actions de groupes
sur les arbres. Ann. Sci. École Norm. Sup. (4), 38(6):847–888, 2005.
[Gui08]
Vincent Guirardel. Actions of finitely generated groups on R-trees. Ann. Inst.
Fourier (Grenoble), 58(1):159–211, 2008.
[GL07a]
Vincent Guirardel and Gilbert Levitt. Deformation spaces of trees. Groups
Geom. Dyn., 1(2):135–181, 2007.
[GL07b]
Vincent Guirardel and Gilbert Levitt. The outer space of a free product.
Proc. Lond. Math. Soc. (3), 94(3):695–714, 2007.
[GL09]
Vincent Guirardel and Gilbert Levitt. JSJ decompositions: definitions, existence and uniqueness. I: The JSJ deformation space. arXiv:0911.3173 v2
[math.GR], 2009.
[GL10]
Vincent Guirardel and Gilbert Levitt. Scott and Swarup’s regular neighbourhood as a tree of cylinders. Pacific J. Math., 245(1):79–98, 2010.
[GL11]
Vincent Guirardel and Gilbert Levitt. Trees of cylinders and canonical splittings. Geom. Topol., 15(2):977–1012, 2011.
[GL15a]
Vincent Guirardel and Gilbert Levitt. McCool groups of toral relatively hyperbolic groups. Algebr. Geom. Topol., 15(6):3485–3534, 2015.
[GL15b]
Vincent Guirardel and Gilbert Levitt. Splittings and automorphisms of relatively hyperbolic groups. Groups Geom. Dyn., 9(2):599–663, 2015.
[GL16]
Vincent Guirardel and Gilbert Levitt. Vertex finiteness for splittings of relatively hyperbolic groups. Israel J. Math., 212(2):729–755, 2016.
[GLS17]
Vincent Guirardel, Gilbert Levitt, and Rizos Sklinos. Elementary equivalence
vs commensurability for hyperbolic groups, 2017. arXiv:1701.08853.
[Hru10]
G. Christopher Hruska. Relative hyperbolicity and relative quasiconvexity
for countable groups. Algebr. Geom. Topol., 10(3):1807–1856, 2010.
[JS79]
William H. Jaco and Peter B. Shalen. Seifert fibered spaces in 3-manifolds.
Mem. Amer. Math. Soc., 21(220):viii+192, 1979.
[Joh79]
Klaus Johannson. Homotopy equivalences of 3-manifolds with boundaries,
volume 761 of Lecture Notes in Mathematics. Springer, Berlin, 1979.
[KM05]
Olga Kharlampovich and Alexei G. Myasnikov. Effective JSJ decompositions.
In Groups, languages, algorithms, volume 378 of Contemp. Math., pages 87–
212. Amer. Math. Soc., Providence, RI, 2005.
[Kou98]
Malik Koubi. Croissance uniforme dans les groupes hyperboliques. Ann. Inst.
Fourier (Grenoble), 48(5):1441–1453, 1998.
[Kro90]
P. H. Kropholler. An analogue of the torus decomposition theorem for certain
Poincaré duality groups. Proc. London Math. Soc. (3), 60(3):503–529, 1990.
122
[KR89a]
P. H. Kropholler and M. A. Roller. Relative ends and duality groups. J. Pure
Appl. Algebra, 61(2):197–210, 1989.
[KR89b]
P. H. Kropholler and M. A. Roller. Splittings of Poincaré duality groups. III.
J. London Math. Soc. (2), 39(2):271–284, 1989.
[Lev05a]
Gilbert Levitt. Automorphisms of hyperbolic groups and graphs of groups.
Geom. Dedicata, 114:49–70, 2005.
[Lev05b]
Gilbert Levitt. Characterizing rigid simplicial actions on trees. In Geometric
methods in group theory, volume 372 of Contemp. Math., pages 27–33. Amer.
Math. Soc., Providence, RI, 2005.
[LP97]
Gilbert Levitt and Frédéric Paulin. Geometric group actions on trees. Amer.
J. Math., 119(1):83–102, 1997.
[Lin83]
P. A. Linnell. On accessibility of groups. J. Pure Appl. Algebra, 30(1):39–46,
1983.
[MM96]
Darryl McCullough and Andy Miller. Symmetric automorphisms of free products. Mem. Amer. Math. Soc., 122(582):viii+97, 1996.
[MNS99]
C. F. Miller, III, Walter D. Neumann, and G. A. Swarup. Some examples of
hyperbolic groups. In Geometric group theory down under (Canberra, 1996),
pages 195–202. de Gruyter, Berlin, 1999.
[MS84]
John W. Morgan and Peter B. Shalen. Valuations, trees, and degenerations
of hyperbolic structures. I. Ann. of Math. (2), 120(3):401–476, 1984.
[Osi06]
Denis V. Osin. Relatively hyperbolic groups: intrinsic geometry, algebraic properties, and algorithmic problems. Mem. Amer. Math. Soc.,
179(843):vi+100, 2006.
[PS09]
Panos Papasoglu and Eric Swenson. Boundaries and JSJ decompositions of
CAT(0)-groups. Geom. Funct. Anal., 19(2):559–590, 2009.
[Pau89]
Frédéric Paulin. The Gromov topology on R-trees. Topology Appl., 32(3):197–
221, 1989.
[Pau91]
Frédéric Paulin. Outer automorphisms of hyperbolic groups and small actions
on R-trees. In Arboreal group theory (Berkeley, CA, 1988), pages 331–343.
Springer, New York, 1991.
[Pau04]
Frédéric Paulin. Sur la théorie élémentaire des groupes libres (d’après Sela).
Astérisque, 294:ix, 363–402, 2004.
[Per11]
Chloé Perin. Elementary embeddings in torsion-free hyperbolic groups. Ann.
Sci. Éc. Norm. Supér. (4), 44(4):631–681, 2011.
[RW10]
Cornelius Reinfeldt and Richard Weidmann. Makanin-Razborov diagrams for
hyperbolic groups, 2010. preprint http://www.math.uni-kiel.de/algebra/
de/weidmann/research/.
[RS97]
E. Rips and Z. Sela. Cyclic splittings of finitely presented groups and the
canonical JSJ decomposition. Ann. of Math. (2), 146(1):53–109, 1997.
[Sco83]
Peter Scott. The geometries of 3-manifolds.
15(5):401–487, 1983.
123
Bull. London Math. Soc.,
[SS00]
Peter Scott and Gadde A. Swarup. Splittings of groups and intersection
numbers. Geom. Topol., 4:179–218 (electronic), 2000.
[SS03]
Peter Scott and Gadde A. Swarup. Regular neighbourhoods and canonical decompositions for groups. Astérisque, 289:vi+233, 2003. Corrections available
at http://www.math.lsa.umich.edu/~pscott/.
[SW79]
Peter Scott and Terry Wall. Topological methods in group theory. In Homological group theory (Proc. Sympos., Durham, 1977), pages 137–203. Cambridge Univ. Press, Cambridge, 1979.
[Sel97a]
Z. Sela. Acylindrical accessibility for groups. Invent. Math., 129(3):527–565,
1997.
[Sel97b]
Z. Sela. Structure and rigidity in (Gromov) hyperbolic groups and discrete
groups in rank 1 Lie groups. II. Geom. Funct. Anal., 7(3):561–593, 1997.
[Sel99]
Z. Sela. Endomorphisms of hyperbolic groups. I. The Hopf property. Topology,
38(2):301–321, 1999.
[Sel01]
Zlil Sela. Diophantine geometry over groups. I. Makanin-Razborov diagrams.
Publ. Math. Inst. Hautes Études Sci., 93:31–105, 2001.
[Ser77]
Jean-Pierre Serre. Arbres, amalgames, SL2 . Société Mathématique de France,
Paris, 1977. Rédigé avec la collaboration de Hyman Bass, Astérisque, No. 46.
[Sha87]
Peter B. Shalen. Dendrology of groups: an introduction. In Essays in group
theory, pages 265–319. Springer, New York-Berlin, 1987.
[Sha91]
Peter B. Shalen. Dendrology and its applications. In Group theory from a
geometrical viewpoint (Trieste, 1990), pages 543–616. World Sci. Publishing,
River Edge, NJ, 1991.
[Sko96]
Richard K. Skora. Splittings of surfaces. J. Amer. Math. Soc., 9(2):605–616,
1996.
[Sta83]
John R. Stallings. Topology of finite graphs. Invent. Math., 71(3):551–565,
1983.
[Thu80]
William P. Thurston. The geometry and topology of three-manifolds. Princeton lecture notes, 1980.
[Tou09]
Nicholas W.M. Touikan. Detecting geometric splittings in finitely presented
groups. arXiv:0906.3902v2 [math.GR]. To appear in Transactions of the
A.M.S., 2009.
[Wal04]
C. T. C. Wall. Poincaré duality in dimension 3. In Proceedings of the Casson
Fest, volume 7 of Geom. Topol. Monogr., pages 1–26 (electronic). Geom.
Topol. Publ., Coventry, 2004.
[Wei12]
Richard Weidmann. On accessibility of finitely generated groups. Q. J. Math.,
63(1):211–225, 2012.
124
Index
A(g): axis of g . . . . . . . . . . . . . . . . . . . . . . . . 16
[A]: the equivalence class of A ∈ A∞ . . 74
A: allowed edge stabilizers . . . . . . . . . . . . 18
Aell : universally elliptic groups in A . . 25
A∞ : infinite groups in A . . . . . . . . . . . . . 74
A(g): characteristic set of g . . . . . . . . . . 109
(A, H)-tree . . . . . . . . . . . . . . . . . . . . . . . . . 7, 18
A-tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3, 18
Av : groups of A in Gv . . . . . . . . . . . . . . . . 37
c(A): complexity of an edge group A . . 69
C(T1 , T2 ): core of T1 × T2 . . . . . . . . . . . . . 60
ˇ 1 , T2 ): flipped core of T1 × T2 . . . . . 60
C(T
C (2) : union of squares in C(T1 , T2 ) . . . . 61
C-virtually cyclic . . . . . . . . . . . . . . . . . 15, 77
Dco : compatibility JSJ space . . . . . 10, 101
DJSJ : the JSJ deformation space . . . . . 25
E(T ): edge set of T . . . . . . . . . . . . . . . . . . 16
(FA): Serre’s property . . . . . . . . . . . . . . . . 16
Fn , the free group on n generators . . . . 15
Gv , Ge : vertex or edge stabilizer/group
16
G[A] : the stabilizer of [A] . . . . . . . . . . . . . 74
H: relative structure . . . . . . . . . . . . . . . . . . 18
H|Gv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
H
Incv , IncH
v , Inc|Q , Inc|Q : incident structures
35
K-CSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
(k, C)-acylindrical . . . . . . . . . . . . . . . . . 73, 86
`(g): the translation length of g . . . . . 109
`, `T : the length function of T . . . . . . . 110
`1 ∧ `2 : gcd of two length functions . . 117
`1 ∨ `2 : lcm of two length functions . . 117
µT (H): minimal H-invariant subtree . . 17
M (g), M (H): the maximal virtually abelian
group containing g, H . . . 91, 92
RN (T1 , T2 ): the regular neighbourhood of two
trees . . . . . . . . . . . . . . . . . . . . . . . . 62
Sirr : set of irreducible simplicial trees
116
(SC), (SCZ ): stability conditions . 55, 57
S: a family of small subgroups . . . . . . . . 78
Snvc : groups in S not C-virtually cyclic . . .
87
Tc : tree of cylinders . . . . . . . . . . . . . . . . . . 75
Tc∗ : collapsed tree of cylinders . . . . . . . . 75
Tco : compatibility JSJ tree . . . . . . . 10, 104
T1 ∧ T2 : gcd of two trees . . . . . . . . . . . . . 117
T1 ∨ T2 : lcm of compatible trees . . . . . 117
T : set of actions on R-trees . . . . . . . . . . 110
Tirr : set of irreducible actions on R-trees . .
110
V (T ): vertex set of T . . . . . . . . . . . . . . . . . 16
Z: virtually cyclic subgroups with infinite
center . . . . . . . . . . . . . . . . . . . . . . . 97
Zmax : maximal virtually cyclic subgroups with
infinite center . . . . . . . . . . . . . . . 97
abelian tree . 8, 18, 54, 55, 86, 91, 107, 119
accessibility . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
accessibility (Dunwoody) . . . . . . . . . . 26, 28
acylindrical accessibility . . . . . . 4, 7, 21, 83
acylindrical tree, splitting
8, 21, 73, 76, 86
admissible equivalence relation on A∞
74
alignment preserving map . . . . . . . . 18, 109
approximation point . . . . . . . . . . . . . . . . . 111
arc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
axes topology . . . . . . . . . . . . . . . . . . . . . . . . 111
axis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Baumslag-Solitar group
6, 10, 31, 96, 105
boundary (in an orbifold) . . . . . . . . . . . . . 41
boundary subgroup . . . . . . . . . . . . . . . . . 6, 41
Bowditch . . . . . . . . . . 2, 5, 9, 73, 95, 97, 119
bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16, 109
canonical tree . . . . . . 5, 10, 73, 99, 103, 105
characteristic set . . . . . . . . . . . . . . . . . 16, 109
co-elementary subgroups . . . . . . . . 8, 74, 94
collapse map . . . . . . . . . . . . . . . . . . . 9, 18, 109
collapse of a tree . . . . . . . . . . . . . . . . . . . . . . 19
collapsed tree of cylinders . . . . . . . . . . . . . 75
commensurable . . . . . . . . . . . . 15, 74, 96, 107
commensurator . . . . . . . . . . . . 15, 32, 74, 108
common refinement . . . . . . . . . . . . . . . 19, 115
commutative transitive . . . . . . . . . . . 96, 108
compatibility JSJ deformation space . 10,
100
compatibility JSJ tree . . . . . . . . . . . 10, 104
compatible trees . . 9, 19, 79, 100, 109, 113
conical point . . . . . . . . . . . . . . . . . . . . . . . . . . 42
core in the product of two trees . . . 58, 60,
115
corner reflector . . . . . . . . . . . . . . . . . . . . . . . . 42
CSA group
6, 8, 9, 16, 56, 74, 86, 91, 107,
119
cyclic tree . . . . . . . . . . . . . . . . . 18, 57, 91, 107
cylinder in a tree . . . . . . . . . . . . . . . . . . . . 8, 75
deformation space . . . . . . . . . . . . . . . . . . 5, 19
degenerate segment . . . . . . . . . . . . . . 16, 109
dihedral action . . . . . . . . . . . . . . . . . . . . . . . . 17
dihedral group . . . . . . . . . . . . . . . . . . . . . . . . 15
domination . . . . . . . . . . . . . . . . . . . . . . . . . 3, 19
dual splitting . . . . . . . . . . . . . . . . . . . . . . 42, 47
Dunwoody-Sageev . . . . . . . . . 2, 6, 20, 29, 50
elementary subgroup . . . . . . . . . . . . . . 15, 94
elliptic element or subgroup . . . . . . . . 4, 16
elliptic with respect to a tree . . . . . . . . . 22
end of a tree . . . . . . . . . . . . . . . . . . . . . . 16, 110
Euler characteristic . . . . . . . . . . . . . . . . . . . 42
extended boundary subgroup . . . . . . . . . 47
125
fiber (of a QH subgroup) . . . . . . . 6, 47, 55
filling construction . . . . . . . . . . . . . . . . . . . . 39
flexible vertex, group, stabilizer
6, 26, 33,
38, 40, 54, 56, 71, 86, 91, 95
fold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
free splitting . . . . . . . . . . . . . . . . . . . 3, 30, 105
freely indecomposable relative to H . . . 18
Fujiwara-Papasoglu . . . . . . . 2, 6, 29, 50, 55
fully hyperbolic tree . . . . . . . . . . . . . . . . . . 60
QH, quadratically hanging .
56, 86
R-tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
RAAG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
reduced tree . . . . . . . . . . . . . . . . . . . . . . 19, 103
redundant vertex . . . . . . . . . . . . . . . . . . . . . . 16
refinement . . . . . . . . . . . . . . . . . . . 9, 19, 22, 38
refining T at a vertex v . . . . . . . . . . . . . . . 37
regular neighbourhood . 2, 54, 58, 62, 105
relative finite generation, presentation
21,
36
relative generating set . . . . . . . . . . . . . . . . 21
relative tree or splitting . . . . . . . . . . . . 7, 18
relatively hyperbolic group . . 6, 9, 15, 74,
94, 107
restriction of H . . . . . . . . . . . . . . . . . . . . . . . 35
rigid vertex, group, stabilizer . . . . . . . 6, 26
Rips-Sela . . . . . . . . . . . . . . . . . 2, 6, 29, 50, 56
Γ-limit group . . . . . . . . . . . . . . . . . . . . . . 9, 93
gcd of two trees . . . . . . . . . . . . . . . . . . 10, 117
generalized Baumslag-Solitar group
6, 10,
32, 105
geodesic (in an orbifold)
closed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
essential simple closed . . . . . . . . . . . . 42
filling the orbifold . . . . . . . . . . . . . . . . 44
simple . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
graph of groups . . . . . . . . . . . . . . . . . . . . . . . 16
(equivariant) Gromov-Hausdorff topology .
82, 111
Grushko decomposition, deformation space
1, 3, 30, 39, 105
sandwich closed family of subgroups . . 74
Scott-Swarup . . . . . . . . . . . . . . . 2, 10, 29, 105
segment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
semi-simple action on a tree . . . . . . . . . 110
Serre’s property (FA), Serre’s lemma . . 16
slender group 6, 18, 19, 49, 55, 56, 71, 118
slender in (A, H)-trees . . . . . . . . . . . . 20, 70
small domination, S-domination . . 77, 86
small orbifold . . . . . . . . . . . . . . . . . . . . . . . . . 44
small, small in (A, H)-trees . 8, 20, 31, 32,
77
socket . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
splitting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
dual to a family of geodesics . . 42, 47
splitting over A . . . . . . . . . . . . . . . . . . . . . . . 18
stability condition . . . . . . . . . . . . . . 6, 47, 85
stability condition (SC) . . . . . . . . . . . . . . 55
stability condition (SCZ ) . . . . . . . . . . . . . 57
stable action on an R-tree . . . . . . . . . . . 118
Stallings-Dunwoody deformation space . . . .
31, 39
standard common refinement . . . . . . . . 113
standard refinement . . . . . . . . . . . . . . . . . . 23
horizontal edge of the core . . . . . . . . . . . . 60
hyperbolic element, subgroup . . . . . 16, 17
incidence structure . . . . . . . . . . . . . . . . . . . 35
incident edge groups . . . . . . . . . . . . . . . . . . 35
irreducible tree, deformation space
10, 17,
19, 103, 110
JSJ decomposition, tree, deformation space
4, 25
K-CSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
(k, C)-acylindrical . . . . . . . . . . . . . . . . . 73, 86
lcm of pairwise compatible trees . 10, 104,
117
length function . . . . . . . . . . . . . . . . . . . . . . . 109
map between trees . . . . . . . . . . . . . . . . . . . . . 18
minimal action . . . . . . . . . . . . . . . . . . . 16, 110
minimal subtree . . . . . . . . . . . . . . . . . . . 17, 38
minuscule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
mirror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41, 57
morphism between trees . . . . . . . . . . . . . . 18
one-edge splitting . . . . . . . . . . . . . . . . . 16,
one-ended relative to H . . . . . . . . . . . 18,
orbifold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6,
small orbifolds . . . . . . . . . . . . . . . . . . .
with finite mapping class group . .
outer space . . . . . . . . . . . . . . . . . . . 2, 5, 19,
6, 40, 47, 50,
topology
axes topology . . . . . . . . . . . . . . . . . . . 111
equivariant Gromov-Hausdorff topology
82, 111
totally flexible group . . . . . . . . . . . . . . . . . . 58
translation length . . . . . . . . . . . . . . . . . . . 109
tree of cylinders . . 6, 8, 10, 73, 75, 79, 106
trivial action . . . . . . . . . . . . . . . . . . . . . . . . . . 16
trivial deformation space . . . . . . . . . . . . . . 19
25
39
41
44
46
30
universally compatible tree . . . . . . . . 9, 100
universally elliptic subgroup, tree . . 3, 24,
38
used boundary component . . . . . . . . . . . . 47
parabolic . . . . . . . . . . . . . . . . . . . . . . . 15, 33, 94
peripheral structure . . . . . . . . . . . . . . . . . . 52
prime factors of a tree . . . . . . . . . . . . . . . 116
vertical edge of the core . . . . . . . . . . . . . .
126
60
virtual commutation . . . . . . . . . . . . . . . . . . 93
K-virtually abelian . . . . . . . . . . . . . . . . . . . 91
virtually cyclic . . . . . . . . . . . . . 15, 56, 74, 96
C-virtually cyclic . . . . . . . . . . . . . . . . . 15, 77
VPC . . . . . . . . . . . . . . . . . . . . . . . . . . 52, 56, 105
127
Vincent Guirardel
Institut de Recherche Mathématique de Rennes
Université de Rennes 1 et CNRS (UMR 6625)
263 avenue du Général Leclerc, CS 74205
F-35042 RENNES Cédex
e-mail: [email protected]
Gilbert Levitt
Laboratoire de Mathématiques Nicolas Oresme (LMNO)
Université de Caen et CNRS (UMR 6139)
(Pour Shanghai : Normandie Univ, UNICAEN, CNRS, LMNO, 14000 Caen, France)
e-mail: [email protected]
128
| 4math.GR
|
ON THE COMPRESSION OF RECURRENT NEURAL NETWORKS WITH AN APPLICATION
TO LVCSR ACOUSTIC MODELING FOR EMBEDDED SPEECH RECOGNITION
Rohit Prabhavalkar†
Ouais Alsharif †
Antoine Bruguier
Ian McGraw
arXiv:1603.08042v2 [cs.CL] 2 May 2016
Google Inc.
{prabhavalkar,oalsha,tonybruguier,imcgraw}@google.com
ABSTRACT
We study the problem of compressing recurrent neural networks (RNNs). In particular, we focus on the compression
of RNN acoustic models, which are motivated by the goal
of building compact and accurate speech recognition systems
which can be run efficiently on mobile devices. In this work,
we present a technique for general recurrent model compression that jointly compresses both recurrent and non-recurrent
inter-layer weight matrices. We find that the proposed technique allows us to reduce the size of our Long Short-Term
Memory (LSTM) acoustic model to a third of its original size
with negligible loss in accuracy.
Index Terms— model compression, LSTM, RNN, SVD,
embedded speech recognition
1. INTRODUCTION
Neural networks (NNs) with multiple feed-forward [1, 2] or
recurrent hidden layers [3, 4] have emerged as state-of-theart acoustic models (AMs) for automatic speech recognition
(ASR) tasks. Advances in computational capabilities coupled
with the availability of large annotated speech corpora have
made it possible to train NN-based AMs with a large number
of parameters [5] with great success.
As speech recognition technologies continue to improve,
they are becoming increasingly ubiquitous on mobile devices:
voice assistants such as Apple’s Siri, Microsoft’s Cortana,
Amazon’s Alexa and Google Now [6] enable users to search
for information using their voice. Although the traditional
model for these applications has been to recognize speech
remotely on large servers, there has been growing interest
in developing ASR technologies that can recognize the input speech directly “on-device” [7]. This has the promise to
reduce latency while enabling user interaction even in cases
where a mobile data connection is either unavailable, slow
or unreliable. Some of the main challenges in this regard
are the disk, memory and computational constraints imposed
by these devices. Since the number of operations in neural
† Equal contribution. The authors would like to thank Haşim Sak and
Raziel Alvarez for helpful comments and suggestions on this work, and Chris
Thornton and Yu-hsin Chen for comments on an earlier draft.
networks is proportional to the number of model parameters,
compressing the model is desirable from the point of view of
reducing memory usage and power consumption.
In this paper, we study techniques for compressing recurrent neural networks (RNNs), specifically RNN acoustic
models. We demonstrate how a generalization of conventional inter-layer matrix factorization techniques (e.g., [8,
9]), where we jointly compress both recurrent and inter-layer
weight matrices, allows us to compress acoustic models up
to a third of their original size with negligible loss in accuracy. While we focus on acoustic modeling, the techniques
presented can be applied to RNNs in other domains, e.g.,
handwriting recognition [10] and machine translation [11] inter alia. The technique presented in this paper encompasses
both traditional recurrent neural networks (RNNs) as well as
Long Short-Term Memory (LSTM) neural networks.
In Section 2, we review previous work that has focussed
on techniques for compressing neural networks. Our proposed compression technique is presented in Section 3. We
examine the effectiveness of proposed techniques in Sections 4 and 5. Finally, we conclude with a discussion of our
findings in Section 6.
2. RELATED WORK
There have been a number of previous proposals to compress
neural networks, both in the context of ASR as well as in the
broader field of machine learning. We summarize a number
of proposed approaches in this section.
It has been noted in previous work that there is a large
amount of redundancy in the parameters of a neural network.
For example, Denil et al. [12] show that the entire neural network can be reconstructed given the values of a small number
of parameters. Caruana and colleagues show that the output
distribution learned by a larger neural network can be approximated by a neural network with fewer parameters by training the smaller network to directly predict the outputs of the
larger network [13, 14]. This approach, termed “model compression” [13] is closely related to the recent “distillation”
approach proposed by Hinton et al. [15]. The redundancy in
a neural network has also been exploited in the HashNet approach of Chen et al. [16], which imposes parameter tying in
network based on a set of hash functions.
In the context of ASR, previous approaches to acoustic
model compression have focused mainly on the case of feedforward DNNs. One popular technique is based on sparsifying the weight matrices in the neural network, for example, by
setting weights whose magnitude falls below a certain threshold to zero [1] or based on the second-derivative of the loss
function in the “optimal brain damage” procedure [17]. In
fact, Seide et al. [1] demonstrate that up to two-thirds of the
weights of the feed-forward network can be set to zero without incurring any loss in performance. Although techniques
based on sparsification do decrease the number of effective
weights, encoding the subset of weights which can be ‘zeroed
out’ requires additional memory. Further, if the weight matrices are represented as dense matrices for efficient computation, then the parameter savings on disk will not translate in to
savings of runtime memory. Other techniques to reduce the
number of model parameters is based on changing the neural network architecture, e.g., by introducing bottleneck layers [18] or through a low-rank matrix factorization layer [19].
We also note recent work by Wang et al. [20] which uses a
combination of singular value decomposition (SVD) and vector quantization to compress acoustic models.
The methods investigated in our work are most similar to
previous work that has examined using SVD to reduce the
number of parameters in the network in the context of feedforward DNNs [8, 9, 21]. As we describe in Section 3, our
methods can be thought of as an extension of the techniques
proposed by Xue et al. [8], wherein we jointly factorize both
recurrent and (non-recurrent) inter-layer weight matrices in
the network.
3. MODEL COMPRESSION
In this section, we present a general technique for compressing individual recurrent layers in a recurrent neural network,
thus generalizing the methods proposed by Xue et al. [8].
We describe our approach in the most general setting of
a standard RNN. We denote the activations of the l-th hidden
l
layer, consisting of N l nodes, at time t by hlt ∈ RN . The
inputs to this layer at time t – which are in turn the activations
from the previous layer or the input features – are denoted by
l−1
hl−1
∈ RN . We can then write the following equations
t
which define the output activations of the l-th and (l + 1)-th
layers in a standard RNN:
hlt
hl+1
t
=
=
σ(Wxl−1 hl−1
t
l l
σ(Wx ht
l
+
+
Whl hlt−1
Whl+1 hl+1
t−1
l
+b )
l+1
+b
Fig. 1. The initial model (Figure (a)) is compressed by jointly
factorizing recurrent (Whl ) and inter-layer (Wxl ) matrices, using a shared recurrent projection matrix (P l ) [3] (Figure (b)).
weight matrices, respectively1 . Since our proposed approach
can be applied independently for each recurrent hidden layer,
we only describe the compression operations for a particular layer l. We jointly compress the recurrent and inter-layer
matrices corresponding to a specific layer l by determining
a suitable recurrent projection matrix [3], denoted by P l ∈
l
l
Rr ×N , of rank rl < N l such that, Whl = Zhl P l and Wxl =
l l
Zx P , thus allowing us to re-write (1) and (2) as,
hlt = σ(Wxl−1 hl−1
t
hl+1
t
=
+ Zhl P l hlt−1
σ(Zxl P l hlt
l
+
l+1
l
(2)
l+1
+b
(3)
)
(4)
l
where, Zhl ∈ RN ×r and Zxl ∈ RN ×r . This compression
process is depicted graphically in Figure 1.
We note that sharing P l across the recurrent and interlayer matrices allows for more efficient parameterization of
the weight matrices; as shown in Section 5, this does not result in a significant loss of performance. Thus, the degree
of compression in the model can be controlled by setting the
ranks rl of the projection matrices in each of the layers of the
network.
We determine the recurrent projection matrix P l , by first
computing an SVD of the recurrent weight matrix, which we
then truncate, retaining only the top rl singular values (defl ) and the corresponding singular vectors from U l
noted by Σ
h
h
fl and V
fl , respectively):
and V l (denoted by U
h
h
h
T
T
l l
fl Σ
fl fl
Whl = Uhl Σlh Vhl ≈ U
h h Vh = Zh P
(1)
)
Whl+1 hl+1
t−1
+ bl )
(5)
T
fl Σ
fl
fl
l
where Zhl = U
h h and P = Vh . Finally, we determine
l
Zx , as the solution to the following least-squares problem:
l+1
where, bl ∈ RN and bl+1 ∈ RN
represent bias vectors, σ(·) denotes a non-linear activation function, and Wxl ∈
l+1
l
l
l
RN ×N and Whl ∈ RN ×N denote weight matrices that
we refer to respectively as the inter-layer and the recurrent
Zxl = arg min kY P l − Wxl k2F
(6)
Y
1 The equations are slightly more complicated when using LSTM cells in
the recurrent layer, but the basic form remains the same. See Section 3.1.
where, kXkF denotes the Frobenius norm of the matrix. In
pilot experiments we found that the proposed SVD-based initialization performed better than training a model with recurrent projection matrices (i.e., same model architecture) but
with random initialization of the network weights.
3.1. Applying our technique to LSTM RNNs
Generalizing the procedure described above in the context
of standard RNNs to the case of LSTM RNNs [3, 22, 23]
is straightforward. Using the notation in [3], note that the
recurrent-weight matrix Whl in the case of the LSTM is the
concatenation of the four gate weight matrices, obtained by
stacking them vertically:
[Wim , Wom , Wf m , Wcm ]
T
which represent respectively, recurrent connections to the input gate, the output gate, the forget gate and the cell state.
Similarly, the inter-layer matrix Wxl is the concatenation of
the matrices:
T
[Wix , Wf x , Wox , Wcx ]
which correspond to the input gate, the forget gate, the output
gate and the cell state (of the next layer). With these definitions, compression can be applied as described in Section 3.
Note that we do not compress the “peep-hole” weights, since
they are already narrow, single column matrices and do not
contribute significantly to the total number of parameters in
the network.
4. EXPERIMENTAL SETUP
In order to determine the effectiveness of the proposed RNN
compression technique, we conduct experiments on a openended large-vocabulary dictation task.
As we mentioned in Section 1, one of our primary motivations behind investigating acoustic model compression is to
build compact acoustic models that can be deployed on mobile devices. In recent work, Sak et al. have demonstrated
that deep LSTM-based AMs trained to predict either contextindependent (CI) phoneme targets [22] or context-dependent
(CD) phoneme targets [23] approach state-of-the-art performance on speech tasks. These systems have two important
characteristics: in addition to the CI or CD phoneme labels,
the system can also hypothesize a “blank” label if it is unsure
of the identity of the current phoneme, and the systems are
trained to optimize the connectionist temporal classification
(CTC) criterion [24] which maximizes the total probability
of correct label sequence conditioned on the input sequence.
More details can be found in [22, 23].
Following [22], our baseline model is thus a CTC model:
a five hidden layer RNN with 500 LSTM cells in each layer,
which predicts 41 CI phonemes (plus “blank”). As a point
of comparison, we also present results obtained using a much
larger state-of-the-art ‘server-sized’ model which is too large
to deploy on embedded devices but nonethless serves as an
upper-bound performance for our models on this dataset. This
model consists of five hidden layers with 600 LSTM cells per
layer, and is trained to predict one of 9287 context-dependent
phonemes (plus “blank”).
Our systems are trained using distributed asynchronous
stochastic gradient descent with a parameter server [25].
The systems are first trained to convergence to optimize the
CTC criterion, following which these are discriminatively
sequence trained to optimize the state-level minimum Bayes
risk (sMBR) criterion [26, 27]. As discussed in Section 5,
after applying the proposed compression scheme, we further
fine-tune the network: first with the CTC criterion, followed
by sequence discriminative training with the sMBR criterion.
This additional fine-tuning step was found to be necessary
to achieve good performance, particularly as the amount of
compression was increased.
The language model used in this work is a 5-gram model
trained on ∼100M sentences of in-domain data, with entropybased pruning applied to reduce the size of the LM down to
roughly 1.5M n-grams (mainly bigrams) with a 64K vocabulary. Since our goal is to build a recognizer to run efficiently
on mobile devices, we minimize the size of the decoder graph
used for recognition, following the approach outlined in [7]:
we perform an additional pruning step to generate a much
smaller first-pass language model (69.5K n-grams; mainly
unigrams), which is composed with the lexicon transducer
to construct the decoder graph. We then perform on-the-fly
rescoring with the larger LM. The resulting models, when
compressed for use on-device, total about 20.3 MB, thus enabling them to be run many times faster than real-time on
recent mobile devices [28].
We parameterize the input acoustics by computing 40dimensional log mel-filterbank energies over the 8Khz range,
which are computed every 10ms over 25ms windowed speech
segments. The server-sized system uses 80-dimensional features computed over the same range since this resulted in
slightly improved performance. Following [23], we stabilize CTC training by stacking together 8 consecutive speech
frames (7 right context frames); only every third stacked
frame is presented as an input to the network.
4.1. Training and Evaluation Data
Our systems are trained on ∼3M hand-transcribed anonymized
utterances extracted from Google voice search traffic (∼2000
hours). We create “multi-style” training data by synthetically distorting utterances to simulate background noise and
reverberation using a room simulator with noise samples
extracted from YouTube videos and environmental recordings of everyday events; 20 distorted examples are created
for each utterance in the training set. Systems are additionally adapted using the sMBR criterion [26, 27] on a set of
∼1M anonymized hand-transcribed (in-domain) dictation
utterances extracted from Google traffic, processed to generate “multi-style” training data as described above, which
improves performance on our dictation task. All results are
reported on a set of 13.3K hand-transcribed anonymized utterances extracted from Google traffic from an open-ended
dictation domain.
5. RESULTS
In our experiments, we seek to determine the impact of the
proposed joint SVD-based compression technique on system
performance. In particular, we are interested in determining
how system performance varies as a function of the degree of
compression, which is controlled by setting the ranks of the
recurrent projection matrices rl as described in Section 3.
Notice that since the proposed compression scheme is applied to all hidden layers of the baseline system, there are
numerous settings of the ranks rl for the projection matrices
in each layer which result in the same number of total parameters in the compressed network. In order to avoid this ambiguity, we set the various projection ranks using the following
criterion: Given a threshold τ , for each layer l, we set the rank
rl of the corresponding projection matrix such that it corresponds to retaining a fraction of at most τ of the explained
variance after the truncated SVD of Whl . More specifically,
if the singular values in Σlh in (5) are sorted in non-increasing
l
, we set each rl as:
order as σ1l ≥ σ2l ≥ · · · ≥ σN
( Pk
rl = arg max
1≤k≤N
j=1
PN
j=1
σjl
2
σjl
2
)
≤τ
(7)
Choosing the projection ranks using (7) allows us to control
the degree of compression, and thus compressed model size
by varying a single parameter, τ . In pilot experiments we
found that this scheme performed better than setting ranks to
be equal for all layers (given the same total parameter budget). Once the projection ranks rl have been determined for
the various projection matrices we fine-tune the compressed
models by first optimizing the CTC criterion, followed by sequence training with the sMBR criterion and adaptation on
in-domain data as described in Section 4.1. The results of our
experiments are presented in Table 1.
As can be seen in Table 1, the baseline system which predicts CI phoneme targets is only ∼10% relative worse than
the larger server-sized system, although it has half as many
parameters. Since the ranks rl are all chosen to retain a given
fraction of the explained variance in the SVD operation, we
also note that earlier hidden layers in the network appear to
have lower ranks than later layers, since most of the variance
is accounted for by a smaller number of singular values. It
can be seen from Table 1 that word error rates increase as the
amount of compression is increased, although performance of
System
server
baseline
τ = 0.95
τ = 0.90
τ = 0.80
τ = 0.70
τ = 0.60
τ = 0.50
τ = 0.40
Projection ranks, rl
350, 375, 395, 405, 410
270, 305, 335, 345, 350
175, 215, 245, 260, 265
120, 150, 180, 195, 200
80, 105, 130, 145, 150
50, 70, 90, 100, 110
30, 45, 55, 65, 75
Params
20.1M
9.7M
8.6M
7.2M
5.4M
4.1M
3.1M
2.3M
1.7M
WER
11.3
12.4
12.3
12.5
12.5
12.6
12.9
13.2
14.4
Table 1. Word error rates (%) on the test set as a function
of the percentage of explained variance retained (τ ) after the
SVDs of the recurrent weight matrices Whl in the hidden layers of the RNN.
the compressed systems are close to the baseline for moderate compression (τ ≥ 0.7). Using a value of τ = 0.6, enables
the model to be compressed to a third of its original size, with
only a small degradation in accuracy. However, performance
begins to degrade significantly for τ ≤ 0.5. Future work will
consider alternative techniques for setting the projection ranks
rl in order to examine their impact on system performance.
6. CONCLUSIONS
We presented a technique to compress RNNs using a joint factorization of recurrent and inter-layer weight matrices, generalizing previous work [8]. The proposed technique was applied to the task of compressing LSTM RNN acoustic models
for embedded speech recognition, where we found that we
could compress our baseline acoustic model to a third of its
original size with negligible loss in accuracy. The proposed
techniques, in combination with weight quantization, allow us
to build a small and efficient speech recognizer that run many
times faster than real-time on recent mobile devices [28].
7. REFERENCES
[1] F. Seide, G. Li, and D. Yu, “Conversational speech
transcription using context-dependent deep neural networks,” in Proc. of Interspeech, 2011, pp. 437–440.
[2] G. Hinton, L. Deng, D. Yu, G. E. Dahl, A.-R. Mohamed,
N. Jaitly, A. Senior, V. Vanhoucke, P. Nguyen, T. N.
Sainath, and B. Kingsbury, “Deep neural networks for
acoustic modeling in speech recognition: The shared
views of four research groups,” IEEE Signal Processing Magazine, vol. 29, no. 6, pp. 82–97, 2012.
[3] H. Sak, A. Senior, and F. Beaufays, “Long short-term
memory recurrent neural network architectures for large
scale acoustic modeling,” in Proc. of Interspeech, 2014,
pp. 338–342.
[4] T. N. Sainath, O. Vinyals, A. Senior, and H. Sak, “Convolutional, long short-term memory, fully connected
deep neural networks,” in Proc. of ICASSP, 2015, pp.
4580–4584.
[5] L. Deng and D. Yu, “Deep learning: methods and applications,” Foundations and Trends in Signal Processing,
vol. 7, no. 3–4, pp. 197–387, 2014.
[6] J. Schalkwyk, D. Beeferman, F. Beaufays, B. Byrne,
C. Chelba, M. Cohen, M. Kamvar, and B. Strope,
““Your Word is my Command”: google search by voice:
A case study,” in Advances in Speech Recognition, pp.
61–90. Springer US, 2010.
[7] X. Lei, A. Senior, A. Gruenstein, and J. Sorensen, “Accurate and compact large vocabulary speech recognition
on mobile devices,” in Proc. of Interspeech, 2013, pp.
662–665.
[8] J. Xue, J. Li, and Y. Gong, “Restructuring of deep neural
network acoustic models with singular value decomposition,” in Proc. of Interspeech, 2013, pp. 2365–2369.
[9] J. Xue, J. Li, D. Yu, M. Seltzer, and Y. Gong, “Singular
value decomposition based low-footprint speaker adaptation and personalization for deep neural network,” in
Proc. of ICASSP, 2014, pp. 6359–6363.
[10] A. Graves, M. Liwicki, S. Fernández, R. Bertolami,
H. Bunke, and J. Schmidhuber, “A novel connectionist system for unconstrained handwriting recognition,”
IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, no. 5, pp. 855–868, 2009.
[11] I. Sutskever, O. Vinyals, and Q. V. Le, “Sequence to
sequence learning with neural networks,” in Proc. of
NIPS, 2014, pp. 3104–3112.
[12] M. Denil, B. Shakibi, L. Dinh, M. Ranzato, and
N. de Freitas, “Predicting parameters in deep learning,”
in Proc. of NIPS, 2013, pp. 2148–2156.
[13] C. Buciluă, R. Caruana, and A. Niculescu-Mizil,
“Model compression,” in Proc. of the 12th ACM
SIGKDD international conference on Knowledge discovery and data mining, 2006, pp. 535–541.
[14] L. J. Ba and R. Caruana, “Do deep nets really need to
be deep?,” in Proc. of NIPS, 2014, pp. 2654–2662.
[15] G. Hinton, O. Vinyals, and J. Dean,
“Distilling
the knowledge in a neural network,” arXiv preprint
arXiv:1503.02531, 2015.
[16] W. Chen, J. T. Wilson, S. Tyree, K. Q. Weinberger, and
Y. Chen, “Compressing neural networks with the hashing trick,” in Proc. of ICML, 2015, pp. 2285–2294.
[17] Y. LeCun, J. S. Denker, and S. A. Solla, “Optimal brain
damage,” in Proc. of NIPS, 1989, pp. 598–605.
[18] F. Grézl and P. Fousek, “Optimizing bottle-neck features for LVCSR,” in Proc. of ICASSP, March 2008, pp.
4729–4732.
[19] T. N. Sainath, B. Kingsbury, V. Sindhwani, E. Arisoy,
and B. Ramabhadran, “Low-rank matrix factorization
for deep neural network training with high-dimensional
output targets,” in Proc. of ICASSP, 2013, pp. 6655–
6659.
[20] Y. Wang, J. Li, and Y. Gong, “Small-footprint highperformance deep neural network-based speech recognition using split-VQ,” in Proc. of ICASSP, 2015, pp.
4984–4988.
[21] P. Nakkiran, R. Alvarez, R. Prabhavalkar, and C. Parada,
“Compressing deep neural networks using a rankconstrained topology,” in Proc. of Interspeech, 2015,
pp. 1473–1477.
[22] H. Sak, A. Senior, K. Rao, O. İrsoy, A. Graves, F. Beaufays, and J. Schalkwyk, “Learning acoustic frame labeling for speech recognition with recurrent neural networks,” in Proc. of ICASSP, 2015, pp. 4280–4284.
[23] H. Sak, A. Senior, K. Rao, and F. Beaufays, “Fast and
accurate recurrent neural network acoustic models for
speech recognition,” in Proc. of Interspeech, 2015, pp.
1468–1472.
[24] A. Graves, S. Fernández, F. Gomez, and J. Schmidhuber, “Connectionist temporal classification: Labelling
unsegmented sequence data with recurrent neural networks,” in Proc. of ICML, 2006, pp. 369–376.
[25] J. Dean, G. S. Corrado, R. Monga, K. Chen, M. Devin,
Q. V. Le, M. Z. Mao, M. Ranzato, A. Senior, P. Tucker,
K. Yang, and A. Y. Ng, “Large scale distributed deep
networks,” in Proc. of NIPS, 2012, pp. 1223–1231.
[26] B. Kingsbury, “Lattice-based optimization of sequence
classification criteria for neural-network acoustic modeling,” in Proc. of ICASSP, 2009, pp. 3761–3764.
[27] H. Sak, O. Vinyals, G. Heigold, A. Senior, E. McDermott, R. Monga, and M. Mao, “Sequence discriminative distributed training of long short-term memory recurrent neural networks,” in Proc. of Interspeech, 2014,
pp. 1209–1213.
[28] I. McGraw, R. Prabhavalkar, R. Alvarez, M. Gonzalez Arenas, K. Rao, D. Rybach, O. Alsharif, H. Sak,
A. Gruenstein, F. Beaufays, and C. Parada, “Personalized speech recognition on mobile devices,” in Proc. of
ICASSP, 2016.
| 9cs.NE
|
Towards Statistical Reasoning in Description Logics
over Finite Domains (Full Version)
Rafael Peñaloza1 and Nico Potyka2
arXiv:1706.03207v1 [cs.AI] 10 Jun 2017
1
KRDB Research Centre, Free University of Bozen-Bolzano, Italy
[email protected]
2
University of Osnabrück, Germany
[email protected]
Abstract. We present a probabilistic extension of the description logic ALC for
reasoning about statistical knowledge. We consider conditional statements over
proportions of the domain and are interested in the probabilistic-logical consequences of these proportions. After introducing some general reasoning problems
and analyzing their properties, we present first algorithms and complexity results
for reasoning in some fragments of Statistical ALC.
1 Introduction
Probabilistic logics enrich classical logics with probabilities in order to incorporate uncertainty. In [5], probabilistic logics have been classified into three types that differ in
the way how they handle probabilities. Type 1 logics enrich classical interpretations
with probability distributions over the domain and are well suited for reasoning about
statistical probabilities. This includes proportional statements like “2% of the population suffer from a particular disease.” Type 2 logics consider probability distributions
over possible worlds and are better suited for expressing subjective probabilities or degrees of belief. For instance, a medical doctor might say that she is 90% sure about her
diagnosis. Type 3 logics combine type 1 and type 2 logics allow to reason about both
kinds of uncertainty.
One basic desiderata of probabilistic logics is that they generalize a classical logic.
That is, the probabilistic interpretation of formulas with probability 1 should agree with
the classical interpretation. However, given that first-order logic is undecidable, a probabilistic first-order logic that satisfies our basic desiderata will necessarily be undecidable. In order to overcome the problem, we can, for instance, restrict to Herbrand interpretations over a fixed domain [2,9,13] or consider decidable fragments like description
logics [3, 8, 10].
Probabilistic type 2 extensions of description logics have been previously studied
in [11]. In the unpublished appendix of this work, a type 1 extension of ALC is presented along with a proof sketch for E XP T IME-completeness of the corresponding satisfiability problem. This type 1 extension enriches classical interpretations with probability distributions over the domain as suggested in [5]. We consider a similar, but more
restrictive setting here. We are interested in an ALC extension that allows statistical reasoning. However, we do not impose a probability distribution over the domain. Instead,
we are only interested in reasoning about the proportions of a population satisfying
some given properties. For instance, given statistical information about the relative frequency of certain symptoms, diseases and the relative frequency of symptoms given
diseases, one can ask the relative frequency of a disease given a particular combination
of symptoms. Therefore, we consider only classical ALC interpretations with finite domains and are interested in the relative proportions that are true in these interpretations.
Hence, interpretations in our framework can be regarded as a subset of the interpretations in [11], namely those with finite domains and a uniform probability distribution
over the domain. These interpretations are indeed sufficient for our purpose. In particular, by considering strictly less interpretations, we may be able to derive tighter answer
intervals for some queries. Our approach bears some resemblance to the random world
approach from [4]. However, the authors in [4] consider possible worlds with a fixed
domain size N and are interested in the limit of proportions as N goes to infinity. We
are interested in all finite possible worlds that satisfy certain proportions and ask what
statistical statements must be true in all these worlds.
We begin by introducing Statistical ALC in Section 2 together with three relevant
reasoning problems. Namely, the Satisfiability Problem, the l-Entailment problem and
the p-Entailment problem. In Section 3, we will then discuss some logical properties of
Statistical ALC. In Section 4 and 5, we present first computational results for fragments
of Statistical ALC.
2 Statistical ALC
We start by revisiting the classical description logic ALC. Given two disjoint sets NC
of concept names and NR of role names, ALC concepts are built using the grammar
rule C ::= ⊤ | A | ¬C | C ⊓ C | ∃r.C, where A ∈ NC and r ∈ NR . One can
express disjunction, universal quantification and subsumption through the usual logical
equivalences like C1 ⊔ C2 ≡ ¬(¬C1 ⊓ ¬C2 ). For the semantics, we focus on finite
interpretations. An ALC interpretation I = (∆I , ·I ) consist of a non-empty, finite
domain ∆I and an interpretation function ·I that maps concept names A ∈ NC to sets
AI ⊆ ∆I and roles names r ∈ NR to binary relations rI ⊆ ∆I × ∆I . Two ALC
concepts C1 , C2 are equivalent (C1 ≡ C2 ) iff C1I = C2I for all interpretations I.
Here, we consider a probabilistic extension of ALC. Statistical ALC knowledge
bases consist of probabilistic conditionals that are built up over ALC concepts.
Definition 1 (Conditionals, Statistical KB). A probabilistic ALC conditional is an
expression of the form (C | D)[ℓ, u], where C, D are ALC concepts and ℓ, u ∈ Q are
rational numbers such that 0 ≤ ℓ ≤ u ≤ 1. A statistical ALC knowledge base (KB) is
a set K of probabilistic ALC conditionals.
For brevity, we usually call probabilistic ALC conditionals simply conditionals.
Example 2. Let Kflu = {(∃has.fever | ∃has.flu)[0.9, 0.95], (∃has.flu | ⊤)[0.01, 0.03]}.
Kflu states that 90 to 95 percent of patients who have the flu have fever, and that only 1
to 3 percent of patients have the flu.
Intuitively, a conditional (C | D)[ℓ, u] expresses that the relative proportion of elements
of D that also belong to C is between ℓ and u. In order to make this more precise, consider a finite ALC interpretation I, and an ALC concept X. We denote the cardinality
of X I by [X]I , that is, [X]I := |X I |. The interpretation I satisfies (C | D)[ℓ, u],
written as I |= (C | D)[ℓ, u], iff either [D]I = 0 or
[C ⊓ D]I
∈ [ℓ, u].
[D]I
(1)
I satisfies a statistical ALC knowledge base K iff it satisfies all conditionals in K. In this
case, we call I a model of K and write I |= K. We denote the set of all models of K by
Mod(K). As usual, K is consistent if Mod(K) 6= ∅ and inconsistent otherwise. We call
two knowledge bases K1 , K2 equivalent and write K1 ≡ K2 iff Mod(K1 ) = Mod(K2 ).
Example 3. Consider again the KB Kflu from Example 2. Let I be an interpretation
with 1000 individuals. 10 of these have the flu and 9 have both the flu and fever. Then
I ∈ Mod(Kflu ).
In classical ALC, knowledge bases are defined by a set of general concept inclusions (GCIs) C ⊑ D that express that C is a subconcept of D. An interpretation I
satisfies C ⊑ D iff C I ⊆ DI . As shown next, GCIs can be seen as a special kind of
conditionals, and hence statistical ALC KBs are a generalization of classical ALC KBs.
Proposition 4. For all statistical ALC interpretations I, we have I |= C ⊑ D iff
I |= (D | C)[1, 1].
Proof. If I |= C ⊑ D then C I ⊆ DI and C I ∩ DI = C I . If C I = ∅, we have
I
= 1. Hence, I |= (D | C)[1, 1].
[C]I = 0. Otherwise [C⊓D]
[C]I
Conversely, assume I |= (D | C)[1, 1]. If [C]I = 0, then C I = ∅ and I |= C ⊑ D.
I
= 1, that is, [C ⊓ D]I = [C]I . If there was a d ∈ C I \ DI , we had
Otherwise, [C⊓D]
[C]I
[C ⊓ D]I < [C]I , hence, we have C I ⊆ DI and I |= C ⊑ D.
⊓
⊔
Given a statistical ALC knowledge base K, the first problem that we are interested in
is deciding consistency of K. We define the satisfiability problem for statistical ALC
knowledge bases as usual.
Satisfiability Problem: Given a knowledge base K, decide whether Mod(K) 6= ∅.
Example 5. Consider again the knowledge base Kflu from Example 2. The conditional
(∃has.flu | ⊤)[0.01, 0.03] implies that [∃has.flu]I ≥ 0.01 for all models I ∈ Mod(Kflu ).
(∃has.fever | ∃has.flu)[0.9, 0.95] implies [∃has.fever ⊓ ∃has.flu]I ≥ 0.9[∃has.flu]I . Therefore, [∃has.fever]I ≥ [∃has.fever ⊓ ∃has.flu]I ≥ 0.9[∃has.flu]I ≥ 0.009. Hence, adding
the conditional (∃has.fever | ⊤)[0, 0.005]} renders Kflu inconsistent.
If K is consistent, we are interested in deriving (implicit) probabilistic conclusions. We
can think of different reasoning problems in this context. First, we can define an entailment relation analogously to logical entailment. Then, the probabilistic conditional
(C | D)[ℓ, u] is an l-consequence of the KB K iff Mod(K) ⊆ Mod({(C | D)[ℓ, u]}).
In this case, we write K |=l (C | D)[ℓ, u]. In the context of type 2 probabilistic conditionals, this entailment relation has also been called just logical consequence [9].
l-Entailment Problem: Given a knowledge base K and a conditional (C | D)[ℓ, u],
decide whether K |=l (C | D)[ℓ, u].
Example 6. Consider again the KB Kflu from Example 2. As explained in Example 5,
[∃has.fever]I ≥ 0.009 holds for all models I ∈ Mod(K). Therefore, it follows that
Kflu |=l (∃has.fever | ⊤)[0.009, 1]. That is, our statistical information suggests that at
least 9 out of 1, 000 of our patients have fever.
Example 7. Consider a domain with birds (B), penguins (P) and flying animals (F). We
let Kbirds = {(B | ⊤)[0.5, 0.6], (F | B)[0.85, 0.9], (F | P )[0, 0]}. Note that the conditional (F | B)[0.85, 0.9] is actually equivalent to (¬F | B)[0.1, 0.15]. Furthermore,
for all I ∈ Mod(Kbirds ), (F | P )[0, 0] implies [P ⊓ F ]I = 0. Therefore, we have
[P ⊓ B]I = [B ⊓ P ⊓ F ]I + [B ⊓ P ⊓ ¬F ]I ≤ 0 + [B ⊓ ¬F ]I ≤ 0.15[B]I . Hence,
Kbirds |=l (P | B)[0, 0.15]. That is, our statistical information suggests that at most 15
out of 100 birds in our population are penguins.
As usual, the satisfiability problem can be reduced to the l-entailment problem.
Proposition 8. K is inconsistent iff K |=l (⊤ | ⊤)[0, 0].
Proof. If K is inconsistent, then Mod(K) = ∅ and so K |=l (⊤ | ⊤)[0, 0].
I
Conversely, assume K |=l (⊤ | ⊤)[0, 0]. We have [⊤]I > 0 and [⊤⊓⊤]
= 1 for all
[⊤]I
interpretations I. Hence, Mod({(⊤ | ⊤)[0, 0]}) = ∅ and since K |=l (⊤ | ⊤)[0, 0], we
must have Mod(K) = ∅ as well.
⊓
⊔
Often, we do not want to check whether a specific conditional is entailed, but rather
deduce tight probabilistic bounds for a statement. This problem is often referred to
as the probabilistic entailment problem in other probabilistic logics, see [6, 9, 13] for
instance. Consider a query of the form (C | D), where C, D are ALC concepts. We
define the p-Entailment problem similar to the probabilistic entailment problem for
type 2 probabilistic logics.
p-Entailment Problem: Given knowledge base K and a query (C | D), find minimal
and maximal solutions of the optimization problems
inf
I∈Mod(K)
subject to
I
/
sup
I∈Mod(K)
[C ⊓ D]I
[D]I
[D]I > 0
is bounded from below by 0 and from above by
Since the objective function [C⊓D]
[D]I
1, the infimum m and the maximum M are well-defined whenever there is a model
I ∈ Mod(K) such that [D]I > 0. In this case, we say that K p-entails (C | D)[m, M ]
and write K |=p (C | D)[m, M ]. In the context of type 2 probabilistic conditionals,
this entailment relation has also been called tight logical consequence [9]. If [D]I = 0
for all I ∈ Mod(K), the p-Entailment problem is infeasible, that is, there exists no
solution.
Example 9. In Example 7, we found that Kbirds |=l (P | B)[0, 0.15]. This bound is
actually tight. Since 0 is always a lower bound and we showed that 0.15 is an upper
bound, it suffices to give examples of interpretations that take these bounds. For the
lower bound, let I0 be an interpretation with 200 individuals. 100 of these individuals
are birds and 85 are birds that can fly. There are no penguins. Then I0 is a model of
Kbirds with [B]I0 > 0 that satisfies (P | B)[0, 0]. Construct I1 from I0 by letting the
15 non-flying birds be penguins. Then I1 is another model of Kbirds and I1 satisfies
(P | B)[0.15, 0.15]. Hence, we also have Kbirds |=p (P | B)[0, 0.15].
If K |=p (C | D)[m, M ], one might ask whether the values between m and M are
actually taken by some model of K or whether there can be large gaps in between. For
the probabilistic entailment problem for type 2 logics, we can show that the models of
K do indeed yield a dense interval by noting that each convex combination of models is
a model and applying the Intermediate Value Theorem from Real Analysis. However,
in our framework, we do not consider probability distributions over possible worlds, but
the worlds themselves, which are discrete in nature. We therefore cannot apply the same
tools here. However, for each two models that yield different probabilities for a query,
we can find another model that takes the probability in the middle of these probabilities.
Lemma 10 (Bisection Lemma). Let C, D be two arbitrary ALC concepts. If there
I0
I1
exist I0 , I1 ∈ Mod(K) such that r0 = [C⊓D]
< [C⊓D]
= r1 , then there is an
[D]I0
[D]I1
I0.5 ∈ Mod(K) such that
[C⊓D]I0.5
[D]I0.5
=
r0 +r1
2 .
Proof. Given an interpretation I and n ∈ N, we construct the interpretation I (n) as
(n)
follows. We set ∆I = {d1 , . . . , dn | d ∈ ∆I }; that is, we make n different copies of
(n)
the domain. For all A ∈ NC , we set AI = {d1 , . . . , dn | d ∈ AI }, and for all r ∈ NR ,
(n)
we set rI
= {(d1 , e1 ), . . . , (d1 , en ), . . . (dn , e1 ), . . . , (dn , en ) | (d, e) ∈ rI }. By
(n)
induction on the shape of ALC concepts, we can show that [F ]I = n[F ]I for all
concepts F .
Let now (Ci | Di )[ℓi , ui ], i = 1, . . . , |K| be all the conditionals from K. Let ℓ be
the least common multiple of all values from [D]I0 , [D]I1 , [D1 ]I0 , [D1 ]I1 , . . . , [Dn ]I0 ,
[Dn ]I1 that are non-zero, and k, K, k1 , K1 , . . . , kn , Kn be such that k[D]I0 = ℓ,
K[D]I1 = ℓ, . . . , kn [Dn ]I0 = ℓ, Kn [Dn ]I1 = ℓ. Assume w.l.o.g. that I0 and I1 have
different domains (just rename the elements of one domain if necessary). For n, N ∈ N,
(n)
(N )
let In,N be the interpretation that is obtained from I0 and I1 by taking the union
(n)
(N )
of the domains, concept and role interpretations. That is, ∆In,N = ∆I0 ∪ ∆I1 ,
Qn
(n)
(N )
(n)
(N )
I1
. Consider k ′ = k i=1 ki ,
and rIn,N = rI0 ∪ rQ
AIn,N =QAI0 ∪ AI1 Q
n
n
′
′
= K i6=j Ki . Then, for i = 1, . . . , |K|,
k−j
= k i6=j ki , K ′ = K i=1 Ki and K−j
(k′ n)
(K ′ N )
[Ci ⊓ Di ]I0
+ [Ci ⊓ Di ]I1
[Ci ⊓ Di ]Ik′ n,K ′ N
=
(k′ n)
(K ′ N )
Ik′ n,K ′ N
[Di ]
[Di ]I0
+ [Di ]I1
k ′ n[Ci ⊓ Di ]I0 + K ′ N [Ci ⊓ Di ]I1
k ′ n[Di ]I0 + K ′ N [Di ]I1
k ′ n[Ci ⊓ Di ]I0 + K ′ N [Ci ⊓ Di ]I1
=
′ n + K ′ N )l
(k−i
−i
=
=
k′ n
[Ci ⊓ Di ]I0
[Ci ⊓ Di ]I1
K ′N
+
′ n + K ′ N k [D ]I0
′ n + K ′ N K [D ]I1
k−i
k−i
i
i
i
i
−i
−i
=
′
K−i
N
k′ n
[Ci ⊓ Di ]I0
[Ci ⊓ Di ]I1
+
.
′
′
′
′
I
0
k−i n + K−i N [Di ]
k−i n + K−i N [Di ]I1
The last equality shows that
I1
[Ci ⊓Di ]
[Di ]I1
[Ci ⊓Di ]
[Di
I ′
k n,K ′ N
I
] k′ n,K ′ N
is a convex combination of
[Ci ⊓Di ]I0
[Di ]I0
and
. Since, I0 and I1 satisfy the i-th conditional, Ik′ n,K ′ N satisfies the condi-
tional as well. In case that both [Di ]I0 = 0 and [Di ]I1 = 0, we have [Di ]Ik′ n,K ′ N = 0
as well and so the conditional is still satisfied. If only [Di ]I0 = 0, we can see from
the second inequality that
[Ci ⊓Di ]
[Di ]
I ′
k n,K ′ N
=
I ′
k n,K ′ N
k′ n0+K ′ N [Ci ⊓Di ]I1
k′ n0+K ′ N [Di ]I1
=
[Ci ⊓Di ]I1
[Di ]I1
and
I1
the conditional is still satisfied. The case [Di ] = 0 is analogous of course. Hence,
Ik′ n,K ′ N ∈ Mod(K) for all choices of n and N .
Qn
Qn
Let k0 = i=1 ki and K0 = i=1 Ki . Then we can show completely analogously
that
[C⊓D]
I ′
k n,K ′ N
I
[D] k′ n,K ′ N
N = K ′ , we have
=
[Ci ⊓Di ]I0
k0 n
k0 n+K0 N [Di ]I0
[C⊓D]
I ′ ′
k K ,K ′ k′
I
[D] k′ K ′ ,K ′ k′
=
+
[Ci ⊓Di ]I1
K0 N
k0 n+K0 N [Di ]I1
I
1 [Ci ⊓Di ] 0
2 [Di ]I0
+
I
1 [Ci ⊓Di ] 1
2 [Di ]I1
. Letting n = K ′ and
=
r0 +r1
2 .
⊓
⊔
We can now show that for each value between the lower and upper bound given by
p-entailment, we can find a model that gives a probability arbitrarily close to this value.
Proposition 11 (Intermediate Values). Let K |=p (C | D)[m, M ]. Then for every
x ∈ (m, M ) (where (m, M ) denotes the open interval between m and M ) and for all
Ix,ǫ
ǫ > 0, there is a Ix,ǫ ∈ Mod(K) such that | [C⊓D]
− x| < ǫ.
[D]Ix,ǫ
Proof. Since K |=p (C | D)[m, M ], there must exist an I0 ∈ Mod(K) such that
m≤
[C⊓D]I0
[D]I0
[C⊓D]I1
≤ M.
[D]I1
⊥
I0 = I0 , I0⊤ =
≤ x and an I1 ∈ Mod(K) such that x ≤
Consider the following bisection algorithm: we let
I1 . Then start⊥
⊤
ing from i = 1, we let Ii0.5 be the model of K that is obtained from Ii−1
and Ii−1
0.5
as explained in the bisection lemma. If
0.5
[C⊓D]Ii
0.5
[D]Ii
⊥
0.5
[D]Ii
= x, we are done. Otherwise, if
⊥
< x, we let Ii⊥ = Ii−1
and Ii⊤ = I 0.5 . Otherwise, we have
and we let
[C⊓D]Ii
[C⊓D]Ii
Ii⊥
= Ii0.5 and
⊤
[C⊓D]Ii
0.5
[C⊓D]Ii
0.5
[D]Ii
⊤
= Ii−1
. By construction, we maintain the invariant
⊥
Ii⊤
[C⊓D]Ii
we have [C⊓D]
−
≤ M−m
⊤
⊥
2n . Hence, after at
[D]Ii
[D]Ii
≤x≤
and
⊤
i
[D]I
M−m
most i = log
iterations, Ii0.5 is a model of K that proves the claim.
ǫ
⊥
[D]Ii
< x,
Ii⊤
⊓
⊔
3 Logical Properties
We now discuss some logical properties of Statistical ALC. We already noted that Statistical ALC generalizes classical ALC in Proposition 4. Furthermore, p-entailment
yields a tight and dense (Proposition 11) answer interval for all queries whose condition can be satisfied by models of the knowledge base. Let us also note that statistical
ALC is language invariant. That is, increasing the language by adding new concept or
role names does not change the semantics of ALC. This can be seen immediately by
observing that the interpretation of conditionals in (1) depends only on the concept and
role names that appear in the conditional.
Statistical ALC is also representation invariant in the sense that for all concepts
C1 , D1 and C2 , D2 , if C1 ≡ C2 and D1 ≡ D2 then (C1 | D1 )[l, u] ≡ (C2 | D2 )[l, u].
Hence, changing the syntactic representation of conditionals does not change their semantics. In particular, entailment results are independent of such changes.
Both l- and p-entailment satisfy the following independence property: whether or
not K |=l (C | D)[ℓ, u] (K |=p (C | D)[m, M ]) depends only on the conditionals
in K that are connected with the query. This may simplify answering the query by
reducing the size of the KB. In order to make this more precise, we need some additional
definitions. For an arbitrary ALC concept C, Sig(C) denotes the set of all concept and
role names appearing in C. The conditionals (C1 | D1 )[ℓ1 , u1 ] and (C2 | D2 )[ℓ2 , u2 ]
are directly connected (written (C1 | D1 )[ℓ1 , u1 ] ⇋ (C2 | D2 )[ℓ2 , u2 ]) if and only
if (Sig(C1 ) ∪ Sig(D1 )) ∩ (Sig(C2 ) ∪ Sig(D2 )) 6= ∅. That is, two conditionals are
directly connected iff they share concept or role names. Let ⇋∗ denote the transitive
closure of ⇋. We say that (C1 | D1 )[ℓ1 , u1 ] and (C2 | D2 )[ℓ2 , u2 ] are connected iff
(C1 | D1 )[ℓ1 , u1 ] ⇋∗ (C2 | D2 )[ℓ2 , u2 ]. The restriction of K to conditionals connected
to (C | D)[ℓ, u] is the set {κ ∈ K | κ ⇋∗ (C | D)[ℓ, u]}. Using an analogous definition
for queries (qualitative conditionals) (C1 | D1 ) and (C2 | D2 ), we get the following
result.
Proposition 12 (Independence). If K is consistent, we have
1. K |=l (C | D)[ℓ, u] iff {κ ∈ K | κ ⇋∗ (C | D)[ℓ, u]} |=l (C | D)[ℓ, u].
2. K |=p (C | D)[m, M ] iff {κ ∈ K | κ ⇋∗ (C | D)} |=p (C | D)[m, M ].
Proof. For both claims, it suffices to show that for each model I1 of K, there is a
model I2 of {κ ∈ K | κ ⇋∗ (C | D)} ({κ ∈ K | κ ⇋∗ (C | D)[ℓ, u]}) such that
[D]I1 = [D]I2 and [C ⊓ D]I1 = [C ⊓ D]I2 and vice versa.
If I1 is a model of K, let I2 be the restriction of I1 to the concept and role names
in {κ ∈ K | κ ⇋∗ (C | D)}. Then I2 is still a model of {κ ∈ K | κ ⇋∗ (C | D)}. In
particular, [D]I1 = [D]I2 and [C ⊓ D]I1 = [C ⊓ D]I2 .
Conversely, let I2 be a model of {κ ∈ K | κ ⇋∗ (C | D)}. By consistency of K,
there is a model I0 of K. Let I1 be the interpretation defined as the disjoint union of I0
and I2 . Since {κ ∈ K | κ ⇋∗ (C | D)} and K \ {κ ∈ K | κ ⇋∗ (C | D)} do not share
any concept and role names by definition of connectedness, I1 satisfies conditionals in
{κ ∈ K | κ ⇋∗ (C | D)} iff I2 does and conditionals in K \ {κ ∈ K | κ ⇋∗ (C | D)}
iff I0 does. Hence, I1 is a model of K. In particular, it holds that [D]I1 = [D]I2 and
⊓
⊔
[C ⊓ D]I1 = [C ⊓ D]I2 .
Another interesting property of probabilistic logics is continuity. Intuitively, continuity
states that minor changes in the knowledge base do not yield major changes in the
derived probabilities. However, as demonstrated by Courtney and Paris, this condition is
too strong when reasoning with the maximum entropy model of the knowledge base [14,
p. 90]. The same problem arises for the probabilistic entailment problem [16, Example
4]. While these logics considered subjective probabilities, the same problem occurs in
our setting for statistical probabilities as we demonstrate now.
Example 13. Consider the knowledge base
K = {(B | A)[0.4, 0.5], (C | A)[0.5, 0.6], (B | C)[1, 1], (C | B)[1, 1]}.
The interpretation I = ({a, b}, ·I ) with AI = {a, b}, B I = C I = {b} is a model of
K, i.e., K is consistent. In particular, since A is interpreted by the whole domain of I
we know that
K |=p (A | ⊤)[m, 1]
for some m ∈ [0, 1]. As explained in Proposition 4, deterministic conditionals correspond to concept inclusions and so (B | C)[1, 1] and (C | B)[1, 1] imply that
′
I′
′
I′
B I = C I for all models I ′ of K. Therefore, [B⊓A]
= [C⊓A]
. Let K′ denote
[A]I ′
[A]I ′
the knowledge base that is obtained from K by decreasing the upper bound of the first
conditional in K by an arbitrarily small ǫ > 0. That is,
K′ = {(B | A)[0.4, 0.5 − ǫ], (C | A)[0.5, 0.6], (B | C)[1, 1], (C | B)[1, 1]}.
Then the only way to satisfy the first two conditionals in K′ is by interpreting A by the
empty set. Indeed, the interpretation I∅ that interprets all concept names by the empty
set is a model of K′ . So K′ is consistent and
K′ |=p (A | ⊤)[0, 0].
Hence, a minor change in the probabilities in the knowledge base can yield a severe
change in the entailed probabilities. This means that the p-entailment relation that we
consider here is not continuous in this way either.
As an alternative to this strong notion of continuity, Paris proposed to measure the
difference between KBs by the Blaschke distance between their models. Blaschke continuity says that if KBs are close with respect to the Blaschke distance, the entailed
probabilities are close. Blaschke continuity is satisfied by some probabilistic logics under maximum entropy and probabilistic entailment [14, 16]. In [14, 16], probabilistic
interpretations are probability distributions over a finite number of classical interpretations and the distance between two interpretations is the distance between the corresponding probability vectors. We cannot apply this definition here because we interpret
conditionals by means of classical interpretations. It is not at all clear what a reasonable
definition for the distance between two classical interpretations is. We leave the search
for a reasonable topology on the space of classical interpretations for future work.
4 Statistical EL
Proposition 4 and the fact that reasoning in ALC is E XP T IME-complete, show that our
reasoning problems are E XP T IME-hard. However, we did not find any upper bounds on
the complexity of reasoning in ALC so far. We will therefore focus on some fragments
of ALC now.
To begin with, we will focus on the sublogic EL [1] of ALC that does not allow
for negation and universal quantification. Formally, EL concepts are constructed by the
grammar rule C ::= A | ⊤ | C⊓C | ∃r.C, where A ∈ NC and r ∈ NR . A statistical EL
KB is a statistical ALC KB where conditionals are restricted to EL concepts. Notice that,
due to the upper bounds in conditionals, statistical EL KBs are capable of expressing
some weak variants of negations. For instance, a statement (C | ⊤)[ℓ, u] with u < 1
restricts every model I = (∆I , ·I ) to contain at least one element δ ∈ ∆I \ C I . Thus,
contrary to classical EL, statistical EL KBs may be inconsistent.
Example 14. Consider the KB K1 = (∅, C1 ), where
C1 = {(A | ⊤)[0, 0.2], (A | ⊤)[0.3, 1]}.
Since ⊤I = ∆I 6= ∅, every model I = (∆I , ·I ) of K1 must satisfy
[A]I ≤ 0.2[⊤]I < 0.3[⊤]I ≤ [A]I ,
which is clearly a contradiction. Thus, K1 is inconsistent.
More interestingly, though, it is possible to simulate valuations over a finite set of propositional formulas wit the help of conditional statements. Thus, the satisfiability problem
is at least NP-hard even for Statistical EL.
Theorem 15. The satisfiability problem for Statistical EL is NP-hard.
Proof. We provide a reduction from the well-known
coNP-complete problem of decidW
ing validity of a 3DNF formula. Let ϕ = ni=1 κi be a 3DNF formula; that is, each
κi , 1 ≤ i ≤ n is a conjunction of three literals κi = λ1i ∧ λ2i ∧ λ3i . We construct a
statistical EL KB as follows. Let V be the set of all variables appearing in ϕ. For every
x ∈ V, we use two concept names Ax and A¬x . In addition, for every clause κi we
introduce a concept name Bi , and create an additional concept name C.
Consider the KB Kϕ = (Tϕ , Cϕ ), where
Tϕ := {
3
l
j=1
Aλj ⊑ Bi , Bi ⊑ C | 1 ≤ i ≤ n}
i
Cϕ := {(Ax | ⊤)[0.5, 1], (A¬x | ⊤)[0.5, 1], (A¬x | Ax )[0, 0]} ∪ {(C | ⊤)[0, 0.5]}.
Then it holds that ϕ is valid iff Kϕ is inconsistent.
⊓
⊔
On the other hand, consistency can be decided in non-deterministic exponential
time, through a reduction to integer programming. Before describing the reduction in
detail, we introduce a few simplifications.
Recall from Proposition 4 that a conditionals of the form (D | C)[1, 1] is equivalent
to the classical GCI C ⊑ D. Thus, in the following we will often express statistical EL
KBs as pairs K = (T , C), where T is a classical TBox (i.e., a finite set of GCIs), and C
is a set of conditionals. A statistical EL KB K = (T , C) is said to be in normal form if
all the GCIs in T are of the form
A1 ⊓ A2 ⊑ B,
A ⊑ ∃r.B,
∃r.A ⊑ B
and all its conditionals are of the form
(A | B)[ℓ, u]
where A, B ∈ NC ∪ {⊤}, and r ∈ NR . Informally, a KB is in normal form if at
most one constructor is used in any GCI, and all conditionals are atomic (i.e., between
concept names). Every KB can be transformed to an equivalent one (w.r.t. the original
signature) in linear time using the normalization rules from [1], and introducing new
concept names for complex concepts appearing in conditionals. More precisely, we
replace any conditional of the form (C | D)[ℓ, u] with the statement (A | B)[ℓ, u],
where A, B are two fresh concept names, and extend the TBox with the axioms A ≡ C,
and B ≡ D.
The main idea behind our consistency algorithm is to partition the finite domain of
a model into the different types that they define, and use integer programming to verify
that all the logical and conditional constraints are satisfied. Let NC (K) denote the set of
all concept names appearing in the KB K. We call any subset θ ⊆ NC (K) a type for K.
Intuitively, such a type θ represents all the elements of the domain that are interpreted
to belong to all concept names A ∈ θ and no concept name A ∈
/ θ. We denote as Θ(K)
the set of all types of K. To simplify the presentation, in the following we treat ⊤ as a
concept name that belongs to all types.
Given a statistical EL KB K = (T , C) in normal form, we consider an integer
variable xθ for every type θ ∈ Θ(K). These variables will express the number of domain
elements that belong to the corresponding type. In addition, x⊤ will be used to represent
the total size of the domain. We build a system of linear inequalities over these variables
as follows. First, we require that all variables have a value at least 0, and that the sizes
of all types add exactly the size of the domain.
X
xθ = x⊤
(2)
θ∈Θ(K)
0 ≤ xθ
for all θ ∈ Θ(K)
(3)
Then, we ensure that all the conditional statements from the KB are satisfied by adding,
for each statement (A | B)[ℓ, u] ∈ C the constraint
X
X
X
ℓ·
xθ ≤
xθ ≤ u ·
xθ ,
(4)
B∈θ
A,B∈θ
B∈θ
Finally, we must ensure that the types satisfy all the logical constraints introduced by
the TBox. The GCI A1 ⊓ A2 ⊑ B states that every element that belongs to both A1 and
A2 must also belong to B. This means that types containing A1 , A2 but excluding B
should not be populated. We thus introduce the inequality
xθ = 0
if A1 ⊓ A2 ⊑ B ∈ T , A1 , A2 ∈ θ, and B ∈
/θ
(5)
Dealing with existential restrictions requires checking different alternatives, which we
solve by creating different linear programs. The GCI A ⊑ ∃r.B implies that, whenever
there exists an element in A, there must also exist P
at least one elementP
in B. Thus, to
satisfy this axiom, either A should be empty (i.e., A∈θ xθ = 0), or B∈θ xθ ≥ 1.
Hence, for every existential restriction of the form A ⊑ ∃r.B, we define the set
X
X
EA,B := {
xθ = 0,
xθ ≥ 1}
A∈θ
B∈θ
To deal with GCIs of the form ∃r.A ⊑ B, we follow a similar approach, together with
the ideas of the completion algorithm for classical EL. For every pair of existential
restrictions A ⊑ ∃r.B, ∃r.C ⊑ D, we define the set
X
X
xθ ≥ 1}
xθ = 0,
FA,B,C,D := {
B∈θ,C ∈
/θ
A∈θ,D∈θ
/
P
Intuitively, A∈θ,D∈θ
/ xθ ≥ 1 whenever there exists an element that belongs to A but
not to D. If this is the case, and the GCIs A ⊑ ∃r.B, ∃r.C ⊑ D belong to the TBox T ,
then there must exist some element that belongs to B but not to C.
We call the hitting sets of
{EA,B | A ⊑ ∃r.B ∈ T } ∪ {FA,B,C,D | A ⊑ ∃r.B, ∃r.C ⊑ D ∈ T }
choices for T . A program for K is an integer program containing all the inequalities (2)–
(5) and a choice for T . Then we get the following result.
Lemma 16. K is consistent iff there exists a program for K that is satisfiable.
Proof. The “only if” direction is straight-forward since the inequalities are sound w.r.t.
the semantics of statistical KBs. We focus on the “if” direction only.
Given a solution of the integer program, we construct an interpretation I = (∆, ·I )
as follows. We create a domain ∆ with x⊤ elements, and partition it such that for every
type θ ∈ Θ(K), there is a class [[θ]] containing exactly xθ elements. For every nonempty class, select a representative element δθ ∈ [[θ]].
The interpretation function ·I maps every concept name A to the set
[
AI :=
[[θ]].
A∈θ
Given a non-empty class [[θ]] such that A ∈ θ and A ⊑ ∃r.B ∈ T , let τ be a type such
that B ∈ τ , xτ > 0, and for every ∃r.C ⊑ D ∈ T , if D ∈
/ θ, then C ∈
/ τ . Notice
that such a τ must exist because the solution must satisfy at least one restriction in each
θ
FA,B,C,D . We define rA,B
:= θ × {δτ } and set
[
θ
rI :=
rA,B
.
A∈θ,A⊑∃r.B∈T
It remains to be shown that I is a model of K.
S
Notice that for two concept names A, B, it holds that (A ⊓ B)I = A,B∈θ [[θ]] and
P
hence [A ⊓ B]I | = A,B∈θ xθ . Given a conditional statement (A | B)[ℓ, u] ∈ C, since
the solution must satisfy the inequality (4), it holds that
ℓ · [B]I ≤ [A ⊓ B]I ≤ u · [B]I .
For a GCI A1 ⊓ A2 ⊑ B ∈ T , by the inequality (5) it follows that for every type
θ containing both A1 , A2 , but not B, [[θ]] = ∅. Hence AI1 ∩ AI2 ⊆ B I . For every
A ⊑ ∃r.B ∈ T , and every γ ∈ ∆, if γ ∈ AI then by construction there is an element
γ ′ such that (γ, γ ′ ) ∈ rI .
Finally, if (γ, γ ′ ) ∈ rI , then by construction there exists a type θ and an axiom
A ⊑ ∃r.B ∈ T such that γ ∈ [[θ]] and γ ′ = δτ . Then, for every GCI ∃r.C ⊑ D ∈ T ,
γ ′ ∈ C I implies C ∈ τ and hence D ∈ θ which means that γ ∈ DI .
⊓
⊔
Notice that the construction produces exponentially many integer programs, each of
which uses exponentially many variables, measured on the size of the KB. Since satisfiability of integer linear programs is decidable in non-deterministic polynomial time
on the size of the program, we obtain a non-deterministic exponential time upper bound
for deciding consistency of statistical EL KBs.
Theorem 17. Consistency of statistical EL KBs is in NE XP T IME.
5 Reasoning with Open Minded KBs
In order to regain tractability, we now further restrict statistical EL KBs by disallowing upper bounds in the conditional statements. We call such knowledge bases open
minded.
Definition 18 (Open Minded KBs). A statistical EL KB K = (T , C) is open minded
iff all the conditional statements (C | D)[ℓ, u] ∈ C are such that u = 1.
For the scope of this section, we consider only open minded KBs. The first obvious
consequence of restricting to this class of KBs is that negations cannot be simulated. In
fact, every open minded KB is consistent and, as in classical EL, can be satisfied in a
simple universal model.
Theorem 19. Every open minded KB is consistent.
Proof. Consider the interpretation I = ({δ}, ·I ) where the interpretation function maps
every concept name A to AI := {δ} and every role name r to rI := {(δ, δ)}. It is easy
to see that this interpretation is such that C I = {δ} holds for every EL concept C.
Hence, I satisfies all EL GCIs and in addition [C ⊓ D]I = [C]I = 1 which implies that
all conditionals are also satisfied.
⊓
⊔
Recall that, intuitively, conditionals specify that a proportion of the population satisfies
some given properties. One interesting special case of p-entailment is the question how
likely it is to observe an individual that belongs to a given concept.
Table 1. Rules for deciding m-necessity
C1
C2
C3
if {(X, A1 ), (X, A2 )} ⊆ S and A1 ⊓ A2 ⊑ B ∈ T then add (X, B) to S
if (X, A) ∈ S
and A ⊑ ∃r.B ∈ T
then add (A, r, B) to S
if {(X, r, Y ), (Y, A)} ⊆ S and ∃r.A ⊑ B ∈ T
then add (X, B) to S
L1
L2
L3
if
if
if (B, A) ∈ S
(A | B)[ℓ, 1] ∈ C then L(A) ← ℓ · L(B)
A1 ⊓ A2 ⊑ B ∈ T then L(B) ← L(A1 ) + L(A2 ) − 1
then L(A) ← L(B)
Definition 20. Let K be an open minded KB, C a concept, and m ∈ [0, 1]. C is m-necessary in K if K p-entails (C | ⊤)[m, 1]. The problem of m-necessity consists in
deciding whether C is m-necessary in K.
We show that this problem can be solved in polynomial time. As in the previous section, we assume that the KB is in normal form and additionally, that all conditional
statements (A | B)[ℓ, 1] ∈ C are such that ℓ < 1. This latter assumption is made
w.l.o.g. since the conditional statement (A | B)[1, 1] can be equivalently replaced by
the GCI B ⊑ A (see Proposition 4). Moreover, checking m-necessity of a complex
concept C w.r.t. the KB (T , C) is equivalent to deciding m-necessity of a new concept
name A w.r.t. the KB (T ∪ {A ≡ C}, C). Thus, in the following we consider w.l.o.g.
only the problem of deciding m-necessity of a concept name w.r.t. to a KB in normal
form.
Our algorithm extends the completion algorithm for classification of EL TBoxes to
in addition keep track of the lower bounds of necessity for all relevant concept names.
The algorithm keeps as data structure a set S of tuples of the form (A, B) and (A, r, B)
for A, B ∈ NC ∪ {⊤}. These intuitively express that the TBox T entails the subsumptions A ⊑ B and A ⊑ ∃r.B, respectively. Additionally, we keep a function L that
maps every element A ∈ NC ∪ {⊤} to a number L(A) ∈ [0, 1]. Intuitively, L(A) = n
expresses that K p-entails (A | ⊤)[n, 1].
The algorithm initializes the structures S and L as
S := {(A, A), (A, ⊤) | A ∈ NC (K) ∪ {⊤}}
(
0 if A ∈ NC (K)
L(A) :=
1 if A = ⊤.
These structures are then updated using the rules from Table 1. In each case, a rule
is only applied if its execution extends the available knowledge; that is, if either S is
extended to include one more tuple, or a lower bound in L is increased. In the latter
case, only the larger value is kept through the function L.
The first three rules in Table 1 are the standard completion rules for classical EL.
The remaining rules update the lower bounds for the likelihood of all relevant concept
names, taking into account their logical relationship, as explained next.
Rule L1 applies the obvious inference associated to conditional statements: from
all the individuals that belong to B, (A | B)[ℓ, 1] states that at least 100ℓ% belong also
to A. Thus, assuming that L(B) is the lowest proportion of elements in B possible, the
proportion of elements in A must be at least ℓ ·L(B). L3 expresses that if every element
of B must also belong to A, then there must be at least as many elements in A as there
are in B. Finally, L2 deals with the fact that two concepts that are proportionally large
must necessarily overlap. For example, if 60% of all individuals belong to A and 50%
belong to B, then at least 10% must belong to both A and B; otherwise, together they
would cover more than the whole domain.
The algorithm executes all the rules until saturation; that is, until no rule is applicable. Once it is saturated, we can decide m-necessity from the function L as follows:
A is m-necessary iff m ≤ L(A). Before showing the correctness of this algorithm, we
show an important property.
Notice that the likelihood information from L is never transferred through roles.
The reason for this is that an existential restriction ∃r.B only guarantee the existence
of one element belonging to the concept B. Proportionally, the number of elements that
belong to B tends to 0.
Example 21. Consider the KB ({⊤ ⊑ ∃r.A}, ∅). For any n ∈ N, construct the interpretation In := ({0, . . . , n}, ·In ), where AIn = {0} and rIn = {(k, 0) | 0 ≤ k ≤ n}. It
I
is easy to see that In is a model of the KB and [A] n/[⊤]In < 1/n. Thus, the best lower
bound for m-necessity of A is 0, as correctly given by the algorithm.
Theorem 22 (correctness). Let L be the function obtained by the application of the
rules until saturation and A0 ∈ NC . Then A0 is m-necessary iff m ≤ L(A).
Proof (sketch). It is easy to see that all the rules are sound, which proves the “if” direction. For the converse direction, we consider a finite domain ∆ and an interpretation
I
·I of the concept names such that [A] /|∆| = L(A) and the post-conditions of the rules
L1 –L3 are satisfied. Such interpretation can be obtained recursively by considering the
last rule application that updated L(A). Assume w.l.o.g. that the domain is large enough
so that c/|∆| < m − L(A0 ), where c is the number of concept names appearing in K.
It is easy to see that this interpretation satisfies all conditional statements and the GCIs
A1 ⊓ A2 ⊑ B ∈ T . For every concept name A, create a new domain element δA and
extend the interpretation I such that δA ∈ B iff (A, B) ∈ S. Given a role name r, we
define rI := {(γ, δB ) | A ⊑ ∃r.B, γ ∈ AI }. Then, this interpretation satisfies the KB
K, and [A0 ]I /|∆| ≤ L(A0 ) + c/|∆| < m.
⊓
⊔
Thus, the algorithm can correctly decide m-necessity of a given concept name. It remains only to be shown that the process terminates after polynomially many rule applications. To guarantee this, we impose an ordering in the rule applications. First, we
apply all the classical rules C1 –C3 , and only when no such rules are applicable, we
update the function L through the rules L1 –L3 . In this case, the rule that will update
to the largest possible value is applied first. It is known that only polynomially many
classical rules (on the size of T ) can be applied [1]. Deciding which bound rule to apply
next requires polynomial time on the number of concept names in K. Moreover, since
the largest update is applied first, the value of L(A) is changed at most once for every
concept name A. Hence, only linearly many rules are applied. Overall, this means that
the algorithm terminates after polynomially many rule applications, which yields the
following result.
Theorem 23. Deciding m-necessity is in P.
6 Related Work
Over the years, various probabilistic extensions of description logics have been investigated, see, for instance, [3, 7, 8, 10, 12, 15, 17]. The one that is closest to our approach is
the type 1 extension of ALC proposed in the appendix of [11]. Briefly, [11] introduces
probabilistic constraints of the form P (C | D) ≤ p, P (C | D) = p, P (C | D) ≥ p for
ALC concepts C, D. These correspond to the conditionals (C | D)[0, p], (C | D)[p, p],
(C | D)[p, 1], respectively. Conversely, each conditional can be rewritten as such a
probabilistic constraint. However, there is a subtle but fundamental difference in the
semantics. While the definition in [11] allows for probability distributions over arbitrary domains, we do not consider uncertainty over the domain. This comes down to
allowing only finite domains and only the uniform distribution over this domain; that is,
our approach further restricts the class of models of a KB. One fundamental difference
between the two approaches is that Proposition 4 does not hold in [11]: the reason is
that the conditional (C | D)[1, 1] can be satisfied by an interpretation I that contains
an element x ∈ (C ⊓ ¬D)I , where x has probability 0.
This difference is the main reason why the E XP T IME algorithm proposed by Lutz
and Schröder cannot be transferred to our setting. It does not suffice to consider the
satisfiable types independently, but other implicit subsumption relations may depend
on the conditionals only.
Example 24. Consider the statistical EL KB K = (T , C) with
T := {⊤ ⊑ ∃r.A, ∃r.B ⊑ C}
C := {(B | ⊤)[0.5, 1], (A | B)[0.5, 1],
(A | ⊤)[0, 0.25]}
From C it follows that every element of A must also belong to B, and hence every
domain element must be an element of C. However, ¬C defines a satisfiable type (w.r.t.
T ) which will be interpreted as non-empty in the model generated by the approach
in [11].
7 Conclusions
We have introduced Statistical ALC, a new probabilistic extension of the description
logic ALC for statistical reasoning. We analyzed the basic properties of this logic and
introduced some reasoning problems that we are interested in. As a first step towards
effective reasoning in Statistical ALC, we focused on EL, a well-known sublogic of
ALC that, in its classical form, allows for polynomial-time reasoning. We showed that
upper bounds in conditional constraints make the satisfiability problem in statistical
EL NP-hard and gave an NE XP T IME algorithm to decide satisfiability. We showed
that tractability can be regained by disallowing strict upper bounds in the conditional
statements.
We are going to provide more algorithms and a more complete picture of the complexity of reasoning for Statistical ALC and its fragments in future work. A combination
of integer programming and the inclusion-exclusion principle may be fruitful to design
first algorithms for reasoning in full Statistical ALC.
References
1. Baader, F., Brandt, S., Lutz, C.: Pushing the E L envelope. In: Kaelbling, L.P., Saffiotti, A.
(eds.) Proc. of the 19th Int. Joint Conf. on Artificial Intelligence (IJCAI’05). pp. 364–369.
Morgan-Kaufmann (2005)
2. Beierle, C., Kern-Isberner, G., Finthammer, M., Potyka, N.: Extending and completing
probabilistic knowledge and beliefs without bias. KI-Künstliche Intelligenz 29(3), 255–262
(2015)
3. Ceylan, İ.İ., Peñaloza, R.: The bayesian ontology language BE L. J. Autom. Reasoning 58(1),
67–95 (2017)
4. Grove, A.J., Halpern, J.Y., Koller, D.: Random worlds and maximum entropy. In: Logic in
Computer Science, 1992. LICS’92., Proceedings of the Seventh Annual IEEE Symposium
on. pp. 22–33. IEEE (1992)
5. Halpern, J.Y.: An analysis of first-order logics of probability. Artificial intelligence 46(3),
311–350 (1990)
6. Hansen, P., Jaumard, B.: Probabilistic satisfiability. In: Kohlas, J., Moral, S. (eds.) Handbook of Defeasible Reasoning and Uncertainty Management Systems, vol. 5, pp. 321–367.
Springer Netherlands (2000)
7. Klinov, P., Parsia, B.: Pronto: A practical probabilistic description logic reasoner. In: Uncertainty Reasoning for the Semantic Web II, pp. 59–79. Springer (2013)
8. Koller, D., Levy, A., Pfeffer, A.: P-classic: a tractable probablistic description logic.
AAAI/IAAI 1997, 390–397 (1997)
9. Lukasiewicz, T.: Probabilistic logic programming with conditional constraints. ACM Trans.
Comput. Logic 2(3), 289–339 (Jul 2001)
10. Lukasiewicz, T., Straccia, U.: Managing uncertainty and vagueness in description logics for
the semantic web. JWS 6(4), 291–308 (2008)
11. Lutz, C., Schröder, L.: Probabilistic description logics for subjective uncertainty. In: Proc.
KR 2010. AAAI Press (2010)
12. Niepert, M., Noessner, J., Stuckenschmidt, H.: Log-linear description logics. In: IJCAI. pp.
2153–2158 (2011)
13. Nilsson, N.J.: Probabilistic logic. Artificial Intelligence 28, 71–88 (February 1986)
14. Paris, J.B.: The Uncertain Reasoner’s Companion – A Mathematical Perspective. Cambridge
University Press (1994)
15. Peñaloza, R., Potyka, N.: Probabilistic reasoning in the description logic ALCP with the
principle of maximum entropy. In: International Conference on Scalable Uncertainty Management. pp. 246–259. Springer (2016)
16. Potyka, N., Thimm, M.: Probabilistic reasoning with inconsistent beliefs using inconsistency
measures. In: IJCAI. pp. 3156–3163 (2015)
17. Riguzzi, F., Bellodi, E., Lamma, E., Zese, R.: Probabilistic description logics under the distribution semantics. Semantic Web 6(5), 477–501 (2015)
| 2cs.AI
|
Finding the optimal nets for self-folding Kirigami
N. A. M. Araújo,1, 2, ∗ R. A. da Costa,3 S. N. Dorogovtsev,3, 4 and J. F. F. Mendes3
arXiv:1710.00852v1 [cs.DS] 2 Oct 2017
1
Departamento de Fı́sica, Faculdade de Ciências,
Universidade de Lisboa, 1749-016 Lisboa, Portugal
2
Centro de Fı́sica Teórica e Computacional, Universidade de Lisboa, 1749-016 Lisboa, Portugal
3
Department of Physics & I3N, University of Aveiro, 3810-193 Aveiro, Portugal
4
A. F. Ioffe Physico-Technical Institute, 194021 St. Petersburg, Russia
Three-dimensional shells can be synthesized from the spontaneous self-folding of two-dimensional
templates of interconnected panels, called nets. The yield is maximized following sequentially two
design rules: (i) maximum number of vertices with a single-edge cut and (ii) minimum radius of
gyration of the net. Previous methods to identify the optimal net are based on random search
and thus limited to very simple shell structures and not guaranteeing a unique solution. Here, we
show that the optimal net can be found using a deterministic algorithm. We map the connectivity
of the shell into a shell graph, where the nodes and links of the graph represent the vertices and
edges of the shell, respectively. Applying the design rule (i) corresponds then to finding the set of
maximum leaf spanning trees of the shell graph, to which (ii) can be applied straightforwardly. This
method allows not only to designing the self-assembly of much larger shell structures but also to
apply additional design rules, as a complete catalog of the maximum leaf spanning trees is obtained.
PACS numbers: 05.65.+b,64.60.aq
The synthesis of three-dimensional polyhedral shells
at the micron and nano scales is key for encapsulation and drug delivery [1–3]. Inspired by the Japanese
art of Kirigami, where hollowed structures are obtained
from cutting and folding a sheet of paper, lithographic
methods have been developed to form shells from twodimensional nanometer templates of interconnected panels [4–8]. The potential is enormous, for a wide range of
shapes and sizes can be obtained. Ideally, the unfolded
templates (nets) should spontaneously self-fold into the
target structure to reduce production costs and achieve
large-scale parallel production.
Many nets fold into the same structure, but the time
and effectiveness of their self-folding pathways may differ by orders of magnitude. Finding the optimal net that
maximizes yield is not simple; The self-folding process depends on the geometry of the net, its physical properties,
and its interactions with the surrounding medium [9–11].
Experiments by Pandey et al. suggest that maximum
yield is obtained when, from the entire set of nets, one
first picks the nets with the maximum number of vertices
with a single-edge cut and, from them, the nets with the
lowest radius of gyration [12]. A vertex with a single-edge
cut is one whose the number of adjacent faces is the same
in the net and in the polyhedral shell. The implementation of this global search in Ref. [12] implies considering
all possible cuts of the shell. This inefficient procedure
is time consuming, technically demanding, and for most
shapes impossible, since, as we show here, the number
of possible cuts rapidly grows with the number of edges.
For example, with only twelve edges, a cube has 384 possible cuts, while a dodecahedron, with thirty edges, has
more than 5 million possible cuts. Consequently, previous methods to identify the optimal net of a sufficiently
large shell have to be based on random searches in the
configuration space. They consider only a subset (actually a small subset) of possible nets and so they do not
guarantee a unique, globally optimal solution.
We propose a deterministic procedure to identify the
optimal net that only requires generating a subset of all
possible cuts. Let us exemplarily consider the case of a
cubic shell. As shown in Fig. 1(a), the structure of the
shell can be mapped into a shell graph (black nodes and
links in the figure), where nodes represent the vertices
and links represent the edges. A second graph can also
be defined, the face graph, whose nodes are the faces and
links connect pairs of adjacent faces (blue graph). Every
net of the cubic shell corresponds to a spanning tree of its
face graph, i.e., a connected sub-graph that includes all
nodes but the minimum number of links (see Fig. 1(c)).
The nets can be obtained by a set of cuts along the edges
of the shell graph, under the constraint that the set of
nodes in the face graph remains connected. The cut is
defined as the sub-graph of the shell graph that contains
all removed links (cut edges), as represented in red in
Figs. 1(b) and (c). It consists of all nodes and it is a
spanning tree of the shell graph. The main advantage
of the mapping proposed here is that it makes possible
to implement in a systematic and deterministic way the
two design rules. Below, we discuss how to apply such
mapping to 1) identify the cuts that maximize the number of vertices with a single-edge cut and 2) rank them
by increasing radius of gyration.
First criterion. The vertices with a single-edge cut
are the nodes of unitary degree in the cut, known as
the leaves. Since the cut is a spanning tree of the shell
graph, the cuts that maximize the number of vertices
with a single-edge cut are the maximum leaf spanning
trees (MLST) of the shell graph. To identify the full set
of MLSTs, we first identify all minimum connected dom-
2
a)
b)
Archimedean solids with up to 150 shell edges. The obtained dependence is consistent with the predicted linear
dependence (solid line). From the simple relation (1), one
can estimate an upper bound for the number of MLSTs,
NMLST , as a function of E. The exact number of spanning trees, NST , is given by the Kirchhoff’s matrix-tree
theorem, which states that the total number of labeled
spanning trees is given by the product of the eigenvalues
λn of the Laplacian matrix, i.e.,
c)
NST =
V −1
1 Y
λi ,
V i=1
(2)
where V is the number of vertices and λV = 0 is excluded
from the product. Nevertheless, we can also get an upper
bound for NST as a function of E. Accordingly, as we
show in the Supplemental Material [13], an estimate the
upper bound for the ratio NMLST /NST is given by
NMLST /NST ∼ 2−E/2+3/2 ,
FIG. 1. Net of a cubic shell. The cubic shell is mapped into a
shell graph (black), where the nodes and links of the graph are
the shell’s vertices and edges, respectively. A net is obtained
by any sequence of edge cuts (red links in (b) and (c)). The
cut is defined as a sub-graph of the shell graph, consisting of
the set of removed links and all the nodes (in red). A face
graph is defined such that nodes are the faces of the cube and
the links connect pairs of its adjacent faces (blue nodes and
links). The cut and the net are spanning trees of the shell
and face graphs, respectively.
inant sets of the shell graph. These are minimum sets of
shell-graph nodes such that all nodes are either part of
the set or directly connected to it. Once these minimum
sets are identified, obtaining the MLSTs is straightforward, as all the remaining nodes are the leaves (see details in the Supplemental Material [13]). This algorithm
to identify the MLST is simpler than the most efficient
ones (see, e.g. Ref. [14–16]) but it does find the full list
of MLST while the others do not.
Figures 2(a)-(c) show three examples of threedimensional shell structures and one of their nets, corresponding to cuts that are MLSTs. For these examples,
the number of spanning trees and MLSTs increase with
the number of shell edges (see figure caption for values).
However, the fraction of spanning trees that are MLST
decays exponentially with the number of shell edges, E,
as shown in Fig. 3. To understand this result, we first
estimate how the number of leaves, L, in a MLST scales
with E. As shown in detail in the Supplemental Material [13], assuming that the shell is a convex polyhedral
with regular faces and a simplified (approximated) procedure to identify the MLST, we can predict that
L ∼ E/4 + 2 .
(1)
Figure 4 shows L as a function of E for all Platonic and
(3)
what is also consistent over more than 20 orders of magnitude with the observed exponential dependence shown
in Fig. 3. This fast decay with E reinforces the necessity
of a deterministic method, since the chances of obtaining
a MLST from a random search is given by this ratio. For
example, for the dodecahedron, with only twelve faces,
less than 0.04% of its more than 5 million spanning trees
are MLSTs, i.e., to obtain a MLST one would need to
randomly sample 2500 configurations on average. For
the largest shell that we have considered (E = 150), this
number is larger than 1026 . Thus, identifying the optimal net from random methods is practically impossible
for such large shells.
With the strategy proposed here, we can also consider open structures, without one or more faces, as the
ones shown in Figs. 2(d) and (e). These shells might be
relevant for several applications involving, for example,
encapsulation, drug delivery, or key-lock mechanism [1–
3, 11]. The shell graph for such structures is equal to
the corresponding polyhedron; However, every cut includes all edges adjacent to the missing face (connecting
two nodes of that face). So, to identify the optimal net,
we follow the same procedure as before, but under the
constraint that the edges of the missing face of the polyhedron are always in the cut. Note that, in this case, the
cut is no longer a tree, as the edges of the missing face
form a loop, but this is the only possible loop in the cut as
any other will split the net into pieces (see Supplemental
Materials for further details [13]).
Second criterion. The second criterion proposed in
Ref. [12] is to select, among all possible cuts with the
maximum number of vertices with a single-edge cut, the
one corresponding to the net with the lowest radius of
gyration. To apply this criterion, the label of the individual nodes in the MLST is irrelevant and so we need to
identify first the subset of non-isomorphic cuts, i.e., the
3
a)
b)
c)
d)
e)
FIG. 2. Five examples of shells and of one of their nets corresponding to a cut that is a maximum leaf spanning trees:
a) tetrahedron, with four faces and nine edges, it has four maximum leaf spanning trees, but only one non-isomorphic; b)
dodecahedron, with twelve faces and thirty edges, it has 1980 maximum leaf spanning trees, but only 21 non-isomorphic; c)
small rhombicuboctahedron, with 26 faces and 48 edges, it has 1536 maximum leaf spanning trees, but only 32 non-isomorphic;
d) open cubic shell, with five faces and twelve edges, it has only one maximum leaf spanning tree e) small rhombicuboctahedron
with the top nine faces removed and 17 faces, 36 edges and 20 nodes remaining, it has 720 maximum leaf spanning trees, but
only 90 non-isomorphic. The red circles in the nets indicate the vertices with a single-edge cut.
10
10
0
-20
Platonic
Archimedean
other
E/4+2
30
-10
NMLST
NST
10
40
L 20
Platonic
Archimedean
other
- E/2 + 3/2
2
10
-30
10 0
100
50
150
E
FIG. 3. Fraction of spanning trees (NST ) that are maximum
leaf spanning trees (NMLST ) as a function of the number of
shell edges (E). This ratio was calculated for a total of 21
shells, including all Platonic solids and all Archimedean solids
with up to 150 shell edges (see Table S1 in the Supplemental
Material [13]). The solid line corresponds to the estimation
given by Eq. (3).
subset of cuts that one cannot get one from another by
relabeling the nodes (or faces). This is a much smaller
subset. For example, for the cubic shell, 120 MLSTs were
identified, but only four are non-isomorphic. To identify
them, we rely on the concept of adjacency matrix Aij of
a graph with V nodes, defined as V × V matrix, where
Aij is either unity, if nodes i and j are connected, and
zero otherwise. Two graphs are isomorphic if the adjacency matrix of one can be made equal to the other by a
0
0
100
50
150
E
FIG. 4. Number of leaves (L) as a function of the number of
shell edges (E). This number was calculated for a total of 21
shells, including all Platonic solids and all Archimedean solids
with up to 150 shell edges (see Table S1 in the Supplemental
Material [13]). The solid line corresponds to the estimation
given by Eq. (1).
set of line and column swaps. Note that, each swap corresponds to a relabeling of the nodes and thus the same
swap needs to be done for the lines and the columns.
Figure 5 shows the study for the truncated icosahedron, also known as soccer ball or buckyball. With 60
vertices, 32 faces, and 90 edges, this shell has more than
1020 possible cuts. By mapping the shell into a graph,
we can identify the 484800 cuts with the maximum num-
4
a)
1.4
1.3
RG
RGmin 1.2
1.03
RG 1.02
RGmin 1.01
1.1
1
0
b)
1
0
1000
c)
2000
rank
20
rank
3000
40
4000
d)
FIG. 5. For the truncated icosahedron, also known as soccer
ball or buckyball: (a) spectrum of the radii of gyration for all
the 4114 non-isomorphic MLSTs, where MLSTs were ordered
by increasing radius of gyration; the MLST with the (b) optimal (rank 1); (c) intermediate (rank 2057: RG/RGmin ≈
1.23); and (d) largest (rank 4114: RG/RGmin ≈ 1.40) radius
of gyration.
ber of leaves (30 leaves each) and identify the 4114 nonisomorphic corresponding nets. To calculate the radius
of gyration Rg of each net α ⊂ R2 , we first obtain its
centroid, defined as
Z
1
(x̄, ȳ) =
(x, y) dA ,
(4)
A α
where A is the total area of the shell faces. We then calculate the radius of gyration with respect to the centroid
as
s Z
1
[(x − x̄)2 + (y − ȳ)2 ] dA .
(5)
Rg =
A α
Figure 5(a) shows the spectrum of the radii of gyration
for all the 4114 non-isomorphic nets of the truncated
icosahedron, ranked by increasing radius of gyration; Figures 5(b)-(c) show from those nets, the ones with the
lowest (optimal), intermediate, and maximum Rg . The
radius of gyration rapidly increases with the position in
the rank. The less optimal net (Fig. 5(d)) has a radius
of gyration that is 40% higher than the one of the optimal net (Fig. 5(b)). Previous methods to identify the
optimal net are based on random search. Using such
methods, even if the obtained net corresponds to one
with the maximum number of vertices with a single-edge
cut, the probability that its radius of gyration differs by
less that 3% from the optimal one is below 1.5% (see inset in Fig. 5(a)). Since the timescale and yield of the
self-folding depends strongly on the radius of gyration,
the self-folding efficiency of an approximated solution obtained with previous methods based on a random search
is likely far from optimal.
Conclusions. We proposed a method to identify the
optimal net that spontaneously self-folds into a closed or
open polyhedral shell structures. The method consists
of mapping the shell structure into a shell graph and sequentially apply two design rules: (i) to identify the cuts
that maximize the number of vertices with a single-edge
cut and, (ii) among those, the one with the minimum radius of gyration. Adapting concepts and methods from
Graph Theory, we show that the optimal solution can be
obtained in a deterministic and systematic manner. Previous methods are based on random search and thus not
providing a unique solution. As we showed, the fraction
of cuts that are identified by rule (i) decays exponentially
with the number of edges in the polyhedron, reinforcing
the necessity of a deterministic method. Also, with the
method proposed here, since a complete list of possible
cuts respecting rule (i) is obtained, other design rules
(alternative to rule (ii)) can be implemented straightforwardly.
It is conjectured that the nets for all convex shells are
non-overlapping, a necessary condition for obtaining it
from a two-dimensional template. In all examples studied here, all optimal shells are non-overlapping but nets
for concave shells are more likely to overlap. In fact, this
conjecture is not necessary, for once the optimal net is
identified, self-overlap can be tested. If the selected net
overlaps, one should proceed through the rank of increasing radius of gyration and pick the first net that does not
self-overlap. If all nets for the maximum leaf spanning
trees obtained with rule (1) overlap, one should proceed
iteratively considering spanning trees with less and less
leaves until we found the first that does not overlap.
Identifying the maximum leaf spanning tree is a NP
problem and so the numerical complexity will still grow
rapidly with the number of shell vertices. If the number
of vertices is too large for the straightforward implementation of our deterministic algorithm then, in the spirit
of our approach, approximated algorithms can be used
that identify spanning trees with a number of leaves that
is close to the maximum [17, 18].
We suggest that our deterministic algorithm and
its variations could be used when searching for optimal design and production of even more complex selfassembling systems.
We acknowledge financial support from the Portuguese Foundation for Science and Technology (FCT)
under Contract no. UID/FIS/00618/2013 and grant
5
SFRH/BPD/123077/2016.
∗
[email protected]
[1] R. Fernandes and D. H. Gracias, “Self-folding polymeric
containers for encapsulation and delivery of drugs,” Adv.
Drug Deliv. Rev. 64, 1579 – 1589 (2012).
[2] J. Shim, C. Perdigou, E. R. Chen, K. Bertoldi, and P. M.
Reis, “Buckling-induced encapsulation of structured elastic shells under pressure,” Proc. Natl. Acad. Sci. 109,
5978–5983 (2012).
[3] M. Filippousi, T. Altantzis, G. Stefanou, M. Betsiou,
D. N. Bikiaris, M. Angelakeris, E. Pavlidou, D. Zamboulis, and G. Van Tendeloo, “Polyhedral iron oxide
core-shell nanoparticles in a biodegradable polymeric matrix: preparation, characterization and application in
magnetic particle hyperthermia and drug delivery,” RSC
Adv. 3, 24367–24377 (2013).
[4] D. M. Sussman, Y. Cho, T. Castle, X. Gong, E. Jung,
S. Yang, and R. D. Kamien, “Algorithmic lattice
kirigami: A route to pluripotent materials,” Proc. Natl.
Acad. Sci. 112, 7449–7453 (2015).
[5] Y. Zhang, Z. Yan, K. Nan, D. Xiao, Y. Liu, H. Luan,
H. Fu, X. Wang, Q. Yang, J. Wang, W. Ren, H. Si, F. Liu,
L. Yang, H. Li, J. Wang, X. Guo, H. Luo, L. Wang,
Y. Huang, and J. A. Rogers, “A mechanically driven
form of kirigami as a route to 3d mesostructures in micro/nanomembranes,” Proc. Natl. Acad. Sci. 112, 11757–
11764 (2015).
[6] A. Lamoureux, K. Lee, M. Shlian, S. R. Forrest, and
M. Shtein, “Dynamic kirigami structures for integrated
solar tracking,” Nat. Commun. 6, 8092 (2015).
[7] G. P. Collins, “Science and culture: Kirigami and technology cut a fine figure, together,” Proc. Natl. Acad. Sci.
113, 240–241 (2016).
[8] W. M. Jacobs and D. Frenkel, “Self-assembly of structures with addressable complexity,” J. Am. Chem. Soc.
138, 2457–2467 (2016).
[9] G. M. Whitesides and B. Grzybowski, “Self-assembly at
all scales,” Science 295, 2418–2421 (2002).
[10] T. G. Leong, P. A. Lester, T. L. Koh, E. K. Call, and
D. H. Gracias, “Surface tension-driven self-folding polyhedra,” Langmuir 23, 8747–8751 (2007).
[11] A. Azam, K. E. Laflin, M. Jamal, R. Fernandes, and
D. H. Gracias, “Self-folding micropatterned polymeric
containers,” Biomed. Microdevices 13, 51–58 (2011).
[12] S. Pandey, M. Ewing, A. Kunas, N. Nguyen, D. H. Gracias, and G. Menon, “Algorithmic design of self-folding
polyhedra,” Proc. Natl. Acad. Sci. 108, 19885–19890
(2011).
[13] See Supplemental Material at.
[14] H. Fernau, J. Kneis, D. Kratsch, A. Langer, M. Liedloff,
D. Raible, and P. Rossmanith, “An exact algorithm for
the maximum leaf spanning tree problem,” Theor. Comput. Sci. 412, 6290–6302 (2011).
[15] T. Fujie, “An exact algorithm for the maximum leaf spanning tree problem,” Comput. Oper. Res. 30, 1931–1944
(2003).
[16] A. Lucena, N. Maculan, and L. Simonetti, “Reformulations and solution algorithms for the maximum leaf
spanning tree problem,” Comput. Manag. Sci. 7, 289–
311 (2010).
[17] H.-I. Lu and R. Ravi, “Approximating maximum leaf
spanning trees in almost linear time,” J. Algorithms 29,
132–141 (1998).
[18] R. Solis-Oba, P. Bonsma,
and S. Lowski, “A 2approximation algorithm for finding a spanning tree with
maximum number of leaves,” Algorithmica 77, 374–388
(2017).
S1
Finding the optimal nets for self-folding Kirigami – Supplemental Material
N. A. M. Araújo, R. A. da Costa, S. N. Dorogovtsev, and J. F. F. Mendes
S1. ONE-TO-ONE CORRESPONDENCE
BETWEEN NETS AND SPANNING TREES
To each net of a polyhedron corresponds a cut along
the edges of a spanning tree of the shell graph:
i) To unfold a polyhedral shell into a 2D net, the cut
must reach every vertex of the shell graph, and must be
connected;
ii) For the polyhedron faces to remain connected as a
single component, the cut cannot contain any loops.
The only subgraphs that span to every vertex, are connected, and contain no loops are spanning trees. Therefore, maximizing the number of single-edge cut vertices
of a net is equivalent to maximizing the number of leaves
of a spanning tree.
S2.
THE MAXIMUM LEAF SPANNING TREE
The Maximum Leaf Spanning Tree (MLST) problem
has been extensively studied in the scope of graph theory and computer science [S1–S7]. It consist of finding a spanning tree with the largest possible number of
leaves in a given undirected unweighted graph. Finding
a MLST, or just determining the number of leaves of the
MLSTs of a generic graph is a well known NP-complete
problem [S1].
Here, we describe a simple (exact) algorithm to find
the full set of labeled MLSTs of an arbitrary (undirected
and unweighted) graph. Notice that while the algorithms
for the MLST problem typically find a single optimal tree
[S3–S5], our algorithm provides all possible labeled MLSTs. The number of spanning trees and of MLSTs grow
both exponentially with the graph size and the computation time of an algorithm that lists all MLSTs grows
at least as quickly as the number of MLSTs.
A dominating set of a graph is a subset of vertices, such
that all vertices of the graph either belong to the set, or
are connected to at least one vertex in the set. If, in
addition, those vertices (together with the edges among
them) form a connected subgraph, this set is called a
connected dominating set. Clearly, the non-leaf vertices
of any spanning tree form a connected dominating set.
Therefore, finding the maximum number of leaves in a
spanning tree is equivalent to determining the minimum
size of a connected dominating set. In the rest of this
section, a subtree of the graph whose vertices form a
connected dominating set will be called dominating subtree. (Note that the vertices of a subtree are connected
by definition.)
A.
Algorithm
In order to list all MLSTs, we use a search algorithm
for finding the full set of dominating subtrees with exactly nS vertices (i.e., subtrees with nS vertices that are
a connected dominating set of the graph). We start by
checking if there are any dominating subtrees of nS = 1
vertices, which only exist when a single vertex is connected to all the other vertices in the original graph. If
there is no such tree, we iteratively increase nS by 1 and
search again. The search stops when the set of dominating subtrees with nS vertices is non-empty. These minimum dominating subtrees are the interiors of the MLSTs,
that is, the MLSTs without the leaf vertices and their respective edges.
To finalize the construction of the MLSTs, we attach
the remaining vertices to the obtained minimum dominating subtree. These vertices are the leaves of the
MLST. If every leaf vertex only has one edge of the original graph connecting it to the dominating subtree, then
there is only one possible MLST with that particular interior subtree. However, some leaf vertices may have
multiple edges of the original graph linking them to the
dominating subtree, and so there are multiple MLSTs
with the same interior subtree. In these cases, we have to
chose one of the possibilities for each leaf vertex. Since
those choices are independent from each other, the total number of MLSTs that share that particular interior
subtree equals the product of the numbers of possibilities
of each leaf vertex (i.e., the number of different ways of
connecting the leaf vertices to a particular dominating
subtree).
The algorithm recursively grows subtrees with nS vertices and nS − 1 edges of the graph starting from a single
root vertex and enumerates all MLSTs where the root
is a non-leaf vertex. There is a set of vertices, say R,
that the algorithm uses as roots (one at each time), and
consists of a specific arbitrary vertex and all of its neighbors. For any dominating subtree, all the vertices of the
original graph must either be in the subtree or have at
least one neighbor in the subtree. To find all MLSTs, it
is sufficient to consider the roots in R. In the present
work, we use the vertex with the smallest degree and its
neighbors as the set of roots R.
Given a size of the subtrees nS , the algorithm performs
a separate search for each root vertex in R. So, we need
an additional constraint to avoid multiple counts of the
MLSTs that have more than one non-leaf vertices in R.
We introduce a set of vertices, Vexcl , that are explicitly
forbidden from joining the dominating subtree. In the
first search, rooted in the first vertex of R, say r1 , the set
S2
Vexcl is empty and the algorithm enumerates all MLSTs
where r1 is a non-leaf vertex. Since the vertex r1 must
be a leaf in all the other MLSTs still not found, we add
r1 to Vexcl . In the second search, rooted in r2 , the vertex
r1 is never included in dominating subtree, insuring that
the algorithm only returns the MLSTs where r1 is a leaf
and r2 is a non-leaf vertex. Then, r2 is added to Vexcl ,
the third search is made, and so on.
Given a graph with V vertices labeled i = 1, ..., V , let
us denote the edge that connects the vertices i and j by
eij . In the following Algorithms 1-3 the set of vertices
that are connected to i in the original graph is denoted
Ai , and the set A = {Ai : i = 1, .., V } provides complete
information about the graph.
Algorithm 1 Enumeration of all MLSTs. This procedure initializes the necessary variables, and calls the function recursive of Algorithm 2. Each time it is called,
recursive enumerates all MLSTs with L − nS leaves,
where the supplied root, r, in a non-leaf vertex and the
vertices in Vexcl are leaves.
procedure list all MLSTs(A)
Input:
List of neighbors, Ai , for every vertex i (A = {Ai }).
v = arbitrary vertex . For example, a vertex with the
minimum degree
R = append(v, Av )
M LST s = ∅
nS = 1
while M LST s = ∅ do
Vexcl = ∅
for all r ∈ R do
EA = {eri : i ∈ Ar }
M LST s0 =recursive(A,{r},∅,EA ,Vexcl ,nS )
M LST s = append(M LST s, M LST s0 )
Vexcl = append(Vexcl , r)
end for
nS = nS + 1
end while
end procedure
The procedure list all MLSTs, shown in Algorithm 1, initializes the set of roots R as described above,
and the current size of the searched subtrees, nS , is initialized to 1. The set M LST s will store the collection of
found MLSTs, and starts as an empty set. The search of
MLSTs with larger nS , and a smaller number of leaves
L = V − nS , will only proceed if the set M LST s remains
empty. The list of vertices Vexcl stores the roots of R that
were already used for each particular value of nS , and is
initialized as an empty set every time that nS is incremented. The search itself, is performed by the recursive
function recursive, Algorithm 2. For each considered
nS , the function recursive is called by the procedure
list all MLSTs once for each root in R.
The function recursive of Algorithm 2 starts with a
single vertex (root) and recursively grows subtrees T up
to a predetermined size (nS vertices), while keeping track
of the elements already in the tree and at its border. Let
VT and ET be the lists of vertices and edges, respectively,
currently in T , and EA be the list of edges that are not in
T and are connected to at least one vertex in T (EA is the
exterior boarder of T , which the algorithm is currently
exploring). Furthermore, Vexcl is a specific set of vertices
that are forbidden to participate in the subtree T (these
vertices are the roots of the previous searches for the same
nS ). When T reaches the target size (nS vertices) it stops
increasing. If the vertices VT form a dominating set, then
the algorithm enumerates the possible ways of joining
each vertex outside of VT to one and only one vertex in
VT by an edge. Each different way of making these last
connections represents a different (labeled) spanning tree
whose leaves are the vertices outside of VT .
In the first stage, while the number of vertices in the
growing subtree |VT | < nS , the function recursive considers all possibilities for the next edge addition to the
subtree T from the set of adjacent edges EA . For each
of those possibilities, recursive is called again with the
updated VT 0 , ET 0 , and EA 0 . Note that, when an edge
in EA connects two vertices already in VT it cannot be
added to the tree (because it would close a loop in T ).
In order to keep the vertices in the set Vexcl outside of T ,
the edges that lead to those vertices are not added to EA
in the update. In this way, recursive finds all configurations of subtrees with nS vertices that include the root
and exclude all the vertices in Vexcl . In the second stage,
when finally |VT | = nS , recursive checks if the vertices
in VT form a dominating set: if so, it finishes the construction of the spanning trees by connecting the leaves
in every possible way, otherwise it returns an empty set.
In the search algorithm presented here, we consider
only connected sets of vertices (subtrees), and check if
they are dominating. Furthermore, we only consider subtrees that include either a specific arbitrary vertex or at
least one of its neighbors (if a subtree is dominating, every vertex of the graph fulfills this requirement). The
combination of these two strategies drastically reduces
the configurational space and computation time.
S3
Algorithm 2 Recursive search function. This function
generates all possible subtrees T with nS vertices that
include the root vertex and exclude all the vertices in
Vexcl . If T is a dominating subtree, then the function
lists all possible spanning trees that can be obtained by
joining the remaining vertices of the graph to T .
function recursive(A, VT , ET , EA , Vexcl , nS )
Input:
List of neighbors, Ai , for every vertex i (A = {Ai }).
Lists of vertices, VT , and edges, ET , currently in T .
List of edges, EA , currently adjacent to T .
List of vertices, Vexcl , excluded from T .
Final number of vertices, nS , in T .
Output:
List of spanning trees, ST s, with at least V − nS leaves
(each spanning tree is returned as the list of its edges).
ST s = ∅
if |VT | < nS then
. Add one edge to T .
for all ejk ∈ EA do
EA = EA \{ejk }
if k ∈
/ VT then
i=k
else if j ∈
/ VT then
i=j
else
continue
end if
ET 0 = append(ET , ejk )
VT 0 = append(VT , i)
EA 0 = EA
for all l ∈ Ai do
if eil ∈
/ ET and l ∈
/ Vexcl then
EA 0 = append (EA 0 , eil )
end if
end for
ST s0 = recursive(A, VT 0, ET 0, EA 0, Vexcl , nS )
ST s = append(ST s, ST s0 )
end for
return ST s
else if VT is a dominating set then . Expand T into
corresponding spanning trees.
ST s = {ET }
for all vertices i ∈
/ VT do
ST s0 = ∅
for all vertices j ∈ Ai ∩ VT do
for all trees U ∈ ST s do
ST s0 =append (ST s0 , append(U, eij ))
end for
end for
ST s = ST s0
end for
return ST s
else
return ∅
end if
end function
The order by which the edges of EA are picked in the
outermost for-cycle of the search of recursive is not
specified in Algorithm 2 because any order will produce
the same result. In our implementation of the function
recursive, we picked the edges in EA using a first-infirst-out method and effectively performed a breadth-first
search. If, for instance, the edges of EA are picked in a
last-in-first-out fashion, then the algorithm will perform
depth-first search instead.
The algorithm described in this section for listing all
MLSTs is defined for labeled graphs, and finds the set
of labeled MLSTs. If the original graph has automorphisms, i.e., a relabeling that results in the same labeled
graph, then the set of labeled MLSTs may have multiple
‘copies’ of the same unlabeled MLST with different labelings (isomorphic MLSTs). In this work, we consider the
nets of polyhedra with high regularity, such as Platonic
and Archimedean solids where all vertices are equivalent.
The polyhedral graphs of polyhedra where all vertices are
equivalent, or with sets of equivalent vertices, have automorphisms. However, each geometrically distinct net
is entirely determined by a cut of the polyhedral graph
along the edges of an unlabeled spanning tree. So, to determine the number of distinct nets, we need to disregard
the labels of MLSTs, and search for isomorphisms in the
set of MLSTs found by the algorithm. To check if any
two labeled MLSTs are isomorphic, we simply check if
there is an automorphic relabeling of the original graph
that maps one labeled MLST into the other, see Section
for details.
Typically the algorithms for the MLST problem are
designed to find the number of leaves in a MLST, and
not the full set of MLSTs [S2–S5]. Some of these algorithms include multiple stages of optimization, which
include heuristics, the use of approximated algorithms to
make initial guesses, and other sophisticated approaches.
Due to the complexity of this problem, and to the best
of our knowledge, the fastest existing algorithms can find
one MLST only in graphs with up to roughly 200 vertices
[S5].
In this work, we find not just one MLST, but we list
also the full set of optimal nets (unlabeled MLSTs) for
polyhedral graphs with up to 60 vertices. The number of
different optimal nets strongly depends on the details of
the polyhedral graph. For instance, the Truncated Icosahedron and the Truncated Dodecahedron each have 60
vertices, 32 edges, and 90 faces, however their numbers
of optimal nets are 4 114 and 3 719 677 167, respectively.
Table S1 summarizes the exact results obtained in this
work with the algorithm presented here, namely the number of leaves in a MLST and the number of optimal nets
of each of the 21 polyhedron considered. Table S1 also
shows a figure of the optimal net which minimizes the
radius of gyration for each polyhedra.
Finally, it should be mentioned that there are several
approximated algorithms that find spanning trees with a
high number of leaves, close to the maximum possible. If
a polyhedral graph is too large to solve by exact methods,
these approximated algorithms can find a near-optimal
S4
V F
E
L
Nopt nets
Tetrahedron
4
6
4
3
1
Octahedron
6
8
12
4
2
Cube
8
6
12
4
4
12 20 30
8
21
20 12 30 10
21
Octogonal
Piramid
9
16
8
1
Octogonal
Dipiramid
10 16 24
7
3
12 8
18
6
4
12 14 24
7
34
Truncated Cube 24 14 36 10
399
solution in linear or almost linear time [S6, S7].
S3.
SHELLS WITH HOLES
We consider now the problem of finding optimal nets
for shells that contain holes, i.e., shells consisting of all
the faces of a polyhedron except for one. The graph of
the vertices and edges of the shell is the same as the polyhedral graph of the complete polyhedron. The difference
is that all the edges adjacent to the missing face will be
in every cut, effectively detaching that face from the rest
of the net, as intended. (An edge adjacent to a face is an
edge between two vertices of that face.) For this reason,
a vertex adjacent to the missing face cannot be a singleedge cut vertex in the net, since it always has two edges
included in the cut.
The subgraph of the cut edges in the presence of a
hole is not a pure tree, because it contains a single loop
formed by the edges adjacent to the hole. For the shell
to unfold into a 2D net, the cut subgraph must reach
all vertices (spanning) and be connected. Also, for the
shell’s faces to remain connected in a single component,
the cut subgraph cannot have any other loop apart from
one surrounding the hole. Then, the cut subgraph consists of the loop adjacent to the hole, and some loopless
branches connected to it.
We use the following Algorithm 3 to maximize the
number of single-edge cut vertices in nets of shells that
contain holes. Algorithm 3 is a simple adaptation of Algorithm 1 that calls the same recursive function of Algorithm 2, gradually increasing the allowed number of
non-leaf vertices nS . The recursive function remains unchanged in this procedure. In this version of the algorithm, in addition to the lists of adjacencies, A = {Ai },
we supply the list of vertices adjacent to the hole, Vh .
Instead of single root vertex, the search starts from a
subgraph already containing all the vertices and edges
adjacent to the hole (these vertices and edges must be
present in all the cuts, optimal or not). Then, in the first
call of the function recursive for each nS , VT = Vh and
ET is the set edges adjacent to the hole. The set EA is
initialized with the edges connected to the vertices of Vh
that are not in ET , as in Algorithm 1. For the sake of
clarity, while in Algorithm 1 we denote the set of edges of
the optimal cuts by M LST s, in Algorithm 3 we denote
it by Cuts because in the presence of holes the cuts contain a loop surrounding the hole, and they are no longer
trees. When Algorithm 3 calls the function recursive,
it passes an empty set as the fifth input argument. This
set is the list of vertices that are forced to be leaves,
called Vexcl in recursive, which we do not use in this
algorithm.
Icosahedron
Dodecahedron
Truncated
Tetrahedron
Cuboctahedron
9
Snub Cube
24 38 60 16
600
Rhombicuboctahedron
24 26 48 15
32
Truncated
Octahedron
24 14 36 12
56
Icosidodecahedron 30 32 60 16
308 928
Truncated
Cuboctahedron
48 26 72 24
244
Truncated
Icosahedron
(soccer ball)
60 32 90 30
4 114
Truncated
Dodecahedron
Rhombicosidodecahedron
Snub
Dodecahedron
Triakis
Icosahedron
Pentakis
Dodecahedron
Min RG
–
60 32 90 22 3 719 677 167
–
60 62 120 37
77 952
–
60 92 150 39
13 436 928
–
32 60 90 26
664 128
–
32 60 90 22
845 280
–
TABLE S1. Optimal nets. The number of leaves, L, in the
MLSTs, and the number of distinct optimal nets (unlabeled
MLSTs), Nopt nets , were obtained for each polyhedron with
our algorithm. The numbers of vertices V , faces F , and edges
E are also shown, as well as the optimal net with the smallest
radius of gyration (only for cases with Nopt nets < 10 000).
The red circles indicate the single-edge cut vertices.
S5
Algorithm 3 Enumeration of all optimal cuts of shells
with a hole. This procedure initializes the necessary variables and calls the recursive function of Algorithm 2. The
set Cuts stores the spanning subgraphs that include all
edges adjacent to the hole and maximize the number of
leaves.
procedure list cuts with hole(A, Vh )
Input:
Lists of neighbors, Ai , of each vertex i (A = {Ai }).
Vertices of the hole Vh .
Cuts = ∅
nS = |Vh |
while Cuts = ∅ do
ET = eij : i, j ∈ Vh
EA = eij : j ∈ Ai and i ∈ Vh and j ∈
/ Vh
Cuts0 = recursive(A, Vh , ET , EA , ∅, nS )
Cuts = append(Cuts, Cuts0 )
nS = nS + 1
end while
end procedure
S4.
A.
ESTIMATIONS
Maximum number of leaves
The aim of this section is to estimate the number of
leaves L in a MLST in terms of the simplest possible
polyhedral parameters, preferably as a function of the
number of vertices V , or of edges E. The exact number
L depends on the details of the graph, and its determination requires to actually solve the maximum leaf spanning
tree problem. However, we can obtain a simple estimate
for L by considering a local optimization algorithm for
finding approximated maximum leaf spanning trees.
This algorithm iteratively grows a tree by progressively
attaching to it vertices of the graph, until the tree becomes spanning (i.e. reaches all vertices in the polyhedral
graph), in the following way:
(i) To seed the iterative process, connect the highest
degree vertex to all its neighbors.
(ii) If the current tree is a spanning tree the algorithm
reaches its end. Otherwise, from the vertices already in
the tree, select the one with the highest number of neighbors still not in the tree, connect it to those neighbors,
and repeat step (ii).
In this algorithm, except for the highest degree vertex
of step (i), every vertex added to the tree starts as a
leaf attached to a non-leaf vertex. The neighbors of nonleaf vertices of the intermediate (non-spanning) trees are
guaranteed to be in the tree as well. Furthermore, the
number of leaves in the final spanning tree is L = V −
niter − 1, where niter is the total number of iterations,
and the −1 is due to the initial step (i). The number
niter depends on how many vertices are added to the tree
in each iteration.
As we show in the following, the number of vertices
added to the tree at each iteration turns out to be close to
2, regardless of the details of the polyhedral (shell) graph.
If the polyhedron has no triangular faces, a vertex of
degree k selected in step (ii) contributes at most with k−1
new leaves, because each vertex in the tree has at least
one neighbor also in the tree. However, if the faces are
triangular, any two vertices connected to each other share
two common neighbors. In this case, the selected vertex
has at least 3 neighbors already in the tree, namely, the
parent non-leaf vertex plus two vertices that are common
neighbors with the parent vertex, therefore it contributes
at most with k − 3 new leaves.
In convex polyhedra with regular faces (equilateral triangles, squares, regular pentagons, etc), the sum of the
internal angles attached to a vertex must be smaller than
2π. This strongly constrains the types of faces that can
be attached to a vertex of degree k, and in particular
the number of triangles. Notice that k cannot be smaller
than 3, and that k = 6 is not feasible even with just triangles (in that case the sum of angles is equal to 2π).
Then, let us consider the number of new vertices added
to the tree when the vertex selected in step (ii) has degree k = 3, 4, and 5. A vertex with k = 5 is mainly
surrounded by triangles (at least 4 out of 5 faces must
be triangles), so, when selected in step (ii), most of the
times it can contribute with k − 3 = 2 new leaves to the
tree. A vertex with k = 4 must have between 1 and 4
triangles among its faces, and it can contribute with 1 to
3 new leaves depending on the particular configuration
of the faces. Finally, a vertex with k = 3 can have any
number of triangles between 0 and 3. On the one hand, if
it has 3 triangles, this vertex is never selected in step (ii)
because it has 0 = k − 3 neighbors still not in the tree.
On the other hand, if the vertex has no triangular faces
attached, it can contribute with k − 1 = 2 new leaves.
Due to these geometrical constraints, the average number of new vertices added to the tree at each iteration is
essentially independent of the size and local details of
the polyhedral graph, and is close to 2. Furthermore,
we expect these arguments to qualitatively hold also for
irregular convex polyhedra. Even when the internal angles of a face are different from each other, their sum is
the same, and so, on average, the internal angles are the
same as for a regular face.
Assuming that each iteration adds approximately 2
new vertices on average to the growing tree, and that
the tree becomes spanning after niter iterations, we can
write:
k0 + 1 + 2niter ∼ V,
(S1)
where k0 is the highest degree in the polyhedral graph.
For simplicity, let us use k0 = 4. Replacing niter = V −
S6
L − 1 in Eq. (S1) we get
L ∼ (V + 3)/2.
(S2)
This formula fits well with the general trend observed for
L vs. V , as shown in the inset of Fig. S1.
40
Platonic
Archimedean
other
E/4+2
V/2+3/2
30
40
L 20
L 20
10
0
0
20
40
60
V
0
0
50
100
150
E
and of spanning trees, NST , in terms of the number of
edges, E, of a labeled polyhedral graph. These numbers
grow very quickly with the size of the graph and are not
uniquely determined by E – they depend on the details
of the graph. To obtain a simple estimate, we calculate
upper bounds for NST and NMLST , and use their ratio as
an estimator.
Each spanning tree has V − 1 edges out of a total of
E edges. Therefore, the upper bound of the number of
spanning trees NST is the number of possible combinationsof V − 1 edges, given by the binomial coefficient
E
V −1 . Similarly, each maximum leaf spanning tree has
L leaves of a total of V vertices, and the upper bound for
NMLST is the number of combinations of L vertices, VL .
To obtain an estimation for NMLST /NST , we take the
ratio of the upper bounds and replace the approximations
for L and V of Eqs. (S2) and (S3), respectively:
FIG. S1. Number of leaf vertices in a maximum leaf spanning
tree, L, vs.the number of edges E of the polyhedra in Table S1.
Different symbols represent different sets of polyhedra. The
solid line is the estimation provided by Eq (S4). The inset
shows L vs. the number of vertices V , the dashed line is the
estimation provided by Eq (S2).
Interestingly, the main panel of Fig. S1 shows that the
dispersion of the points is significantly smaller if we plot
L vs E. Let us recall Euler’s polyhedron formula V +
F = E + 2, where V , F , and E are the numbers of
vertices, faces, and edges of the polyhedron, respectively.
For a given E there are different polyhedra with different
combinations of V and F such that V + F = E + 2. On
the one hand, if all faces are triangles we have F = 2E/3
and in this case V = E/3 + 2. On the other hand, if
most faces of the polyhedron have many edges (which
implies wide internal angles) most vertices are attached
to only three faces, since the sum of the angles must be
smaller than 2π for convex polyhedra. Then, in this case
V ≈ 2E/3. Taking this into account, and because we
consider a variety of polyhedra with different types of
faces, we use the middle point,
V ∼ E/2 + 1,
(S3)
as an estimation of the number of vertices V of a polyhedron with E edges. We replace E/2+1 for V in Eq. (S2),
and finally obtain
L ∼ E/4 + 2.
where
we used Stirling’s approximation n!
∼
√
2πn(n/e)n . Figure S2 clearly shows that the ratio NMLST /NST has an exponential-like decay with the
number of edges of the polyhedron. The simple form of
Eq. (S5) fits well with this decay.
10
10
0
-10
NMLST
NST
10
-20
Platonic
Archimedean
other
- E/2 + 3/2
2
-30
10 0
100
50
150
E
FIG. S2. Ratio between the total number of spanning trees,
NST , and the number of maximum leaf spanning trees, NMLST
vs. the number of edges E of the polyhedra in Table S1.
Different symbols represent different sets of polyhedra. The
ratio NMLST /NST decays exponentially with the polyhedron
size, as predicted by Eq. (S5).
(S4)
This formula, plotted in the main panel of Fig. S1 as a
solid line, shows a remarkable agreement with our results.
B.
NMLST /NST ∼
E/2 + 1
E
/
∼ 2−E/2+3/2 (S5)
E/4 + 2
E/2
Ratio NMLST /NST
We now estimate the ratio NMLST /NST , between the
the numbers of maximum leaf spanning trees, NMLST ,
S5.
NON-ISOMORPHIC CUTS
To determine the optimal nets of a polyhedron, which
have no labels, we need to find the set of distinct unlabeled MLSTs. However, the algorithm of Section distinguishes each node by its label, and does not consider
symmetries that may exist in the polyhedral graph (automorphisms). An automorphism of a labeled graph is
S7
a relabeling that results in the same graph. If the polyhedral graph contains automorphisms, then the set of
MLSTs may contain isomorphisms, i.e., multiple ‘copies’
(differently labeled) of the same unlabeled MLST [S8].
These isomorphic cuts correspond to nets that are indistinguishable from each other and have the same radius of
gyration, which is our second criterion of optimization.
Therefore, we need only one member of each set of isomorphic MLSTs in the list of optimal cuts. To determine
if two MLSTs are isomorphic we employ an adjacency
matrix approach. (Note that this approach is valid for
any isomorphic subgraphs, not just MLSTs.)
The adjacency matrix, A, is a convenient representation of labeled graphs. Each element Aij , is 1 if the
vertices with labels i and j are connected by an edge,
otherwise Aij is 0. To switch the labels of any pair of
vertices, say i and j, we simply switch the rows i and j
and the columns i and j in matrix A. Any permutation
of V labels can be mapped into any other by a series of
at most V − 1 switches between pairs of vertices (V is
the number of vertices). We find the complete set of automorphisms of the polyhedral graph by comparing the
relabeled adjacency matrix A0 with the original matrix
A: when A0 = A the relabeling is automorphic.
Similarly to the polyhedral graph, we can represent a
MLST by an adjacency matrix B where each element
Bij is 1 if vertices i and j are connected by an edge in
the MLST and 0 otherwise. Two MLSTs, or cuts, are
isomorphic if, and only if, there is an automorphism of
the polyhedral graph that maps one MLST into the other.
That is, if two cuts, with adjacency matrices B1 and B2 ,
unfold into the same net, then there are automorphic
relabelings of A that map B1 into B2 and vice-versa.
We apply each of the previously obtained automorphisms
of A to one of the matrices, say B2 , and compare the
relabeled matrix B20 with B1 . If one of those relabeling
gives B20 = B1 , then the two cuts are isomorphic, and
we may discard one of them. We systematically compare
each of the MLSTs remaining in the list with all the
others to eliminate any isomorphisms, and obtain the full
set of Nopt net distinct optimal nets of the polyhedron.
S6.
NUMBER OF LABELED SPANNING TREES
Kirchhoff’s matrix-tree theorem allows us to calculate
the exact number of spanning trees of a labeled graph,
NST , in terms of the spectrum of the Laplacian matrix.
The Laplacian matrix of a graph is defined as L = D −A,
where D is the degree matrix (i.e., the diagonal matrix
with each entry dii equal to the degree of vertex i), and
A is the adjacency matrix. For a graph of V vertices the
matrix L has V eigenvalues λi ≥ 0, the smallest of which
is λV = 0. The matrix-tree theorem states that the total
number of spanning trees, NST , is given by the product
of eigenvalues of its Laplacian matrix
NST =
V −1
1 Y
λi ,
V i=1
(S6)
where λV is excluded from the product, and λi > 0 for
connected graphs and i < V [S8, S9]. The values of NST
used to plot the points in Fig. S2 (Fig. 3 of the main text)
were obtained with Eq. (S6) (while the values of NMLST
were obtained by the algorithm described in Section ).
Tetrahedron
Cube
Octahedron
Icosahedron
Dodecahedron
5-cell
8-cell
16-cell
24-cell
120-cell
600-cell
V
E
Nnets
4
6
2
8
12
11
6
12
11
12 30
43 380
20 30
43 380
5
10
3
16 32
261
8
24
110 912
24 96 1.79×1016
600 1200 2.76×10119
∗
120 720 1.20×10307
NST /Naut
∆
2/3
0.66
8
0.27
8
0.27
43 200
0.0041
43 200
0.0041
25/24
0.65
216
0.17
110 592
0.0029
1.79×1016 1.9×10−11
2.76×10119 3.9×10−61
1.20×10307
0
TABLE S2. Comparison of the exact number of nets Nnets
[S8] and the estimation NST /Naut for all regular convex polytopes in 3D (top 5 rows) and 4D (bottom 6 rows). The
right-hand side column of the table is the relative difference
∆ = (Nnets − NST /Naut ) /Nnets . The numbers of vertices,
and edges are denoted V and E, respectively. We include the
4D polytopes in this table to show that ∆ approaches 0 very
quickly as the size (V and E) of the polytope increases. Note
that everywhere else in this paper we consider only 3D shells
and their 2D nets.
∗
The number of nets of the 600-cell shown in Ref. [S8]
is wrong, due to a mistake in the calculation of the
graph’s spectrum. Correcting the mistake gives exactly
2182 ·3102 ·520 ·736 ·1148 ·2348 ·2930 nets for the 600-cell. In this
particular case, the lower-bound and the actual number of
nets coincide exactly.
S7.
NUMBER OF NON-ISOMORPHIC CUTS
The number of non-isomorphic cuts (i.e. nets), Nnets ,
of a polyhedron with no automorphisms is equal to
NST . When the polyhedral graph has automorphisms,
the number of distinct nets is actually smaller than NST ,
see Section . In that case, the exact number of nets,
Nnets , can be obtained using the approach of Ref. [S8],
which involves a detailed, case by case, analysis for each
polyhedron. In Ref. [S8] the Nnets are obtained only for
the five platonic solids. Nevertheless, we can estimate
Nnets for other polyhedron with automorphisms (e.g.,
Archimedean solids) with high precision by taking the ratio of NST to the number of automorphisms of the graph,
Naut . The ratio NST /Naut is in fact a lower-bound of
Nnets ; This ratio assumes that each unlabeled spanning
tree contributes with Naut differently labeled ‘copies’ to
S8
the set of labeled spanning trees, however, some spanning
trees have a smaller number of isomorphic ‘copies’, due
to the existence of symmetries in their branches. Since
Naut can be found with linear time algorithms [S10], the
calculation of NST /Naut is straightforward.
Table S2 clearly shows that this lower-bound actually
approaches Nnets very quickly for large graphs. This happens because the fraction of spanning trees that have
some symmetry in their structure quickly approaches
0 as the size of the graph increases. Figure S3(a)
demonstrates that the number of distinct nets, Nnets ≈
NST /Naut , grows exponentially with the size of the polyhedral graph.
NST / Naut
10
10
10
30
Platonic
Archimedean
other
20
10
a
0
10 0
100
50
150
E
Nopt nets Naut / NST
10
0
b
10
10
duced in this Supplemental Material as Fig. S2. If we
were to generate nets with a method that avoids the
sampling of isomorphic cuts completely, thus reducing
the search space, the probability that a randomly sampled net has the maximum number of single-edge cut vertices, Nopt nets /Nnets , would still be essentially the same
as NMLST /NST .
Figure S3(b) shows the probability that a net sampled at random from the set of non-isomorphic nets has
the maximum number of single-edge cut vertices, i.e.,
Nopt nets /Nnets ≈ Nopt nets Naut /NST . We observe no significant differences between Figs. S2 and S3(b), which
means that searches over unlabeled and labeled configurations have similar performances when only a small
fraction of the configurations is sampled.
-10
-20
Platonic
Archimedean
other
- E/2 + 3/2
2
-30
10 0
100
50
150
E
FIG. S3. Precise estimations of (a) the number of distinct
nets Nnets ≈ NST /Naut , and of (b) the fraction of optimal nets
Nopt nets /Nnets ≈ Nopt nets Naut /NST vs. the number of edges
E of the 3D polyhedra in Table S1. The number Nnets grows
exponentially with E, and shows a remarkably low level of dispersion. The solid line in the plot of panel (b) is Eq. (S5). The
fraction of unlabeled optimal cuts Nopt nets /Nnets is essentially
equal to the fraction of labeled optimal cuts, NMLST /NST , see
Fig. S2.
The probability that a randomly sampled labeled spanning tree is a MLST is equal to the ratio NMLST /NST ,
which is shown is Fig. 3 of the main text, and repro-
∗
[email protected]
[S1] M. R. Garey and D. S. Johnson, Computers and intractability, Vol. 29 (W. H Freeman and Company, New
York, 2002).
[S2] F. Rosamond, “Max leaf spanning tree,” in Encyclopedia of Algorithms (Springer, 2008) pp. 1–99.
[S3] H. Fernau, J. Kneis, D. Kratsch, A. Langer, M. Liedloff,
D. Raible, and P. Rossmanith, “An exact algorithm
for the maximum leaf spanning tree problem,” Theor.
Comput. Sci. 412, 6290–6302 (2011).
[S4] T. Fujie, “An exact algorithm for the maximum leaf
spanning tree problem,” Comput. Oper. Res. 30, 1931–
1944 (2003).
[S5] A. Lucena, N. Maculan, and L. Simonetti, “Reformulations and solution algorithms for the maximum leaf
spanning tree problem,” Comput. Manag. Sci. 7, 289–
311 (2010).
[S6] R. Solis-Oba, P. Bonsma, and S. Lowski, “A 2approximation algorithm for finding a spanning tree
with maximum number of leaves,” Algorithmica 77,
374–388 (2017).
[S7] H.-I. Lu and R. Ravi, “Approximating maximum leaf
spanning trees in almost linear time,” J. Algorithms 29,
132–141 (1998).
[S8] F. Buekenhout and M. Parker, “The number of nets of
the regular convex polytopes in dimension ≤ 4,” Discrete Math. 186, 69–94 (1998).
[S9] D. M. Cvetković, M. Doob, and H. Sachs, Spectra of
Graphs: Theory and Applications, 3rd Ed. (Wiley, New
York, 1998).
[S10] J. E. Hopcroft and J.-K. Wong, “Linear time algorithm
for isomorphism of planar graphs (preliminary report),”
in Proc. 6th Annual ACM Symp. Theory of Computing
(ACM, 1974) pp. 172–184.
| 8cs.DS
|
arXiv:1403.1324v1 [math.AC] 6 Mar 2014
Classification of the linearly reductive finite
subgroup schemes of SL2
Mitsuyasu Hashimoto
Department of Mathematics, Okayama University
Okayama 700–8530, JAPAN
E-mail: [email protected]
Dedicated to Professor Ngo Viet Trung
on the occasion of his sixtieth birthday
Abstract
We classify the linearly reductive finite subgroup schemes G of
SL2 = SL(V ) over an algebraically closed field k of positive characteristic, up to conjugation. As a corollary, we prove that such G is in oneto-one correspondence with an isomorphism class of two-dimensional
F -rational Gorenstein complete local rings with the coefficient field k
by the correspondence G 7→ ((Sym V )G )b.
1.
Introduction
The classification of the finite subgroups of SL2 (C) is well-known ([Dor, Section 26], [LW, (6.2)], see Theorem 3.2), and such a group corresponds to a
Dynkin diagram of type A, D, or E. A two-dimensional singularity is Gorenstein and rational if and only if it is a quotient singularity by a finite subgroup
of SL2 (C), and such singularities (also called Kleinian singularities) are classified via these subgroups, see [Dur]. Indeed, a two-dimensional singularity
2010 Mathematics Subject Classification. Primary 14L15; Secondary 13A50. Key
Words and Phrases. group scheme, Kleinian singularity, invariant theory,
1
is Gorenstein and rational if and only if it is a quotient singularity by a finite
subgroup of SL2 .
It is known that the F -rationality is the characteristic p version of the
rational singularity. More precisely, a finite-type algebra over a field of characteristic zero has rational singularities if and only if its modulo p reduction is
F -rational for almost all prime numbers p [Sm], [Har]. The two-dimensional
complete local F -rational Gorenstein rings over an algebraically closed field k
of characteristic p > 0 is classified using Dynkin diagrams A, D, and E, based
on Artin’s classification of rational double points [Art], see [WY], [HL]. Then
we might well ask whether such a ring is obtained as an invariant subring
k[[x, y]]G with G a finite subgroup of SL2 = SL(V ), where V = kx ⊕ ky.
Before considering this question, we have to consider several things.
First, any finite subgroup of SL2 (C) is small in the sense that it does not
have a pseudo-reflection, where an element g of GL(V ) is called a pseudoreflection if rank(g − 1V ) = 1. This is important in studying the ring of
invariants. If G is a small finite subgroup of GL(V ) (V = C2 ), then G can be
recovered from R̂ = Ŝ G , where Ŝ is the completion of S = Sym V , in the sense
that the fundamental group of Spec R̂ \ {0} is G, where 0 is the unique closed
point. Moreover, the category of maximal Cohen–Macaulay modules of R̂ is
canonically equivalent to the category of Ŝ-finite Ŝ-free (G, Ŝ)-modules [Yos,
(10.9)]. However, this is not the case for SL2 (k) with char(k) > 0. Indeed,
a finite subgroup of SL2 (k) may have a transvection, where g ∈ GL(V ) is
called a transvection if it is a pseudo-reflection and g − 1V is nilpotent. Even
if G is a non-trivial subgroup of SL2 , Ŝ G may be a formal power series ring
again, see [KS, Proposition 4.6].
Next, even if G is a finite subgroup of SL(V ), the ring of invariants
R = (Sym V )G may not be F -regular. Indeed, Singh [Sin] proved that if G is
the alternating group An acting canonically on V = k n , then R = (Sym V )G
is strongly F -regular if and only if p = char(k) does not divide the order
(n!)/2 of G = An . More generally, Yasuda [Yas] proved that if G is a small
subgroup of GL(V ), then the ring of invariants (Sym V )G is strongly F regular if and only if p = char(k) does not divide the order of G.
So we want to classify the subgroups G ⊂ SL2 with the order of G is not
divisible by p = char(k). It is easy to see that such G must be small. The
classification is known (see Theorem 3.2), and the result is the same as that
over C, except that small p which divides the order |G| of G is not allowed.
More precisely, for the type (An ), p must not divide n + 1, for (Dn ), p must
not divide 4n − 8, and we must have p ≥ 5, p ≥ 5, p ≥ 7 for type (E6 ), (E7 ),
2
and (E8 ), respectively. However, the restriction on p for the classification of
two-dimensional F -rational Gorenstein complete local rings is different [HL],
and it is p arbitrary for (An ), p ≥ 3 for (Dn ), and p ≥ 5, p ≥ 5, p ≥ 7 for
type (E6 ), (E7 ), and (E8 ), respectively.
The purpose of this paper is to show the gap occuring on the type (An )
and (Dn ) comes from the non-reduced group schemes, as shown in Theorem 3.8. As a corollary, we show that all the two-dimensional F -rational
Gorenstein complete local rings with the algebraically closed coefficient field
appear as the ring of invariants under the action of a linearly reductive finite
subgroup scheme of SL2 , see Corollary 3.10. This is already pointed out by
Artin [Art] for the type (An ), and is trivial for (E6 ), (E7 ), and (E8 ) because
of the order of the group and the restriction on p. What is new in this paper
is the case (Dn ). At this moment, the author does not know how to recover the group scheme G from R = S G . So although the classification of R,
the two-dimensional F -rational Gorenstein singularities are well-known, the
classification of G seems to be nontrivial for the author. As a result, we can
recover G from R in the sense that the correspondence from G to R̂ = Ŝ G is
one-to-one.
The key to the proof is Sweedler’s theorem (Theorem 2.8) which states
that a connected linearly reductive group scheme over a field of positive
characteristic is abelian.
The author thanks Professor Kei-ichi Watanabe for valuable advice.
2.
Preliminaries
(2.1) Let k be a field. For a k-scheme X, we denote the ring H 0 (X, OX )
by k[X].
We say that an affine algebraic k-group scheme G is linearly reductive if
any G-module is semisimple.
Lemma 2.2. Let
1→N →G→H→1
be an exact sequence of affine algebraic k-group schemes. Then G is linearly
reductive if and only if H and N are linearly reductive.
Proof. We prove the ‘if’ part. If M is a G-module, then the LyndonHochschild-Serre spectral sequence [Jan, (I.6.6)]
E2p,q = H p (H, H q (N, M)) ⇒ H p+q (G, M)
3
degenerates, and E2p,q = 0 for (p, q) 6= (0, 0) by assumption. Thus H n (G, M) =
0 for n > 0, as required.
We prove the ‘only if’ part. First, given a short exact sequence of Hmodules, it is also a short exact sequence of G-modules by restriction. By
assumption, it G-splits, and hence it H-splits. Thus any short exact sequence
of H-modules H-splits, and H is linearly reductive. Next, we prove that N
is linearly reductive. Let M be a finite dimensional N-module. Then there
is a spectral sequence
p+q
(N, M),
E2p,q = H p (G, Rq indG
N (M)) ⇒ H
see [Jan, (I.4.5)]. As G/N ∼
= H is affine, Rq indG
N (M) = 0 (q > 0) by [Jan,
(I.5.13)]. As G is linearly reductive by assumption, E2p,q = 0 for (p, q) 6= (0, 0).
Thus H n (N, M) = 0 for n > 0, and thus N is linearly reductive.
(2.3) Let C = (C, ∆, ε) be a k-coalgebra. An element c ∈ C is said to
be group-like if c 6= 0 and ∆(c) = c ⊗ c [Swe]. If so, ε(c) = 1. The set of
group-like elements of C is denoted by X (C). Note that X (C) is linearly
independent.
Let H be a k-Hopf algebra. Then for h ∈ X (H), S(h) = h−1 , where
S is the antipode. Note that X (H) is a subgroup of the unit group H × .
We denote GL1 = Spec k[t, t−1 ] with t group-like by Gm , and its subgroup
scheme Spec k[t]/(tr − 1) by µr for r ≥ 0. Note that µr represents the group
of the rth roots of unity, but it is not a reduced scheme if char(k) = p divides
r.
(2.4) In the rest of this paper, let k be algebraically closed. For an affine
algebraic group scheme G over k, let X (G) denote the group of characters
(one-dimensional representations) of G. Note that X (G) is canonically identified with X (k[G]), see [Wat, (2.1)].
Lemma 2.5. Let G be an affine algebraic k-group scheme. Then the following are equivalent.
1 G is abelian (that is, the product is commutative) and linearly reductive.
2 G is linearly reductive, and any simple G-module is one-dimensional.
3 G is diagonalizable. That is, a closed subgroup scheme of a torus Gnm .
4 The coordinate ring k[G] is group-like as a coalgebra. That is, k[G] is
the group ring kΓ, where Γ = X (G).
4
5 G is a finite direct product of Gm and µr with r ≥ 2.
Proof. 1⇒2 Follows easily from [Swe, (8.0.1)].
2⇒3 Take a finite dimensional faithful G-module V (this is possible
[Wat, (3.4)]). Take a basis v1 , . . . , vn of V such that each kvi is a onedimensional G-submodule of V . Then the embedding G → GL(V ) factors
through GL(kv1 ) × · · · × GL(kvn ) ∼
= Gnm .
n
3⇒4 Let G ⊂ Gm = T . Then k[T ] is a Laurent polynomial ring
λ1
±1
λn
k[t1 , . . . , t±1
n ]. As each Laurent monomial t1 · · · tn is group-like, k[T ] is
generated by its group-like elements. This property is obviously inherited by
its quotient Hopf algebra k[G], and we are done.
4⇒5 Apply the fundamental theorem of abelian groups on Γ.
5⇒4⇒2⇒1 is easy.
(2.6) The category of finitely generated abelian groups and the category
of diagonalizable k-group schemes are contravariantly equivalent with the
equivalences Γ 7→ Spec(kΓ) and G 7→ X (G). For a diagonalizable k-group
scheme G, a G-module is identified with an X (G)-graded k-vector space. A
G-algebra is nothing but a X (G)-graded k-algebra.
(2.7) For a diagonalizable group scheme G = Spec kΓ, the closed subgroup
schemes H of G is in one-to-one correspondence with the quotient groups M
of Γ with the correspondence H 7→ X (H) and M 7→ Spec kM. In particular,
the only closed subgroup schemes of Gm is µr with r ≥ 0, since the only
quotient groups of Z are Z/rZ.
The following is due to Sweedler [Swe2].
Theorem 2.8. Let G be a connected linearly reductive affine algebraic kgroup scheme over an algebraically closed field of positive characteristic p.
Then G is an abelian group (and hence is diagonalizable). So G is, up to
isomorphisms, of the form
Grm × µpe1 × · · · × µpes
for some r ≥ 0, s ≥ 0, and e1 ≥ · · · es ≥ 1.
(2.9) Let G be an affine algebraic k-group scheme. Note that Spec k, Gred
and Gred × Gred are all reduced. Hence the unit map e : Spec k → G, the
inverse ι : Gred → G, and the product µ : Gred × Gred → G all factor through
Gred ֒→ G, and so Gred is a closed subgroup scheme of G. Thus Gred is
k-smooth.
5
(2.10) We denote the identity component (the connected component containing the identity element) of G by G◦ . As Gred ֒→ G is a homeomorphism
and Gred is k-smooth, each connected component of G is irreducible, and
is isomorphic to G◦ . As Spec k, G◦ , and G◦ × G◦ are all irreducible, it is
easy to see that the unit map, the inverse, the product from them all factor
through G◦ ֒→ G, and hence G◦ is a closed open subgroup of G. If C is any
irreducible component of G, then the image of the map C × G◦ → G given
by (g, n) 7→ gng −1 is contained in G◦ . Thus G◦ is a normal subgroup scheme
of G. That is, the map G × G◦ → G given by (g, n) 7→ gng −1 factors through
G◦ .
(2.11) As the inclusion G◦ · Gred ֒→ G is a surjective open immersion, we
have that G◦ · Gred = G. As G◦ is an open subscheme of G, G◦ ∩ Gred = G◦red .
So if G is finite, then G is a semidirect product G = G◦ ⋊ Gred .
3.
The classification
(3.1) Throughout this section, let k be an algebraically closed field of characteristic p > 0.
The purpose of this section is to classify the linearly reductive finite subgroup schemes of SL2 over k, up to conjugation. Our starting point is the
reduced case, which is well-known. Unfortunately, the author does not know
the proof of the theorem below exactly as stated, but the proof in [Dor,
Section 26] also works for the case of positive characteristic. See also [LW,
Chapter 6, Section 2].
Theorem 3.2. Let k be an algebraically closed field of characteristic p > 0,
and G a finite nontrivial subgroup of SL2 . Assume that the order |G| of G
is not divisible by p. Then G is conjugate to one of the following, where ζr
denotes a primitive rth root of unity.
(An ) (n ≥ 1) The cyclic group generated by
ζn+1
0
.
−1
0 ζn+1
(Dn ) (n ≥ 4) The binary dihedral group generated by (A2n−5 ) and
0 ζ4
.
ζ4 0
6
(E6 ) The binary tetrahedral group generated by (D4 ) and
1 ζ87 ζ87
√
.
5
2 ζ8 ζ8
(E7 ) The binary octahedral group generated by (E6 ) and (A7 ).
(E8 ) The binary icosahedral group generated by (A9 ),
1
0 1
ζ5 + ζ5−1
1
, and
.
−1 0
1
−(ζ5 + ζ5−1 )
ζ52 − ζ53
Conversely, if g = n + 1 (resp. 4n − 8, 24, 48, and 120) is not zero in k, then
(An ) (resp. (Dn ), (E6 ), (E7 ), and (E8 )) above is defined, and is a linearly
reductive finite subgroup of SL2 of order g.
(3.3) Let G be a linearly reductive finite subgroup scheme of SL2 = SL(V ).
As the sequence
1 → G◦ → G → Gred → 1
is exact, both G◦ and Gred are linearly reductive by Lemma 2.2.
(3.4) First, consider the case that G is abelian. Then the vector representation V is the direct sum of two one-dimensional G-modules, say V1 and V2 ,
and hence we may assume that G is diagonalized. As G ⊂ SL2 , V2 ∼
= V1∗ .
Thus G → GL(V1 ) = Gm is also a closed immersion, and G ∼
= µm is
a 0
| a ∈ µm .
0 a−1
(3.5) So assume that G is not abelian. If G◦ is trivial, then G = Gred , and
the classification for this case is done in Theorem 3.2. So assume further that
G◦ is non-trivial.
G◦ is diagonalized as above, since G◦ is linearly reductive and connected
(and hence is also abelian by Theorem 2.8). We have G◦ ∼
= µr with r = pe
for some e ≥ 0.
(3.6) We consider the case that G◦ is contained in the group of scalar matrices. In this case, r = 2 (so p = 2), as G ⊂ SL2 . Then by Maschke’s
theorem, the order of Gred is odd. According to the classification in Theorem 3.2, Gred must be of type (An ) and is cyclic. This shows that G is
abelian, and this is a contradiction.
7
(3.7) So G◦ is not contained in the group of scalar matrices. Note that if
a, b, c, d ∈ k with ad − bc = 1 and
a b
ζr 0
λ 0
a b
=
0 µ
c d
c d
0 ζr−1
for some λ, µ ∈ A = k[T, T −1 ]/(T r − 1), where ζr is the image of T in A, then
(1) λ = ζr , µ = ζr−1 and b = c = 0, or (2) λ = ζr−1 , µ = ζr and a = d = 0. This
is because ζr 6= ζr−1. Then it is easy to see that the centralizer C = ZG (G◦ ) is
contained in the subgroup of diagonal matrices in SL2 . As we assume that G
is not abelian, C 6= NG (G◦ ) = G. Clearly, Cred has index two in Gred . This
shows that the order of Gred is divided by 2. By Maschke’s theorem, p 6= 2.
There exists some matrix
0
b
−b−1 0
in Gred for some b ∈ k × . After taking conjugate by
−1/2
b
ζ8
0
,
0
b1/2 ζ8−1
we obtain the group scheme of type (Dn ) below (see Theorem 3.8) for appropriate n.
In conclusion, we have the following.
Theorem 3.8. Let k be an algebraically closed field of arbitrary characteristic
p (so p is a prime number, or ∞). Let G be a linearly reductive finite subgroup
scheme of SL2 . Then, up to conjugation, G agrees with one of the following,
where ζr denotes a primitive rth root of unity.
(An ) (n ≥ 1) The group scheme µn+1 lying in SL2 as
a 0
. | a ∈ µn+1 .
0 a−1
(Dn ) (n ≥ 4) p ≥ 3. The subgroup scheme generated by (A2n−5 ) and
0 ζ4
.
ζ4 0
8
(E6 ) p ≥ 5. The binary tetrahedral group generated by (D4 ) and
1 ζ87 ζ87
√
.
5
2 ζ8 ζ8
(E7 ) p ≥ 5. The binary octahedral group generated by (E6 ) and (A7 ).
(E8 ) p ≥ 7. The binary icosahedral group generated by (A9 ),
1
ζ5 + ζ5−1
1
0 1
, and
.
−1 0
1
−(ζ5 + ζ5−1 )
ζ52 − ζ53
Conversely, any of above is a linearly reductive finite subgroup scheme of SL2 ,
and a different type gives a non-isomorphic group scheme.
(3.9) For a finite k-group scheme G over k, we define |G| := dimk k[G].
Then in the theorem, |G| is n + 1 for (An ), 4n − 8 for (Dn ), and 24, 48,
and 120 for (E6 ), (E7 ), and (E8 ), respectively. This is independent of p, and
hence is the same as the case for p = ∞.
Corollary 3.10. Let k be an algebraically closed field of positive characteristic. Let R̂ be a two-dimensional F -rational Gorenstein complete local
ring with the coefficient field k. Then there is a linerly reductive finite subgroup scheme G of SL2 = SL(V ), where V = k 2 , such that the completion
of (Sym V )G with respect to the irrelevant maximal ideal is isomorphic to R̂.
Conversely, if G is such a group scheme, then the completion of (Sym V )G
is a two-dimensional F -rational Gorenstein complete local ring with the coefficient field k.
Proof. This follows from the theorem and the list in [HL, Example 18].
Let u, v be the standard basis of V = k 2 and G be as in the list of the
theorem. Let S = k[u, v] and R = S G .
The case that G = (An ). Then a G-algebra is nothing but a X (G) =
Z/(n + 1)Z-graded k-algebra. S is a G-algebra with deg u = 1 and deg v =
−1, and R = S0 , the degree 0 component with respect to this grading. Set
x = un+1, y = −v n+1 and z = uv. Then it is easy to see that R = k[x, y, z].
Obviously, it is a quotient of R1 = k[X, Y, Z]/(XY + Z n+1 ). As R1 is a
normal domain of dimension two, R1 = R. So R̂ is of type (An ).
9
The case that G = (Dn ). Set x = uv(u2n−4 − (−1)n−2 v 2n−4 ), y =
−2
u v and z = 2−1/(n−1) (u2n−4 + (−1)n−2 v 2n−4 ). Then
2/(n−1) 2 2
′
′
′
k[x, y, z] ⊂ R = S G = (S G )G/G ⊂ k[u2n−4 , uv, v 2n−4] = S G ⊂ S,
where G′ is the group scheme of type (A2n−5 ). Note that k[x, y, z] is a quotient
of R1 = k[x, y, z] = k[X, Y, Z]/(X 2 +Y Z 2 +Y n−1 ). As R1 is a two-dimensional
normal domain, R1 → k[x, y, z] is an isomorphism, and hence k[x, y, z] is
′
normal. It is easy to see that Q(S G ) = k(x, y, z, uv) and [k(x, y, z, uv) :
k(x, y, z)] ≤ 2. As |G/G′ | = 2, R1 = k[x, y, z] → R is finite and birational.
As R1 is normal, R1 = R. Thus R̂ is of type (Dn ).
The cases of constant groups G = (E6 ), (E7 ), (E8 ) are well-known [LW],
and we omit the proof.
Remark 3.11. Note that the converse in the corollary is also checked theoretically. As G is linearly reductive, R = (Sym V )G is a direct summand subring
of S = Sym V , and hence is strongly F -regular. Thus its completion is also
strongly F -regular, see for example, [Has2, (3.28)]. Gorenstein property of
R is a consequence of [Has, (32.4)].
Nevertheless, at this moment, the author does not know a theoretical
reason why G can be recovered from the isomorphism class of R̂ (this is true,
as can be seen from the result of the classification).
Remark 3.12. Let V and G be as above. Set S := (Sym V )G , and let Ŝ be its
completion with respect to the irrelevant maximal ideal so that Ŝ ∼
= k[[x, y]].
◦
◦
G◦
As G is infinitesimal, Ŝ → Ŝ is purely inseparable. So Spec Ŝ G \ 0 is
◦
simply connected. As Spec Ŝ G \ 0 → Spec Ŝ G \ 0 is a Galois covering of the
Galois group G/G◦ = Gred , the fundamental group of Spec Ŝ G \ 0 is Gred ,
which is linearly reductive, as stated in [Art].
References
[Art]
M. Artin, Coverings of rational double points in characteristic p,
in Complex Analysis and Algebraic Geometry, dedicated to K. Kodaira, W. L. Baily and T. Shioda (eds.), Cambridge (1977), pp. 11–
22.
[Dor]
L. Dornhoff, Group representation theory. Part A: Ordinary representation theory, Dekker (1971).
10
[Dur]
A. Durfee, Fifteen characterizations of rational double points and
simple critical points, L’Enseignement Math. 25 (1979), 131–163.
[Har]
N. Hara, A characterization of rational singularities in terms of
injectivity of Frobenius maps, Amer. J. Math. 120 (1998), 981–
996.
[Has]
M. Hashimoto, Equivariant twisted inverses, Foundations of
Grothendieck Duality for Diagrams of Schemes (J. Lipman, M.
Hashimoto), Lecture Notes in Math. 1960, Springer (2009),
pp. 261–478.
[Has2]
M. Hashimoto, F -pure homomorphisms, strong F -regularity, and
F -injectivity, Comm. Algebra 38 (2010), 4569–4596.
[HL]
C. Huneke and G. J. Leuschke, Two theorems about maximal
Cohen–Macaulay modules, Math. Ann. (2002), 391–404.
[LW]
G. J. Leuschke and R. Wiegand, Cohen–Macaulay Representations,
AMS (2012).
[Jan]
J. C. Jantzen, Representations of algebraic groups, Second edition,
AMS (2003).
[KS]
D. B. Karagueuzian and P. Symonds, The module structure of a
group action on a polynomial ring: A finiteness theorem, J. Amer.
Math. Soc. 20 (2007), 931–967.
[Sin]
A. K. Singh, Failure of F -purity and F -regularity in certain rings
of invariants, Illinois J. Math. 42 (1998), 441–448.
[Sm]
K. E. Smith, F -rational rings have rational singularities, Amer. J.
Math. 119 (1997), 159–180.
[Swe]
M. Sweedler, Hopf Algebras, Benjamin (1969).
[Swe2]
M. E. Sweedler, Connected fully reducible affine group schemes in
positive characteristic are Abelian, J. Math. Kyoto Univ. 11 (1971),
51–70.
[Wat]
W. C. Waterhouse, Introduction to Affine Group Schemes, Springer
(1979).
11
[Yas]
T. Yasuda, Pure subrings of regular local rings, endomorphism rings
and Frobenius morphisms, J. Algebra 370 (2012), 15–31.
[WY]
K.-i. Watanabe and K.-i. Yoshida, Hilbert–Kunz multiplicity and
an inequality between multiplicity and colength, J. Algebra 230
(2000), 295–317.
[Yos]
Y. Yoshino, Cohen–Macaulay Modules over Cohen–Macaulay
Rings, Cambridge (1990).
12
| 0math.AC
|
arXiv:cs/9906013v1 [cs.LO] 14 Jun 1999
Combining Inclusion Polymorphism
and Parametric Polymorphism
Sabine Glesner
Karl Stroetmann
Institut für Programmstrukturen
und Datenorganisation
Lehrstuhl Prof. Goos
Universität Karlsruhe
Postfach 6980, D 76128 Karlsruhe
Tel.: +49 / 721 - 608 7399
Fax: +49 / 721 - 300 47
[email protected]
Siemens AG
ZT SE 4
Otto-Hahn-Ring 6
D-81739 München
Tel.: +49 / 89 - 636 49 555
Fax: +49 / 89 - 636 42 284
[email protected]
Abstract
We show that the question whether a term is typable is decidable for type systems combining inclusion polymorphism with parametric polymorphism provided
the type constructors are at most unary. To prove this result we first reduce the
typability problem to the problem of solving a system of type inequations. The
result is then obtained by showing that the solvability of the resulting system of
type inequations is decidable.
1
1
Introduction
As a common agreement, a flexible type system needs to contain inclusion as well
as parametric polymorphism. Unfortunately, such a flexibility of the type system
causes type inference to become hard or even undecidable. In this paper, we investigate the problem of checking the well-typedness of terms in the presence of
inclusion polymorphism combined with parametric polymorphism. We show that
in this case typability is decidable, provided that the type constructors are at most
unary. This result has not been stated before.
The result of our paper can be used for the design of new type systems that
combine both inclusion polymorphism and parametric polymorphism. Type systems
of this kind are of interest for object-oriented programming languages. In particular,
our result is applicable for the programming language Java which up to now does
not allow for parametric polymorphism but will probably do so in future versions
[MBL97, OW97].
Another area where our result is applicable is logic programming. A number of
type systems have been designed in this area, e. g. [AM94, HT92, Pfe92, YFS92],
but the systems that have been implemented so far either offer no inclusion polymorphism at all [HL94, SHC95] or impose stronger restrictions [Bei95b] than a type
system that would be based on our result.
As it stands, our result cannot be applied to functional programming languages
because these languages allow for the binary type constructor → which takes two
types σ and τ and returns the type σ → τ of all functions mapping σ to τ .
In general, Tiuryn and Urzyczyn have shown that type inference for a type
system which combines inclusion polymorphism and parametric polymorphism is
undecidable for second-order types [TU96]. On the other hand, type inference
for inclusion polymorphism combined with nullary type constructors is decidable:
[Mit84, Mit91] presents an algorithm called MATCH, which solves type inequations
in the case that only inequations between nullary type constructors are allowed.
Fuh and Mishra [FM90] introduce a similar algorithm to solve the same problem.
The logic programming language Protos-L [Bei95a] is based on this type system.
This paper is organized as follows: Section 2 contains a definition of the type
language. In section 3 we define well-typed terms. Moreover, we show how the
question whether a term is well-typed can be reduced to the problem of solving a
system of type inequations. The solvability of these systems is shown to be decidable
in section 4. Section 5 concludes.
2
Type Language
In this section we first introduce a language for describing types. Since types behave
in many ways like terms, there is also a notion of substitution. This notion is defined
in subsection 2.2.
2.1
Types
Types are constructed from type constructors and type parameters. The set of type
constructors is partially ordered. This ordering is extended to types.
Definition 1 (Ordered Type Alphabet) An ordered type alphabet is a tuple
A = (A, #, ≤) such that
1. The type alphabet A is a finite set of type constructors. Elements of A are
denoted by K, L, M, · · · .
2
2. (A, ≤) is a partial order.
3. # : A → N is a function assigning an arity, #K, to every type constructor
K ∈ A.
⋄
Definition 2 (Types) To define types, we assume that an ordered type alphabet
A = (A, #, ≤) and a set P = {αi : i ∈ N} of type parameters are given. Then the
set of types T = T(A, P) is defined inductively:
• α ∈ T for all α ∈ P.
• If K ∈ A, #K = n, and σi ∈ T for all i = 1, . . . , n, then K(σ1 , . . . , σn ) ∈ T.
If #K = 0, then we write K instead of K().
⋄
Types are denoted by π, ̺, σ, and τ , while parameters are denoted by α and β. A
monotype is a type constructed without type parameters. If τ is a type, then Par(τ )
denotes the set of type parameters in τ .
Next, we extend the relation ≤ from A to the set of types T(A, P).
Definition 3 (Subtype Relation) Let A = (A, #, ≤) be an ordered type alphabet and let T(A, P) be the set of types constructed from A. Then the subtype
relation on T(A, P) is defined inductively:
1. If α ∈ P, then α ≤ α.
2. If K, L ∈ A, #K = m, and #L = n, then K(σ1 , . . . , σm ) ≤ L(τ1 , . . . , τn )
holds iff K ≤ L and σi ≤ τi for all i = 1, . . . , min(m, n).
⋄
Without further provisons, (T, ≤) is not a partial order. This is shown by the
counter example given next.
Example 1 Assume that A = {K1 , K2 , L1 , L2 } where #Ki = 0 and #Li = 1 for
i = 1, 2. The ordering ≤ on A is defined by the following chain of inequations:
L1 ≤ K1 ≤ K2 ≤ L2 .
Then we have L1 (K2 ) ≤ K1 and K1 ≤ L2 (K1 ). However, L1 (K2 ) 6≤ L2 (K1 ).
⋄
This problem is caused by an incompatibility between the arity function # : A → N
and the ordering of the type alphabet.
Definition 4 (Compatible) Assume a type alphabet A = (A, #, ≤) is given.
Then the arity # : A → N is compatible with the ordering ≤ iff the following
condition is satisfied for all type constructors K, L, and M :
K ≤ L ∧ L ≤ M ⇒ min(#K, #M ) ≤ #L.
⋄
Convention:
For the rest of this paper we assume the following: If an ordered
type alphabet (A, #, ≤) is given, then # is compatible with ≤.
Lemma 1 If A = (A, #, ≤) is an ordered type alphabet, then T(A, P), ≤ is a
partial order.
Proof: We need to show that the relation ≤ is reflexive, antisymmetric, and transitive. In order to prove the reflexivity, we have to show σ ≤ σ for all types σ. This
is done via a trivial induction on σ. To prove the antisymmetry, assume σ ≤ τ and
τ ≤ σ. We have to show σ = τ . The proof proceeds by induction on σ.
3
1. σ is a parameter α. Because of σ ≤ τ we know that τ = α.
2. σ = L(σ1 , . . . , σl ). Then τ = M (τ1 , . . . , τm ) and we must have L ≤ M and
M ≤ L. Since ≤ is a partial order on A, we have L = M and l = m. Further,
we have
σi ≤ τi
for all i = 1, . . . , l,
τi ≤ σi
for all i = 1, . . . , l.
and
The induction hypothesis yields σi = τi for all i = 1, . . . , l and then σ = τ is
immediate.
To prove the transitivity, assume that ̺, σ, τ ∈ T(A, P) are given such that ̺ ≤ σ
and σ ≤ τ . We need to prove ̺ ≤ τ . The proof proceeds by induction on σ.
1. σ is a parameter α. Then ̺ is α and, similarly, τ is α. Obviously, ̺ ≤ τ .
2. σ is L(σ1 , . . . , σl ). Then ̺ = K(̺1 , . . . , ̺k ) and τ = M (τ1 , . . . , τm ). The
assumption ̺ ≤ σ yields K ≤ L and
̺i ≤ σi
for all i = 1, . . . , min(k, l)
and, similarly, the assumption σ ≤ τ yields L ≤ M and
σi ≤ τi
for all i = 1, . . . , min(l, m).
Since ≤ is a partial order on A, we have K ≤ M . Further, the induction
hypothesis shows that
̺i ≤ τi
for all i = 1, . . . , min(k, l, m).
Since the arity # is compatible with ≤, we have min(k, m) ≤ l. Therefore,
min(k, l, m) = min(k, m). But then ̺ ≤ τ is immediate.
✷
2.2
Parameter Substitutions
Types behave in many ways like terms. Therefore there is also a notion of substitution. Since type parameters are substituted rather than variables, these substitutions are called parameter substitutions. Parameter substitutions are denoted by
the capital Greek letters Θ, Φ, and Ψ.
Definition 5 (Parameter Substitution) A parameter substitution Θ is a finite
set of pairs of the form
α1 7→ τ1 , . . . , αn 7→ τn
where α1 , . . . , αn are distinct parameters and τ1 , .., τn are types. It is interpreted
as a function mapping type parameters to types:
τi if α = αi ;
Θ(α) :=
α otherwise.
This function is extended to types homomorphically:
Θ F (σ1 , . . . , σn ) := F Θ(σ1 ), . . . , Θ(σn ) .
We use a postfix notation to denote the result of evaluating Θ on a type τ , i.e. we
write τ Θ instead of Θ(τ ).
The domain of Θ is defined as dom(Θ) := {α | α 6= αΘ}. The set of parameters
appearing in the range of a parameter substitution Φ is defined as
S
Par(Φ) := {Par(αΦ) | α ∈ dom(Φ) .
A parameter substitution is called a parameter renaming iff it has the form
4
[α1 7→ απ(1) , . . . , αn 7→ απ(n) ]
where π is a permutation of the set {1, . . . , n}.
If Θ1 and Θ2 are parameter substitutions, then their composition Θ1 ◦ Θ2 is
defined such that α(Θ1 ◦ Θ2 ) = (αΘ1 )Θ2 holds for all type parameters α.
⋄
Parameter substitutions respect the ordering ≤ on T.
Lemma 2 If Θ is a parameter substitution and σ, τ ∈ T, then
σ ≤ τ ⇒ σΘ ≤ τ Θ.
Proof: The proof is done by an induction following the definition of σ ≤ τ .
1. The case α ≤ α is obvious.
2. If σ = K(σ1 , . . . , σm ) ≤ L(τ1 , . . . , τn ) = τ , then K ≤ L and σi ≤ τi for
i = 1, . . . , min(m, n). Using the induction hypothesis we have σi Θ ≤ τi Θ for
all relevant i. Therefore K(σ1 Θ, . . . , σm Θ) ≤ L(τ1 Θ, . . . , τn Θ).
⋄
3
Well-Typed Terms
We define the set of well-typed terms in the first subsection. Then in subsection 3.2
we reduce the question whether a term is well-typed to the solvability of a system
of type inequations.
3.1
Definition of Well-Typed Terms
We assume a set of functions symbols F and a set of variables V to be given. Every
function symbol f ∈ F is supposed to have an arity.
Definition 6 (Terms) The set of terms T (F , V) is defined inductively:
1. If v ∈ V, then v ∈ T (F , V).
2. If f ∈ Σ, f is n-ary, and t1 , . . . , tn ∈ T (F , V), then f (t1 , . . . , tn ) ∈ T (F , V).
The set of variables occurring in a term t is defined by an obvious inductive definition
and denoted by Var(t). If this set is empty, then t is called a closed term. The set
of closed terms is denoted by T (F ).
⋄
Definition 7 (Signature) If f is n-ary, then its signature is a string of n+1 types.
If σ1 . . . σn τ is the signature of f , then this is communicated by writing
f : σ1 × . . . × σn → τ .
In the following, we assume that every function symbol f has a signature.
A signature ̺1 . . . ̺n π is appropriate for a function symbol f iff
f : σ1 × . . . × σn → τ
and there exists a parameter substitution Θ such that π = τ Θ and ̺i = σi Θ for
i = 1, . . . , n.
⋄
Definition 8 (Type Assignment) A type annotation is a pair written as t : τ
where t is a term and τ is a type. The type annotation t : τ is called a variable
annotation if t is a variable. If Γ = {x1 : τ1 , . . . , xn : τn } is a finite set of variable
annotations such that the variables xi are pairwise distinct, then we call Γ a type
5
assignment. If Γ = {x1 : τ1 , . . . , xn : τn } is a type assignment, then we regard Γ
as a function with domain {x1 , . . . , xn } mapping the variables xi to the types τi ,
i.e. we have Γ(xi ) = τi for i = 1, . . . , n and dom(Γ) = {x1 , . . . , xn }.
⋄
Definition 9 (Well-Typed Term) The notion of a well-typed term is defined via
a binary relation ⊢ taking as its first argument a type assignment and as its second
argument a type annotation. The definition of ⊢ is done inductively:
1. If Γ(x) ≤ π, then
Γ ⊢ x : π.
2. If we have
(a)
(b)
(c)
(d)
Γ ⊢ si : ̺i for all i = 1, . . . , n,
σ1 × . . . × σn → τ is appropriate for f ,
̺i ≤ σi for all i = 1, . . . , n, and
τ ≤ π,
then
Γ ⊢ f (s1 , . . . , sn ) : π.
A term t is well-typed iff there exist a type assignment Γ and a type τ such that
Γ ⊢ t : τ . We read Γ ⊢ t : τ as “Γ entails t : τ ”. We call Γ ⊢ t : τ a type judgement.
⋄
3.2
Type Checking
In this subsection, we reduce the question whether a term is well-typed to the
solvability of a system of type inequations. Here, a type inequation is a pair of
types written as σ τ . A parameter substitution Θ solves a type inequation σ τ
(denoted Θ |= σ τ ) if σΘ ≤ τ Θ. A system of type inequations is a set of type
inequations. A parameter substitution Θ solves a system of type inequations I
(denoted Θ |= I) iff Θ solves every type inequation in I.
Assume that Γ is a type assignment and t : τ is a type annotation such that
Var(t) ⊆ dom(Γ). We define a function ineq(Γ, t : τ ) by induction on t such that
ineq(Γ, t : τ ) is a system of type inequations. A parameter substitution Θ will solve
ineq(Γ, t : τ ) iff ΓΘ ⊢ t : τ Θ. The inductive definition of ineq(Γ, t : τ ) is given as
follows:
1. ineq(Γ, x : τ ) := {Γ(x) τ }
2. Assume the signature of f is given as f : σ1 × . . . × σn → σ, where the type
parameters have been appropriately renamed so that they are new, i.e. the
new parameters may occur neither in Γ nor in τ nor in any of the signatures
used to construct ineq(Γ, si : σi ) for some i = 1, . . . , n. Then
n
S
ineq(Γ, si : σi ).
ineq Γ, f (s1 , . . . , sn ) : τ := {σ τ } ∪
i=1
Before starting with the proofs of the soundness and completeness for the above
transformation, we state some definitions: If Γ is a type assignment and t : τ is a
type annotation, then Γ ⊲ t : τ is called a hypothetical type judgement. A parameter
substitution Θ solves a hypothetical type judgement Γ ⊲ t : τ iff ΓΘ ⊢ t : τ Θ holds.
A type constraint is either a type inequation or a hypothetical type judgement. A
parameter substitution Θ solves a set of type constraints C iff it solves every type
inequation and every hypothetical type judgement in C. This is written Θ |= C.
We define a rewrite relation on sets of type constraints. It is the least transitive
relation ❀ such that:
6
1. C ∪ {Γ ⊲ x : τ } ❀ C ∪ {Γ(x) τ }
2. Assume that the signature of f is given as f : σ1 ×· · ·×σn → σ where the type
parameters have been appropriately renamed so that they are new. Then
Sn
C ∪ {Γ ⊲ f (s1 , . . . , sn ) : τ } ❀ C ∪ {σ τ } ∪ i=1 {Γ ⊲ si : σi }.
If a hypothetical type judgement Γ ⊲ t : τ is given, then the two rewrite rules can be
used repeatedly until the set ineq(Γ, t : τ ) is derived. This is easily seen by induction
on t. Furthermore, the rewrite relation ❀ satisfies the following invariants:
1. (Θ |= C2 ) ∧ (C1 ❀ C2 ) ⇒ (Θ |= C1 )
(I1 )
2. (Θ |= C1 ) ∧ (C1 ❀ C2 ) ⇒ ∃Ψ.(Θ ⊆ Ψ ∧ Ψ |= C2 )
(I2 )
Before proving these invariants, we show that they suffice to verify the soundness
and completeness of our transformation.
Theorem 1 (Soundness of the Transformation) Assume Γ is a type assignment and t : τ is a type annotation. If Θ |= ineq(Γ, t : τ ), then ΓΘ ⊢ t : τ Θ.
Proof: Since the assumption is Θ |= ineq(Γ, t : τ ) and we know that {Γ ⊲ t : τ } ❀
ineq(Γ, t : τ ), the invariant (I1 ) shows that Θ |= {Γ ⊲ t : τ }. By definition, this
implies ΓΘ ⊢ t : τ Θ.
✷
Theorem 2 (Completeness of the Transformation) Assume Γ is a type assignment, t : τ is a type annotation, and Θ is a parameter substitution such that
ΓΘ ⊢ t : τ Θ. Then, Θ can be extended to a parameter substitution Φ that is a
solution of ineq(Γ, t : τ ).
Proof: ΓΘ ⊢ t : τ Θ implies Θ |= Γ ⊲ t : τ . Since {Γ ⊲ t : τ } ❀ ineq(Γ, t : τ ), the
invariant (I2 ) shows that Θ can be extended to a parameter substitution Φ such
that Φ |= ineq(Γ, t : τ ).
✷
Proof of (I1 ): According to the definition of the rewrite relation ❀, it suffices to
consider the following two cases:
1. C1 = C ∪{Γ⊲ x : τ } ❀ C ∪{Γ(x) τ } = C2 . The assumption is that Θ |= C2 .
Then Θ |= C and Γ(x)Θ ≤ τ Θ. Therefore, ΓΘ ⊢ x : τ Θ showing Θ |= C1 .
Sn
2. C1 = C ∪ {Γ ⊲ f (s1 , . . . , sn ) : τ } ❀ C ∪ {σ τ } ∪ i=1 {Γ ⊲ si : σi } = C2 ,
where f : σ1 × · · · σn → σ. According to the assumption, we have Θ |= C,
σΘ ≤ τ Θ, and Θ |= Γ ⊲ si : σi for i = 1, . . . , n. Then ΓΘ ⊢ si : σi Θ for
i = 1, . . . , n. Therefore, ΓΘ ⊢ f (s1 , . . . , sn ) : τ Θ and that yields the claim.
✷
To prove the invariant (I2 ) we need the following lemma, which follows directly
from Defs. 7 and 9.
Lemma 3 Suppose that t = f (s1 , . . . , sn ) and f : σ1 × · · · × σn → σ . Then
Γ ⊢ t : τ iff there is a parameter substitution Θ such that σΘ ≤ τ and Γ ⊢ si : σi Θ
for all i = 1, . . . , n.
Proof of (I2 ): Again, it suffices to consider the following two cases corresponding
to the definition of the relation ❀:
1. C1 = C ∪{Γ⊲ x : τ } ❀ C ∪{Γ(x) τ } = C2 . The assumption is that Θ |= C1 .
Then Θ |= C and ΓΘ ⊢ x : τ Θ. Therefore, Γ(x)Θ ≤ τ Θ. Define Ψ := Θ.
7
Sn
2. C1 = C ∪ {Γ ⊲ f (s1 , . . . , sn ) : τ } ❀ C ∪ {σ τ } ∪ i=1 {Γ ⊲ si : σi } = C2 ,
where f : σ1 × · · · σn → σ. W.l.o.g. we assume that the type parameters
occurring in this signature do not occur in dom(Θ), since the type parameters
in the signature can be renamed. According to our assumption, we have Θ |=
C and Θ |= {Γ ⊲ f (s1 , . . . , sn ) : τ }. The latter implies ΓΘ ⊢ f (s1 , . . . , sn ) :
τ Θ. Lemma 3 shows that there is a parameter substitution Φ such that
ΓΘ ⊢ si : σi Φ for all i = 1, . . . , n and σΦ ≤ τ Θ. We can assume that
dom(Φ) contains only type parameters occurring in the signature of f . Then
dom(Θ) ∩ dom(Φ) = ∅. Define Ψ := Θ ∪ Φ.
✷
When checking whether a term t is well-typed we want to compute a type
assignment Γ and a type τ such that Γ ⊢ t : τ holds. To this end, we define a
most general type assignment S
Γinit and a most general type τinit : Let Var(t) be the
variables in t. Define Γinit = x∈Var(t) {x : αx } and τinit = α where αx and α are
distinct new type parameters. The claim now
is that t is well-typed if and only if
the set of type constraints ineq Γinit , t : τinit is solvable.
Proof: “⇒”: Assume t is well-typed. Then there exists a type assignment Γ
and a type τ such that Γ ⊢ t : τ . Define a parameter substitution Θ by setting
Θ(αx ) = Γ(x) for x ∈ Var(t) and
Θ(α) = τ . Then we have Γ(x) = Γinit (x)Θ and
τ = τinit Θ and therefore Θ |= Γinit ⊲ t : τinit . Since
Γinit ⊲ t : τ ❀ ineq Γinit , t : τinit ,
the invariant (I2 ) shows that there exists a parameter substitution Ψ such that
Ψ |= ineq(Γinit , t : τinit ).
“⇐”: On the other hand, if Ψ |= ineq Γinit , t : τinit , then Theorem 1 shows that
Γinit Ψ ⊢ t : τinit Ψ holds.
✷
Therefore, the problem whether a term t is well-typed is reduced to the problem
of solving systems of type inequations.
4
Solving Systems of Type Inequations
In this section, we assume that type constructors are at most unary, i.e., given an
ordered type alphabet A = (A, #, ≤) we have that #K ≤ 1 for all K ∈ A. We show
that then it is decidable whether a system S of type inequations is solvable. To
this end we present an algorithm which effectively tests all possible instantiations
for the type parameters in the type inequations. The fact that the type constructors are at most unary enables us to guarantee three important properties during
this instantiation process: We do not create any additional parameters; we do not
increase the overall number of inequations; and the depth of the terms in the type
inequations does not increase. Therefore we can generate only finitely many systems of instantiated type inequations. If one of these systems is solvable, then we
can construct a solution for S.
4.1
Some Definitions
We start with some definitions necessary to formulate the algorithm for checking
the solvability of systems of type inequations.
4.1.1
Solvability and Equivalence of Type Inequations
A system of type inequations I is solvable (denoted ✸I) iff there is a parameter
substitution Φ such that Φ |= I. Two type inequations I1 and I2 are equivalent
(denoted I1 ≈ I2 ) iff a parameter substitution Φ solves I1 if and only if Φ solves I2 :
8
def
I1 ≈ I2 ⇐⇒ ∀Φ · (Φ |= I1 ⇔ Φ |= I2 )
A type inequation I is equivalent to true (denoted I ≈ true) iff every parameter
substitution solves I, it is equivalent to false (denoted I ≈ false) iff no parameter
substitution solves I. Two systems of type inequations I1 and I1 are equivalent
(denoted I1 ≈ I2 ) iff a parameter substitution Φ solves I1 if and only if Φ solves
I2 :
def
I1 ≈ I2 ⇐⇒ ∀Φ · (Φ |= I1 ⇔ Φ |= I2 )
Next, a system of type inequations I is equivalent to a set of systems of type
inequations I (denoted I ≈ I) iff I is solvable if and only if there is a system J ∈ I
such that J is solvable:
def
I ≈ I ⇐⇒ ✸I ⇔ ∃J ∈ I · ✸J .
To proceed, we define the depth of a type inductively:
1. depth(α) := 0 for all type parameters α.
2. depth(K) := 1 for all nullary type constructors K.
3. depth(K(σ)) := 1 + depth(σ).
The depth of a type inequation is defined by taking the maximum:
depth(σ τ ) := max depth(σ), depth(τ ) .
Furthermore, we define depth(true) := depth(false) := 0. The function depth is
then extended to systems of type inequations:
depth(I) := max depth(I) | I ∈ I .
The depth of a parameter substitution Φ is defined as
depth(Φ) := max depth(αΦ) | α ∈ dom(Φ) .
We define the depth of the empty parameter substitution as 0. A system of inequations I is solvable at depth k (denoted ✸k I) iff there is a closed parameter
substitution Φ such that Φ |= I and depth(Φ) ≤ k.
4.1.2
Definition of nf
The function nf takes a type inequation as input and either produces an equivalent
type inequation or yields true or false. The function is defined inductively.
1. nf(α σ) := α σ and nf(σ α) := σ α for every type parameter α.
true
iff K ≤ L;
2. nf(K L) :=
false else.
true
iff K ≤ L;
3. nf K L(τ ) :=
false else.
true
iff K ≤ L;
4. nf K(σ) L :=
false else.
nf(σ τ ) iff K ≤ L;
5. nf K(σ) L(τ ) :=
⋄
false
else.
It is easy to see that nf(I) ≈ I holds for every inequation I. We extend the function
nf to systems of type inequations. First, we define an auxiliary function nfaux :
9
nfaux (I) :=
nf(I) | I ∈ I ∧ nf(I) 6= true .
Then, the function nf(I) is defined as
{false} if false ∈ nfaux (I);
nf(I) :=
nfaux (I) otherwise.
It is easy to see that I ≈ nf(I) for any system of type inequations I.
4.1.3
Definition of AllParSubst
Next, we define the function AllParSubst. The input to AllParSubst is a finite set
A of type parameters. The output is the set of parameter substitutions Φ such
that dom(Φ) ⊆ A, depth(Φ) ≤ 1, and Par(αΦ) ⊆ {α} but αΦ 6= α for all α ∈ A.
Therefore, AllParSubst(A) is equal to the set
Φ | dom(Φ) ⊆ A ∧ depth(Φ) ≤ 1 ∧ ∀α ∈ A · Par(αΦ) ⊆ {α} ∧ αΦ 6= α .
The function AllParSubst has the following properties:
1. AllParSubst(A) is finite.
This is true because the type alphabet is assumed to be finite. Therefore,
given a finite set A of type parameter there are only finitely many types τ
such that depth(τ ) ≤ 1 and Par(τ ) ⊆ A. But then AllParSubst(A) must be
finite, too.
2. If Ψ is a parameter substitution such that depth(Ψ) = n ≥ 1 and Par(Ψ) = ∅,
then there exist parameter substitutions Φ1 and Φ2 such that
(a) Φ1 ∈ AllParSubst(dom(Ψ)),
(b) depth(Φ2 ) = n − 1, and
(c) Φ = Φ1 ◦ Φ2 .
To prove this, assume Ψ = [α1 7→ τ1 , . . . , αn 7→ τn ]. For those τi such that
depth(τi ) > 1, we must have τi = Li (σi ) for some type constructor Li and
some type σi with depth(σi ) < depth(τi ). W.l.o.g. assume that depth(τi ) ≤ 1
for all i = 1, . . . , m − 1 and depth(τi ) > 1 for all i = m, . . . , n. Then define
Φ1 := [α1 7→ τ1 , . . . , αm−1 7→ τm−1 , αm 7→ Lm (αm ), . . . , αn 7→ Ln (αn )]
Φ2 := [αm 7→ σm , . . . , αn 7→ σn ].
and
Then the claim is obvious.
3. I ≈ IΦ | Φ ∈ AllParSubst Par(I) .
Assume Φ |= I where w.l.o.g. dom(Φ) ⊆ Par(I). Then the previous property
shows that Φ can be written as Φ1 ◦ Φ2 where Φ1 ∈ AllParSubst Par(I) . But
then Φ2 |= IΦ1 .
Conversely, if Ψ |= IΦ for a substitution Φ ∈ AllParSubst Par(I) , then
Φ ◦ Ψ |= I.
4. If Φ ∈ AllParSubst Par(I) , then depth nf(IΦ) ≤ depth(I).
Assume σ τ is an inequation in I of maximal depth. First, assume σ =
K(σ ′ ) and τ = L(τ ′ ). When going from I to nf(IΦ) this inequation either
disappears or it has the form nf(σ ′ Φ τ ′ Φ). But the depth of this inequation
is not greater than the depth of the original inequation.
Next, σ = α for a parameter α and τ = L(τ ′ ). But then σΦ must have
either of the forms K or K(σ ′ ). When going from I to nf(IΦ) the inequation
σ τ either disappears or it has the form nf(σ ′ Φ τ ′ Φ). Again the depth of
10
this inequation is not greater than the depth of the original inequation. The
remaining cases are similar.
4.1.4
Definition of Inst
The function Inst transforms a single system of type inequations into an equivalent
set of systems of type inequations. It is defined as
Inst(I) := nf(IΦ) | Φ ∈ AllParSubst Par(I) ∧ nf(IΦ) 6= {false} .
The function Inst has the following properties:
1. Inst(I) is finite.
2. I ≈ Inst(I).
3. If ✸k I and k ≥ 1, then there is a J ∈ Inst(I) such that ✸k−1 J .
4. If ✸k J and J ∈ Inst(I), then ✸k+1 I.
5. If J ∈ Inst(I), then Par(J ) ⊆ Par(I).
6. If J ∈ Inst(I), then depth(J ) ≤ depth(I).
These properties are immediate consequences of the definition of Inst and the properties of the function AllParSubst.
4.2
Deciding Type Inequations
We present an algorithm for solving (or refuting) systems of type inequations. The
algorithm maintains two sets of systems of inequations. Call theses sets M and
A. M serves as a memory of systems of type inequations that have already been
encountered, while A contains systems of type inequations that can be derived from
I by application of the function Inst. The algorithm initializes both M and A to the
singleton {I}, where I is the system of type inequations that is to be solved. After
this initialization, the algorithm enters a loop. In this loop, we compute Inst(J )
for all J ∈ A. Then, we update A as follows:
S
A :=
Inst(J ) | J ∈ A − M
that is, we apply Inst to all systems in A and we discard those systems that appear
already in the memory M. If ∅ ∈ A, then I is solvable and the algorithm halts
with success. If A becomes empty, the algorithm halts with failure. Otherwise, we
update M as
M := M ∪ A
and reenter the loop. Figure 1 specifies the algorithm formally.
Lemma 4 (Termination) The algorithm given in Figure 1 terminates.
Proof: For every system of inequations J ∈ M the number of inequations in
J is less or equal than the number of inequations in I, Par(J ) ⊆ Par(I), and
depth(J ) ≤ depth(I). Since the type alphabet is finite, the size of M must therefore
be bounded.
Now assume the algorithm given in Figure 1 does not terminate. Then the set
An+1 can never be empty. Therefore, every time the loop is executed, the statement
M := M ∪ An+1 increases the number of elements of the set M. But then the size
of M would increase beyond every bound.
✷
11
Input: I
% system of type inequations to be solved
M := {I};
A0 := {I};
n := 0;
Loop:
S
An+1 :=
Inst(J ) | J ∈ An − M
if ∅ ∈ An+1 then
return true;
end-if;
if An+1 = ∅ then
return false;
end-if;
M := M ∪ An+1 ;
n := n + 1;
goto Loop;
Figure 1: An algorithm for deciding solvability of type inequations.
Lemma 5 (Soundness) Assume n, k ∈ N, J ∈ An and ✸k J . Then ✸k+n I.
Proof: The proof is given by induction on n.
1. n = 0: Since A0 = {I} we must have J = I and the claim is trivial.
2. n → n + 1: Assume J ∈ An+1 with ✸k J . Then there is a K ∈ An such that
J ∈ Inst(K). This implies ✸k+1 K. By i.h. we have ✸(k+1)+n I.
✷
Lemma 6 Assume that ✸k I and k is minimal with this property. Then for all
n ≤ k there is a J ∈ An such that ✸k−n J .
Proof: The proof is done by induction on n.
1. n = 0: Obvious.
2. n → n + 1: Assume ✸k I and that k is minimal with this property. By
i.h. there is a J ∈ An such that ✸k−n J . Then there is a K ∈ Inst(J ) such
that ✸k−n−1 K. Assume K ∈ M. Since
M=
n
S
Ai ,
i=1
there is an i ≤ n such that K ∈ Ai . Therefore Lemma 5 shows ✸k−n−1+i I.
Since k − n − 1 + i < k this contradicts the minimality of k. This shows
that the assumption K ∈ M is wrong and we have K ∈ An+1 . Because of
✸k−(n+1) K the proof is complete.
✷
Theorem 3 The algorithm given in Figure 1 is correct.
Proof: Assume that I is solvable. Then ✸n I for some n ∈ N. By Lemma 6 we find
a J ∈ An such that ✸0 J holds. But then J = ∅ and the algorithm returns true.
Assume now that I is not solvable. If the algorithm would return true, then
∅ ∈ An for some n ∈ N. Since ✸0 ∅ Lemma 5 would then give ✸n I. Therefore the
algorithm cannot return true. Since it terminates, it must return false.
✷
12
5
Conclusion
In this paper we have presented a type system that supports both inclusion polymorphism and parametric polymorphism. We were able to prove that for this type
system typability is decidable, provided we use at most unary type constructors.
In practice, many interesting type constructors are either nullary or unary. Unary
type constructors occur naturally when dealing with container types, e. g. types
that are interpreted as sets, lists, or bags. It is convenient to be able to cast, for example, lists to sets. This cannot be done with the type system proposed by Mitchell
[Mit84], but is possible with the type system introduced in this paper.
Previously, it has been know that type inference is decidable for a system that
restricts inclusion polymorphism to nullary type constructors [FM90, Mit84, Mit91].
On the negative side, Tiuryn and Urzyczyn [TU96] have shown that the type inference problem for second-order types is undecidable. We have shown in this paper,
that typability is decidable for type systems with at most unary type constructors.
It is still an open question whether typability is decidable in the case of binary type
constructors.
Acknowledgement: The authors would like to thank Pawel Urzyczyn for pointing
out some technical weaknesses in an earlier version of this paper.
References
[AM94]
Krzysztof R. Apt and Elena Marchiori. Reasoning about Prolog programs:
From modes through types to assertions. Formal Aspects of Computing,
6A:743–764, 1994.
[Bei95a] Christoph Beierle. Concepts, implementation, and applications of a typed
logic programming language. In Christoph Beierle and Lutz Plümer, editors, Logic Programming: Formal Methods and Practical Applications,
chapter 5, pages 139–167. Elsevier Science B.V./North-Holland, 1995.
[Bei95b] Christoph Beierle. Type inferencing for polymorphic order-sorted logic
programs. In Leon Sterling, editor, Proceedings of the 1995 International
Conference on Logic Programming. MIT Press, 1995.
[FM90]
You-Chin Fuh and Prateek Mishra. Type inference with subtypes. Theoretical Computer Science, 73(2):155–175, 1990.
[HL94]
Patricia M. Hill and John W. Lloyd. The Gödel Programming Language.
MIT Press, 1994.
[HT92]
P. M. Hill and R. W. Topor. A semantics for typed logic programs. In
Pfenning [Pfe92], pages 1–62.
[MBL97] Andrew C. Myers, Joseph A. Bank, and Barbara Liskov. Parameterized
Types for Java. In Proceedings of the 24th Symposium on Principles of
Programming Languages, pages 132–145. ACM Press, 1997.
[Mit84]
John C. Mitchell. Coercion and type inference. In 11th Annual ACM Symposium on Principles of Programming Languages, pages 175–185, 1984.
[Mit91]
John C. Mitchell. Type inference with simple subtypes. Journal of Functional Programming, 1:245–285, 1991.
[OW97] Martin Odersky and Philip Wadler. Pizza into Java: Translating theory
into practice. In Proceedings of the 24th Symposium on Principles of
Programming Languages, pages 146–159. ACM Press, 1997.
13
[Pfe92]
Frank Pfenning, editor. Types in Logic Programming. The MIT Press,
1992.
[SHC95] Zoltan Somogyi, Fergus J. Henderson, and Thomas Conway. Mercury: an
efficient purely declarative logic programming language. In Proceedings
of the Australian Computer Science Conference, pages 499–512, Glenelg,
Australia, February 1995.
[TU96]
Jerzy Tiuryn and Pawel Urzyczyn. The subtyping problem for secondorder types is undecidable. In Proceedings of the IEEE Symposion on
Logic in Computer Science (LICS 96), pages 74–85, 1996.
[YFS92] Eyal Yardeni, Thom Frühwirth, and Ehud Shapiro. Polymorphically
typed logic programs. In Pfenning [Pfe92], pages 63–90.
14
| 6cs.PL
|
IMAG
arXiv:cs/0412012v1 [cs.PL] 3 Dec 2004
Institut d’Informatique et de
Mathématiques Appliquées
de Grenoble
LSR
Laboratoire Logiciels, Systèmes, Réseaux
RAPPORT DE RECHERCHE
Jartege: a Tool for Random Generation of
Unit Tests for Java Classes
Catherine Oriat
RR 1069
Juin 2004
B.P. 72 – 38402 SAINT MARTIN D’HERES CEDEX – France
Centre National de la Recherche Scientifique
Institut National Polytechnique de Grenoble
Université Joseph Fourier Grenoble I
Jartege: a Tool for Random Generation of Unit Tests for
Java Classes
Catherine Oriat
LSR-IMAG, Grenoble
email: [email protected]
Résumé
Ce rapport présente Jartege, un outil qui permet la génération aléatoire de tests unitaires
pour des classes Java spécifiées en JML. JML (Java Modeling Language) est un langage
de spécification pour Java qui permet d’écrire des invariants pour des classes, ainsi que
des pré- et des post-conditions pour des opérations. Comme dans l’outil JML-JUnit, nous
utilisons les spécifications JML d’une part pour éliminer des cas de test non pertinents,
et d’autre part comme oracle de test. Jartege génère de façon aléatoire des cas de test,
qui consistent en une séquence d’appels de constructeurs et de méthodes des classes sous
test. L’aspect aléatoire de l’outil peut être paramétré en associant des poids aux classes
et aux opérations, et en contrôlant le nombre d’instances créées pour chaque classe sous
test. L’utilisation pratique de Jartege est illustrée par une petite étude de cas.
Mots-clés
Test, test unitaire, génération aléatoire de cas de test, Java, JML
Abstract
This report presents Jartege, a tool which allows random generation of unit tests for Java
classes specified in JML. JML (Java Modeling Language) is a specification language for
Java which allows one to write invariants for classes, and pre- and postconditions for
operations. As in the JML-JUnit tool, we use JML specifications on the one hand to
eliminate irrelevant test cases, and on the other hand as a test oracle. Jartege randomly
generates test cases, which consist of a sequence of constructor and method calls for the
classes under test. The random aspect of the tool can be parameterized by associating
weights to classes and operations, and by controlling the number of instances which are
created for each class under test. The practical use of Jartege is illustrated by a small case
study.
Keywords
Testing, unit testing, random generation of test cases, Java, JML
Jartege: a Tool for Random Generation
of Unit Tests for Java Classes
Catherine Oriat
LSR-IMAG, Grenoble
email: [email protected]
1
Introduction
Main validation technique in software engineering, program testing aims at ensuring that
the program is correct, i.e. conforms to its specifications. As the input domain of a
program is usually very large or infinite, exhaustive testing, which consists in testing the
program for all its possible inputs, is in general impossible. The objective of testing is
thus rather to improve the software quality by finding faults in it. Testing is an important
activity of software development, whose cost is usually estimated to about 40% of the total
cost of software development, exceeding the cost of code writing.
A test campaign for a program requires several steps: design and development of test
sets, execution and results examination (or oracle). Considering the cost of testing, it is
interesting to automate some of these steps.
For Java programs, the JUnit framework [JUn, BG98] allows the developer to write
an oracle for each test case, and to automatically execute test sets. JUnit in particular
permits to automatically regression test several test sets.
If a formal specification is available, it can be translated into assertions which can be
checked at runtime, and thus serve as a test oracle. For instance, the DAISTS system
[GMH81] compiles algebraic axioms of an abstract data type into consistency checks;
Rosenblum’s APP pre-processor allows the programmer to write assertions for C programs
[Ros92]; the Eiffel design and contract approach integrates assertions in the programming
language [Mey88, Mey92].
It is also interesting to automate the development of tests. We can distinguish between
two groups of strategies to produce test sets: random and systematic strategies. Systematic strategies, such as functional testing or structural testing, consist in decomposing the
input domain of the program in several subdomains, often called “partitions”.
Many systematic strategies propose to derive test cases from a formal specification
[Gau95]. For instance, the Dick and Faivre method [DF93], which consists in constructing
a finite state automaton from the formal specification and in selecting test cases as paths
in this automaton, has been used as a basis by other approaches, in particular Casting
[ABM97] or BZTT [LPU02]. BZTT uses B or Z specifications to generate test cases which
consist in placing the system in a boundary state and calling an operation with a boundary
value.
In contrast to systematic methods, random testing generally does not use the program
nor the specification to produce test sets. It may use an operational profile of the program,
which describe how the program is expected to be used. The utility of random testing is
controversial in the testing community. It is usually presented as the poorest approach for
selecting test data [Mye94]. However, random testing has a few advantages which make
us think that it could be a good complement to systematic testing:
• random testing is cheap and rather easy to implement. In particular, it can produce
large or very large test sets;
3
• it can detect a substantial number of errors at a low cost [DN84, HT90, Nta01].
Moreover, if an operational profile of the program is available,
• random testing allows early detection of the failures that are most likely to appear
when using the program [FHLS98];
• it can be used to evaluate the program reliability [HT90, Ham94].
However, partition testing can be much more effective at finding failures, especially when
the strategy defines some very small subdomains with a high probability to cause failures
[WJ91].
Among the best practices of extreme programming, or XP [Bec99, Bec00], are continuous testing and code refactoring. While they are writing code, developers should write
corresponding unit tests, using a testing framework such as JUnit. Unit testing is often
presented as a support to refactoring: it gives the developer confidence that the changes
have not introduced new errors. However, code refactoring often requires to change some
of the corresponding unit tests as well. If a class has to be tested intensively, the amount
of code corresponding to the tests often exceeds the amount of code of the class. Both
practices can therefore be hard to conciliate.
This report proposes to use random generation of tests to facilitate countinuous testing
and code refactoring in the context of extreme programming. We presents Jartege, a tool
for random generation of unit tests for Java classes specified in JML, which aims at easily
producing numerous test cases, in order to detect a substantial number of errors at a low
cost.
The rest of the report is organized as follows. Section 2 introduces the approach.
Section 3 presents a case study which consists in modeling bank accounts. This case study
will serve to illustrate the use of our testing tool. Section 4 presents our tool Jartege
and how it can be used to test the bank account case study. Section 5 introduces more
advanced features of Jartege, which allow one to parameterize its random aspect. Section
6 shows the errors which are detected by test cases generated by Jartege in the case study.
Section 7 presents and compares related approaches. Section 8 discusses some points about
random generation of tests and draw future work we intend to undertake around Jartege.
2
Approach
JML (Java Modeling Language) is a specification language for Java inspired by Eiffel,
VDM and Larch, which was designed by Gary Leavens and his colleagues [JML, LBR03,
LPC+ 03]. Several teams are currently still working on JML design and tools around JML
[BCC+ 03]. JML allows one to specify various assertions in particular invariants for classes
as well as pre- and postconditions for methods.
The JML compiler (jmlc) [CL02a] translates JML specifications into assertions checked
at runtime. If an assertion is violated, then a specific exception is raised. In the context
of a given method call, the JML compiler makes a useful difference between an entry
precondition which is a precondition of the given method, and an internal precondition,
which is a precondition of an operation being called, at some level, by the given method.
The JML-JUnit tool [CL02b] generates JUnit test cases for a Java program specified
in JML, using the JML compiler to translate JML specifications into test oracles. Test
cases are produced from a test fixture and parameter values supplied by the user.
4
Our approach is inspired by the JML-JUnit tool: we propose to generate random tests
for Java programs specified in JML, using this specification as a test oracle, in the JMLJUnit way. Our aim is to produce a big number of tests at a low cost, in order to facilitate
unit testing.
To implement these ideas, we started developing a prototype tool, called Jartege for
Java Random Test Generator. Jartege is designed to generate unit tests for Java classes
specified with JML. By unit tests, we here mean tests for some operations in a single class
or a small cluster of classes. In our context, a test case is a Java method which consists of
a sequence of operation (constructor or method) calls.
As in the JML-JUnit tool, we use the JML specification to assist test generation in
two ways:
1. It permits the rejection of test sequences which contain an operation call which
violates the operation entry precondition. We consider that these test sequences are
not interesting because they detect errors which correspond to a fault in the test
program.
(Although such sequences could be used to detect cases when a precondition is too
strong, this goal would prevent us from producing long sequences of calls. Thus,
we choose to trust the specification rather than the code. We can note that if an
operation uses a method whose precondition is too strong, this will produce an
internal precondition error and the sequence will not be rejected.)
2. The specification is also used as a test oracle: the test detects an error when another
assertion (e.g. an invariant, a postcondition or an internal precondition) is violated.
Such an error corresponds to a fault in the Java program or in the JML specification.
Our work has been influenced by the Lutess tool [Par96, dBORZ99], which aims at deriving test data for synchronous programs, with various generation methods, in particular
a purely random generation and a generation guided by operational profiles. The good
results obtained by Lutess, which won the best tool award of the first feature interaction
detection contest [dBZ99], have encouraged us to consider random generation of tests as
a viable approach.
3
Case Study
In this section, we present a case study to illustrate the use of Jartege. This case study
defines bank accounts and some operations on these accounts.
3.1
Informal Specification of the Bank Accounts
We describe here an informal specification of bank accounts:
1. An account contains a certain available amount of money (its balance), and is associated with a minimum amount that this account may contain (the minimum
balance).
2. It is possible to credit or debit an account. A debit operation is only possible if there
is enough money on the account.
3. One or several last credit or debit operations may be cancelled.
5
4. The minimum balance of an account may be changed.
3.2
Bank Account Modeling
To represent accounts, we define a class Account with two attributes: balance and min
which respectively represent the balance and the minimum balance of the account, and
three methods: credit, debit and cancel. In order to implement the cancel operation, we
associate with each account an history, which is a linked list of the previous balances of
the account. The class History has one attribute, balance, which represents the balance
of its associated account before the last credit or debit operation. With each history is
associated its preceding history. Figure 1 shows the UML class diagram of bank accounts.
hist
Account
History
0..1
balance
min
balance
0..1
credit(amount: int)
debit(amount: int)
cancel()
prec
Figure 1: UML diagram of the case study
3.3
JML Specification and Java Implementation
We implement both class Account and History in Java, and specify them with JML. We
choose to write lightweight public specifications to emphasize that these specifications are
destined for clients and need not be complete.
In order to forbid uncontrolled modifications of the attributes, we declare them as
private and define associated access methods: getBalance, getMin and getHist in class
Account and getBalance and getPrec in class History. These methods are specified as pure
methods in JML because they are side effect free, which allows us to use them in JML
assertions.
The class Account has an invariant which specifies that the balance of an account must
always be greater than the minimum balance.
/* Class of bank accounts. */
public class Account {
/* Invariant of class Account. */
/*@ public invariant getBalance( ) >= getMin( ); */
private int balance; // The balance of this account
private int min;
// The minimum balance
private History hist; // The history list of this account
/* The balance of this account. */
public /*@ pure */ int getBalance( ) { return balance; }
6
/* The history list of this account. */
public /*@ pure */ History getHist( ) { return hist; }
/* The minimum balance of this account. */
public /*@ pure */ int getMin( ) { return min; }
The constructor of class Account constructs an account with the specified balance and the
specified minimum balance. Its precondition asserts that the specified balance is greater
than the specified minimum balance.
/* Constructs an account with the specified balance and
* minimum balance. */
/*@ requires balance >= min; */
public Account (int balance, int min) {
this.balance = balance;
this.min = min;
this.hist = null ;
}
As the minimum balance min is a private attribute, we have to introduce a method to
change its value. The method setMin (int min) sets the minimum balance to the specified
value. Its precondition asserts that the balance is greater than the specified minimum
value.
/* Sets the minimum balance to the specified value. */
/*@ requires getBalance ( ) >= min; */
public void setMin (int min) { this.min = min; }
The method credit (int amount) credits the account with the specified amount. Its precondition requires the amount to be positive. Its postcondition asserts that the new balance is
the former balance augmented by the specified amount, that a new history is created with
balance the former balance of the account and with previous history the former history of
the account. Its exceptional postcondition asserts that the method should never terminate
abruptly.
/* Credits this account with the specified amount. */
/*@ requires amount >= 0;
*@ ensures getBalance ( ) == \old (getBalance ( )) + amount &&
*@
\fresh (getHist ( )) &&
*@
getHist ( ).getBalance ( ) == \old (getBalance ( )) &&
*@
getHist ( ).getPrec ( ) == \old (getHist ( ));
*@ signals (Exception e) false;
*/
public void credit(int amount) {
hist = new History (balance, getHist ( ));
balance = balance + amount;
}
The debit operation, which is very similar to the credit operation, is not detailed here.
It has the additional precondition that the balance decreased by the specified amount is
greater than the minimum balance.
7
The method cancel cancels the last credit or debit operation. Its precondition requires
that the history is not null, which means that at least one operation of credit or debit has
taken place since the account was created. Its postcondition ensures that the balance and
the history of the account have been updated with their former values.
/* Cancels the last credit or debit operation. */
/*@ requires getHist ( ) != null ;
*@ ensures getHist ( ) == \old (getHist ( ).getPrec ( )) &&
*@
getBalance ( ) == \old (getHist ( ).getBalance ( ));
*@ signals (Exception e) false;
*/
public void cancel ( ) {
balance = hist.getBalance ( );
hist = hist.getPrec ( );
}
} // End of class Account
We do not define any JML assertion for the class History.
/* Class of histories. */
public class History {
private int balance; // The balance of this history.
private History prec; // The preceding history.
/* Constructs a history with the specified balance and preceding history. */
public History (int balance, History prec) {
this.balance = balance; this.prec = prec;
}
/* The balance of this history. */
public /*@ pure */ int getBalance ( ) { return balance; }
/* The preceding history. */
public /*@ pure */ History getPrec ( ) { return prec; }
} // End of class History
4
Jartege
Jartege (Java Random Test Generator) is a framework for automatic random generation
of unit tests for Java classes specified with JML. This approach consists in producing test
programs which are composed of test cases, each test case consisting of randomly chosen
sequences of method calls for each class under test. Each generated test program can be
executed to test the classes, and re-executed later on either after having corrected some
faults or for regression test.
The tool is designed to produce unit tests, i.e. tests composed of calls of some methods
which belong to a few classes. As noticed in [LTFWD00], because of complex dependences
that exist between classes in object-oriented programs, it is usually not possible to test a
method or a class in complete isolation. Jartege thus is able to generate test cases which
allow the integration of several classes.
8
4.1
Practical Use of Jartege
Suppose we wish to generate tests for the classes Account and History. We write the
following Java program:
import jartege.*;
/** Jartege test cases generator for classes Account and History. */
class TestGen {
public static void main (String[ ] args) {
// Creates a class tester
ClassTester t = new ClassTester ( );
// Adds the specified classes to the set of classes under test
t.addClass ("Account");
t.addClass ("History");
// Generates a test class TestBank, made of 100 test cases.
// For each test case, the tool tries to generate 50 method calls.
t.generate ("TestBank", 100, 50);
}
}
The main class of the Jartege framework is ClassTester. This class must be instantiated
to allow the creation of test programs.
The method addClass (String className) adds the class className to the set of classes
under test. In this example, we wish to generate tests for the classes Account and History.
The method generate (String className, int numberOfTests, int numberOfMethodCalls)
generates a file className.java which contains a class called className. This class is composed of numberOfTests test cases. For each test case, the tool makes numberOfMethodCalls attempts to generate a method call of one of the classes under test. Using the
accessible constructors, the tool constructs objects which serve as parameters for these
method calls.
When the program TestGen is executed, it produces a file TestGen.java which contains
a main program. This main program calls successively 100 test methods test1 ( ), test2 ( )
... test100 ( ). Each test method contains about 50 method calls.
While the program is generated, Jartege executes on the fly each operation call, which
allows it to eliminate calls which violate the operation precondition. When this precondition is strong, it may happen that the tool does not succeed in generating a call for a
given method, which explains that about 50 method calls are generated.
4.2
Test Programs Produced by Jartege
A test program produced by Jartege is a class with a main method which consists in calling
sequentially all generated test cases. Each test case consists of a sequence of constructor
and method calls of the classes under test. Here is an example of such a test case:
// Test case number 1
public void test1 ( ) throws Exception {
try {
Account ob1 = new Account (1023296578, 223978640);
ob1.debit (152022897);
9
History ob2 = new History (1661966075, (History) null);
History ob3 = new History (-350589348, ob2);
History ob4 = ob2.getPrec ( );
int ob5 = ob3.getBalance ( );
ob1.cancel ( );
// ...
} catch (Throwable except) {
error ( except, 1);
}
}
For each test method, if a JML exception is raised, then an error message (coming from
jmlc) is printed. The test program terminates by printing an assessment of the test. As an
example, here is an excerpt of what is printed with a generated program TestBank.java:
1) Error detected in class TestBank by method test2:
org.jmlspecs.jmlrac.runtime.JMLInvariantError:
By method ”[email protected]:79:18i” of class ”Account”
for assertions specified at Account.java:11:32 [...]
at TestBank.test2(TestBank.java:138)
[...]
Number of tests: 100
Number of errors: 71
Number of inconclusive tests: 0
The program has detected 71 errors. The first error detected comes from a violation of
the invariant of class Account (specified line 11), which happened after a credit operation.
The test program also indicates the number of inconclusive tests. A test case is inconclusive when it does not allow one to conclude whether the program behaviour is correct
or not. A test program generated by Jartege indicates that a test case is inconclusive
when it contains an operation call whose entry precondition is violated. As Jartege is
designed to eliminate such operation calls, this situation may only arise when the code or
the specification of one of the classes under test has been modified after the test file was
generated. A high number of inconclusive tests indicates that the test file is no longer
relevant.
5
Controlling Random Generation
If we leave everything to chance, Jartege might not produce interesting sequences of calls.
Jartege thus provides a few possibilities to parameterize its random aspect. These features
can be useful for stress testing, for instance if we want to test more intensively a given
method. More generally, they allow us to define an operational profile for the classes under
test, which describe how these classes are likely to be used by other components.
5.1
Weights
With each class and operation of a class is associated a weight, which defines the probability
that a class will be chosen, and that an operation of this class will be called. In particular,
it is possible to forbid to call some operation by associating a null weight with it. By
10
default, all weights are equal to 1. A weight can be modified by a weight change method.
In particular:
• changeAllMethodsWeight (String className, double weight) changes the weight of all
methods in the class className to the specified weight.
• changeMethodWeight (String className, String methodName, double weight) changes
the weight of the specified method(s) in the class className to the specified weight.
• changeMethodWeight (String className, String methodName, String [ ] signature, double weight) changes the weight of the method by its name and its signature to the
specified weight.
5.2
Creation of Objects
Objects creation is commanded by creation probability functions, which define the probability of creating a new object according to the number of existing objects of the class
against that of reusing an already created object. If this probability is low, Jartege is more
likely to reuse an already created object than to construct a new one. This allows the user
either to create a predefined number of instances for a given class, or on the opposite, to
create numerous instances for a class.
In the example of bank accounts, it is not very interesting to create many accounts.
It is possible to test the class Account more efficiently for example by creating a unique
account and by applying numerous method calls to it.
The function changeCreationProbability(String className, CreationProbability creationProbabilityFunction) changes the creation probability function associated with the specified
class to the the specified creation probability function.
The interface CreationProbability contains a unique method
double theFunction(int nbCreatedObjects)
which must satisfy the condition
theFunction(0) = 1;
theFunction(n) ∈ [0, 1], ∀n ≥ 1.
The class ThresholdProbability allows one to define threshold probability functions whose
value is 1 under some threshold s and 0 above.
theFunction(n) = 1, if n < s;
theFunction(n) = 0, otherwise.
A threshold probability function with threshold s allows one to define at most s instances
of a given class. We can for instance forbid the creation of more than one instance of
Account by adding the following statement in the test generator:
t.changeCreationProbability ("Account", new ThresholdProbability (1));
11
5.3
Parameter Generation of Primitive Types
When a method has a strong precondition, the probability that Jartege, without any further indication, will generate a call to this method which does not violate this precondition
is low. For primitive types, Jartege provides the possibility to define generators for some
parameters of a given method.
For example, the precondition of the debit operation requires the parameter amount to
be in range
[0, getBalance ( ) − getMin ( )].
Let us suppose the range is small, in other words that the balance is closed to the minimum
balance. If Jartege chooses an amount to be debited entirely randomly, this amount is not
likely to satisfy the method precondition.
Jartege provides a way of generating parameter values of primitive types for operations.
For this, we define a class JRT Account as follows.
import jartege.RandomValue;
public class JRT Account {
private Account theAccount; // The current account
/* Constructor. */
public JRT Account (Account theAccount) { this.theAccount = theAccount; }
/** Generator for the first parameter of operation debit (int). */
public int JRT debit int 1 ( ) {
return RandomValue.intValue (0,
theAccount.getBalance ( ) - theAccount.getMin ( ));
}
}
The class JRT Account must contain a private field of type Account which will contain
the current object on which an operation of class Account is applied. A constructor allows
Jartege to initialize this private field. The class also contains one parameter generation
method for each parameter for which we specify the generation of values. In the example,
to specify the generation of the first parameter of operation debit (int amount), we define
the method int JRT debit int 1 ( ). We use the signature of the operation in the name of
the method to allow overloading. The method RandomValue.intValue (int min, int max)
chooses a random integer in range [min, max].
5.4
Fixtures
If we want to generate several test cases which operate on a particular set of objects, we
can write a test fixture, in a similar way to JUnit. A test fixture is a class which contains:
• attributes corresponding to the objects a test operates on;
• an optional setUp method which defines the preamble of a test case (which typically
constructs these objects);
• an optional tearDown method which defines the postamble of a test case.
12
6
Applying Jartege to the Case Study
The 100 test cases generated by Jartege, showing 71 failures, revealed three different errors:
one error caused by a credit operation, and two errors caused by a cancel operation. We
extracted the shorter sequence of calls which resulted in each failure and obtained the
following results. We also changed the parameter values and added some comments for
more readability.
Error 1. The credit operation can produce a balance inferior to the previous balance
because of an integer overflow.
public void test1 ( ) {
Account ob1 = new Account (250000000, 0);
ob1.credit (2000000000); // Produces a negative balance,
}
// below the minimum balance.
Error 2. The cancel operation can produce an incorrect result if it is preceded by a
setMin operation which changes the minimum balance of the account to a value which is
superior to the balance before cancellation.
public void test11 ( ) {
Account ob1 = new Account (-50, -100);
ob1.credit (100);
ob1.setMin (0);
ob1.cancel ( ); // Restores the balance to a value
}
// inferior to the minimum balance.
Error 3. The third error detected is a combination of an overflow on a debit operation
(similar to Error 1, which comes from an overflow on a credit operation) and of the second
error.
public void test13 ( ) {
Account ob1 = new Account (-1500000000, -2000000000);
ob1.debit (800000000); // Produces a positive balance.
ob1.setMin (0);
ob1.cancel ( ); // Restores the balance to a value
}
// inferior to the minimum balance.
We have the feeling that the three errors detected with test cases generated by Jartege
are not totally obvious, and could have easily been forgotten in a manually developed test
suite. Errors 2 and 3 in particular require three method calls to be executed in a specific
order and with particular parameter values.
It must be noted that the case study was originally written to show the use of JML to
undergraduate students, without us being aware of the faults.
7
Comparison with Related Work
Our work has been widely inspired by the JML-JUnit approach [CL02b]. The JML-JUnit
tool generates test cases for a method which consist of a combination of calls of this method
13
with various parameter values. The tester must supply the object invoking the method
and the parameter values. With this approach, interesting values could easily be forgotten
by the tester. Moreover, as a test case only consists of one method call, it is not possible
to detect errors which result of several calls of different methods. At last, the JML-JUnit
approach compels the user to construct the test data, which may require the call of several
constructors. Our approach thus has the advantage of being more automatic, and of being
able to detect more potential errors.
Korat [BKM02] is a tool also based on the JML-JUnit approach, which allows exhaustive testing of a method for all objects of a bounded size. The tools automatically
construct all non isomorphic test cases and execute the method on each test case. Korat
therefore has the advantage over JML-JUnit of being able to construct the objects which
invoke the method under test. However, test cases constructed by Korat only consist of
one object construction and one method invocation on this object.
Tobias [Led02, MLBdB02] is a combinatorial testing tool for automatic generation of
test cases derived from a “test pattern”, which abstractly describes a test case. Tobias was
first designed to produce test objectives for the TGV tool [JM99] and was then adapted
to produce test cases for Java programs specified in JML and for programs specified in
VDM. The main problem of Tobias is the combinatorial explosion which happens if one
tries to generate test cases which consist of more than a couple of method calls. Jartege
was designed to allow the generation of long test sequences without facing the problem of
combinatorial explosion.
8
Discussion and Future Work
Jartege is only in its infancy and a lot of work remains to be done.
Primitive values generation for methods parameters is currently done manually by
writing primitive parameters generating methods. Code for these methods could be automatically constructed from the JML precondition of the method. This could consist in
extracting range constraints from the method precondition and automatically produce a
method which could generate meaningful values for the primitive parameters.
Jartege easily constructs test cases which consist of hundreds of constructors and methods calls. It would be useful to develop a tool for extracting a minimum sequence of calls
which results in a given failure.
We developed Jartege in Java, and we specified some of its classes with JML. We
applied Jartege to these classes to produce test cases, which allowed us to experiment
our tool on a larger case study and to detect a few errors. We found much easier to
produce tests with Jartege than to write unit tests with JUnit or JML-JUnit. We intend
to continue our work of specifying Jartege in JML and testing its classes with itself. We
hope that this real case study will help us to evaluate the effectiveness and scalability of
the approach.
A comparison of our work with other testing strategies still remains to be done. We can
expect systematic methods, using for instance boundary testing such as BZTT [LPU02],
to be able to produce more interesting test cases that ours. Our goal is certainly not to
pretend that tests produced randomly can replace tests produced by more sophisticated
methods, nor a carefully designed test set written by an experienced tester.
Our first goal in developing Jartege was to help the developer to write unit tests for
unstable Java classes, thus for “debug unit testing”. It would also be interesting to use
Jartege to evaluate the reliability of a stable component before it is released. Jartege
14
provides some features to define an operational profile of a component, which should allow
statistical testing. However, the definition of a correct operational profile, especially in
the context of object-oriented programming, is a difficult task. Moreover, the relation
between test sets generated by Jartege and the reliability of a component requires more
theoretical work, one difficult point being to take into account the state of the component.
9
Conclusion
This report presents Jartege, a tool for random generation of unit tests for Java classes
specified in JML. The aim of the tool is to easily produce numerous test cases, in order to
detect a substantial number of errors without too much effort. It is designed to produce
automated tests, which can in part replace tests written by the developer using for instance JUnit. We think that the automatic generation of such unit tests should facilitate
continuous testing as well as code refactoring in the context of extreme programming.
The JML specifications are used on the one hand to eliminate irrelevant test cases,
and on the other hand as a test oracle. We think that the additional cost of specification
writing should be compensated by the automatic oracle provided by the JML compiler, as
long as we wish to intensively test the classes. Moreover, this approach has the advantage
of supporting the debugging of a specification along with the corresponding program.
This allows the developer to increase his confidence in the specification and to use this
specification in other tools.
Most test generation methods are deterministic, while our approach is statistical. We
do not wish to oppose both approaches, thinking that they both have their advantages
and drawbacks, and that a combination of both could be fruitful.
At last, we found JML to be good language to start learning formal methods. Its
Java-based syntax makes it easy to learn for Java programmers. As JML specifications
are included in Java source code as comments, it is easy to develop and debug a Java
program along with its specification. Moreover, automatic test oracles as well as automatic
generation of test cases are good reasons of using specification languages such as JML.
References
[ABM97]
Lionel Van Aertryck, Marc Benveniste, and Daniel Le Métayer. Casting: a formally based software test generation method. In Proceedings of
the First IEEE Internatinal Conference on Formal Engineering Methods —
ICFEM’97, Hiroshima, Japan, pages 101–111, November 1997.
[BCC+ 03]
Lilian Burdy, Yoonsik Cheon, David R. Cok, Michael Ernst, Joe Kiniry,
Gary T. Leavens, K. Rustan, M. Leino, and Erik Poll. An overview of JML
tools and applications. Technical Report NIII-R0309, Department of Computer Science, University of Nijmegen, March 2003.
[Bec99]
Kent Beck. Embracing change with extreme programming. IEEE Computer,
32(10):70–77, October 1999.
[Bec00]
Kent Beck. Extreme Programming Explained. Addison Wesley, 2000.
[BG98]
Kent Beck and Erich Gamma. Test infected: Programmers love writing tests.
Java Reports, 3(7):51–56, 1998.
15
[BKM02]
Chandrasekhar Boyapati, Safraz Khurshid, and Darko Marinov. Korat: Automated testing based on Java predicates. In Proceedings of the International
Symposium on Software Testing and Analysis — ISSTA’02, Rome, pages
123–133, July 2002.
[CL02a]
Yoonsik Cheon and Gary T. Leavens. A runtime assertion checker for the Java
Modeling Language (JML). In Hamid R. Arabnia and Youngsong Mun (eds.),
International Conference on Software Engineering Research and Practice —
SERP’02, Las Vegas, Nevada, pages 322–328. CSREA Press, 2002.
[CL02b]
Yoonsik Cheon and Gary T. Leavens. A simple and practical approach to unit
testing: The JML and JUnit way. In Boris Magnusson (ed.), 16th European
Conference on Object-Oriented Programming — ECOOP’02, Malaga, Spain,
number 2374 in Lecture Notes in Computer Science, pages 231–255. SpringerVerlag, June 2002.
[dBORZ99] Lydie du Bousquet, Farid Ouabdesselam, Jean-Luc Richier, and Nicolas
Zuanon. Lutess: a specification-driven testing environment for synchronous
software. In International Conference on Software Engineering — ICSE’99,
Los Angeles, USA. ACM Press, May 1999.
[dBZ99]
Lydie du Bousquet and Nicolas Zuanon. An overview of Lutess: a
specification-based tool for testing synchronous software. In 14th IEEE International Conference on Automated Software Engineering — ASE’99, pages
208–215, October 1999.
[DF93]
Jeremy Dick and Alain Faivre. Automating the generation and sequencing
of test cases from model-based specifications. In Proceedings of FME’93,
number 670 in LNCS, pages 268–284. Springer-Verlag, April 1993.
[DN84]
Joe W. Duran and Simeon C. Ntafos. An evaluation of random testing. IEEE
Transactions on Software Engineering, 10(4):438–444, 1984.
[FHLS98]
Phyllis G. Frankl, Richard G. Hamlet, Bev LittleWood, and Lorenzo Strigini.
Evaluating testing methods by delivered reliability. IEEE Transactions on
Software Engineering, 24(8):586–601, August 1998.
[Gau95]
Marie-Claude Gaudel. Testing can be formal too. In Proceedings of TAPSOFT’95, Aarhus, Denmark, number 915 in LNCS, pages 82–96. SpringerVerlag, May 1995.
[GMH81]
John Gannon, Paul McMullin, and Richard Hamlet. Data-abstraction implementation, specification, and testing. ACM Transactions on Programming
Languages and Systems, 3(3):211–233, July 1981.
[Ham94]
Richard Hamlet. Random testing. In J. Marciniak, editor, Encyclopedia of
Software Engineering, pages 970–978. Wiley, 1994.
[HT90]
Dick Hamlet and Ross Taylor. Partition testing does not inspire confidence.
IEEE Transactions on Software Engineering, 16(12), December 1990.
16
[JM99]
Thierry Jéron and Pierre Morel. Test generation derived from modelchecking. In Proceedings of the 11th International Conference on Computer
Aided Verification — CAV’99, Trento, Italy, number 1633 in LNCS, pages
108–121. Springer-Verlag, July 1999.
[JML]
The Java Modeling Language (JML) Home Page,
http://www.cs.iastate.edu/˜leavens/JML.
[JUn]
The JUnit Home Page, http://www.junit.org.
[LBR03]
Gary T. Leavens, Albert L. Baker, and Clyde Ruby. Preliminary Design of
JML: A Behavioral Interface Specification Language for Java. Department
of Computer Science, Iowa State University, 1998–2003.
[Led02]
Yves Ledru. The TOBIAS test generator and its adaptation to some ASE
challenges (position paper). In Workshop on the State of the Art in Automated Software Engineering, ICS Technical Report UCI-ICS-02-17, University of California, Irvine, USA, 2002.
[LPC+ 03]
Gary T. Leavens, Erik Poll, Curtis Clifton, Yoonsik Cheon, and Clyde Ruby.
JML Reference Manual. (Draft), April 2003.
[LPU02]
Bruno Legeard, Fabien Peureux, and Mark Utting. Automated boundary
testing from Z and B. In Proceedings of FME’02, Formal Methods Europe, Copenhaguen, Denmark, number 2391 in LNCS, pages 21–40. SpringerVerlag, July 2002.
[LTFWD00] Yvan Labiche, Pascale Thévenod-Fosse, Hélène Waeselynck, and M.-H. Durand. Testing levels for object-oriented software. In Proceedings of the 22nd
International Conference on Software Engineering — ICSE’00, Limerick,
Ireland, pages 136–145. ACM, June 2000.
[Mey88]
Bertrand Meyer. Object-Oriented Software Construction. Prentice Hall, 1988.
[Mey92]
Bertrand Meyer. Applying design by contract. IEEE Computer, 25(10):40–
51, October 1992.
[MLBdB02] Olivier Maury, Yves Ledru, Pierre Bontron, and Lydie du Bousquet. Using
TOBIAS for the automatic generation of VDM test cases. In Third VDM
Workshop (at FME’02), Copenhaguen, Denmark, July 2002.
[Mye94]
G. J. Myers. The Art of Software Testing. John Wiley and Sons, New York,
1994.
[Nta01]
Simeon C. Ntafos. On comparisons of random, partition, and proportional
partition testing. IEEE Transactions on Software Engineering, 27(10):949–
960, July 2001.
[Par96]
Ioannis Parissis. Test de logiciels synchrones spécifiés en Lustre. PhD thesis,
Grenoble, France, Septembre 1996.
[Ros92]
David S. Rosenblum. Towards a method of programming with assertions. In
International Conference on Software Engineering — ICSE’92. IEEE Computer Society Press, 1992.
17
[WJ91]
Elaine J. Weyuker and Bingchiang Jeng. Analyzing partition testing strategies. IEEE Transactions on Software Engineering, 17(7):703–711, July 1991.
18
| 2cs.AI
|
1
Runlength-Limited Sequences and
Shift-Correcting Codes
arXiv:1803.06117v1 [cs.IT] 16 Mar 2018
Mladen Kovačević
Abstract—This work is motivated by the problem of error
correction in bit-shift channels with the so-called (d, k) input
constraints (where successive 1’s are required to be separated
by at least d and at most k zeros, 0 ≤ d < k ≤ ∞). Bounds
on the size of optimal (d, k)-constrained codes correcting a
fixed number of bit-shifts are derived. The upper bound is
obtained by a packing argument, while the lower bound follows
from a construction based on a family of integer lattices.
Several properties of (d, k)-constrained sequences that may be
of independent interest are established as well; in particular,
the capacity of the noiseless channel with (d, k)-constrained
constant-weight inputs is characterized. The results are relevant
for magnetic and optical storage systems, reader-to-tag RFID
channels, and other communication models where bit-shift errors
are dominant and where (d, k)-constrained sequences are used
for modulation.
Index Terms—Bit-shift channel, peak shift, timing errors,
runlength-limited code, integer compositions, Manhattan metric,
asymmetric distance, magnetic recording, inductive coupling.
I. I NTRODUCTION
HIFT AND TIMING errors are a dominant type of
noise in several communication and information storage
scenarios, examples of which include magnetic and optical
recording devices [11], [30], inductively coupled channels
such as the reader-to-tag RFID channel [28], parallel asynchronous communications [7], various types of timing channels [2], [17], [25], etc. Designing codes that are able to
correct these types of errors and studying their fundamental
limits is therefore important for all these applications, in
addition to being an interesting theoretical challenge. The
problem is further complicated by the fact that, in many of
the mentioned applications, particularly magnetic, optical, and
emerging DNA storage systems, the codewords are required to
satisfy modulation constraints that are introduced to alleviate
inter-symbol interference and other impairing effects [12],
[13], [14], [31], [32]. Perhaps the best-known example of such
constraints are runlength constraints where a minimum and a
maximum number of zero symbols between two consecutive
non-zero symbols is specified. Motivated by these communication settings, we study in the present paper the errorcorrection problem for channels with shift and timing errors,
and with runlength input constraints. The precise channel
model we have in mind and our contributions are described in
the following two subsections.
S
Date: March 16, 2018.
The author is with the Department of Electrical & Computer Engineering, National University of Singapore, Singapore 117583 (emails:
[email protected], [email protected]).
This work was supported by the Singapore Ministry of Education (MoE)
Tier 2 grant “Network Communication with Synchronization Errors: Fundamental Limits and Codes” (Grant number R-263-000-B61-112).
A. The Channel Model
Fix d, k ∈ Z ∪ {∞} with 0 ≤ d < k ≤ ∞. We assume
that the channel inputs are binary strings of length n that are
composed of blocks from the set {0d 1, . . . , 0k 1}, where 0j is
a string of j zeros. In other words, the set of inputs is
n
∗
Sd,k (n) := 0, 1 ∩ 0d 1, . . . , 0k 1 .
(1)
S
∞
(Here A∗ is the usual notation for the set i=0 Ai .)P
For a string
n
x = x1 · · · xn ∈ {0, 1}n, denote by wt(x) =
i=1 xi its
Hamming weight. It will be convenient to introduce a special
notation for the set of all channel inputs of a given weight W :
n
o
Sd,k (n, W ) := x ∈ Sd,k (n) : wt(x) = W .
(2)
In other words, Sd,k (n, W ) contains all those input strings
that are composed of exactly W blocks from the set
{0d 1, . . . , 0k 1}.
The definition (1) ensures that (a) consecutive 1’s in any
input string are separated by at least d and at most k zeros,
and (b) every input string starts with a string of zeros of
length j, d ≤ j ≤ k, and ends with a 1. The property (a)
is the defining property of the so-called (d, k)-constrained
sequences. However, the boundary conditions (b) are not
universally adopted in the literature [12]. We shall nevertheless
find it convenient to work under definition (1), as in, e.g., [22];
it will be evident later on that different boundary conditions
would not affect the analysis in any significant way.
For a given input string x ∈ Sd,k (n, W ), the channel
outputs another binary string y of length n and weight W .
We think of 1’s in x as being “shifted” in the channel, each
for a number of positions to the left or to the right of its
original position, thus producing y at the output.
PW We say that
t bit-shifts have occurred in the channel if i=1 |x̄i − ȳi | = t,
where x̄i (resp. ȳi ) is the position of the i’th 1 in x (resp. y),
1 ≤ i ≤ W.
Example 1. Consider an input string x ∈ S2,4 (15, 4) and the
corresponding output string y:
x = 001000010010001
y = 0 1 0 0 0 1 0 0 0 0 0 1 0 0 1.
(3)
We think of y as obtained from x by shifting the first 1 in
x one position to the left, the second 1 two positions to the
left, and the third 1 one position to the right. We then say that
the total number of bit-shifts that occurred in the channel is
t = 1 + 2 + 1 = 4.
N
We emphasize once more that the output string y is always
assumed to be of the same length and the same weight as the
corresponding input string x. Note, however, that y may in
general violate the (d, k)-constraints.
2
B. Main Results
Our main object of study in the present paper are errorcorrecting codes for the above-described channel model. In
particular, we shall derive explicit bounds on the cardinality of
optimal (d, k)-constrained shift-correcting codes, with a focus
on their asymptotic behavior in the regime of growing blocklength (n → ∞). Despite a sizable body of literature on the
bit-shift channel and related models1 , such bounds, to the best
of our knowledge, have not been obtained before, even for a
single bit-shift.
We consider two scenarios. The first one, analyzed in
Section III, corresponds to the situation where shifts to the
right (right-shifts) and shifts to the left (left-shifts) are treated
independently, and separate requirements on their correctability are imposed. More precisely, codes are in this case required
to have the capability of correcting t→ right-shifts and t← leftshifts, for fixed (but arbitrary) t→ and t← . The second scenario,
analyzed in Section IV, corresponds to the situation where
right-shifts and left-shifts are treated in a symmetric way, i.e.,
where codes are required to have the capability of correcting
t shifts, regardless of the direction of each individual shift.
In Section II we also demonstrate several properties of the
code space Sd,k (n). In particular, we characterize the capacity
of the noiseless channel with (d, k)-constrained constantweight inputs. These results are needed to prove the bounds on
the cardinality of optimal shift-correcting codes in Sections III
and IV, but are also of possible interest in other applications
of (d, k)-constrained sequences and in other channel models.
C. Notation
Z denotes the integers and Z+ the non-negative integers.
log is the base-2
P logarithm.
If we write i si , it is understood that i ranges over all
possible values, which will be clear from the context.
Given two non-negative real sequences (an ) and (bn ), we
adopt the following asymptotic notation:
a
• an ∼ bn means limn→∞ b n = 1;
n
a
• an & bn means lim inf n→∞ b n ≥ 1;
n
• an ∼
˙ bn means log an ∼ log bn (i.e., the exponents of an
and bn have the same asymptotic behavior);
a
• an = O(bn ) means lim supn→∞ b n < ∞;
n
an
• an = o(bn ) means limn→∞ b = 0.
n
For x ∈ Sd,k (n, W ), we denote by x̄ = (x̄1 , . . . , x̄W ) the
vector indicating the positions of 1’s in the string x, meaning
that x̄i is the position of the i’th 1 in x. For example, for
x = 0100101 ∈ S1,3 (7, 3) we have x̄ = (2, 5, 7). The
mapping x 7→ x̄ is clearly injective. With this correspondence
in mind, we define
n
S̄d,k (n, W ) := x̄ ∈ ZW : 0 < x̄1 < · · · < x̄W = n,
o
d + 1 ≤ x̄i − x̄i−1 ≤ k + 1 for i = 1, . . . , W , (4)
where x̄0 = 0 by convention. Hence, S̄d,k (n, W ) ⊂ ZW is
just a different representation of the set of all channel inputs
of
S length n and weight W , namely Sd,k (n, W ), and S̄d,k (n) :=
W S̄d,k (n, W ) is the corresponding representation of the set
of all channel inputs of length n, namely Sd,k (n).
The space S̄d,k (n), or S̄d,k (n, W ) in the constant-weight
case, seems to be more convenient for describing constructions
of codes for the bit-shift channel.
B. Combinatorial Description and Asymptotics
Denote
= |S¯d,k (n)|,
Sd,k (n, W ) := |Sd,k (n, W )| = |S¯d,k (n, W )|.
Sd,k (n)
:= |Sd,k (n)|
(5a)
(5b)
We see from the definition of the code space (1) that Sd,k (n)
is in fact the number of compositions2 of the number n with
parts restricted to the set {d + 1, . . . , k + 1}. This number can
be expressed in the recursive form
Sd,k (n) =
k+1
X
Sd,k (n − i)
(6)
i=d+1
with initial conditions Sd,k (0) = 1 and Sd,k (n) = 0 for n < 0.
It follows that Sd,k (n) ∼ c · 2−n log ρ [35], where ρ is the
Pk+1
unique positive solution to i=d+1 xi = 1 and the constant c
can be obtained from (6).
Similarly, Sd,k (n, W ) is the number of compositions of the
number n with exactly W parts, each part belonging to the
set {d + 1, . . . , k + 1}. Again, this quantity can be expressed
in the recursive form [10]
Sd,k (n, W ) =
k+1
X
Sd,k (n − i, W − 1)
(7)
i=d+1
II. T HE C ODE S PACE
In this section we demonstrate some properties of the set
Sd,k (n) that will be used in the derivations to follow, but are
also of potential interest in other applications. We also describe
another representation of this space that is of course equivalent
to the one given in (1)–(2), but that may be preferable to it,
depending on the problem being analyzed.
A. Equivalent Representation
Another representation of the set of all channel inputs that
is useful for analyzing bit-shift errors is based on specifying
the positions of 1’s in the input string.
1 See,
e.g., [1], [8], [11], [16], [23], [24], [28], [30], [36].
with initial conditions Sd,k (n, 0) = 1{n = 0} and
Sd,k (n, W ) = 0 for n < 0. In the following lemma we
characterize the asymptotic behavior
1 of1 Sd,k (n, W ) as n → ∞
, d+1 . (For simplicity, we
and W = wn, for fixed w ∈ k+1
write wn instead of, e.g., ⌊wn⌋, ignoring the fact that the
former is not necessarily an integer.)
1
1
, d+1
define the function
Lemma 1. For w ∈ k+1
σd,k (w) := w log
k+1
X
1
i− w
ρw
,
(8)
i=d+1
2 A composition of an integer n is a tuple of positive integers (called parts)
summing to n [34]. For a study of compositions with parts restricted to a
subset of Z+ see, e.g., [10].
3
where
positive real root of the polynomial
Pk+1 ρw is the unique
1
1
i
let
σd,k k+1
= σd,k d+1
= 0.
i=d+1 (wi−1)x , and
1 also
1
For any fixed w ∈ k+1 , d+1
, as n → ∞ we have
Sd,k (n, wn) ∼
˙ 2
nσd,k (w)
.
(9)
The exponent σd,k (w) is a strictly concave function of w.
It attains its maximal value at
!−1
k+1
X
w∗ =
iρi
(10)
i=d+1
and this value is σd,k (w∗ ) = − log ρ, where ρ is the unique
Pk+1
positive solution to i=d+1 xi = 1.
Proof: The asymptotics of Sd,k (n, wn) as n → ∞
is most easily determined using the machinery of analytic
combinatorics [27]. The generating function of the bivariate
sequence (Sd,k (n, W ))n,W is obtained from (7) as:
Fd,k (x, y) :=
∞ X
∞
X
Sd,k (n, W )xn y W
n=0 W =0
1
,
=
1 − y(xd+1 + · · · + xk+1 )
(11)
wherefrom one verifies that this sequence is a Riordan array3
and satisfies
of [27, Thm 12.2.2]. Denoting
P the conditions
i
v(x) = k+1
x
(the
polynomial
appearing in the denomi=d+1
inator of the generating function (11)), we conclude from
[27, Thm 12.2.2] that
!wn
k+1
X i− 1
wn −n
w
, (12)
Sd,k (n, wn) ∼
˙ v(ρw ) ρw =
ρw
i=d+1
x
∂
v(x)
= w1 . This
where ρw is the unique positive solution to ∂x
v(x)
proves (9).
The second part of the claim is obtained by carefully
analyzing the involved functions. The root ρw is a function
weight w and is implicitly defined by
Pk+1of the relative
i
(wi
−
1)ρ
=
0, ρw > 0. Differentiating this equation
w
i=d+1
∂
∂
ρw < 0. Also, we have ∂w
σd,k (w) =
w.r.t. w we find that ∂w
∂
Pk+1
2
∂
i
∂w ρw
log i=d+1 ρw and (∂w)2 σd,k (w) = log e · wρw < 0, implying that σd,k (w) is concave. The weight w∗ that maximizes
∂
σd,k (w) = 0,
the exponent σd,k (w) is the one for which ∂w
Pk+1
i
i.e., v(ρw ) = i=d+1 ρw = 1.
The quantity σd,k (w) defined in (8) is the maximal information rate (i.e., the capacity) that can be achieved in the
noiseless channel with (d, k)-constrained inputs of relative
weight w. This is a refinement of the well-known result
that states that the capacity of the noiseless channel with
(d, k)-constrained inputs (but with no weight constraints) is
limn→∞ n1 log Sd,k (n) = − log ρ [35]. Namely, the latter
statement can be recovered from Lemma 1 by noting that
∗
Sd,k (n) ∼
˙ Sd,k (n, w∗ n) ∼
˙ 2nσd,k (w ) = 2−n log ρ . The following lemma is a strengthening of this result; it asserts that the
input strings of weight (approximately) equal to w∗ n account
3 Bivariate
sequences with generating functions of the form
called (generalized) Riordan arrays; see [27, Sec. 12.2].
φ(x)
1−yv(x)
are
for most of the space Sd,k (n). Informally, we say that the
“typical” input strings have relative weight w∗ .
Lemma 2. There exists a sublinear function f (n) = o(n)
such that, as n → ∞,
w ∗ n+f (n)
Sd,k (n) ∼
X
Sd,k (n, W ).
(13)
W =w ∗ n−f (n)
Proof: It follows from Lemma 1 (in particular, the fact
that σd,k (w) is uniquely maximized at w∗ ) that the contribution of the termsP
W ≤ (w∗ − ǫ)n and W ≥ (w∗ + ǫ)n in the
sum Sd,k (n) = W Sd,k (n, W ) is asymptotically negligible
for any fixed ǫ > 0.
We shall also need in the sequel an estimate of the number
of blocks 0j 1, for fixed j ∈ {d, . . . , k}, in typical input
strings. For the purpose of formally stating this result, denote
(j)
by Sd,k (n, W, ℓ) the number of input strings consisting of
W blocks from {0d1, . . . , 0k 1}, exactly ℓ of which are 0j 1.
(j)
Equivalently, Sd,k (n, W, ℓ) is the number of compositions
of the number n with W parts, the parts taking values in
{d + 1, . . . , k + 1}, and exactly ℓ of them having value j + 1.
PW (j)
We then have Sd,k (n, W ) =
ℓ=0 Sd,k (n, W, ℓ), for every
j ∈ {d, . . . , k}.
Lemma 3. Fix j ∈ {d, . . . , k} and denote λ∗j = ρj+1 w∗ =
−1
Pk+1
iρi
, where ρ is the unique positive solution
ρj+1
Pk+1 i=d+1
to i=d+1 xi = 1. Then, for every j ∈ {d, . . . , k}, as n → ∞
we have
(j)
(14)
Sd,k (n) ∼
˙ Sd,k n, w∗ n, λ∗j n .
Moreover, there exists a sublinear function f (n) = o(n) such
that, for every j ∈ {d, . . . , k}, as n → ∞ we have
w ∗ n+f (n)
λ∗
j n+f (n)
X
X
Sd,k (n) ∼
W =w ∗ n−f (n)
(j)
Sd,k (n, W, ℓ).
(15)
ℓ=λ∗
j n−f (n)
Proof: Let us take j = d and denote λ := λd for
simplicity; the proof for general j is analogous. The following
relation is valid:
W
(d)
Sd,k (n, W, ℓ) =
(16)
Sd+1,k n − ℓ(d + 1), W − ℓ
ℓ
(the ℓ partsof value d + 1 can be distributed among the W
parts in Wℓ ways, and the remaining W − ℓ parts, which are
all from {d + 2, . . . , k + 1}, form a composition of the number
n − ℓ(d + 1)), and therefore
X X W
Sd,k (n) =
Sd+1,k n − ℓ(d + 1), W − ℓ . (17)
ℓ
W
ℓ
Since the sum in (17) has polynomially many terms, we know
that it grows exponentially with the same exponent as one of
1
1
, d+1
its summands W = wn, ℓ = λn, for some w ∈ k+1
4
and λ ∈ (0, w). By using Stirling’s approximation and (9),
this exponent can be expressed in the form
#
"
wn
1
log
Sd+1,k n − λn(d + 1), (w − λ)n
n
λn
(18a)
k+1
λ
X
i− 1−λ(d+1)
w−λ
,
ρw,λ
+ (w − λ) log
∼ wH
w
i=d+2
where H(·) is the binary entropy function and ρw,λ > 0 is a
function implicitly defined by
k+1
X
1 − λ(d + 1)
i−
ρiw,λ = 0.
(18b)
w−λ
i=d+2
By calculating the derivatives of the exponent (the function
on the right-hand side of (18a)) with respect to w and λ, one
finds that it is uniquely maximized for λ∗ = ρd+1 w∗ , w∗ =
Pk+1
P
i −1
i
, where k+1
i=d+1 iρ
i=d+1 ρ = 1. This implies that
(d)
Sd,k (n) ∼
˙ Sd,k n, w∗ n, λ∗ n
(19)
and proves (14). It also implies that, for every ǫ > 0, the part
of the sum in (17) where W ≤ (w∗ − ǫ)n or W ≥ (w∗ + ǫ)n
or ℓ ≤ (λ∗ − ǫ)n or ℓ ≥ (λ∗ + ǫ)n is asymptotically negligible
compared to the remaining part (exponentially smaller in fact).
This proves (15).
In words, input strings of length n typically contain ∼ λ∗j n
4
blocks 0j 1, i.e., runs of zeros
P
Pk of ∗length ∗j. Notice that, since
k+1
i
i=d+1 ρ = 1, we have
j=d λj = w , which is expected
because w∗ n is the total (typical) number of blocks in the
input strings of length n.
In the derivations of the asymptotic bounds in the following
two sections, we shall restrict our analysis to input strings
of weight ∼ w∗ n having ∼ λ∗j n runs of zeros of length j.
Lemmas 2 and 3 will enable us to show that this restriction
incurs no loss in generality.
III. C ODES C ORRECTING A SYMMETRIC S HIFTS
We now turn to the analysis of the bit-shift channel with
(d, k) input constraints. The scenario we consider in this
section is the channel in which only shifts to the right are
possible. We are interested in codes enabling the receiver to
reconstruct the transmitted string whenever the total shift of
its 1’s does not exceed a specified threshold. In particular,
we derive bounds on the cardinality of optimal codes for this
setting. We shall not make an attempt to optimize the bounds
for every block-length n; rather, the focus is put on their
asymptotic behavior as n → ∞.
A. Geometric Characterization
Suppose that x̄ ∈ S̄d,k (n, W ) is the transmitted vector and
z the corresponding received vector (see Section II-A). If the
i’th 1 in x is shifted to the right by ki positions in the channel,
then zi = x̄i + ki . Therefore, the bit-shift channel can be seen
4 A run of zeros is a block of contiguous zeros of maximal length, i.e., such
that it is delimited on both sides either by a 1, or by the end of the string.
as an additive noise channel with input alphabet
PW Z+ . If the 1’s
in x are shifted by t positions in total, then i=1 (zi − x̄i ) = t.
We say that a code C¯ ⊆ S̄d,k (n) corrects t right-shifts if no
two different codewords x̄, ȳ ∈ C¯ can produce the same output
after being impaired with arbitrary patterns of ≤ t right-shifts.
¯ x̄ 6= ȳ, wt(x) = wt(y) = W ,
In symbols, for every x̄, ȳ ∈ C,
PW
and all noise vectors f , g ∈ ZW with fi , gi ≥ 0, i=1 fi ≤ t,
PW
i=1 gi ≤ t, we have x̄ + f 6= ȳ + g. Such a code C is said
to be optimal if there is no other code C¯′ ⊆ S̄d,k (n) correcting
¯
t right-shifts and such that |C¯′ | > |C|.
Remark 4 (Shifts vs. Right-Shifts). It is straightforward to
show that a code C¯ can correct t right-shifts if and only if it can
correct t→ right-shifts and t← left-shifts, for any t→ , t← ≥ 0
with t→ +t← = t. In other words, C¯ can correct t right-shifts if
¯ x̄ 6= ȳ, wt(x) = wt(y) = W ,
and only if for every x̄, ȳ ∈ C,
P
and
all
noise
vectors
f
,
g
∈
ZW suchP
that i:fi >0 fi ≤ t→ ,
P
P
i:gi <0 |gi | ≤ t← , we
i:gi >0 gi ≤ t→ ,
i:fi <0 |fi | ≤ t← ,
have x̄ + f 6= ȳ + g.
Therefore, the results of this section apply also to channels
where both left- and right-shifts are allowed. The difference
with respect to the model that we shall analyze in Section IV is
that these two types of errors are here treated independently of
each other, i.e., separate requirements on their “correctability”
are imposed (t← and t→ ).
N
Consider the following metric on S̄d,k (n, W ):
W
W
X
X
(ȳi − x̄i ) .
(x̄i − ȳi ),
da (x̄, ȳ) := max
i=1
i=1
x̄i >ȳi
(20)
x̄i <ȳi
This distance is of importance in the theory of codes for
asymmetric channels [15] (hence the subscript ‘a’). For vectors
of different dimensions (corresponding to strings of different
weights), x̄ ∈ S̄d,k (n, W1 ), ȳ ∈ S̄d,k (n, W2 ), W1 6= W2 ,
we define da (x̄, ȳ) = ∞. The minimum distance of a code
¯
C¯ ⊆ S̄d,k (n) with respect to the metric da is denoted da (C).
The following proposition gives a metric characterization of
right-shift-correcting codes.
Proposition 5. A code C¯ ⊆ S̄d,k (n) can correct t right-shifts
¯ > t.
if and only if da (C)
Proof. Suppose that da (x̄, ȳ) ≤ t for two distinct codewords
¯ Define f = max{ȳ− x̄, 0} and g = max{x̄− ȳ, 0},
x̄, ȳ ∈ C.
where the maximum is taken
PW coordinate-wise.
PW Then x̄ + f =
ȳ + g and fi , gi ≥ 0, i=1 fi ≤ t, i=1 gi ≤ t (the last
two inequalities together are equivalent to our assumption that
da (x̄, ȳ) ≤ t). This means that C¯ cannot correct t right-shifts.
The other direction is similar. If C¯ cannot correct t rightshifts, then there exist two distinct P
codewords x̄, P
ȳ and two
W
noise vectors f , g with fi , gi ≥ 0, W
i=1 fi ≤ t,
i=1 gi ≤
t, such
that
x̄
+
f
=
ȳ
+
g.
This
implies
that
d
(x̄,
ȳ) ≤
a
PW
PW
¯ ≤ t.
≤
t,
and
so
d
(
C)
g
f
,
max
a
i
i
i=1
i=1
Note that balls in the metric space S̄d,k (n, W ), da do not
have uniform sizes—the size of a ball of radius r depends
on its center. For that reason,
when studying the properties
of codes in S̄d,k (n, W ), da it is sometimes more convenient
5
ሺͳǡʹሻ
L, and represents the average number of lattice points (from
L) per one point of the ambient space (ZW ). The quantity of
interest to us is the present context is the maximum density
a lattice L ⊆ ZW can have when its minimum distance is
required to satisfy da (L) > t, namely
ሺͳǡ͵ሻ ሺʹǡ͵ሻ
ሺͳǡͶሻ ሺʹǡͶሻ ሺ͵ǡͶሻ
n
o
µa (W, t) := max µ(L) : L ⊆ ZW a lattice, da (L) > t .
(22)
ሺͳǡͷሻ ሺʹǡͷሻ ሺ͵ǡͷሻ ሺͶǡͷሻ
Lemma 6. For every fixed t ∈ Z+ , as W → ∞ we have
µa (W, t) & W −t .
ሺͳǡሻ ሺʹǡሻ ሺ͵ǡሻ ሺͶǡሻ ሺͷǡሻ
ሺͳǡሻ ሺʹǡሻ ሺ͵ǡሻ ሺͶǡሻ ሺͷǡሻ ሺǡሻ
ሺͳǡͻሻ
ሺʹǡͺሻ ሺ͵ǡͺሻ ሺͶǡͺሻ ሺͷǡͺሻ ሺǡͺሻ ሺǡͺሻ
ሺ͵ǡͻሻ ሺͶǡͻሻ ሺͷǡͻሻ ሺǡͻሻ ሺǡͻሻ ሺͺǡͻሻ
Fig. 1: The space S̄0,5 (9, 2) representing the set of all binary
strings of length n = 9 and weight W = 2 satisfying
(0, 5)-constraints, and a code correcting t = 2 right-shifts.
Codewords are depicted as black dots; gray regions illustrate
balls (under the metric da ) of radius ⌊t/2⌋ = 1 around the
codewords.
W
to consider the unrestricted metric space Z , da where this
ሺͳǡʹሻ
effect does not occur5 . For example, we have the following
expression for the cardinality of a ball of radius r in ZW , da
[21,
Lem.ሺʹǡ͵ሻ
1]:
ሺͳǡ͵ሻ
X W r r + W − i
.
(21)
Ba (W, r) =
i
i
W −i
i
ሺͳǡͶሻ ሺʹǡͶሻ ሺ͵ǡͶሻ
The cardinality of an arbitrary ball of radius r in
S̄d,k (n, W ), da is upper bounded by Ba (W, r).
ሺͳǡͷሻ ሺʹǡͷሻ ሺ͵ǡͷሻ ሺͶǡͷሻ
B. Construction and Bounds
ሺ͵ǡሻ
ሺͳǡሻ
Denoteሺʹǡሻ
by Md,k
(n; t) ሺͶǡሻ
(resp. Mሺͷǡሻ
d,k (n, W ; t)) the cardinality
→
Proof: It was shown in [21, Thm 7] that every sublattice
L ⊆ ZW with da (L) > t corresponds to a Sidon set6 of order
t and cardinality W + 1 in an Abelian group, and vice versa.
Consequently, the largest possible density of such a sublattice
1
can be expressed as µa (W, t) = φ(W,t)
, where φ(W, t) is the
cardinality of the smallest Abelian group containing a Sidon
set of order t and cardinality W + 1. The statement that
µa (W, t) & W −t then follows from the constructions of Sidon
sets by Singer [33] (t = 2) and Bose–Chowla [4] (arbitrary t)
which imply that φ(W, t) ≤ W t + o(W t ) as W → ∞.
Theorem 7. Let 0 ≤ d < k ≤ ∞. For every fixed t ∈ Z+ , as
n → ∞ we have
Sd,k (n)
Md,k (n; t) &
nt
→
Sd,k (n)
Md,k (n; t) .
nt
→
k+1
X
iρ
i
!t
iρ
i
!t
i=d+1
k+1
X
i=d+1
,
(23a)
⌈t/2⌉! ⌊t/2⌋!
t
t ,
1 − ρd+1 1 − ρk+1
(23b)
where ρ is the unique positive solution to
Pk+1
i=d+1
xi = 1.
For example, in the unconstrained case (d = 0, k = ∞) we
have S0,∞ (n) = 2n , ρ = 1/2, and the bounds (23) reduce to:
→
2n t
2n
2 . M0,∞ (n; t) . t 4t ⌈t/2⌉! ⌊t/2⌋!.
t
n
n
(24)
→
of an optimal code in Sd,k (n) (resp. Sd,k (n, W )) correcting
t right-shifts. The symbol → in the superscript indicates that
ሺʹǡሻ ሺ͵ǡሻ
ሺͶǡሻ
ሺͷǡሻ
ሺǡሻ
ሺͳǡሻ
only
right-shifts
are allowed
in the
model.
Since the channel
does not affectPthe weight of the transmitted string, we have
→
→
Md,k (n; t) = W Md,k (n, W ; t).
ሺʹǡͺሻ ሺ͵ǡͺሻ ሺͶǡͺሻ→ ሺͷǡͺሻ ሺǡͺሻ ሺǡͺሻ
The lower bound on Md,k (n; t) given in Theorem 7
below is obtained
by constructing a family of codes in
,
which
in turnሺͷǡͻሻ
is done
by using
S̄
(n,
W
),
d
ሺͶǡͻሻ
ሺǡͻሻ
ሺǡͻሻ“good”
ሺͺǡͻሻ
ሺͳǡͻሻ
d,k
a ሺ͵ǡͻሻ
codes in ZW , da and restricting them to S̄d,k (n, W ). For that
reason, the best known lower bound for codes in ZW , da is
given first (Lemma 6). A few definitions are needed to state it
W
W
precisely. We say that L ⊆
Z is a sublattice of ZW if (L, +)
W
is a subgroup of Z , + . The density of L in Z is defined
−1
as µ(L) := ZW /L , where ZW /L is the quotient group of
5 See [21, Sec. III] for a study of the geometry of ZW , d .
a
Proof: We first derive the lower bound (23a). Consider a
class of codes in S̄d,k (n, W ) obtained in the following way:
Take a lattice L ⊆ ZW of minimum distance da (L) = t + 1,
and let Cu := (u + L) ∩ S̄d,k (n, W ) for an arbitrary u ∈ ZW
(here u + L = {u + x : x ∈ L}). The code Cu has minimum
distance da (Cu ) ≥ t + 1 and hence it can correct t rightshifts. To give a lower bound on its cardinality notice that
there are ZW /L = µ(L)−1 different translates u + L that
are disjoint and whose union is all of ZW , so for at least
one such u we will have |Cu | = |(u + L) ∩ S̄d,k (n, W )| ≥
µ(L) · Sd,k (n, W ). This establishes the existence of a code
in S̄d,k (n, W ) of minimum distance > t and cardinality ≥
µa (W, t) · Sd,k (n, W ). From Lemma 6 we then conclude that
6 A Sidon set of order t in an Abelian group (G, +) is any subset
{b0 , b1 , . . . , bW } ⊆ G having the property that all its t-sums (bi1 +· · ·+bit )
are distinct, up to the order of the summands; see [26], [20].
6
S
→
(n,wn)
Md,k (n, wn; t) & d,kwt nt . Finally, to get the desired lower
→
bound on Md,k (n; t) write:
X →
→
Md,k (n; t) =
Md,k (n, W ; t)
(25)
W
w ∗ n+f (n)
>
X
Md,k (n, W ; t)
(26)
X
µa (W, t) · Sd,k (n, W )
(27)
→
W =w ∗ n−f (n)
w ∗ n+f (n)
≥
W =w ∗ n−f (n)
1
&
∗
(w n + f (n))t
∼
Sd,k (n)
.
(w∗ n)t
w ∗ n+f (n)
X
Sd,k (n, W ) (28)
W =w ∗ n−f (n)
(29)
where w∗ is the optimizing weight given in Lemma 1 and f (n)
is the sublinear function from Lemma 2. Here (27) follows
from our code construction, (28) follows from Lemma 6, and
(29) follows from Lemma 2 and the fact that f (n) = o(n).
We now turn to the derivation of the upper bound (23b).
Our approach is essentially a packing argument; however, due
to the structure of the code space and the fact that balls in it
do not have uniform sizes, some care is needed in making the
argument work. Let C ⊆ Sd,k (n) be an optimal code correcting
t right-shifts (or, equivalently, ⌊t/2⌋ right-shifts and ⌈t/2⌉ left→
shifts; see Remark 4), |C| = Md,k (n; t). Consider a codeword
x ∈ C of weight W , and let Λj (resp. j Λ) denote the number
of 1’s in x that are followed (resp. preceded) by exactly j
zeros, and Λ6=j (resp. 6=j Λ) the number of 1’s in x that are
followed (resp. preceded) by a run of zeros whose length is
not j. Let also i Λj denote the number of 1’s in x that are
preceded by exactly i zeros and followed by exactly j zeros;
i Λ6=j the number of 1’s in x that are preceded by exactly
i zeros and followed by a run of zeros whose length is not
j; and similarly for 6=i Λj and 6=i Λ6=j . We next show that the
number of strings in Sd,k (n) that can be obtained after x is
impaired by ⌊t/2⌋ right-shifts and ⌈t/2⌉ left-shifts is at least
6=k Λ6=d − 1
6=d Λ6=k − 2t
.
(30)
⌊t/2⌋
⌈t/2⌉
To see this, first count the number of strings that can be
obtained by shifting ⌊t/2⌋ 1’s one position to the right. In other
words, pick ⌊t/2⌋ out of W 1’s, and shift each of them one
position to the right. Notice that not all such choices will result
in a string that belongs to our code space Sd,k (n). Namely,
right-shifting a 1 that (a) is preceded by exactly k zeros, or
(b) is followed by exactly d zeros, or (c) is the last symbol
in the string, would result in either a string that violates the
(d, k)-constraints, or is of length n + 1. Excluding the 1’s
satisfying (a)–(c) leaves us with at least 6=k Λ6=d − 1 1’s to
choose from, which gives the left-hand term in (30). The righthand term is obtained in an analogous way by counting the
number of strings that can be obtained after picking ⌈t/2⌉ out
of 6=d Λ6=k −1 1’s and shifting each of them one position to the
left. The difference here is that, after choosing ⌊t/2⌋ 1’s for
the right-shifts in the first step, we exclude additional 3⌊t/2⌋
1’s in the second step. Namely, if the i’th 1 has been chosen
for the right-shift in the first step, then the (i − 1)’th, the i’th,
and the (i + 1)’th 1 are excluded in the second step: the i’th
because right-shifting and then left-shifting the same 1 would
potentially result in the same string we started with, and the
(i−1)’th (resp. (i+1)’th) because right-shifting the i’th 1 and
then left-shifting the (i − 1)’th (resp. (i + 1)’th) could result in
a run of zeros of length k+1 (resp. d−1) in between these 1’s.
We are thus left with at least 6=d Λ6=k −3⌊t/2⌋−1 ≥ 6=d Λ6=k −2t
1’s to choose from, which yields the right-hand term in (30).
This proves our claim that the expression in (30) is a lower
bound on the number of strings in Sd,k (n) that x can produce
after being impaired by ⌊t/2⌋ right-shifts and ⌈t/2⌉ left-shifts.
Let us now give the asymptotic form of (30), for fixed t
and n → ∞, that we shall need to conclude the proof. We
know from Lemma 3 that, for the “typical” strings in Sd,k (n),
W ∼ w∗ n and j Λ ∼ Λj ∼ λ∗j n = ρj+1 w∗ n, d ≤ j ≤ k.
This implies that a given ∗block 0j 1 is preceded by a block
λ
0i 1 with probability ≈ wi∗ = ρi+1 , or in other words, of
the Λj blocks 0j 1, a fraction of ≈ ρi+1 is preceded by a
block 0i 1. It follows that, for the typical strings in Sd,k (n),
∗
d+1
)(1 − ρk+1 )n, and therefore the
6=d Λ6=k ∼ w (1 − ρ
expression (30) has the following asymptotic form:
t
w∗ (1 − ρd+1 ) (1 − ρk+1 ) nt
,
(31)
∼
⌈t/2⌉! ⌊t/2⌋!
nm
n
where we have used the fact that m
∼ m! for fixed m and
n → ∞.
Finally, due to our assumption that C corrects ⌊t/2⌋ rightshifts and ⌈t/2⌉ left-shifts, the sets of outputs that can be
obtained in the above-described way from any two different
codewords x, y ∈ C have to be disjoint. This implies that
t
w∗ (1 − ρd+1 ) (1 − ρk+1 ) nt
→
. Sd,k (n)
Md,k (n; t) ·
⌈t/2⌉! ⌊t/2⌋!
(32)
and proves the upper bound in (23b). We have used in (32) the
fact that in the asymptotic analysis we can safely ignore the
non-typical inputs (see Lemma 3), as we did in the derivation
of the lower bound as well.
From Theorem 7 we can find the asymptotic scaling of the
redundancy of optimal codes correcting t right-shifts.
Corollary 8. For every fixed t ∈ Z+ , as n → ∞ we have
→
log Sd,k (n) − log Md,k (n; t) = t log n + O(1).
(33)
IV. C ODES C ORRECTING S YMMETRIC S HIFTS
In this section we discuss a slightly different scenario—the
one which is usually considered in the literature on bit-shift
channels—where both left-shifts and right-shifts are allowed
in the model and are treated in a symmetric way. Our object
of study are codes enabling the receiver to reconstruct the
transmitted string whenever the total shift of its 1’s does not
exceed a specified threshold, regardless of the direction of the
individual shifts.
7
A. Geometric Characterization
ሺͳǡʹሻ
Suppose that x̄ ∈ S̄d,k (n) is the transmitted codeword, and
z the corresponding received vector. If the i’th 1 in x is shifted
by ki ∈ Z positions, we have zi = x̄i + ki . Therefore, we
ሺͳǡ͵ሻ
ሺʹǡ͵ሻ
can again
think of the bit-shift channel as an additive noise
channel with input alphabet
PWZ+ . If the 1’s in x̄ are shifted by
t
positions
in
total,
then
i=1 |zi − xi | = t.
ሺͳǡͶሻ ሺʹǡͶሻ ሺ͵ǡͶሻ
We say that a code C¯ ⊆ S̄d,k (n) can correct t shifts if no
two different codewords x̄, ȳ ∈ C¯ can produce the same output
after being
arbitrary patterns of ≤ t shifts. In
ሺͳǡͷሻ
ሺʹǡͷሻimpaired
ሺ͵ǡͷሻ with
ሺͶǡͷሻ
¯ x̄ 6= ȳ, wt(x) = wt(y) =
symbols, for every x̄, ȳ ∈ C,
PW
W , and all noise vectors f , g ∈ ZW with
i=1 |fi | ≤ t,
P
W ሺʹǡሻ ሺ͵ǡሻ ሺͶǡሻ ሺͷǡሻ
ሺͳǡሻ
|g
|
≤
t,
we
have
x̄
+
f
=
6
ȳ
+
g.
Such
a
code
C¯ is said
i
i=1
′
¯
to be optimal if there is no other code C ⊆ S̄d,k (n) correcting
¯
t
shiftsሺʹǡሻ
and such
that |ሺͶǡሻ
C¯′ | > |C|.
ሺͳǡሻ
ሺͷǡሻ ሺǡሻ
ሺ͵ǡሻ
Let d1 denote the ℓ1 (or Manhattan) distance on S̄d,k (n, W ):
W
X
ሺʹǡͺሻ ሺ͵ǡͺሻ
|x̄ −ሺǡͺሻ
ȳ |. ሺǡͺሻ
d (x̄,ሺͶǡͺሻ
ȳ) := ሺͷǡͺሻ
1
i
i
(34)
i=1
For vectors of ሺ͵ǡͻሻ
differentሺͶǡͻሻ
dimensions
strings
ሺͳǡͻሻ
ሺͷǡͻሻ(corresponding
ሺǡͻሻ ሺǡͻሻto ሺͺǡͻሻ
of different weights), x̄ ∈ S̄d,k (n, W1 ), ȳ ∈ S̄d,k (n, W2 ),
W1 6= W2 , we define d1 (x̄, ȳ) = ∞. The minimum distance
of a code C¯ ⊆ S̄d,k (n) with respect to the metric d1 is denoted
¯
d1 (C).
Proposition 9. A code C¯ ⊆ S̄d,k (n) can correct t shifts if and
¯ > 2t.
only if d1 (C)
Proof: Analogous to the proof of Proposition 5.
ሺͳǡʹሻ
ሺͳǡ͵ሻ ሺʹǡ͵ሻ
ሺͳǡͶሻ ሺʹǡͶሻ ሺ͵ǡͶሻ
ሺͳǡͷሻ ሺʹǡͷሻ ሺ͵ǡͷሻ ሺͶǡͷሻ
ሺͳǡሻ ሺʹǡሻ ሺ͵ǡሻ ሺͶǡሻ ሺͷǡሻ
ሺͳǡሻ ሺʹǡሻ ሺ͵ǡሻ ሺͶǡሻ ሺͷǡሻ ሺǡሻ
ሺͳǡͻሻ
ሺʹǡͺሻ ሺ͵ǡͺሻ ሺͶǡͺሻ ሺͷǡͺሻ ሺǡͺሻ ሺǡͺሻ
ሺ͵ǡͻሻ ሺͶǡͻሻ ሺͷǡͻሻ ሺǡͻሻ ሺǡͻሻ ሺͺǡͻሻ
Fig. 2: The space S̄0,5 (9, 2) representing the set of all binary
strings of length n = 9 and weight W = 2 satisfying (0, 5)constraints, and a code correcting t = 1 shift. Codewords are
depicted as black dots; gray regions illustrate balls (under the
metric d1 ) of radius t = 1 around the codewords.
Again, balls in the metric space S̄d,k (n, W ), d1 do not
have uniform sizes—the size of a ball of radius r depends on
its center. In the unrestricted metric space ZW , d1 this effect
does not occur and we have the following expression [9] for
the cardinality of a ball of radius r:
X W r
.
(35)
2i
B1 (W, r) =
i
i
i
The cardinality of an arbitrary ball of radius r in
S̄d,k (n, W ), d1 is upper bounded by B1 (W, r).
B. Construction and Bounds
↔
↔
Let Md,k (n; t) (resp. Md,k (n, W ; t)) denote the cardinality
of an optimal code in Sd,k (n) (resp. Sd,k (n, W )) correcting t
shifts. As in the asymmetric case, the channel does not affect
↔
the weight of the transmitted string, so we have Md,k (n; t) =
P
↔
W Md,k (n, W ; t).
In analogy with (22) we define the maximum density a
lattice L ⊆ ZW of minimum distance d1 (L) > 2t can have as
n
o
µ1 (W, t) := max µ(L) : L ⊆ ZW a lattice, d1 (L) > 2t .
(36)
Lemma 10. For every fixed t ∈ Z+ , as W → ∞ we have
µ1 (W, t) & c(t) · W −t , where
(
2−t ,
t≤2
c(t) :=
.
(37)
(2t + 1)−1 , t ≥ 3
Proof: Consider the so-calledP
AW −1 lattice defined by
AW −1 := (u1 , . . . , uW ) ∈ ZW : W
i=1 ui = 0 , and let L0
be the densest sublattice of AW −1 with d1 (L0 ) > 2t. The
metric space (AW −1 , d1 ) is in fact isometric to (ZW −1 , 2da )
[21, Thm 4], so the density of L0 in AW −1 can be expressed
as µ(L0 ) := |AW −1 /L0 |−1S = µa (W − 1, t). Now define a
lattice L ⊆ ZW by L := k∈Z L0 + k(2t + 1)e1 , where
e1 = (1, 0, . . . , 0) is a unit vector in ZW . In words, L comprises infinitely many translates of L0 separated by a multiple
of 2t + 1. It follows from the construction that d1 (L) > 2t
1
1
µ(L0 ) = 2t+1
µa (W − 1, t).
and µ(L) := |ZW /L|−1 = 2t+1
Therefore, recalling from Lemma 6 that µa (W − 1, t) & W −t ,
we conclude that µ1 (W, t) & (2t + 1)−1 W −t .
The lower bound just given can be improved for t = 1, 2
to µ1 (W, t) & 2−t W −t . In fact, for t = 1 the optimal density
is known exactly for every W , namely µ1 (W, 1) = 2W1+1 .
This follows from the existence of perfect codes of radius
t = 1 in (ZW , d1 ), for every W [9]. For t = 2 (or, indeed, for
any t), one can construct codes in (ZW , d1 ) by periodically
extending the codes in the torus ZW
m correcting t = 2 errors
in the Lee metric7 (here Zm := Z/(mZ)). Such a periodic
extension of Berlekamp’s codes for the Lee metric [3, Ch. 9]
gives µ1 (W, 2) & 14 W −2 .
7 To the best of our knowledge, no known construction of codes in the
Lee metric gives a lower bound on the density µ1 (W, t) better than the one
obtained above, except for t = 1, 2. For example, Berlekamp’s construction
[3, Ch. 9] (see also [6]) gives µ1 (W, t) & 2−t W −t , and the BCH-like
−t , where
construction of Roth and Siegel [29] gives µ1 (W, t) & p−1
2t+3 W
p2t+3 is the smallest prime greater than or equal to 2t + 3.
8
Theorem 11. Let 0 ≤ d < k ≤ ∞. For every fixed t ∈ Z+ ,
as n → ∞ we have
!t
k+1
X
↔
Sd,k (n)
(38a)
iρi c(t),
Md,k (n; t) &
nt
i=d+1
!t
k+1
X
↔
Sd,k (n)
t! 2−t
i
Md,k (n; t) .
iρ
t ,
t
nt
1 − ρd+1 1 − ρk+1
i=d+1
(38b)
where c(t) P
is defined in (37) and ρ is the unique positive
k+1
solution to i=d+1 xi = 1.
For example, in the unconstrained case (d = 0, k = ∞) we
have S0,∞ (n) = 2n , ρ = 1/2, and the bounds (38) reduce to:
↔
2n t
2n t
2
c(t)
.
M
(n;
t)
.
2 t!.
(39)
0,∞
nt
nt
Proof: The proof is analogous to the proof of Theorem
7 for the asymmetric case. The only difference in proving the
lower bound (38a) is that we need to use the metric d1 instead
of da (see Proposition 9). Following the same steps as in (25)–
↔
(29) we get Md,k (n; t) & µ1 (w∗ n, t) · Sd,k (n), and then the
result follows by applying Lemma 10.
Now for the upper bound (38b). Let C ⊆ Sd,k (n) be
↔
an optimal code correcting t shifts, |C| = Md,k (n; t), and
consider a codeword x ∈ C. Notice that every pattern of t
shifts that can impair x in the channel consists of r rightshifts and t − r left-shifts, for some r ∈ {0, 1, . . . , t}. By a
reasoning identical to that used in the proof of Theorem 7 we
then conclude that the number of strings in Sd,k (n) that can
be produced after x is impaired by t shifts is at least
t
X
6=k Λ6=d − 1
6=d Λ6=k − 3r − 1
(40)
r
t−r
r=0
(see equation (30) and the paragraph following it). Recalling
that 6=d Λ6=k ∼ 6=k Λ6=d ∼ w∗ (1−ρd+1 )(1−ρk+1 )n as n → ∞,
we find the asymptotics of the expression (40) in the form:
t−r
r
t
X
t
2t
6=d Λ6=k
6=k Λ6=d
∼
∼
6=k Λ6=d
r!
(t
−
r)!
t!
r=0
t
2t
w∗ (1 − ρd+1 ) (1 − ρk+1 ) nt .
(41)
t!
Since C corrects t shifts by assumption, we must have
t
2t w∗ (1 − ρd+1 ) (1 − ρk+1 ) nt
↔
Md,k (n; t) ·
. Sd,k (n),
t!
(42)
∼
which proves the upper bound (38b).
Corollary 12. For every fixed t ∈ Z+ , as n → ∞ we have
↔
log Sd,k (n) − log Md,k (n; t) = t log n + O(1).
↔
(43)
The only bounds on Md,k (n; t) appearing in the literature
that we are aware of are those in [1] (and [36] for t = 1).
However, these bounds are not explicit and are difficult to
compare to (38).
V. C ONCLUDING R EMARKS
We conclude the paper with a few remarks on error models
related to those studied in this paper.
In some applications it is reasonable to assume that the shifts
are limited in the sense that each 1 in an input string x can be
shifted by at most s positions [1], [22], for some s ∈ Z+ . More
precisely, if x̄ is the transmitted vector and z the received
vector, the assumption here is that 0 ≤ zi − x̄i ≤ s, 1 ≤ i ≤ n,
in the asymmetric case (when only right-shifts are allowed in
the model), or |zi − x̄i | ≤ s in the symmetric case. For such
models, the lower bound on the cardinality of optimal shiftcorrecting codes can possibly be improved by using known
constructions of codes for limited-magnitude errors; see, e.g.,
[5]. For example, in the asymmetric case with t = 2, s = 1,
the lower bound in (23a) can be improved by a factor of 2
by using a construction of codes correcting 2 asymmetric 1limited-magnitude errors [5, Sec. IV.C]. Note that we have
used implicitly the assumption that s = 1 in our derivation
of the upper bounds (23b) and (38b). Therefore, these upper
bounds are not likely to be improved in limited-shift models
by using the approach we have used.
In this context one may also be interested in codes correcting all possible patterns of shifts such that each shift is
bounded by s. Such codes, usually called zero-error codes,
have been studied in several related settings: bit-shift channels
[30], [22], timing channels [17], [19], skew-tolerant parallel
asynchronous communications [7], [18], etc. In many cases,
the optimal codes have been found and the zero-error capacity
of the corresponding channel determined.
ACKNOWLEDGMENT
The author would like to thank Vincent Y. F. Tan (NUS), for
his detailed reading and helpful comments on a preliminary
version of this work; Mehul Motani (NUS), for several discussions on a model related to the one studied in this paper; and
Anshoo Tandon (NUS), for helpful discussions on constrained
codes and related notions.
R EFERENCES
[1] K. A. S. Abdel-Ghaffar and J. H. Weber, “Bounds and Constructions
for Runlength-Limited Error-Control Block Codes,” IEEE Trans. Inform.
Theory, vol. 37, no. 3, pp. 789–800, May 1991.
[2] V. Anantharam and S. Verdú, “Bits Through Queues,” IEEE Trans. Inf.
Theory, vol. 42, no. 1, pp. 4–18, Jan. 1996.
[3] E. R. Berlekamp, Algebraic Coding Theory, revised edition, World
Scientific, Singapore, 2015.
[4] R. C. Bose and S. Chowla, “Theorems in the Additive Theory of
Numbers,” Comment. Math. Helv., vol. 37, no. 1, pp. 141–147, Dec.
1962.
[5] Y. Cassuto, M. Schwartz, V. Bohossian, and J. Bruck, “Codes for
Asymmetric Limited-Magnitude Errors With Application to Multilevel
Flash Memories,” IEEE Trans. Inform. Theory, vol. 56, no. 4, pp. 1582–
1595, Apr. 2010.
[6] J. C. Chiang and J. K Wolf, “On Channels and Codes for the Lee Metric,”
Inform. and Control, vol. 19, no. 2, 159–173, Sep. 1971.
[7] S. Engelberg and O. Keren, “Reliable Communications Across Parallel
Asynchronous Channels With Arbitrary Skews,” IEEE Trans. Inform.
Theory, vol. 63, no. 2, pp. 1120–1129, Feb. 2017.
[8] H. C. Ferreira and S. Lin, “Error and Erasure Control (d, k) Block
Codes,” IEEE Trans. Inform. Theory, vol. 37, no. 5, pp. 1399–1408,
Sep. 1991.
9
[9] S. W. Golomb and L. R. Welch, “Perfect Codes in the Lee Metric and
the Packing of Polyominoes,” SIAM J. Appl. Math., vol. 18, no. 2, pp.
302–317, Mar. 1970.
[10] S. Heubach and T. Mansour, “Compositions of n with Parts in a Set,”
Congr. Numer., vol. 168, pp. 127–143, 2004.
[11] H. M. Hilden, D. G. Howe, and E. J. Weldon, Jr., “Shift Error Correcting
Modulation Codes,” IEEE Trans. Magn., vol. 27, no. 6, pp. 4600–4605,
Nov. 1991.
[12] K. A. S. Immink, “Runlength-Limited Sequences,” Proc. IEEE, vol. 78,
no. 11, pp. 1745–1759, Nov. 1990.
[13] K. A. S. Immink, P. H. Siegel, and J. K. Wolf, “Codes for Digital
Recorders,” IEEE Trans. Inform. Theory, vol. 44, no. 6, pp. 2260–2299,
Oct. 1998.
[14] K. A. S. Immink and K. Cai, “Design of Capacity-Approaching Constrained Codes for DNA-Based Storage Systems,” IEEE Commun. Lett.,
vol. 22, no. 2, pp. 224–227, Feb. 2018.
[15] T. Kløve, “Error Correcting Codes for the Asymmetric Channel,” Technical Report, Dept. of Informatics, University of Bergen, 1981. (Updated
in 1995.)
[16] T. Kløve, “Codes Correcting a Single Insertion/Deletion of a Zero or
a Single Peak-Shift,” IEEE Trans. Inform. Theory, vol. 41, no. 1, pp.
279–283, Jan. 1995.
[17] M. Kovačević and P. Popovski, “Zero-Error Capacity of a Class of
Timing Channels,” IEEE Trans. Inform. Theory, vol. 60, no. 11, pp.
6796–6800, Nov. 2014.
[18] M. Kovačević, “A Note on Parallel Asynchronous Channels With
Arbitrary Skews,” IEEE Trans. Inform. Theory, vol. 63, no. 11, pp.
7320–7321, Nov. 2017.
[19] M. Kovačević, M. Stojaković, and V. Y. F. Tan, “Zero-Error Capacity of
P -ary Shift Channels and FIFO Queues,” IEEE Trans. Inform. Theory,
vol. 63, no. 12, pp. 7698–7707, Dec. 2017.
[20] M. Kovačević and V. Y. F. Tan, “Improved Bounds on Sidon Sets via
Lattice Packings of Simplices,” SIAM J. Discrete Math., vol. 31, no. 3,
pp. 2269–2278, 2017.
[21] M. Kovačević and V. Y. F. Tan, “Codes in the Space of Multisets—
Coding for Permutation Channels with Impairments,” IEEE Trans.
Inform. Theory, to appear in vol. 64, 2018. Published online at:
https://doi.org/10.1109/TIT.2017.2789292.
[22] V. Yu. Krachkovsky, “Bounds on the Zero-Error Capacity of the InputConstrained Bit-Shift Channel,” IEEE Trans. Inform. Theory, vol. 40,
no. 4, pp. 1240–1244, Jul. 1994.
[23] A. V. Kuznetsov and A. J. Han Vinck, “A Coding Scheme for Single
Peak-Shift Correction in (d, k)-Constrained Channels,” IEEE Trans.
Inform. Theory, vol. 39, no. 4, pp. 1444–1450, Jul. 1993.
[24] V. I. Levenshtein and A. J. Han Vinck, “Perfect (d, k)-Codes Capable
of Correcting Single Peak-Shifts,” IEEE Trans. Inform. Theory, vol. 39,
no. 2, pp. 656–662, Mar. 1993.
[25] T. Nakano, A. W. Eckford, and T. Haraguchi, Molecular Communication, Cambridge University Press, 2013.
[26] K. O’Bryant, “A Complete Annotated Bibliography of Work Related to
Sidon Sequences,” Electron. J. Combin., #DS11, 39 pp, 2004.
[27] R. Pemantle and M. C. Wilson, Analytic Combinatorics in Several
Variables, Cambridge University Press, 2013.
[28] E. Rosnes, Á. I. Barbero, and Ø. Ytrehus, “Coding for Inductively
Coupled Channels,” IEEE Trans. Inform. Theory, vol. 58, no. 8, pp.
5418–5436, Aug. 2012.
[29] R. M. Roth and P. H. Siegel, “Lee-Metric BCH Codes and their
Application to Constrained and Partial-Response Channels,” IEEE Trans.
Inform. Theory, vol. 40, no. 4, pp. 1083–1096, Jul. 1994.
[30] S. Shamai (Shitz) and E. Zehavi, “Bounds on the Capacity of the BitShift Magnetic Recording Channel,” IEEE Trans. Inform. Theory, vol.
37, no. 3, pp. 863–872, May 1991.
[31] P. H. Siegel, “Recording Codes for Digital Magnetic Storage,” IEEE
Trans. Magn., vol. 21, no. 5, pp. 1344–1349, Sep. 1985.
[32] P. H. Siegel and J. K. Wolf, “Modulation and Coding for Information
Storage,” IEEE Commun. Mag., vol. 29, no. 12, pp. 68–86, Dec. 1991.
[33] J. Singer, “A Theorem in Finite Projective Geometry and Some Applications to Number Theory,” Trans. Amer. Math. Soc., vol. 43, pp. 377–385,
1938.
[34] R. P. Stanley, Enumerative Combinatorics, Vol I, Cambridge University
Press, 1997.
[35] D. T. Tang and L. R. Bahl, “Block Codes for a Class of Constrained
Noiseless Channels,” Inform. and Control, vol. 17, no. 5, pp. 436–461,
Dec. 1970.
[36] Ø. Ytrehus, “Upper Bounds on Error-Correcting Runlength-Limited
Block Codes,” IEEE Trans. Inform. Theory, vol. 37, no. 3, pp. 941–
945, May 1991.
| 7cs.IT
|
1
Fine-tuning the Ant Colony System algorithm
through Particle Swarm Optimization.
D. Gómez-Cabrero+, D. N. Ranasinghe*
*University of Colombo School of Computing
35, Reid Avenue, Colombo 7, Sri Lanka
Email: [email protected]
+
Departamento de Estadística e Investigación Operativa,
Universitat de Valencia, Calle Doctor Moliner s/n, Burjassot, España
Email: [email protected]
Abstract—Ant Colony System (ACS) is a distributed (agentbased) algorithm which has been widely studied on the
Symmetric Travelling Salesman Problem (TSP). The optimum
parameters for this algorithm have to be found by trial and
error. We use a Particle Swarm Optimization algorithm (PSO)
to optimize the ACS parameters working in a designed subset
of TSP instances. First goal is to perform the hybrid PSO-ACS
algorithm on a single instance to find the optimum parameters
and optimum solutions for the instance. Second goal is to
analyze those sets of optimum parameters, in relation to
instance characteristics. Computational results have shown
good quality solutions for single instances though with high
computational times, and that there may be sets of parameters
that work optimally for a majority of instances.
I. INTRODUCTION
H
EURISTICS algorithms, and their higher forms metaheuristics, have been widely used to find reasonable
good solutions for NP-Hard problems. The performance of
those heuristics is based on the optimum set-up of a set of
parameters. The problem of fine-tuning those parameters is
also a hard problem.
Fine-Tuning is an unavoidable task that needs a correct
design of experiments. For statistical experimental design
and analysis for heuristics see [4]. Heuristics as CALIBRA
[1] and F-Race [3] have been designed as procedures for
finding optimal parameters. Fine-tuning can be understood
as “to find the set of parameters performing well on a wide
set of instances”.
We have designed an algorithm, using a Particle Swarm
Optimization (PSO) framework, to optimize the parameters
of the ACS algorithm working on a “single” Symmetric
Travelling Salesman Problem (TSP) instance. For each
instance the algorithm computes an “optimal” set of ACS
parameters. A second goal is to analyze jointly those sets of
parameters, their performance on all instances (not only
their related instance) and the characteristics of their related
instances for the purpose of finding correlations.
Ant Colony Optimization (ACO) is a generic framework
for ant-based optimization heuristic algorithms. In ACO
algorithms ants are agents which, in the TSP case, construct
tours by moving from city to city on the graph problem.
Those ants are sharing information using a pheromone trail.
The first ACO algorithm, called Ant-System, was
proposed in [5], [7] and [8]. A full review of ACO
algorithms and applications can be found in [9]. ACS is a
version of the Ant System that modifies the updating of the
pheromone trail, see [6] and [11]. We have chosen this ACS
algorithm to work with because of the theoretical
background we have found on it, see [6] and [9], and the
previous fine-tuning research on the parameters by [16].
PSO is a Swarm Intelligence method for global
optimization. Given a domain D, there is defined a function
f : D → ℜ assigning to each point of D a fitness value.
In PSO there is a population (swarm) of individuals, named
particles, moving on the domain and adjusting their
trajectory to its own previous best position and the previous
best position of the neighbourhood. We will use the Global
PSO version which considers the neighbourhood as all the
swarm. For a further review of the PSO [10], [13] and [14].
An example of PSO applications can be found in [12] and
[15]. We have chosen PSO because it has an easy
implementation for integer and real parameters, and, as
genetic algorithms, it performs a “blind” search on all the
possible sets of parameters.
In our algorithm the domain of the PSO will be all
possible sets of parameters for ACS. For a position of a
particle we compute the fitness by running the ACS
algorithm with the parameters given by the position on a
TSP instance.
Section II describes ACS and PSO algorithms. Section III
describes the PSO-ACS algorithm, the parameters used on
the PSO and the initial population of particles (set of
feasible parameters for the ACS algorithm). Computational
2
results are given in section IV and finally in section V
conclusions are set.
II. PSO AND ACS ALGORITHMS
Let us introduce some notation about a TSP graph, where
for a given instance denote V as the set of vertices, E as the
set of edges (shortest paths between the vertices), ce cost of
traversing edge e∈E.
A. Ant Colony System (ACS)
The ACS works as follow: it has a population of n ants.
Let denote for each arc e=(i,j) in the TSP-instance graph an
initial heuristic value ηe and an initial pheromone value τe.
ηe is originally set to the inverse of the cost of traversing the
edge e. τe is initially set to τ0=1\Lnn for all edge e, where Lnn
is equal to the inverse of the tour length computed by the
nearest-neighbour-heuristic algorithm.
Let q0, α, ρ ∈ [0,1], be real values and ϕ, β integer values
between 0 and 8. For each vertex s ∈V a neighbour set is
defined among the nearest vertices, N(s). For a given ant r
let be NV(r) the set of non-visited vertices. We denote
Jr(s)=N(s)∩NV(r) the set of non-visited vertices among the
neighbour set for a given vertex s and a given ant r.
At each iteration, each ant constructs a tour solution for
the TSP-instance. The constructions phase works as follows:
Each ant is initially set in a randomly vertex, then at each
step the entire ants make a movement to a non-visited
vertex. Given and ant r with an actual position (vertex) s,
pk(rs) is computed as a reference value for visiting or not
vertex k, where:
pkrs
⎧ [τ ( s ,k ) ]ϕ [η ( s ,k ) ]β
⎪⎪
ϕ
β
= ⎨ ∑ [τ ( s ,u ) ] [η( s ,u ) ]
u∈J ( s )
⎪
⎪⎩
0
⎫
if k ∈ J(s)⎪
⎪
⎬
⎪
otherwise ⎪⎭
(1)
This formula includes a small modification respect to
the original ACS algorithm including ϕ as exponent of the
pheromone level, this will allow us a deeper research on the
effects of the possible combinations of ϕ, β parameters.
A sample random value q is computed. If q≤q0 we visit
the city k∈V with maximum pk(rs) (exploitation of the
knowledge) otherwise ACS follows a random-proportional
rule on pk(rs) for all k∈V (biased exploration). If there are no
non-visited vertex on the neighbour of vertex s, we extend
(1) to all vertices in NV(r)/N(s) (those not visited by ant r
and not included in the neighbour of s) and visits the vertex
with maximum pk(rs).
After an arc is inserted into a route (a new vertex is
visited), its pheromone trail is updated. This phase is called
Local Update, and for a inserted e∈E:
τ e = (1 − α )τ e + ατ 0
(2)
This reduces the pheromone level in the visited arcs and
the exploration in the set of possible tours is increased.
When all the tours have been computed a Global Update
phase is done. For each edge e pertaining to the global-besttour found:
τ e = (1 − α )τ e + α∆τ e
∆τ e = 1/L gb
(3)
(4)
where Lgb is the length of the global-best-tour found.
In the original ant algorithm, and in most of the later
versions, pheromone global update is performed in all the
edges; ACS only updates pheromone level in the set of
edges pertaining to the best tour.
We consider a trial as a performance of 1000 iterations.
The lowest length tour found after all iterations are finished
is the best solution found by the trial.
A feasible set of parameters for running ACS is a
combination of feasible q0, ϕ, β, α, ρ, number of ants (na)
and a concrete neighbour definition.
B. Particle Swarm Optimization (PSO)
As described by Eberhert and Kennedy [10], [13], [14]
PSO is an adaptative algorithm based on a social
environment where a set of particles, called population, are
visiting possible “positions” of a given domain. Each
position has a fitness value (and it can be computed). At
each iteration particles will move returning stochastically
toward its previous best fitness position and to the
population best fitness position. All the particles of the
population are sharing information of the best areas to
search.
Let denote P as the set of parameters and let define PO as
the population of particles. At each iteration xfp and vfp
denotes respectively the actual position and the actual
velocity of parameter p∈P of the particle f ∈ PO.
The movement of the particles are defined by the
following equations:
v fp = wv fp + r1c1 ( x fp − bl fp ) + r2 c 2 ( x fp − bg p ) (5)
x fp = x fp + χv fp
(6)
Where c1, c2 are integer non-negative values, named
cognitive and social respectively, r1, r2 are sample random
values in [0,1], w and χ are non-negative real values, named
respectively inertia weight and constriction factor, bgp is the
value of parameter p pertaining to the best set of parameters
found by the population (social knowledge) and blfp is the
value of parameter p pertaining to the best parameters set
found by particle f (self-knowledge). In (5) the first factor
refers to the previous velocity, second and third factors are
related respectively to the distance to the best set of
parameters found by the particle and to the distance to the
3
III. PSO-ACO ALGORITHM
A. PSO Parameters, initial particles and fitness value.
The algorithm is run each time on a single TSP-instance.
The set of parameters of ACS that define a point in the PSO
domain are q0, ϕ, β, φ , α, ρ and the number of ants (na).
Most of them have been previously explained in the section
II. φ denotes the percentage of vertices that will be included
into N(v) for any vertex v∈V, so given a v∈V and φ=0.5,
|N(v)|=⎡φ*|V|⎤ .The ranges of each parameter are shown in
Table I, where each parameter pertains to its related
]Minimum, Maximum].
TABLE I
RANGE OF ACS PARAMETERS
q0
ϕ
β
ρ
α
φ
Minimum
0
-1
-1
0
0
0
Maximum
1
8
8
1
1
1
n
a
0
4
0
q0, ϕ, β, φ , α, ρ and na are the parameters used in
ACS. φ is explained in the beginning of section III
DPSO = ]0,1]x]-1,8]x]-1,8]x]0,1]x]0,1]x]0,1]x]0,40]⊂ℜ7
is the domain of the PSO. We define the fitness value of a
given position (point) as the length of the best tour
computed by an ACS using the related parameters in the
given instance. If comparing two different positions they
have the same length value then computing time is
considered. We consider better of those parameters that
minimize the length of the tour and secondly the time of
computing. For computing the fitness of a given position,
first integer parameters (na, ϕ and β) are rounded up as
shown in Fig. 1, secondly the algorithm runs five trials of
the ACS algorithm using the rounded parameters in the
TSP-instance and returns the best value obtained from the
trials.
Point in the PSO domain (reflects a set of
parameters):
(0.1 2.3 8 0.5 0.88 0.34 32.4)
Modified values to run on ACS:
(0.1 3 8 0.5 0.88 0.34 33 )
Fig. 1. Modification of PSO points. In bold are the
modified values
set initially to 1 and gradually decreasing from 1 to 0.1 (at
each PSO iteration w=0.99w). Maximum number of
iterations is set to 500 due to computing time constraints
(for 1000 PSO-iterations more than 1 day of computing time
was necessary).
B. Algorithm
The algorithm PSO-ACS’s pseudo-code is as follows:
Select TSP-Instance.
Initialize particles.
Do 500
For all the set of particles
Position_Fitness (PF)=INFINITE
Do 5
Perform a trial ACS with particle parameters.
If NewValue < PF
PF=NewValue
End if
End Do
End for
Compute w=0.99w
Update Best Parameters Found by each Particle
Update Best Parameters Found by the Population
Compute Velocity
Movement of Particles
End Do
Return the set of parameters related to the best tour length
found and the tour length.
The algorithm is based in a PSO framework, where
particles are initialized and iteratively are moving though
the domain of the set of parameters. The goal of the
algorithm is, for a given instance, to compute the tour with
lowest length and to compute the set of ACS parameters,
among those in DPSO, which gets the best ACS
performance. Those final parameters are related with the
TSP-instance selected.
eil101
rat99
50,00
AVG_TIME_IT
best set of parameters found by the population.
40,00
30,00
20,00
0,00
For each particle of the population its initial velocity is
set randomly. For half of the population the initial position
is set using predefined parameters assuring that for every
parameter there will be a particle containing a value
covering the full range. The positions of the other half of the
initial population is set randomly.
Parameters for the PSO (see Section II) have been set
following [13], [14]: c1=c2=2, χ=0.729, the inertia weight is
25,00
50,00
75,00
100,00
0,00
25,00
50,00
ITERATION_PSO
ITERATION_PSO
(a)
(b)
75,00
100,00
Fig 2. Average time of the swarm at first 100 iterations for instances eil101
(a) and rat99 (b). AVG_TIME is average time of the iteration (given a
fixed number of particles) and ITERATION_PSO is the number of the
iteration in the PSO-ACS algorithm.
4
kroA100
kroB100
22800,00
MIN_VALUE_ITE
MIN_VALUE_ITE
22800,00
22400,00
22000,00
22600,00
22400,00
21600,00
22200,00
0,00
25,00
50,00
75,00
100,00
0,00
ITERATION_PSO
25,00
50,00
75,00
100,00
ITERATION_PSO
(a)
(b)
kroA100
eil51
480,00
30000,00
AVG_VALUE_IT
AVG_VALUE_IT
470,00
460,00
450,00
27500,00
25000,00
440,00
22500,00
430,00
0,00
25,00
50,00
75,00
100,00
0,00
25,00
50,00
75,00
100,00
ITERATION_PSO
ITERATION_PSO
(c)
(d)
Fig. 3. First 100 iterations of the PSO-ACS algorithm. (a) and (b) are related to the minimum tour obtained at each
iteration, (c) and (d) are related to the average of the particles´ fitness values. (a) and (d) are related to the instance kroA100;
(b) is related to kroB100; and (c) to eil51. Those are examples of typical behaviors in the 100 first iterations of the algorithm.
TABLE II.
SETS OF PARAMETERS
q0
α,
β
ρ
ϕ na
P_eil51
0.36 7 0.40 1
1 0.54
P_eil76
0.21 5 0.40 1
5 0.58
P_eil101
0.71 7 0.23 2
7 0.78
P_kroA100 0.64 4 0.24 1
4 0.64
P_kroB100 0.71 1 0.08 1
39 0.86
P_rat99
0.15 3 0.28 1
9 0.95
ACS
0.10 2 0.10 1
10 0.9
ACS_GA 0.20 6 0.20 1
10 0.7
“a” have been tested for φ = 0.1 0.2 … 0.9 1 “b”
value related. Values in bold mean optimums.
Fitness
φ
0.18
426
0.20
538
0.12
629
0.12
21282
0.12
22141
0.00
1211
a
b
a
b
there is no fitness
IV. COMPUTATIONAL RESULTS
Algorithm was coded in C++ in a Pentium M 1.7 with
1GB RAM. Algorithm has been run on six of the most
widely used TSP-instances. Computational results are given
in four parts: PSO-ACS behavior, PSO-ACS optimum
values obtained, best set of parameters and comparison
among sets of parameters´ performance.
Computationally each PSO-ACS iteration shows a clear
convergence: when the “optimum” (defined by the
algorithm) number of ants and φ are nearly fixed, the
computational time is also fixed (see fig. 2). In less than 100
iterations algorithm computes an “optimum” for integer
parameters and in 200 iterations there are small differences
among the optimum found and the particles´ position for
real parameters. In Fig. 3 we can see the evolution of the
algorithm in the first 100 iterations. For the average of the
fitness of the swarm (in a given iteration), there is a
decreasing global tendency, and after iteration 75 we can
see the average of the fitness is kept on a fixed range, the
size of this range is variable as shown in (c) and (d). For the
minimum value obtained by the swarm in a given iteration,
computational results show that at the beginning there are
increasing and decreasing phases, when the particles are
exploring their local optimums and moving also to the
global one, but near iteration 100 the minimum is
5
TABLE IV.
MINIMUM TOUR LENGTH FOUND. BY PARAMETER_SET / INSTANCE
TABLE III.
AVERAGE PERFORMANCE. BY PARAMETER_SET / INSTANCE
eil51
eil76
eil101
kroA100
kroB100
rat99
P_eil51
548.04
653.68 22147.6
22718.92
1241.64
428.6ab
P_eil76
22357.24
1223.8b
428.52 544.36ab 647.28 21600.36
P_eil101
24648.12
1251.32
433.92
552.88
651.2a 24382.36
P_kroA100
430.28
548.52
645.6 21566.12a 22437.28
1234
b
P_kroB100
545.68 643.52b 21495.4b 22340.56ab
1228.8
428.6
P_rat99
429.72
553.12
662.16 21915.24
22908.16
1242.16a
PACS-1
430.28
547.92
643.8 21625.08
22348.16
1226.4
PACS-2
428.56
546.28
645.2 21640.12
22377.28
1234.16
PACS-3
429.52
546.32
649.2 21641.12
22436.6
1231.88
PACS-4
429.64
547.84
647.4 21621.08
22446.4
1242.72
PACS-5
430.6
546.28
648.24 21589.24
22412
1237.12
PACS-6
430.44
546.8
647.88 21624.2
22440.8
1241.12
PACS-7
430.2
549.84
649.04 21584.28
22457.44
1238.96
PACS-8
430.2
549
649.76 21594.56
22578.88
1245
PACS-9
430.04
546.56
651.72 21590.68
22429.6
1249.64
ACS_GA-1
428.56
547.32
644.08 21674.48
22345.48
1227.48
ACS_GA-2 427.84
544.28
643.92 21669.24
22366.84
1219.88
ACS_GA-3 427.84
643.84 21594.36
22376.16
1228.28
543.56
ACS_GA-4 427.84
543.96
643.92 21514.24
22358.48
1219.2
ACS_GA-5 428.32
643.58 21589.88
22385
1222.84
543.56
ACS_GA-6
428.4
544.52
22353.16
1224.52
642.68 21524.84
ACS_GA-7 428.52
548.24
644.76 21586.16
22373.72
1225.96
ACS_GA-8
428.8
544.44
643.56 21514.8
22363.6
1222.52
ACS_GA-9 428.24
542.84
643.57 21582.36
22354.68
1223.84
“a” expected best value. “b” best value obtained among the new sets of parameters.
Values in bold are the best values obtained.
maintained as in (a) or frequently visited as in (b). This fast
convergence can be an advantage as well as a drawback
because it can lead to a fast non-desirable convergence. We
set the reasons of this fast convergence in the PSO
framework used and mainly in the method for evaluating a
set of parameters: in a stochastic algorithm there is the
probability that a bad set of parameters could perform well,
if all the particles move into this area and the number of
iterations in this area increases leading to probably good
solutions that will cause the algorithm to remain in this nonoptimal area.
Table II shows the optimum set of parameters found
running PSO-ACS on each one of the instances selected;
P_eil51 is the set of parameters obtained running PSO-ACS
on the instance eil51, similarly for P_eil76, P_eil101..and so
on.. PACS and ACS_GA are the set of parameters proposed
by [6] and [16] respectively, considering several values of φ
(parameter that defines the neighbourhood). “Fitness” is the
minimal length tour obtained by the PSO-ACS algorithm in
the related instance. There is no clear cut rule to define the
optimal parameters even if the recommended ranges can be
guessed, also β is normally bigger than ϕ; q0 is always
bigger than 0.5; φ, percentage of vertices in the neighbour,
eil51
eil76
eil101
kroA100
kroB100
rat99
P_eil51
539
639
21470
22404
1213
426a
P_eil76
637
21318
22237
426
538a
1211
P_eil101
23764
23774
1214
428
544
638a
P_kroA100
22237
1212
427
637
21343a
538
P_kroB100
539
22199a
426
629
21282
1211
P_rat99
427
547
644
21560
22422
1211a
PACS-1
427
540
634
22236
1212
21282
PACS-2
630
22200
1212
426
538
21282
PACS-3
427
634
22179
1212
538
21282
PACS-4
427
540
630
22251
1213
21282
PACS-5
540
630
22179
1214
426
21282
PACS-6
427
638
21305
22244
1213
538
PACS-7
427
540
636
22284
1213
21282
PACS-8
632
21292
22295
1221
426
538
PACS-9
427
540
639
22284
1213
21282
ACS_GA-1
427
539
632
21330
22157o
1211
ACS_GA-2
630
21370
22237
426
538
1211
ACS_GA-3
631
21330
22295
426
538
1211
ACS_GA-4
634
21318
22231
426
538
1211
ACS_GA-5
630
21380
22258
426
538
1211
ACS_GA-6
630
21318
22268
426
538
1211
ACS_GA-7
630
21318
22274
426
538
1211
ACS_GA-8
630
21318
22241
426
538
1211
ACS_GA-9
630
21318
22237
426
538
1211
“a” expected best value; “o” best value obtained. Values in bold mean
optimums. For the PACS and ACS_GA set of parameters PACS-i means
φ=0.i
is normally less or equal to the 20%; the number of ants are
normally between 1 and 10. But we cannot set a rule
because the set of parameters for P_kroB100 is not
following those guidelines and is performing better than the
rest. In all the instances the optimum is found but this is not
relevant because of the enormous quantity of time expended
(sometimes more than half a day) and because of the
number of times an ACS algorithm is run on a given
instance.
We have run each one of the obtained set of parameters in
all of the previous selected instances, to check the efficiency
of the parameters. As such ACS is performed with 25 trials
of 2500 iterations each.
Table III and IV show the performance, based on the
average tour length (trial-based) and the minimum tour
length found respectively, for each of the sets of parameters
on each of the instances. We expect that the parameters
related to an instance will compute the best results on this
instance. Comparing this hypothesis on Tables III and IV,
computational results show that this is in fact false. Instead,
working only in this reduced set of instances, the set of
parameters for P_kroB100 can be considered as the best
overall one which is performing optimally in most of the
6
TABLE V.
TIME COMPARISON BEST SETS OF PARAMETERS
Avg. FI
Avg. Time
P_kroB100
4,53
241,29
Best of PACS
1,35
69,53
Best of GA-ACS
3,16
162,89
“Avg. FI” is the average time (considering all refereed instances) used
for finding the best solution proposed by the algorithm, considering
the time from the trial this solution was computed. “Avg. Time” is the
average computational time of the algorithm running in all the
proposed instances. In bold are the best times. For PACS and
GA_ACS lowest times for all possible Φ values are used: are named
respectively “Best of PACS” and “Best of GA-ACS”.
REFERENCES
[1]
[2]
[3]
[4]
instances and with an efficient average value.
[5]
Comparing the sets of parameters of PACS and
ACS_GA, one can observe that PACS is performing better
in bigger instances and ACS_GA in smaller ones. Further,
ACS_GA performs better on the average.
Computational times of PACS, ACS_GA and P_kroB100
set of parameters are compared in Table V. PACS perform
best in both measures and P_kroA100 is the worst. The set
of parameters of P_kroB100 is performing better than ACS
and ACS_GA in most of the instances, but it has a greater
computational time.
[6]
[7]
[8]
[9]
[10]
[11]
V. CONCLUSIONS
Computational results seem to show that there is no
uniquely optimal set of ACS parameters yielding best
quality solutions in all the TSP instances. Nevertheless the
PSO-ACS has been able to find a set of ACS parameters
that work optimally for a majority of instances unlike others
known so far.
PSO-ACS algorithm works well across different instances
because it adapts itself to the instance characteristics. But it
has a high computational overhead. A future work will try
to modify the algorithm framework to reduce this cost.
PSO-ACS also has a fast convergence that can lead to a
bad set of parameters. This may be due to two reasons: first
is the specific PSO framework used, and in modifying it we
expect to obtain better results. Secondly the way the sets of
parameters are evaluated may have to be reviewed as a bad
set of parameters could lead to a non-desired convergence.
ACKNOWLEDGMENT
D. Gómez-Cabrero thanks the University of Colombo
School of Computing for the support given while he was in
Sri Lanka. The contribution by D. Gómez-Cabrero has been
partially supported by the AVCiT of the Generalitat
Valenciana (Ref: GRUPOS03/174).
[12]
[13]
[14]
[15]
[16]
[17]
B. Adenso-Díaz and M. Laguna, “Fine-tuning of Algorithms Using
Fractional Experimental Designs and Local Search”, to appear in
Operations Research.
R. S. Barr, B. L. Golden, J. P. Kelly, M. G. C. Resende and W. R.
Stewart, “Designing and Reporting on Computational Experiments
with Heuristic Methods”, Journal of Heuristics 1:1 9-32 1995.
Mauro Birrattari, Thomas Stützle, Luis Paquete and Klaus
Varrentrapp,
“A
Racing
Algorithm
For
Configuring
Metaheuristics”. In W. B. Langdon et al editors, GECCO 2002:
Proceedings of the Genetic and Evolutionary Computation
Conference, pp. 11--18, Morgan Kaufmann Publishers, San
Francisco, CA, USA, 2002.
S. P. Coy, B. L. Golden, G. C. Runger and E. A. Wasil , “Using
Experimental Design to Find Effective parameter settings for
heuristics,” Journal of Heuristics, vol. 7, nº 1, pp. 77-97, 2001.
M. Dorigo, Optimization, Learning, and Natural Algorithms (in
Italian). PhD Thesis, Dip. Elettronica, Politecnico di Milano, 1992.
M. Dorigo and L.M. Gambardella, “Ant Colony System: A
Cooperative Learning Aproach to the Travelling Salesman Problem,”
IEEE Transactions on Evolutionary Computation, 1(1):53-66, 1997.
M. Dorigo, V. Maniezzo, and A. Colorni. Positive Feedback as a
Search Strategy. Technical Report
91-016, Dip. Elettronica,
Politecnico di Milano, 1991.
M. Dorigo, V. Maniezzo, and A. Colorni, “The Ant System:
Optimization by a Colony of Cooperating Agents,” IEEE
Transactions on Systems, Man and Cybernetics, Part B, 26(1):29-42,
1996.
M. Dorigo and T. Stützle, Ant Colony Optimization, MIT Press, 2004.
R.C. Eberhart, P.K. Simpson and R.W. Robbins, Computational
Intelligence PC Tools, Academic Press Professional: Boston 1996.
L.M. Gambardella and M. Dorigo, “Ant-Q: A reinforcement Learning
Approach to the Symmetric and Asymmetric Travelling Salesman
Problems”, in Proceedings of the IEEE International Conference on
Evolutionary Computation (ICEC’96), pages 252-260. Morgan
Kaufmann, 1995.
D. Gies and Y. Rahmat-Samii, “Particle Swarm Optimization for
Reconfigurable Phase Differentiated Array Design,” Microwave and
Optical Technology Letters, vol. 38, nº 3, pp. 168-175, 2003.
J. Kennedy and R.C. Eberhart, “Particle Swarm Optimization,” Proc.
Of the IEEE International Conference on Neural Networks,
Piscataway, NJ, USA, pp. 1942-1948, 1995.
J. Kennedy and R.C. Eberhart, Swarm Intelligence, Morgan
Kaufmann Publishers, 2001.
E.C. Laskari, K.E. Parsopoulos and M.N. Vrahatis, “Particle Swarm
Optimization for Integer Programming,” Proceedings of the 2002
IEEE Congress on Evolutionary Computation, pp. 1582-1587, 2002.
M. L. Pilat and T. White, “Using Genetic Algorithms to optimize
ACS-TSP,” Proceedings of the Third International Workshop on Ant
Algorithms, pages 282-287, 2002.
G. Reinelt, “TSPLIB- A travelling Salesman Problem Library for TSP
Applications,” ORSA Journal of Computing, 3:376-384, 1991.
| 9cs.NE
|
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 5, 2011
Systematic and Integrative Analysis of Proteomic
Data using Bioinformatics Tools
Rashmi Rameshwari
Dr. T. V. Prasad
Asst. Professor, Dept. of Biotechnology,
Manav Rachna International University,
Faridabad, India
Dean (R&D), Lingaya‟s University,
Faridabad, India
Abstract— The analysis and interpretation of relationships
between biological molecules is done with the help of networks.
Networks are used ubiquitously throughout biology to represent
the relationships between genes and gene products. Network
models have facilitated a shift from the study of evolutionary
conservation between individual gene and gene products towards
the study of conservation at the level of pathways and complexes.
Recent work has revealed much about chemical reactions inside
hundreds of organisms as well as universal characteristics of
metabolic networks, which shed light on the evolution of the
networks. However, characteristics of individual metabolites
have been neglected in this network. The current paper provides
an overview of bioinformatics software used in visualization of
biological networks using proteomic data, their main functions
and limitations of the software.
Keywords- Metabolic network; protein interaction network;
visualization tools.
I.
INTRODUCTION
Molecular interaction network visualization is one of the
most user-friendly features developed for the simulation
process of biological interactions [29]. Drawing of any
molecule for example, protein may seem to be easy but
generating the same protein with all the types of conformation
that it can attain during any interactions and to simulate this
process is quite difficult. In this context one of the greatest
manually produced molecular structures of its time was done
by Kurt Kohn's 1999 map of cell cycle control. Protein
interactions network visualization deals with territory that is
very similar to that of protein-protein interaction prediction, but
differs in several key ways. proteomics data are often
associated with pathways or protein interactions, and both of
these are easily visualized as networks[22]. Even types of data
not normally viewed as networks (e.g. microarray results) are
often painted onto signaling, metabolic, or other pathways or
protein interaction networks for visualization and analysis.
Visualization and analysis tools are commonly used to
interact with proteomic data. Most, visualization tools were
developed simply for illustrating the big picture represented by
protein-protein interaction data or expression data, for
qualitative assessment, not necessarily for quantitative analysis
or prediction. Expression and interaction experiments tend to
be on such a large scale that it is difficult to analyze them, or
indeed grasp the meaning of the results of any analysis. Visual
representation of such large and scattered quantities of data
allows trends that are difficult to pinpoint numerically to stand
out and provide insight into specific avenues of molecular
functions and interactions that may be worth exploring first out
of the bunch, either through confirmation or rejection and then
later of significance or insignificance to the research problem at
hand. With a few recent exceptions, visualization tools were
not designed with the intent of being used for analysis so much
as to show the workings of a molecular system more clearly.
Visualization tools also do not actually predict molecular
interactions themselves or their characteristics. On the contrary,
visualization tools only create a graphical representation of
what is already "known" in literature and in molecular
interaction repositories such as the Gene Ontology (GO) [7]. A
side-effect of displaying interaction networks by treating some
proteins as members of more general family groupings or going
by interactions in different tissues or as analogues in other
tissues or organisms is the apparent display of a protein-protein
or other molecular interaction that is inferred but may or may
not have actually been observed and documented, something
that could be misconstrued as a predicted interaction.
The most significant difference between molecular
interaction network visualization and molecular interaction
prediction is the nature of the information it provides [11].
Protein-protein interaction prediction is characterized by its
concern with how proteins will interact, where they will
interact, under what conditions they were interact, and what
parts are necessary for their interaction. These characteristics
are governed by physical and chemical properties of the
proteins or other molecules involved, which may be actual
molecules that have been described through extensive
proteomics experiments or hypothetical, in silico generated
species that are being investigated for pharmaceutical and other
applications. Interaction network visualization tools are given
no knowledge of physical or chemical properties of the proteins
that, why they interact. As a result, the information they
inadvertently impart concerns only whether or not certain
proteins putatively interact with certain other proteins, not how
they interact, when they interact, or why they interact.
29 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 5, 2011
biological systems. Comprehensive data of protein interactions
is also suitable for systems level evolutionary analysis.
There are many commercial software such as Ingenuity
Pathway Analysis (Figure 2), MetaCore and Pathway studio,
designed to visualize high-throughput data in the context of
biological networks. Biological networks have a scale-free and
modular organization. In a scale free networks the degree of
distribution follows a power-law, which means that only a
small number of nodes, called hubs are highly connected [12].
Hubs usually play essential roles in biological systems [13]. On
the other hand, groups of proteins with similar functions tend to
form clusters or modules in the network architecture. Many
commercial software for network visualization follow this law.
Metacore is an integrated knowledge database and software
suite for pathway analysis of experimental data and gene lists.
It is based on manually curetted databases of human proteinprotein, Protein-DNA and protein compound interactions. This
package includes easy to use, intuitive tools for search, data
visualization, mapping and exchange, biological networks and
interactomes [32].
Figure:(A)
Figure: (B)
Figure1: Comparative visualization of Protein-Network drawn by different
tools like Pajek (Fig.A), and Cytoscape (Fig. B). Here genes are represented
as nodes and interaction as edges.
II.
BACKGROUND AND RELATED WORK
The other software tool known as Pathway studio, is based
on a mammalian database, named: ResNet 5 mammalian,
which is generated by text mining of the PubMed database and
43 full text journals [14]. The advantages of using this tool are
that it increases the depth of analysis of high-throughput data
generation experiments like microarray gene expression,
proteomics, metabolomics. Enables data sharing in a common
analysis environment. This tool simplifies keeping up to date
with the literature and brings this knowledge into an analysis
environment. This also enables visualization of gene
expression values and status in the context of protein
interaction networks and pathways. However, free software
like Pathway Voyager (Figure 5), GenMapp and Cytoscape are
also available. Pathway Voyager applies flexible approach that
uses the KEGG database [27] to pathway mapping [17].
GenMapp (Figure 6) is also designed to visualize gene
expression data on maps representing biological pathways and
gene groupings. GenMapp has more option which can modify
or design new pathways and apply complex criteria for viewing
gene expression data on pathways [14].
With the recent advances in high-throughput technologies,
software tools have been developed to visualize and analyze
large-scale data. This paper deals with various visualization
techniques for proteomic data. Major emphasis is on network
graph generated during protein-protein interaction. Many tools
are being used for this purpose which is based on different
algorithm. For example, Pajek [6] and Cytoscape [8] use force
directed layout algorithm which produces graph by computing
force between pairs of nodes in each iteration of the
optimization process. The networks can be visualized as
indicated in Fig 1A and Fig 1B.
As protein interactions data also helps in study related to
evolutionary analysis. In a new era, it is necessary to
understand how the components which involve in biological
systems from the various biological data and knowledge of
components at molecular level. It reveals the structure of
biological systems and lead to “ontological” comprehension of
Figure 2: G-Protein signaling_Ras family GTPases in kinase cascades. Image
generated by Ingenuity Pathway Analysis.
30 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 5, 2011
Clustered graphs are common occurrences in the biological
field. Examples of pre-clustered graphs include clustering of
proteins or genes based on some biological functionality,
structural geometry, expression pattern or other chemical
property [11].
Figure 3: A Network generated by Metacore Software [32]
III.
LIMITATIONS AND FUTURE DEVELOPMENTS
After the completion of Human Genome Project, 36,000
genes were discovered, which has potential to synthesize more
than 1,00,000 proteins [19], less than 50% of these genes can
be assigned a putative biological function on the basis of
sequence data [18]. With the advancement of technology many
software has been designed to explore biological networks, like
protein interactions network, protein-DNA interactions etc.,
that are based on databases like DIP [31], MINT [30], of
mammalian database. The tools represented in this paper are
applicable to a wide range of problems and their distinct
features make them suitable for a wide range of applications.
Figure 4: Actin Cytoskeleton Regulation, network generated by Pathway
Studio
In any “post- omic” analysis two essential concepts must be
applied to understand biological functions at a systems level.
First integrate different levels of information and second, view
cells in terms of their underlying network structure. The
information about biological entity is scattered in different
databases [28]. Hence, the information retrieval from diverse
databases is done, which is bit time consuming. Current
databases are good for the analysis of a particular protein or
small interaction networks. But they are not as useful for
integration of complex information on cellular regulation
pathways, networks, cellular roles and clinical data and they
lack coordination and the ability to exchange information
between multiple data sources [20]. There is need of software
that can integrate information from different database as well
as from diverse sources.
To analyze data, at present many software are there like
Ingenuity Pathway analysis, Metacore and Pathway Studio.
They work on owner curetted database at the same time there
high price make them unaffordable for academic institute to
use them. At the same time Cytoscape which has many
properties for visualization of high throughput data, can be
alternative for users [15].
However network constructed with Cytoscape are
sometimes liable to show errors. So there is need to improve
quality of available curetted databases and also to develop
integrative knowledge bases that are especially designed to
construct biological networks.
Figure 5: Interactive KEGG Pathway display. The screenshot illustrates
KEGG pathway mapping for the glycolysis / gluconeogenesis pathway using
the predicted ORFeome of the GAMOLA annotated L. acidophilus NCFM
genome as query template [19].
31 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 5, 2011
Figure 6: Myometrial Relaxation and contraction Pathway, Image generated
by GenMapp.
A metabolic network is a reliable source of information.
The reconstruction of GRNs is largely promoted by advances
in high-throughput technologies, which enable to measure the
global response of a biological system to specific interventions.
For instance, large-scale gene expression monitoring using
DNA microarrays is a popular technique for measuring the
abundance of mRNAs. However, integration of different types
of „omics‟ data from genomics, proteomics and metabolomic
studies can be undertaken. Although the metabolic network has
important features for drug discovery, its use in case of human
is very limited [18]. Further, Proteomics may yield crucial
information on the regulation of biological functions and the
mechanism of diseases. In this sense it is a highly promising
area for drug discovery. Hence, additional efforts will be
required for metabolic network reconstruction and analysis.
IV.
CONCLUSION
From the above tools it can be concluded that metabolic
pathways stored as directed acyclic graphs can be considered a
basic concept for the visualization tool for metabolic pathway.
With respect to visualization, single network views provide
little more than brief glimpses of the large datasets.
Visualization tools need to support many different types of
views, each network view at a different level of detail.
Dynamic navigation from one view to another will be a key to
showing the connection between different views. Navigating
from one time series point to another, for instance, could
involve a view showing only the differences between the two
time points. If the time points are consecutive, the number of
differences will tend to be quite small. A similar approach
could be applied to sub-cellular localization information as
well. To adequately address each of these issues, active
cooperation is required between a variety research fields
including graph drawing, information visualization, network
analysis and of course biology. Though all the mentioned tool
differs significantly in its approach for pathway
reconstructions. Hence for future a tool is needed which
describe all pathways that make up a cell and how they interact
as a system in the overall physiology of an organism is
required.
Figure 7: Pathway voyager mapping procedure [17].
REFERENCES
[1]
Lenzerini M: Data Integration: A Theoretical Perspective. PODS 2002 ,
243-246.
[2] B., Bar-Joseph, Z., Gerber, G.K., Lee, T.I., Rinaldi, N.J., Yoo, J.Y.,
Robert, F., Gordon, D.Fraenkel, E., Jaakkola, T.S., Young, R.A.,
Gifford, D.K. (2003). Computational discovery of gene module and
regulatory networks. Nat Biotechnol. 21(11):1337-42.
[3] Fields S, Song O: A novel genetic system to detect protein-protein
interactions. Nature 1989, 340:245-246.
[4] Spirin, V. and Mirny, L.A. (2003) PNAS, 100,12123-128
[5] Jeong H, Mason SP, Barabasi AL, Oltvai ZN: Lethality and centrality in
protein networks. Nature 2001, 411:41-42.
[6] Batagelj V, Mrvar A: Pajek – Program for Large Network Analysis.
Connections 1998, 21:47-57.
[7] The Gene Ontology Consortium: Gene Ontology: tool for the unification
of biology. Nat Genet 2000, 25:25-29.
[8] Shannon P, Markiel A, Ozier O, Baliga NS, Wang JT, Ramage D, Amin
N, Schwikowski B, Ideker T: Cytoscape: a software environment for
integrated models of biomolecular interaction networks. Genome Res
2003, 13(11):2498-2504.17
[9] Hermjakob H, Montecchi-Palazzi L, Lewington C, Mudali S, Kerrien S,
Orchard S, Vingron M, Roechert B, Roepstorff P, Valencia A, Margalit
H, Armstrong J, Bairoch A, Cesareni G, Sherman D, Apweiler R:
IntAct: an open source molecular interaction database. Nucleic Acids
Res 2004, (32 Database):D452-455
[10] Alfarano, C., Andrade, C.E., Anthony, K., Bahroos, N., Bajec, M.,
Bantoft, K., Betel, D., Bobechko, B., Boutilier, K., Burgess, E., et al.
(2005) The Biomolecular Interaction Network Database and related tools
2005 update Nucleic Acids Res, . 33, D418–D42.
[11] Rashmi Rameshwari and Dr. T. V. Prasad, “A Survey of Various
Protein-Protein Interaction Tools”, Proc. of National Conference on
32 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 5, 2011
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
Advances in Knowledge Management NCAKM ‟10, Lingaya‟s
University, Faridabad, 2010
Barabasi AL, Oltvai ZN. Network biology: understanding the cell‟s
functional organization. Nat Rev Genet 2004;5:101-13
Han JD, Bertin N, Hao T, Goldberg DS, Berriz GF, Zhang LV, et al.
Evidence for dynamically organized modularity in the yeast proteinprotein interaction network. Nature 2004;430:88-93.
Dahlquist KD, Salomonis N, Vranizan K, Lawlor SC, Conklin BR.
GenMAPP, a new tool for viewing and analyzing microarray data on
biological pathways. Nat Genet 2002;31:19-20.
Shannon P, Markiel A, Ozier O, Baliga NS, Wang JT, Ramage D, et al.
Cytoscape: A Software Environment for Integrated Models of
Biomolecular Interaction Networks. Genome Res 2003;13:2498-504.
Daraselia N, Yuryev A, Egorov S, Novichkova S, Nikitin A, Mazo I.
Extracting human protein interactions from MEDLINE using a fullsentence parser. Bioinformatics 2004;20:604-11.
Altermann E, Klaenhammer TR. PathwayVoyager: pathway mapping
using the Kyoto Encyclopedia of Genes and Genomes (KEGG) database.
BMC Genomics 2005;6:60.
Overington JP, Al Lazikani B, Hopkins AL. How many drug targets are
there? Nat Rev Drug Discov 2006;5:993-6.
Lander ES, Linton LM, Birren B, Nusbaum C, Zody MC, Baldwin J, et
al. Initial sequencing and analysis of the human genome. Nature
2001;409:860-921.
Tucker CL, Gera JF, Uetz P. Towards an understanding of complex
protein networks. Trends in Cell Biology 2001;11:102-6.
Funahashi,A. et al. (2003) CellDesigner: a process diagram editor for
gene-regulatory and biochemical networks. Biosilico, 1, 159–162.
Kell,D.B. (2006) Systems biology, metabolic modelling and
metabolomics in drug discovery and development. Drug Discovery
Today, 11, 1085–1092.
Kitano,H. et al. (2005) Using process diagrams for the graphical
representation of biological networks. Nat Biotechnol., 23, 961–966.
Nikitin,A. et al. (2003) Pathway studio –- the analysis and navigation of
molecular networks. Bioinformatics, 19, 2155–2157.
Altermann E, Klaenhammer TR: GAMOLA: a new local solution for
sequence annotation and analyzing draft and finished prokaryotic
genomes. OMICS 2003, 7:161-169.
[26] Goesmann A, Haubrock M, Meyer F, Kalinowski J, Giegerich R: PathFinder: reconstruction and dynamic visualization of metabolic pathways.
Bioinformatics 2002, 18:124-129.
[27] Ogata,H., Goto,S., Sato,K., Fujibuchi,W., Bono,H. andKanehisa,M.
(1999) Kegg: Kyoto encyclopedia of genes and genomes. Nucleic Acids
Res., 27, 29–34.
[28] Alfarano,C. et al. (2005) The biomolecular interaction network database
and related tools 2005 update. Nucleic Acids Res., 33, 418–424.
[29] Kohn,K.W. et al. (2006) Molecular interaction maps of bioregulatory
networks: a general rubric for systems biology. Mol. Biol. Cell, 17, 1–
13.
[30] Zanzoni,A. et al. (2002) MINT: a molecular interaction database. FEBS
Lett., 513, 135–140.
[31] Xenarios,I. et al. (2000) DIP: the database of interacting proteins.
Nucleic Acids Res., 28, 289–291.
[32] MetaCore Pathway Analysis Software, available at www.genego.com
AUTHORS PROFILE
Ms. Rashmi Rameshwari has received two master‟s degree from one from
T.M.B.U., Bhagalpur, Bihar and other from Jamia Hamdard, New Delhi in the
area of biotechnology and bioinformatics respectively. She is currently
associated with Manav Rachna International University as Assistant Professor
in Dept. of Biotechnology. Her research interests include systems biology,
proteomics, Microarray Technology, Chemoinformatics, etc.
Dr. T. V. Prasad received his master‟s degree in Computer Science from
Nagarjuna University, AP India and doctoral degree from Jamia Milia Islamia
University, New Delhi, India. With over 16 years of academic and
professional experience, he has a deep interest in planning and executing
major IT projects, pursuing research interest in CS/IT and bioinformatics. He
has authored over 65 publications in reputed journals and conferences. He has
also authored 4 books. He has also held respectable positions such as Deputy
Director with Bureau of Indian Standards, New Delhi. His areas of interest
include bioinformatics, artificial intelligence, consciousness studies, computer
organization and architecture. He is a member of reputed bodies like Indian
Society of Remote Sensing, Computer Society of India, APBioNet,
International Association of Engineers, etc.
33 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 5, 2011
Table 1
COMPARATIVE STATEMENT OF VARIOUS NETWORK VISUALIZATION AND ANALYSIS SOFTWARE
S.
N
o.
1
Parameters/
Features
Ingenuity
Pathway Analysis
Metacore
Pathway Studio
GenMAPP
Cytoscape
Pathway
Voyager
PathFinder
Developed
by
Ingenuity Systems
Inc.
GeneGo Inc.
Ariadne
Genomics Inc.
Gladstone
Institutes
Description
Database of
Biological
networks created
from millions of
relationships,
between proteins,
genes ,complexes,
cells, tissues,
drugs and diseases
A manually
curetted
database of
human
Proteinprotein
interaction &
Protein-DNA
interactions,
transcriptional
factors,
Signaling,
metabolism
and bioactive
molecules
Archived
Maps were
drawn based
on textbooks,
articles and
public
pathway
databases or
generated
from the
public
database
maintained by
the Gene
Ontology
Project
3
4
Availability
Based on
database
Commercial
Ingenuity
pathways
knowledge base
Commercial
Human
Database
Public
KEGG
Public
KEGG
Public
KEGG
Public
RDBMS is usec
along with
KEGG
5
6
7
Web access
Platform
Special
features
Enabled
Java 1.5 or higher
Solution is given
to Pharmaceutical,
Bio-technology,
and Academics
Enabled
Java
has graphics
tools for
constructing
and modifying
pathways.
Used for
analyzing
microarray
data include
statistical
filters and
pattern finding
algorithms
such as
hierarchical
clustering
Enabled
Java
mRNA Expression
profiles, Gene
annotations from
Gene Ontology
(GO) & KEGG.
Incorporates
statistical analysis
Enabled
Perl/TK
No dedicated
hardware or
software are
necessary to
analyze given
datasets
Enabled
Perl/TK
Aim at
comparing
pathways at
microscopic
level and
therefore it can
be used for
dynamic
visualizations of
metabolisms
from a whole
genome
perspective
8
Drawbacks
Limited to Human,
Mouse, Rat and
Canine
Enabled
Java
unique ability
to
concurrently
visualize
multiple types
of
experimental
data
such as gene
expression,
proteomic,
metabolomics,
SAGE, MPSS,
SNP, HCS,
HTS,
microRNA
and
clinical and
pre-clinical
phenotypic
data
Specific server
is required
These databases
are a collection of
eukaryotic
molecular
interactions
generated by
MedScan Text to
knowledge suit
using the entire
PubMed database
and 43 full text
journals. Also
works with public
database of
signaling and
biochemical
pathways
Commercial
Mammalian
Database: ResNet
5, ResNet plant
database, KEGG,
BIND, HPRD
Enabled
Python
Analyze
proteomic,
Metabolomics
and other high
throughput data.
Eric Altermann
and Todd R
Klaenhammer
Utilizes the
KEGG online
database for
pathway
mapping of
partial and
whole
prokaryotic
genomes
Alexander
Goesmann et.al
2
Paul Shanon,
Andrew Markiel et
al.
Software for
integrating
biomolecular
interaction
Networks with
high-throughput
expression data
and other
molecular states
into a unified
conceptual
framework
Generally
used to
explore
Microarray
data
Focuses only on
high-level
networks, lowlevel models of
components and
interactions
addressed by
ongoing projects
such as Ecell
(Tomita et al.
1999), VirtualCell;
mechanisms
for bridging highlevel interactions
with lower level,
physico-chemical
For certain
selectable
pathways (e.g.
Ribosomal
reference
pathway)
KEGG does not
yet support
organism
independent
marking. For
practical
reasons, no hits
will be displayed
for these
pathways
Uses RDBMS
based internet
application.
Being integrated
into the locally
developed
genome
annotation
system GENDB
with extended
functionality
It offers a wizard
interface for
creating very
simple network
and data queries
and only
Biological
Networks
provides a
language
interface for
expressing such
queries.
A tool for the
dynamic
visualization of
metabolic
pathways based
on annotation
data.
34 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 5, 2011
S.
N
o.
9
10
11
12
13
14
15
16
17
Parameters/
Features
Ingenuity
Pathway Analysis
GenMAPP
Cytoscape
Pathway
Voyager
PathFinder
GAMOLA
GENDB
Integrated
with
Storing
result
Data format
Only based on
Ingenuity Product
Present
Gene Go
MedScan
MAPP
Present
Present
Present
Present
Present
Present
Not Specific.
Not Specific
ResNet Exchange
XML formats.
PSI-MI,
GML/XGMML
Fasta Files
EMBL OR
Genbank
Graph
comparison
for species
Graphical
user
Interface
Visualization
Technique
Ease of use
and report
generation
Graphical
Representati
on
Classificatio
n Technique
Present
Present
Present
CSV, GPML,
WikiPathways
, MAPP
Present
Present
Present
Present
Present
Present
Present
Present
Present
Present
Present
Present
Present
Present
Present
Present
Present
Present
Excellent
Excellent
Excellent
Excellent
Very Good
Good
Good
Present
Present
Present
Present
Present
Present
Present
Compare affected
pathways and
phenotypes across
time, dose, or
patient population.
Disease,
Tissue,
Species, Sub
cellular
localization,
Interactions,
Metabolites
Internet
Explorer 6.0
or higher
4 GB
Interrogate
Different species,
Multiple genomes
Hierarchical
clustering
None
Hierarchical
clustering
Chunks and
Subway
Internet Explorer
6.0 or higher
Internet Explorer
6.0 or higher
512 Mb
Internet
Explorer 6.0 or
higher
512 Mb
Internet Explorer
6.0 or higher
1 GB
Internet
Explorer 6.0
or higher
512 Mb
Linux 2.1, 3.0
or Red Hat 9.0
Windows
Windows
Window
Windows
UNIX, Windows
www.genego.c
om
www.ariadnegena
mics.com
www.genmap
p.org/
www.cytoscape.or
g
www.bioinform
at
ics.ai.sri.com/pt
ools
http://bibi
serv.TechFak
.UniBielefeld
.DE/pathfind
er/
[32]
[24]
[14]
[15]
[17]
[25], [26]
Web
browser
Internet Explorer
6.0 or higher
19
Memory
20
Operating
System
supported
Reference
URL
512 Mb
(minimum), 1GB
(Recommended)
Vista, Window XP
and Macintosh
10.3,10.4, 10.5
www.ingenuity.co
m/
References
[12]
22
Pathway Studio
models of specific
biological
processes are
required
Numerous
18
21
Metacore
512 Mb
35 | P a g e
www.ijacsa.thesai.org
| 5cs.CE
|
ABOUT VON NEUMANN’S PROBLEM FOR LOCALLY
COMPACT GROUPS
arXiv:1702.07955v1 [math.GR] 25 Feb 2017
FRIEDRICH MARTIN SCHNEIDER
Abstract. We note a generalization of Whyte’s geometric solution to the von
Neumann problem for locally compact groups in terms of Borel and clopen
piecewise translations. This strengthens a result of Paterson on the existence
of Borel paradoxical decompositions for non-amenable locally compact groups.
Along the way, we study the connection between some geometric properties of
coarse spaces and certain algebraic characteristics of their wobbling groups.
1. Introduction
In his seminal article [18] von Neumann introduced the concept of amenability for groups in order to explain why the Banach-Tarski paradox occurs only for
dimension greater than two. He proved that a group containing an isomorphic
copy of the free group F2 on two generators is not amenable. The converse, i.e.,
the question whether every non-amenable group would have a subgroup being isomorphic to F2 , was first posed in print by Day [5], but became known as the von
Neumann problem (or sometimes von Neumann-Day problem). The original question has been answered in the negative by Ol’šanskiı̆ [19]. However, there are very
interesting positive solutions to variants of the von Neumann problem in different
settings: a geometric solution by Whyte [27], a measure-theoretic solution by Gaboriau and Lyons [9] and its generalization to locally compact groups by Gheysens
and Monod [14], as well as a Baire category solution by Marks and Unger [13].
Whyte’s geometric version reads as follows.
Theorem 1.1 (Theorem 6.2 in [27]). A uniformly discrete metric space of uniformly bounded geometry is non-amenable if and only if it admits a partition whose
pieces are uniformly Lipschitz embedded copies of the 4-regular tree.
In particular, the above applies to Cayley graphs of finitely generated groups
and in turn yields a geometric solution to the von Neumann problem.
The aim of the present note is to extend Whyte’s relaxed version of the von
Neumann conjecture to the realm of locally compact groups. For this purpose, we
need to view the result from a slightly different perspective. Given a uniformly
discrete metric space X, its wobbling group (or group of bounded displacement ) is
defined as
W (X) := {α ∈ Sym(X) | ∃r ≥ 0 ∀x ∈ X : d(x, α(x)) ≤ r}.
Wobbling groups have attracted growing attention in recent years [11, 12, 3]. Since
the 4-regular tree is isomorphic to the standard Cayley graph of F2 , one can easily
Date: 28th February 2017.
2010 Mathematics Subject Classification. Primary 22D05, 43A07, 20E05, 20F65.
This research has been supported by funding of the German Research Foundation (reference
no. SCHN 1431/3-1) as well as by funding of the Excellence Initiative by the German Federal and
State Governments.
1
2
FRIEDRICH MARTIN SCHNEIDER
reformulate Whyte’s in terms of semi-regular subgroups. Let us recall that a subgroup G ≤ Sym(X) is said to be semi-regular if no non-identity element of G has
a fixed point in X.
Corollary 1.2 (Theorem 6.1 in [27]). A uniformly discrete metric space X of
uniformly bounded geometry is non-amenable if and only if F2 is isomorphic to a
semi-regular subgroup of W (X).
For a finitely generated group G, the metrics generated by any two finite symmetric generating sets containing the neutral element are equivalent and hence give
rise to the very same wobbling group W (G). It is easy to see that W (G) is just the
group of piecewise translations of G, i.e., a bijection α : G → G belongs to W (G) if
and only if exists a finite partition P of G such that
∀P ∈ P ∃g ∈ G :
α|P = λg |P .
Furthermore, we note that the semi-regularity requirement in the statement above
cannot be dropped: in fact, van Douwen [6] showed that W (Z) contains an isomorphic copy of F2 , despite Z being amenable. As it turns out, F2 embeds into the
wobbling group of any coarse space of positive asymptotic dimension (see Proposition 4.3 and Remark 4.4).
We are going to present a natural counterpart of Corollary 1.2 for general locally
compact groups. Let G be a locally compact group. We call a bijection α : G → G
a clopen piecewise translation of G if there exists a finite partition P of G into
clopen subsets such that
∀P ∈ P ∃g ∈ G :
α|P = λg |P ,
i.e., on every member of P the map α agrees with a left translation of G. It is
easy to see that the set C (G) of all clopen piecewise translations of G constitutes
a subgroup of the homeomorphism group of the topological space G and that the
mapping Λ : G → C (G), g 7→ λg embeds G into C (G) as a regular, i.e., semi-regular
and transitive, subgroup. Similarly, a bijection α : G → G is called a Borel piecewise
translation of G if there exists a finite partition P of G into Borel subsets with
∀P ∈ P ∃g ∈ G :
α|P = λg |P .
Likewise, the set B(G) of all Borel piecewise translations of G is a subgroup of the
automorphism group of the Borel space of G and contains C (G) as a subgroup.
For a locally compact group G, both B(G) and C (G) are reasonable analogues
of the wobbling group. Yet, the mere existence of an embedding of F2 as a semiregular subgroup of B(G), or even C (G), does not prevent G from being amenable.
In fact, there are many examples of compact (thus amenable) groups that admit
F2 as a (non-discrete) subgroup and hence as a semi-regular subgroup of C (G).
For example, since F2 is residually finite, it embeds into the compact group formed
by the product of its finite quotients. Therefore, we have to seek for a topological
analogue of semi-regularity, which amounts to a short discussion.
Remark 1.3. Let X be a set. A subgroup G ≤ Sym(X) is semi-regular if and only
if there exists a (necessarily surjective) map ψ : X → G such that ψ(gx) = gψ(x)
for all g ∈ G and x ∈ X. Obviously, the latter implies the former. To see the
converse, let σ : X → X be any orbit cross-section for the action of G on X, i.e.,
σ(X) ∩ Gx = {σ(x)} for every x ∈ X. Since G is semi-regular, for each x ∈ X there
is a unique ψ(x) ∈ G such that ψ(x)σ(x) = x. For all g ∈ G and x ∈ X, we have
gψ(x)σ(gx) = gψ(x)σ(x) = gx = ψ(gx)σ(gx),
which readily implies that ψ(gx) = gψ(x). So, ψ : X → G is as desired.
The purpose of this note is to show the following.
ABOUT VON NEUMANN’S PROBLEM FOR LOCALLY COMPACT GROUPS
3
Theorem 1.4. Let G be a locally compact group. The following are equivalent.
(1) G is not amenable.
(2) There exist a homomorphism ϕ : F2 → C (G) and a Borel measurable map
ψ : G → F2 such that ψ ◦ ϕ(g) = λg ◦ ψ for all g ∈ F2 .
(3) There exist a homomorphism ϕ : F2 → B(G) and a Borel measurable map
ψ : G → F2 such that ψ ◦ ϕ(g) = λg ◦ ψ for all g ∈ F2 .
We remark that any map ϕ as in (2) or (3) of Theorem 1.4 has to be injective.
In view of the discussion above, we also note that for finitely generated discrete
groups the statement of Theorem 1.4 reduces to Whyte’s geometric solution to the
von Neumann problem. More specifically, the existence of a map ψ as in (2) or (3)
above may be thought of as a Borel variant of the semi-regular embedding condition
in Corollary 1.2. In general, we cannot arrange for ψ to be continuous, as there
exist non-amenable connected locally compact groups
Both (2) and (3) of Theorem 1.4 may be considered relaxed versions of containing
F2 as a discrete subgroup: according to a result of Feldman and Greenleaf [7], if
H is a σ-compact metrizable closed (e.g., countable discrete) subgroup of a locally
compact group G, then the right coset projection G → H \ G, x 7→ Hx admits a
Borel measurable cross-section τ : H \G → G, and hence the H-equivariant map
ψ : G → H,
x 7→ xτ (Hx)−1
is Borel measurable, too. This particularly applies if H ∼
= F2 is discrete.
The proof of Theorem 1.4 combines a result of Rickert resolving the original
von Neumann problem for almost connected locally compact groups (Theorem 3.3)
with a slight generalization of Whyte’s result for coarse spaces (Theorem 2.2) and
in turn refines an argument of Paterson proving the existence of Borel paradoxical
decompositions for non-amenable locally compact groups [21]. In fact, Theorem 1.4
implies Paterson’s result [21].
Corollary 1.5 (Paterson [21]). A locally compact group G is non-amenable if and
only if it admits a Borel paradoxical decomposition, i.e., there exist finite partitions
P and Q of G into Borel subsets and gP , hQ ∈ G (P ∈ P, Q ∈ Q) such that
[
[
G = · gP P ∪· · hQ Q.
P ∈P
Q∈Q
This note is organized as follows. Building on some preparatory work concerning
coarse spaces done in Section 2, we prove Theorem 1.4 in Section 3. Since our
approach to proving Theorem 1.4 involves wobbling groups, and there has been
recent interest in such groups, we furthermore include some complementary remarks
about finitely generated subgroups of wobbling groups in Section 4.
2. Revisiting Whyte’s result
Our proof of Theorem 1.4 will make use of Whyte’s argument [27] – in the form
of Corollary 2.3. More precisely, we will have to slightly generalize his result from
metric spaces to arbitrary coarse spaces. However, this will just require very minor
adjustments, and we only include a proof for the sake of completeness.
For convenience, let us recall some terminology from coarse geometry as it may
be found in [24]. For a relation E ⊆ X × X on a set X and x ∈ X, A ⊆ X, let
[
E[x] := {y ∈ X | (x, y) ∈ E},
E[A] := {E[z] | z ∈ A}.
A coarse space is a pair (X, E ) consisting of a set X and a collection E of subsets
of X × X (called entourages) such that
• the diagonal ∆X = {(x, x) | x ∈ X} belongs to E ,
4
FRIEDRICH MARTIN SCHNEIDER
• if F ⊆ E ∈ E , then also F ∈ E ,
• if E, F ∈ E , then E ∪ F, E −1 , E ◦ F ∈ E .
A coarse space (X, E ) is said to have bounded geometry if
∀E ∈ E ∀x ∈ X :
E[x] is finite,
and (X, E ) has uniformly bounded geometry if
∀E ∈ E ∃m ≥ 0 ∀x ∈ X :
|E[x]| ≤ m.
Among the most important examples of coarse spaces are metric spaces: if X is
a metric space, then we obtain a coarse space (X, EX ) by setting
EX := {E ⊆ X × X | sup{d(x, y) | (x, y) ∈ E} < ∞}.
Another crucial source of examples of coarse spaces is given by group actions.
Indeed, if G is a group acting on a set X, then we obtain a coarse space (X, EG ) of
uniformly bounded geometry by
EG := {R ⊆ X × X | ∃E ⊆ G finite : R ⊆ {(x, gx) | x ∈ X, g ∈ E}}.
Note that the coarse structure induced by a finitely generated group G acting on
itself by left translations coincides with the coarse structure on G generated by the
metric associated with any finite symmetric generated subset of G containing the
neutral element.
Now we come to amenability. Adopting the notion from metric coarse geometry,
we call a coarse space (X, E ) of bounded geometry amenable if
∀θ > 1 ∀E ∈ E ∃F ⊆ X finite, F 6= ∅ :
|E[F ]| ≤ θ|F |,
which is (easily seen to be) equivalent to saying that
∃θ > 1 ∀E ∈ E ∃F ⊆ X finite, F 6= ∅ :
|E[F ]| ≤ θ|F |.
This definition is compatible with the existing notion of amenability for group
actions (Proposition 2.1). Recall that an action of a group G on a set X is amenable
if the space ℓ∞ (X) of all bounded real-valued functions on X admits a G-invariant
mean, i.e., there exists a positive linear functional µ : ℓ∞ (X) → R with µ(1) = 1
and µ(f ◦ g) = µ(f ) for all f ∈ ℓ∞ (X) and g ∈ G.
Proposition 2.1 (cf. Rosenblatt [25]). An action of a group G on a set X is
amenable if and only if the coarse space (X, EG ) is amenable.
Proof. Generalizing Følner’s work [8] on amenable groups, Rosenblatt [25] showed
that an action of a group G on a set X is amenable if and only if
∀θ > 1 ∀E ⊆ G finite ∃F ⊆ X finite, F 6= ∅ :
|EF | ≤ θ|F |,
which is easily seen to be equivalent to the amenability of (X, EG ).
Let us turn our attention towards Theorem 1.1. A straightforward adaptation of
Whyte’s original argument readily provides us with the following only very slight
generalization (Theorem 2.2). For a binary relation E ⊆ X × X, we will denote the
associated undirected graph by
Γ(E) := (X, {{x, y} | (x, y) ∈ E}).
Furthermore, let gr(f ) := {(x, f (x)) | x ∈ X} for any map f : X → Y . Our proof
of Theorem 2.2 will utilize the simple observation that, for a map f : X → X, the
graph Γ(gr(f )) is a forest, i.e., it contains no cycles, if and only if f has no periodic
points, which means that P (f ) := {x ∈ X | ∃n ≥ 1 : f n (x) = x} is empty.
Theorem 2.2. Let d ≥ 3. A coarse space (X, E ) of bounded geometry is nonamenable if and only if there is E ∈ E such that Γ(E) is a d-regular forest.
ABOUT VON NEUMANN’S PROBLEM FOR LOCALLY COMPACT GROUPS
5
Proof. (⇐=) Due to a very standard fact about isoperimetric constants for regular
trees [2, Example 47], if E ⊆ X × X is symmetric and Γ(E) is a d-regular tree, then
|E[F ]| ≥ (d − 1)|F | for every finite subset F ⊆ X. Of course, this property passes
to d-regular forests, which readily settles the desired implication.
(=⇒) Suppose that (X, E ) is not amenable. Then there is a symmetric entourage
E ∈ E such that |E[F ]| ≥ d|F | for every finite F ⊆ X. Consider the symmetric
relation R := E \ ∆X ⊆ X × X. Since |R[x]| < ∞ for every x ∈ X and
|R[F ]| ≥ |E[F ] \ F | ≥ |E[F ]| − |F | ≥ (d − 1)|F |
for every finite subset F ⊆ X, the Hall harem theorem [1, Theorem H.4.2] asserts
that there exists a function f : X → X with gr(f ) ⊆ R and |f −1 (x)| = d − 1 for
all x ∈ X. Notice that f does not have any fixed points as R ∩ ∆X = ∅. Since
the set of f -orbits of its elements
S partitions the set P (f ), we may choose a subset
P0 ⊆ P (f ) such that P (f ) = · x∈P0 {f n (x) | n ∈ N}. Furthermore, choose functions
g, h : P0 × N → X such that, for all x ∈ P0 and n ≥ 1,
• g(x, 0) = x and h(x, 0) = f (x),
• {g(x, n), h(x, n)} ∩ P (f ) = ∅,
• f (g(x, n)) = g(x, n − 1) and f (h(x, n)) = h(x, n − 1).
It follows that g and h are injective functions with disjoint ranges. Now we define
f∗ : X → X by setting
g(z, n + 2) if x = g(z, n) for z ∈ P0 and even n ≥ 0,
g(z, n − 2) if x = g(z, n) for z ∈ P and odd n ≥ 3,
0
f∗ (x) :=
f 2 (x)
if
x
=
h(z,
n)
for
z
∈
P
0 and n ≥ 2,
f (x)
otherwise
for x ∈ X. We observe that
gr(f∗ ) ⊆ gr(f 2 )−1 ∪ gr(f 2 ) ∪ gr(f ).
In particular, gr(f∗ ) ⊆ E ◦ E and therefore gr(f∗ ) ∈ E . Moreover, it follows that
P (f∗ ) ⊆ P (f ). However, for every x ∈ P (f ), there exists a smallest m ∈ N such that
f m (x) ∈ P0 , and we conclude that f∗m+1 (x) = f∗ (f m (x)) = g(f m (x), 2) ∈
/ P (f ) and
hence f∗m+1 (x) ∈
/ P (f∗ ), which readily implies that x ∈
/ P (f∗ ). Thus, P (f∗ ) = ∅.
In particular, f∗ has no fixed points. Furthermore,
(f −1 (x) ∪ {g(z, n − 2)}) \ {g(z, n + 1)} if x = g(z, n) for z ∈ P0
and even n ≥ 2,
(f −1 (x) ∪ {g(z, n + 2)}) \ {g(z, n + 1)} if x = g(z, n) for z ∈ P0
and odd n ≥ 1,
−1
f∗ (x) =
−1
(f
(x)
∪
{h(z,
n
+
2)})
\
{h(z,
n
+
1)}
if
x = h(z, n) for z ∈ P0
and n ≥ 1,
−1
(f
(x)
∪
{h(z,
2)})
\
{z}
if
x = f (z) for z ∈ P0 ,
−1
f (x)
otherwise
and thus |f∗−1 (x)| = d−1 for each x ∈ X. Hence, Γ(gr(f∗ )) is a d-regular forest.
Just as Theorem 1.1 corresponds to Corollary 1.2, we can translate Theorem 2.2
into an equivalent statement about wobbling groups. Given a coarse space (X, E ),
we define its wobbling group (or group of bounded displacement ) as
W (X, E ) := {α ∈ Sym(X) | gr(α) ∈ E }.
Since the 4-regular tree is isomorphic to the standard Cayley graph of the free group
on two generators, we now obtain the following consequence of Theorem 2.2.
6
FRIEDRICH MARTIN SCHNEIDER
Corollary 2.3. A coarse space X of bounded geometry is non-amenable if and only
if F2 is isomorphic to a semi-regular subgroup of W (X).
We note that Corollary 2.3 for group actions has been applied already (though
without proof) in the recent work of the author and Thom [26, Corollary 5.12],
where a topological version of Whyte’s result for general (i.e., not necessarily locally
compact) topological groups in terms of perturbed translations is established. In
the present note, Corollary 2.3 will be used to prove Theorem 1.4, which generalizes
Whyte’s result to locally compact groups by means of clopen and Borel piecewise
translations and is in turn quite different to [26, Corollary 5.12].
3. Proving the main result
In this section we prove Theorem 1.4. For the sake of clarity, recall that a locally
compact group G is said to be amenable if there is a G-invariant1 mean on the space
Cb (G) of bounded continuous real-valued functions on G, i.e., a positive linear map
µ : Cb (G) → R with µ(1) = 1 and µ(f ◦ λg ) = µ(f ) for all f ∈ Cb (G) and g ∈ G.
In preparation of the proof of Theorem 1.4, we note the following standard fact,
whose straightforward proof we omit.
Lemma 3.1. Let H be a subgroup of a locally compact group G and consider the
usual action of G on the set G/H of left cosets of H in G. If µ : ℓ∞ (G/H) → R is a
G-invariant mean and ν : Cb (H) → R is an H-invariant mean, then a G-invariant
mean ξ : Cb (G) → R is given by
ξ(f ) := µ(xH 7→ ν((f ◦ λx )|H ))
(f ∈ Cb (G)).
It is a well-known fact (see Section 2 in [10]) that a locally compact group G
(considered together with a left Haar measure) is amenable if and only if there
exists a G-invariant mean on L∞ (G), i.e., a positive linear map µ : L∞ (G) → R
such that µ(1) = 1 and µ(f ◦ λg ) = µ(f ) for all f ∈ Cb (G) and g ∈ G. An easy
calculation now provides us with the following.
Lemma 3.2. Let G be a locally compact group.
(1) A mean µ : L∞ (G) → R is G-invariant if and only if µ is B(G)-invariant.
(2) Let H be a locally compact group, let ϕ : H → B(G) be a homomorphism
and ψ : G → H be Borel measurable with ψ ◦ ϕ(g) = λg ◦ ψ for all g ∈ H.
If G is amenable, then so is H.
Proof. (1) Clearly, B(G)-invariance implies G-invariance. To prove the converse,
suppose that µ is G-invariant. Let α ∈ B(G) and let P be a finite partition of G
into Borel subsets and gP ∈ G (P ∈ P) with α|P = λgP |P for each P ∈ P. Now,
X
X
µ(f ◦ α) =
µ ((f ◦ α) · 1P ) =
µ ((f ◦ λgP ) · 1P )
P ∈P
=
X
P ∈P
=
X
P ∈P
P ∈P
X
=
µ (f · (1gP P ))
µ f · 1P ◦ λg−1
P
P ∈P
µ f · 1α(P ) = µ(f )
for every f ∈ L∞ (G), as desired.
(2) Let ν : L∞ (G) → R be a G-invariant mean. Define µ : Cb (H) → R by
µ(f ) := ν(f ◦ ψ)
(f ∈ Cb (H)).
It is easy to see that µ is a mean. Furthermore, (1) asserts that
µ(f ◦ λg ) = ν(f ◦ λg ◦ ψ) = ν(f ◦ ψ ◦ ϕ(g)) = ν(f ◦ ψ) = µ(f )
1In case of ambiguity, invariance shall always mean left invariance.
ABOUT VON NEUMANN’S PROBLEM FOR LOCALLY COMPACT GROUPS
for all f ∈ Cb (H) and g ∈ H. Hence, µ is H-invariant.
7
We note that Lemma 3.2 readily settles the implication (3)=⇒(1) of Theorem 1.4.
The remaining part of the proof of Theorem 1.4 will rely on some structure theory
for locally compact groups – most importantly the following remarkable result of
Rickert [22] building on [23]. We recall that a locally compact group G is said to
be almost connected if the quotient of G by the connected component of its neutral
element is compact.
Theorem 3.3 (Theorem 5.5 in [22]). Any almost connected, non-amenable, locally
compact group has a discrete subgroup being isomorphic to F2 .
Now everything is prepared to prove our main result.
Proof of Theorem 1.4. Evidently, (2) implies (3) as C (G) is a subgroup of B(G).
Furthermore, (3) implies (1) due to Lemma 3.2 and the non-amenability of F2 .
(1)=⇒(2). Let G be a non-amenable locally compact group. It follows by classical work of van Dantzig [4] that any locally compact group contains an almost
connected, open subgroup (see, e.g., [20, Proposition 12.2.2 (c)]). Choose any almost connected, open (and hence closed) subgroup H of G. We will distinguish
two cases depending upon whether H is amenable.
H is not amenable. According to Theorem 3.3, H contains a discrete subgroup F
being isomorphic to F2 , and so does G. By a result of Feldman and Greenleaf [7],
the right coset projection π : G → F \ G, x 7→ F x admits a Borel measurable
cross-section, i.e., there exists a Borel measurable map τ : F \ G → G such that
π ◦ τ = idF \G . Clearly, the F -equivariant map ψ : G → F, x 7→ xτ (F x)−1 is Borel
measurable. This readily settles the first case: the maps
ϕ : F2 ∼
= F → C (G),
g 7→ λg
and ψ are as desired.
H is amenable. Since G is not amenable, Lemma 3.1 implies that the action
of G on the set G/H is not amenable. By Proposition 2.1, this means that the
coarse space X := (G/H, EG ) is not amenable. Due to Corollary 2.3, there exists
an embedding ϕ : F2 = F (a, b) → W (X) such that ϕ(F2 ) is semi-regular. Thus, by
definition of W (X), there exists some finite subset E ⊆ G such that
∀x ∈ {a, b} ∀z ∈ X ∃g ∈ E :
ϕ(x)(z) = gz.
Hence, we find a finite partition P of X along with gP , hP ∈ E (P ∈ P) such that
ϕ(a)|P = λgP |P and ϕ(b)|P = λhP |P for every P ∈ P. Consider the projection
π : G → G/H, x 7→ xH. Since H is an open subgroup of G, the quotient topology on
G/H, i.e., the topology induced by π, is discrete. So, π −1 (P) = {π −1 (P ) | P ∈ P}
is a finite partition of G into clopen subsets. What is more,
[
[
[
G = · π −1 (ϕ(a)(P )) = · π −1 (gP P ) = · gP π −1 (P ),
P ∈P
P ∈P
P ∈P
[
[
[
G = · π −1 (ϕ(b)(P )) = · π −1 (hP P ) = · hP π −1 (P ).
P ∈P
P ∈P
P ∈P
Therefore, we may define ϕ : {a, b} → C (G) by setting
ϕ(a)|π−1 (P ) = λgP |π−1 (P ) ,
ϕ(b)|π−1 (P ) = λhP |π−1 (P )
∗
(P ∈ P).
∗
Consider the unique homomorphism ϕ : F2 → C (G) satisfying ϕ |{a,b} = ϕ. Since
π ◦ ϕ(x) = ϕ(x) ◦ π for each x ∈ {a, b}, it follows that π ◦ ϕ∗ (w) = ϕ(w) ◦ π for
every w ∈ F2 . Appealing to Remark 1.3, we find a mapping ψ : G/H → F2 such
that ψ(ϕ(w)(z)) = wψ(z) for all w ∈ F2 and z ∈ G/H. Since the quotient space
8
FRIEDRICH MARTIN SCHNEIDER
G/H is discrete, the map ψ ∗ := ψ ◦ π : G → F2 is continuous and therefore Borel
measurable. Finally, we note that
ψ ∗ (ϕ∗ (w)(x)) = ψ(π(ϕ∗ (w)(x))) = ψ(ϕ(w)(π(x))) = wψ(π(x)) = wψ ∗ (x)
for all w ∈ F2 and x ∈ G, as desired. This completes the proof.
Let us deduce Paterson’s result [21] from Theorem 1.4.
Proof of Corollary 1.5. (⇐=) This is clear.
(=⇒) Let G be a non-amenable locally compact group. By Theorem 1.4, there
exist a homomorphism ϕ : F2 → B(G) and a Borel measurable map ψ : G → F2
with ψ ◦ ϕ(g) = λg ◦ ψ for all g ∈ F2 . Consider any paradoxical decomposition of
F2 given by P, Q, (gP )P ∈P , (hQ )Q∈Q . Taking a common refinement of suitable
finite Borel partitions of G corresponding to the elements ϕ(gP ), ϕ(hQ ) ∈ B(G)
(P ∈ P, Q ∈ Q), we obtain a finite Borel partition R of G along with mappings
σ : P × R → G and τ : Q × R → G such that
ϕ(gP )|R = λσ(P,R) |R
ϕ(hQ )|R = λτ (Q,R) |R
for all P ∈ P, Q ∈ Q, and R ∈ R. By ψ being Borel measurable, the refinements
ψ −1 (P) ∨ R and ψ −1 (Q) ∨ R are finite Borel partitions of G. What is more,
[
[
G = · ψ −1 (gP P ) ∪· · ψ −1 (hQ Q)
P ∈P
Q∈Q
[
[
= · ϕ(gP )(ψ −1 (P )) ∪· · ϕ(hQ )(ψ −1 (Q))
P ∈P
=
Q∈Q
[
·
ϕ(gP )(ψ
−1
(P ) ∩ R) ∪·
(P,R)∈P×R
=
[
·
[
·
ϕ(hQ )(ψ −1 (Q) ∩ R)
(Q,R)∈Q×R
σ(P, R)(ψ
−1
(P,R)∈P×R
(P ) ∩ R) ∪·
[
·
τ (Q, R)(ψ −1 (Q) ∩ R).
(Q,R)∈Q×R
Thus, the data
ψ −1 (P) ∨ R,
ψ −1 (Q) ∨ R,
(σ(P, R))(P,R)∈P×R ,
(τ (Q, R))(Q,R)∈Q×R
constitute a Borel paradoxical decomposition of G.
4. Further remarks on wobbling groups
We are going to conclude with some additional remarks about wobbling groups,
which we consider noteworthy complements of Corollary 2.3. As van Douwen’s
result [6] shows, the presence of F2 as a subgroup of the wobbling group does not
imply the non-amenability of a coarse space. As it turns out, containment of F2 is
just a witness for positive asymptotic dimension (Proposition 4.3).
Let us once again recall some terminology from [24]. The asymptotic dimension
asdim(X, E ) of a coarse space (X, E ) is defined as the infimum of all those n ∈ N
such that, for every E ∈ E , there exist C0 , . . . , Cn ⊆ P(X) with
S
S
• X = C0 ∪ . . . ∪ Cn ,
• (C
S × D) ∩ E = ∅ for all i ∈ {0, . . . , n} and C, D ∈ Ci with C 6= D,
• {C × C | C ∈ Ci , i ∈ {0, . . . , n}} ∈ E .
The concept of asymptotic dimension was first introduced for metric spaces by
Gromov [15] and later extended to coarse spaces by Roe [24]. We refer to [24] for
a thorough discussion of asymptotic dimension, related results and examples.
As we aim to describe positive asymptotic dimension in algebraic terms, we will
unravel the zero-dimensional case in the following lemma. Let us denote by [R] the
equivalence relation on a set X generated by a given binary relation R ⊆ X × X.
ABOUT VON NEUMANN’S PROBLEM FOR LOCALLY COMPACT GROUPS
9
Lemma 4.1. Let (X, E ) be a coarse space. Then asdim(X, E ) = 0 if and only if
[E] ∈ E for every E ∈ E .
Proof. (=⇒) Let E ∈ E . Without loss of generality, assume that E contains ∆X .
As asdim(X, E ) = 0, there exists C0 ⊆ P(X) such that
S
(1) X = C0 ,
(2) S
(C × D) ∩ E = ∅ for all C, D ∈ C0 with C 6= D,
(3) {C × C | C ∈ C0 } ∈ E .
As ∆X ⊆ E, assertion (2) implies that any two distinct members of C0 are disjoint.
Hence,
S(1) gives that C0 is a partition of X. By (2), the induced equivalence relation
R := {C × C | C ∈ C0 } contains E, thus [E]. By (3), it follows that [E] ∈ E .
(⇐=) Let E ∈ E . It is straightforward to check that C0 := {[E][x] | x ∈ X} has
the desired properties. Hence, asdim(X, E ) = 0.
Our proof of Proposition 4.3 below will rely upon the following slight modification
of the standard argument for residual finiteness of free groups. For an element
w ∈ F2 = F (a, b), let us denote by |w| the length of w with respect to the generators
a and b, i.e., the smallest integer n ≥ 0 such that w can be represented as a word
of length n in the letters a, a−1 , b, b−1 .
Lemma 4.2. Let w ∈ F2 with w 6= e and let M := {0, . . . , 2|w|}. Then there exists
a homomorphism ϕ : F2 → Sym(M ) such that ϕ(w) 6= e and |ϕ(v)(i) − i| ≤ 2|v| for
all i ∈ M and v ∈ F2 .
Proof. Let (k0 , . . . , kn ) ∈ (Z \ {0})n × ZP
and (ℓ0 , . . .P
, ℓn ) ∈ Z × (Z \ {0})n such that
n
k0 ℓ0
kn ℓn
w = a b · · · a b . Of course, |w| = i=0 |ki | + ni=0 |ℓi |. Let
Xi−1
Xi−1
Xi
Xi−1
|ℓj |
|kj | +
|ℓj |,
βi :=
|kj | +
αi :=
j=0
j=0
j=0
j=0
for i ∈ {0, . . . , n} and let βn+1 := |w|. We will define a map ϕ : {a, b} → Sym(M ).
First, let us define ϕ(a) ∈ Sym(M ) by case analysis as follows: if i ∈ [2αj , 2βj+1 ]
for some j ∈ {0, . . . , n} with kj > 0, then
i + 2 if i is even and i ∈ [2αj , 2βj+1 − 2],
i − 1 if i = 2β ,
j+1
ϕ(a)(i) :=
i
−
2
if
i
is
odd
and i ∈ [2αj + 3, 2βj+1 − 1],
i − 1 if i = 2αj + 1,
if i ∈ [2αj , 2βj+1 ] for some j ∈ {0, . . . , n} with kj < 0, then
i − 2 if i is even and i ∈ [2αj + 2, 2βj+1 ],
i + 1 if i = 2α ,
j
ϕ(a)(i) :=
i
+
2
if
i
is
odd
and i ∈ [2αj + 1, 2βj+1 − 3],
i + 1 if i = 2βj+1 − 1,
S
and if i ∈
/ {[2αj , 2βj+1 ] | j ∈ {0, . . . , n}, kj 6= 0}, then ϕ(a)(i) := i. Analogously,
let us define ϕ(b) ∈ Sym(M ) by case analysis as follows: if i ∈ [2βj , 2αj ] for some
j ∈ {0, . . . , n} with ℓj > 0, then
i + 2 if i is even and i ∈ [2βj , 2αj − 2],
i − 1 if i = 2α ,
j
ϕ(b)(i) :=
i − 2 if i is odd and i ∈ [2βj + 3, 2αj − 1],
i − 1 if i = 2βj + 1,
10
FRIEDRICH MARTIN SCHNEIDER
if i ∈ [2βj , 2αj ] for some j ∈ {0, . . . , n} with ℓj < 0, then
i − 2 if i is even and i ∈ [2βj + 2, 2αj ],
i + 1 if i = 2β ,
j
ϕ(b)(i) :=
i
+
2
if
i
is
odd
and i ∈ [2βj + 1, 2αj − 3],
i + 1 if i = 2αj − 1,
S
and if i ∈
/ {[2βj , 2αj ] | j ∈ {0, . . . , n}, ℓj 6= 0}, then ϕ(b)(i) := i. It is easy to
check that ϕ(a) and ϕ(b) are well-defined permutations of M , and that moreover
|ϕ(x)(i) − i| ≤ 2 for each x ∈ {a, b} and all i ∈ M . Considering the unique
homomorphism ϕ∗ : F2 → Sym(M ) with ϕ∗ |{a,b} = ϕ, we observe that
ϕ∗ (w)(0) = ϕ(a)kn ϕ(b)ℓn · · · ϕ(a)k0 ϕ(b)ℓ0 (0) = 2|w|
and thus ϕ∗ (w) 6= e. Also, |ϕ∗ (v)(i) − i| ≤ 2|v| for all i ∈ M and v ∈ F2 .
For the sake of clarity, we recall that a group is locally finite if each of its finitely
generated subgroups is finite. For a subset S of a group G, we will denote by hSi
the subgroup of G generated by S.
Proposition 4.3. Let X be a coarse space of uniformly bounded geometry. The
following are equivalent.
(1) asdim(X) > 0.
(2) W (X) is not locally finite.
(3) F2 embeds into W (X).
Proof. We will denote by E the coarse structure of X.
(2)=⇒(1). Let us recall a general fact: for a finite group G and any set M , the
group GM is locally finite. Indeed, considering a finite subset S ⊆ GM and the
induced equivalence relation R := {(x, y) ∈ M × M | ∀α ∈ S : α(x) = α(y)} on M ,
we observe that N := {R[x] | x ∈ M } is finite, due to G and S being finite. The
map π : M → N, x 7→ R[x] induces a homomorphism ϕ : GN → GM , α 7→ α ◦ π.
Evidently, S is contained in the finite group ϕ(GN ), and so is hSi.
Suppose now that asdim(X) = 0. Consider a finite subset S ⊆ W (X). We aim
to show that H := hSi is finite. To this end, we first observe that
Y
ϕ: H →
Sym(Hx), α 7→ (α|Hx )x∈X
x∈X
S
constitutes a well-defined embedding. Since D := {gr(α) | α ∈ S} belongs to E ,
Lemma 4.1 asserts that E := [D] ∈ E , too. Note that gr(α) ∈ E for all α ∈ H.
Hence, Hx ⊆ E[x] for every x ∈ X. Due to X having uniformly bounded geometry,
there exists m ≥ 0 such that |E[x]| ≤ m and thus |Hx|
Q ≤ m for every x ∈ X. Now,
let M := {0, . . . , m − 1}. It follows that the group x∈X Sym(Hx) is isomorphic to
a subgroup of Sym(M )X , and so is H by virtue of ϕ. Since H is finitely generated
and Sym(M )X is locally finite by the remark above, this implies that H is finite.
(3)=⇒(2). This is trivial.
(1)=⇒(3). Suppose that asdim(X) > 0. By Lemma 4.1, there exists E ∈ E such
that [E] ∈
/ E .SWithout loss of generality, we may assume that ∆X ⊆ E = E −1 .
Hence, [E] = {E n | n ∈ N}. For each n ∈ N, let us define
Tn := x ∈ X n+1 |{x0 , . . . , xn }| = n + 1, ∀i ∈ {0, . . . , n − 1} : (xi , xi+1 ) ∈ E .
Claim. For every n ∈ N and every finite subset F ⊆ X, there exists x ∈ Tn such
that {x0 , . . . , xn } ∩ F = ∅.
Proof of claim. Let n ∈ N and let F ⊆ X be finite. Put ℓ := (n + 1)(|F | + 1).
Since E ∈ E and [E] ∈
/ E , we conclude that E ℓ * E ℓ−1 . Let x0 , . . . , xℓ ∈ X such
ℓ−1
that (x0 , xℓ ) ∈
/E
and (xi , xi+1 ) ∈ E for every i ∈ {0, . . . , ℓ − 1}. As ∆X ⊆ E, it
ABOUT VON NEUMANN’S PROBLEM FOR LOCALLY COMPACT GROUPS
11
follows that |{x0 , . . . , xℓ }| = ℓ + 1. Applying the pigeonhole principle, we find some
j ∈ {0, . . . , ℓ−n} such that {xj , . . . , xj+n }∩F = ∅. Hence, y0 := xj , . . . , yn := xj+n
are as desired.
Since N := F2 \ {e} is countable, we may recursively apply the claim above and
choose a family (xw )w∈N such that
(i) xw ∈ T2|w| for every w ∈ N ,
(ii) {xw,0 , . . . , xw,2|w| } ∩ {xv,0 , . . . , xv,2|v| } = ∅ for any two distinct v, w ∈ N .
Let w ∈ N and define Dw := {xw,0 , . . . , xw,2|w| }. Due to Lemma 4.2, there exists a
homomorphism ϕw : F2 → Sym(Dw ) such that ϕw (w) 6= e and
ϕw (v)(xw,i ) ∈ {xw,j | j ∈ {0, . . . , 2|w|}, |i − j| ≤ 2|v|}
for all v ∈ F2 , i ∈ {0, . . . , 2|w|}. Since (xw,i , xw,i+1 ) ∈ E for i ∈ {0, . . . , 2|w| − 1},
it follows that gr(ϕw (v)) ⊆ E 2|v| for all v ∈ F2 . As Dw and Dv are disjoint for any
distinct v, w ∈ N , we may define a homomorphism ϕ : F2 → Sym(X) by setting
(
ϕw (v)(x) if x ∈ Dw for some w ∈ N,
ϕ(v)(x) :=
x
otherwise
for v ∈ F2 and x ∈ X. By construction, ϕ is an embedding, and furthermore
[
gr(ϕ(v)) ⊆ ∆X ∪ {gr(ϕw (v)) | w ∈ N } ⊆ E 2|v| ∈ E
for every v ∈ F2 . Hence, the image of ϕ is contained in W (X), as desired.
Remark 4.4. The assumption of uniformly bounded geometry in Theorem 1.4 is
needed only to prove that (2) implies (1). In fact, a similar argument as in the proof
of (1)=⇒(3) (not involving Lemma 4.2 though) shows that the wobbling group of
any coarse
Q space not having uniformly bounded geometry contains an isomorphic
copy of n∈N Sym(n), hence F2 .
One might wonder whether Proposition 4.3 could have been deduced readily
from van Douwen’s result [6] on F2 embedding into W (Z). However, there exist uniformly discrete metric spaces of uniformly bounded geometry and positive
asymptotic dimension whose wobbling group does not contain an isomorphic copy
of W (Z) (see Example 4.7). We clarify the situation in Proposition 4.5.
As usual, a group is called residually finite if it embeds into a product of finite
groups, and a group is called locally residually finite if each of its finitely generated
subgroups is residually finite. Let us recall from [24] that a map f : X → Y between
two coarse spaces X and Y is bornologous if, for every entourage E of X, the set
{(f (x), f (y)) | (x, y) ∈ E} is an entourage of Y .
Proposition 4.5. Let X be a coarse space. The following are equivalent.
(1) There is a bornologous injection from Z into X.
(2) W (X) is not locally residually finite.
(3) W (X) contains a subgroup being isomorphic to W (Z).
Remark 4.6. (i) For groups there is no difference between positive asymptotic
dimension and the existence of a bornologous injection of Z: a group has asymptotic
dimension 0 if and only if it is locally finite, and any group which is not locally
finite admits a bornologous injection of Z by a standard compactness argument
(see, e.g., [17, IV.A.12]). However, for arbitrary coarse spaces, even of uniformly
bounded geometry, the situation is slightly different (see Example 4.7).
(ii) One may equivalently replace Z by N in item (1) of Proposition 4.5: on the
one hand, the inclusion map constitutes a bornologous injection from N into Z; on
12
FRIEDRICH MARTIN SCHNEIDER
the other hand, there is a bornologous bijection f : Z → N given by
(
2n
if n ≥ 0,
f (n) :=
(n ∈ Z).
2|n| − 1 if n < 0
Unless explicitly stated otherwise, we always understand N as being equipped with
the coarse structure generated by the usual (i.e., Euclidean) metric.
(iii) Any bornologous injection f : X → Y between two coarse spaces X and Y
induces an embedding ϕ : W (X) → W (Y ) via
(
f (α(f −1 (y))) if y ∈ f (X),
ϕ(α)(y) :=
(α ∈ W (X), y ∈ Y ).
y
otherwise
Hence, by (ii), the groups W (N) and W (Z) mutually embed into each other, and
thus Z may equivalently be replaced by N in item (3) of Proposition 4.5.
Proof of Proposition 4.5. (1)=⇒(3). This is due to Remark 4.6(iii).
(3)=⇒(2). It suffices to show that W (Z) is not locally residually finite. A result
of Gruenberg [16] states that, for a finite group F , the restricted wreath product
F ≀ Z = F (Z) ⋊ Z (i.e., the lamplighter group over F ) is residually finite if and only
Sn−1
if F is abelian. For n ≥ 1, the action of Sym(n) ≀ Z on Z = · r=0 nZ + r given by
(α, m).(nk + r) := n(m + k) + αm+k (r)
α ∈ Sym(n)(Z) , m, k ∈ Z, 0 ≤ r < n
defines an embedding of Sym(n) ≀ Z into Sym(Z), the image of which is contained
in W (Z) as supz∈Z |z − (α, m).z| ≤ n(|m| + 1) for every (α, m) ∈ Sym(n) ≀ Z. Since
the embedded lamplighter groups are finitely generated and not residually finite for
n ≥ 3, it follows that W (Z) is not locally residually finite.
(2)=⇒(1). Let E denote the coarse structure of X. If X does not have bounded
geometry, then there exist E ∈ E and x ∈ X such that E[x] is infinite, and any
thus existing injection f : Z → X with f (Z) ⊆ E[x] is bornologous. Hence, we
may without loss of generality assume that X has bounded geometry. On the other
hand, there must exist E ∈ E and x ∈ X such that [E][x] is infinite. Otherwise,
W (X) would
S have to be locally residually finite: for any finite subset F ⊆ W (X),
since E := {gr(α) | α ∈ F } ∈ E , the homomorphism
Y
hF i →
Sym([E][x]), α 7→ α|[E][x] x∈X
x∈X
would embed hF i into a product of finite groups. So, let E ∈ E and x ∈ X such that
[E][x] is infinite. S
Without loss of generality, we may assume that ∆X ⊆ E = E −1 .
Therefore, [E] = {E n | n ∈ N}. We conclude that E n [x] 6= E n+1 [x] and thus
Rn := f ∈ X N f0 = x, |{f0 , . . . , fn }| = n + 1, ∀i ∈ N : (fi , fi+1 ) ∈ E
is non-empty for all
Q n ∈ N. As (Rn )n∈N is a chain
T of closed subsets of the compact
topological space m∈N E m [x], we have R := n∈N Rn 6= ∅. Since any member of
R is a bornologous injection from N into X, this implies (1) by Remark 4.6(ii).
Example 4.7. Let I be a partition of N into finite intervals with supI∈I |I| = ∞.
Consider the metric space X := (N, d) given by
(
|x − y|
if x, y ∈ I for some I ∈ I ,
d(x, y) :=
(x, y ∈ N).
max(x, y) otherwise
It is easy to see that X has uniformly bounded geometry. Moreover, by Lemma 4.1
and the unboundedness assumption for the interval lengths, it follows that X has
positive asymptotic dimension. On the other hand, essentially by finiteness of the
considered intervals, there is no bornologous injection from N into X. Due to
Proposition 4.5, this readily implies that W (Z) does not embed into W (X).
ABOUT VON NEUMANN’S PROBLEM FOR LOCALLY COMPACT GROUPS
13
The interplay between certain geometric properties of coarse spaces on the one
hand and algebraic peculiarities of their wobbling groups on the other is a subject
of recent attention [12, 3]. It would be interesting to have further results in that
direction, e.g., to understand if (and how) specific positive values for the asymptotic
dimension may be characterized in terms of wobbling groups.
Acknowledgments
The author would like to thank Andreas Thom for interesting discussions about
Whyte’s variant of the von Neumann conjecture, as well as Warren Moors and Jens
Zumbrägel for their helpful comments on earlier versions of this note.
References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
Tullio Ceccherini-Silberstein and Michel Coornaert, The Hall Harem Theorem, In: Cellular
Automata and Groups, Springer Monographs in Mathematics, Springer Berlin Heidelberg
(2010), pp. 391–401.
Tullio Ceccherini-Silberstein, Rostislav I. Grigorchuk, and Pierre de la Harpe, Amenability
and paradoxical decompositions for pseudogroups and discrete metric spaces, Proc. Steklov
Inst. Math. 224 (1999), pp. 57–97.
Yves Cornulier, Irreducible lattices, invariant means, and commensurating actions, Math. Z.
279 (2015), no. 1–2, pp. 1–26.
David van Dantzig, Zur topologischen Algebra. III. Brouwersche und Cantorsche Gruppen,
Compositio Math. 3 (1936), pp. 408–426.
Mahlon M. Day, Amenable semigroups, Illinois J. Math. 1 (1957), pp. 509–544.
Eric K. van Douwen, Measures invariant under actions of F2 , Topology and its Applications
34 (1990), pp. 53–68.
Jacob Feldman and Frederick P. Greenleaf, Existence of Borel transversals in groups, Pacific
J. Math. 25 (1968), pp. 455–461.
Erling Følner, On groups with full Banach mean value, Math. Scand. 3 (1955), pp. 243–254.
Damien Gaboriau and Russell Lyons, A measurable-group-theoretic solution to von Neumann’s problem, Invent. Math. 177 (2009), no. 3, pp. 533–540.
Frederick P. Greenleaf, Invariant means on topological groups and their applications, Van
Nostrand Mathematical Studies, No. 16. Van Nostrand Reinhold Co., New York-Toronto,
Ont.-London, 1969, pp. ix+113.
Kate Juschenko and Nicolas Monod, Cantor systems, piecewise translations and simple
amenable groups, Ann. of Math. (2) 178 (2013), no. 2, pp. 775–787.
Kate Juschenko and Mikael de la Salle, Invariant means for the wobbling group, Bull. Belg.
Math. Soc. Simon Stevin 22 (2015), no. 2, pp. 281–290.
Andrew Marks and Spencer Unger, Baire measurable paradoxical decompositions via matchings, Adv. Math. 289 (2016), pp. 397–410.
Maxime Gheysens and Nicolas Monod, Fixed points for bounded orbits in Hilbert spaces,
August 2015, arXiv: 1508.00423[math.GR], to appear in Annales scientifiques de l’École
normale supérieure.
Michail Gromov, Asymptotic invariants of infinite groups. In: Geometric group theory, Vol.
2 (Sussex, 1991). London Math. Soc. Lecture Note Ser. 182, Cambridge Univ. Press, Cambridge, 1993, pp. 1–295.
Karl W. Gruenberg, Residual properties of infinite soluble groups, Proc. London Math. Soc.
(3) 7 (1957), pp. 29–62.
Pierre de la Harpe, Topics in geometric group theory, Chicago Lectures in Mathematics.
University of Chicago Press, Chicago, IL, 2000, pp. vi+310.
John von Neumann, Über die analytischen Eigenschaften von Gruppen linearer Transformationen und ihrer Darstellungen, Math. Z. 30 (1929), no. 1, pp. 3–42.
Alexander Ju. Ol’šanskiı̆, On the question of the existence of an invariant mean on a group,
Uspekhi Mat. Nauk 35 (1980), no. 4(214), pp. 199–200.
Theodore W. Palmer, Banach algebras and the general theory of ∗-algebras. Vol. 2, Encyclopedia of Mathematics and its Applications 79. Cambridge University Press, Cambridge,
2001, pp. i–xii and 795–1617.
Alan L. T. Paterson, Nonamenability and Borel paradoxical decompositions for locally compact groups, Proc. Amer. Math. Soc. 96 (1986), pp. 89–90.
Neil W. Rickert, Amenable groups and groups with the fixed point property, Trans. Amer.
Math. Soc. 127 (1967), pp. 221–232.
14
FRIEDRICH MARTIN SCHNEIDER
[23] Neil W. Rickert, Some properties of locally compact groups, J. Austral. Math. Soc. 7 (1967),
pp. 433–454.
[24] John Roe, Lectures on coarse geometry, University Lecture Series 31. American Mathematical
Society, Providence, RI, 2003, pp. viii+175.
[25] Joseph M. Rosenblatt, A generalization of Følner’s condition, Math. Scand. 33 (1973), no. 3,
pp. 153–170.
[26] Friedrich M. Schneider and Andreas B. Thom, On Følner sets in topological groups, August
2016, arXiv: 1608.08185[math.GR].
[27] Kevin Whyte, Amenability, bi-Lipschitz equivalence, and the von Neumann conjecture, Duke
Math. J. 99 (1999), no. 1, pp. 93–112.
Institute of Algebra, TU Dresden, 01062 Dresden, Germany
Current address: Department of Mathematics, The University of Auckland, Private Bag 92019,
Auckland 1142, New Zealand
E-mail address: [email protected]
| 4math.GR
|
On modal analysis of laminated glass: Usability of
simplified methods and enhanced effective thickness
arXiv:1801.01110v1 [cs.CE] 3 Jan 2018
Alena Zemanová, Jan Zeman, Tomáš Janda, Jaroslav Schmidt, Michal
Šejnoha
Department of Mechanics, Faculty of Civil Engineering, Czech Technical University in
Prague
Abstract
This paper focuses on the modal analysis of laminated glass beams. In these
multilayer elements, the stiff glass plates are connected by compliant interlayers with frequency/temperature-dependent behavior. The aim of our study
is (i) to assess whether approximate techniques can accurately predict the
behavior of laminated glass structures and (ii) to propose an easy tool for
modal analysis based on the enhanced effective thickness concept by Galuppi
and Royer-Carfagni.
To this purpose, we consider four approaches to the solution of the related nonlinear eigenvalue problem: a complex-eigenvalue solver based on
the Newton method, the modal strain energy method, and two effective
thickness concepts. A comparative study of free vibrating laminated glass
beams is performed considering different geometries of cross-sections, boundary conditions, and material parameters for interlayers under two ambient
temperatures. The viscoelastic response of polymer foils is represented by
the generalized Maxwell model.
We show that the simplified approaches predict natural frequencies with
an acceptable accuracy for most of the examples. However, there is a considerable scatter in predicted loss factors. The enhanced effective thickness
approach adjusted for modal analysis leads to lower errors in both quantities
compared to the other two simplified procedures, reducing the extreme error
in loss factors to one half compared to the modal strain energy method or to
one quarter compared to the original dynamic effective thickness method.
Keywords: Free vibrations, Laminated glass, Complex dynamic modulus,
Dynamic effective thickness, Enhanced effective thickness, Modal strain
Preprint submitted to arXiv
January 4, 2018
energy method, Newton method
1. Introduction
Laminated glass is a multilayer composite made of glass layers and plastic
interlayers, typically polymers. These foils improve the post-fracture behavior of the originally brittle glass elements [18, 25, 2], increase their damping [16, 29], and therefore they allow for applications prohibited to traditional
glass, such as load-bearing and fail-safe transparent structures. Avoiding resonance and reducing noise and vibrations of laminated glass components is
thus substantial not only in building structures but also in the car or ship
design process and others. Thus, the reliable prediction of natural frequencies and damping characteristics associated with each vibration mode is an
essential issue for the design of dynamically loaded structures. In the case of
laminated glass, free vibration analysis leads, because of the viscoelastic behavior of the foil [1], to an eigenvalue problem with complex eigenvalues and
eigenvectors, corresponding to natural angular frequencies and mode shapes.
In addition, the nonlinearity due to the frequency/temperature-sensitive response of the polymer interlayer adds to the complexity of the analysis.
Several approaches to analyzing vibrations of viscoelastically damped layered composites can be found in the literature, e.g., [34, 8, 16]. In this paper,
we broadly divide these methods into three groups: (i) numerical approaches
solving the complex eigenvalue problem directly [14], (ii) simplified numerical approximations dealing with a real eigenmode problem only [4], and
(iii) analytical methods and effective thickness methods derived from analytical models [19].
The comparison of selected non-linear solvers for complex-valued problems
in [14] shows that while most of them converge towards the same eigenvalues,
their computational time and the number of iterations differ. The computational cost can be reduced using simplified numerical methods, which deal
only with a real eigenvalue problem corresponding to the delayed elasticity or take into account only the real part of the complex stiffness of the
core [4]. Then, the damping parameters are obtained by post-processing the
real-valued eigenvalues and eigenmodes using, e.g., the modal strain energy
method [17] to be discussed later in the paper.
For three-layer structures with simple boundary conditions and geometry,
analytical solutions can be derived [22, 23, 31]. Because of the frequencydependent behavior of the polymer foil, they provide natural frequencies and
2
loss factors using an iterative algorithm. Recently, the dynamic effective
thickness approach for laminated glass beams was proposed by López-Aenlle
and Pelayo [19], using the complex flexural stiffness introduced in [31]. This
concept can be extended towards plates [20] and multilayer laminated glass
beams [26]. The validation of this dynamic effective thickness method against
the results of experimental testing in [19, 20, 26] shows that using this approach natural frequencies can be predicted with good accuracy but there is
a high scatter in loss factors.
Therefore, we want to analyze the accuracy of the response of effective
thickness and other simplified approaches, to investigate their usability for
the modal analysis of laminated glass elements, and to propose some improvements. More specifically, we
• perform a comparative study for free vibrating beams using selected
solvers representing the three groups as introduced above and
• propose an easy tool for modal analysis based on the enhanced effective
thickness concept by Galuppi and Royer-Carfagni [12].
To our best knowledge, no such comparison of complex and approximate
models has been performed for laminated glass so far.
All methods are compared for simply-supported, clamped-clamped, or
free-free beams with symmetric and asymmetric cross-sections under different
ambient temperatures. The viscoelastic behavior of polymer foil is described
with the generalized Maxwell model. Several sets of parameters of the chain
were taken from literature [1, 24, 33] and used in our case study, to evaluate
and discuss the effect of various materials used in laminated glass structures
and also of different Maxwell chain parameters for the the same type of
interlayer.
The structure of this paper is as follows. The geometry of a three-layer
laminated glass beam and material characterization of the glass and polymer
layers is outlined in Section 2. The approaches based on the finite element
methods, i.e., the Newton method and the modal strain energy method, are
introduced in Section 3. The closed-form formula for the complex-valued
natural frequencies presented in Section 4 is combined with the effective
thickness concept, using the dynamic effective thickness from [20] and the
enhanced effective thickness [12] which we adjust for modal analysis. The
results of our case study are presented and analyzed in Section 5. Finally,
we summarize our findings in Section 6.
3
2. Characterization of laminated glass structures
2.1. Configuration of laminated glass beam
In this paper, the most common three-layer configuration (with two face
glass plies and one polymer interlayer, see Figure 1) is handled for simplicity. However, the extension towards multilayer elements is possible for all
discussed approaches. No slipping on the interface of a glass ply and the
polymer foil is assumed.
y
x
h1
h2
h3
z
l
glass
z
polymer
glass
b
Figure 1: Basic three-layer composition of laminated glass sandwich.
2.2. Materials
The constitutive behavior of glass and polymer layers remains the same
for all presented methods. Glass is treated as an elastic material whereas the
polymer behavior is assumed to be linear viscoelastic. It can be supposed
that the damping of glass is small in comparison with that of the interlayer
and thus it is negligible. Therefore, the behavior of a glass layer is described
by three parameters: the Young modulus E1 , the Poisson ratio ν1 , and the
density ρ1 (resp. E3 , ν3 , and ρ3 for the face layers of different types of glass).
The variety of interlayer materials for laminated glass is broad, ranging
across the most common polyvinyl butyral (PVB), ethylene-vinyl acetate
(EVA), thermoplastic polyurethane (TPU), or the stiffest ionoplast (SGP –
SentryGlas(R) Plus). The density of the interlayer material is ρ2 and we
assume that its Poisson’s ratio ν2 is constant, see [37]. The viscoelastic behavior of polymers is commonly described by the generalized Maxwell model
or by a fractional derivative model [14]. In our study, the generalized Maxwell
model is used for two reasons: (i) for laminated glass, this description is the
most common in literature and (ii) according to the comparison by Hamdaoui
et al. [14], it requires less computational effort than the fractional derivative
model for non-linear eigenvalue problems.
4
G2,∞
G2,1
G2,2
G2,3
G2,P
µ1
µ2
µ3
µP
Figure 2: Generalized Maxwell chain consisting of P viscoelastic units and one elastic
spring.
The schematic representation of the Maxwell model in Figure 2 corresponds to the relaxation function provided by the Prony series, e.g., [6, page
32],
G2 (t) = G2,∞ +
P
X
− θt
G2,p exp
p
= G2,0 −
P
X
− θt
G2,p (1 − exp
p
),
(1)
p=1
p=1
where t stands for the current time, G2,∞ is the long-term shear modulus,
G2,p denotes the shear modulus of the p-th unit, θp = µp /G2,p its relaxation
P
time related to the viscosity µp , and G2,0 = G2,∞ + Pp=1 G2,p is the elastic
shear modulus of the whole chain.
In the frequency domain, the shear modulus is given by a complex valued
quantity
G2 (ω) = G2,0 + G2,ω (ω),
(2)
composed of the real frequency-independent part G2,0 and the complex part
dependent on the angular frequency ω according to
G2,ω (ω) = −
X
p
G2,p
1
ω 2 θp2 + 1
+i
X
p
G2,p
ωθp
.
ω 2 θp2 + 1
(3)
The real part (storage modulus) refers to the elastic behavior, whereas the
imaginary part (loss modulus) represents the energy dissipation effects [6].
This decomposition will be useful for the formulation of the free vibration
problem. Unlike in [8], the elastic shear modulus of the whole chain G2,0 was
set as the real frequency-independent part instead of the long-term shear
modulus G2,∞ to avoid computational difficulties for chains with G2,∞ = 0.
The Maxwell chain parameters for different interlayer materials can be
found, for instance, in [9, 27, 5, 15, 1, 33, 24]. We selected five representative
sets of Prony series and related parameters, which are reported in Appendix
5
102
LOSS MODULUS [MPa]
STORAGE MODULUS [MPa]
103
101
10-1
10-3
100
103
SGPM
TPUM
100
PVB M
PVB S
PVB A
10-2
10-3
FREQUENCY [Hz]
100
103
FREQUENCY [Hz]
Figure 3: The dependence of the real part (storage modulus) and the imaginary part (loss
modulus) of the shear modulus G2 (ω) of PVB, TPU, and SGP on a real-valued frequency
at 25 ◦ C; the Maxwell chain parameters are taken from [24] (M), [33] (S), and [1] (A).
A. It is evident from Figure 3 that the data differ even for the same polymer type. Different test methods may result in slightly different parameters
for interlayer properties, [13] or [1]. The different content of additives and
plasticizers used in the manufacturing also partially contributes to this discrepancy [9]. Besides, the authors mostly do not specify the frequency range
for which their Prony series were determined (except for PVBA [1]).
The effect of temperature is accounted for by using the time-temperature
superposition principle. For a given ambient temperature T , the relaxation
times θp in Eq. (3) are shifted by the factor aT derived from the WilliamsLandel-Ferry equation [36]
log aT = −
C1 (T − T0 )
,
C2 + T − T0
(4)
where the material constants C1 and C2 correspond to the reference temperature T0 .
3. Finite element models
3.1. Refined beam element for three-layer laminated glass
Because of the small thickness of the interlayer, we assume that the shear
deformation in the viscoelastic foil is responsible for all the damping and the
transverse compressive strain is negligible. Thus, we treat each layer as a
one-dimensional beam element in our numerical analysis. We assume planar
6
cross-sections of individual layers but not of the whole composite. The three
layers of a laminated glass beam are constrained together with compatibility
equations. This constraint can be taken into account using (i) the Lagrange
multipliers – additional unknown nodal forces holding the adjacent layers
together [37], or by (ii) the static condensation of the dependent generalized
displacements [30]. The second option is used in this study, because no
delamination is assumed during the modal analysis.
le
x
z
ϕ1,L
ϕ2,L
master DOFs
slave DOFs
ϕ3,L
u1,L
ϕ1,R
u2,L
ϕ2,R
u3,L
ϕ3,R
w1,L
w2,L
w3,L
u1,R
w1,R
u2,R
w2,R
u3,R
h1
glass
h2
polymer
h3
glass
w3,R
Figure 4: Master and slave degrees of freedom (DOFs) of the refined beam element:
horizontal central displacements u•,L , u•,R , deflections w•,L , w•,R , and rotations ϕ•,L ,
ϕ•,R .
According to the Timoshenko beam theory, there are nine unknowns per
cross-section of a three-layer beam – the horizontal and vertical centerline
displacements and the rotations for each layer, see Figure 4. Four unknowns
can be eliminated using four inter-layer compatibility conditions assuming the
perfect adhesion in the horizontal and vertical directions. This elimination
together with the outline of the element stiffness and mass matrices can
be found in Appendix B. Note that we use linear basis functions for the
evaluation of stiffness and mass matrices, and selective integration scheme to
avoid shear locking.
3.2. Governing equations for nonlinear eigenvalue problem
After the discretization, the free vibration problem is described by the
governing equation, e.g., [8],
K(ω) − ω 2 M U = 0.
(5)
The eigenvalues and the eigenvectors solving the problem are complex-valued
and represent the squared angular frequencies ω and the associated mode
7
shapes U . The mass matrix M is real-valued and constant, frequency independent, whereas the complex stiffness matrix K depends on the complex
frequency ω of the system. Similarly to Eq. (2), the stiffness matrix is decomposed as
K(ω) = K 0 + K ω (ω).
(6)
The elastic matrix K 0 includes the contributions of the glass faces and the
stiffness matrix of the interlayer corresponding to the instantaneous shear
modulus G0 . The frequency dependent part K ω (ω) = G2,ω (ω)K c , where K c
is a constant matrix.
Then, the free vibration problem can be rewritten as
K 0 + G2,ω (ω)K c − ω 2 M U = 0,
(7a)
U 0 T (U − U 0 ) = 0,
(7b)
where Eq. (7b) is introduced to obtain a well-posed problem, see [8]. The
mode shape U 0 is the eigenvector solving the real-eigenvalue problem
K 0 − ω02 M U 0 = 0.
(8)
No damping is thus assumed in this auxiliary problem, and the stiffness
matrix is constant (frequency-independent). To solve Eq. (8), we used a
solver based on the implicitly restarted Arnoldi method [28].
3.3. Natural frequencies and loss factors
The natural frequency fHz and the modal loss factor η associated with
the same mode shape are determined from the relevant squared frequencies
ω 2 from Eq. (7a) according to, e.g., [8],
ω 2 = (2πfHz )2 (1 + iη) ,
(9)
thus
p
Re[ω 2 ]
,
fHz =
2π
Im[ω 2 ]
η=
.
Re[ω 2 ]
(10a)
(10b)
Note that we decided to omit the index referring to the given mode shape
to avoid a profusion of notation. Later in Section 5, we compare the natural
frequencies and loss factors corresponding to the first three mode shapes.
8
3.4. Complex-eigenvalue solver using Newton method (CNM)
The Newton method is applied to the extended system (7) to obtain
the complex-valued pair of an eigenvalue and an eigenvector. Our approach
belongs to the class of methods iterating each individual eigenpair independently, starting from the initial eigenpairs solving Eq. (8). We express the
(k + 1)-th approximations of the searched frequency and mode shape from
the previous k-th approximations and their increments in the form
k+1
k+1
ω = k ω + δω,
(11a)
U = k U + δU .
(11b)
After linearization and evaluation of the Jacobian matrix, the Newton method
leads to the system of linear equations, e.g., [32, page 73, Eq. (4.8)],
#
"
∂T k k
k
0
( ω) U k+1 U
T ( ω)
=
,
(12)
∂ω
δω
U 0TU 0
U 0T
0
where the operator T and its derivative are provided by
T (ω) = K 0 + G2,ω (ω)K c − ω 2 M ,
∂T (ω)
∂G2,ω (ω)
=
K c − 2ωM .
∂ω
∂ω
(13a)
(13b)
The initial pair k=0 ω = ω0 and k=0 U = U 0 is obtained from the realeigenvalue problem in Eq. (8) and the stopping criterion is defined by
kT (k ω)k U k
< tol
kk U k
(14)
with the norm of residual weighted by the norm of the relevant mode shape
and the user defined tolerance tol .
Our proposed complex-valued eigenvalue solver was verified against the
semi-analytical model by Mead [21]; the results for this model were adopted
from [19] for a laminated glass beam with free ends. The response is in a
good agreement; the errors in frequencies are below 0.5%, and in loss factors
are less than 2%. These minor discrepancies can be caused by different
assumptions for the semi-analytical model (e.g., zero Young’s modulus for the
interlayer), by a different stopping tolerance of iterative solvers (which is not
specified in [19]), or by the ambiguity in Prony series, where the conversion
of the Young modulus to the shear modulus is unclear (the assumption of a
constant value of the Poisson ratio vs. the bulk modulus, see [27, 37]).
9
3.5. Real-eigenvalue solver and modal strain energy method (MSE)
Especially for large-scale structures, the direct evaluation of the complexvalued solution can be expensive. Therefore, the natural frequencies are
often approximated from a real-valued simplification of the complex-valued
problem, recall Eq. (7), as
2
K ap (k ωap ) − k+1 ωap
M k+1 U ap = 0,
(15a)
U 0 T (k+1 U ap − U 0 ) = 0.
(15b)
Due to the real-valued approximation of the stiffness matrix K ap (k ωap ), the
(k + 1)-th estimates of the eigenpairs are real squared angular frequencies
k+1 2
ωap and real mode shape vectors k+1 U ap . We consider that the approximate stiffness matrix1 corresponds to the real part of the whole stiffness
matrix evaluated for the relevant frequency
K ap (ωap ) = K 0 + Re[G2,ω (ωap )]K c .
(16)
Therefore, the stiffness matrix is updated iteratively until the convergence of
the angular frequency
kk+1 ωap − k ωap k
< tol .
(17)
kk+1 ωap k
To estimate the loss factors from the converged real eigenpairs (k+1 ωap ,
k+1
U ap ), the modal strain energy method was introduced by Ungar and Kerwin [35] and later popularized for finite element models by Johnson and
Kienholz [17]. This method assumes that no changes occur in the damped
mode shapes, Eq. (18), and therefore it is suitable only for lightly damped
structures [34]. The modal loss factor of each individual mode is determined
according to
k+1
ηap =
U ap T Im[G2,ω (k+1 ωap )]K c k+1 U ap
.
k+1 U T K (k+1 ω )k+1 U
ap
ap
ap
ap
(18)
The derivation of this formula from Rayleigh’s quotient is described in [17].
This iterative procedure provides more accurate values of the natural
frequencies and the loss factors than the original approximation technique
1
Different ways for determining the real-valued approximate stiffness matrix K ap can
be found in the literature, see [17, 4].
10
in [17]. The original one starts from a constant initial value of the interlayer
shear modulus and then only adjusts the computed loss factor by a correction factor taking into account the change of material properties due to the
frequency shift.
4. Effective thickness approaches
4.1. Closed-form expression for natural angular frequencies of beams
A few effective thickness formulations can be found in the literature for
laminated glass beams and plates under static loading, whereas, to the best
of our knowledge, only one effective thickness approach exists for dynamic
problems [19, 20]. In general, the effective thickness methods are based
on calculating a constant thickness of a monolithic element (with the same
width and length), which gives the same response as the laminated glass
beam under the identical loading and boundary conditions. For example,
a deflection-effective thickness and stress-effective thicknesses [3, 12] are defined for laminated glass structures under static bending to obtain the same
extreme values of deflection and stresses.
In this paper, this effective thickness concept is applied to vibrating laminated glass beams, and the dynamic effective thickness is used for the modal
parameters calculation. The analytical expressions for the natural angular
frequencies for a monolithic beam are then given by, e.g., [19, Eq. (22)],
k+1
ωef2
β 4 E1 h3ef (k ωef )
,
=
12m̄
(19)
where β is the wavenumber, E1 is the Young modulus of glass, m̄ is the mass
per unit length and width of the beam (m̄ = ρ1 h1 +ρ2 h2 +ρ3 h3 ), and hef (k ωef )
is the dynamic effective thickness. Two expressions for this effective thickness
will be introduced in the next two sections. Note that the wavenumbers are
usually expressed in the form β = β̂/l, where l is the length of the beam and
β̂ depends on boundary conditions and a mode shape [7, Chapter 18].
Due to the dependency of the dynamic effective thickness on frequency,
the search for ωef2 requires iterations. When the convergence is achieved
according to the criterion (17), the frequency fHz and the loss factor η are
determined from the complex valued ωef2 from Eqs. (9–10).
11
4.2. Dynamic effective thickness concept (DET)
The dynamic effective thickness was introduced by López-Aenlle and
Pelayo [19], and the iterative algorithm was extended to plates in [20]. This
complex-valued effective thickness was derived from the closed-form formula
for effective stiffness by Ross et al. [31] for a three-layer, simply-supported
beam with purely elastic face layers and a linearly viscoelastic core. However,
this analytical model is also used for different boundary conditions using the
known relevant wavenumbers, e.g., for free-free beams in [20].
Under the assumption that the glass parameters are the same for both
glass layers (E3 = E1 , ν3 = ν1 , and ρ3 = ρ1 ) the expression for the dynamic
effective thickness from [20] holds
v
u
−1 !
u
h
1
3
,
(20)
hef (ωef ) = t(h31 + h33 ) 1 + Y 1 +
g(ωef )(h1 + h3 )
where the geometric parameter
Y =
12h1 h3 (0.5h1 + h2 + 0.5h3 )
(h31 + h33 )(h1 + h3 )
(21)
depends on the thicknesses of individual layers, and the shear parameter
g(ωef ) =
G2 (ωef )
E1 h3 h2 β 2
(22)
additionally includes the wavenumber β, the Young modulus of glass E1 , and
the complex shear modulus of polymer G2 (ωef ); recall Eq. (2).
4.3. Enhanced effective thickness adjusted for modal analysis (EET)
One of the effective thickness approaches for layered beams under static
loading is the enhanced effective thickness method by Galuppi and RoyerCarfagni [12] or Galuppi et al. [10]. It is derived from an energy-based variational formulation. Under the same assumption as in the previous section
(E3 = E1 , ν3 = ν1 , and ρ3 = ρ1 ), the enhanced effective thickness for the
deflection is then expressed as [12, Eq. (4.14)],
v
u
1
u
,
(23)
hef = u
3
ζ
1−ζ
t
+
h31 + h33 + 12Is h31 + h33
12
with the coefficient of shear cohesion ζ, the non-dimensional ratio of the
glass and interlayer stiffnesses µ, and the shape coefficient ψ dependent on a
normalized shape of the deflection curve g(x) of a homogeneous beam. These
parameters follow from
R l 00
(g (x))2 dx
G2 b
1
0
.
(24)
,
µ=
ζ=
,
ψ = Rl
I1 + I3 A1 A3
0 (x))2 dx
E1 h2
(g
0
1+
ψ
µItot A1 + A3
The cross-section areas Ai for i = 1, 2, 3 and the second moments of area Ii ,
Itot , and Is are defined by relations, recall Figure 1,
Ii =
1 3
bh ,
12 i
Itot = I1 + I3 +
Is =
Ai = bhi ,
(25a)
A1 A3
(h2 + 0.5(h1 + h3 ))2 ,
A1 + A3
(25b)
h1 h3
(h2 + 0.5(h1 + h3 ))2 .
h1 + h3
(25c)
Two intuitive adjustments of this method were made for its use in modal
analysis. In Eq. (24), the complex-valued shear modulus for interlayer from
Eq. (2) was used for coefficient µ, and the shape function of the deflection
under static loading g was replaced by the one corresponding to the n-th
mode shape of a monolithic beam under given boundary conditions, e.g.,
[7, Chapter 18]. The resulting parameters ψ, corresponding to three basic
boundary conditions, are summarized in Table 1.
Beam
simply-supported
fixed-fixed
free-free
1
π /l2
40.7/l2
10.1/l2
2
Mode
2
(2π)2 /l2
82.6/l2
34.9/l2
3
(3π)2 /l2
148/l2
78.2/l2
Table 1: Shape coefficients ψ for three basic boundary conditions and the first three mode
shapes for a beam of the length l.
This effective thickness is also complex-valued, as in the DET approach
in the previous section, and the natural frequencies and the damping are
evaluated according to Eq. (10). Note that this procedure can be extended
to the plate structures, similarly to its static variant [11, 10], but we leave
this to future work.
13
5. Case study
In this section, the usability of the three methods introduced above is
assessed for laminated glass beams. The section is divided into two parts:
the first introducing the selected test examples and the second discussing
the results and the effect of input data on the usability of the modal strain
energy method and the two effective thickness approaches.
5.1. Examples
We examined a collection of 63 examples, which results from all combinations of input data for simply-supported (S-S), free-free (F-F), and clampedclamped (C-C) beams in Table 2.
Attribute
Options/Values
supports
S-S, F-F, C-C
l×b
1 × 0.1
h1 /h2 /h3
10/0.76/10, 15/0.76/5, 10/1.52/10
interlayer
SGPM , TPUM , PVBM , PVBS , PVBA
temperature
25, 50 (for PVBS and PVBA )
Units
m×m
mm/mm/mm
◦
C
Table 2: Input data and boundary conditions.
The length l and the width b of the laminated beam were constant,
whereas three cross-section configurations h1 /h2 /h3 were considered to assess the effect of symmetry/asymmetry of the cross-section layout and the
thickness of the interlayer, see Figure 1.
Material properties of glass and three interlayer materials from three different sources, Figure 3, are summarized in Appendix A. The calculations
were carried out for two ambient temperatures: the room temperature 25 ◦ C
for all cases and the elevated temperature 50 ◦ C for two PVB-interlayers,
where the temperature-shift parameters were specified.
Finally, for the sake of completeness, Table 3 contains the relation for
wavenumbers which we used in effective thickness approaches.
5.2. Results and discussion
The natural frequencies and loss factors for the first three modes2 were
determined according to the detailed and simplified algorithms described in
2
For F-F beam the first three modes corresponding to the rigid body motion were
skipped in all solvers and are not considered in this comparison.
14
Beam
simply-supported
fixed-fixed or free-free
1
π/l
4.7300/l
Mode
2
2π/l
7.8532/l
3
3π/l
10.996/l
Table 3: Wavenumbers β for three basic boundary conditions and first three mode shapes
for a beam of the length l.
Sections 3 and 4. We set the tolerance tol to 10−5 for all methods. For finite
element solvers, each beam layer was discretized by 200 elements. Compared
to the results obtained by using a refined discretization by 300 elements per
length, the largest errors for all tested examples is below 0.03% for natural
frequencies and below 0.8% for loss factors.
The modal response obtained by the simplified methods is compared
against the reference method based on the complex-valued solver using the
Newton method, recall Section 3.4. Each method is discussed in a separate
section.
5.2.1. MSE against CNM
The box-plots in Figure 5 visualize the errors of natural frequencies and
loss factors obtained using the MSE method against the results of the reference method (CNM). The red mark inside the box indicates the median,
the bottom and top edges of the box indicate the 25th and 75th percentiles,
respectively. The boxplot whiskers have the standard maximum length of
1.5 times the interquartile range, and the remaining data points are outliers
plotted individually.
For natural frequencies, the error for all 63 examples is less than 4%.
More specifically, the error is less than 1.5% in 75% of the tested cases and
the average error is less than 0.5%. Thus, this solver provide a reasonable
approximation of natural frequencies, which are mostly sufficiently accurate
for design purposes. There is no substantial difference in errors for the three
tested boundary conditions, but the errors slightly decrease for higher mode
shapes.
However, the loss factors differ significantly from the reference solution.
The errors stay below 15% for 75% of configurations, but they increase up
to 42% in some cases. The error decreases with an increasing number of
kinematic boundary constraints or for higher modes. The highest errors in
loss factors correspond to the first mode shape; the errors decrease to about
15
ERROR IN LOSS FACTOR [%]
ERROR IN FREQUENCY [%]
0
-1
-2
-3
S-S
F-F
C-C
-4
1
2
3
1
2
3
1
2
S-S
40
F-F
C-C
30
20
10
0
3
1
2
3
MODE SHAPE
1
2
3
1
2
3
MODE SHAPE
Figure 5: Errors in natural frequencies and loss factor by the modal strain energy method
(MSE) against the reference solution (CNM) for first three mode shapes for simplysupported (SS), free-free (F-F), and clamped-clamped (C-C) beams.
FREQUENCY MSE [Hz]
S-S BEAM
50
F-F BEAM
120
PCC = 0.999
C-C BEAM
120
PCC = 0.999
100
100
80
80
60
60
PCC = 0.999
40
30
30
40
50
60
80
100
120
60
80
100
120
20
30
LOSS FACTOR MSE [%]
FREQUENCY CNM [Hz]
30
30
PCC = 0.993
30
PCC = 0.995
PCC = 0.991
20
20
20
10
10
10
0
0
0
0
10
20
30
0
10
20
30
0
10
LOSS FACTOR CNM [%]
25°C:
SGPM
TPUM
50°C:
PVB S
PVB A
PVB M
PVB S
PVB A
Figure 6: Quantile-quantile plot for the first mode shape for natural frequencies and loss
factors. The response by the simplified method (MSE) is plotted against the reference
solution (CNM) along with the Pearson correlation coefficient (PCC). The Maxwell chain
parameters for PVB, TPU, and SGP are taken from [24] (M), [33] (S), and [1] (A).
16
25% for the second and below 15% for the third mode shape.
For further consideration, the quantile-quantile plots in Figure 6 show
the values of natural frequencies and loss factors by the simplified method
(MSE) against the reference solution (CNM) corresponding to the first mode
shape for all cases from Table 2. These values of frequencies and loss factors
are strongly influenced by the effect of temperature and the interlayer type.
Also, the highest errors for loss factors up to 42% appears only for the PVBM
foil; the errors remain below 18% for the other foils. The samples with the
PVBA foil show entirely different response than those with the other two
PVB foils because this the corresponding eigenfrequencies fall outside the
frequency range of this Prony series [1].
5.2.2. DET against CNM
The comparison of the modal response by the dynamic effective thickness
method (DET) against that by the reference method (CNM) are, similarly
to the previous section, shown in terms of errors of natural frequencies and
loss factors in Figure 7 and quantile-quantile plots in Figure 8.
It is clear that this method gives very accurate results for the simplysupported beams (SS). The errors are below 1% in frequencies, and the loss
factor predictions are quite accurate as well with errors below 10%. For the
other boundary conditions, the method does not provide satisfactory approximations, especially for loss factors, even if we used an adjusted wavenumber
k for given boundary conditions. This can be also seen in the quantilequantile plot in Figure 8. The errors in frequencies do not exceed 15% (the
75th percentile is below 10%) and the errors in loss factors 85%. The errors
are decreasing for the higher mode shapes.
5.2.3. EET against CNM
In analogy to the previous sections, the errors associated with the EET
method against the reference solution (CNM) are plotted in Figure 9 and the
quantile-quantile plots appear in Figure 10.
For the simply supported beam, the errors remain below 1% for frequencies and below the 10% for loss factors, as in the case of the DET method. For
the other boundary conditions, the errors in both, frequencies and loss factors, are lower than in the case of the DET approach. More specifically, they
are below 5% for frequencies and below 22% for loss factors. The highest errors appear for the free-free beams, the lowest again for the simply-supported
beam. This method provides good approximations of natural frequencies for
17
10
5
0
-5
-10
S-S
-15
1
2
F-F
3
1
2
C-C
3
1
2
100
ERROR IN LOSS FACTOR [%]
ERROR IN FREQUENCY [%]
15
50
0
-50
3
S-S
1
2
F-F
3
MODE SHAPE
1
2
C-C
3
1
2
3
MODE SHAPE
Figure 7: Errors in natural frequencies and loss factor by the dynamic effective thickness
method (DET) against the reference solution (CNM) for first three mode shapes for simplysupported (SS), free-free (F-F), and clamped-clamped (C-C) beams.
FREQUENCY DET [Hz]
S-S BEAM
50
F-F BEAM
120
PCC = 1
C-C BEAM
120
PCC = 0.993
100
100
80
80
60
60
PCC = 0.992
40
30
30
40
50
60
80
100
120
60
80
100
120
20
30
LOSS FACTOR DET [%]
FREQUENCY CNM [Hz]
30
30
PCC = 0.999
30
PCC = 0.931
PCC = 0.891
20
20
20
10
10
10
0
0
0
10
20
30
0
0
10
20
30
0
10
LOSS FACTOR CNM [%]
25°C:
SGPM
TPUM
50°C:
PVB S
PVB A
PVB M
PVB S
PVB A
Figure 8: Quantile-quantile plot for the first mode shape for natural frequencies and loss
factors. The response by the dynamic effective thickness method (DET) is plotted against
the reference solution (CNM) along with the Pearson correlation coefficient (PCC). The
Maxwell chain parameters for PVB, TPU, and SGP are taken from [24] (M), [33] (S), and
[1] (A).
18
ERROR IN LOSS FACTOR [%]
ERROR IN FREQUENCY [%]
4
3
2
1
0
1
2
3
1
2
3
1
2
10
5
0
-5
-10
-15
-20
3
1
2
3
MODE SHAPE
1
2
3
1
2
3
MODE SHAPE
Figure 9: Errors in natural frequencies and loss factor by the adjusted enhanced effective
thickness method (EET) against the reference solution (CNM) for first three mode shapes
for simply-supported (SS), free-free (F-F), and clamped-clamped (C-C) beams.
FREQUENCY EET [Hz]
S-S BEAM
50
F-F BEAM
120
PCC = 1
C-C BEAM
120
PCC = 1
100
100
80
80
60
60
PCC = 1
40
30
30
40
50
60
80
100
120
60
80
100
120
20
30
LOSS FACTOR EET [%]
FREQUENCY CNM [Hz]
30
30
PCC = 0.999
30
PCC = 1
PCC = 1
20
20
20
10
10
10
0
0
0
10
20
30
0
0
10
20
30
0
10
LOSS FACTOR CNM [%]
25°C:
SGPM
TPUM
50°C:
PVB S
PVB A
PVB M
PVB S
PVB A
Figure 10: Quantile-quantile plot for the first mode shape for natural frequencies and
loss factors. The response by the adjusted enhanced effective thickness method (EET) is
plotted against the reference solution (CNM) along with the Pearson correlation coefficient
(PCC). The Maxwell chain parameters for PVB, TPU, and SGP are taken from [24] (M),
[33] (S), and [1] (A).
19
all three boundary conditions and the best estimates of loss factors from all
tested simplified methods.
5.2.4. Comparison of simplified approaches
S-S BEAM
10
MSE
DET
SET
0
ERRORS AGAINST CNM [%]
-10
F-F BEAM
10
0
-10
C-C BEAM
10
0
PVB S - 25°C
PVB S - 50°C
PVB A - 25°C
PVB A - 50°C
PVB M - 25°C
TPUM - 25°C
PVB S - 50°C
SGPM - 25°C
PVB A - 50°C
10/1.52/10
PVB S - 25°C
PVB A - 25°C
TPUM - 25°C
PVB M - 25°C
SGPM - 25°C
PVB S - 25°C
15/0.76/5
PVB S - 50°C
PVB A - 25°C
PVB A - 50°C
TPUM - 25°C
SGPM - 25°C
PVB M - 25°C
10/0.76/10
-10
Figure 11: Summary of errors in natural frequencies obtained by all simplified methods against the reference solution (CNM) corresponding to the first mode shape for all
tested cases. Simplified approaches: modal strain energy (MSE), dynamic effective thickness (DET), and enhanced effective thickness (EET) methods.
Finally, the errors of both quantities predicted by all three methods are
summarized in Figures 11 and 12 for all tested examples for the first mode
shape. The present study thus shows that:
• For natural frequencies, modal strain energy and effective thickness
methods give very good approximations (below 4% for MSE and EET,
below 15% for DET).
20
S-S BEAM
100
MSE
DET
SET
50
ERRORS AGAINST CNM [%]
0
-50
F-F BEAM
100
50
0
-50
C-C BEAM
100
10/0.76/10
15/0.76/5
10/1.52/10
50
PVB S - 50°C
PVB A - 50°C
PVB S - 25°C
PVB A - 25°C
PVB M - 25°C
TPUM - 25°C
PVB S - 50°C
SGPM - 25°C
PVB S - 25°C
PVB A - 25°C
PVB A - 50°C
TPUM - 25°C
PVB M - 25°C
SGPM - 25°C
PVB S - 25°C
PVB S - 50°C
PVB A - 25°C
PVB A - 50°C
PVB M - 25°C
TPUM - 25°C
-50
SGPM - 25°C
0
Figure 12: Summary of errors in loss factors obtained by all simplified methods against
the reference solution (CNM) corresponding to the first mode shape for all tested cases.
Simplified approaches: modal strain energy (MSE), dynamic effective thickness (DET),
and enhanced effective thickness (EET) methods.
• The effective thickness approaches provide excellent results for simplysupported laminated glass beams; the error is less than 1%.
• However, all methods predict in some cases the loss factors of laminated glass beams with errors in tens of percent (up to 22% for EET,
42% for MSE, and 85% for DET). Therefore, they can provide only an
informative estimate of damping.
• For simply-supported beams, the effective thickness methods deliver
the loss factors with errors less than 5% for the room temperature and
below 10% for the evaluated temperature typical of, e.g., an exterior
21
facade panel in summer.
• The algorithm based on the EET provides the best estimates of loss
factors from all tested simplified methods.
• The symmetry or the asymmetry of the cross-section geometry does
not influence the level of errors.
It is worth mentioning that for the simply-supported beams the enhanced
effective method adjusted for dynamics (EET) gives exactly the same results
as the original dynamic effective thickness method (DET). We can see from
Tables 1 and 3 that shape coefficients are squared wavenumbers for a simplysupported beam ψ = β 2 . If we replaced the used shape coefficient derived
in Table 1 with squared wavenumbers from Table 3, we would obtain the
same results from both methods for all boundary conditions. A more detailed
study of this unexpected connection goes beyond the current work and will
be performed separately.
6. Conclusions
Four methods for modal analysis of laminated glass structures were introduced in this paper, i.e., the numerical complex-valued eigensolver based
on the Newton method, the real-valued eigensolver complemented with the
modal strain energy method, and the original and enhanced dynamic effective
thickness method. The aim of this paper was to assess the usability of the
last three practical methods, comparing their predictions with the complexvalued eigensolver. For the enhanced effective thickness method by Galuppi
and Royer-Carfagni, we proposed and presented our extension of the current
method for modal analysis of laminated glass. The following conclusions can
be made from the present study:
1. Our study underlines the importance of being careful when predicting
the damping in laminated glass. The loss factor is a sensitive quantity
which affects the errors of approximations provided by simplified methods. In particular, the natural frequencies can be predicted with errors
less than 5% using a suitable method, but the same does not hold for
the loss factors.
2. The level of errors in approximated quantities depends on the boundary
conditions for the effective thickness approaches and on the parameters
22
of the generalized Maxwell model for all methods. Material parameters for the interlayers from the literature leads to different natural
frequencies and loss factors even for the same type of polymer.
3. The enhanced effective thickness approach adjusted for modal analysis
provides approximations of both quantities, natural frequencies and
loss factors, with lower errors compared to the other two simplified
procedures.
Simplified methods and approaches reduce computational time and cost
and have an important place in the design of engineering structures. Under
the above limitations, our study confirms their suitability for modal analysis
of laminated glass structures.
Acknowledgments. This publication was supported by the Czech Science
Foundation under project No. 16-14770S.
References
[1] Andreozzi, L., Bati, S. B., Fagone, M., Ranocchiai, G., and Zulli, F.
(2014). Dynamic torsion tests to characterize the thermo-viscoelastic properties of polymeric interlayers for laminated glass. Construction and Building Materials, 65:1–13.
[2] Bedon, C., Kalamar, R., and Eliášová, M. (2017). Low velocity impact
performance investigation on square hollow glass columns via full-scale
experiments and finite element analyses. Composite Structures, 182:311–
325.
[3] Bennison, S. J., Qin, M. H., and Davies, P. S. (2008). High-performance
laminated glass for structurally efficient glazing. Innovative light-weight
structures and sustainable facades, Hong Kong.
[4] Bilasse, M., Daya, E., and Azrar, L. (2010). Linear and nonlinear vibrations analysis of viscoelastic sandwich beams. Journal of Sound and
Vibration, 329:4950–4969.
[5] Biolzi, L., Cagnacci, E., Orlando, M., Piscitelli, L., and Rosati, G. (2014).
Long term response of glass–PVB double-lap joints. Composites Part B:
Engineering, 63:41–49.
23
[6] Christensen, R. (1982). Theory of Viscoelasticity: An Introduction. Elsevier, second edition.
[7] Clough, R. W. and Penzien, J. (2003). Dynamics of structures. Computers & Structures, Inc.
[8] Daya, E. and Potier-Ferry, M. (2001). A numerical method for nonlinear
eigenvalue problems application to vibrations of viscoelastic structures.
Computers & Structures, 79:533–541.
[9] Duser, A. V., Jagota, A., and Bennison, S. J. (1999). Analysis of
glass/polyvinyl butyral laminates subjected to uniform pressure. Journal
of Engineering Mechanics, 125(4):435–442.
[10] Galuppi, L., Manara, G., and Royer-Carfagni, G. (2012). Practical expression for the design of laminated glass. Composites Part B: Engineering,
45:1677–1688.
[11] Galuppi, L. and Royer-Carfagni, G. (2012a). The effective thickness of
laminated glass plates. Journal of Mechanics of Materials and Structures,
7:375–400.
[12] Galuppi, L. and Royer-Carfagni, G. F. (2012b). Effective thickness of
laminated glass beams: New expression via a variational approach. Engineering Structures, 38:53–67.
[13] Giovanna, R., Zulli, F., Andreozzi, L., and Fagone, M. (2016). Test
methods for the determination of interlayer properties in laminated glass.
Journal of Materials in Civil Engineering, ASCE, 04016268:1–8.
[14] Hamdaoui, M., Akoussan, K., and Daya, E. (2016). Comparison of nonlinear eigensolvers for modal analysis of frequency dependent laminated
visco-elastic sandwich plates. Finite Elements in Analysis and Design,
121:75–85.
[15] Hooper, P., Blackman, B., and Dear, J. (2012). The mechanical behaviour of poly(vinyl butyral) at different strain magnitudes and strain
rates. Journal of Materials Science, 47:3564–3576.
[16] Huang, Z., Qin, Z., and Chu, F. (2016). Damping mechanism of elasticviscoelastic-elastic sandwich structures. Composite Structures, 153:96–107.
24
[17] Johnson, C. D. and Kienholz, D. A. (1982). Finite element prediction of
damping in structures with constrained viscoelastic layers. AIAA Journal,
20(9):1284–1290.
[18] Larcher, M., Solomos, G., Casadei, F., and Gebbeken, N. (2012). Experimental and numerical investigations of laminated glass subjected to
blast loading. International Journal of Impact Engineering, 39(1):42–50.
[19] López-Aenlle, M. and Pelayo, F. (2013). Frequency response of laminated glass elements: Analytical modeling and effective thickness. Applied
Mechanics Reviews, 65(2):020802–1–020802–13.
[20] López-Aenlle, M. and Pelayo, F. (2014). Dynamic effective thickness
in laminated-glass beams and plates. Composites Part B: Engineering,
67:332–347.
[21] Mead, D. J. (2007). The measurement of the loss factors of beams
and plates with constrained and unconstrained damping layers: A critical
assessment. Journal of Sound and Vibration, 300(3):744–762.
[22] Mead, D. J. and Markus, S. (1969). The forced vibration of a three-layer,
damped sandwich beam with arbitrary boundary conditions. Journal of
Sound and Vibration, 10(2):163–175.
[23] Mead, D. J. and Markus, S. (1970). Loss factors and resonant frequencies
of encastr damped sandwich beams. Journal of Sound and Vibration,
12(1):99–112.
[24] Mohagheghian, I., Wang, Y., Jiang, L., Zhang, X., Guo, X., Yan, Y.,
Kinloch, A., and Dear, J. (2017a). Quasi-static bending and low velocity
impact performance of monolithic and laminated glass windows employing
chemically strengthened glass. European Journal of Mechanics – A/Solids,
63:165–186.
[25] Mohagheghian, I., Wang, Y., Zhou, J., Yu, L., Guo, X., Yan, Y., Charalambides, M., and Dear, J. (2017b). Deformation and damage mechanisms of laminated glass windows subjected to high velocity soft impact.
International Journal of Solids and Structures, 109:46–62.
25
[26] Pelayo, F. and López-Aenlle, M. (2017). Natural frequencies and damping ratios of multi-layered laminated glass beams using a dynamic effective
thickness. Journal of Sandwich Structures and Materials, 0:1–25.
[27] Pelayo, F., López-Aenlle, M., Hermans, L., and Fraile, A. (2013). Modal
scaling of a laminated glass plate. 5th International Operational Modal
Analysis Conference, pages 1–10.
[28] Radke, R. J. (1996). A Matlab implementation of the implicitly restarted
Arnoldi method for solving large-scale eigenvalue problems. PhD thesis,
Rice University.
[29] Rao, M. D. (2003). Recent applications of viscoelastic damping for noise
control in automobiles and commercial airplanes. Journal of Sound and
Vibration, 262(3):457–474.
[30] Rikards, R., Chate, A., and Barkanov, E. (1993). Finite element analysis of damping the vibrations of laminated composites. Computers &
structures, 47(6):1005–1015.
[31] Ross, D., Ungar, E., and Kerwin, E. (1959). Damping of plate flexural vibrations by means of viscoelastic laminae. Proc. Colloq. Structural
Damping, American Society of Mechanical Engineers, pages 49–87.
[32] Schreiber, K. (2008). Nonlinear Eigenvalue Problems: Newton-type
Methods and Nonlinear Rayleigh Functionals. PhD thesis, Technischen
Universitat Berlin.
[33] Shitanoki, Y., Bennison, S., and Koike, Y. (2014). A practical, nondestructive method to determine the shear relaxation modulus behavior of
polymeric interlayers for laminated glass. Polymer Testing, 37:59–67.
[34] Treviso, A., Van Genechten, B., Mundo, D., and Tournour, M. (2015).
Damping in composite materials: Properties and models. Composites Part
B: Engineering, 78:144–152.
[35] Ungar, E. and Kerwin, E. (1962). Loss factors of viscoelastic systems
in terms of energy concepts. The Journal of the Acoustical Society of
America, 34(7):954–957.
26
[36] Williams, M., Landel, R., and Ferry, J. (1955). The temperature dependence of relaxation mechanisms in amorphous polymers and other glassforming liquids. Journal of the American Chemical Society, 77(14):3701–
3707.
[37] Zemanová, A., Zeman, J., and Šejnoha, M. (2017). Comparison of viscoelastic finite element models for laminated glass beams. International
Journal of Mechanical Sciences, 131–132:380–395.
Appendix A. Material properties of glass and interlayers
In this appendix, we summarize the used material properties of glass and
three different polymers (taken from the literature) in Tables A.4, A.5, A.6,
and A.7.
Soda-lime glass
Density
Young’s modulus of elasticity
Poisson’s ratio
ρ1 = ρ3
E1 = E3
ν1 = ν3
2,500 kg.m−3
72 GPa
0.22 –
Table A.4: Glass properties [19].
Density
Poisson’s ratio
ρ2
ν2
SGPM
950
0.49
TPUM
1070
0.49
PVBM , PVBS , PVBA
1100
0.49
Table A.5: Interlayer properties [24].
27
kg.m−3
–
SGPM
TPUM PVBM
Long-term and instantaneous shear moduli
G2,∞
1.8
1.56
0.22
MPa
G2,0
274.1
94.6
213.6
MPa
Coefficients and relaxation times
p
G2,p /G2,0
θp [s]
1
0.07767 0.42077 0.39262 10−6
2
0.03764 0.18113 0.19225 10−5
3
0.05631 0.19280 0.20957 10−4
4
0.06501 0.09969 0.12621 10−3
5
0.07409 0.04750 0.05694 10−2
6
0.09317 0.01928 0.01536 10−1
7
0.11867 0.00903 0.00325
100
8
0.20551 0.00414 0.00103
101
9
0.18131 0.00307 0.00077
102
10
0.05361 0.00230 0.00010
103
11
0.01856 0.00371 0.00029
104
12
0.01180 0.00004 0.00053
105
Table A.6: Parameters of the generalized Maxwell model for SGPM , TPUM , and
PVBM [24].
28
G2,∞
p
1
2
3
4
5
6
7
8
9
10
11
12
13
14
T0
C1
C2
PVBS
PVBA
Long-term shear moduli
0
0
Shear moduli and relaxation times
G2,p [MPa]
θp [s]
G2,p [MPa]
θp [s]
−7
51.25
4.273×10
0.514628 9.51×10−2
−6
31.75
3.546×10
0.280116 4.71×10−1
12.80
1.330×10−5
0.144282
2.72×100
32.90
4.279×10−5
0.086904
2.11×101
−4
39.90
2.984×10
0.076190
2.21×102
0.092202
2.12×103
37.80
2.170×10−3
−3
21.94
8.274×10
0.098780
1.74×104
25.01
2.937×10−2
0.085555
1.31×105
27.58
1.658×10−1
0.070251
1.05×106
−1
11.98
7.774×10
0.107653
2.99×107
6.345
3.293×100
2.692
1.698×101
8.718
2.041×102
0.6969
3.588×104
Parameters for temperature shifting
20.46 ◦ C
30 ◦ C
37.30
12.5
203.61 ◦ C
89 ◦ C
Table A.7: Parameters of the generalized Maxwell model for PVBS [33] and PVBA [1].
29
Appendix B. Numerical aspects
The finite element discretization is briefly presented in this section, following the exposition by Rikards et al. [30]. Our study deals with a laminated
glass beam made of three layers. After discretization, we have 18 unknowns
per element – 9 unknowns per cross section, recall Figure 4. Therefore, the
kinematics of the three-layer element is specified by the vector of nodal displacements and rotations
u1,L w1,L ϕ1,L u1,R w1,R ϕ1,R u2,L w2,L ϕ2,L
ufull
e =
u2,R w2,R ϕ2,R u3,L w3,L ϕ3,L u3,R w3,R ϕ3,R T .
Using the Timoshenko beam theory, we express 8 inter-layer compatibility
conditions corresponding to perfect horizontal and vertical adhesion at each
inter-layer interface as
h1
ϕ1,L
2
h2
u2,L + ϕ2,L
2
w1,L
w2,L
u1,L +
h2
ϕ2,L ,
2
h3
= u3,L − ϕ3,L ,
2
= w2,L ,
= w3,L ,
h1
ϕ1,R
2
h2
u2,R + ϕ2,R
2
w1,R
w2,R
= u2,L −
u1,R +
h2
ϕ2,R ,
2
h3
= u3,R − ϕ3,R ,
2
= w2,R ,
= w3,R .
= u2,R −
Therefore, we decompose the vector of the generalized nodal displacements
as follows
ue = u1,L w1,L ϕ1,L u3,L ϕ3,L u1,R w1,R ϕ1,R u3,R ϕ3,R T ,
T
uslave
=
u
w
ϕ
w
u
w
ϕ
w
,
2,L
2,L
2,L
3,L
2,R
2,R
2,R
3,R
e
where ue are the independent unknowns and uslave
are the dependent ones.
e
Then, the compatibility conditions can be written in the compact form
ufull
e = T e ue
30
with the transformation matrix
1
1
1
1
1
1
h1
h3
1
1
−4
2
4
2
1
−1
h1
h3
1
− 2h
− 2h
h2
2h2
2
2
Te =
h1
1
2
4
1
h1
− h12
− 2h
2
1
1
1
1
1
2
− h43
1
2h2
h3
− 2h
2
1
.
1
Using this elimination of unknowns, the element mass matrix M e , the initial stiffness matrix K 0,e and the matrix K c,e , recall Eq. (7), corresponding
to the independent generalized nodal displacements follow from
M e = T T M full
e T,
K 0,e = T T K full
0,e T ,
K c,e = T T K full
c,e T .
Therefore, they are 10×10 matrices derived from the original 18×18 one. We
use the consistent mass matrix and the stiffness matrices are derived using
the selective integration scheme to avoid shear locking.
31
| 5cs.CE
|
Online Representation Learning with Single and
Multi-layer Hebbian Networks for Image Classification
Yanis Bahroun and Andrea Soltoggio
arXiv:1702.06456v3 [cs.NE] 29 Jan 2018
Loughborough University, Computer Science Department,
LE11 3TU, Leicestershire, United Kingdom
{y.bahroun,a.soltoggio}@lboro.ac.uk
Abstract. Unsupervised learning permits the development of algorithms that are
able to adapt to a variety of different data sets using the same underlying rules
thanks to the autonomous discovery of discriminating features during training.
Recently, a new class of Hebbian-like and local unsupervised learning rules for
neural networks have been developed that minimise a similarity matching costfunction. These have been shown to perform sparse representation learning. This
study tests the effectiveness of one such learning rule for learning features from
images. The rule implemented is derived from a nonnegative classical multidimensional scaling cost-function, and is applied to both single and multi-layer
architectures. The features learned by the algorithm are then used as input to a
SVM to test their effectiveness in classification on the established CIFAR-10 image dataset. The algorithm performs well in comparison to other unsupervised
learning algorithms and multi-layer networks, thus suggesting its validity in the
design of a new class of compact, online learning networks.
Keywords: Classification; Competitive learning; Feature learning; Hebbian learning; Online algorithm; Neural networks; Sparse coding; Unsupervised learning.
1 Introduction
Biological synaptic plasticity is hypothesized to be one of the main phenomena responsible for human learning and memory. One mechanism of synaptic plasticity is inspired
by the Hebbian learning principle which states that connections between two units, e.g.,
neurons, are strengthened when they are simultaneously activated. In artificial neural
networks, implementations of Hebbian plasticity are known to learn recurring patterns
of activations. The use of extensions of this rule, such as Oja’s rule [8] or the Generalized Hebbian rule, also called Sanger’s rule [14], have permitted the development of
algorithms that have proved particularly efficient at tasks such as online dimensionality reduction. Two important properties of brain-inspired models, namely competitive
learning [13] and sparse coding [9] can be performed using Hebbian and anti-Hebbian
learning rules. Such properties can be achieved with inhibitory connections, which extend the capabilities of such learning rules beyond simple extraction of the principal
component of input data. The continuous and local update dynamics of Hebbian learning also make it suitable for learning from a continuous stream of data. Such an algorithm can take one image at a time with memory requirements that are independent of
the number of samples.
2
Online Representation Learning with Hebbian Networks
This study employs Hebbian/anti-Hebbian learning rules derived from a similarity
matching cost-function [11] and applies it to perform online unsupervised learning of
features from multiple image datasets. The rule proposed in [11] is applied here for the
first time to online features learning for image classification with single and multi-layer
architectures. The quality of the features is assessed visually and by performing classification with a linear classifier working on the learned features. The simulations show
that a simple single-layer Hebbian network can outperform more complex models such
as Sparse Autoencoders (SAE) and Restricted Boltzmann machines (RBM) for image
classifications tasks [2]. When applied to multi-layer architectures, the rule learns additional features. This study is the first of its kind to perform multi-layer sparse dictionary
learning based on the similarity matching principle developed in [11] and to apply it to
image classification.
2 Hebbian/anti-Hebbian Network Derived From a Similarity
Matching Cost-Function
The rule implemented by the Hebbian/anti-Hebbian network used in this work derives
from an adaptation of Classical MultiDimensional Scaling (CMDS). CMDS is a popular
embedding technique [3]. Unlike most dimensionality reduction techniques, e.g. PCA,
the CMDS uses as input the matrix of similarity between inputs to generate a set of
embedding coordinates. The advantage of MDS is that any kind of distance or similarity
matrix can be analyzed. However, in its simplest form, CMDS produces dense features
maps which are often unsuitable when considered for image classification. Therefore an
adaptation of the CMDS introduced recently in [11] is used to overcome this weakness.
The model implemented is a nonnegative classical multidimensional scaling that has
three properties: it takes a similarity matrix as input, it produces sparse codes, and can
be implemented using a new biologically plausible Hebbian model. The Hebbian/antiHebbian rule introduced in [11] is given as follows: for a set of inputs xt ∈ Rn for
t ∈ {1, . . . , T }, the concatenation of the inputs defines an input matrix X ∈ Rn×T .
The output matrix Y of encodings is an element of Rm×T that corresponds to a sparse
overcomplete representation of the input if m > n, or to a low-dimensional embedding
of the input if m < n. The objective function proposed by [11] is:
Y ∗ = arg min kX ′ X − Y ′ Y k2F
(1)
Y ≥0
where F is the Frobenius norm and X ′ X is the Gram matrix of the inputs which corresponds to the similarity matrix. Solving Eq.1 directly requires storing Y ∈ Rm×T
+
which increases with time T making online learning difficult. Thus instead an online
learning version of Eq.1 is expressed as:
(y T )∗ = arg min kX ′ X − Y ′ Y k2F
.
(2)
y T ≥0
The components of the solution of Eq.2, found in [11] using coordinate descent, are :
(yiT )∗ = max WiT xT − MiT (y T )∗ , 0
∀i ∈ {1, . . . , m},
(3)
Online Representation Learning with Hebbian Networks
where
WijT
=
TP
−1
t=1
TP
−1
t=1
W
T
yit xtj
;
MijT
=
(yit )2
TP
−1
t=1
TP
−1
t=1
3
yit yjt
1i6=j
.
(4)
(yit )2
T
and M can be found using the recursive formulations:
T −1
T −1 T −1
T −1 T −1
T
Wij = Wij + yi (xj
− Wij yi ) ŶiT
T −1
T −1 T −1
T −1 T −1
T
Mij6
=
M
+
y
(y
−
M
y
)
ŶiT
=i
ij
i
j
ij
i
ŶiT = ŶiT −1 + (yiT −1 )2
T
.
(5)
(6)
(7)
T
W (green arrows) and M (blue arrows) can be interpreted respectively as feedforward synaptic connections between the input and the hidden layer and lateral synaptic inhibitory connections within the hidden layer. The weight matrices are of fixed sizes
and updated sequentially, which makes the model suitable for online learning. The architecture of the Hebbian/anti-Hebbian network is represented in Figure 1.
Input
layer
Hidden
layer
Output
layer
y1T
xT1
xT2
xT3
y2T
y3T
y4T
Feed-forward
connections W T
Lateral synaptic
connections M T
Fig. 1: Hebbian/anti-Hebbian network with lateral connections derived from Eq.2
3 A Model to Learn Features From Images
In the new model presented in this study, the input data vectors (x1 , . . . , xT ) are composed of patches taken randomly from a training dataset of images. For every new input
xt presented, the model first computes a sparse post-synaptic activity y t . Second, the
synaptic weights are modified based on local Hebbian/anti-Hebbian learning rules requiring only the current pre- post-synaptic neuronal activities. The model can be seen as
a sparse encoding followed by a recursive updating scheme, which are both well suited
to solve large-scale online problems.
A multi-class SVM classifies the pictures using output vectors obtained by a simple pooling of the feature vectors, Y ∗ , obtained for the input images from the trained
network. In particular, given an input image, each neuron in the output layer produces
a new image, called a feature map, which is pooled in quadrants [2] to form 4 terms of
the input vector for the SVM.
4
Online Representation Learning with Hebbian Networks
3.1 Multi-layer Hebbian/anti-Hebbian Neural Network
In the proposed approach, layers of Hebbian/anti-Hebbian network are stacked similarly to the Convolutional DBN [4], and Hierarchical K-means. In the multi-layer
Hebbian/anti-Hebbian network, both the weights of the first layer and second layer are
continuously updated. Unlike other CNNs, the non-linearity used in each layer is not
only due to the positivity constraint, but to the combination of a rectified linear unit activation function and of interneuronal competition. This model combines the powerful
architecture of convolutional neural networks using ReLU activation with interneuronal
competition, while all synaptic weights are updated using online local learning rules. In
between layers, a 2 × 2 average pooling is used to downsample the feature maps.
3.2 Overcompleteness of the Representation and Multi-resolution
As part of the evaluation of the new model, it is important to assess its performance with
different sizes (m) of the hidden layers. If the number of neurons exceeds the size of
the input (m > n), the representation is called overcomplete. Overcompleteness may be
beneficial, but requires increased computation, particularly for deep networks in which
the number of neurons has to grow exponentially in order to keep this property. One
motivation for overcompleteness is that it may allow more flexibility in matching the
output structure with the input. However, not all learning algorithms can learn and take
advantage of overcomplete representations. The behaviour of the algorithm is analysed
in the transition between undercomplete (m < n) and overcomplete (m > n) representations.
Although the model might benefit from a large number of neurons, from a practical
perspective an increase in the number of neurons is a challenge for such models due
to the number of operations required in the coordinate descent. In order to limit the
computational cost of training a large network while still benefiting from overcomplete
representations, this study proposes to train simultaneously three single-layer neural
networks, each of them having different receptive field sizes (4 × 4, 6 × 6, and 8 × 8
pixels). Thus, a variation of the model tested here is composed of three different networks. This architecture of parallel networks with different receptive field sizes requires
less computational time and memory than a model with only one receptive field size and
the same total number of neurons, because the synaptic weights only connect neurons
within each neural network. This model will be called multi-resolution in the following.
3.3 Parameters and Preprocessing
The architecture used here has the following tunable parameters: the receptive field size
(n) of the neurons and the number of neurons (m). These parameters are standard to
CNNs but their influence on this online feed-forward model needs to be investigated.
For computer vision models, understanding the influence of input preprocessing is
of critical importance for both biological plausibility and practical applicability. Recent
findings [1], confirm partial decorrelation of the input signal in the retinal ganglion
cells. The influence of input decorrelation by applying whitening will be investigated.
Online Representation Learning with Hebbian Networks
5
4 Results
The effectiveness of the algorithm is assessed by measuring the performance on an
image classification task. We acknowledge that classification accuracy is at best an implicit measure evaluating the performance of representation learning algorithms, but
provides a standardised way of comparing them. In the following, single and multilayer Hebbian/anti-Hebbian neural networks combined with the standard multi-class
SVM are trained on the CIFAR-10 dataset [5].
4.1 Evaluation of the Single-layer Model
A first experiment tested the performance of the model with and without whitening of
the input data. Although there exist Hebbian networks that can perform online whitening [10], an offline technique based on singular value decomposition [2] is applied in
these experiments. Figure 2a and 2b show the features learned by the network from
raw input and whitened input respectively. The features learned from raw data (Fig.2a)
are neither sharp nor localised filters and just slightly capture edges. With whitened
data (Fig.2b), the features are sharp, localised, and resemble Gabor filters, which are
observed in the primary visual cortex [9].
Fig. 2: Sample of features learned from raw (2a) and whitened input (2b). Classification
accuracy with raw (2c) and whitened input (2d).
(a) Features learned from raw data
(b) Features learned from whitened data
(c) Accuracy using raw data
(d) Accuracy using whitened data
72
70
74
400 Neurons
500 Neurons
600 Neurons
800 Neurons
Accuracy in %
Accuracy in %
74
68
66
64
3
72
70
68
400 Neurons
500 Neurons
600 Neurons
800 Neurons
66
64
5
7
Receptive Field Size
9
3
5
7
Receptive Field Size
9
In a second set of experiments, the performance of the network was tested for varying receptive field sizes (Fig.2c-2d) and varying network sizes (400, 500, 600, and 800
neurons). The results show that the performance peaks at a receptive field size of 7
pixels and then begins to decline. This property is common to most unsupervised learning algorithms [2], showing the difficulty of learning spatially extended features. Fig-
6
Online Representation Learning with Hebbian Networks
ures 2c and 2d also show that for every configuration, the performance of the algorithm
is largely and uniformly improved when whitening is applied to the input.
4.2 Comparison to State-of-the-art Performances and Online Training
Various unsupervised learning algorithms have been tested on the CIFAR-10 dataset.
Spherical K-means, in particular, proved in [2] to outperform autoencoders and restricted Boltzmann machines, providing a very simple and efficient solution for dictionary learning for image classification. Thus, spherical K-means is used here as a
benchmark to evaluate the performance of the single-layer network. As with other unsupervised learning algorithms, increasing the number of output neurons to reach overcompleteness also improved classification performance (Fig.3a). Although the singlelayer neural network has a higher degree of sparsity than the K-means proposed in [2]
(results not shown here), they appear to have the same performance in their optimal
configurations (Fig.3a).
The classification accuracy of the network during training is shown in Fig.3b. The
graph (Fig.3b) suggests that the features learned by the network over time help the
system improve the classification accuracy. This is significant because it demonstrates
for the first time the effectiveness of features learned with a Hebb-like cost-function
minimisation. It is not obvious a priori that the online optimisation of a cost-function
for sparse similarity matching (Eq.2) produces features suitable for image classification.
Fig. 3: (a) Proposed model vs K-means, (b) Classification accuracy
(b) Online training
(a) Optimal setup vs K-means
80
70
60
50
40
0
200
Hebbian Network
K-Means
400
600
800
Number of Neurons
Accuracy in %
Accuracy in %
80
70
60
50
40
30
20
0
5
10
Hebbian Network
15
20
Number of input streamed in 10k
As shown in Table 1, the multi-resolution network outperforms the single resolution
network and K-means algorithm [2], reaching 80.42% accuracy on the CIFAR-10. The
multi-resolution model shows better performance, while requiring less computation and
memory than the single resolution model. It also outperforms the single layer NOMP
[6], sparse TIRBM [15], CKN-GM and CKN-PM [7], which are more complex models.
It was outperformed only by combined models or models with three layers or more.
Online Representation Learning with Hebbian Networks
Algorithm
Accuracy
Single-Layer, Single Resolution (4k neurons)
Single-Layer, Multi-Resolution (3×1.6k neurons)
79.58 %
80.42 %
Single-layer K-means [2] (4k neurons)
Multi-layer K-means [2] (3 Layers, >4k neurons)
Sparse RBM
Convolutional DBN [4]
Sparse TIRBM [15] (4k neurons)
TIOMP-1/T [15] (combined transformations, 4k neurons)
Single Layer NOMP [6] ( 5k neurons)
Multi-Layer NOMP [6] (3 Layers, >4k neurons)
Multi-Layer CKN-GM [7]
Multi-Layer CKN-PM [7]
Multi-Layer CKN-CO [7] (combining CKN-GM & CKN-PM)
79.60 %
82.60 %
72.40 %
78.90 %
80.10%
82.20 %
78.00 %
82.90 %
74.84 %
78.30 %
82.18 %
7
Table 1: Comparison of the single-layer network with unsupervised learning algorithms
on CIFAR-10.
4.3 Evaluation of the Multi-layer Model
A single resolution, double-layer neural network with different numbers of neurons in
each layer was trained similarly to the single-layer network in the previous section. In
Table 2, φ1 and φ2 correspond respectively to the features learned by the first and second
layer. The results show that φ2 alone are less discriminative than φ1 as indicated in Fig.
3a. However, when combined (φ1 + φ2 ) the model achieves better performance than
each layer considered separately. Nevertheless, the preliminary results indicate that the
sizes of the two layers unevenly affect the performance of the network. A future test may
investigate if a multi-layer architecture can outperform the largest shallow networks.
50
φ2 54.9%
100 Neurons Layer 1
φ1 +φ2 67.2%
φ2 55.8%
200 Neurons Layer 1
φ1 +φ2 69.9%
#Neurons Layer 2
100 200 400
59.7% 64.7% 68.7%
68.1% 69.9% 72.4%
60.6% 65.3% 70.3%
70.8% 71.9% 73.7%
800
71.45%
73.81%
72.7%
75.1%
Table 2: Classification accuracy for a two-layer network.
5 Conclusion
This work proposes a multi-layer neural network exploiting Hebbian/anti-Hebbian rules
to learn features for image classification. The network is trained on the CIFAR-10 image dataset prior to feeding a linear classifier. The model successfully learns online
more discriminative representations of the data when the number of neurons and the
number of layers increase. The overcompleteness of the representation is critical for
learning relevant features. The results show that a minimum unsupervised learning time
is needed to optimise the network leading to better classification accuracy. Finally, one
8
Online Representation Learning with Hebbian Networks
key factor in improving image classification is the appropriate choice of the receptive
field size used for training the network.
Such findings prove that neural networks can be trained to solve problems as complex as sparse dictionary learning with Hebbian learning rules, delivering competitive
accuracy compared to other encoder, including deep neural networks. This makes deep
Hebbian networks attractive for building large-scale image classification systems. The
competitive performances on the CIFAR-10 suggests that this model can offer an alternative to batch trained neural networks. Ultimately, thanks to its bio-inspired architecture and learning rules, it also stands as a good candidate for memristive devices [12].
Moreover, if a decaying factor is added to the proposed model that might result in an
algorithm that can deal with complex datasets with temporal variations of the distributions.
References
1. Abbasi-Asl, R., Pehlevan, C., Yu, B., Chklovskii, D.B.: Do retinal ganglion cells project
natural scenes to their principal subspace and whiten them? arXiv preprint arXiv:1612.03483
(2016)
2. Coates, A., Lee, H., Ng, A.Y.: An analysis of single-layer networks in unsupervised feature
learning. In: AISTATS 2011. vol. 1001 (2011)
3. Cox, T.F., Cox, M.A.: Multidimensional scaling. CRC press (2000)
4. Krizhevsky, A., Hinton, G.: Convolutional deep belief networks on cifar-10. Unpublished
manuscript 40 (2010)
5. Krizhevsky, A., Hinton, G.: Learning multiple layers of features from tiny images (2009)
6. Lin, T.h., Kung, H.: Stable and efficient representation learning with nonnegativity constraints. In: Proceedings of the 31st International Conference on Machine Learning (ICML14). pp. 1323–1331 (2014)
7. Mairal, J., Koniusz, P., Harchaoui, Z., Schmid, C.: Convolutional kernel networks. In: Advances in Neural Information Processing Systems. pp. 2627–2635 (2014)
8. Oja, E.: Neural networks, principal components, and subspaces. International journal of neural systems 1(01), 61–68 (1989)
9. Olshausen, B.A., et al.: Emergence of simple-cell receptive field properties by learning a
sparse code for natural images. Nature 381(6583), 607–609 (1996)
10. Pehlevan, C., Chklovskii, D.: A normative theory of adaptive dimensionality reduction in
neural networks. In: Advances in Neural Information Processing Systems. pp. 2269–2277
(2015)
11. Pehlevan, C., Chklovskii, D.B.: A Hebbian/anti-Hebbian network derived from online nonnegative matrix factorization can cluster and discover sparse features. In: 2014 48th Asilomar
Conference on Signals, Systems and Computers. pp. 769–775. IEEE (2014)
12. Poikonen, J.H., Laiho, M.: Online linear subspace learning in an analog array computing
architecture. CNNA 2016 (2016)
13. Rumelhart, D.E., Zipser, D.: Feature discovery by competitive learning. Cognitive science
9(1), 75–112 (1985)
14. Sanger, T.D.: Optimal unsupervised learning in a single-layer linear feedforward neural network. Neural networks 2(6), 459–473 (1989)
15. Sohn, K., Lee, H.: Learning invariant representations with local transformations. In: Proceedings of the 29th International Conference on Machine Learning (ICML-12). pp. 1311–1318
(2012)
| 1cs.CV
|
ATTACHING LEAVES AND PICKING CHERRIES TO
CHARACTERISE THE HYBRIDISATION NUMBER FOR A SET OF
PHYLOGENIES∗
arXiv:1712.04131v1 [q-bio.PE] 12 Dec 2017
SIMONE LINZ† AND CHARLES SEMPLE‡
Abstract. Throughout the last decade, we have seen much progress towards characterising and
computing the minimum hybridisation number for a set P of rooted phylogenetic trees. Roughly
speaking, this minimum quantifies the number of hybridisation events needed to explain a set of
phylogenetic trees by simultaneously embedding them into a phylogenetic network. From a mathematical viewpoint, the notion of agreement forests is the underpinning concept for almost all results
that are related to calculating the minimum hybridisation number for when |P| = 2. However, despite various attempts, characterising this number in terms of agreement forests for |P| > 2 remains
elusive. In this paper, we characterise the minimum hybridisation number for when P is of arbitrary
size and consists of not necessarily binary trees. Building on our previous work on cherry-picking
sequences, we first establish a new characterisation to compute the minimum hybridisation number
in the space of tree-child networks. Subsequently, we show how this characterisation extends to the
space of all rooted phylogenetic networks. Moreover, we establish a particular hardness result that
gives new insight into some of the limitations of agreement forests.
Key words. agreement forest, cherry-picking sequence, minimum hybridisation, phylogenetic
networks, reticulation, tree-child networks
AMS subject classifications. 05C05; 92D15
1. Introduction. In our quest for faithfully describing evolutionary histories,
we are currently witnessing a shift from the representation of ancestral histories by
phylogenetic (evolutionary) trees towards phylogenetic networks. The latter not only
represent speciation events but also non-tree like events such as hybridisation and
horizontal gene transfer that have played an important role throughout the evolution
of certain groups of organisms as for example in plants and fish [10, 17, 18, 23].
In this paper, we focus on a problem that is related to the reconstruction of phylogenetic networks. Called Minimum Hybridisation and formally stated at the end
of this section, this problem was first introduced by Baroni et al. [2]. While Minimum
Hybridisation was historically motivated by attempting to quantify hybridisation
events, it is now more broadly regarded as a tool to quantify all non-tree like events to
which we collectively refer to as reticulation events. Pictorially speaking, Minimum
Hybridisation aims at the reconstruction of a phylogenetic network that simultaneously embeds a given set of phylogenetic trees while minimising the number of
reticulation events that are represented by vertices in the network whose in-degree is
at least two. More formally, the problem is based on the following underlying question. Given a collection P of rooted phylogenetic trees on the same set of taxa that
have correctly been reconstructed for different parts of the species’ genomes, what
is the smallest number of reticulation events that is needed to explain P? Over the
last ten years, we have seen significant progress in characterising and computing this
minimum number for when |P| = 2 (e.g. see [1, 3, 4, 8, 16, 25]). However, except
for some heuristic approaches [7, 26], less is known for when |P| ≥ 3. This is due to
∗ Submitted
to the editors December 13, 2017.
Funding: We thank the New Zealand Marsden Fund for their financial support.
† Department
of
Computer
Science,
University
of
Auckland,
New
([email protected]).
‡ School
of Mathematics and Statistics, University of Canterbury, New
([email protected]).
1
Zealand.
Zealand.
2
SIMONE LINZ AND CHARLES SEMPLE
the fact that the notion of agreement forests, which underlies almost all results that
are related to Minimum Hybridisation, appears to be ungeneralisable to more than
two trees.
Previously, together with Humphries, we introduced cherry-picking sequences and
characterised a restricted version of Minimum Hybridisation for P being binary and
of arbitrary size [12]. Instead of minimising the number of reticulation events needed
to explain P over the space of all rooted phylogenetic networks, this restricted version
only considers binary temporal tree-child networks. Such networks are the binary
intersection of the classes of temporal networks and tree-child networks introduced
by Moret et al. [19] and Cardona et al. [6], respectively. Disadvantageously, this
restriction is so strong that not even if |P| = 2 are we guaranteed to have a solution,
i.e. there may be no such network explaining P [11, Figure 2].
Here, we advance our work on cherry-picking sequences and establish two new
characterisations to quantify the amount of reticulation events that are needed to
explain a set of (not necessarily binary) phylogenetic trees. The first characterisation
solves the problem over the space of tree-child networks. Unlike temporal networks,
we show that every collection P of rooted phylogenetic trees has a solution, i.e. the
trees in P can simultaneously be embedded into a tree-child network. Subsequently,
we extend this characterisation to the space of all rooted phylogenetic networks and,
hence, provide the first characterisation for Minimum Hybridisation in its most
general form. Both characterisations are based on computing a cherry-picking sequence for P, while the latter characterisation makes also use of an operation that
attaches auxiliary leaves to the trees in P.
In addition to the two new characterisations, we return back to agreement forests
and investigate why they seem to be of limited use to solve Minimum Hybridisation
for an arbitrary size set P of rooted phylogenetic trees. Roughly speaking, given P,
one can compute a particular type of agreement forest F of smallest size and, if
|P| = 2, then each but one component in F contributes exactly one to the minimum
number of reticulation events that is needed to explain P. On the other hand, if
|P| > 2, the contribution of each component in F to this minimum number is much
less clear. Motivated by this drawback of agreement forests, we consider a set P of
rooted binary phylogenetic trees as well as the agreement forest F induced (formally
defined in Section 5) by a phylogenetic network that explains P and minimises the
number of reticulations events and ask whether or not, it is computationally hard
to calculate the minimum number of reticulation events that is needed to explain P.
We call the associated decision problem Scoring Optimum Forest. This problem
was first mentioned in [13], where the authors conjecture that Scoring Optimum
Forest is NP-complete. Using the machinery of cherry-picking sequences, we show
that Scoring Optimum Forest is NP-complete for when one considers the smaller
space of tree-child networks.
The paper is organised as follows. The remainder of the introduction contains
some definitions and preliminaries on phylogenetic networks. In Section 2, we state the
two new characterisations in terms of cherry-picking sequences. The first optimises
Minimum Hybridisation within the space of tree-child networks and the second
optimises Minimum Hybridisation within the space of all phylogenetic networks.
The second characterisation is an extension of the first by additionally allowing the
attachment of auxiliary leaves. We then establish proofs for both characterisations in
Section 3 as well as a formal description of the analogous algorithm. In Section 4, we
establish an upper bound on the number of auxiliary leaves that, given a collection
of phylogenetic trees, are needed to characterise Minimum Hybridisation over the
MINIMUM HYBRIDISATION
3
space of all rooted phylogenetic networks. Lastly, in Section 5, we formally state the
problem Scoring Optimum Forest and show that it is NP-complete. We finish the
paper with some concluding remarks in Section 6.
Throughout the paper, X denotes a non-empty finite set. A phylogenetic network
N on X is a rooted acyclic digraph with no parallel edges that satisfies the following
properties:
(i) the (unique) root has out-degree two,
(ii) the set X is the set of vertices of out-degree zero, each of which has in-degree
one, and
(iii) all other vertices either have in-degree one and out-degree two, or in-degree at
least two and out-degree one.
For technical reasons, if |X| = 1, we additionally allow N to consist of the single
vertex in X. The set X is the leaf set of N and the vertices in X are called leaves. We
sometimes denote the leaf set of N by L(N ). For two vertices u and v in N , we say
that u is a parent of v and v is a child of u if (u, v) is an edge in N . Furthermore, the
vertices of in-degree at most one and out-degree two are tree vertices, while the vertices
of in-degree at least two and out-degree one are reticulations. An edge directed into
a reticulation is called a reticulation edge while each non-reticulation edge is called
a tree edge. We say that N is binary if each reticulation has in-degree exactly two.
Lastly, a directed path P in N ending at a leaf is a tree path if every intermediate
vertex in P is a tree vertex.
A phylogenetic network N on X is tree child if each non-leaf vertex in N is the
parent of a tree vertex or a leaf. An example of two tree-child networks N and N 0 is
given at the bottom of Figure 1. Note that the phylogenetic network obtained from
N by deleting the leaf labelled 4 and suppressing the resulting degree-two vertex v
results in a network that is not tree child.
A rooted phylogenetic X-tree T is a rooted tree with no degree-2 vertices except
possibly the root which has degree at least two, and with leaf set X. If |X| = 1, then
T consists of the single vertex in X. As for phylogenetic networks, the set X is called
the leaf set of T and is denoted by L(T ). In addition, T is binary if |X| = 1 or, apart
from the root which has degree two, all interior vertices have degree three. Since we
are only interested in rooted phylogenetic trees and rooted binary phylogenetic trees
in this paper, we will refer to such trees simply as phylogenetic trees and binary
phylogenetic trees, respectively. For a phylogenetic X-tree T , we consider two types
of subtrees. Let X 0 be a subset of X. The minimal subtree of T that connects all the
leaves in X 0 is denoted by T (X 0 ). Moreover, the restriction of T to X 0 , denoted by
T |X 0 , is the phylogenetic X 0 -tree obtained from T (X 0 ) by suppressing all degree-two
vertices apart from the root. Lastly, for two phylogenetic X-trees T and T 0 , we say
that T 0 is a refinement of T if T can be obtained from T 0 by contracting a possibly
empty set of internal edges in T 0 . In addition, T 0 is a binary refinement of T if T 0 is
binary.
Let T be a phylogenetic X 0 -tree. A phylogenetic network N on X with X 0 ⊆ X
displays T if, up to suppressing vertices with in-degree 1 and out-degree 1, there
exists a binary refinement of T that can be obtained from N by deleting edges, leaves
not in X 0 , and any resulting vertices of out-degree zero, in which case we call the
resulting acyclic digraph an embedding of T in N . If P is a collection of phylogenetic
X-trees, then N displays P if each tree in P is displayed by N . For example, the two
phylogenetic networks at the bottom of Figure 1 both display each of the four trees
shown in the top part of the same figure.
Let N be a phylogenetic network with vertex set V and root ρ. The hybridisation
4
SIMONE LINZ AND CHARLES SEMPLE
P
3 2 1 4 5 6
1 2 3 4 5 6
3 2 1 4 5 6
3 2 1 4 5 6
v
1
2
3
4
5
6
1
2
3 4 5
6
N0
N
Fig. 1. Top: A set P of four phylogenetic X-trees with X = {1, 2, . . . , 6}. Bottom: Two
tree-child networks displaying P with h(N ) = 3 and h(N 0 ) = 4.
number of N , denoted h(N ), is the value
X
h(N ) =
d− (v) − 1 ,
v∈V −{ρ}
where d− (v) denotes the in-degree of v. For example, the phylogenetic networks N
and N 0 that are shown in Figure 1 have hybridisation number 3 and 4, respectively.
Observe that each tree vertex and each leaf contributes zero to this sum, but each
reticulation v contributes d− (v)−1. Furthermore, for a set P of phylogenetic X-trees,
we denote by htc (P) and h(P), respectively, the values
min{h(N ) : N is a tree-child network on X that displays P}
and
min{h(N ) : N is a phylogenetic network on X that displays P}.
Remark. While the above definition of a phylogenetic network is restricted to networks whose tree vertices have out-degree exactly two, we note that the results in this
paper also hold for networks with tree vertices whose out-degree is at least two. More
particularly, if a set P of phylogenetic X-trees is displayed by a phylogenetic network
N whose tree vertices have out-degree at least two, then, by “refining” such vertices,
we can obtain a phylogenetic network N 0 whose tree vertices have out-degree exactly
two, displays P, and h(N 0 ) = h(N ). Thus no generality is lost with this restriction.
We next formally state the two decision problems that this paper is centred
around.
Minimum Tree-Child Hybridisation
Instance. A set P of phylogenetic X-trees and a positive integer k.
Question. Does there exist a tree-child network N on X that displays P such that
h(N ) ≤ k?
Minimum Hybridisation
Instance. A set P of phylogenetic X-trees and a positive integer k.
MINIMUM HYBRIDISATION
5
Question. Does there exist a phylogenetic network N on X that displays P such
that h(N ) ≤ k?
We will see at the end of this section that, for any given set P of phylogenetic
X-trees, Minimum Tree-Child Hybridisation has a solution, i.e. there exists a
tree-child network that displays P.
It was shown in [3] that Minimum Hybridisation is NP-hard, even for when
P consists of two rooted binary phylogenetic X-trees. To see that Minimum TreeChild Hybridisation is also computationally hard, we again consider this restricted
version of the problem and recall the following observation that was first mentioned
in [12] and can be derived by slightly modifying the proof of [2, Theorem 2].
Observation 1.1. Let P = {T , T 0 } be a collection of two binary phylogenetic
X-trees. If there exists a phylogenetic network N that displays P with h(N ) = k,
then there also exists a tree-child network N 0 that displays P with h(N 0 ) ≤ k.
The next theorem, whose straightforward proof is omitted, follows from Observation 1.1 and the fact that, given a tree-child network N and a binary phylogenetic
tree T , it can be checked in polynomial time whether or not N displays T [14, 21].
Theorem 1.2. The decision problem Minimum-Tree-Child Hybridisation is
NP-complete.
We end this section by showing that every collection of phylogenetic trees can be
displayed by a tree-child network. For n = 2, let U2 be the unique binary phylogenetic
tree on two leaves, x1 and x2 say, whose root ρ is a vertex at the end of a pendant
edge adjoined to the original root. Now for a positive integer n > 2, obtain Un from
Un−1 by adding an edge that joins a new vertex v and a new leaf xn and, for each tree
edge e in Un−1 , subdividing e with a new vertex ue and adding the edge (ue , v). We
call Un the universal network on n leaves and note that Un is unique up to relabelling
its leaves.
Theorem 1.3. Let Un be the universal network on X = {x1 , x2 , . . . , xn } with
n ≥ 2. Then Un is tree child and displays all binary phylogenetic X-trees.
Proof. By construction of Un from Un−1 it is straightforward to check that, as U2
is tree child, Un is tree child. To see that Un displays all binary phylogenetic X-trees,
we use induction on n. Clearly, U2 displays the unique binary phylogenetic tree on two
leaves. For n ≥ 3, assume that the universal network Un−1 on X 0 = {x1 , x2 , . . . , xn−1 }
displays all binary phylogenetic X 0 -trees. Observe that Un−1 can be obtained from
Un by deleting xn , the parent of xn and all their incident edges, and suppressing
all resulting vertices with in-degree 1 and out-degree-1. Now, let Tn be a binary
phylogenetic X-tree, and let Tn−1 be Tn |X 0 . Furthermore, let C be the subset of X 0
that consists of the descendant leaves of the parent of xn in Tn . As Un−1 displays
Tn−1 , there exist an embedding E of Tn−1 in Un−1 and an edge (u, v) in E such that
the set of descendants of v in E is precisely C. If (u, v) is a tree edge in Un−1 , then it
is easily checked that Un displays Tn by construction. On the other hand, if (u, v) is a
reticulation edge in Un−1 , then v has out-degree 1 in E. Let (v, w) be the unique edge
in E that is directed out of v. Note that, as Un−1 is tree child, w is a tree vertex in
Un−1 . Then, as (v, w) is a tree edge in Un−1 that is subdivided by a new vertex in the
construction of Un from Un−1 , it again follows that Un displays Tn . This completes
the proof of the theorem.
The next corollary is an immediate consequence of Theorem 1.3 and the fact that
6
SIMONE LINZ AND CHARLES SEMPLE
every phylogenetic tree has a binary refinement on the same leaf set.
Corollary 1.4. Let P be a set of phylogenetic X-trees. There exists a tree-child
network on X that displays P.
While every collection of phylogenetic X-trees can be displayed by a tree-child
network on X, a simple counting argument shows that the analogous result is not
true for binary tree-child networks. Specifically, a binary tree-child network on X has
at most |X| − 1 reticulations [6, Proposition 1] and so displays at most 2|X|−1 distinct
binary phylogenetic X-trees. But for large enough X, there are many more distinct
binary phylogenetic X-trees than 2|X|−1 . For related results, we refer the interested
reader to [22].
2. Cherry-picking characterisations. In this section, we state the two cherrypicking characterisations whose proofs are given in the next section. Let T be a
phylogenetic X-tree with root ρ, where |X| ≥ 2. If x is a leaf of T , we denote by
T \x the operation of deleting x and its incident edge and, if the parent of x in T
has out-degree 2, suppressing the resulting degree-two vertex. Note that if the parent
of x is ρ and ρ has out-degree 2, then T \x denotes the operation of deleting x and
its incident edge, and then deleting ρ and its incident edge. Observe that T \x is a
phylogenetic tree on X − {x}. A 2-element subset {x, y} of X is a cherry of T if x
and y have the same parent. Clearly, every phylogenetic tree with at least two leaves
contains a cherry. In this paper, we typically distinguish the leaves in a cherry, in
which case we write {x, y} as the ordered pair (x, y) depending on the roles of x and
y.
Let P be a set of phylogenetic X-trees. A sequence
σ = (x1 , y1 ), (x2 , y2 ), . . . , (xs , ys ), (xs+1 , −), (xs+2 , −), . . . , (xt , −)
of ordered pairs in X × (X ∪ {−}) is a cherry-picking sequence of P if the following
algorithm returns a set of phylogenetic trees each of which consists of a single vertex
in {xs+1 , xs+2 , . . . , xt }.
Algorithm. Picking Cherries
Input. A set P of phylogenetic X-trees and a cherry-picking sequence
σ = (x1 , y1 ), (x2 , y2 ), . . . , (xs , ys ), (xs+1 , −), (xs+2 , −), . . . , (xt , −)
for P.
Output. A set Ps of phylogenetic trees.
Step 1. Set P0 = P and, for each tree T ∈ P, set T0 = T . Set i = 1.
Step 2. Set Pi to be the set of phylogenetic trees obtained from Pi−1 by performing
exactly one of the following two operations for each tree Ti−1 ∈ Pi−1 :
(a) If {xi , yi } is a cherry of Ti−1 , then set Ti = Ti−1 \xi .
(b) Else, set Ti = Ti−1 .
Step 3. If i < s, increment i by one and repeat Step 2; otherwise, return Ps .
For all i ∈ {1, 2, . . . , s}, we say that Pi is obtained from P by picking x1 , x2 , . . . , xi .
Furthermore, if Pi 6= Pi+1 for each i ∈ {1, 2, . . . , s − 1}, we say that each ordered pair
in σ is essential. The weight of σ, denoted w(σ), is the value t − |X|. Observe that if
σ is a cherry-picking sequence of P, then
t − |X| ≥ 0
MINIMUM HYBRIDISATION
7
as each element in X must appear as the first element in an ordered pair in σ.
A particular type of cherry-picking sequence underlies our characterisation of
htc (P). To this end, let P be a set of phylogenetic X-trees. A cherry-picking sequence
σ = (x1 , y1 ), (x2 , y2 ), . . . , (xs , ys ), (xs+1 , −), (xs+2 , −), . . . , (xt , −)
for P is called a tree-child sequence if t = s + 1 and, for all i ∈ {1, 2, . . . , s}, we
have xi 6∈ {yi+1 , yi+2 , . . . , ys }. Now, let σ be a tree-child sequence for P. We call
σ a minimum-tree-child sequence of P if w(σ) is of smallest value over all tree-child
sequences of P. This smallest value is denoted by stc (P). It will follow from the
results in the next section (Lemma 3.4) that every collection P of phylogenetic trees
has a tree-child sequence and so stc (P) is well defined.
Referring to Figure 1,
σ = (3, 2), (3, 4), (5, 6), (5, 4), (1, 2), (4, 2), (4, 6), (2, 6), (6, −)
is a tree-child sequence with weight w(σ) = 9 − 6 = 3 for the four trees shown at the
top of this figure.
Remark. As noted in the introduction, cherry-picking sequences were introduced
in [12]. In the set-up of this paper, the difference is as follows. Instead of a cherrypicking sequence consisting of a set of ordered pairs, a cherry-picking sequence in [12]
consists of an ordering of the elements in X. Moreover, this ordering has the additional property that, in the step analogous to Step 2 of Picking Cherries, xi is part
of a cherry of every tree in Pi−1 . At this step, xi is deleted from each tree in Pi−1 ,
and the iterative process continues. The weighting of such a sequence is based, across
all i, on the number of different cherries of which xi is part of. It is not difficult to
see how this could be interpreted as a special type of tree-child sequence.
The first of our new characterisations is the next theorem. For a given set P of
phylogenetic X-trees, it writes htc (P) in terms of tree-child sequences for P.
Theorem 2.1. Let P be a set of phylogenetic X-trees. Then
htc (P) = stc (P).
To state the second characterisation, we require an additional concept. Let T be
a phylogenetic X-tree. Consider the operation of adjoining a new leaf z to T in one
of the following three ways.
(i) Subdivide an edge of T with a new vertex, u say, and add the edge (u, z)
(ii) View the root ρ of T as a degree-one vertex adjacent to the original root and
add the edge (ρ, z).
(iii) Add the edge (v, z), where v is an interior vertex of T .
We refer to this operation as attaching a new leaf z to T . More generally, if Z is a
finite set of elements such that X ∩ Z is empty, then attaching Z to T is the operation
of attaching, in turn, each element in Z to T to eventually obtain a phylogenetic tree
on X ∪ Z. We refer to Z as a set of auxiliary leaves. Lastly, attaching Z to a set P of
phylogenetic X-trees is the operation of attaching Z to each tree in P.
Let P be a set of phylogenetic X-trees. A tree-child sequence σ for P is leaf
added if it is a tree-child sequence of a set of phylogenetic trees obtained from P
8
SIMONE LINZ AND CHARLES SEMPLE
P
1 2 3 4 5 6 7 8
1 4 2 3 5 6 7 8
1 2 3 4 6 7 8 5
P0
1 2 3 4 z 5 6 7 8
1 4 2 3 z 5 6 7 8
1 2 3 z 4 6 7 8 5
Fig. 2. Two sets P and P 0 of phylogenetic trees, where P 0 is obtained by attaching z to P. (In
parts, adapted from [13, Figure 1].)
by attaching a set of auxiliary leaves. We denote the minimum weight amongst all
leaf-added tree-child sequences of P by s`-tc (P). Of course, s`-tc (P) ≤ stc (P), but
this inequality can also be strict. To illustrate, consider the two sets P and P 0 of
phylogenetic trees shown in Figure 2. Now
σ = (4, 5), (4, 1), (4, 3), (5, 6), (5, 3), (5, 8),
(2, 3), (3, 1), (6, 7), (7, 8), (1, 8), (8, −)
is a tree-child sequence for P of weight w(σ) = 12 − 8 = 4. In fact, it follows
from [13, 15] that htc (P) = 4 (see Section 6 for details). On the other hand,
σ 0 = (5, z), (5, 8), (4, z), (4, 1), (z, 3), (z, 6),
(2, 3), (3, 1), (6, 7), (7, 8), (1, 8), (8, −)
is a tree-child sequence for P 0 of weight w(σ 0 ) = 12 − 9 = 3. Since P 0 can be obtained
by attaching z to P, it follows that σ 0 is a leaf-added tree-child sequence for P and
s`-tc (P) ≤ 3.
For a given set P of phylogenetic X-trees, the next theorem characterises h(P)
in terms of leaf-added tree-child sequences.
Theorem 2.2. Let P be a set of phylogenetic X-trees. Then
h(P) = s`-tc (P).
It is worth noting that, for a set P of phylogenetic X-trees, it follows from Theorems 2.1 and 2.2 that htc (P) and h(P) can be determined without constructing a
phylogenetic network.
3. Proofs of Theorems 2.1 and 2.2. In this section, we prove Theorems 2.1
and 2.2. Most of the work is in proving Theorem 2.1. We begin by showing that
htc (P) ≤ stc (P).
Lemma 3.1. Let P be a set of phylogenetic X-trees. Let σ be a tree-child sequence
for P. Then there exists a tree-child network N on X that displays P with h(N ) ≤
w(σ) satisfying the following properties:
MINIMUM HYBRIDISATION
9
(i) If u is a tree vertex in N and not the parent of a reticulation, then there are
leaves `1 and `2 at the end of tree paths starting at the children v1 and v2 of u,
respectively, such that (`1 , `2 ) is an element in σ.
(ii) If u is a tree vertex in N and the parent of a reticulation v, then there are leaves
`u and `v at the end of tree paths starting at u and v, respectively, such that
(`v , `u ) ∈ σ.
Proof. Let
σ = (x1 , y1 ), (x2 , y2 ), . . . , (xs , ys ), (xs+1 , −)
be a tree-child sequence for P. The proof is by induction on s. If s = 0, then
|X| = 1 and each tree in P consists of the single vertex in X. It immediately follows
that choosing N to be the phylogenetic network consisting of the single vertex in X
establishes the lemma for s = 0.
Now suppose that s ≥ 1, and that the lemma holds for all tree-child sequences
for sets of phylogenetic trees on the same leaf set whose length is at most s. Let
σ 0 = (x2 , y2 ), (x3 , y3 ), . . . , (xs , ys ), (xs+1 , −)
and let P 0 be the set of phylogenetic trees obtained from P by picking x1 .
First assume each tree in P 0 has the same leaf set, namely X 0 = X − {x1 }. Then
0
σ is a tree-child sequence for P 0 . By induction, there is a tree-child network N 0 on
X 0 that displays P 0 with h(N 0 ) ≤ w(σ 0 ) and satisfies (i) and (ii). Since each tree in P 0
has the same leaf set, {x1 , y1 } is a cherry in each tree in P. Therefore, as N 0 displays
a binary refinement of each tree in P 0 , the tree-child network obtained from N 0 by
subdividing the edge directed into y1 with a new vertex u and adding the edge (u, x1 )
displays P. Furthermore, as h(N 0 ) ≤ w(σ 0 ) and N 0 satisfies (i) and (ii) relative to σ 0 ,
we have h(N ) = h(N 0 ) ≤ w(σ 0 ) = w(σ) and it is easily seen that N satisfies (i) and
(ii) relative to σ.
Now assume that not every tree in P 0 has the same leaf set. Let P10 denote the
subset of trees in P 0 whose leaf set is X − {x1 }. Since P 0 − P10 is non-empty, there
exists an ordered pair in σ 0 whose first coordinate is x1 . Note that (x1 , −) is not in
σ; otherwise there is an ordered pair in σ whose second coordinate is x1 and so σ is
not a tree-child sequence for P. Let (x1 , yi ) be the first such ordered pair. Let T1 be
a tree in P10 and, using σ 0 , consider applying i − 2 iterations of Picking Cherries
to T1 . Let X1 denote the subset of leaves in X − {x1 } that are deleted from T1 in this
process. Observe that, as yi is the second coordinate in (x1 , yi ), we have yi 6∈ X1 .
We next add x1 to T1 to obtain a phylogenetic X-tree for which σ 0 is a tree-child
sequence. Let w be the (unique) vertex of T1 that is closest to the root with the
property that yi is a descendant leaf of w, and the child of w on the path from w to yi
has all its descendant leaves in X1 ∪ {yi }. Let T10 be the binary phylogenetic X-tree
obtained from T by adding the edge (w, x1 ). We now show that σ 0 is a tree-child
sequence for T10 . Suppose that σ 0 is not a tree-child sequence for T10 . Let u be the
parent of w in T10 . Then amongst the first i − 2 ordered pairs in σ 0 is an ordered pair
of the form (xj , yi ) that is essential when, using σ 0 , Picking Cherries is applied to
T1 , where xj is a descendant leaf of u in T10 . But then, each descendant leaf of w is in
X1 ∪ {yi }, contradicting the choice of w.
Repeating this placement of x1 for each tree in P10 , we obtain a set P100 of phylogenetic X-trees from P10 . Let P 00 = P100 ∪ (P 0 − P10 ) and observe that σ 0 is a tree-child
sequence for P 00 . Therefore, by induction, there is a tree-child network N 0 on X that
displays P 00 with h(N 0 ) ≤ w(σ 0 ) and satisfies (i) and (ii).
10
SIMONE LINZ AND CHARLES SEMPLE
Let p denote the parent of x1 in N 0 . If p is a reticulation, let N be the phylogenetic
network obtained from N 0 by subdividing the edge directed into y1 with a new vertex
u and adding the edge (u, p). Since N 0 is tree child and displays P 0 , it follows that
N is tree child and displays P. Furthermore,
h(N ) = h(N 0 ) + 1 ≤ w(σ 0 ) + 1 = w(σ).
Additionally, as (x1 , y1 ) ∈ σ, it also follows that, as N 0 satisfies (i) and (ii) relative
to σ 0 , we have N satisfies (i) and (ii) relative to σ.
Thus we may assume that p is a tree vertex. Let w denote the child of p that
is not x1 in N 0 . If w is a reticulation, then, as N 0 satisfies (ii), σ 0 contains a cherry
in which x1 is the second coordinate. But (x1 , y1 ) is the first ordered pair in σ and
so, as σ is tree child, x1 is never the second coordinate in an ordered pair in σ; a
contradiction. Therefore w is either a tree vertex or a leaf in N 0 . So, as N 0 satisfies
(i) and no ordered pair has x1 as the second coordinate, it follows that σ 0 contains an
ordered pair, (x1 , yj ) say, where yj is the leaf at the end of a tree path in N 0 starting
at w. Now let N be the phylogenetic network obtained from N 0 by subdividing the
edges directed into y1 and x1 with new vertices u and v, respectively, and adding the
edge (u, v). Since N 0 is tree child and h(N 0 ) ≤ w(σ 0 ), it is easily seen that N is tree
child and h(N ) = h(N 0 ) + 1 ≤ w(σ 0 ) + 1 = w(σ). Furthermore, N 0 displays P 0 − P10 as
well as P100 , and therefore P10 |(X − {x1 }). Thus N displays P. To see that N satisfies
(i) and (ii) relative to σ, it suffices to show that N satisfies (ii) for p and u. Indeed,
the two ordered pairs (x1 , yj ) and (x1 , y1 ) in σ verify (ii) for p and u, respectively.
This completes the proof of the lemma.
The next corollary immediately follows from Lemma 3.1.
Corollary 3.2. Let P be a set of phylogenetic X-trees. Then htc (P) ≤ stc (P).
For the proof of the converse of Corollary 3.2, we begin with an additional lemma.
Let N be a phylogenetic network, and let x and y be two leaves in N . Generalising
cherries to phylogenetic networks, we say that {x, y} is a cherry in N if x and y have
a common parent. Moreover, we call {x, y} a reticulated cherry if the parent of x, say
px , and the parent of y, say py , are joined by a reticulation edge (py , px ) in which case
we say that x is the reticulation leaf relative to {x, y}. We next define two operations
on N . First, reducing a cherry {x, y} is the operation of deleting one of the two leaves
in {x, y}, and suppressing the resulting degree-2 vertex. Second, reducing a reticulated
cherry {x, y} is the operation of deleting the reticulation edge joining the parents of
x and y and suppressing any resulting degree-2 vertices. The proof of the next lemma
is similar to the analogous result for binary tree-child networks [5, Lemma 4.1] and is
omitted.
Lemma 3.3. Let N be a tree-child network on X. Then the following hold.
(i) If |X| ≥ 2, then N contains either a cherry or a reticulated cherry.
(ii) If N 0 is obtained from N by reducing either a cherry or a reticulated cherry,
then N 0 is a tree-child network.
Lemma 3.4. Let P be a set of phylogenetic X-trees. Then htc (P) ≥ stc (P).
Proof. Let N be a tree-child network on X that displays P. By Corollary 1.4,
such a network exists. We establish the lemma by explicitly constructing a tree-child
sequence σ for P such that w(σ) ≤ h(N ).
Let ρ denote the root of N , and let v1 , v2 , . . . , vr denote the reticulations of N .
Let `ρ , `1 , `2 , . . . , `r denote the leaves at the end of tree paths Pρ , P1 , P2 , . . . , Pr in N
MINIMUM HYBRIDISATION
11
starting at ρ, v1 , v2 , . . . , vr , respectively. Observe that these paths are pairwise vertex
disjoint. We now construct a sequence of ordered pairs as follows:
Step 1. Set N = N0 and σ0 to be the empty sequence. Set i = 1.
Step 2. If Ni−1 consists of a single vertex xi , then set σi to be the concatenation of
σi−1 and (xi , −), and return σi .
Step 3. If {xi , yi } is a cherry in Ni−1 , then
(a) If one of xi and yi , say xi , equates to `j for some j ∈ {1, 2, . . . , r} and
vj is not a reticulation in Ni−1 , then set σi to be the concatenation of
σi−1 and (xi , yi ).
(b) Otherwise, set σi to be the concatenation of σi−1 and (xi , yi ), where
xi 6∈ {`ρ , `1 , `2 , . . . , `r }.
(c) Set Ni to be the tree-child network obtained from Ni−1 by deleting xi ,
thereby reducing the cherry {xi , yi }.
(d) Increase i by one and go to Step 2.
Step 4. Else, there is a reticulated cherry {xi , yi } in Ni−1 , where xi say is the reticulation leaf.
(a) Set σi to be the concatenation of σi−1 and (xi , yi ).
(b) Set Ni to be the tree-child network obtained from Ni−1 by reducing the
reticulated cherry {xi , yi }.
(c) Increase i by one and go to Step 2.
First note that it is easily checked that the construction is well defined, that is,
it returns a sequence of ordered pairs. Moreover, in each iteration i of the above
construction, it follows from Lemma 3.3 that Ni is tree child. We next show that, if
{xi , yi } is a cherry in Ni−1 , and xi and yi equate to `j and `j 0 , respectively, where `j
and `j 0 are elements in {`1 , `2 , . . . , `r }, then exactly one of vj and vj 0 is a reticulation
in Ni−1 . To see this, if vj and vj 0 are both reticulations in Ni−1 , then Pj and Pj 0
are not vertex disjoint in N ; a contradiction. On the other hand, suppose neither vj
and vj 0 are reticulations in Ni−1 . Without loss of generality, we may assume {xi , yi }
is the first such cherry for which this holds. Since N is tree child, and therefore has
no tree vertex that is the parent of two reticulations, there is an iteration i0 < i, in
which the cherry (xi0 , yi0 ) is concatenated with σi0 −1 , where yi0 ∈ {xi , yi }, and Ni0
has {xi , yi } as a cherry but Ni0 −1 does not. If xi0 = `ρ or xi0 ∈ {`1 , `2 , . . . , `r }, we
contradict the construction by the choice of {xi , yi }. Also, if xi0 6∈ {`ρ , `1 , `2 , . . . , `r },
then we again contradict the construction. Hence, we may assume for the remainder
of the proof that exactly one of vj and vj 0 is a reticulation in Ni−1 .
Let
σ = (x1 , y1 ), (x2 , y2 ), . . . , (xi−1 , yi−1 ), (xi , −)
be the sequence returned by the construction. We prove by induction on i that σ is
a tree-child sequence for P whose weight is at most h(N ). If i = 1, then N consists
of the single vertex in X and the construction correctly returns such a sequence.
Now suppose that i ≥ 2, and consider the first iteration of the construction. Either
{x1 , y1 } is a cherry or a reticulated cherry of N0 . If {x1 , y1 } is a cherry, then {x1 , y1 }
is a cherry of each tree in P. In this instance, let P 0 denote the set of phylogenetic
X 0 -trees obtained from P by picking x1 , where X 0 = X − {x1 }. Observe that N1 is
a tree-child network on X 0 that displays P 0 .
Now assume that {x1 , y1 } is a reticulated cherry with x1 as the reticulation leaf.
Let P1 be the subset of trees in P not displayed by N1 and let P2 = P −P1 . Note that
12
SIMONE LINZ AND CHARLES SEMPLE
{x1 , y1 } is a cherry of each tree in P1 . For each tree in P1 , delete the edge incident
with x1 , suppress any resulting degree-2 vertex, and reattach x1 to the rest of the tree
containing y1 by subdividing an edge with a new vertex and adding an edge joining
this vertex and x1 so that the resulting phylogenetic X-tree is displayed by N1 . It is
easily seen that this is always possible. Let P10 denote the resulting collection of trees
obtained from P1 . For this instance, let P 0 = P10 ∪ P2 and observe that N1 displays
P 0 . To complete the induction it suffices to show that if
σ 0 = (x2 , y2 ), (x3 , y3 ), . . . , (xi−1 , yi−1 ), (xi , −)
is a tree-child sequence for P 0 whose weight w(σ 0 ) is at most h(N1 ), then σ is a
tree-child sequence for P whose weight w(σ) is at most h(N0 ), that is, at most h(N ).
First assume that {x1 , y1 } is a cherry of N0 . Then, as {x1 , y1 } is a cherry of
each tree in P, it follows by induction that σ is a cherry-picking sequence of P.
Furthermore, as σ 0 is tree child and x1 ∈
/ L(N1 ), σ is also tree child. Since x1 only
appears once as the first coordinate of an ordered pair in σ, we have
w(σ) = w(σ 0 ) ≤ h(N1 ) = h(N0 ).
Now assume that {x1 , y1 } is a reticulated cherry of N0 with x1 as the reticulation
leaf. Without loss of generality, let v1 denote the associated reticulation, so that
x1 = `1 . Since each tree in P1 has {x1 , y1 } as a cherry and σ 0 is a tree-child sequence
for P 0 , it follows that σ is a cherry-picking sequence for P.
We next show that σ is tree child. If the in-degree of v1 is at least three in
N0 , then v1 exists in N1 and so, by construction, x1 does not appear as the second
coordinate of an ordered pair in σ 0 as well as in σ. Therefore, if the in-degree of v1 is
at least three in N0 , then σ is a tree child.
Now suppose that the in-degree of v1 is two in N0 . To establish that σ is tree
child, assume to the contrary that x1 appears as the second coordinate of an ordered
pair in σ 0 . Let (z, x1 ) denote the first such ordered pair. Then, at some iteration
j, either {z, x1 } is a cherry or a reticulated cherry of Nj−1 . If {z, x1 } is a cherry
of Nj−1 , then, since x1 = `1 , we are in Step 3(a) in iteration j of the construction
and so the ordered pair should be (x1 , z); a contradiction. On the other hand, if
{z, x1 } is a reticulated cherry of Nj−1 , then z is the reticulation leaf of {z, x1 } and,
by construction of σ, one of the parents of v1 in N0 is the parent of two reticulations
in N0 , namely v1 and the reticulation for which, by construction, there is a tree path
starting at this reticulation and ending at z; a contradiction as N0 is tree child. Hence
σ is tree child. Furthermore, as w(σ) = w(σ 0 ) + 1 and h(N0 ) = h(N1 ) + 1,
w(σ) = w(σ 0 ) + 1 ≤ h(N1 ) + 1 = h(N0 ).
This completes the proof of the lemma.
Proof of Theorem 2.1. Combining Corollary 3.2 and Lemma 3.4 establishes the
theorem.
We next establish Theorem 2.2.
Proof of Theorem 2.2. We first show that h(P) ≤ s`-tc (P). Let P 0 be a set of
phylogenetic trees obtained from P by attaching a set Z such that X ∩ Z is empty
and s`-tc (P) = stc (P 0 ). It follows by Theorem 2.1 that there is a tree-child network
N 0 on X ∪ Z that displays P 0 with h(N 0 ) = stc (P 0 ). Observe that N 0 displays P. Let
N be the phylogenetic network on X obtained from N 0 by deleting every vertex that
MINIMUM HYBRIDISATION
13
is not on a directed path from the root to a leaf in X, and suppressing any resulting
non-root vertex of degree two. Noting that no deleted vertex is used to display a
phylogenetic tree in P, it is easily checked that, up to the root having out-degree one,
N displays P. Furthermore, h(N ) ≤ h(N 0 ). Therefore, by Theorem 2.1,
h(P) ≤ h(N ) ≤ h(N 0 ) = stc (P 0 ) = s`-tc (P).
In particular, h(P) ≤ s`-tc (P).
To prove the converse, h(P) ≥ s`-tc (P), let N be a phylogenetic network on X
that displays P and h(N ) = h(P). Let N 0 be the phylogenetic network obtained by
attaching a new leaf to each reticulation edge in N , i.e. for each reticulation edge e,
subdivide e with a new vertex u and add a new edge (u, ze ), where ze ∈
/ X. It is easily
checked that N 0 is tree child and h(N 0 ) = h(N ). Let Z denote the set of new leaves
attached to N . For each tree T in P, let Tr denote a binary refinement of T that is
displayed by N , and let Tr0 be a binary phylogenetic tree with leaf set X ∪ Z that
is displayed by N 0 and obtained from Tr by attaching Z. Note that Tr0 is a binary
refinement of a tree that can be obtained from T by attaching Z. Set
Pr0 = {Tr0 : T ∈ P},
and note that htc (Pr0 ) ≤ h(N 0 ) as N 0 is tree child and displays Pr0 . Since each tree in
Pr0 is a binary refinement of a tree that can be obtained from a tree in P by attaching
Z, we have s`-tc (P) ≤ stc (Pr0 ). Thus, by Theorem 2.1,
s`-tc (P) ≤ stc (Pr0 ) = htc (Pr0 ) ≤ h(N 0 ) = h(N ) = h(P),
and so s`-tc (P) ≤ h(P).
We end this section with the pseudocode of an algorithm—called Construct
Tree-Child Network—that constructs a tree-child network from a tree-child sequence. Specifically, given a tree-child sequence σ for a set P of phylogenetic X-trees,
Construct Tree-Child Network returns a tree-child network N on X that displays P and h(N ) ≤ w(σ). This is the same construction as that used to prove
Lemma 3.1 and so the proof of its correctness is not given.
Algorithm. Construct Tree-Child Network
Input. A set P of phylogenetic X-trees, and a tree-child sequence
σ = (x1 , y1 ), (x2 , y2 ), . . . , (xs , ys ), (xs+1 , −)
for P.
Output. A tree-child network N on X that displays P and h(N ) ≤ w(σ).
Step 1. If |X| = 1, set Ns+1 to be the phylogenetic network consisting of the single
vertex xs+1 in X and return Ns+1 . Otherwise, set Ns+1 to be the phylogenetic network consisting of the single edge (ρ, xs+1 ) and set i = s.
Step 2. Depending on which holds, do exactly one of the following three steps.
(a) If xi ∈ L(Ni+1 ) and the parent pi of xi is a reticulation in Ni+1 , then
obtain Ni from Ni+1 by subdividing the edge directed into yi with a
new vertex u and adding a new edge (u, pi ).
(b) If xi ∈ L(Ni+1 ) and the parent pi of xi is not a reticulation in Ni+1 ,
then obtain Ni from Ni+1 by subdividing the edge directed into yi with
a new vertex u, subdividing the edge (pi , xi ) with a new vertex v, and
adding a new edge (u, v).
14
SIMONE LINZ AND CHARLES SEMPLE
(c) Else xi ∈
/ L(Ni+1 ), and obtain Ni from Ni+1 by subdividing the edge
directed into yi with a new vertex u and adding a new edge (u, xi ).
Step 3. If i = 1, then set N to be the network obtained from Ni by deleting the
unique edge incident with ρ and return N . Otherwise, decrement i by one
and go to Step 2.
Now, let σ be a leaf-added tree-child sequence for a set P of phylogenetic X-trees.
Then there exists a set P 0 of phylogenetic trees on X ∪Z obtained from P by attaching
Z such that σ is a tree-child sequence for P 0 . It is straightforward to check that the
network N on X resulting from calling Construct Tree-Child Network for P 0
and σ and, subsequently, restricting to vertices and edges on a path from the root to
leaves in X as described in the first direction of the proof of Theorem 2.2 displays P
and h(N ) ≤ w(σ).
4. Bounding the maximum number of auxiliary leaves. In light of Theorem 2.2, a natural question to ask is how many auxiliary leaves need to be attached
to a given set P of phylogenetic X-trees in order to calculate h(P). Attaching auxiliary leaves to P is necessary whenever h(P) < htc (P). Here, we provide an upper
bound on the number of auxiliary leaves in terms of htc (P). We start by introducing
two operations that, repeatedly applied, transform any phylogenetic network N that
displays P into a tree-child network without increasing h(N ) and that displays a set
of binary phylogenetic trees obtained from P by attaching auxiliary leaves.
Let N be a phylogenetic network on X, and let (u, v) be an edge in N such that
u and v are reticulations. Obtain a phylogenetic network N 0 from N by contracting
(u, v) and, for each resulting pair of parallel edges, repeatedly deleting one of the two
edges in parallel and suppressing the resulting degree-two vertex. We say that N 0 has
been obtained from N by a contraction.
Lemma 4.1. Let P be a collection of phylogenetic X-trees, and let N be a phylogenetic network on X that displays P. Let N 0 be a phylogenetic network obtained
from N by a contraction. Then N 0 displays P and h(N 0 ) ≤ h(N ).
Proof. Let (u, v) be the edge in N that is incident with two reticulations and
contracted in the process of obtaining N 0 from N . Furthermore, let w be the vertex in
N 0 that results from identifying u and v. We have d− (w) ≤ d− (u)+d− (v)−1 while all
other reticulations w0 in N 0 correspond to a reticulation u0 in N and d− (w0 ) = d− (u0 ).
It now follows that h(N 0 ) ≤ h(N ).
Now, let T be a tree in P. If v is not used to display T in N , then u is also not
used to display T in N , and it is easily seen that N 0 displays T without using w. On
the other hand, if v is used to display T in N , then exactly one parent, t say, of v
is used to display T in N . If t 6= u, it is clear that N 0 displays P. Furthermore, if
t = u, then exactly one parent of u, say s, is used to display T in N . Now, regardless
of whether or not s is also a parent of v in which case s is suppressed in obtaining N 0
from N , it again follows that N 0 displays T . Hence N 0 displays each tree in P and
the lemma follows.
We call a phylogenetic network with no edges whose end vertices are both reticulations stack free. It follows from repeated applications of Lemma 4.1 that if P is
a collection of phylogenetic X-trees, then there is a stack-free network N on X that
displays P such that h(N ) = h(P).
For the second operation, let N be a phylogenetic network on X, and let u be a
tree vertex in N whose two children are both reticulations. Furthermore, let (u, v) be
15
MINIMUM HYBRIDISATION
u
u
v
v
0
v
w
w
z
(a)
(b)
Fig. 3. The phylogenetic networks at the bottom are obtained from their respective networks at
the top by (a) a contraction and (b) a leaf-attaching operation.
a reticulation edge, and let z ∈
/ X. Obtain a phylogenetic network N 0 on X ∪{z} from
N by subdividing the edge (u, v) with a new vertex w and adding a new edge (w, z).
We say that N 0 has been obtained from N by a leaf-attaching operation. Figure 3
illustrates (a) a contraction and (b) a leaf-attaching operation.
We are now in a position to establish the main result of this section.
Theorem 4.2. Let P be a collection of phylogenetic X-trees. There exists a set
Z of auxiliary leaves with the following two properties.
(i) |Z| ≤ htc (P), and
(ii) there is a collection PZ of binary phylogenetic trees with leaf set X∪Z obtained
from P by attaching Z such that h(P) = htc (PZ ).
Proof. Let N be a stack-free network on X that displays P with h(N ) = h(P).
By Lemma 4.1, N exists. Now obtain a phylogenetic network NZ from N by a
minimum number of repeated applications of the leaf-attaching operation until each
tree vertex in the resulting network has at least one child that is a tree vertex or a
leaf. Clearly, h(N ) = h(NZ ). Moreover, since no leaf-attaching operation results in
a new edge in NZ that is incident with two reticulations, NZ is stack free. It now
follows that NZ is tree child. Let Z = L(NZ ) − X. Then, by construction, the size of
Z is equal to the number of tree vertices in N whose children are both reticulations.
Let PZ be a set of phylogenetic trees obtained from P by attaching Z to P such that
NZ displays PZ . Since N displays P, such a set PZ always exists. By construction,
h(P) ≥ htc (PZ ). Moreover, as each tree in P is a restriction of a tree in PZ , it follows
that h(P) ≤ htc (PZ ); thereby establishing part (ii) of the theorem.
Using the construction of the previous paragraph, we now establish part (i) of
the theorem. Let Er be the set of reticulation edges in N , and let Vt be the set of
tree vertices of N whose children are both reticulations. Recall that |Vt | = |Z|. We
next make two observations. First, each vertex in Vt is incident with two edges in
Er . Second, each edge in Er is incident with at most one vertex in Vt . In summary,
this implies that |Z| ≤ 21 |Er |. Furthermore, we have |Er | = h(P) + |Vr |, where Vr is
the set of reticulations in N . Therefore, as |Vr | ≤ h(P), we have |Er | ≤ 2h(P). As
h(P) ≤ htc (P), it now follows that
|Z| ≤ 12 |Er | ≤
1
2
· 2h(P) ≤
This establishes part (i) of the theorem.
1
2
· 2htc (P) = htc (P).
16
SIMONE LINZ AND CHARLES SEMPLE
5. Scoring an optimum forest. For a collection P of binary phylogenetic
X-trees, acyclic-agreement forests characterise h(P) for when P consists of exactly
two trees. Indeed, many algorithms and theoretical results that deal with Minimum
Hybridisation for two trees are deeply-anchored in the notion of acyclic-agreement
forests [1, 2, 4, 16]. In this section, we establish a particular hardness result that
contributes to an explanation of why acyclic-agreement forests appear, however, to
be of little use to solve Minimum Hybridisation for more than two trees. This result
is a particular instance of a conjecture in [13].
For the purpose of the upcoming definitions, we regard the root of a binary
phylogenetic X-tree T as a vertex labelled ρ at the end of a pendant edge adjoined
to the original root. Furthermore, we view ρ as an element of the leaf set of T ; thus
L(T ) = X ∪ {ρ}. Let T and T 0 be two binary phylogenetic X-trees. An agreement
forest F = {Lρ , L1 , L2 , . . . , Lk } for T and T 0 is a partition of X ∪{ρ} such that ρ ∈ Lρ
and the following conditions are satisfied:
(i) For all i ∈ {ρ, 1, 2, . . . , k}, we have T |Li ∼
= T 0 |Li .
(ii) The trees in
{T (Li ) : i ∈ {ρ, 1, 2, . . . , k}}
and
{T 0 (Li ) : i ∈ {ρ, 1, 2, . . . , k}}
are vertex-disjoint subtrees of T and T 0 , respectively.
Now, let F = {Lρ , L1 , L2 , . . . , Lk } be an agreement forest for T and T 0 . Let GF be
the directed graph that has vertex set F and an arc from Li to Lj precisely if i 6= j
and
(iii) the root of T (Li ) is an ancestor of the root of T (Lj ) in T ,or the root of
T 0 (Li ) is an ancestor of the root of T 0 (Lj ) in T 0 .
We call F an acyclic-agreement forest for T and T 0 if GF has no directed cycle.
Moreover, if F contains the smallest number of elements over all acyclic-agreement
forests for T and T 0 , we say that F is a maximum acyclic-agreement forest for T and
T 0 , in which case, we denote this number minus one by ma (T , T 0 ).
Baroni et al. [2] established the following characterisation for when a collection
of binary phylogenetic X-trees contains exactly two trees.
Theorem 5.1. Let P = {T , T 0 } be a collection of two binary phylogenetic Xtrees. Then h(P) = ma (T , T 0 ).
Let N be a phylogenetic network on X with root ρ that displays a set P of binary
phylogenetic X-trees. As above, we regard ρ as a vertex at the end of a pendant edge
adjoined to the original root. We obtain a forest F from N by deleting all reticulation
edges, repeatedly contracting edges where one end-vertex has degree one and is not in
X ∪ {ρ}, deleting isolated vertices not in X ∪ {ρ} and, lastly, suppressing all vertices
with in-degree one and out-degree one. We say that F is the forest induced by N .
Moreover, F is said to be optimum if N is a tree-child network with htc (P) = h(N ).
For example, up to regarding ρ as a new vertex that is adjoined to the original root
of the two phylogenetic networks N and N 0 shown in Figure 1,
F = {{ρ, 1, 2, 6}, {3}, {4}, {5}} and F 0 = {{ρ, 1, 3, 5, 6}, {2}, {4}}
is the induced forest of N and N 0 , respectively.
In [13], the authors investigate Minimum Hybridisation for three trees and
conjecture that, given a set P of three binary phylogenetic X-trees and the induced
forest of a phylogenetic network N that displays P and h(P) = h(N ), it is NP-hard
MINIMUM HYBRIDISATION
17
to determine N . For |P| ≥ 3, we affirmatively answer their conjecture in the context
of tree-child networks. More precisely, using cherry-picking sequences, we show that
the following decision problem is NP-complete.
Scoring Optimum Forest
Instance. A non-negative integer k, a collection P of binary phylogenetic X-trees,
an optimum forest F induced by a tree-child network N on X that displays P.
Question. Is htc (P) ≤ k?
If |P| = 2, then, by Observation 1.1, htc (P) = h(P) and F is a maximum acyclicagreement forest with htc (P) = |F| − 1. Hence, Scoring Optimum Forest is
polynomial time when |P| = 2. However, the general problem is NP-complete.
Theorem 5.2. The problem Scoring Optimum Forest is NP-complete.
The remainder of this section consists of the proof of Theorem 5.2. To establish
the result, we use a reduction from a particular instance of the NP-complete problem
Shortest Common Supersequence. Let Σ be a finite alphabet, and let W be a
finite subset of words in Σ∗ . A word z ∈ Σ∗ is a common supersequence of W if each
word in W is a subsequence of z.
Shortest Common Supersequence (SCS)
Instance. A non-negative integer k, a finite alphabet Σ, and a finite subset W of
words in Σ∗ .
Question. Is there a supersequence of the words in W with at most k letters?
Timkovskii [24, Theorem 2] established the next theorem. The orbit of a letter
in Σ is the set of its occurrences in the words in W . Note that if a word in W uses a
letter, b say, twice, then that word contributes two occurrences to the orbit of b.
Theorem 5.3. The decision problem SCS is NP-complete even if each word in
W has 3 letters and the size of all orbits is 2.
A consequence of Theorem 5.3 is the next corollary.
Corollary 5.4. The decision problem SCS is NP-complete even if each word in
W has 3 letters, the size of all orbits is at most 2, and no word in W contains a letter
twice.
Proof. Let k, Σ, and W be an instance of SCS, where each word W has 3 letters
and all orbits have size 2. Let Y be the subset of W that consists of those words in
W in which no letter occurs twice. Observe that if b ∈ Σ and b occurs twice in a word
in W , then no word in Y contains b. Furthermore, with regards to Y , each word has
3 letters, the size of all orbits is at most 2, and no word contains a letter twice. Let
t denote the number of distinct letters that occur in two distinct words in W − Y .
Note that the construction of Y and the computation of t can both be done in time
polynomial in |W |. The corollary will follow from Theorem 5.3 by showing that SCS
with parameters Σ and W has a supersequence of length at most
2|W − Y | + t + k
if and only if SCS with parameters Σ and Y has a supersequence of length at most
k.
Suppose that SCS with parameters Σ and Y has a supersequence z of length at
most k. Now iteratively extend z to a sequence z 0 as follows. Let w ∈ W − Y . Then
18
SIMONE LINZ AND CHARLES SEMPLE
w contains two occurrences of a letter, b say, in Σ. Let d denote the third letter in w.
Note that b occurs in no other word in Σ and d occurs in exactly one other word in
Σ. First assume that d occurs in a word in Y . Depending on whether d is the first,
second, or third letter in w, extend z by adding bb to the end of z, adding b at the
beginning and b at the end of z, or adding bb at the beginning of z, respectively. The
resulting sequence is a supersequence for Y ∪ {w}. Second assume that d does not
occur as a word in Y . Then d occurs in a word w0 in W − Y . Let c denote the letter
occurring twice in w0 . Extend z by adding w to the beginning of z and then, to the
resulting sequence, add two occurrences of c after w, add one occurrence of c before
w and one occurrence of c after w, or two occurrences of c before w depending on
whether d is the first, second, or third letter of w0 , respectively. The resulting sequence
is a supersequence for Y ∪ {w, w0 }. Taking the resulting sequence and repeating this
process for each remaining word in W − (Y ∪ {w}) or W − (Y ∪ {w, w0 }), respectively,
we eventually obtain a supersequence z 0 for W . Moreover, z 0 has length
2|W − Y | + t + k.
For the converse, suppose that there is a supersequence z of W of length
2|W − Y | + t + k.
Let z 0 be the sequence obtained from z by deleting each occurrence of a letter that
occurs twice in a word in W and deleting exactly one occurrence of a letter that
occurs in two distinct words in W − Y and, hence, does not occur in a word in Y . It is
easily checked that z 0 is a supersequence of Y . Furthermore, since there are 2|W − Y |
deletions of the first type and t deletions of the second type, it follows that z 0 has
length k. This completes the proof of the corollary.
The decision problem described in the statement of Corollary 5.4 is the one we
will use for the reduction in proving Theorem 5.2. Let k, Σ, and W be an instance of
SCS such that each word in W has 3 letters, the size of all orbits is at most 2, and no
word in W contains a letter twice. Without loss of generality, we may assume that,
for each ` ∈ Σ, there is a word in W containing `, and that |W | ≥ 3, so no letter is
contained in each word. Let
W = {w1 , w2 , . . . , wq }
and, for each i ∈ {1, 2, . . . , q}, let wi = wi1 wi2 wi3 . Also, let
o(Σ) = `1 , `2 , . . . , `|Σ|
denote a fixed ordering of the letters in Σ. For each wi in W , we denote the sequence
obtained from o(Σ) by removing each of the three letters in wi by o(Σ) − wi .
We now construct an instance of Scoring Optimum Forest. A rooted caterpillar is a binary phylogenetic tree T whose leaf set can be ordered, say x1 , x2 , . . . , xn , so
that {x1 , x2 } is a cherry and if pi denotes the parent of xi , then, for all i ∈ {3, 4, . . . , n},
we have (pi , pi−1 ) as an edge in T . Here, we denote the rooted caterpillar by
(x1 , x2 , . . . , xn ).
Now, for each i ∈ {1, 2, . . . , q}, let Ti denote the rooted caterpillar
Ti = (α, wi1 , wi2 , wi3 , β1 , β2 , . . . , βq|Σ| , o(Σ) − wi ),
and let P = {T1 , T2 , . . . , Tq }. Note that each of the trees in P has leaf set
X = {α, β1 , β2 , . . . , βq|Σ| } ∪ Σ
MINIMUM HYBRIDISATION
19
and P can be constructed in time polynomial in the size of Σ and W .
We next establish a lemma that reveals a relationship between the weight of a
tree-child sequence for P and the length of a supersequence for W . Let
σ = (x1 , y1 ), (x2 , y2 ), . . . , (xs , ys ), (xs+1 , −)
be a tree-child sequence for a set P of binary phylogenetic X-trees. For each i ∈
{1, 2, . . . , s}, we say that (xi , yi ) corresponds to n trees in P if {xi , yi } is a cherry in
exactly n trees obtained from P by picking x1 , x2 , . . . , xi−1 , where 1 ≤ n ≤ |P|.
Lemma 5.5. Let k ≤ 2|Σ| be a positive integer. Then there is a tree-child sequence
of P of weight k if and only if there is a supersequence of W of length k.
Proof. First suppose there is a common supersequence z of W of length k. Let
z = m1 m2 · · · mk ,
and let σ denote the sequence
(m1 , α), . . . , (mk , α), (β1 , α), . . . , (βq|Σ| , α), (`1 , α), . . . , (`|Σ| , α), (α, −).
Since z is a supersequence of W , it is easily seen that σ is a tree-child sequence of P.
Moreover,
w(σ) = (k + |X|) − |X| = k.
Now suppose that there is a tree-child sequence σ of P of weight k. Without loss
of generality, we may assume that each ordered pair in σ is essential. We first show
that there is a positive integer i0 such that, after i0 iterations of Picking Cherries
applied to P and σ, each of the trees in Pi0 has a cherry consisting of two elements in
{α, β1 , β2 , . . . , βq|Σ| }. If not, then there is a word wi in W such that either (wij , βq|Σ| )
or (βq|Σ| , wij ) is an ordered pair in σ, where j ∈ {1, 2, 3}. Now, by considering a word
not containing wij and its associated tree in P, it is easily seen that w(σ) ≥ q|Σ|−1 as
each of the elements in {β1 , β2 , . . . , βq|Σ|−1 } appear at least twice as the first element
of an ordered pair in σ. But then
q|Σ| − 1 > 2|Σ|
as q ≥ 3 and |Σ| ≥ 3, contradicting the assumption k ≤ 2|Σ|.
Consider the first i0 ordered pairs in σ. For each tree Ti in P, there are exactly
three ordered pairs whose first and second elements are in {α, wi1 , wi2 , wi3 } and for
which Picking Cherries picks three of these elements in Ti . Since the size of all
orbits is at most 2, such an ordered pair corresponds to at most two trees in P. We
next construct a sequence σ 0 of ordered pairs obtained from σ. We start by modifying
the first i0 ordered pairs of σ as follows:
(a) Amongst the first i0 ordered pairs, replace each ordered pair of the form (α, `)
with (`, α), where ` ∈ Σ.
(b) With the sequence obtained after (a) is completed, sequentially move along the
sequence to the i0 -th ordered pair replacing each ordered pair of the form (`, `0 ),
where `, `0 ∈ Σ in one of the following ways:
(i) If (`, `0 ) corresponds to exactly one tree in P, then replace it with (`, α)
or (`0 , α) depending on whether (`0 , α) or (`, α), respectively, is an earlier
ordered pair.
20
SIMONE LINZ AND CHARLES SEMPLE
(ii) If (`, `0 ) corresponds to two trees, Ti and Tj say, in P and the order of the
letters ` and `0 is the same in wi and wj , then replace it with (`, α) or (`0 , α)
depending on whether (`0 , α) or (`, α), respectively, is an earlier ordered pair.
(iii) If (`, `0 ) corresponds to two trees, Ti and Tj say, in P and the order of the
letters ` and `0 in wi is not the same as that in wj , then replace it with (`, α)
if (`, α) occurs as an ordered pair before (`0 , α) earlier in the sequence; otherwise, (`0 , α) occurs as an ordered pair before (`, α) earlier in the sequence
and so replace it with (`0 , α).
With this modification of σ after (b) is completed, let σ10 denote the subsequence of
the first i0 ordered pairs whose coordinates are in Σ ∪ {α}, and let σ20 denote the
subsequence σ − σ10 . Let σ 0 denote the concatenation of σ10 and σ20 .
By considering each tree Ti in P together with its corresponding ordered pairs in
σ and the associated ones in σ 0 , a routine check shows that the first |σ10 | iterations of
Picking Cherries applied to σ 0 and P sets the tree corresponding to Ti in P|σ10 | to
be the rooted caterpillar
(α, β1 , β2 , . . . , βq|Σ| , o(Σ) − wi ).
In particular, (wi1 , α), (wi2 , α), (wi3 , α) is subsequence of σ10 .
We next extend σ10 to a tree-child cherry-picking for P of weight at most k.
Consider σ and σ 0 . If σ1 denotes the subsequence of ordered pairs in σ corresponding
to σ10 , then |σ1 | = |σ10 | and
|σ| − |σ1 | ≥ q|Σ| + |Σ| + 1
as each of the elements in {β1 , β2 , . . . , βq|Σ| } ∪ Σ as well as at least one element in
{β1 , β2 , . . . , βq|Σ| }∪Σ∪{α} appears as the first coordinate of an ordered pair in σ −σ1 .
Here, an element in {β1 , β2 , . . . , βq|Σ| } ∪ Σ may be counted twice as it appears as the
first coordinate of two ordered pairs in σ − σ1 . It follows that the sequence of ordered
pairs that is the concatenation of σ10 and
(β1 , α), (β2 , α), . . . , (βq|Σ| , α), (`1 , α), (`2 , α), . . . , (`|Σ| , α), (α, −)
is a tree-child sequence of P whose weight is at most k.
Let σ10 be the sequence
(m1 , α), (m2 , α), . . . , (mk0 , α).
Since (wi1 , α), (wi2 , α), (wi3 , α) is a subsequence of σ10 for each tree Ti ,
m1 m2 · · · mk0
is a common supersequence of W . Moreover, as w(σ) = k, we have k 0 ≤ k. It follows
that there is a supersequence of W of length k.
To complete the proof of Theorem 5.2, let
F = {ρ, α, β1 , β2 , . . . , βq|Σ| } ∪ {`} : ` ∈ Σ
be a partition of X ∪ {ρ}. We next show that F is an optimum forest induced by a
tree-child network on X with root ρ and that displays P. Let z = z1 z2 · · · zk be a
common supersequence of W of minimum length, and suppose this length is k. Since
MINIMUM HYBRIDISATION
21
all orbits have size at most 2 and z is of minimum length, each letter in Σ appears at
most twice in z, and so k ≤ 2|Σ|. Let T be the ‘multi-labelled’ rooted caterpillar
T = (α, z1 , z2 , . . . , zk , β1 , β2 , . . . , βq|Σ| , o(Σ))
and let N be the tree-child network with root ρ obtained from T as follows. For each
` ∈ Σ, identify the leaves labelled ` and adjoin a new pendant edge to the identified
vertex with the leaf-end labelled `. Since z is a common supersequence of W , it
is easily checked that N displays P. Furthermore, h(N ) = k. By Theorem 2.1 and
Lemma 5.5, htc (P) = k, and so, as F is induced by N , it follows that F is an optimum
forest for P.
Now, given an arbitrary phylogenetic network, it can be verified in polynomial
time whether it is tree child, it displays P [21], its hybridisation number is at most k,
and it induces F. Hence, Scoring Optimum Forest is in NP.
Theorem 5.2 now follows by combining Corollary 5.4 with Theorem 2.1 and
Lemma 5.5.
6. Concluding remarks. In this paper, we have generalised the concept of
cherry-picking sequences as introduced in [12] and shown how this generalisation can
be used to characterise the minimum number of reticulation events that is needed to
explain any set of phylogenetic X-trees in the space of tree-child networks as well as in
the space of all phylogenetic networks. To see that these two minima can be different
for a fixed set of phylogenetic trees, consider the set P of trees presented in Figure 2.
It was shown in [13, 15] that h(P) = 3 and that there are six phylogenetic networks
each of which displays P and has a hybridisation number of three. However, none
of these six phylogenetic networks is tree child. Moreover, using tree-child sequences
a straightforward check shows that htc (P) = 4. Furthermore, we have shown that
Scoring Optimum Forest is NP-complete. Hence, given an optimum forest, it is
computationally hard to compute htc (P) for when P is a set of binary phylogenetic
X-trees, where |P| ≥ 3. This contrasts with the two-tree case for which Scoring
Optimum Forest is polynomial-time solvable and further hints at that agreement
forests are of limited use beyond the two-tree case.
Of course, restricting to collections of binary phylogenetic trees, one could generalise the definition of an acyclic-agreement forest for two binary phylogenetic trees
to more than two trees in the most obvious way. That is, one requires Conditions (i),
(ii), and (iii) in the definition of an acyclic-agreement forest to hold for each tree in an
arbitrarily large collection of binary phylogenetic X-trees. With this generalisation
in mind and observing that the number of components in a forest that is induced by
a tree-child network is equal to its number of reticulations plus one, one might conjecture that, given a set P of binary phylogenetic X-trees, the number of components
in a maximum acyclic-agreement forest for P is the same as the minimum number of
components in an optimum forest for P. To see that this is not true, we refer back to
Figure 1. Let F be the forest induced by N , and let F 0 be the forest induced by N 0 .
Since |F 0 | = 3, a maximum acyclic-agreement forest for P has at most three elements.
Moreover, since h(N )=3 and N is tree child, we have htc (P) ≤ 3. Indeed, it can be
checked that htc (P) = 3. Moreover, there is no tree-child network that displays P
and induces an optimum forest that is also a maximum acyclic-agreement forest for
P. Consequently, an approach that exploits maximum acyclic-agreement forests for a
set P of binary phylogenetic trees to compute htc (P), such as computing a maximum
acyclic-agreement forest F for P and, subsequently, scoring F in a way that reflects
the number of edges that are directed into each reticulation vertex in a network that
22
SIMONE LINZ AND CHARLES SEMPLE
induces F, is unlikely to give the desired result.
Lastly, from a computational viewpoint, the introduction of acyclic-agreement
forests [2] has triggered significant progress towards the development of ever faster
algorithms to solve Minimum Hybridisation for when the input contains exactly
two phylogenetic trees (e.g. see [1, 4, 8, 9, 20, 25]). We look forward to seeing a
similar development now for solving Minimum Hybridisation for arbitrarily many
phylogenetic trees by using cherry-picking sequences. In turn, this is likely to be of
benefit to biologists who often wish to infer evolutionary histories that are not entirely
tree-like and for data sets that usually consists of more than two phylogenetic trees.
REFERENCES
[1] B. Albrecht, C. Scornavacca, A. Cenci, and D. H. Huson (2012). Fast computation of minimum
hybridization networks. Bioinformatics, 28, 191–197.
[2] M. Baroni, S. Grünewald, V. Moulton, and C. Semple, (2005), Bounding the number of hybridization events for a consistent evolutionary history, Journal of Mathematical Biology,
51, 171–182.
[3] M. Bordewich and C. Semple (2007). Computing the minimum number of hybridization events
for a consistent evolutionary history. Discrete Applied Mathematics, 155, 914–928.
[4] M. Bordewich and C. Semple (2007). Computing the hybridization number of two phylogenetic
trees is fixed-parameter tractable. IEEE/ACM Transactions on Computational Biology
and Bioinformatics, 4, 458–466.
[5] M. Bordewich and C. Semple (2016). Determining phylogenetic networks from inter-taxa distances. Journal of Mathematical Biology, 73, 283–303.
[6] G. Cardona, F. Rosselló, and G. Valiente (2009). Comparison of tree-child phylogenetic networks. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 6, 552–
569.
[7] Z. Z. Chen and L. Wang (2012). Algorithms for reticulate networks of multiple phylogenetic
trees. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 9, 372–
384.
[8] Z. Z. Chen and L. Wang (2013). An ultrafast tool for minimum reticulate networks. Journal of
Computational Biology, 20, 38–41.
[9] J. Collins, S. Linz, and C. Semple (2011). Quantifying hybridization in realistic time. Journal
of Computational Biology, 18, 1305–1318.
[10] J.-M. Drezen, J. Gauthier, T. Josse , A. Bézier, E. Herniou, E. Huguet (2016). Foreign DNA acquisition by invertebrate genomes. Journal of Invertebrate Pathology, doi:
10.1016/j.jip.2016.09.004.
[11] P. J. Humphries, S. Linz, and C. Semple (2013). On the complexity of computing the temporal
hybridization number for two phylogenies. Discrete Applied Mathematics, 161, 871–880.
[12] P. J. Humphries, S. Linz, and C. Semple (2013). Cherry picking: a characterization of the
temporal hybridization number for a set of phylogenies. Bulletin of Mathematical Biology,
75, 1879–1890.
[13] L. van Iersel, S. Kelk, N. Lekić, C. Whidden, and N. Zeh, (2016). Hybridization number on
three rooted binary trees is EPT. SIAM Journal on Discrete Mathematics, 30, 1607–1631.
[14] L. van Iersel, C. Semple, and M. Steel (2010). Locating a tree in a phylogenetic network.
Information Processing Letters, 110, 1037–1043.
[15] S. Kelk (2012). Personal communication.
[16] S. Kelk, L. van Iersel, N. Lekić, S. Linz, C. Scornavacca, and L. Stougie (2012). Cycle killer
... qu’est-ce que c’est? On the comparative approximability of hybridization number and
directed feedback vertex set. SIAM Journal on Discrete Mathematics, 26,1635–1656.
[17] J. Mallet, N. Besansky, and M. W. Hahn (2016). How reticulated are species? BioEssays, 38,
140–149.
[18] T. Marcussen, S. R. Sandve, L. Heier, M. Spannagl, M. Pfeifer, International Wheat Genome
Sequencing Consortium, K. S. Jakobsen, B. B. Wulff, B. Steuernagel, K. F. Mayer, and
O. A. Olsen (2014). Ancient hybridizations among the ancestral genomes of bread wheat.
Science, 345, 1250092.
[19] B. M. E. Moret, L. Nakhleh, T. Warnow, C. R. Linder, A. Tholse, A. Padolina, J. Sun,
and R. Timme (2004). Phylogenetic networks: modeling, reconstructibility, and accuracy.
IEEE/ACM Transactions on Computational Biology and Bioinformatics, 1, 13–23.
MINIMUM HYBRIDISATION
23
[20] T. Piovesan and S. Kelk (2012). A simple fixed parameter tractable algorithm for computing
the hybridization number of two (not necessarily binary) trees, IEEE Transactions on
Computational Biology and Bioinformatics, 10, 18–25.
[21] C. Semple. Double-u-free networks, in preparation.
[22] J. Simpson. Tree display in tree-child networks. PhD thesis, University of Canterbury, in preparation.
[23] S. M. Soucy, J. Huang, and J. P. Gogarten (2015). Horizontal gene transfer: building the web
of life. Nature Reviews Genetics, 16, 472–482.
[24] V. G. Timkovskii (1989). Complexity of common subsequence and supersequence problems and
related problems. Cybernetics, 25, 565–580.
[25] Y. Wu and J. Wang (2010). Fast computation of the exact hybridization number of two phylogenetic trees. In: International Symposium on Bioinformatics Research and Applications,
Springer, pp. 203–214.
[26] Y. Wu (2010). Close lower and upper bounds for the minimum reticulate network of multiple
phylogenetic trees. Bioinformatics, 26, i140–i148.
| 8cs.DS
|
arXiv:0711.3628v1 [q-bio.PE] 22 Nov 2007
A Perl Package and an Alignment Tool for Phylogenetic
Networks
Francesc Rosselló
Research Institute of Health Science
University of the Balearic Islands
E-07122 Palma de Mallorca
Spain
Gabriel Cardona
Department of Mathematics
and Computer Science
University of the Balearic Islands
E-07122 Palma de Mallorca
Spain
Gabriel Valiente
Algorithms, Bioinformatics, Complexity
and Formal Methods Research Group
Technical University of Catalonia
E-08034 Barcelona
Spain
January 29, 2018
Abstract
Phylogenetic networks are a generalization of phylogenetic trees that allow for the
representation of evolutionary events acting at the population level, like recombination between genes, hybridization between lineages, and lateral gene transfer. While
most phylogenetics tools implement a wide range of algorithms on phylogenetic trees,
there exist only a few applications to work with phylogenetic networks, and there are no
open-source libraries either. In order to improve this situation, we have developed a Perl
package that relies on the BioPerl bundle and implements many algorithms on phylogenetic networks. We have also developed a Java applet that makes use of the aforementioned Perl package and allows the user to make simple experiments with phylogenetic
networks without having to develop a program or Perl script by herself. The Perl
package has been accepted as part of the BioPerl bundle. It can be downloaded from
the url http://dmi.uib.es/~gcardona/BioInfo/Bio-PhyloNetwork.tgz. The webbased application is available at the url http://dmi.uib.es/~gcardona/BioInfo/.
The Perl package includes full documentation of all its features.
Background
We briefly recall some definitions and results from [2] on phylogenetic networks.
A phylogenetic network on a set S of taxa is any rooted directed acyclic graph whose
leaves (those nodes without outgoing edges) are bijectively labeled by the set S.
Let N = (V, E) be a phylogenetic network on S. A node u ∈ V is said to be a tree node
if it has, at most, one incoming edge; otherwise it is called a hybrid node. A phylogenetic
network on S is a tree-child phylogenetic network if every node either is a leaf or has at
least one child that is a tree node.
Let S = {ℓ1 , . . . , ℓn } be the set of leaves. We define the µ-vector of a node u ∈ V as
the vector µ(u) = (m1 (u), . . . , mn (u)), where mi (u) is the number of different paths from
1
u to the leaf ℓi . The multiset µ(N ) = {µ(v) | v ∈ V } is called the µ-representation of
N and, provided that N is a tree-child phylogenetic network, it turns out to completely
characterize N , up to isomorphisms, among all tree-child phylogenetic networks on S.
This allows us to define a distance on the set of tree-child phylogenetic networks on S:
the µ-distance between two given networks N1 and N2 is the symmetric difference of their
µ-representations,
dµ (N1 , N2 ) = |µ(N1 ) △ µ(N2 )| .
This defines a true distance, and when N1 and N2 are phylogenetic trees, it coincides with
the well-known partition distance [8].
This representation also allows us to define an optimal alignment between two treechild phylogenetic networks on S, say n = |S|. Given two such networks N1 = (V1 , E1 ) and
N2 = (V2 , E2 ) (where, for the sake of simplicity, we assume |V1 | 6 |V2 |), an alignment is
just an injective mapping M : V1 → V2 . The weight of this alignment is
X
(kµ(v) − µ(M (v))k + χ(v, M (v))),
w(M ) =
v∈V1
where k · k stands for the Manhattan norm of a vector and χ(u, v) is 0 if both u and v are
tree nodes or hybrid nodes, and 1/(2n) if one of them is a tree node and the other one is a
hybrid node. An optimal alignment is, then, an alignment with minimal weight.
The Extended Newick Format
The eNewick (for “extended Newick”) string defining a phylogenetic network appeared in
the packages PhyloNet [7] and NetGen [5] related to phylogenetic networks, with some
differences between them. The former encodes a phylogenetic network with k hybrid nodes
as a series of k trees in Newick format, while the latter encodes it as a single tree in Newick
format but with k repeated nodes.
Whereas the Perl module we introduce here accepts both formats as input, a complete
standard for eNewick is implemented, based mainly on NetGen and following the suggestions of D. Huson and M. M. Morin (among others), to make it as complete as possible. The
adopted standard has the practical advantage of encoding a whole phylogenetic network as
a single string, and it also includes mandatory tags to distinguish among the various hybrid
nodes in the network.
The procedure to obtain the eNewick string representing a phylogenetic network N goes
as follows: Let {H1 , . . . , Hm } be the set of hybrid nodes of N , ordered in any fixed way. For
each hybrid node H = Hi , say with parents u1 , u2 , . . . , uk and children v1 , v2 , . . . , vℓ : split
H in k different nodes; let the first copy be a child of u1 and have all v1 , v2 , . . . , vℓ as its
children; let the other copies be children of u2 , . . . , uk (one for each) and have no children.
Label each of the copies of H as
[label]#[type]tag[:branch_length]
where the parameters are:
• label (optional) string providing a labelling for the node;
• type (optional) string indicating if the node H corresponds to a hybridization (indicated by H) or a lateral gene transfer (indicated by LGT) event; note that other types
can be considered in the future;
2
r
x
h
1
2
r
y
x
3
y
h h
1
2
3
Figure 1: A phylogenetic network N (left), and tree (right) associated to N for computing
its eNewick string.
r
r
x
x
h
y
1
2
3
1
2
3
Figure 2: Representation of a lateral gene transfer event (left) as a hybrid node in a
phylogenetic network (right).
• tag (mandatory) integer i identifying the node H = Hi .
• branch_length (optional) number giving the length of the branch from the copy of
H under consideration to its parent.
In this way, we get a tree whose set of leaves is the set of leaves of the original network
together with the set of hybrid nodes (possibly repeated). Then, the Newick string of
the obtained tree (note that some internal nodes will be labeled and some leaves will be
repeated) is the eNewick string of the phylogenetic network. The leftmost occurrence of
each hybrid node in an eNewick string corresponds to the full description of the network
rooted at that node, and although node labels are optional, all labeled occurrences of a
hybrid node in an eNewick string must carry the same label.
Consider, for example, the phylogenetic network depicted together with its decomposition in Figure 1. The eNewick string for this network would be ((1,(2)#H1),(#H1,3));
or ((1,(2)h#H1)x,(h#H1,3)y)r; if all internal nodes are labeled. The leftmost occurrence
of the hybrid node in the latter string corresponds to the full description of the network
rooted at that node: (2)h#H1.
Obviously, the procedure to recover a network from its eNewick string is as simple as
recovering the tree and identifying those nodes that are labeled as hybrid nodes with the
same identifier.
Notice that gene transfer events can be represented in a unique way as hybrid nodes.
Consider, for example, the lateral gene transfer event depicted in Figure 2, where a gene
is transferred from species 2 to species 3 after the divergence of species 1 from species
2. The eNewick string ((1,(2,(3)h#LGT1)y)x,h#LGT1)r; describes such a phylogenetic
network. A program interpreting the eNewick string can use the information on node types
in different ways; for instance, to render tree nodes circled, hybridization nodes boxed, and
lateral gene transfer nodes as arrows between edges.
3
The Perl Module
The Perl module Bio::PhyloNetwork implements all the data structures needed to work
with tree-child phylogenetic networks, as well as algorithms for:
• reconstructing a network from its eNewick string (in all its different flavours),
• reconstructing a network from its µ-representation,
• exploding a network into the set of its induced subtrees,
• computing the µ-representation of a network and the µ-distance between two networks,
• computing an optimal alignment between two networks,
• computing tripartitions [4, 3] and the tripartition error between two networks, and
• testing if a network is time consistent [1], and in such a case, computing a temporal
representation.
The underlying data structure is a Graph::Directed object, with some extra data, for
instance the µ-representation of the network. It makes use of the Perl module Bio::Phylo
Network::muVector that implements basic arithmetic operations on µ-vectors. Two extra
modules, Bio::PhyloNetwork::Factory and Bio::PhyloNetwork::RandomFactory, are
provided for the sequential and random generation (respectively) of all tree-child phylogenetic networks on a given set of taxa.
The web interface and the java applet
The web interface, available at http://dmi.uib.es/~gcardona/BioInfo/, allows the user
to input one or two phylogenetic networks, given by their eNewick strings. A Perl script
processes these strings and uses the Bio::PhyloNetwork package to compute all available
data for them, including a plot of the networks that can be downloaded in PS format; these
plots are generated through the application GraphViz and its companion Perl package.
Given two networks on the same set of leaves, their µ-distance is also computed, as well
as an optimal alignment between them. The algorithm to compute such an alignment relies
on the Hungarian algorithm [6]. If their sets of leaves are not the same, their topological
restriction on the set of common leaves is first computed followed by the µ-distance and an
optimal alignment.
A Java applet displays the networks side by side, and whenever a node is selected,
the corresponding node in the other network (with respect to the optimal alignment) is
highlighted, provided it exists. This is also extended to edges. Similarities between the
networks are thus evident at a glance and, since the weight of each matched node is also
shown, it is easy to see where the differences are.
Authors contributions
All authors conceived the method, prepared the manuscript, contributed to the discussion, and have approved the final manuscript. GC implemented the software. GV also
implemented part of the software.
4
Acknowledgements
The research described in this paper has been partially supported by the Spanish CICYT
project TIN 2004-07925-C03-01 GRAMMARS and by Spanish DGI projects MTM200607773 COMGRIO and MTM2006-15038-C02-01.
References
[1] Mihaela Baroni, Charles Semple, and Mike Steel. Hybrids in real time. Syst. Biol.,
55(1):46–56, 2006.
[2] Gabriel Cardona, Francesc Rosselló, and Gabriel Valiente. Comparison of tree-child
phylogenetic networks. http://arxiv.org/abs/0708.3499/, 2007.
[3] Gabriel Cardona, Francesc Rosselló, and Gabriel Valiente. Tripartitions do not always
discriminate phylogenetic networks. Math. Biosci., 2008. In press.
[4] Bernard M. E. Moret, Luay Nakhleh, Tandy Warnow, C. Randal Linder, Anna Tholse,
Anneke Padolina, Jerry Sun, and Ruth Timme. Phylogenetic networks: Modeling,
reconstructibility, and accuracy. IEEE T. Comput. Biol., 1(1):13–23, 2004.
[5] M. M. Morin and B. M. E. Moret. NETGEN: generating phylogenetic networks with
diploid hybrids. Bioinformatics, 22(15):1921–1923, 2006.
[6] J. Munkres. Algorithms for the assignment and transportation problems. J. SIAM,
5(1):32–38, 1957.
[7] Rice University BioInformatics Group. Phylonet: Phylogenetic networks toolkit (v. 1.4).
Available at http://bioinfo.cs.rice.edu/phylonet/, 2007.
[8] D. F. Robinson and L. R. Foulds. Comparison of phylogenetic trees. Math. Biosci.,
53(1/2):131–147, 1981.
5
| 5cs.CE
|
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
1
Deep Metric Learning for Practical Person
Re-Identification
arXiv:1407.4979v1 [cs.CV] 18 Jul 2014
Dong Yi, Zhen Lei, Member, IEEE Stan Z. Li, Fellow, IEEE
Abstract—Various hand-crafted features and metric learning
methods prevail in the field of person re-identification. Compared
to these methods, this paper proposes a more general way that
can learn a similarity metric from image pixels directly. By
using a “siamese” deep neural network, the proposed method
can jointly learn the color feature, texture feature and metric in
a unified framework. The network has a symmetry structure with
two sub-networks which are connected by Cosine function. To
deal with the big variations of person images, binomial deviance
is used to evaluate the cost between similarities and labels, which
is proved to be robust to outliers.
Compared to existing researches, a more practical setting is
studied in the experiments that is training and test on different
datasets (cross dataset person re-identification). Both in “intra
dataset” and “cross dataset” settings, the superiorities of the
proposed method are illustrated on VIPeR and PRID.
Index Terms—Person Re-Identification, Deep Metric Learning,
Convolutional Network, Cross Dataset
I. I NTRODUCTION
The task of person re-identification is to judge whether
two person images belong to the same subject or not. In
practical applications, the two images are usually captured by
two cameras with disjoint views. The performance of person
re-identification is closely related to many other applications,
such as cross camera tracking, behaviour analysis, object
retrieval and so on. The algorithms proposed in this field are
also overlapped with other fields in pattern recognition. In
recent years, the performance of person re-identification has
increased continuously and will increase further.
The essence of person re-identification is very similar to
biometric recognition problems, such as face recognition.
The core of them is to find a good representation and a
good metric to evaluate the similarities between samples.
Compared to biometric problems, person re-identification is
more challenging due to the low quality and high variety of
person images. Person re-identification usually need to match
the person images captured by surveillance cameras working in
wide-angle mode. Therefore, the resolution of person images
are very low (e.g., around 48 × 128 pixels) and the lighting
conditions are unstable too. Furthermore, the direction of
cameras and the pose of persons are arbitrary. These factors
cause the person images under surveillance scenarios have
two distinctive properties: large variations in intra class, and
ambiguities between inter classes. In summary, the challenges
of person re-identification come from the following aspects:
Dong Yi is with the National Laboratory of Pattern Recognition, Institute
of Automation, Chinese Academy of Sciences, Beijing, China, 100190 email:[email protected]
Manuscript received June 1, 2014; revised June 1, 2014.
camera view change, pose variation, non-rigid deformation,
unstable illumination and low resolution.
However, another challenge is less studied in existing work,
which is “cross dataset person re-identification”. In practical
systems, we usually collect some large datasets first and train
a model on them. Then the trained model is applied to other
datasets or videos for person re-identification. We call the
training datasets as source domain and test datasets as target
domain. The source and target datasets are totally different,
because they are usually captured by different cameras under
different environments, i.e., have different probability distribution. A practical person re-identification algorithm should
has good generalization with respect to the dataset changes.
Therefore, cross dataset person re-identification is an important
rule to evaluate the performance of algorithms in practice.
Since the pixels of person images are unstable, effective representations are important and needed for person reidentification. To this end, existing methods borrow many
sophisticated features from other fields, such as HSV histogram, Gabor, HOG and so on. Based on the features, direct
matching or discriminative learning are then used to evaluate
the similarity. Existing methods mainly focus on the second
step that is how to learn a metric to discriminate the persons.
Many good metric learning methods have been proposed in
this context, such as KISSME [1], RDC [2] and so on.
The majority of existing methods include two separate steps:
feature extraction and metric learning. The features usually
come from two separate sources: color and texture, some of
which are designed by hand, some of which are learned, and
they are finally connected or fused by simple strategies. On
the contrary, this paper proposes a new method to combine the
separate modules together, learning the color feature, texture
feature and metric in a unified framework, which is called as
“Deep Metric Learning” (DML).
The main idea of DML is inspired by a “siamese” neural network [3], which is originally proposed for signature
verification. Given two person images x and y, we want to
use a siamese deep neural network to assess their similarity
s = DM L(x, y). Being more specific than the original
work [3], our DML first abstracts the siamese network to
two sub-networks, a connection function and a cost function
(see Figure 1), and then carefully design the architecture
for person images. In this way, DML can adapt well to
person re-identification. Denoting the connection function
as S, the similarity equation of DML can be written as
s = DM L(x, y) = S(B1 (x), B2 (y)), where B1 and B2
denote the two sub-networks of DML. Depending on specific
applications, B1 and B2 need to share or not to share their
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
parameters.
Compared with existing person re-identification methods,
DML has the following advantages:
1) DML can learn a similarity metric from image pixels
directly. All layers in DML are optimized by a common
objective function, which are more effective than the
hand-crafted features in traditional methods;
2) The multi-channel filters learned in DML can capture
the color and texture information simultaneously, which
are more reasonable than the simple fusion strategies
in traditional methods, e.g., feature concatenation, sum
rule;
3) The structure of DML is flexible that can switch between
view specific and general person re-identification tasks
by whether sharing the parameters of sub-networks.
DML is tested on two popular person re-identification
datasets, VIPeR [4] and PRID 2011 [5], using the common
evaluation protocols. The results show that DML outperforms
or on a par with the state-of-the-art methods, such as [6],
and [7]. To appeal the practical requirements and evaluate
the generalization of DML, we also conduct more challenging
cross dataset experiments, which are training on i-LIDS [8],
CUHK Campus [6] and testing on VIPeR, PRID. The results
of the cross dataset experiments are significantly better than
existing methods [9] under similar experimental settings. To
our knowledge, this is the first work to conduct strict cross
dataset experiment in the field of person re-identification.
Finally, we fuse the features learned from multiple datasets
to improve the performance on VIPeR and PRID further.
II. R ELATED W ORK
This work uses deep learning to learn a metric for person
re-identification. Related works in four aspects are reviewed in
this section: feature representation, metric learning for person
re-identification, siamese convolutional neural network and
cross dataset related methods.
Early papers mainly focus on how to construct effective
feature representation. From 2005, numerous features are used
or proposed for person re-identification [10]. The features
can be divided into two categories: color based and texture
based features. The most popular features include HSV color
histogram [11], [6], LAB color histogram [12], SIFT [12], LBP
histogram [6], Gabor features [6] and their fusion. Among
these features, color has the most contribution to the final
results. The recent advance in this aspect is the color invariant
signature [13]. By combing color histogram, covariance feature and segmentation information, [13] achieved rank1=24%
on VIPeR.
On the other hand, [11] has proved that using the silhouette
and symmetry structure of person can improve the performance significantly, therefore the color and texture features
are usually extracted in a predefined grid or finely localized
parts. [14] proposed a MCMC based method to do part
localization and person re-identification simultaneously, which
obtained rank1=23% on VIPeR. The above work all prove that
the performance can be improved significantly when know
the geometric configuration of person explicitly or implicitly.
2
Compared to part based method, salience based methods [12],
[7] proposed by Zhao et al. relaxed the spatial constraint
further and could deal with larger pose variations. Similar to
the history of face recognition [15], the future direction of
feature representation must be based on precise body parts
segmentation, person alignment and pose normalization.
Based on the extracted features, naive feature matching or
unsupervised learning methods usually got moderate results,
and state-of-the-art results were achieved by supervised methods, such as Boosting [16], Rank SVM [17], PLS [17] and
Metric learning [2], [1], [6]. Among these methods, metric
learning is the main stream due to its flexibility. Compared
with standard distance measures, e.g., L1 , L2 norm, the learned
metric is more discriminative for the task on hand and more
robust to large variations of person images across view. Most
papers used a holistic metric to evaluate the similarity of two
samples, but [6] first divided the samples into several groups
according to their pose and then learned metrics for each
group. By using the pose information explicitly, [6] obtains
the highest performance on VIPeR. Recently, [18] proposed a
novel “human in the loop” style method, which illustrated that
the performance of person re-identification can be improved
drastically by human intervention. Although the results of this
paper is hard to reproduce, it supplies a benchmark to reflect
the performance of human (Rank1=71.08% on VIPeR). Closing the gap to human performance is the target of researchers.
Early in 1993, a siamese neural network [3] was proposed
to evaluate the similarity of two signature samples. In the
same year, a neural network [19] with similar structure was
proposed for fingerprint verification. Different from traditional
neural networks, the siamese architecture is composed by
two sub-networks sharing the same parameters. Each subnetwork is a convolutional neural network. Then the siamese
neural network was used for face verification [20] by the same
research group. The best property of siamese neural network is
its unified and clear objective function. Guided by the objective
function, the end-to-end neural network can learn a optimal
metric towards the target automatically. The responsibility of
the last layer of the siamese neural network is to evaluate
the similarity of the output of two sub-networks, which can
be in any form [20], such as L1 , L2 norm and Cosine.
Although good experimental results have been obtained in [3],
[19] and [20], their disadvantages are lacking implementation
details and lacking comparison with other methods. This paper
will design a siamese neural network for person image and
apply it in the person re-identification problem. In this paper,
the implementation details will be described and extensive
comparisons will be reported.
In this young field, cross dataset problem has not attracted
much attention. Majority researchers do their best to improve
the performance within single dataset, i.e., training on VIPeR
and test on VIPeR too. Not long ago, [9] started to concern
this issue. In [9], the authors proposed a transfer Rank SVM
(DTRSVM) to adapt a model trained on the source domain
(i-LIDS or PRID) to target domain (VIPeR). All image pairs
in the source domain and the negative image pairs in the target
domain were used for training. Different from DTRSVM, in
our cross dataset experiments, the proposed network is trained
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
3
Input
3@128x48
C1
64@48x48
S2
64@24x24
C3
64@24x24
S4
64@12x12
F5
500
CNN
Connection
Function
Cost
Function
Label
[-1, 1]
CNN
Fig. 1. The structure of the siamese convolutional neural network (SCNN),
which is composed by three components: CNN, connection function and cost
function.
Parameters
Sharing
Convolution
in the source domain only and its performance is tested in the
target domain.
Convolution
Normalization &
Max pooling
Full connection
Normalization &
Max pooling
Fig. 2. The structure of the 5-layer CNN used in our method.
III. D EEP M ETRIC L EARNING
Under the joint influence of resolution, illumination and
pose changes, the ideal metric for person re-identification may
be highly nonlinear. Deep learning is exact one of the most
effective tools to learn the nonlinear metric function. This
section introduces the architecture, parameters, cost function
and implementation details of the proposed convolutional
network for deep metric learning.
A. Architecture
For most of pattern recognition problems, neural network
works in a standalone mode. The input of neural network is a
sample and the output is a predicted label. This mode works
well for handwritten digit recognition, object recognition and
other classification problems when the labels of the training
set are the same as the test set. For person re-identification
problem, the subjects in the training set are generally different
from those in the test set, therefore the “sample → label” style
neural network cannot apply to it. To deal with this problem,
we construct a siamese neural network, which includes two
sub-networks working in a “sample pair → label” mode.
The flowchart of our method is shown in Figure 1. Given
two person images, they are sent to siamese convolutional
neural network (SCNN). For two images x and y, SCNN can
predict a label l = ±1 to denote whether the image pair comes
from the same subject or not. Because many applications need
rank the images in the gallery based on their similarities to a
probe image, our SCNN outputs a similarity score instead.
The structure of the SCNN is shown in Figure 1, which is
composed by two convolutional neural networks (CNN). And
the two CNNs are connected by a connection function.
Existing siamese neural networks have a constraint that their
two sub-networks share the same parameters, i.e., weights and
biases. As studied in our previous work [21], this constraint
could be removed in some conditions. Without parameters
sharing, the network can deal with the view specific matching
tasks more naturally. With parameters sharing, the network is
more appropriate for general task, e.g., cross dataset person
re-identification. We call these two modes as “General” and
“View Specific” SCNN. Because cross dataset problem is the
main concern of this paper, we focus on General SCNN.
B. Convolutional Neural Network
The CNN in this paper (see Figure 2) is composed by 2
convolutional layers, 2 max pooling layers and a full connected
layer. As shown in Figure 2, the number of channels of convolutional and pooling layers are both 64. The output of the CNN
is a vector of 500 dimensions. Every pooling layer includes a
cross-channel normalization unit. Before convolution the input
data are padded by zero values, therefore the output has the
same size with input. The filter size of C1 layer is 7 × 7 and
the filter size of C2 layer is 5 × 5. ReLU neuron [22] is used
as activation function for each layer.
To capture the different statistical properties of body parts,
we train the CNN in part based way. In our previous work [21],
person images are cropped into three overlapped parts and
three networks are trained independently. Differently, we use
a faster scheme in this paper that the three parts are trained
jointly. First, the three parts share C1 layer. Second, each part
has its own C3 layer, which can help to learn part-specific
filters. Third, the high level features of all parts are fused at
F5 layer by sum rule. Then, the similarity of fused features are
evaluated by the connection function. Driven by a common
cost function, the three parts can contribute to the training
process jointly.
Overall, there are two main differences between the proposed network in Figure 2 and the network in [21]: 1) C1 layer
are shared by three parts or not; 2) the contribution of the three
parts are fused in feature level or score level. Parameter sharing
in low level can reduce the complexity of the network. Fusion
in feature level make the three parts can train jointly, which
will improve the performance slightly. Moreover, training and
test a single network is more convenient and efficient than
using three independent networks.
C. Cost Function and Learning
Before learning the parameters of SCNN, we revisit its
structure again. As shown in Figure 1, the structure of SCNN
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
4
can be abstracted into three basic components: two subnetworks, a connection function and a cost function. Connection function is used to evaluate the relationship between two
samples and cost function is used to convert the relationship
into a cost. How to choose the connection function and cost
function is closely related to the performance of SCNN.
There are many distance, similarity, or other functions can
be used as candidates to connect two vectors, such as: Euclidian distance, Cosine similarity, absolute difference, vector
concatenate and so on. Their formulas are
X
Seuc (x, y) = −
(xi − yi )2 ,
(1)
i
P
Scos (x, y)
Sabs (x, y)
xi yi
pP i P
,
i xi xi
i yi yi
X
= −
|xi − yi |,
=
(2)
(3)
i
Scon (x, y)
X
=
wi [x; y]i .
(4)
i
In the above equations, we negate the distance functions to
make them consistent to similarity. The advantage of Euclidian
distance is that its derivation has simple form, but its output
is unbounded which could make the training process unstable.
Absolute difference is non-derivable at some points. Cosine
function is bounded to [-1, 1] and invariant to the magnitude
of samples. Because of the good property of Cosine function
and it has been used widely in many pattern recognition
problems [3], [23], [24], we choose it as the connection
function.
For the cost function, [21] has given some analysis about
Square loss, Exponential loss, and Binomial deviance [25] and
chose Binomial deviance as the final cost function. Here we
discuss another popular cost function in pattern recognition:
Fisher criterion. Given a training set X = [x1 , x2 , · · · , xn ],
its corresponding similarity matrix S and mask matrix M ,
Binomial deviance and Fisher criterion are formulated as
X
Jdev =
W ◦ ln(e−α(S−β)◦M + 1),
(5)
P
=
(
−P
i,j
2
P ◦ S)
i,j (S
− S̄)2
,
(6)
where ◦ is element-wise matrix product.
S = [Sij ]n×n ,
M = [Mij ]n×n ,
W = [Wij ]n×n ,
P = [Pij ]n×n ,
i,j
where X is the output of CNN. S is the output of connection
function.
xT xj
.
(12)
S = [Sij ]n×n , Sij = q i
xTi xi xTj xj
Differentiating the cost function with respect to X, we can get
∂Jdev
g + AD),
d
= X(AB + (AB)T ) − X ◦ (AC
∂X
where
e−α(S−β)◦M
,
e−α(S−β)◦M + 1
1
B = [Bij ]n×n , Bij = q
,
T
xi xi xTj xj
A = −αW ◦ M ◦
xTi xj
,
xTi xi
xT xj
D = [Dij ]n×n , Dij = Bij Ti ,
xj xj
T
X
g = repmat(
AC
Aij Cij , d, 1),
C = [Cij ]n×n , Cij = Bij
i,j
Jf isher
pairs. S̄ is the mean of S. α and β are hyper-parameters of
Binomial deviance. The numerator of Eqn. (6) is the between
class divergence of similarity matrix S and the denominator
is the total variance. By minimizing Eqn. (5) or Eqn. (6), we
can learn a network separating the positive and negative pairs
as far as possible.
By comparing Eqn. (5) and Eqn. (6), we can see that Binomial deviance cost more focus on the false classified samples
(or the samples near the boundary), but Fisher criterion focus
on every elements of the similarity matrix S equally. In our
intuition, Binomial deviance cost can make the network be
trained mainly on the hard samples and more likely to get a
good model, which will be verified in the experiments. In the
following sections, we fix the connection function as Cosine
and the cost function as Binomial deviance.
After the connection and cost functions are determined,
Back-Propagation (BP) [26] is used to learn the parameters
of SCNN. By plugging Eqn. (2) into Eqn. (5), we can get the
forward propagation function to calculate the cost of training
set.
X
Jdev (X) =
W ◦ ln(e−α(S−β)◦M + 1),
(11)
Sij = S(xi , xj ),
1, positive pair
−1, negative pair ,
Mij =
0, neglected pair
1
n1 , positive pair
1
, negative pair ,
Wij =
n2
0, neglected pair
1
n1 , positive pair
− 1 , negative pair .
Pij =
n2
0, neglected pair
(7)
(13)
(14)
(15)
(16)
(17)
(18)
j
(8)
X
d = repmat(
AD
Aij Dij , d, 1).
(19)
i
(9)
(10)
Sij denotes the similarity of sample xi and xj . Mij denotes
whether xi and xj come from the same subject or not. n1
is the count of positive pairs. n2 is the count of negative
where “repmat” is a function to create a matrix by tiling vector
many times, as same as the function in Matlab. One can refer
Appendix A for the detail derivation of Eqn. (13).
While [21] trains the network in a pairwise way, this paper
formulates the cost and gradient in totally matrix form. When
the network is trained by Stochastic Gradient Descent (SGD)
with mini-batch, the new formulation can process more sample
pairs in one batch. When the size of batch is set to 128, in [21]
a batch includes 64 positive and 64 negative sample pairs, but
in this paper a batch can generate 128 × (128 − 1)/2 = 8128
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
pairs, which makes the network scans the training data faster
and saves the training time.
Based on Eqn. (11) and Eqn. (13), we can learn the parameters of SCNN by SGD algorithm. For general neural network,
the error is backward propagated from top to down through
a single path. On the contrary, the error of specific SCNN is
backward propagated through two branches by Eqn. (27) and
Eqn. (33) respectively as described in [21]. In practice, we
also can assign asymmetry cost on the label Mij to positive
and negative pairs to tune the performance of network, e.g.,
1 for positive pairs and −2 for negative pairs. The effect of
asymmetry cost on the performance will be discussed in the
experiments.
IV. E XPERIMENTS
There are many popular datasets were built for person reidentification, such as VIPeR [4], PRID 2011 [5], i-LIDS [8],
CUHK Campus [6] and so on. Among these datasets, the
evaluation protocols of VIPeR and PRID (single-shot version)
are the clearest two, therefore we compare our method with
other methods on them. The experiments are done in two
settings:
1) Intra dataset experiments
• training and test both on VIPeR;
• training and test both on PRID.
2) Cross dataset experiments
• training on i-LIDS and test on VIPeR;
• training on i-LIDS and test on PRID;
• training on CUHK Campus and test on VIPeR;
• training on CUHK Campus and test on PRID.
The intra dataset experiments are conducted to illustrate the
basic performance of the proposed method. The cross dataset
experiments are to illustrate the generalization ability.
A. Intra Dataset
Except for [9] and [21], other papers all conduct experiments in this setting that is training and test on the same
dataset. VIPeR includes 632 subjects, 2 images per subject
coming from 2 different camera views (camera A and camera
B). We split VIPeR into disjoint training (316 subjects) and
testing set (316 subjects) randomly, and repeat the process 11
times. The first split (Dev. view) is used for parameter tuning,
such as the number of training epoch, learning rate, weight
decay and so on. The other 10 splits (Test view) are used for
reporting the results.
As similar to VIPeR, PRID is captured by 2 cameras too
(camera A and camera B). Camera A shows 385 subjects and
camera B shows 749 subjects. The first 200 subjects appear
in both cameras. Follow the testing protocols in [5], [27], we
randomly select 100 subjects from the first 200 subjects for
training and the remain subjects for testing. The test set is
composed by probe and gallery, and their information are as
follows.
• Probe set: the remain 100 subjects of the first 200 subjects
in camera A except for the 100 training subjects;
5
Gallery set: the remain 649 subjects of camera B except
for the 100 training subjects.
Again, the whole process is repeated 11 times. The first split
is used for parameter tuning and the other 10 splits are used
for reporting the results.
In the training stage, all training images from camera A
and camera B are merged, randomly shuffled and sent to a
generic SCNN. The corresponding mask matrix is generated
according to the label of samples. Those pairs from the same
subjects are assigned 1, and those from the different subjects
are assigned -1. Because the mask matrix is symmetric, we
set the elements in the lower triangular part to 0 to avoid
redundant computation. In the testing stage, one image of each
subject is used as gallery and the other one is used as probe.
Before evaluate on Test view, we use Dev. view to investigate the most three important factors which affect the
performance of network: 1) data augmentation, 2) asymmetric
cost for positive and negative sample pairs, and 3) cost
function. Besides, we set the parameters of the cost function
Eqn. (5) as α = 2 and β = 0.5.
1) Data Augmentation: Data augmentation is a widely used
trick [28] for training neural network. In the experiments, we
will mirror all person images to double the training and test
sets. Although this trick has been used in [21], but its effect
on the performance was not analyzed. Here, we compare the
performance on Dev. view of VIPeR with and without data
augmentation. For the training set, the number of images
of each subject is increased from 2 to 4. In the testing
stage, 2 original images and their mirrored version generate 4
similarity scores and the final score are fused by sum rule.
From the results in Table I, we can see significant improvements brought by data augmentation, especially in the
top ranks. This indicates that the scale of dataset is crucial
to train good networks. If know the geometry information of
the person in the image, i.e., the 3D pose of the person, we
can augment the datasets guided by the 3D pose and generate
more virtual images to improve the performance. In this sense,
human 3D pose estimation will be an important direction for
person re-identification in the following years.
2) Asymmetric Cost: As described in Section III-C, while
generating mask matrix from the labels of training samples, the
number of negative sample pairs is far more than positive pairs.
However, in practice we usually split the training samples
into many batches first, and then the positive and negative
sample pairs are just generated within each batch. Therefore,
the negative sample pairs between batches can not be covered
by the training process. This may cause the negative pairs
prone to under-fitting.
To balance the weight of positive and negative sample pairs,
we can assign asymmetric costs to them. While fixing the cost
of positive pair to 1, we tune the cost of negative pair c from
1 to 3. The asymmetric cost can apply easily on Eqn. (11) and
Eqn. (13) by setting
1, positive pair
−c, negative pair
Mij =
(20)
0, neglected pair
•
Table II shows the relationship between the negative cost
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
6
TABLE I
T HE RANK -1 TO RANK -50 RECOGNITION RATES ON D EV. VIEW OF VIP E R WITH OR WITHOUT DATA AUGMENTATION .
Rank
With Aug.
Without Aug.
1
34.49%
18.4%
5
60.13%
49.37%
10
74.37%
67.09%
15
80.7%
74.05%
20
84.18%
80.06%
25
88.61%
84.18%
30
91.14%
87.04%
50
96.84%
96.2%
0
0.65
Training set
Test set
Training set
Test set
0.6
−5
0.55
−10
Cost
Cost
0.5
0.45
−15
0.4
0.35
−20
0.3
0.25
0
20
40
60
80
100
Epoch
120
140
160
180
−25
0
20
40
60
80
100
Epoch
120
140
160
180
Fig. 3. The epoch-cost curves of the training and test set (Dev. view of
VIPeR) when using Binomial deviance (left) or Fisher criterion (right) as
cost function.
Fig. 5. The similarity score distribution of VIPeR computed based on the 21
human labelled attributes [29]. The 21 attributes are binary and the similarity
scores are evaluated by Hamming distance.
and the recognition rate. No matter using which cost function,
the cost of the training set always drop continually. On the
contrary, the cost of the test set drops significantly just at the
beginning of training process, and then it gradually becomes
converged after tens of epochs. From the figure we can see
that the cost gap between the training and test set is small
when using Binomial deviance. But for Fisher criterion, the
gap is obviously bigger than Binomial deviance, which reflects
that Fisher criterion is easily overfiting to the training set. By
inspecting the epoch-cost curves, we set epoch= 180 based
on our experience in the following experiments.
Fig. 4. The similarity score distributions of the training and test set (Dev.
view of VIPeR) when using Binomial deviance (left) or Fisher criterion (right)
as cost function.
c and recognition rate. On Dev. view of VIPeR, the highest
overall performance is achieved at c = 2. This illustrates
that the negative pairs should be paid more attention in each
training batch.
3) Binomial Deviance vs. Fisher Criterion: Next, we compare two cost functions discussed in Section III-C: Binomial
deviance (Eqn. (5)) and Fisher criterion (Eqn. (6)). Like the
two prior two experiments, the comparison is conducted on
Dev. view of VIPeR too. In the comparison experiments, we
mirror the images to double the dataset and set the cost for
negative pairs to c = 2. The connection function is fixed to
Cosine. The differences between Binomial deviance and Fisher
criterion are evaluated in three aspects: 1) epoch-cost curve,
2) similarity score distribution, and 3) recognition rate.
Figure 3 shows the epoch-cost curves on Dev. view of
VIPeR. Low cost reflects high performance approximately,
although there is no explicit relationship between the cost
As shown in Figure 4, the two-class similarity distributions
of the two cost functions are very different. And a distribution
generated from the attributes [29] of VIPeR is also given in
Figure 5 for reference. The experiment in [29] has shown that
only using the 21 attributes and Hamming distance can achieve
very high recognition rate, i.e., rank1≈ 76%. Because the
attributes are labelled by human, they can be seen as a baseline
of human performance, and the distribution in Figure 5 can be
seen as the ideal two-class distribution of VIPeR. For Binomial
deviance, the distribution of negative similarity scores are
significantly wider than that of positive scores, which is very
coincide with the ideal distribution generated from the 21
attributes. For Fisher criterion, the distributions of positive and
negative scores are standard Gaussian with the same variance.
Although nearly perfect results can be obtained on the
training set using any cost function, their performance on the
test set are different (see Table III). From the performance, we
can see that Binomial deviance is more suitable for person reidentification problem because it mainly focus on the samples
near the boundary and less affected by the distributions of
positive and negative samples. For Fisher criterion, the ideal
distributions are highly heteroscedastic, which is conflicted
with the assumption of Fisher. Maybe some modifications can
be made on Fisher criterion to solve this problem, but we leave
the work to future.
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
7
TABLE II
T HE RECOGNITION RATE ON D EV. VIEW OF VIP E R AT DIFFERENT NEGATIVE COSTS .
Rank
c=1
c = 1.5
c=2
c = 2.5
c=3
1
26.9%
31.01%
34.49%
29.75%
27.85%
5
53.48%
58.54%
60.13%
59.18%
56.65%
10
65.82%
70.89%
74.37%
71.84%
70.57%
15
74.05%
78.8%
80.7%
80.06%
78.8%
20
78.48%
84.49%
84.18%
85.13%
85.44%
25
85.76%
87.66%
88.61%
89.24%
87.97%
30
87.34%
90.82%
91.14%
91.77%
91.46%
50
94.94%
97.78%
96.84%
96.2%
94.94%
TABLE III
T HE RANK -1 TO RANK -50 RECOGNITION RATES ON D EV. VIEW OF VIP E R USING DIFFERENT COST FUNCTIONS .
Rank
Binomial Deviance
Fisher Criterion
1
34.49%
14.24%
5
60.13%
35.13%
10
74.37%
47.15%
4) Results: After the above analysis and parameter tuning,
we test the performance of our network on Test View of VIPeR
and PRID with the following configuration:
• Augment the training and set set by mirror the samples
and fused the score by sum;
• Set the negative cost c = 2; set the number of epoch=
180;
• Use Cosine as connection function and Binomial Deviance as cost function.
The experiments are repeated 10 times and the mean recognition rates are list in Table IV and Table V.
To distinguish the modified DML from the original one
in [21], we rename the proposed method in this paper as
“Improved DML”. Compared to the pairwise version in [21],
the improved DML has 5× training speed and significant
performance improvement. Notably, the rank-1 recognition
rate increases by 6%, from 28.23% to 34.4%. The results of
other compared methods are copied from the original papers.
If the results are unavailable, they are leaved as “-”. From
the table we can see that the proposed method outperforms
most of compared methods on VIPeR including the current
state-of-the-art methods [6], [7]. From rank-1 to rank-50, our
method outperforms [6], [7] remarkably, except that the rank50 recognition rate of [6] is higher than ours slightly. Among
all methods, our method is nearly the most simple and elegant
one, which doesn’t need any pre-processing, pose information
or segmentation. From the bottom to top layers in the network, every building blocks contribute to a common objective
function and are optimized by BP algorithm simultaneously.
On PRID, we get similar results to VIPeR that the proposed
method outperforms the state-of-the art method, RPML [27].
However, the superiority of our method on PRID (1% to 3%)
is smaller than that on VIPeR (4% to 10%), the reason is
that the scale of PRID dataset is too small to train a good
network. Just using 100 sample pairs, our network outperforms
the compared methods, which can illustrate the power of deep
metric learning. Compared to VIPeR, the quality of PRID
is poorer and the size of its gallery is bigger, therefore the
recognition rates on PRID are overall lower than VIPeR.
B. Cross Dataset
In this section, we conduct many experiments in the cross
dataset setting which is more coincide with practical applica-
15
80.7%
56.96%
20
84.18%
62.66%
25
88.61%
67.41%
30
91.14%
71.84%
50
96.84%
80.06%
TABLE VI
C ROSS DATASET EXPERIMENT: COMPARISON OF THE PROPOSED METHOD
AND DTRSVM [9] ON VIP E R.
Methods
DML [21]
DTRSVM [9]
DTRSVM [9]
Improved DML
Improved DML
Improved DML
Tr. Set
CUHK
PRID
i-LIDS
i-LIDS
CUHK
i-LIDS
+ CUHK
1
16.17%
10.9%
8.26%
11.61%
16.27%
10
45.82%
28.2%
31.39%
34.43%
46.27%
20
57.56%
37.69%
44.83%
44.08%
59.94%
30
64.24%
44.87%
53.88%
52.69%
70.13%
17.72%
48.8%
63.35%
72.85%
tions. In the following, i-LIDS, CUHK Campus are used as
training set, and VIPeR, PRID are used as test set. i-LIDS is
captured at a airport in indoor environment; CUHK Campus
is captured in a campus; VIPeR and PRID are captured on
the street. Due to totally different capture environments and
devices, cross dataset experiments are more challenging than
the previous experiments. Different from [9], we don’t use any
samples in VIPeR and PRID to adapt classifiers to the target
domains.
In i-LIDS dataset, there are 119 people with total 476
images captured by multiple non-overlapping cameras with an
average of 4 images for each person. Many of these images
have large illumination changes and are subject to occlusions.
The scale of i-LIDS is smaller than VIPeR and PRID and the
resolution of images in i-LIDS are varied. CUHK Campus is
a large scale dataset captured by two cameras in 5 sessions,
includes 1816 subjects and 7264 images. Each subject has
4 images from 2 camera views. The resolution of CUHK
Campus is 60 × 160. The cross dataset networks are trained
with the same parameters as the previous experiments.
Before training, we resize all images in i-LIDS and CUHK
Campus to 40 × 128 for convenience. For the test set, we
use the same setting with the intra dataset experiments. For
VIPeR, A half of subjects and images are randomly selected
to construct the test set, which includes 316 subjects and 632
images. For PRID, the test set includes 649 subjects and 749
images. The test process is repeated 10 times too, and the
average recognition rate is reported.
1) Results: First, we use i-LIDS and CUHK Campus as
training set respectively, and test the performance of the
trained networks on VIPeR. The recognition rates on VIPeR
are shown in Table VI and the results of DTRSVM [9] are
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
8
TABLE IV
I NTRA DATASET EXPERIMENT: COMPARISON OF THE PROPOSED METHOD AND OTHER STATE - OF - THE - ART METHODS ON VIP E R.
Rank
Method
ELF [16]
RDC [2]
PPCA [30]
Salience [12]
RPML [27]
LAFT [6]
Salience1 [7]
DML [21]
Improved DML
1
5
10
15
20
25
30
50
12%
15.66%
19.27%
26.74%
27%
29.6%
30.16%
28.23%
34.4%
31%
38.42%
48.89%
50.7%
52.3%
59.27%
62.15%
41%
53.86%
64.91%
62.37%
69%
69.31%
73.45%
75.89%
81.2%
82.56%
58%
70.09%
80.28%
76.36%
83%
86.39%
87.22%
88.7%
89.53%
89.65%
92.28%
92.28%
95%
96.8%
96.68%
96.52%
TABLE V
I NTRA DATASET EXPERIMENT: COMPARISON OF THE PROPOSED METHOD AND OTHER STATE - OF - THE - ART METHODS ON PRID 2011.
Rank
Method
Descr. Model [5]
RPML [27]
Improved DML
1
5
10
15
20
25
30
50
4%
15%
17.9%
37.5%
24%
42%
45.9%
50.7%
37%
54%
55.4%
59.3%
63.1%
56%
70%
71.4%
TABLE VII
C ROSS DATASET EXPERIMENT: COMPARISON OF THE PROPOSED METHOD
AND DTRSVM [9] ON PRID 2011.
Methods
DTRSVM [9]
DTRSVM [9]
Improved DML
Improved DML
Improved DML
Tr. Set
VIPeR
i-LIDS
i-LIDS
CUHK
i-LIDS
+ CUHK
1
4.6%
3.95%
8%
7.6%
10
17.25%
18.85%
25.5%
23.4%
20
22.9%
26.6%
38.9%
30.9%
30
28.1%
33.2%
45.6%
36.1%
13.8%
35.4%
45%
51.3%
(a) VIPeR
(b) PRID
listed for comparison. From the results we can see that our
method outperforms the original DML in [21] slightly. When
training on i-LIDS, our method is on a par with DTRSVM,
and the rank-1 and rank-10 recognition rates are better than
DTRSVM slightly. When training on CUHK Campus, our
performance improved significantly. A possible reason is that
compared to i-LIDS the quality and aspect ratio of images in
CUHK Campus is more similar to VIPeR. By combining the
similarity scores of the two networks by sum, the performance
is improved further and even approaches the performance of
some methods in intra dataset setting, such as ELF [16] and
RDC [2].
Then we test the two trained networks on PRID, and give
the results in Table VII. When using i-LIDS as training set,
our method is better than DTRSVM significantly. But different from the results on VIPeR, training on CUHK Campus
decreases the recognition rates remarkably. The performance
decline is caused by the big difference between CUHK Campus and PRID datasets. Fusing the similarity scores of i-LIDS
and CHUK Campus increases the performance too, especially
the rank-1 recognition raises from 8% to 13.8%.
Compared to the intra dataset experiments, the performance
of cross dataset experiments decline sharply. For rank-30
recognition rate, the number of VIPeR and PRID both drop
more than 20%, which indicates the trained models are hard
to generalize across datasets due to the distinctive properties
of each dataset. Figure 6 shows some filters learned from
(c) i-LIDS
(d) CUHK
Fig. 6. The filters in the first layer of CNN, from top to down, which are
learned on VIPeR, PRID, i-LIDS, CUHK Campus respectively. The size of
filters are 7 × 7, and their order are sorted by Hue component for best view.
different datasets, from which we can see the distributions of
color and texture on these datasets are very diverse. Besides
of the experimental results, the diverse filters also can prove
that the model learned on a dataset can hardly adapt to another
one. How to transfer a model to target domain or how to fully
use the multiple heterogeneous datasets at hand to improve the
performance in target domain are important research topics in
the future.
V. C ONCLUSIONS
This paper proposed a deep metric learning method by
using siamese convolutional neural network. The structure
of the network and the training process were described in
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
9
detail. Extensive intra dataset and cross dataset person reidentification experiments were conducted to illustrate the
superiorities of the proposed method. This is the first work
to apply deep learning in the person re-identification problem
and is also the first work to study the person re-identification
problem in fully cross dataset setting. The experimental results
illustrated that the network can deal with the cross view and
cross dataset person re-identification problems efficiently and
outperformed the state-of-the-art methods significantly. In the
future, we will apply DML to other applications; explore
the way to pre-train the network; and investigate how to
embed geometry information into the network to improve the
robustness to pose variations. Moreover, we will continue to
research how to train a general person matching engine with
good generalization across view and dataset.
j
∂xTj xj
= 2 0 xj 0
(25)
∂X
By substituting Eqn. (23), Eqn. (24) and Eqn. (25) into
Eqn. (22) and substituting Eqn. (22) into Eqn. (21), we can
dev
get the final formulation of ∂J∂X
.
∂Jdev X
=
Aij Bij
0
∂X
ij
−αW ◦ M ◦
ij
=
X
Aij
ij
e−α(S−β)◦M ∂Sij
+ 1 ∂X
e−α(S−β)◦M
(21)
∂Sij
,
∂X
−
∂X
0
∂xTi xi
=2
∂X
0
i
0 xi
X
Aij Cij
Aij Dij
0
xi
0
(26)
j
−
X
0
xj
0
g is defined in Eqn. (18) and AD
d is defined in
where AC
Eqn. (19).
A PPENDIX B
G RADIENTS OF V IEW S PECIFIC SCNN
Although this paper doesn’t use specific (asymmetric)
SCNN for experiment, we give the gradients of cost function
for reference. We denote the output of two sub-networks by
X = [x1 , x2 , · · · , xn ] and Y = [y1 , y2 , · · · , xm ], where n
is the number of samples in view1 and m is the number
of samples in view2. The dimensions of their corresponding
similarity matrix S and mask matrix M are n × m.
Following the derivation process in Appendix A, the gradients of Jdev with respect to X and Y are as follows.
∂Jdev
g
= Y (EF )T − X ◦ EG,
∂X
(27)
where
e−α(S−β)◦M
,
+1
1
F = [Fij ]n×n , Fij = q
,
xTi xi yjT yj
E = −αW ◦ M ◦
e−α(S−β)◦M
G = [Gij ]n×n , Gij = Fij
xTi yj
,
xTi xi
T
X
g = repmat(
Eij Gij , d, 1).
EG
(28)
(29)
(30)
(31)
(32)
And
∂Jdev
d
= X(EF ) − Y ◦ EH,
∂Y
(33)
where
j
xi
0
0
j
(22)
where Bij , Cij and Dij are defined in Eqn. (15), Eqn. (16)
and Eqn. (17) respectively. The derivatives of xTi xj , xTi xi and
xTj xj with respect to X are as follows.
=
xi
ij
∂xT xj
Cij ∂xTi xi
Dij ∂xTj xj
−
−
,
=Bij i
∂X
2 ∂X
2 ∂X
i
xj
0
g + AD),
d
=X(AB + (AB)T ) − X ◦ (AC
where Ai j can be seen as a weight for each sample pair. And
∂Sij
∂X is the derivative of the similarity Sij with respect to X.
Expand the Cosine similarity Sij by Eqn. (2), we can get
p
q
T
xi xT
x
∂ xT
i
j j
T x xT x ∂xi xj − xT x
x
i j
i i j j ∂X
∂X
∂Sij
=
∂X
xTi xi xTj xj
1
=q
xTi xi xTj xj
!
∂xTi xj
xTi xj ∂xTi xi
xTi xj ∂xTj xj
− T
− T
∂X
2xi xi ∂X
2xj xj ∂X
∂xTi xj
xj
ij
For general SCNN, the two sub-networks share their parameters, therefore they have the same output for a sample. Input a training set, we denote the output of CNN by
X = [x1 , x2 , · · · , xn ], where n is the number of samples.
The cost produced by the training set X can be calculated by
Eqn. (11). The gradient of Eqn. (11) with respect to X can be
derived as follows.
∂Jdev X ∂Jij
=
∂X
∂X
ij
X
j
i
A PPENDIX A
G RADIENTS OF G ENERAL SCNN
=
i
0
(23)
(24)
xTi yj
,
yjT yj
(34)
X
d = repmat(
EH
Eij Hij , d, 1).
(35)
H = [Hij ]n×n , Hij = Fij
i
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
ACKNOWLEDGMENT
This work was supported by the Chinese National Natural Science Foundation Projects #61105023, #61103156,
#61105037, #61203267, #61375037, National Science and
Technology Support Program Project #2013BAK02B01, Chinese Academy of Sciences Project No. KGZD-EW-102-2,
Jiangsu Science and Technology Support Program Project
#BE2012627, and AuthenMetric R&D Funds.
R EFERENCES
[1] M. Kostinger, M. Hirzer, P. Wohlhart, P. Roth, and H. Bischof, “Large
scale metric learning from equivalence constraints,” in Computer Vision
and Pattern Recognition (CVPR), 2012 IEEE Conference on, 2012, pp.
2288–2295.
[2] W.-S. Zheng, S. Gong, and T. Xiang, “Reidentification by relative
distance comparison,” Pattern Analysis and Machine Intelligence, IEEE
Transactions on, vol. 35, no. 3, pp. 653–668, 2013.
[3] J. Bromley, I. Guyon, Y. LeCun, E. Säckinger, and R. Shah, “Signature
verification using a siamese time delay neural network,” in NIPS, 1993,
pp. 737–744.
[4] D. Gray, S. Brennan, and H. Tao, “Evaluating appearance models
for recognition, reacquisition, and tracking,” in In IEEE International
Workshop on Performance Evaluation for Tracking and Surveillance,
Rio de Janeiro, 2007.
[5] M. Hirzer, C. Beleznai, P. Roth, and H. Bischof, “Person re-identification
by descriptive and discriminative classification,” in Image Analysis, ser.
Lecture Notes in Computer Science, A. Heyden and F. Kahl, Eds.
Springer Berlin Heidelberg, 2011, vol. 6688, pp. 91–102.
[6] W. Li and X. Wang, “Locally aligned feature transforms across views,”
in Computer Vision and Pattern Recognition (CVPR), 2013 IEEE
Conference on, 2013, pp. 3594–3601.
[7] R. Zhao, W. Ouyang, and X. Wang, “Person re-identification by salience
matching,” in Proceedings of IEEE International Conference on Computer Vision, 2013, pp. 2528–2535.
[8] W.-S. Zheng, S. Gong, and T. Xiang, “Person re-identification by
probabilistic relative distance comparison,” in Computer Vision and
Pattern Recognition (CVPR), 2011 IEEE Conference on, 2011, pp. 649–
656.
[9] A. J. Ma, P. C. Yuen, and J. Li, “Domain transfer support vector ranking
for person re-identification without target camera label information,”
in Proceedings of IEEE International Conference on Computer Vision,
2013, pp. 3567–3574.
[10] O. Javed, K. Shafique, and M. Shah, “Appearance modeling for tracking
in multiple non-overlapping cameras,” in Computer Vision and Pattern
Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on,
vol. 2, 2005, pp. 26–33 vol. 2.
[11] M. Farenzena, L. Bazzani, A. Perina, V. Murino, and M. Cristani,
“Person re-identification by symmetry-driven accumulation of local
features,” in Computer Vision and Pattern Recognition (CVPR), 2010
IEEE Conference on, 2010, pp. 2360–2367.
[12] R. Zhao, W. Ouyang, and X. Wang, “Unsupervised salience learning for
person re-identification,” in Computer Vision and Pattern Recognition
(CVPR), 2013 IEEE Conference on, 2013, pp. 3586–3593.
[13] I. Kviatkovsky, A. Adam, and E. Rivlin, “Color invariants for person reidentification,” Pattern Analysis and Machine Intelligence, IEEE
Transactions on, vol. 35, no. 7, pp. 1622–1634, 2013.
[14] Y. Xu, L. Lin, W.-S. Zheng, and X. Liu, “Human re-identification by
matching compositional template with cluster sampling.” ICCV, 2013.
[15] X. Zhang and Y. Gao, ““Face recognition across pose: A review”,”
Pattern Recognition, vol. 42, no. 11, pp. 2876–2896, 2009.
[16] D. Gray and H. Tao, “Viewpoint invariant pedestrian recognition with
an ensemble of localized features,” in Computer Vision C ECCV 2008,
ser. Lecture Notes in Computer Science, D. Forsyth, P. Torr, and
A. Zisserman, Eds. Springer Berlin Heidelberg, 2008, vol. 5302, pp.
262–275.
[17] B. Prosser, W.-S. Zheng, S. Gong, and T. Xiang, “Person re-identification
by support vector ranking,” in BMVC, 2010, pp. 1–11.
[18] C. Liu, C. C. Loy, S. Gong, and G. Wang, “Pop: Person re-identification
post-rank optimisation,” in International Conference on Computer Vision, 2013.
[19] P. Baldi and Y. Chauvin, “Neural networks for fingerprint recognition,”
Neural Computation, vol. 5, no. 3, pp. 402–418, 1993.
10
[20] S. Chopra, R. Hadsell, and Y. LeCun, “Learning a similarity metric
discriminatively, with application to face verification,” in CVPR (1),
2005, pp. 539–546.
[21] D. Yi, Z. Lei, S. Liao, and S. Z. Li, “Deep metric learning for person
re-identification,” in Proceedings of International Conference on Pattern
Recognition, 2014, pp. 2666–2672.
[22] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification
with deep convolutional neural networks,” in NIPS, 2012, pp. 1106–
1114.
[23] T. Qin, X.-D. Zhang, M.-F. Tsai, D.-S. Wang, T.-Y. Liu, and H. Li,
“Query-level loss functions for information retrieval,” Information Processing & Management, vol. 44, no. 2, pp. 838–855, 2008.
[24] H. Nguyen and L. Bai, “Cosine similarity metric learning for face
verification,” in Computer Vision C ACCV 2010, ser. Lecture Notes
in Computer Science, R. Kimmel, R. Klette, and A. Sugimoto, Eds.
Springer Berlin Heidelberg, 2011, vol. 6493, pp. 709–720.
[25] J. Friedman, R. Tibshirani, and T. Hastie, The Elements of Statistical
Learning : Data Mining, Inference, and Prediction, ser. Springer Series
in Statistics. New York: Springer-Verlag, 2009.
[26] Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-based learning
applied to document recognition,” Proceedings of the IEEE, vol. 86,
no. 11, pp. 2278–2324, 1998.
[27] M. Hirzer, P. Roth, M. Köstinger, and H. Bischof, “Relaxed pairwise
learned metric for person re-identification,” in Computer Vision C
ECCV 2012, ser. Lecture Notes in Computer Science, A. Fitzgibbon,
S. Lazebnik, P. Perona, Y. Sato, and C. Schmid, Eds. Springer Berlin
Heidelberg, 2012, vol. 7577, pp. 780–793.
[28] D. C. Cireşan, U. Meier, J. Masci, L. M. Gambardella, and J. Schmidhuber, “Flexible, high performance convolutional neural networks for
image classification,” in Proceedings of the Twenty-Second international
joint conference on Artificial Intelligence-Volume Volume Two. AAAI
Press, 2011, pp. 1237–1242.
[29] R. Layne, T. M. Hospedales, and S. Gong, “Attributes-based reidentification,” in Person Re-Identification. Springer, 2014, pp. 93–117.
[30] A. Mignon and F. Jurie, “Pcca: A new approach for distance learning
from sparse pairwise constraints,” in Computer Vision and Pattern
Recognition (CVPR), 2012 IEEE Conference on, 2012, pp. 2666–2672.
Dong Yi received the B.S. degree in electronic
engineering in 2003, the M.S. degree in communication and information system from Wuhan University, Wuhan, China, in 2006, and received the
Ph.D. degree in pattern recognition and intelligent
systems from CASIA, Beijing, China, in 2009. His
research areas are unconstrained face recognition,
heterogeneous face recognition, and deep learning.
He has authored and acted as a reviewer for tens of
articles in international conferences and journals. He
developed the face biometric algorithms and systems
for the Shenzhen-Hongkong immigration control project and 2008 Beijing
Olympic Games.
PLACE
PHOTO
HERE
Zhen Lei received the B.S. degree in automation
from the University of Science and Technology of
China (USTC), in 2005, and the Ph.D. degree from
the Institute of Automation, Chinese Academy of
Sciences (CASIA), in 2010, where he is now an
assistant professor. His research interests are in computer vision, pattern recognition, image processing,
and face recognition in particular. He has published
over 40 papers in international journals and conferences.
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
Stan Z. Li received the B.Eng. degree from Hunan
University, Changsha, China, the M.Eng. degree
from the National University of Defense Technology,
China, and the Ph.D. degree from Surrey UniverPLACE
sity, Surrey, U.K. He is currently a Professor and
PHOTO
the Director of Center for Biometrics and Security
HERE
Research (CBSR), Institute of Automation, Chinese
Academy of Sciences (CASIA). He worked at Microsoft Research Asia as a researcher from 2000 to
2004. Prior to that, he was an Associate Professor at
Nanyang Technological University, Singapore. His
research interest includes pattern recognition and machine learning, image
and vision processing, face recognition, biometrics, and intelligent video
surveillance. He has published over 200 papers in international journals and
conferences, and authored and edited eight books.
11
| 9cs.NE
|
Low noise sensitivity analysis of ℓq -minimization in oversampled
systems ∗
arXiv:1705.03533v2 [math.ST] 18 Feb 2018
Haolei Weng and Arian Maleki
Abstract
The class of ℓq -regularized least squares (LQLS) are considered for estimating β ∈ Rp from its n noisy
linear observations y = Xβ + w. The performance of these schemes are studied under the high-dimensional
asymptotic setting in which the dimension of the signal grows linearly with the number of measurements.
In this asymptotic setting, phase transition diagrams (PT) are often used for comparing the performance
of different estimators. PT specifies the minimum number of observations required by a certain estimator
to recover a structured signal, e.g. a sparse one, from its noiseless linear observations. Although phase
transition analysis is shown to provide useful information for compressed sensing, the fact that it ignores
the measurement noise not only limits its applicability in many application areas, but also may lead to
misunderstandings. For instance, consider a linear regression problem in which n > p and the signal is
not exactly sparse. If the measurement noise is ignored in such systems, regularization techniques, such
as LQLS, seem to be irrelevant since even the ordinary least squares (OLS) returns the exact solution.
However, it is well-known that if n is not much larger than p then the regularization techniques improve the
performance of OLS.
In response to this limitation of PT analysis, we consider the low-noise sensitivity analysis. We show that
this analysis framework (i) reveals the advantage of LQLS over OLS, (ii) captures the difference between
different LQLS estimators even when n > p, and (iii) provides a fair comparison among different estimators
in high signal-to-noise ratios. As an application of this framework, we will show that under mild conditions
LASSO outperforms other LQLS even when the signal is dense. Finally, by a simple transformation we
connect our low-noise sensitivity framework to the classical asymptotic regime in which n/p → ∞ and
characterize how and when regularization techniques offer improvements over ordinary least squares, and
which regularizer gives the most improvement when the sample size is large.
Key Words: High-dimensional linear model, ℓq -regularized least squares, ordinary least squares,
LASSO, phase transition, asymptotic mean square error, second-order expansion, classical asymptotics.
1 Introduction
1.1 Problem Statement
In modern data analysis, one of the fundamental models that has been extensively studied is the high-dimensional
linear model y = Xβ + w with y ∈ Rn , X ∈ Rn×p , where the length of the signal p is at the same order or
in some cases larger than the number of observations n. Since the ordinary least squares (OLS) estimate is not
accurate in the high-dimensional regime, researchers have proposed a wide range of regularization techniques
∗
1
and recovery algorithms to go beyond OLS. The existence of a variety of algorithms and regularizers has in
turn called for platforms that can provide fair comparisons among them. One of the most popular platforms
is the phase transitions analysis (PT). Intuitively speaking, phase transition diagram measures the minimum
number of observations an algorithm or an estimator requires to recover β. To understand the limitations of
PT we study the performance of the following ℓq -regularized least squares (LQLS), a.k.a. bridge estimators
Frank and Friedman (1993),
1
β̂(λ, q) ∈ arg min ky − Xβk22 + λkβkqq ,
2
β
1 ≤ q ≤ 2,
(1)
where k · kq is the usual ℓq norm and λ ≥ 0 is a tuning parameter. This family covers LASSO (Tibshirani, 1996)
and Ridge (Hoerl and Kennard, 1970), two well known estimates in high-dimensional statistics and compressed
sensing.
Phase transition analysis studies the asymptotic mean square error (AMSE) kβ̂(λ, q) − βk22 /p under the
asymptotic setting p → ∞ and n/p → δ. Then, it considers w = 0 and calculates the smallest δ for which
inf λ limp→∞ kβ̂(λ, q) − βk22 /p = 0. In this paper, we consider situations in which β is not exactly sparse. As is
intuitively expected and will be discussed later in the paper, the phase transition analysis implies that for every
1 ≤ q ≤ 2, if δ > 1, then inf λ limp→∞ kβ̂(λ, q) − βk22 /p = 0 and if δ < 1, then inf λ limp→∞ kβ̂(λ, q) −
βk22 /p 6= 0. This simple application of PT reveals some of the limitations of the phase transition analysis:
1. Phase transition analysis is concerned with w = 0, and when β is not sparse, LQLS with different values
of q have the same phase transition at δ = 1. Hence, it is not clear whether regularization can improve
the performance of ordinary least squares (OLS) and if it does, which regularizer is the best. We expect
the choice of regularizer to matter when we add some noise to the measurements.
2. Phase transition diagram is not sensitive to the magnitudes of the elements of β. Again, intuitively
speaking, this seems to have a major impact on the performance of different estimators when the noise is
present in the system.
This paper aims to present a generalization of the phase transition, called low-noise sensitivity analysis, in
which it is assumed that a small amount of noise is present in the measurements. Then it calculates AMSE of
each estimate. This framework has the following two main advantages over the phase transition analysis:
1. It reveals certain phenomena that are important in applications and are not captured by PT analysis. For
instance, one immediately sees the impact of the regularizer and the magnitudes of the elements of β on
the AMSE. Furthermore, these relations are expressed explicitly and can be interpreted easily.
2. It provides a bridge between the phase transition analysis proposed in compressed sensing, and the classical large sample-size asymptotic (n/p → ∞). We will discuss some of the implications of this connection
for the classical asymptotics in Section 3.3.
As a consequence, low noise sensitivity analysis enables us to present a fair comparison among different LQLS,
and reveal different factors that affect their performance.
Here is the organization of the rest of this paper: In Section 1.2, we discuss some related works and highlight the differences from ours. In section 2, we formally introduce the asymptotic framework adopted in our
analyses. In Section 3, we present and discuss our main contributions in details. In Section 4, we prove all the
main results.
2
1.2 Related work
The phase transition analysis for compressed sensing evolved in a series of papers by Donoho and Tanner
Donoho (2004a,b, 2006a); Donoho and Tanner (2005b,a). Donoho and Tanner characterized the phase transition curve for LASSO and some of its variants. Inspired by Donoho and Tanner’s breakthrough, many researchers explored the performance of different algorithms under the asymptotic settings n/p → δ and p → ∞
Reeves and Donoho (2013); Stojnic (2009b,a, 2013); Amelunxen et al. (2014); Thrampoulidis et al. (2016);
El Karoui et al. (2013); Karoui (2013); Donoho and Montanari (2013); Donoho et al. (2013); Donoho and Montanari
(2015); Bradic and Chen (2015); Donoho et al. (2011a,b); Foygel and Mackey (2014); Zheng et al. (2017); Rangan et al.
(2009); Krzakala et al. (2012); Bayati and Montanri (2011); Bayati and Montanari (2012); Reeves and Gastpar
(2008); Reeves and Pfister (2016). In this paper, we use the message passing analysis that was developed in a series of papers Donoho et al. (2011b, 2009); Maleki (2010); Bayati and Montanri (2011); Bayati and Montanari
(2012); Maleki et al. (2013) to characterize the asymptotic mean square errors of LQLS. As a result of this
calculation we obtain some equations whose solution can specify AMSE of an estimate. Unfortunately, the
complexity of these equations does not allow us to interpret the results and obtain useful information. Hence,
we develop a machinery to simplify the AMSE formulas and turn them to explicit and informative quantities.
Note that the AMSE formulas we derive in Theorem 1 can be calculated by the framework developed in
Thrampoulidis et al. (2016) too. Furthermore, the phase transition formulas we derive in Theorem 2 can be
derived from the framework of Amelunxen et al. (2014) as well. The low noise sensitivity analysis that we use
in this paper has been also used in Weng et al. (2016). But the analysis of Weng et al. (2016) is only concerned
with sparse signals. This paper avoids the sparsity assumption. Perhaps surprisingly, the proof techniques developed in Weng et al. (2016) for the sparse signals come short of characterizing higher order terms in dense
cases. In response to that limitation, we propose a delicate chaining argument in this paper that offers a much
more accurate characterization of the higher order terms. The study of dense signals provides much more complete understanding of the the bridge estimators. In particular, under the sparse settings, Weng et al. (2016)
reveals the monotonicity of LQLS’s performance: LASSO is optimal, and the closer q is to 1, the better LQLS
performs. However, in this paper we show that the comparison and optimality characterization of LQLS becomes much more subtle for non-sparse signals. A general and detailed treatment for different types of dense
signals are given in Section 3. Finally, we should also emphasize that the machinery required for the low-noise
sensitivity analysis of dense signals is different from (and much more complicated) the one developed for sparse
signals.
Our paper performs the asymptotic analysis of LQLS. Many researchers have used non-asymptotic frameworks for this purpose. Among all the LQLS, LASSO is the best studied one. The past decade has witnessed dramatic progress towards understanding the performance of LASSO in the tasks of parameter estimation (Donoho, 2006b; Donoho and Tanner, 2005a; Candès et al., 2006; Donoho et al., 2009; Bickel et al., 2009;
Raskutti et al., 2011), variable selection (Zhao and Yu, 2006; Wainwright, 2009; Meinshausen and Bühlmann,
2006; Reeves and Gastpar, 2008), and prediction (Greenshtein et al., 2004). We refer the reader to Bühlmann and Van De Geer
(2011); Eldar and Kutyniok (2012) for a complete list of references. The ones most related to our work are
Donoho (2006b); Candes and Tao (2006); Candes and Plan (2011). In the first two papers, the authors considered non-sparse β with the constraint that kβkq ≤ R or the ith largest component |β|(i) decays as i−α (α > 0).
The papers derived optimal (up to logarithmic factor) upper bounds on the mean square error of LASSO. However, in this paper we characterize the performance of LASSO for a generic β and derive conditions under
which LASSO outperforms other bridge estimators. Also, we should emphasize that thanks to our asymptotic
settings, unlike these two papers we are able to derive exact expressions of AMSE with sharp constants. Finally,
Candes and Plan (2011) studied a fixed signal β and obtained an oracle inequality for kβ̂(1, λ) − βk2 , with the
3
tuning λ chosen as an explicit function of p. While their results are more general than ours, the bounds suffer
from loose constants and are not sufficient to provide sharp comparison of LASSO with other LQLS. Moreover,
the tuning parameter λ in our case is set to the optimal one that minimizes the AMSE for every LQLS, which
further paves our way for accurate comparison between different LQLS.
Finally, the performance of LQLS with q ≥ 0 under classical asymptotic setting where p is fixed and
√
n → ∞ is studied in Knight and Fu (2000). The author obtained the n convergence of LQLS estimates and
derived the asymptotic distributions. His results can be used to calculate the AMSE for LQLS with optimal
tuning and show that they are all equal for q ∈ [1, 2]. However, we demonstrate in Section 3.3 that by a
second-order analysis, a more accurate comparison between the performances of different LQLS is possible. In
particular, LASSO will be shown to outperform others for certain type of dense signals. We should also mention
that the idea of obtaining higher order terms for large sample scenarios was first introduced in Wang et al.
(2017). However, all the results in Wang et al. (2017) are only concerned with the sparse signals. In this paper,
we consider dense signals. We discussed the main challenges of switching from sparse signals to dense signals
earlier in this section.
2 The asymptotic framework
The main goal of this section is to formally introduce the asymptotic framework under which we study LQLS.
In the current section only, we write vectors and matrices as X(p), β(p), y(p), and w(p) to emphasize their
dependence on the dimension of β ∈ Rp . Similarly, we may use β̂(λ, q, p) as a substitute for β̂(λ, q). We
first define a specific type of a sequence known as a converging sequence. Our definition is borrowed from
other papers Donoho et al. (2011b); Bayati and Montanri (2011); Bayati and Montanari (2012) with some minor modifications. Recall that we have the linear model y(p) = X(p)β(p) + w(p).
Definition 1. A sequence of instances {X(p), β(p), w(p)} is called a converging sequence if the following
conditions hold:
- n/p → δ ∈ (0, ∞), as n → ∞.
- The empirical distribution of β(p) ∈ Rp converges weakly to a probability measure pβ with bounded
second moment. Further, 1p kβ(p)k22 converges to the second moment of pβ .
2.
- The empirical distribution of w(p) ∈ Rn converges weakly to a zero mean distribution with variance σw
2.
Furthermore, n1 kw(p)k22 → σw
- The elements of X(p) are iid with distribution N (0, 1/n).
For each of the problem instances in the converging sequence, we solve the LQLS problem (1) and obtain
β̂(λ, q, p) as the estimate. The goal is to evaluate the accuracy of this estimate. Below we define the asymptotic
mean square error as the asymptotic measures of performance.
Definition 2. Let β̂(λ, q, p) be the sequence of solutions of LQLS for the converging sequence of instances
{β(p), X(p), w(p)}. The asymptotic mean square error of β̂(λ, q, p) is defined as the following almost sure
limit
p
1X
(β̂i (λ, q, p) − βi (p))2 .
(2)
AMSE(λ, q, σw ) , lim
p→∞ p
i=1
4
Note that AMSE depends on other factors like pβ . We have suppressed the notations for simplicity. The
performance of LQLS as defined above is affected by the tuning parameter λ. In this paper, we consider the
value of λ that gives the minimum AMSE. Let λ∗,q denote the value of λ that minimizes AMSE given in (2):1
λ∗,q = arg min AMSE(λ, q, σw )
(3)
λ∈[0,∞)
Then LQLS is solved with this specific value of λ, i.e.,
1
β̂(λ∗,q , q) ∈ arg min ky − Xβk22 + λ∗,q kβkqq .
β 2
(4)
This is the best performance that LQLS with each value of q can achieve in terms of AMSE. We can use
Corollary 1 in Weng et al. (2016) to obtain the precise formula of this optimal AMSE.
Theorem 1. For a given q ∈ [1, 2]. Consider a converging sequence {β(p), X(p), w(p)}. Suppose that
β̂(λ∗,q , q) is the solution of LQLS with optimal tuning λ∗,q defined in (4) and AMSE(λ∗,q , q, σw ) is its AMSE
defined in (2). Then
AMSE(λ∗,q , q, σw ) = min EB,Z (ηq (B + σ̄Z; χ) − B)2 ,
(5)
χ≥0
where B and Z are two independent random variables with distributions pβ and N (0, 1), respectively; ηq is
the proximal operator for the function k · kqq ; 2 and σ̄ is the unique solution of the following equation:
σ̄ 2 = σω2 +
1
min EB,Z [(ηq (B + σ̄Z; χ) − B)2 ].
δ χ≥0
(6)
Theorem 1 provides the first step in our analysis of LQLS. We first calculate σ̄ from (6). Then incorporating
the solution σ̄ into (5) gives us the result of AMSE(λ∗,q , q, σw ). Given the distribution of B, the variance of
2 , the number of observations (normalized by the number of predictors) δ, and q ∈ [1, 2], it is
the error σw
straightforward to write a computer program to (numerically) find the solution of (6) and calculate the value
of AMSE(λ∗,q , q, σw ). However, it is needless to say that this approach does not shed much light on the
performance of different LQLS estimates, since there are many factors involved in the computation and each
affects the result in a non-trivial fashion. In this paper, we perform an analytical study on the solution of (6)
and obtain an explicit characterization of AMSE in the high signal-to-noise ratio regime. The expressions
we derived will offer us an accurate view of LQLS and quantify the impact of the distribution of β on the
performance of different LQLS.
As is clear from the definition of a converging sequence in 1 and Theorem 1, the main property of β that
affects AMSE is the probability measure pβ . In the rest of the paper, we will assume pβ does not have any point
mass at zero. We use the notation B to denote a one dimensional random variable distributed according to pβ .
We present our findings for the high signal-to-noise ratio regime where the noise level σw is either zero or small
in Sections 3.1 and 3.2, respectively. We then discuss the implications of our analysis framework for classical
asymptotics in Section 3.3.
1
It turns out the optimal value of λ can be estimated accurately under the asymptotic settings discussed in this paper. See
Mousavi et al. (2017) for more information.
2
The proximal operator of k · kqq is defined as ηq (u; χ) , arg minz 21 (u − z)2 + χ|z|q . For further information on these functions,
please refer to Lemma 6 in Section 4.1.
5
3 Our main contributions
3.1 Phase transition
Suppose that there is no noise in the linear model, i.e., σw = 0. Our first goal in the phase transition analysis
is to find the minimum value of δ for which AMSE(λ∗,q , q, 0) = 0. Our next theorem characterizes the phase
transition.
Theorem 2. Let q ∈ [1, 2]. If E|B|2 < ∞, then we have
AMSE(λ∗,q , q, 0) =
(
>0
if δ < 1,
=0
if δ > 1.
The result can also be derived from several different frameworks including the statistical dimension framework in Amelunxen et al. (2014). But we derive it as a simple byproduct of our results in Section 3.2. So we do
not discuss its proof here. This result is not surprising. Since, none of the coefficients is zero, the exact recovery
is impossible if n < p. Also, note that when δ > 1 even the ordinary least squares is capable of recovering β.
Hence, the result of phase transition analysis does not provide any additional information on the performance
of different regularizers. It is not even capable of showing the advantage of regularization techniques over the
standard least squares algorithm. This is due to the fact that the result of Theorem 2 holds only in the noiseless
case. Intuitively speaking, in the practical settings where the existence of the measurement noise is inevitable,
we expect different LQLS to behave differently. For instance, even though the signal under study is not sparse,
when pβ has a large mass around zero (it is approximately sparse), we expect the sparsity promoting LASSO
to offer better performance than the other LQLS. However, the distribution pβ does not have any effect on the
phase transition diagram. Motivated by these concerns, in the next section, we investigate the performance of
LQLS in the noisy setting, and study their noise sensitivity when the noise level σw is small. The new analysis
will offer more informative answers.
3.2 Second-order noise sensitivity analysis of AMSE
As an immediate generalization of the phase transition analysis, we can study the performance of different
estimators in the presence of a small amount of noise. More formally, we derive the asymptotic expansion of
AMSE(λ∗,q , q, σw ) for every q ∈ [1, 2], when σw → 0. As will be discussed later, this generalization of phase
transitions presents a more delicate analysis of LQLS. We start with the study of AMSE for the ordinary least
squares (OLS). The result of OLS will be later used for comparison purposes.
Lemma 1. Consider the region δ > 1. For the OLS estimate β̂(0, q), we have
AMSE(0, q, σw ) =
2
σw
.
1 − 1/δ
We prove the above lemma in Section 4.2. Note that the proof we presented there, has not used the independence of the noise elements that is often assumed in the analysis of OLS. Now we can discuss LQLS with the
optimal choice of λ defined in (3). It turns out that the distribution pβ impacts AMSE(λ∗,q , q, σw ) in a subtle
way. For analysis purposes we first study the signals whose elements are bounded away from zero in Theorem
3 and then study other distributions in Theorem 4.
6
Theorem 3. Consider the region δ > 1. Suppose that P(|B| > µ) = 1 with µ being a positive constant and
E|B|2 < ∞. Then, for q ∈ (1, 2], as σw → 0
AMSE(λ∗,q , q, σw ) =
and for q = 1, as σw → 0
2
δ3 (q − 1)2 (E|B|q−2 )2 4
σw
4
−
σw + o(σw
),
1 − 1/δ
(δ − 1)3 E|B|2q−2
2
AMSE(λ∗,q , q, σw ) =
where µ̃ is any positive number smaller than µ.
µ̃ (δ−1)
2
σw
−
− |o(e δσw2 )|,
1 − 1/δ
The proof can be found in Section 4.3. We observe that the first dominant term in the expansion of
2 /(1 − 1/δ).
AMSE(λ∗,q , q, σw ) is exactly the same for all values of q, including q = 1 and is equal to σw
This is also the same as the AMSE of the OLS. We may consider this term as the ‘phase transition’ term, since
it will go to zero only when δ > 1. In a nutshell, the first term in the expansion provides the phase transition
information. However, we are able to derive the second order term for AMSE(λ∗,q , q, σw ). This term gives us
what is beyond phase transition analysis. The impact of the signal distribution pβ and the regularizer ℓq , that is
omitted in PT diagram, is revealed in the second order term. As a result, to compare the performance of LQLS
with different values of q in the low noise regime, we can compare their second order terms.
First note that all the regularizers that are studied in Theorem 3 improve the performance of OLS. When the
distribution of the coefficients is bounded away from 0, no significant gain is obtained from LASSO since the
second dominant term in the expansion of AMSE is exponentially small. However, the rate of the second order
term exhibits an interesting transition from exponential to a polynomial decay when q increases from 1. In
fact, it seems that bridge regularizers with q > 1 offer more substantial improvements over OLS. Even though
LASSO is suboptimal, it is not clear which value of q provides the best performance here. Among other LQLS
with q ∈ (1, 2], the optimality is determined by the constant involved in the second order term (they all have
the same orders). To simplify our discussions, define
Cq =
(q − 1)2 (E|B|q−2 )2
,
E|B|2q−2
q ∗ = arg max Cq .
1<q≤2
Then LQLS with q = q ∗ will perform the best. To provide some insights on q ∗ , we focus on a special family of
distributions.
Lemma 2. Consider the two-point mixture |B| ∼ α∆µ1 + (1 − α)∆µ2 , where ∆µ denotes the probability
measure putting mass 1 at µ, 0 < µ1 ≤ µ2 , α ∈ (0, 1). Then q ∗ = 2 when µ1 = µ2 , and q ∗ → 1 as
µ2 /µ1 → ∞.
∗
Proof. When µ1 = µ2 , it is clear that Cq = (q − 1)2 µ−2
1 and thus q = 2. We now consider 0 < µ1 < µ2 .
Denote κ = µ2 /µ1 . We can then write Cq as:
Cq =
(q − 1)2 (αµ1q−2 + (1 − α)µ2q−2 )2
αµ12q−2 + (1 − α)µ22q−2
=
(q − 1)2 (α + (1 − α)κq−2 )2
.
µ21 (α + (1 − α)κ2q−2 )
Define q̄ = 1 + log1 κ . We would like to show that for any ǫ > 0, Cq̄ > max1+ǫ≤q≤2 Cq for κ large enough. That
will give us q ∗ ∈ (1, 1 + ǫ) and hence finishes the proof. To show that, note that for any q ∈ [1 + ǫ, 2], κ ≥ 1,
Cq̄
Cq
(α + (1 − α)κq̄−2 )2
(α + (1 − α)κq−2 )2
α + (1 − α)κ2ǫ
≥ α2 ·
α + (1 − α)e2
=
α + (1 − α)κ2q−2 (q̄ − 1)2
·
α + (1 − α)κ2q̄−2 (q − 1)2
α2 (1 − α)
· (q̄ − 1)2 ≥
· κ2ǫ (log κ)−2 → ∞.
α + (1 − α)e2
·
7
Therefore, Cq̄ > max1+ǫ≤q≤2 Cq when κ is sufficiently large.
Lemma 2 implies that ridge (q = 2) regularizer is optimal when the two point mixture components coincide,
and the optimal value of q will shift towards 1 as the ratio of the two points goes off to infinity. Intuitively
speaking, one would expect ridge to penalize large signals more aggressively than q < 2. Hence, in cases the
signal has a large dynamic range, ridge penalizes the large signal values more and is not expected to outperform
other values of q. Note that for the two-point mixture signals, the optimal value of q can be arbitrarily close to
1, however LASSO can never be optimal because its second order term is exponentially small.
Theorem 3 only studied distributions pβ that are bounded away from zero. We next study a more informative
and practical case where the distribution of β has more mass around zero.
Theorem 4. Consider the region δ > 1 and assume E|B|2 < ∞. For any given q ∈ (1, 2), suppose that
P(|B| ≤ t) = O(t2−q+ǫ ) (as t → 0) with ǫ being any positive constant, then as σw → 0
AMSE(λ∗,q , q, σw ) =
2
δ3 (q − 1)2 (E|B|q−2 )2 4
σw
4
−
σw + o(σw
).
1 − 1/δ
(δ − 1)3 E|B|2q−2
For q = 2, as σw → 0
AMSE(λ∗,2 , 2, σw ) =
2
σw
δ3
4
−
σ 4 + o(σw
).
1 − 1/δ (δ − 1)3 E|B|2 w
For q = 1, suppose that P(|B| ≤ t) = Θ(tℓ ) with ℓ > 0, then as σw → 0
2ℓ+2
−|Θ(σw
)|
·
1
log log . . . log
{z
} σw
|
m times
ℓ
. AMSE(λ∗,1 , 1, σw ) −
2
σw
2ℓ+2
. −|Θ(σw
)|,
1 − 1/δ
where m can be any natural number.
The proof is presented in Section 4.4. Before discussing the implications of this result, let us mention a few
points about the conditions that are imposed in this theorem. Note that the condition P(|B| ≤ t) = O(t2−q+ǫ )
for q ∈ (1, 2) is necessary otherwise E|B|q−2 appearing in the second order term will be unbounded. Intuitively
speaking, for every q ∈ (1, 2) even though P(|B| ≤ t) = O(t2−q+ǫ ), the probability density function (pdf) of
|B| can still go to infinity at zero. However, the condition requires that it should not go to infinity too fast. Now,
we would like to explain some of the interesting implications of this theorem.
1. Compared to the results of Theorem 3, we see that the expansion of AMSE(λ∗,q , q, σw ) for q ∈ (1, 2]
in Theorem 4 remains the same for more general B, while the rate of the second order term for LASSO
changes to polynomial from exponential. That means LASSO is more sensitive to the distribution of β
than other LQLS.
2. The second order term of LASSO becomes smaller as ℓ decreases. Note that when ℓ decreases the mass
of the distribution around zero increases. Hence, Theorem 4 implies that LASSO performs better when
the probability mass of the signal concentrates more around zero. This can be well explained by the
sparsity promoting feature of LASSO.
3. As in the case P(|B| > µ) = 1, the first dominant term is the same for all q ∈ [1, 2]. Hence we have
to compare their second order term. For any given q ∈ (1, 2], suppose P(|B| ≤ t) = Θ(t2−q+ǫ ), then
4 , while that of LASSO is Θ(σ 6−2q+2ǫ ) (ignore the
the second term of AMSE(λ∗,q , q, σw ) is of order σw
w
8
logarithmic factor). Since both terms are negative, we can conclude LASSO performs better than LQLS
with that value of q when ǫ ∈ (0, q − 1), and performs worse when ǫ ∈ (q − 1, ∞). This observation has
an important implication. The behavior of the distribution of |B| around zero is the most important factor
in the comparison between LASSO and other LQLS. If the pdf of |B| is zero at zero, then we should not
use LASSO and when it goes to infinity LASSO performs better than LQLS with q > 1 (at least for those
values of q for which our theorem is applicable).
4. Regrading the case where the probability density function of |B| is finite and positive at zero, our calculations of LASSO are not sharp enough to give an accurate comparison between LASSO and other LQLS.
However, the comparison of LQLS for different values of q > 1 will shed more light on the performance
of different regularizers in this case. In the following we consider two of the most popular families of
distributions and present an accurate comparison among q ∈ (1, 2].
Lemma 3. Consider |B| with density function f (b) = ζ(τ, q0 )e−τ b 0 1(0 ≤ b < ∞), where q0 ∈ (0, 2], τ > 0
and ζ(τ, q0 ) is the normalization constant. Then the best bridge estimator is the one that uses q ∗ = max(1, q0 ).
q
Proof. A simple integration by parts yields, for q ∈ (1, 2]
Z ∞
Z ∞
τ q0
τ q0 E|B|q+q0−2
q0
q−2 −τ bq0
q−2
db =
ζ(τ, q0 )b e
E|B|
=
.
ζ(τ, q0 )bq+q0 −2 e−τ b db =
q−1 0
q−1
0
q+q0 −2 )2
Hence Cq = τ 2 q02 (E|B|
E|B|2q−2
. We first consider q0 ∈ [1, 2], then
Cq = τ 2 q02
[E(|B|q−1 · |B|q0 −1 )]2 (a) 2 2
≤ τ q0 E|B|2q0 −2 = Cq0 ,
E|B|2q−2
where (a) is due to Cauchy-Schwarz inequality. So we obtain q ∗ = q0 . Regrading the case q0 ∈ (0, 1), let B ′
be an independent copy of B. Then for any q ∈ [1, 2]
E|B|q+q0 −2 − E|B|q−1 E|B|q0 −1 =
1
E(|B|q−1 − |B ′ |q−1 )(|B|q0 −1 − |B ′ |q0 −1 ) ≤ 0.
2
As a result, we can derive
Cq ≤ τ 2 q02
(E|B|q+q0 −2 )2
≤ τ 2 q02 E(|B|q0 −1 )2 = C1 .
(E|B|q−1 )2
We can then conclude q ∗ = 1 = max(1, q0 ).
Note that Lemma 3 studies a family of distributions whose probability density function exists and is nonzero at zero, but exhbit very different tail behaviors. As confirmed by this lemma, in this case the tail behavior
has an influence on the performance of LQLS. In particular, LQLS with q = q0 ∈ (1, 2] is optimal for distriq
butions with the exponential decay tail e−τ b 0 . Since β̂(λ, q0 ) can be considered as the maximum a posterior
estimate (MAP), our result suggests that MAP offers the best performance in the low noise regime (among the
bridge estimators). This is in general not true. See Zheng et al. (2017) for a counterexample in large noise
cases. It is also interesting to observe that as the tail becomes heavier than that of Laplacian distribution, the
optimal q ∗ approaches 1. Again, this observation is consistent with the fact that ridge often penalizes large
signal values more aggressively than the other estimators. Hence, if the tail of the distribution is light (like
Gaussian distributions), then ridge offers the best performance, otherwise, other values of q offer better results.
In the next lemma, we further support this claim by considering a special family of distributions with light tails.
9
Lemma 4. Consider |B| follows a uniform distribution with density function f (b) =
θ > 0 is the location parameter. Then q ∗ = 2.
1
θ
1(0 ≤ b ≤ θ), where
Proof. It is clear that
q−2
E|B|
1
=
θ
Hence, q ∗ = arg max1<q≤2
Z
θ
b
0
q−2
θ q−2
,
db =
q−1
(q−1)2 (E|B|q−2 )2
E|B|2q−2
2q−2
E|B|
= arg max1<q≤2
1
=
θ
Z
2q−1
θ2
= 2.
θ
b2q−2 db =
0
θ 2q−2
.
2q − 1
3.3 Implications for classical asymptotics
In this section, we would like to show that the results we have derived in the previous sections, has, perhaps
surprisingly, some interesting connections to the classical asymptotic setting in which n → ∞, while p is fixed.
Our analysis so far has been focused on the high-dimensional setting in which n/p → δ ∈ (0, ∞). Furthermore,
we assumed that the noise variance is small. In the classical asymptotics, it is assumed that the signal-to-noise
ratio of each observation is fixed and n/p → ∞. Note that having more measurements is at the intuitive level
equivalent to less noise. Hence, we expect our low-noise sensitivity to have some implications for the classical
asymptotics too. Our goal below is to formalize this connection and explain the implications of our low-noise
analysis framework for the classical asymptotics.
Towards that goal, we will consider the scenarios where the sample size n is much larger than the dimension
p. Analytically, we let δ go to infinity and calculate the expansions for AMSE in terms of large δ (similar to
what we did in Section 3.2 for low noise). In this section, we write AMSE(λ∗,q , q, δ) for AMSE(λ∗,q , q, σw )
to make it clear that the expansion is derived in terms of δ. Before getting to the results, we should clarify an
important issue. Recall the definition of a converging sequence in Definition 1. It is straightforward to confirm
2
that the signal-to-noise ratio of each measurement is SNR ∝ E|B|
2 . Hence if we take δ → ∞, SNR of each
δσw
measurement will go to zero and this is inconsistent with the classical asymptotic setting where the SNR is in
general assumed to be fixed. To fix this inconsistency, we will scale the noise term and consider a scaled linear
model as follows,
w
(7)
y = Xβ + √ ,
δ
where {X, β, w} is the converging sequence specified in Definition 1. With the SNR remained a positive
constant, this model is well aligned with the classical setting. Again for comparison purposes we start with the
ordinary least squares estimate.
Lemma 5. Consider the model (7) and OLS estimate β̂(0, q). Then as δ → ∞,
AMSE(0, q, δ) =
2
σ2
σw
+ w
+ o(δ−2 ).
δ
δ2
Proof. This lemma is a simple application of Lemma 1. Under model (7), Lemma 1 shows that AMSE(0, q, δ) =
2
σw
δ−1 . As δ → ∞, the expansion can be easily verified.
We now discuss the bridge estimators with q ∈ [1, 2].
Theorem 5. Consider the model (7). Suppose that P(|B| > µ) = 1 with µ being a positive constant and
E|B|2 < ∞. Then for q ∈ [1, 2], as δ → ∞,
AMSE(λ∗,q , q, δ) =
2
2
σw
σ 2 E|B|2q−2 − (q − 1)2 (E|B|q−2 )2 σw
+ w
·
+ o(δ−2 ).
δ
δ2
E|B|2q−2
10
The proof can be found in Section 4.5. Since both Theorems 3 and 5 are concerned with signals that are
bounded away from zero, we can compare their results. Again all of the LQLS have the same first dominant
term. However, in the large sample regime, the second order term of LASSO is at the same order as that of
other LQLS. Interestingly, the comparison of the constant in the second order term is consistent with that in
the low noise case. Hence we obtain the same conclusions for two-point mixture distributions. For instance,
bridge with q ∈ (1, 2] outperforms OLS and q = 2 is optimal when all the mass is concentrated at one point.
See Lemma 2 for more information on the comparison of Cq .
We now discuss the implications of Theorem 5 for classical asymptotics. In the classical setting where
n → ∞ and p is fixed, the performance of LQLS has been studied in Knight and Fu (2000). In particular the
√
LQLS estimates were shown to have the regular n convergence. In our setting, we first let n/p → δ and then
δ → ∞. If we apply Theorem 2 in Knight and Fu (2000) to (7), a straightforward calculation for the asymptotic
variance will give us the first dominant term in AMSE(λ∗,q , q, δ). In other words, the classical asymptotic result
for LQLS in Knight and Fu (2000) only provides the “first-order” information regarding mean square error, and
it is the same for all the values of q ∈ [1, 2] under optimal tuning. The virtue of our asymptotic framework is
to offer the second order term that can be used to evaluate and compare LQLS more accurately. Similar results
can be derived when signals have mass around zero, as presented in the next theorem.
Theorem 6. Consider the model introduced in (7) and assume E|B|2 < ∞. For any given q ∈ (1, 2), suppose
that P(|B| ≤ t) = O(t2−q+ǫ ) (as t → 0) with ǫ being any positive constant, then as δ → ∞,
AMSE(λ∗,q , q, δ) =
2
2
σ 2 E|B|2q−2 − (q − 1)2 (E|B|q−2 )2 σw
σw
+ w
·
+ o(δ−2 ),
δ
δ2
E|B|2q−2
for q = 2, as δ → ∞,
AMSE(λ∗,q , q, δ) =
2
2
σ 2 E|B|2 − σw
σw
+ w
·
+ o(δ−2 ),
2
2
δ
δ
E|B|
and for q = 1, suppose P(|B| ≤ t) = Θ(tℓ ) with 0 < ℓ < 1, then as δ → ∞,
√ ℓ
σ2
−|Θ(δ−ℓ−1 )| · log log . . . log( δ) . AMSE(λ∗,q , q, δ) − w . −|Θ(δ−ℓ−1 )|,
|
{z
}
δ
m times
where m can be any natural number.
The proof is presented in Section 4.5. Theorem 6 can be compared with Theorem 4. Again we see that the
expansion for q ∈ (1, 2] remains the same for more general signals, while the second order term of LASSO
becomes order-wise smaller when signals put more mass around zero. For a given q ∈ (1, 2], it is clear that
LASSO outperforms this LQLS when P(|B| ≤ t) = Θ(t2−q+ǫ ) with ǫ ∈ (0, q−1). This implies that even in the
case when n is much larger than p, if the underlying signal has many elements of small values, ℓ1 regularization
will improve the performance, which is characterized by a second order analysis that is not available from
√
q
the n convergence result. Regrading the distributions with tail e−τ b 0 , we see that the comparison among
q ∈ (1, 2] in the low noise regime carries over.
The fact that regularization can improve the performance of the maximum likelihood estimate (i.e., OLS in
the context of linear regression with Gaussian noise), seems to be contradictory with the classical results that
imply MLE is asymptotically optimal under mild regularity conditions. However, note that the optimality of
MLE is concerned with the asymptotic variance (equivalently the first order term) of the estimate. Our results
show that many estimators share that first order term, while their actual performance might be different. Second
dominant terms provide much more accurate information in these cases.
11
4 Proofs of our main results
4.1 Notations and Preliminaries
Throughout the proofs, B will be a random variable having the probability measure pβ that appears in the
definition of the converging sequence, and Z will refer to a standard normal random variable. We will also use
φ(·) to denote the density function of Z and F (b) to represent the cumulative distribution function of |B|. We
further define the following useful notations:
Rq (χ, σ) = E(ηq (B/σ + Z; χ) − B/σ)2 ,
χ∗q (σ) = arg min Rq (χ, σ),
χ≥0
(8)
where B and Z are independent. Recall the proximal operator function ηq (u; χ). Since we will be using
ηq (u; χ) extensively in the later proofs, we present some useful properties of ηq (u; χ) in the next lemma.
Because ηq (u; χ) has explicit forms when q = 1, 2, we focus on the case 1 < q < 2. For notational simplicity
we may use ∂i f (x1 , x2 , . . .) to represent the partial derivative of f with respect to its ith argument.
Lemma 6. For q ∈ (1, 2), the function ηq (u; χ) satisfies the following properties.
(i) −ηq (u; χ) = ηq (−u; χ).
(ii) u = ηq (u; χ) + χq(q − 1)ηq (u; χ)sign(u).
(iii) αηq (u; χ) = ηq (αu; α2−q χ), for α > 0.
(iv)
∂ηq (u;χ)
∂u
=
1
1+χq(q−1)|ηq (u;χ)|q−2
(v)
∂ηq (u;χ)
∂χ
=
−q|ηq (u;χ)|q−1 sign(u)
1+χq(q−1)|ηq (u;χ)|q−2
(vi) The function ∂2 ηq (u; χ) is differentiable with respect to u.
Proof. Please refer to Lemmas 7, 8 and 10 in Weng et al. (2016) for the proofs.
We next write down the Stein’s lemma (Stein, 1981) that we will apply several times in the proofs.
Stein’s lemma. Suppose the function f : R → R is weakly differentiable and E|f ′ (Z)| < ∞, then
E(Zf (Z)) = Ef ′ (Z).
4.2 Proof of Lemma 1
Since δ > 1, β̂(0, q) = (X ′ X)−1 Xy is well defined with probability 1 for sufficiently large n. We first derive
AMSE(λ, 2, σw ) for the Ridge estimate β̂(λ, 2) = (X ′ X + λI)−1 X ′ y, and then obtain the AMSE for OLS by
letting λ → 0. According to Theorem 2.1 in Weng et al. (2016), it is known that for given λ > 0,
2
AMSE(λ, 2, σw ) = δ(σ 2 − σw
),
where σ is the solution to the following equation:
2
σ 2 = σw
+
4χ2 E|B|2 + σ 2
,
δ(1 + 2χ)2
λ=χ−
χ
.
δ(1 + 2χ)
After a few calculations we can obtain
AMSE(λ, 2, σw ) =
2)
δ(4χ2 E|B|2 + σw
,
δ(1 + 2χ)2 − 1
12
(9)
√
1−δ+2λδ+ (δ−1−2λδ)2 +8λδ2
with χ =
. Clearly AMSE(λ, 2, σw ) →
4δ
to derive AMSE for OLS. According to the identity below
2
σw
1−1/δ
as λ → 0. We now utilize that result
(X ′ X + λI)−1 = (X ′ X)−1 − λ (X ′ X)−1 (I + λ(X ′ X)−1 )−1 (X ′ X)−1 ,
{z
}
|
H
we have
2
2
1
σw
1
σw
2
1
kβ̂(0, q) − βk22 −
= kβ̂(λ, 2) − βk22 −
+ kλHX ′ yk22 + hβ̂(λ, 2) − β, λHX ′ yi (10)
p
1 − 1/δ
p
1 − 1/δ p
p
{z
} |
{z
}
|
{z
} |
J2
J1
J3
Let σmin (X) be the smallest non-zero singular values of X. It is not hard to confirm that
kHX ′ Y k2 ≤ kHX ′ Xβk2 + kHX ′ wk2 ≤
a.s.
Since σmin → 1 −
√1
δ
kβk2
kwk2
+
2
2
2 (X) .
λ + σmin (X) (λ + σmin (X))σmin
> 0 Bai and Yin (1993) and β, w belong to the converging sequence defined in 1, we
can conclude that J2 = O(λ2 ), a.s.. Moreover, we obtain from (9) that almost surely
J1 =
2
2)
σw
δ(4χ2 E|B|2 + σw
−
δ(1 + 2χ)2 − 1
1 − 1/δ
The results on J1 , J2 imply that J3 = O(λ), a.s.. Further note that the term on the left hand side of (10) does
not depend on λ. Therefore by letting n → ∞ and then λ → 0 on both sides of (10) finishes the proof.
4.3 Proof of Theorem 3
4.3.1
Roadmap
Since the proof has several long steps, we lay out the roadmap to help readers navigate through the details.
According to Lemma 6 part (iii) and Theorem 1, we know
AMSE(λ∗,q , q, σw ) = σ̄ 2 Rq (χ∗q (σ̄), σ̄),
(11)
where σ̄ is the unique solution of
2
σ̄ 2 = σw
+
σ̄ 2
Rq (χ∗q (σ̄), σ̄).
δ
(12)
Note from the above equation that σ̄ is a function of σw . In the regime σw → 0, we will show σ̄ → 0. This
fact combined with (11) tells us that in order to derive the second-order expansion of AMSE(λ∗,q , q, σw ) as
a function of σw , it is sufficient to characterize the convergence rate of σ̄ as σw → 0 and Rq (χ∗q (σ), σ) as
σ → 0. For that purpose, we will first study the convergence rate of χ∗q (σ) as σ → 0, which will then enables
us to obtain the convergence rate of Rq (χ∗q (σ), σ). We then utilize that result and (12) to derive the rate of σ̄ as
σw → 0. We give the proof for 1 < q ≤ 2 and q = 1 in Sections 4.3.2 and 4.3.3, respectively.
4.3.2
Proof for the case 1 < q ≤ 2
Due to the explicit form of η2 (u; χ) =
thus focus the proof on 1 < q < 2.
u
1+2χ ,
all the results for q = 2 in this section can be easily verified. We
13
Lemma 7. Let χ∗q (σ) be the optimal threshold value as defined in (8). Then χ∗q (σ) → 0 as σ → 0.
Proof. The proof is essentially the same as the one for Lemma 17 in Weng et al. (2016). Hence we do not
repeat the arguments here.
Lemma 8. For q ∈ (1, 2], suppose that P(|B| > µ) = 1 with µ being a positive constant and E|B|2 < ∞.
Then as σ → 0
Rq (Cσ q , σ) = 1 + (C 2 q 2 E|B|2q−2 − 2Cq(q − 1)E|B|q−2 )σ 2 + o(σ 2 ),
where C is any fixed positive constant.
Proof. We aim to derive the convergence rate of Rq (χ, σ) when χ = Cσ q . In this proof, we may write χ
to denote Cσ q for notational simplicity. According to Lemma 6 parts (ii)(iv) and Stein’s lemma, we have the
following formula for Rq (χ, σ):
Rq (χ, σ) − 1 = E(ηq (B/σ + Z; χ) − B/σ − Z)2 + 2EZ(ηq (B/σ + Z; χ) − B/σ − Z)
|ηq (B/σ + Z; χ)|q−2
.
= χ2 q 2 E|ηq (B/σ + Z; χ)|2q−2 −2χq(q − 1)E
{z
}
1 + χq(q − 1)|ηq (B/σ + Z; χ)|q−2
|
{z
}
|
S1
(13)
S2
It is straightforward to confirm the following
χ2 q 2 E|ηq (B/σ + Z; χ)|2q−2
σ→0
σ2
2 2
= C q lim E|ηq (B + σZ; χσ 2−q )|2q−2 = C 2 q 2 E|B|2q−2 .
S1
σ→0 σ 2
lim
=
lim
σ→0
(14)
The last equality is obtained by Dominated Convergence Theorem (DCT). The condition of DCT holds due to
Lemma 6 part (ii). We now focus on analyzing S2 . We obtain
−S2
σ2
|ηq (B/σ + Z; χ)|q−2
1 + χq(q − 1)|ηq (B/σ + Z; χ)|q−2
1
= 2Cσ q−2 q(q − 1)E
|ηq (|B|/σ + Z; χ)|2−q + χq(q − 1)
Z ∞ Z −b/σ+µ/(2σ)
1
= 2Cσ q−2 q(q − 1)
φ(z)dzdF (b)
2−q + χq(q − 1)
µ
−b/σ−µ/(2σ) |ηq (b/σ + z; χ)|
|
{z
}
= 2Cσ q−2 q(q − 1)E
T1
+ 2Cσ q−2 q(q − 1)
|
Z
∞Z
µ
1
φ(z)dzdF (b) .
2−q + χq(q − 1)
R\[−b/σ−µ/(2σ),−b/σ+µ/(2σ)] |ηq (b/σ + z; χ)|
{z
}
T2
We then consider T1 and T2 separately. For T1 , we have
T1 ≤ 2Cσ
≤ 2σ
q−2
−3
q(q − 1)
Z
∞ Z −µ/σ+µ/(2σ)
µ
−µ/σ−µ/(2σ)
µφ(µ/(2σ)) → 0, as σ → 0.
14
1
φ(z)dzdF (b)
χq(q − 1)
(15)
Regarding T2 , DCT enables us to conclude
lim T2 =
lim 2Cσ q−2 q(q − 1)E
1(Z ∈/ [−|B|/σ − µ/(2σ), −|B|/σ + µ/(2σ)])
|ηq (|B|/σ + Z; χ)|2−q + χq(q − 1)
1(Z ∈/ [−|B|/σ − µ/(2σ), −|B|/σ + µ/(2σ)])
= lim 2Cq(q − 1)E
σ→0
|ηq (|B| + σZ; χσ 2−q )|2−q + Cσ 2 q(q − 1)
σ→0
σ→0
= 2Cq(q − 1)E|B|q−2 .
(16)
Note that DCT works here because for small enough σ, Lemma 6 parts (iv)(v) implies
1(Z ∈/ [−|B|/σ − µ/(2σ), −|B|/σ + µ/(2σ)])
|ηq (|B| +
σZ; χσ 2−q )|2−q
+
Cσ 2 q(q
− 1)
≤
1
1
≤
.
2−q
2−q
|ηq (µ/2; χσ )|
|ηq (µ/2; 1)|2−q
Combining (13), (14), (15) and (16) together completes the proof.
Lemma 8 shows that by choosing an appropriate χ for σ small enough, R(χ, σ) is less than 1. This result
will be used to show that χ∗q (σ) cannot converge to zero too fast. We then utilize this fact to derive the exact
convergence rate of χ∗q (σ). This is done in the next lemma.
Lemma 9. Suppose that P(|B| > µ) = 1 with µ being a positive constant and E|B|2 < ∞, then for q ∈ (1, 2]
we have as σ → 0
(q − 1)E|B|q−2 q
σ + o(σ q ),
qE|B|2q−2
(q − 1)2 (E|B|q−2 )2 2
Rq (χ∗q (σ), σ) = 1 −
σ + o(σ 2 ).
E|B|2q−2
χ∗q (σ) =
Proof. Choosing χ =
(q−1)E|B|q−2
qE|B|2q−2
· σ q in Lemma 8, we have
Rq (χ, σ) − 1
(q − 1)2 (E|B|q−2 )2
=
−
< 0.
σ→0
σ2
E|B|2q−2
lim
(17)
That means for sufficiently small σ
Rq (χ∗q (σ), σ) ≤ Rq (χ, σ) < 1 = Rq (0, σ).
Hence we can conclude that χ∗q (σ) > 0 when σ is small enough. Moreover, by a slight change of arguments in
the proof of Lemma 8 summarized below:
1.
2.
3.
4.
the fact χσ 2−q = o(1) used several times in Lemma 8 still holds here
χσ 2−q = o(1) and χ = o(σ q ) are sufficient to have S1 = o(σ 2 )
bounding the term T1 in (15) does not depend on χ
χσ 2−q = o(1) and χ = o(σ q ) are sufficient to obtain T2 = o(1)
we can show
lim
σ→0
Rq (χ, σ) − 1
= 0,
σ2
(18)
for χ = O(exp(−c/σ)) with any fixed positive constant c. This implies that limσ→0 χ∗q (σ) · ec/σ = +∞ for
any c > 0. Otherwise there exists a sequence σn → 0 such that χq (σn )ec/σn = O(1). This result combined
with (17) and (18) contradicts with the fact that χ = χ∗q (σ) is the minimizer of Rq (χ, σ). We will use the two
15
aforementioned properties of χ∗q (σ) we have showed so far in the following proof. For notational simplicity, in
the rest of the proof we may use χ to denote χ∗q (σ) whenever no confusion is caused. Firstly since χ∗q (σ) is a
non-zero finite value, it is a solution of the first order optimality condition
written out as
0
=
(a)
=
(b)
=
∂Rq (χ,σ)
∂χ
= 0, which can be further
E((ηq (B/σ + Z; χ) − B/σ)∂2 ηq (B/σ + Z; χ))
−(ηq (B/σ + Z; χ) − B/σ − Z)q|ηq (B/σ + Z; χ)|q−1 sign(B/σ + Z)
E
1 + χq(q − 1)|ηq (B/σ + Z; χ)|q−2
+E(Z∂2 ηq (B/σ + Z; χ))
q 2 |ηq (B/σ + Z; χ)|2q−2
q(q − 1)|ηq (B/σ + Z; χ)|4−2q
χE
−
E
1 + χq(q − 1)|ηq (B/σ + Z; χ)|q−2
(|ηq (B/σ + Z; χ)|2−q + χq(q − 1))3
|
{z
} |
{z
}
U1
U2
q 2 (q
Z; χ)|2−q
− 1)|ηq (B/σ +
.
−χ E
(|ηq (B/σ + Z; χ)|2−q + χq(q − 1))3
{z
}
|
(19)
U3
We have used Lemma 6 part (v) to derive (a). To obtain (b), we have used the following steps:
1. We used Lemma 6 part (ii) to conclude that
ηq (B/σ + Z; χ) − B/σ − Z = −χq|ηq (B/σ + Z; χ)|q−1 sign(B/σ + Z).
2. We used the expression we derived in Lemma 6 part (v) for ∂2 ηq (B/σ + Z; χ) and then employed Stein’s
lemma to simplify E(Z∂2 ηq (B/σ + Z; χ)). Note that according to Lemma 6 part (vi), ∂2 ηq (B/σ + Z; χ)
is differentiable with respect to its first argument and hence Stein’s lemma can be applied.
We now evaluate the three terms U1 , U2 and U3 individually. Our goal is to show the following:
(i) limσ→0 σ 2q−2 U1 = q 2 E|B|2q−2 .
(ii) limσ→0 σ q−2 U2 = q(q − 1)E|B|q−2 .
(iii) limσ→0 σ 2q−4 U3 = q 2 (q − 1)E|B|2q−4 .
For the term U1 , we can apply Dominated Convergence Theorem (DCT)
q 2 |ηq (B + σZ; χσ 2−q )|2q−2
= q 2 E|B|2q−2 .
σ→0 1 + χσ 2−q q(q − 1)|ηq (B + σZ; χσ 2−q )|q−2
lim σ 2q−2 U1 = E lim
σ→0
We now derive the convergence rate of U2 . We have
Z ∞Z ∞
q(q − 1)|ηq (b/σ + z; χ)|4−2q
U2 =
φ(z)dzdF (b)
2−q + χq(q − 1))3
µ
−∞ (|ηq (b/σ + z; χ)|
Z ∞ Z −b+ µ
σ
2σ
q(q − 1)|ηq (b/σ + z; χ)|4−2q
φ(z)dzdF (b)
=
µ
(|ηq (b/σ + z; χ)|2−q + χq(q − 1))3
− σb − 2σ
µ
|
{z
}
U21
+
Z
∞Z
µ
|
µ
µ
,− σb + 2σ
]
z ∈[−
/ σb − 2σ
q(q − 1)|ηq (b/σ + z; χ)|4−2q
φ(z)dzdF (b) .
(|ηq (b/σ + z; χ)|2−q + χq(q − 1))3
{z
}
U22
16
(20)
First note that
σ
q−2
≤
U21 ≤ σ
q−2
Z
µ
∞ Z − σb + 2σ
µ
− σb − 2σ
µ
q(q − 1)(µ/(2σ))4−2q
φ(z)dzdF (b)
(χq(q − 1))3
µ5−2q φ(µ/(2σ))
→ 0, as σ → 0,
− 1)2
σ 7−3q 24−2q χ3 q 2 (q
(21)
where the last step is due to the fact that limσ→0 χec/σ = +∞. To evaluate U22 we first derive the following
bounds for small enough σ
µ
µ
1(z ∈/ [− σb − 2σ
, − σb + 2σ
]) · q(q − 1)|ηq (b + σz; χσ 2−q )|4−2q
(|ηq (b + σz; χσ 2−q )|2−q + χσ 2−q q(q − 1))3
q(q − 1)
q(q − 1)
≤
≤
.
2−q
2−q
|ηq (µ/2; χσ )|
|ηq (µ/2; 1)|2−q
Hence we are able to apply DCT to obtain
lim σ q−2 U22 = q(q − 1)E|B|q−2 .
σ→0
(22)
Combining (20), (21), and (22) proves the result (ii). We can use similar arguments to show result (iii). Finally,
we utilize the convergence results for U1 , U2 , U3 and Equation (19) to derive
χ
limσ→0 σ q−2 U2
(q − 1)E|B|q−2
=
lim
=
.
σ→0 σ q
σ→0 limσ→0 σ 2q−2 U2 − limσ→0 σ 2q−2 U3
qE|B|2q−2
lim
Now since we know the exact convergence order of χ∗q (σ), (17) shows the exact order of Rq (χ∗q (σ), σ).
We are in position to derive the second-order expansion of AMSE(λ∗,q , q, σw ) as σw → 0 for q ∈ (1, 2].
2) ≤
According to Equation (12) and the fact that χ = χ∗q (σ̄) minimizes Rq (χ, χ∗q (σ̄)), it is clear that δ(σ̄ 2 − σw
2
2
σ̄ Rq (0, σ̄) = σ̄ , which combined with the condition δ > 1 implies σ̄ → 0 as σw → 0. This result further
enables us to conclude from (12):
δ
σ̄ 2
,
=
2
σw →0 σw
δ−1
lim
(23)
where we have used Rq (χ∗q (σ̄), σ̄) → 1 from Lemma 9. We finally utilize Lemma 9, Equations (11), (12) and
(23) to derive the expansion of AMSE(λ∗,q , q, σw ) in the following way:
2
δ
1
σw
−4
σ̄ 2 Rq (χ∗q (σ̄), σ̄) −
= σw
(σ̄ 2 − σ̄ 2 Rq (χ∗q (σ̄), σ̄))
1 − 1/δ
δ−1
δ
∗
4
3
2
q−2
2
δ
σ̄ Rq (χq (σ̄), σ̄) − 1
−δ (q − 1) (E|B| )
=
· 4 ·
→
.
2
δ − 1 σw
σ̄
(δ − 1)3 E|B|2q−2
−4
AMSE(λ∗,q , q, σw ) −
σw
This completes the proof of Theorem 3 for q ∈ (1, 2].
4.3.3
Proof for the case q = 1
Lemma 10. Suppose that P(|B| > µ) = 1 with µ being a positive constant and E|B|2 < ∞, then for q = 1 as
σ→0
χ∗q (σ) = O(φ(µ/σ)),
Rq (χ∗q (σ), σ) − 1 = O(φ2 (µ/σ)).
17
Proof. We first claim that χ∗q (σ) → 0 as σ → 0. Otherwise, there exists a sequence σn → 0 such that
χ∗q (σn ) → C > 0 as n → ∞. And the limit C is finite. Suppose this is not true, then since η1 (u; χ) =
sign(u)(|u| − χ)+ we can apply Fatou’s lemma to conclude
lim inf Rq (χ∗q (σn ), σn ) ≥ E lim inf (η1 (B/σn + Z; χ∗q (σn )) − B/σn )2 = +∞,
n→∞
n→∞
contradicting with the fact
Rq (χ∗q (σn ), σn )
≤ Rq (0, σn ) = 1. We now calculate the following limit:
lim Rq (χ∗q (σn ), σn ) = lim E(η1 (B/σn + Z; χ∗q (σn )) − B/σn − Z)2
n→∞
n→∞
+2 lim EZ(η1 (B/σn + Z; χ∗q (σn )) − B/σn − Z) + 1 = C 2 + 1.
n→∞
The last step is due to Dominated Convergence Theorem (DCT). The condition of DCT can be verified based on
the fact |u − η1 (u; χ)| ≤ χ. We can also choose a positive constant C̃ smaller than C and use similar argument
to obtain limn→∞ Rq (C̃, σn ) = C̃ 2 + 1. That means Rq (C̃, σn ) < Rq (χ∗q (σn ), σn ) when n is large enough.
This is contradicting with the fact χ = χ∗q (σn ) minimizes Rq (χ, σn ).
We next derive the following bounds:
Rq (χ, σ) − 1
=
(a)
=
(b)
≤
E(η1 (B/σ + Z; χ) − B/σ − Z)2 + 2E(Z(η1 (B/σ + Z; χ) − B/σ − Z))
E(η1 (B/σ + Z; χ) − B/σ − Z)2 + 2E(∂1 η1 (B/σ + Z; χ) − 1)
Z −B/σ+χ
(c)
2
φ(z)dz = χ2 − 4χEφ(−B/σ + αχ).
χ − 2E
−B/σ−χ
To obtain (a) we used Stein’s lemma; note that η1 (u; χ) is a weakly differentiable function of u. Inequality (b)
holds since |η1 (u; χ) − u| ≤ χ. Equality (c) is the result of the mean value theorem and hence |α| ≤ 1 is depen√
dent on B. From the above inequality, it is straightforward to verify that if we choose χ = 3e−1 Eφ( 2B/σ),
then
Rq (χ∗q (σ), σ) ≤ Rq (χ, σ) < 1 = Rq (0, σ),
(24)
for small enough σ. This means the optimal threshold χ∗q (σ) is a non-zero finite value. Hence it is a solution to
∂Rq (χ∗q (σ),σ)
∂χ
= 0, which further implies (from now on we use χ∗ to represent χ∗q (σ) for simplicity):
χ∗ =
2Eφ(χ∗ − |B|/σ)
2φ(χ∗ − µ/σ)
Eφ(χ∗ − B/σ) + Eφ(χ∗ + B/σ)
≤
≤
,
E1(|Z + B/σ| ≥ χ∗ )
E1(|Z + B/σ| ≥ χ∗ )
E1(|Z + B/σ| ≥ χ∗ )
(25)
where the last inequality holds for small values of σ due to the condition P(|B| > µ) = 1. Since E1(|Z +
√
∗ 2
B/σ| ≥ χ∗ ) → 1, as σ → 0 and φ(χ∗ − µ/σ) ≤ φ(µ/( 2σ))e(χ ) /2 , from (25) we can first conclude
χ∗ = o(σ), which in turn (use (25) again) implies χ∗ = O(φ(µ/σ)).
We now turn to analyzing Rq (χ∗ , σ):
Rq (χ∗ , σ) − 1
=
≥
(d)
≥
E(η1 (B/σ + Z; χ∗ ) − B/σ − Z)2 + 2E(∂1 η1 (B/σ + Z; χ∗ ) − 1)
Z −µ/σ+χ∗
∗
−2E1(|B/σ + Z| ≤ χ ) ≥ −2
φ(z)dz ≥ −4χ∗ φ(µ/σ − χ∗ )
−µ/σ−χ∗
−8φ2 (χ∗ − µ/σ) (e)
∼ −8φ2 (µ/σ),
E1(|Z + B/σ| ≥ χ∗ )
where (d) is due to (25) and (e) holds because E1(|Z + B/σ| ≥ χ∗ ) → 1 and χ∗ = o(σ). This result combined
with Rq (χ∗ , σ) − 1 < 0 from (24) finishes the proof.
18
We are in position to derive the expansion of AMSE(λ∗,1 , 1, σw ). Similarly as in the proof for q ∈ (1, 2],
we can use Lemma 10 to derive (23) for q = 1. Then we apply Lemma 10 again to obtain
δ
δ
σ 2 = σ̄ 2 Rq (χ∗q (σ̄), σ̄) −
(σ̄ 2 − σ̄ 2 Rq (σq∗ (σ̄), σ̄)/δ)
δ−1 w
δ−1
δσ̄ 2 (Rq (χ∗q (σ̄), σ̄) − 1)
2
= o(exp(−µ̄2 /σ̄ 2 )) = o(exp(−µ̃2 (δ − 1)/(δσw
))),
=
δ−1
AMSE(λ∗,1 , 1, σw ) −
where 0 < µ̃ < µ̄ < µ. This closes the proof.
4.4 Proof of Theorem 4
Similar to the proof of Theorem 3, we consider two cases, i.e. 1 < q ≤ 2 and q = 1, and prove them separately.
We will follow closely the roadmap illustrated in Section 4.3.1.
4.4.1
Proof for the case 1 < q < 2
Again all the results in this section can be proved easily for q = 2. We will only consider 1 < q < 2. Before
we start the proof of our main result, we mention a simple lemma that will be used multiple times in our proof.
Lemma 11. Let T (σ) and χ(σ) be two nonnegative sequences with the property: χ(σ)T q−2 (σ) → 0, as
σ → 0. Then,
ηq (T (σ), χ(σ))
= 1.
lim
σ→0
T (σ)
Proof. The proof is a simple application of scale invariance property of ηq , i.e, Lemma 6 part (iii). We have
ηq (T (σ), χ(σ))
= lim ηq (1; χ(σ)T q−2 (σ)) = 1,
σ→0
σ→0
T (σ)
lim
where the last step is the result of Lemma 6 part (ii).
Our first goal is to show that when χ = Cσ q , then limσ→0 R(χ,σ)−1
is a negative constant by choosing an
σ2
appropriate C. However, since this proof is long, we break it to several steps. These steps are summarized in
Lemmas 12, 13, and 14. Then in Lemma 15 we employ these three results to show that if χ = Cσ q , then
R(χ, σ) − 1
= C 2 q 2 E|B|2q−2 − 2Cq(q − 1)E|B|q−2 .
σ→0
σ2
lim
Lemma 12. For any given q ∈ (1, 2), suppose that P(|B| < t) = O(t2−q+ǫ ) (as t → 0) with ǫ being any
positive constant, E|B|2 < ∞ and χ = Cσ q , where C > 0 is a fixed number. Then we have
σ q−2
Z
0
∞Z
−b
+α
σ
−b
−α
σ
1
φ(z)dzdF (b) → 0,
|ηq (b/σ + z; χ)|2−q + χq(q − 1)
as σ → 0. Note that α is an arbitrary positive constant.
Proof. The main idea of the proof is to break this integral into several pieces and prove that each piece converges
to zero. Throughout the proof, we will choose ǫ small enough to be in (0, q − 1). Based on the value of q, we
consider the following intervals. First find the unique non-negative integer of m∗ such that
1
1
q ∈ [2 − (ǫ/(ǫ + q − 1)) m∗ +1 , 2 − (ǫ/(ǫ + q − 1)) m∗ ).
19
n (l) = lm + lm+1 + · · · + ln (m ≤ n). Now we define the following intervals:
Denote Sm
#
"
b
σ q−ǫ
σ q−ǫ
b
,
,− +
I−1 = − −
σ log( σ1 ) σ log( σ1 )
"
ǫ+q−1
ǫ+q−1
ǫ
ǫ #
(2−q)i − q−1
(2−q)i − q−1
b
b
σ q−1
σ q−1
Ii = − −
,− +
, 0 ≤ i ≤ m∗ ,
σ (log(1/σ))S0i (2−q) σ (log(1/σ))S0i (2−q)
#
"
1
1
b
b
,
,− +
Im∗ +1 = − −
∗
∗
σ (log(1/σ))S0m +1 (2−q) σ (log(1/σ))S0m +1 (2−q)
−b
b
Im∗ +2 =
− α, − + α .
σ
σ
(26)
We see that for small enough σ, these intervals are nested: I−1 ⊂ I0 ⊂ I1 ⊂ . . . ⊂ Im∗ +2 . Further define
Z ∞Z
1
q−2
φ(z)dzdF (b),
P−1 = σ
2−q + χq(q − 1)
0
I−1 |ηq (b/σ + z; χ)|
Z ∞Z
1
φ(z)dzdF (b), 0 ≤ i ≤ m∗ + 2.
Pi = σ q−2
2−q + χq(q − 1)
|η
(b/σ
+
z;
χ)|
q
0
Ii \Ii−1
Using these notations we have
σ
q−2
Z
0
∞Z
−b
+α
σ
−b
−α
σ
∗
m
+2
X
1
Pi .
φ(z)dzdF
(b)
=
|ηq (b/σ + z; χ)|2−q + χq(q − 1)
(27)
i=−1
Our goal is to show that Pi → 0 as σ → 0. Since these intervals have different forms, we consider five different
cases (i) i = −1, (ii) i = 0, (iii) 1 ≤ i ≤ m∗ , (iv) i = m∗ + 1, and (v) i = m∗ + 2 and for each case we show
that Pi → 0. Let |I| denote the Lebesgue measure of an interval I. For the first term, we have for a positive
constant C̃−1 ,
Z C̃−1 σ√log(1/σ) Z
Z ∞Z
1
1
q−2
q−2
φ(z)dzdF (b) ≤ σ
φ(z)dzdF (b)
P−1 ≤ σ
χq(q
−
1)
χq(q
− 1)
0
I−1
0
I−1
Z ∞
Z
1
q−2
+σ
φ(z)dzdF (b)
√
C̃−1 σ log(1/σ) I−1 χq(q − 1)
p
p
σq−ǫ
q−2
σ q−2 φ(0)|I−1 |P(|B| ≤ C̃−1 σ log(1/σ)) σ φ(C̃−1 log(1/σ) − log(1/σ) )|I−1 |
+
≤
χq(q − 1)
χq(q − 1)
p
p
σ q−ǫ−2 φ( C̃2−1 log(1/σ))
σ q−ǫ−2 P(|B| ≤ C̃−1 σ log(1/σ))
≤ O(1)
+ O(1)
log(1/σ)
log(1/σ)
2
≤ O(1)(log(1/σ))
−q+ǫ
2
σ q−ǫ−2+C̃−1 /8
+ O(1)
→ 0,
log(1/σ)
(28)
where we have used the condition P(|B| < t) = O(t2−q+ǫ ) to obtain the last inequality and the last statement
20
holds by choosing C̃−1 large enough. We next analyze the term P0 . For a constant C̃0 > 0 we have
Z ∞Z
1
q−2
φ(z)dzdF (b)
P0 ≤ σ
|η
(b/σ
+
z; χ)|2−q
q
0
I0 \I−1
Z C̃0 σ√log(1/σ) Z
1
q−2
φ(z)dzdF (b)
= σ
|η
(b/σ
+
z; χ)|2−q
q
0
I0 \I−1
Z ∞
Z
1
φ(z)dzdF (b)
+σ q−2
√
2−q
C̃0 σ log(1/σ) I0 \I−1 |ηq (b/σ + z; χ)|
p
p
σ
q−2 φ C̃
q−2
σ
log(1/σ)
−
0
σ φ(0)|I0 |P(|B| < C̃0 σ log(1/σ))
log(1/σ) |I0 |
≤
+
.
q−ǫ
q−ǫ
2−q
2−q
σ
σ
;
χ
;
χ
ηq
η
q
log(1/σ)
log(1/σ)
We have used the fact that |b/σ + z| ≥
since
σq−ǫ
( log(1/σ)
)q−2 χ
∝
σq−ǫ
log(1/σ)
(29)
for z ∈
/ I−1 in the last step. Note that according to Lemma 11,
2
σ q −(1+ǫ)q+2ǫ (log(1/σ))2−q
→ 0, we obtain
σq−ǫ
log(1/σ)
lim
q−ǫ
σ→0 ηq ( σ
log(1/σ) ; χ)
= 1.
With the above result, it is clear that the second term of the upper bound in (29) vanishes if choosing sufficiently
large C̃0 . Regarding the first term we know
p
ǫ+4−3q
σ q−2 |I0 |P(|B| < C̃0 σ log(1/σ))
q 2 −(ǫ+2)q+3ǫ+1
2
= o(1).
∝
σ
(log(1/σ))
q−ǫ
2−q
σ
;
χ
ηq
log(1/σ)
Now we consider an arbitrary 1 ≤ i ≤ m∗ and show that Pi → 0. Similarly as bounding P0 we can have
Z C̃i σ√log(1/σ) Z
1
Pi ≤ σ q−2
φ(z)dzdF (b)
2−q
0
Ii \Ii−1 |ηq (b/σ + z; χ)|
Z ∞
Z
1
q−2
+σ
φ(z)dzdF (b)
√
2−q
C̃i σ log(1/σ) Ii \Ii−1 |ηq (b/σ + z; χ)|
ǫ+q−1
p
ǫ
(2−q)i − q−1
σ q−1
q−2 φ C̃
p
|Ii |
log(1/σ)
−
σ
i
i
σ q−2 φ(0)|Ii |P(|B| < C̃i σ log(1/σ))
(log(1/σ))S0 (2−q)
ǫ+q−1
ǫ+q−1
+
.
(30)
≤
i−1 − ǫ
i−1 − ǫ
q−1 (2−q)
q−1
q−1
2−q σ q−1 (2−q)
ηq2−q σ
η
;
χ
;
χ
q
S i−1 (2−q)
S i−1 (2−q)
(log(1/σ))
(log(1/σ))
0
0
We then use Lemma 11 to conclude for i ≥ 1
σ
lim
σ→0
ηq2−q
ǫ+q−1
i ǫ(2−q)
q−1 (2−q) − q−1
i
(log(1/σ))S1 (2−q)
ǫ+q−1
i−1 − ǫ
q−1 (2−q)
q−1
i−1
(log(1/σ))S0 (2−q)
σ
;χ
= 1.
(31)
The condition of Lemma 11 can be verified in the following:
(σ
ǫ+q−1
ǫ
(2−q)i−1 − q−1
q−1
i−1
(log(1/σ))−S0
(2−q) q−2
)
χ ∝ σ−
ǫ+q−1
(2−q)i + 2−q
ǫ+q
q−1
q−1
i
(log(1/σ))S1 (2−q) = o(1),
2−q
ǫ+q−1
2−q
i
where the last step is due to the fact that − ǫ+q−1
q−1 (2−q) + q−1 ǫ+q ≥ − q−1 (2−q)+ q−1 ǫ+q = 2q −2 > 0.
Using the result (31), it is straightforward to confirm that if C̃i is chosen large enough, the second term in (30)
21
goes to zero. For the first term,
p
σ q−2 φ(0)|Ii |P(|B| < C̃i σ log(1/σ))
ǫ+q−1
lim
i−1 − ǫ
σ→0
q−1
2−q σ q−1 (2−q)
ηq
;χ
S i−1 (2−q)
(log(1/σ))
(a)
=
σ
O(1) · lim
0
ǫ+q−1
ǫ
(2−q)i − q−1
q−2 σ q−1
i
(log(1/σ))S0 (2−q)
σ 2−q+ǫ (log(1/σ))
= O(1) · lim (log(1/σ))
ǫ(2−q)
ǫ+q−1
(2−q)i − q−1
σ q−1
i
(log(1/σ))S1 (2−q)
σ→0
2−q+ǫ
2
−q+ǫ
2
σ→0
= 0,
P ∗
where we have used (31) to obtain (a). So far we have showed limσ→0 m
i=−1 Pi = 0. Our next step is to
prove that Pm∗ +1 → 0.
Z C̃m∗ +1 σ√log(1/σ) Z
φ(z)
dzdF (b)
Pm∗ +1 ≤ σ q−2
2−q
0
Im∗ +1 \Im∗ |ηq (b/σ + z; χ)|
Z ∞
Z
φ(z)
q−2
+σ
dzdF (b)
√
2−q
C̃m∗ +1 σ log(1/σ) Im∗ +1 \Im∗ |ηq (b/σ + z; χ)|
p
σ q−2 φ(0)|Im∗ +1 |P(|B| < C̃m∗ +1 σ log(1/σ))
ǫ+q−1
≤
ǫ
m∗
2−q σ q−1 (2−q) − q−1
ηq
;χ
m∗
(log(1/σ))S0 (2−q)
p
1
q−2
∗
|Im∗ +1 |
σ φ C̃m +1 log(1/σ) −
m∗ +1 (2−q)
log(1/σ)S0
ǫ+q−1
.
(32)
+
ǫ
m∗
2−q σ q−1 (2−q) − q−1
;χ
ηq
∗
S m (2−q)
(log(1/σ))
0
Again based on (31) It is clear that if C̃m∗ +1 is large enough, then the second term in (32) goes to zero. We
now show the first term goes to zero as well:
p
σ q−2 φ(0)|Im∗ +1 |P(|B| < C̃m∗ +1 σ log(1/σ))
ǫ+q−1
lim
ǫ
m∗
σ→0
2−q σ q−1 (2−q) − q−1
;χ
ηq
∗
S m (2−q)
(log(1/σ))
σ q−2
(b)
= O(1) · lim
1
0
m∗ +1 (2−q)
log(1/σ)S0
σ→0
σ
= O(1) · lim σ
σ 2−q+ǫ (log(1/σ))
2−q+ǫ
2
ǫ+q−1
m∗ +1 − ǫ(2−q)
q−1 (2−q)
q−1
m∗ +1 (2−q)
(log(1/σ))S1
∗
ǫ−(ǫ+q−1)(2−q)m +1
q−1
σ→0
(log(1/σ))
−q+ǫ
2
(c)
= 0,
∗ +1
where (b) holds from Lemma 11 and (c) is due to the condition we imposed on m∗ that ensures (2 − q)m
ǫ
∗
∗
ǫ+q−1 . The last remaining term of (27) is Pm +2 . To prove Pm +2 → 0, we have
P
m∗ +2
≤ σ
q−2
Z
C̃m∗ +2 σ
√
log(1/σ)
0
+σ q−2
Z
∞
C̃m∗ +2 σ
√
Z
log(1/σ)
I
∗ +2 \Im∗ +1
Zm
Im∗ +2 \Im∗ +1
22
1
φ(z)dzdF (b)
|ηq (b/σ + z; χ)|2−q
1
φ(z)dzdF (b).
|ηq (b/σ + z; χ)|2−q
≤
By using the same strategy as we did for bounding Pi (0 ≤ i ≤ m∗ + 1), the second integral above will go to
zero as σ → 0, when C̃m∗ +2 is chosen large enough. And the first integral can be bounded by
p
m∗ +2
σ q−2 φ(0)2αP(|B| ≤ C̃m∗ +2 σ log(1/σ)) (d)
(2−q)
= O(1)σ ǫ log(1/σ)(2−q+ǫ)/2+S1
→ 0,
2−q
1
ηq
;χ
∗
S m +1 (2−q)
log(1/σ)
0
where (d) holds by Lemma 11 and the condition of Lemma 11 can be easily checked. This completes the
proof.
Define
α
b
α
b
I , − − 1−γ , − + 1−γ .
σ σ
σ σ
γ
In Lemma 12 we proved that:
Z ∞Z
σ q−2
0
−b
+α
σ
−b
−α
σ
(33)
1
φ(z)dzdF (b) → 0.
|ηq (b/σ + z; χ)|2−q + χq(q − 1)
In the next lemma, we would like to extend this result and show that in fact,
Z ∞Z
1
q−2
φ(z)dzdF (b) → 0.
σ
2−q + χq(q − 1)
|η
(b/σ
+
z;
χ)|
γ
q
0
I
Lemma 13. For any given q ∈ (1, 2), suppose the conditions in Lemma 12 hold. Then for any fixed 0 < γ < 1,
Z ∞Z
1
q−2
σ
φ(z)dzdF (b) → 0,
2−q + χq(q − 1)
|η
(b/σ
+
z;
χ)|
γ
q
0
I \Im∗ +2
as σ → 0. Note that Im∗ +2 is defined in (26).
Proof. As in the proof of Lemma 12, we break the integral into smaller subintervals and prove each one goes
to zero. Consider the following intervals:
b
b
α
α
Ji = − −
,− +
,
ǫ
ǫ
S0i (1−ǫ)
S0i (1−ǫ)
σ σ 1+θ
σ σ 1+θ
where θ > 0 is an arbitrarily small number and i is an arbitrary natural number. Note that {Ji } is a sequence
of nested intervals and Im∗ +2 ⊂ J0 . Our goal is to show that the following integrals go to zero as σ → 0:
Z ∞Z
1
Q−1 , σ q−2
φ(z)dzdF (b) → 0,
2−q + χq(q − 1)
0
J0 \Im∗ +2 |ηq (b/σ + z; χ)|
Z ∞Z
1
φ(z)dzdF (b) → 0, i ≥ 0.
Qi , σ q−2
2−q + χq(q − 1)
0
Ji+1 \Ji |ηq (b/σ + z; χ)|
Define σ̃i ,
ǫ
1 1+θ S0i (1−ǫ)
.
ασ
Q−1
Since |b/σ + z| ≥ α for z ∈
/ Im∗ +2 we obtain
Z ∞Z
1
≤ σ q−2
φ(z)dzdF (b)
2−q
0
J0 \Im∗ +2 |ηq (α; χ)|
Z σ log(1/σ) Z
σ̃0
1
φ(z)dzdF (b)
= σ q−2
2−q
0
J0 \Im∗ +2 |ηq (α; χ)|
Z ∞
Z
1
q−2
+σ
φ(z)dzdF (b)
2−q
σ
log(1/σ) J0 \Im∗ +2 |ηq (α; χ)|
σ̃0
≤ σ
q−2
Z
σ
σ̃0
0
log(1/σ)
− σ̃10 )|J0 |
φ( log(1/σ)
1
σ̃0
q−2
dF
(b)
+
σ
.
|ηq (α; χ)|2−q
|ηq (α; χ)|2−q
23
It is straightforward to notice that the second term above converges to zero. For the first term, by the condition
P(|B| < t) = O(t2−q+ǫ ) we derive the following bounds
σ
q−2
Z
σ
σ̃0
log(1/σ)
0
= O(1)σ
1
dF (b) ≤ O(1)σ q−2 (σσ̃0−1 log(1/σ))2−q+ǫ
|ηq (α; χ)|2−q
ǫ(q−1−ǫ+θ)
1+θ
(log(1/σ))2−q+ǫ → 0.
Now we discuss the term Qi for i ≥ 0. Similarly as we bounded Q−1 we have
Qi ≤ σ
q−2
Z
σ
σ̃i+1
log(1/σ)
0
+σ
q−2
Z
∞
σ
σ̃i+1
Z
log(1/σ)
1
φ(z)dzdF (b)
1
2−q
Ji+1 \Ji |ηq ( σ̃i ; χ)|
Z
1
φ(z)dzdF (b).
1
2−q
Ji+1 \Ji |ηq ( σ̃i ; χ)|
(34)
The second integral in (34) can be easily shown convergent to zero as σ → 0. We now focus on the first integral.
σ q−2
≤
≤
Z
σ
σ̃i+1
log(1/σ)
0
σ q−2
Z
Ji+1 \Ji
1
φ(z)dzdF (b)
|ηq ( σ̃1i ; χ)|2−q
σ
log(1/σ)
P |B| ≤
σ̃i+1
|ηq ( σ̃1i ; χ)|2−q
σ ǫ (log(1/σ))2−q+ǫ σ̃i2−q
σ ǫ (log(1/σ))2−q+ǫ (a)
O(1)
2−q+ǫ = O(1)
2−q+ǫ
|ηq ( σ̃1i ; χ)|2−q σ̃i+1
σ̃i+1
= O(1)σ
ǫ(θ+(q−1−ǫ)(1−ǫ)i+1 )
1+θ
(log(1/σ))2−q+ǫ = o(1).
We have used Lemma 11 to obtain (a). Above all we have showed that for any given natural number i ≥ 0,
Z ∞Z
1
q−2
φ(z)dzdF (b) = 0.
lim σ
2−q + χq(q − 1)
σ→0
0
Ji \Im∗ +2 |ηq (b/σ + z; χ)|
ǫ
Now note that as i goes to infinity, the exponent of σ in the interval Ji goes to 1+θ
(1+(1−ǫ)+(1−ǫ)2 +. . .) =
1
γ
1+θ . So, by choosing small enough θ and sufficiently large i we can make I ⊂ Ji , hence completing the
proof.
In the last two lemmas, we have been able to prove that for χ = Cσ q ,
Z ∞Z
1
q−2
σ
φ(z)dzdF (b) → 0.
2−q + χq(q − 1)
0
I γ |ηq (b/σ + z; χ)|
This result will be used to characterize the following limit
Z ∞Z
1
q−2
lim σ
φ(z)dzdF (b).
2−q + χq(q − 1)
σ→0
|η
(b/σ
+
z;
χ)|
0
R q
Before that we mention a simple lemma that will be applied several times in our proofs.
Lemma 14. For 1 < q < 2 we have
|ηq
2
1
≤
.
2−q
+ χq(q − 1)
|u| (q − 1)
(u; χ)|2−q
24
Proof. It is sufficient to consider u > 0. We analyze two different cases:
1
1. χ ≤ u2−q 2q
: According to Lemma 6 part (ii), since we know ηq (u; χ) ≤ u, we have
ηq (u; χ) = u − χqηqq−1 (u; χ) ≥ u − χquq−1 ≥ u − u2−q
Hence,
1 q−1 u
qα
= .
2q
2
1
22−q
2
1
≤
≤
≤
.
2−q
2−q
2−q
|ηq (u; χ)|
+ χq(q − 1)
|ηq (u; χ)|
u
(q − 1)u2−q
1
2. χ ≥ u2−q 2q
:
1
2
1
≤
≤
.
|ηq (u; χ)|2−q + χq(q − 1)
χq(q − 1)
(q − 1)u2−q
This completes our proof.
Now we can consider one of the main results of this section.
Lemma 15. For any given q ∈ (1, 2), suppose the conditions in Lemma 12 hold. Then for χ = Cσ q we have
lim
σ→0
Rq (χ, σ) − 1
= C 2 q 2 E|B|2q−2 − 2Cq(q − 1)E|B|q−2 .
σ2
Proof. We follow the same roadmap as in the proof of Lemma 8. Recall that
|ηq (B/σ + Z; χ)|q−2
.
Rq (χ, σ) − 1 = χ2 q 2 E|ηq (B/σ + Z; χ)|2q−2 −2χq(q − 1)E
{z
}
1 + χq(q − 1)|ηq (B/σ + Z; χ)|q−2
|
{z
}
|
S1
(35)
S2
The first term S1 can be calculated in the same way as in the proof of Lemma 8.
lim σ −2 S1 = C 2 q 2 E|B|2q−2 .
(36)
σ→0
We now focus on analyzing S2 . First note that restricting |B| to be bounded away from 0 makes it possible to
follow the same arguments used in the proof of Lemma 8 to obtain,
lim E
σ→0
1(|B| > 1)
= E|B|q−2 1(|B| > 1).
|ηq (|B| + σZ; Cσ 2 )|2−q + Cσ 2 q(q − 1)
(37)
Hence we next consider the event |B| ≤ 1.
1(|B| ≤ 1)
E
|ηq (|B| + σZ; Cσ 2 )|2−q + Cσ 2 q(q − 1)
1 Z −b/σ+bc /(2σ)
1
φ(z)dzdF (b)
=
2
2−q
+ Cσ 2 q(q − 1)
0
−b/σ−bc /(2σ) |ηq (b + σz; Cσ )|
|
{z
}
Z
T1
+
Z
0
|
1Z
1
R\[−b/σ−bc /(2σ),−b/σ+bc /(2σ)]
σz; Cσ 2 )|2−q
|ηq (b +
{z
T2
25
+ Cσ 2 q(q − 1)
φ(z)dzdF (b),
}
where c > 1 is a constant that we will specify later. We first analyze T2 . Note that,
T2 = E
1(|B + σZ| ≥ |B|c /2, |B| ≤ 1)
|ηq (B + σZ; Cσ 2 )|2−q + Cσ 2 q(q − 1)
,
and
1(|B + σZ| ≥ |B|c /2, |B| ≤ 1)
|ηq (B +
σZ; Cσ 2 )|2−q
+
Cσ 2 q(q
− 1)
(a)
≤
|B|c(q−2)
21(|B + σZ| ≥ |B|c /2)
,
≤ q−3
2−q
(q − 1)|B + σZ|
2 (q − 1)
where (a) is due to Lemma 14. For any 1 < q < 2, it is straightforward to verify that E|B|c(q−2) < ∞ if c is
chosen close enough to 1. We can then apply Dominated Convergence Theorem (DCT) to obtain
lim T2 = E1(|B| ≥ |B|c /2, |B| ≤ 1)|B|q−2 = E|B|q−2 1(|B| ≤ 1).
(38)
σ→0
We now turn to bounding T1 . According to Lemmas 12 and 13, we know
Z ∞Z
1
φ(z)dzdF (b) → 0,
σ q−2
2−q + χq(q − 1)
|η
(b/σ
+
z;
χ)|
γ
q
0
I
c
c
c
c
α
α
b
b
b
b
, − σb + σ1−γ
]. Define Icγ = [− σb − σ1−γ
, − σb + σ1−γ
] and Ĩ c = [− σb − 2σ
, − σb + 2σ
].
where I γ = [− σb − σ1−γ
γ
γ
For 0 ≤ b ≤ 1, we get Ic ⊆ I for any given α > 1. Therefore,
Z 1Z
1
q−2
T3 , σ
φ(z)dzdF (b) → 0.
γ |η (b/σ + z; χ)|2−q + χq(q − 1)
q
0
Ic
Hence to bound T1 , it is sufficient to bound T1 − T3 :
Z 1Z
1
q−2
φ(z)dzdF (b)
T1 − T3 = σ
2−q + χq(q − 1)
γ
0
Ĩ c \Ic |ηq (b/σ + z; χ)|
Z 1Z
1
q−2
φ(z)dzdF (b)
≤ σ
c
1−γ
γ
; χ)|2−q + χq(q − 1)
0
Ĩ c \Ic |ηq (b /σ
Z 1Z
(b)
2bc(q−2)
≤ σ q−2+(1−γ)(2−q)
φ(z)dzdF (b)
0
Ĩ c \Icγ q − 1
Z C̃σ√log(1/σ) Z
2bc(q−2)
φ(z)dzdF (b)
= σ q−2+(1−γ)(2−q)
0
Ĩ c \Icγ q − 1
|
{z
}
T4
+σ
|
q−2+(1−γ)(2−q)
Z
1
C̃σ
√
log(1/σ)
Z
{z
T5
Ĩ c \Icγ
2bc(q−2)
φ(z)dzdF (b),
q−1
}
where (b) is the result of Lemma 14 and C̃ is a positive constant. We first bound T5 in the following:
Z
p
2σ q−2+(1−γ)(2−q) 1
b
bc(q−1)
2σ q−3+(1−γ)(2−q)
T5 ≤
φ
φ(C̃ log(1/σ)/2).
dF (b) ≤
√
q−1
σ
2σ
q−1
C̃σ log(1/σ)
It is then easily seen that T5 goes to zero by choosing large enough C̃. For the remaining term T4 ,
√
Z
b
2σ q−3+(1−γ)(2−q) C̃σ log(1/σ) c(q−1)
b
φ
dF (b)
T4 ≤
q−1
2σ
0
p
p
2σ q−3+(1−γ)(2−q)
(C̃σ log(1/σ))c(q−1) φ(0)P(|B| ≤ C̃σ log(1/σ))
≤
q−1
≤ O(1)σ c(q−1)−γ(2−q)+1−q+ǫ (log(1/σ))(c(q−1)+2−q+ǫ)/2 → 0.
26
To obtain the last statement, we can choose γ close enough to zero and c close to 1. Hence we can conclude
T1 → 0 as σ → 0. This combined with the results in (37) and (38) gives us
lim −σ −2 S2 = 2Cq(q − 1)E
σ→0
1
|ηq (|B| +
σZ; Cσ 2 )|2−q
+ Cσ 2 q(q − 1)
= 2Cq(q − 1)E|B|q−2 .
The above result together with (36) finishes the proof.
As stated in the roadmap of the proof, our first goal is to characterize the convergence rate of χ∗q (σ).
Towards this goal, we first show that χ∗q (σ) cannot be either too large or too small. In particular, in Lemmas
16 and 17, we show that χ∗q (σ) = O(σ q−1 ) and χ∗q (σ) = Ω(σ q ). We then utilize such result in Lemma 18 to
conclude that χ∗q (σ) = Θ(σ q ).
Lemma 16. Suppose E|B|2 < ∞, if χσ 1−q = ∞ and χ = o(1), then Rq (χ, σ) → ∞, as σ → 0.
Proof. Consider the formula of Rq (χ, σ) in (35). Since χ = o(1), it is straightforward to apply Dominated
Convergence Theorem to obtain
lim χ−2 σ 2q−2 S1 = q 2 E|B|2q−2 .
σ→0
Because χ2 σ 2−2q → ∞, we know S1 → ∞. Also note
|S2 | ≤ 2χq(q − 1) ·
1
= 2.
χq(q − 1)
Hence, Rq (χ, σ) → ∞.
Lemma 17. Suppose that the same conditions for B in Lemma 15 hold, if χ = o(σ q ), then
Rq (χ, σ) − 1
→ 0, as σ → 0.
σ2
Proof. Consider the expression of Rq (χ, σ) − 1 in (35). First note that
χ2 σ 2−2q q 2 E|ηq (B + σZ; χσ 2−q )|2q−2
S1
=
lim
= 0.
σ→0
σ→0 σ 2
σ2
h
i
σq−ǫ
σq−ǫ
b
Now we study the behavior of S2 . Recall that we defined I−1 = − σb − log(
and I γ =
1 , −σ +
1
log( σ )
)
σ
b
α
α
in (26) and (33), respectively. It is straightforward to use the same argument as for
, − σb + σ1−γ
− σ − σ1−γ
bounding P−1 in the proof of Lemma 12 (see the derivations in (28)) to have
Z Z
Z Z
χ ∞
φ(z)
φ(z)
χ ∞
dzdF (b) ≤ 2
dzdF (b) → 0.
2−q + χq(q − 1)
σ2 0
|η
(b/σ
+
z;
χ)|
σ
χq(q
− 1)
q
I−1
0
I−1
lim
Moreover, since χ < Cσ q for small enough σ, Lemma 6 part (v) implies
|ηq (b/σ + z; χ)| ≥ |ηq (b/σ + z; Cσ q )|.
Therefore, as σ → 0
Z
∞Z
φ(z)
dzdF (b)
2−q
0
I γ \I−1 |ηq (b/σ + z; χ)|
Z ∞Z
χ
φ(z)
1
≤ q · 2−q
dzdF (b) → 0,
q 2−q
σ σ
0
I γ \I−1 |ηq (b/σ + z; Cσ )|
χ
σ2
27
R∞R
φ(z)
1
where the last statement holds because of σ2−q
0
I γ \I−1 |ηq (b/σ+z;Cσq )|2−q dzdF (b) → 0 that has already
been shown in the proof of Lemmas 12 and 13. Above all we have proved
Z Z
χ ∞
φ(z)
dzdF (b) → 0.
2
2−q + χq(q − 1)
σ 0
I γ |ηq (b/σ + z; χ)|
Based on the above result, we can easily follow the same derivations of bounding the term T1 in the proof of
Lemma 15 to conclude
Z Z
c
φ(z)
χ 1 −b/σ+b /(2σ)
dzdF (b) = 0.
(39)
lim 2
2−q + χq(q − 1)
σ→0 σ
|η
(b/σ
+
z;
χ)|
c
q
0
−b/σ−b /(2σ)
Furthermore, because χ = o(σ q ), the analyses to derive Equation (37) and bound T2 in the proof of Lemma 15
can be adapted here and yield
Z Z
φ(z)
χ ∞ +∞
dzdF (b) = 0,
(40)
lim 2
2−q + χq(q − 1)
σ→0 σ
1
−∞ |ηq (b/σ + z; χ)|
Z Z
φ(z)
χ 1
dzdF (b) = 0.
(41)
lim 2
2−q + χq(q − 1)
σ→0 σ
0
R\[−b/σ−bc /(2σ),−b/σ+bc /(2σ)] |ηq (b/σ + z; χ)|
Putting results (39), (40) and (41) together gives us
Z Z
2χq(q − 1) ∞ ∞
φ(z)
−S2
dzdF (b) = 0.
lim 2 = lim
2
2−q + χq(q − 1)
σ→0
σ→0 σ
σ
0
−∞ |ηq (b/σ + z; χ)|
This finishes the proof.
Collecting the results from Lemmas 15, 16 and 17, we can upper and lower bound the optimal threshold
value χ∗q (σ) as shown in the following corollary.
Corollary 7. Suppose the conditions for B in Lemma 15 hold. Then as σ → 0, we have
χ∗q (σ) = Ω(σ q ),
χ∗q (σ) = O(σ q−1 ).
Proof. Since χ = χ∗q (σ) minimizes Rq (χ, σ), we know
Rq (χ∗q (σ), σ) ≤ Rq (0, σ) = 1, for any σ > 0,
σ
−1
(Rq (χ∗q (σ), σ)
− 1) ≤ σ
−2
q
(Rq (Cσ , σ) − 1) < −c, for small enough σ,
(42)
(43)
where the last inequality is due to Lemma 15 with an appropriate choice of C, and c is a positive constant.
Note that we already know χ∗q (σ) = o(1). If χ∗q (σ) 6= O(σ q−1 ), Lemma 16 will contradict with (42). If
χ∗q (σ) 6= Ω(σ q ), Lemma 17 will contradict with (43).
We are now able to derive the exact convergence rate of χ∗q (σ) and Rq (χ∗q (σ), σ).
Lemma 18. For any given q ∈ (1, 2), suppose the conditions in Lemma 12 for B hold. Then we have
(q − 1)E|B|q−2 q
σ + o(σ q ),
qE|B|2q−2
(q − 1)2 (E|B|q−2 )2 2
Rq (χ∗q (σ), σ) = 1 −
σ + o(σ 2 ).
E|B|2q−2
χ∗q (σ) =
28
Proof. In this proof, we use χ∗ to denote χ∗q (σ) for notational simplicity. Using the notations in Equation (19),
we know that χ∗ satisfies the following equation:
0 = χ∗ U1 − U2 − χ∗ U3 .
Our first goal is to show that σ q−2 U2 → q(q − 1)E|B|q−2 as σ → 0. Define the interval
K = [−b/σ − (χ∗ )1/(2−q) , −b/σ + (χ∗ )1/(2−q) ].
(44)
Then we have,
U2
σ 2−q
Z Z
|ηq (b/σ + z; χ∗ )|4−2q
q(q − 1) ∞
=
φ(z)dzdF (b)
∗ 2−q + χ∗ q(q − 1))3
σ 2−q
0
K (|ηq (b/σ + z; χ )|
Z Z
|ηq (b/σ + z; χ∗ )|4−2q
q(q − 1) ∞
φ(z)dzdF (b).
+ 2−q
∗ 2−q + χ∗ q(q − 1))3
σ
0
R\K (|ηq (b/σ + z; χ )|
(45)
We first show that the first term in (45) goes to zero. Note that ηq ((χ∗ )1/(2−q) ; χ∗ ) = (χ∗ )1/(2−q) ηq (1; 1) by
Lemma 6 part (iii), we thus have
Z Z
|ηq (b/σ + z; χ∗ )|4−2q
q(q − 1) ∞
φ(z)dzdF (b)
∗ 2−q + χ∗ q(q − 1))3
σ 2−q
0
K (|ηq (b/σ + z; χ )|
Z Z
|ηq ((χ∗ )1/(2−q) ; χ∗ )|4−2q
q(q − 1) ∞
φ(z)dzdF (b)
≤
σ 2−q
(χ∗ q(q − 1))3
0
K
Z ∞Z
1
ηq4−2q (1; 1)
≤
φ(z)dzdF (b)
∗
2
σ 2−q 0
K χ (q(q − 1))
Z C1 σ√log(1/σ) Z
ηq4−2q (1; 1)
1
≤
φ(z)dzdF (b)
∗
2
σ 2−q 0
K χ (q(q − 1))
p
ηq4−2q (1; 1)
|K|φ(C
log(1/σ) − (χ∗ )1/(2−q) ).
+ 2
1
q (q − 1)2 σ 2−q χ∗
Since we have already shown χ∗ = Ω(σ q ) in Corollary 7, it is straightforward to see that the second integral in
the above bound is negligible for large enough C1 . For the first term, we know
Z C1 σ√log(1/σ) Z
2−q+ǫ
1
φ(z)dzdF (b) ≤ O(1)(χ∗ )(q−1)/(2−q) σ ǫ (log(1/σ)) 2 = o(1).
∗
2−q
χ σ
0
K
Our next goal is to find the limit of the second term in (45). In order to do that, we again break the integral into
several pieces. Recall the intervals I γ , I−1 , I0 , I1 , . . . , J0 , J1 , . . . that we introduced in Lemmas 12 and 13.
We consider two different cases:
q−ǫ
σ
).
1. In this case, we assume that (χ∗ )1/(2−q) = o( log(1/σ)
29
Hence K ⊆ I−1 . We have
Z ∞Z
|ηq (b/σ + z; χ∗ )|4−2q
1
φ(z)dzdF (b)
∗ 2−q + χ∗ q(q − 1))3
σ 2−q 0
I−1 \K (|ηq (b/σ + z; χ )|
Z ∞Z
1
1
φ(z)dzdF (b)
≤
σ 2−q 0
|η
(b/σ
+
z; χ∗ )|2−q
q
I−1 \K
Z ∞Z
1
1
≤
φ(z)dzdF (b)
2−q
2−q
σ
(1; 1)
0
I−1 \K χ∗ ηq
Z C2 σ√log(1/σ) Z
1
1
≤
φ(z)dzdF (b)
2−q
∗
σ 2−q 0
(1; 1)
I−1 \K χ ηq
Z ∞
Z
1
1
φ(z)dzdF (b).
+ 2−q
√
2−q
σ
C2 σ log(1/σ) I−1 \K χ∗ ηq (1; 1)
The fact that χ∗ (σ) = Ω(σ q ) enables us to conclude that the second integral above goes to zero by
choosing large enough C2 . Regarding the first term we know
Z C2 σ√log(1/σ) Z
1
φ(z)dzdF (b)
χ∗ σ 2−q 0
I−1 \K
p
−q+ǫ (a)
φ(0)|I−1 |P(|B| ≤ C2 σ log(1/σ))
σq
2
=
O(1)
·
·
(log(1/σ))
= o(1),
≤
σ 2−q χ∗
χ∗
where (a) is due to χ∗ = Ω(σ q ). We now consider another integral.
Z ∞Z
|ηq (b/σ + z; χ∗ )|4−2q
1
φ(z)dzdF (b)
∗ 2−q + χ∗ q(q − 1))3
σ 2−q 0
I γ \I−1 (|ηq (b/σ + z; χ )|
Z ∞Z
1
1
≤
φ(z)dzdF (b).
2−q
∗ 2−q
σ
0
I γ \I−1 |ηq (b/σ + z; χ )|
Our goal is to show that this integral goes to zero as well. We use the following calculations:
Z ∞Z
1
1
φ(z)dzdF (b)
2−q
∗ 2−q
σ
0
I γ \I−1 |ηq (b/σ + z; χ )|
m∗ +2 Z ∞ Z
1 X
1
≤
φ(z)dzdF (b)
2−q
∗ 2−q
σ
0
Ii \Ii−1 |ηq (b/σ + z; χ )|
i=0
Z
ℓ Z
1
1 X ∞
+ 2−q
φ(z)dzdF (b)
∗ 2−q
σ
Ji \Ji−1 |ηq (b/σ + z; χ )|
i=1 0
Z ∞Z
1
1
φ(z)dzdF (b),
+ 2−q
∗ 2−q
σ
0
J0 \Im∗ +2 |ηq (b/σ + z; χ )|
where ℓ is chosen in a way such that I γ ⊆ Jℓ . Define mi = |Ii | and m̃i = |Ji |. Note that we
did similar calculations for the case χ = Cσ q in Lemmas 12 and 13. The key argument regarding χ
that we used there to show each term above converges to zero was that ηq (mi ; Cσ q ) = Θ(mi ) and
ηq (m̃i ; Cσ q ) = Θ(m̃i ). Hence, if we can show that ηq (mi ; χ∗ ) = Θ(mi ) and ηq (m̃i ; χ∗ ) = Θ(m̃i ) in
the current case, then those proofs will carry over and we will have
Z ∞Z
1
1
φ(z)dzdF (b) → 0.
2−q
∗ 2−q
σ
0
I γ \I−1 |ηq (b/σ + z; χ )|
30
For this purpose, we make use of Lemma 11. Note that since m−1 < m0 < m1 < . . . < mm∗+2 <
m̃0 < m̃1 < m̃2 . . . < m̃ℓ , we only need to confirm the condition of Lemma 11 for m−1 . We have
q−2
χ∗ m−1
= χ∗ σ (q−ǫ)(q−2) log(1/σ)2−q = o(1),
by the assumption of Case 1. Hence in the current case we have obtained
Z ∞Z
|ηq (b/σ + z; χ∗ )|4−2q
1
φ(z)dzdF (b) → 0.
∗ 2−q + χ∗ q(q − 1))3
σ 2−q 0
I γ (|ηq (b/σ + z; χ )|
Furthermore, it is clear that
σ q−2 |ηq (b/σ + z; χ∗ )|4−2q
1
.
≤
∗
2−q
∗
3
∗
2−q
2−q
(|ηq (b/σ + z; χ )|
+ χ q(q − 1))
|ηq (b + σz; χ σ )|
+ χ∗ σ 2−q q(q − 1)
We can then follow the same line of arguments for deriving limσ→0 −S2 /σ 2 in the proof of Lemma 15
to obtain limσ→0 σ q−2 U2 = q(q − 1)E|B|q−2 .
1
1
q−ǫ
q−ǫ
σ
σ
). Because (χ∗ ) 2−q = Ω( log(1/σ)
) and χ∗ = O(σ q−1 ), there
2. The other case is (χ∗ ) 2−q = Ω( log(1/σ)
1
1
exists a value of 0 ≤ m̄ ≤ m∗ + 1 such that for σ small enough, (χ∗ ) 2−q = o(|Im̄ |) and (χ∗ ) 2−q =
Ω(|Im̄−1 |). We then break the integral into:
Z ∞Z
|ηq (b/σ + z; χ∗ )|4−2q
1
φ(z)dzdF (b)
∗ 2−q + χ∗ q(q − 1))3
σ 2−q 0
I γ \K (|ηq (b/σ + z; χ )|
Z ∞Z
|ηq (b/σ + z; χ∗ )|4−2q
1
=
φ(z)dzdF (b)
∗ 2−q + χ∗ q(q − 1))3
σ 2−q 0
Im̄ \K (|ηq (b/σ + z; χ )|
Z ∞Z
|ηq (b/σ + z; χ∗ )|4−2q
1
+ 2−q
φ(z)dzdF (b)
(46)
∗ 2−q + χ∗ q(q − 1))3
σ
0
I γ \Im̄ (|ηq (b/σ + z; χ )|
Once we show that each of the two integrals above goes to zero as σ → 0, then the subsequent arguments
will be exactly the same as the ones in Case 1. Regarding the first integral,
Z ∞Z
|ηq (b/σ + z; χ∗ )|4−2q
1
φ(z)dzdF (b)
∗ 2−q + χ∗ q(q − 1))3
σ 2−q 0
Im̄ \K (|ηq (b/σ + z; χ )|
Z C3 σ√log(1/σ) Z
1
1
φ(z)dzdF (b)
≤
2−q
∗
σ 2−q 0
(1; 1)
Im̄ \K χ ηq
Z ∞
Z
1
1
+ 2−q
φ(z)dzdF (b)
√
2−q
∗
σ
(1; 1)
C3 σ log(1/σ) Im̄ \K χ ηq
p
p
φ(0)|Im̄ |P(|B| ≤ C3 σ log(1/σ)) φ(C3 log(1/σ)/2)
+
.
≤
σ 2−q ηq2−q (1; 1)χ∗
σ 2−q ηq2−q (1; 1)χ∗
Since χ∗ = Ω(σ q ) from Corollary 7, it is clear that the second term in the above upper bound goes to
zero by choosing large enough C3 . Regarding the first term we have
p
|Im̄ |P(|B| ≤ C3 σ log(1/σ))
σ 2−q χ∗
(a)
≤
(b)
≤
2−q+ǫ
ǫ+q−1
m̄ −
σ ǫ (log(1/σ)) 2 σ q−1 (2−q)
O(1)
m̄
χ∗ log(1/σ)S0 (2−q)
(
−q+ǫ
O(1)(log(1/σ)) 2 = o(1)
O(1)(log(1/σ))
31
ǫ+4−3q
2
ǫ
q−1
2
σ q −(2+ǫ)q+3ǫ+1
if m̄ > 0,
= o(1)
if m̄ = 0,
ǫ
(2−q)m̄ − q−1
≤ 0 by the definition of m∗ ; and (b) is
where (a) holds even when m̄ = m∗ +1 since ǫ+q−1
ǫ+q−1 q−1
m̄−1 − ǫ
q−1 (2−q)
q−1
σq−ǫ
due to the fact that (χ∗ )1/(2−q) = Ω σ
when m̄ > 0 and (χ∗ )1/(2−q) = Ω( log(1/σ)
)
m̄−1
S
(2−q)
(log(1/σ))
0
1
when m̄ = 0, according to the choice of m̄. For the second integral in (46), note that (χ∗ ) 2−q = o(|Im̄ |),
hence χ∗ |Im̄ |q−2 → 0. It implies that the arguments in calculating the second integral in Case 1 hold
here as well.
So far we have been able to derive the limit of σ q−2 U2 . We next analyze the term σ q−2 χ∗ U3 and show
that it goes to zero as σ → 0. We have
Z ∞Z
|ηq (b/σ + z; χ∗ )|2−q
χ∗
φ(z)dzdF (b)
∗ 2−q + χ∗ q(q − 1))3
σ 2−q 0
K (|ηq (b/σ + z; χ )|
Z ∞Z
Z ∞Z
χ∗
χ∗ ηq2−q (1; 1)
ηq2−q (1; 1)
1
≤
φ(z)dzdF
(b)
=
φ(z)dzdF (b)
∗
3
∗
3
σ 2−q 0
σ 2−q 0
K (χ q(q − 1))
K χ (q(q − 1))
The upper bound above has been shown to be zero in the preceding calculations regarding the first term
/ K,
in (45). Furthermore, note that when z ∈
|ηq (b/σ + z; χ∗ )|2−q ≥ χ∗ ηq2−q (1; 1).
We can then obtain
Z ∞Z
|ηq (b/σ + z; χ∗ )|2−q
χ∗
φ(z)dzdF (b)
∗ 2−q + χ∗ q(q − 1))3
σ 2−q 0
I γ \K (|ηq (b/σ + z; χ )|
Z ∞Z
|ηq (b/σ + z; χ∗ )|4−2q
1
≤ O(1) · 2−q
φ(z)dzdF (b).
∗ 2−q + χ∗ q(q − 1))3
σ
0
I γ \K (|ηq (b/σ + z; χ )|
The last term has been shown to converge to zero in the analysis of σ q−2 U2 . Above all we have derived
that
Z ∞Z
|ηq (b/σ + z; χ∗ )|2−q
χ∗
lim 2−q
φ(z)dzdF (b) = 0.
∗ 2−q + χ∗ q(q − 1))3
σ→0 σ
0
I γ (|ηq (b/σ + z; χ )|
This together with the fact
χ∗ |ηq (b/σ + z; χ∗ )|2−q
q −1 (q − 1)−1
≤
,
σ 2−q (|ηq (b/σ + z; χ∗ )|2−q + χ∗ q(q − 1))3
|ηq (b + σz; σ 2−q χ∗ )|2−q + σ 2−q χ∗ q(q − 1)
we can again follow the line of arguments for −σ −2 S2 in the proof of Lemma 15 to get
Z ∞Z
|ηq (b/σ + z; χ∗ )|2−q
χ∗
φ(z)dzdF (b) = 0.
lim 2−q
∗ 2−q + χ∗ q(q − 1))3
σ→0 σ
0
R (|ηq (b/σ + z; χ )|
Finally a direct application of Dominated Convergence Theorem gives us σ 2q−2 U1 → q 2 E|B|2q−2 .
Hence we are able to derive the following
σ q−2 U2 + σ q−2 χ∗ U3
(q − 1)E|B|q−2
χ∗
= lim
=
.
q
2q−2
σ→0
σ→0 σ
σ
U1
qE|B|2q−2
lim
Now that we have derived the convergence rate of χ∗ , according to Lemma 15, we can immediately obtain the
order of Rq (χ∗ , σ).
Having the convergence rate of Rq (χ∗q (σ), σ) as σ → 0 in Lemma 18, the derivation for the expansion of
AMSE(λ∗,q , q, σw ) will be the same as the one in the proof of Theorem 3.
32
4.4.2
Proof for the case q = 1
Lemma 19. Suppose that P (|B| ≤ t) = Θ(σ ℓ ) (as t → 0) and E|B|2 < ∞, then for q = 1
αm σ ℓ ≤ χ∗q (σ) ≤ βm σ ℓ (logm (1/σ))ℓ/2 ,
α̃m σ 2ℓ ≤ 1 − Rq (χ∗q (σ), σ) ≤ β̃m σ 2ℓ (logm (1/σ))ℓ ,
for small enough σ, where logm (1/σ) = log log . . . log
{z
}
|
m times
αm , βm , α̃m , β̃m > 0 are four constants depending on m.
1
σ
; m > 0 is an arbitrary integer number; and
Proof. Since the proof steps are similar to those in Lemma 10, we do not repeat every detail and instead
highlight the differences. We write χ∗ for χ∗q (σ) for notational simplicity. Using the same proof steps in
Lemma 10, we can obtain χ∗ → 0, as σ → 0 and
χ∗ =
Eφ(χ∗ − B/σ) + Eφ(χ∗ + B/σ)
.
E1(|Z + B/σ| ≥ χ∗ )
Following the same arguments from the proof of Lemma 21 in Weng et al. (2016), we can show
Θ(σ ℓ ) ≤ Eφ(χ∗ − B/σ) + Eφ(χ∗ + B/σ) ≤ Θ(σ ℓ (logm (1/σ))ℓ/2 ),
√
Θ(σ ℓ ) ≤ Eφ( 2B/σ), Eφ(−B/σ + αχ∗ ) ≤ Θ(σ ℓ (logm (1/σ))ℓ/2 ),
(47)
(48)
where α is any number between 0 and 1. Since E1(|Z + B/σ| ≥ χ∗ ) → 1 , the bounds for χ∗ is proved by
using the result (47). Furthermore, we know
Rq (χ∗ , σ) − 1 ≤ Rq (χ, σ) − 1 = E(η1 (B/σ + Z; χ) − B/σ − Z)2 + 2E(∂1 η1 (B/σ + Z; χ) − 1)
Z −B/σ+χ
φ(z)dz = χ2 − 4χEφ(−B/σ + αχ),
≤ χ2 − 2E
−B/σ−χ
√
where |α| ≤ 1 is dependent on B. If we choose χ = 3e−1 Eφ( 2B/σ) in the above inequality, it is straightforward to see that
√
Rq (χ∗ , σ) − 1 ≤ −Θ((Eφ( 2B/σ))2 ) ≤ −Θ(σ 2ℓ ),
where the last step is due to (48). For the other bound, note that
Rq (χ∗ , σ) − 1 = E(η1 (B/σ + Z; χ∗ ) − B/σ − Z)2 + 2E(∂1 η1 (B/σ + Z; χ∗ ) − 1)
Z −B/σ+χ∗
≥ −2E
φ(z)dz = −4χ∗ Eφ(−B/σ + αχ∗ ) ≥ −Θ(σ 2ℓ (logm (1/σ))ℓ ).
−B/σ−χ∗
The last inequality holds because of the upper bound on χ∗ and (48).
Based on the results of Lemma 19, deriving the expansion of AMSE(λ∗,1 , 1, σw ) can be done in a similar
way as in the proof of Theorem 3. We do not repeat it here.
4.5 Proof of Theorem 5
The idea of this proof is similar to those for Theorems 3 and 4. We make use of the result in Theorem 1:
2
AMSE(λ∗,q , q, δ) = σ̄ 2 Rq (χ∗q (σ̄), σ̄) = δσ̄ 2 − σw
.
33
(49)
Since we are in the large sample regime where δ → ∞, σ̄ is a function of δ. It is clear from (49) that 0 ≤
2 ≤ σ̄ 2 . Hence σ̄ 2 ≤ σ 2 /(δ − 1) → 0, which further leads to
δσ̄ 2 − σw
w
σ̄ 2 =
2
σw
+ o(1/δ).
δ
(50)
Due to the fact that σ̄ → 0 as δ → ∞, we will be able to use the convergence rate results of Rq (χ∗q (σ), σ) (as
σ → 0) we have proved in Lemmas 9 and 10. For 1 < q ≤ 2, Equations (49), (50) and Lemma 9 together yield
2
δ2 (AMSE(λ∗,q , q, δ) − σw
/δ) = δ2 (σ̄ 2 Rq (χ∗q (σ̄), σ̄) − (σ̄ 2 − σ̄ 2 Rq (χ∗q (σ̄), σ̄)/δ))
Rq (χ∗q (σ̄), σ̄) − 1
+ (δσ̄ 2 ) · Rq (χ∗q (σ̄), σ̄)
σ̄ 2
−(q − 1)2 (E|B|q−2 )2 4
2
→
σw + σw
.
E|B|2q−2
= (σ̄ 4 δ2 ) ·
(51)
For the case q = 1, from Lemma 10 we know Rq (χ∗q (σ̄), σ̄) − 1 is exponentially small. So the firs term in (51)
vanishes and the second term remains the same.
4.6 Proof of Theorem 6
Theorem 6 can be proved in a similar fashion as for Theorem 5. Equation (50) still holds. Equations (49), (50)
and Lemma 19 together give us for q = 1,
2
δℓ+1 (AMSE(λ∗,q , q, δ) − σw
/δ) = (σ̄ 2ℓ+2 δℓ+1 ) ·
Rq (χ∗q (σ̄), σ̄) − 1
+ (δℓ σ̄ 2 ) · Rq (χ∗q (σ̄), σ̄),
σ̄ 2ℓ
where the first term above is Θ(1) and the second one is o(1) when ℓ < 1. The case 1 < q ≤ 2 can be proved
exactly the same way as in Theorem 5 by using Lemma 18.
Acknowledgment
Arian Maleki is supported by NSF grant CCF1420328.
References
A MELUNXEN , D., L OTZ , M., M C C OY, M. B. and T ROPP, J. A. (2014). Living on the edge: phase
transitions in convex programs with random data. Information and Inference: A Journal of the IMA, 3 224.
/oup/backfile/Content_public/Journal/imaiai/3/3/10.1093/imaiai/iau005/2/iau005.pdf
URL +http://dx.doi.org/10.1093/imaiai/iau005.
BAI , Z. and Y IN , Y. (1993). Limit of the smallest eigenvalue of a large dimensional sample covariance matrix.
The annals of Probability 1275–1294.
BAYATI , M. and M ONTANARI , A. (2012). The LASSO risk for Gaussian matrices. IEEE Trans Inform Theory,
58 1997–2017.
BAYATI , M. and M ONTANRI , A. (2011). The dynamics of message passing on dense graphs, with applications
to compressed sensing. IEEE Trans. Inform. Theory, 57 764–785.
34
B ICKEL , P. J., R ITOV, Y. and T SYBAKOV, A. B. (2009). Simultaneous analysis of lasso and dantzig selector.
The Annals of Statistics 1705–1732.
B RADIC , J. and C HEN , J. (2015). Robustness in sparse linear models: relative efficiency based on robust
approximate message passing. arXiv preprint arXiv:1507.08726.
B ÜHLMANN , P. and VAN D E G EER , S. (2011). Statistics for high-dimensional data: methods, theory and
applications. Springer Science & Business Media.
C ANDES , E. J. and P LAN , Y. (2011). A probabilistic and ripless theory of compressed sensing. IEEE Transactions on Information Theory, 57 7235–7254.
C AND ÈS , E. J., ROMBERG , J. and TAO , T. (2006). Robust uncertainty principles: Exact signal reconstruction
from highly incomplete frequency information. IEEE Transactions on information theory, 52 489–509.
C ANDES , E. J. and TAO , T. (2006). Near-optimal signal recovery from random projections: Universal encoding
strategies? IEEE transactions on information theory, 52 5406–5425.
D ONOHO , D. (2004a). For most underdetermined systems of linear equations, the minimal ℓ1 -norm approximates the sparsest solution. Comm. Pure and Appl. Math.
D ONOHO , D. (2004b). For most underdetermined systems of linear equations, the minimal ℓ1 -norm nearsolution approximates the sparsest near-solution. Manuscript, submitted for publication, URL: http://wwwstat. stanford. edu/˜ donoho/Reports.
D ONOHO , D. (2006a). High-dimensional centrally symmetric polytopes with neighborliness proportional to
dimension. Discrete & Computational Geometry, 35 617–652.
D ONOHO , D., G AVISH , M. and M ONTANARI , A. (2013). The phase transition of matrix recovery from
gaussian measurements matches the minimax mse of matrix denoising. Proceedings of the National Academy
of Sciences, 110 8405–8410.
D ONOHO , D., M ALEKI , A. and M ONTANARI , A. (2011a). The noise-sensitivity phase transition in compressed sensing. IEEE Transactions Information Theory, 57 6920–6941.
D ONOHO , D. and M ONTANARI , A. (2013). High dimensional robust m-estimation: Asymptotic variance via
approximate message passing. Probability Theory and Related Fields 1–35.
D ONOHO , D. and M ONTANARI , A. (2015). Variance breakdown of huber (m)-estimators: n/p → m. arXiv
preprint arXiv:1503.02106.
D ONOHO , D. and TANNER , J. (2005a). Neighborliness of randomly projected simplices in high dimensions.
Proceedings of the National Academy of Sciences, 102 9452–9457.
D ONOHO , D. and TANNER , J. (2005b). Sparse nonnegative solution of underdetermined linear equations by
linear programming. Proceedings of the National Academy of Sciences, 102 9446–9451.
D ONOHO , D. L. (2006b). Compressed sensing. IEEE Transactions on information theory, 52 1289–1306.
D ONOHO , D. L., M ALEKI , A. and M ONTANARI , A. (2009). Message-passing algorithms for compressed
sensing. Proceedings of the National Academy of Sciences, 106 18914–18919.
35
D ONOHO , D. L., M ALEKI , A. and M ONTANARI , A. (2011b). Noise sensitivity phase transition. IEEE Trans.
Inform. Theory, 57 6920–6941.
E L K AROUI , N., B EAN , D., B ICKEL , P., L IM , C. and Y U , B. (2013). On robust regression with highdimensional predictors. Proceedings of the National Academy of Sciences, 110 14557–14562.
E LDAR , Y. C. and K UTYNIOK , G. (2012). Compressed sensing: theory and applications. Cambridge University Press.
F OYGEL , R. and M ACKEY, L. (2014). Corrupted sensing: Novel guarantees for separating structured signals.
IEEE Transactions Information Theory, 60 1223–1247.
F RANK , L. E. and F RIEDMAN , J. H. (1993). A statistical view of some chemometrics regression tools.
Technometrics, 35 109–135.
G REENSHTEIN , E., R ITOV, Y. ET AL . (2004). Persistence in high-dimensional linear predictor selection and
the virtue of overparametrization. Bernoulli, 10 971–988.
H OERL , A. E. and K ENNARD , R. W. (1970). Ridge regression: Biased estimation for nonorthogonal problems.
Technometrics, 12 55–67.
K AROUI , N. (2013). Asymptotic behavior of unregularized and ridge-regularized high-dimensional robust
regression estimators: rigorous results. arXiv preprint arXiv:1311.2445.
K NIGHT, K. and F U , W. (2000). Asymptotics for lasso-type estimators. Annals of statistics 1356–1378.
K RZAKALA , F., M ÉZARD , M., S AUSSET, F., S UN , Y. and Z DEBOROV Á , L. (2012). Statistical-physics-based
reconstruction in compressed sensing. Physical Review X, 2 021005.
M ALEKI , A. (2010). Approximate message passing algorithms for compressed sensing. Ph.D. thesis, Stanford
University.
M ALEKI , A., A NITORI , L., YANG , Z. and BARANIUK , R. (2013). Asymptotic analysis of complex lasso via
complex approximate message passing (camp). IEEE Transactions Information Theory, 59 4290–4308.
M EINSHAUSEN , N. and B ÜHLMANN , P. (2006). High-dimensional graphs and variable selection with the
lasso. The annals of statistics 1436–1462.
M OUSAVI , A., M ALEKI , A. and BARANIUK , R. G. (2017). Consistent parameter estimation for lasso and
approximate message passing. To appear in Annals of Statistics.
R ANGAN , S., G OYAL , V. and F LETCHER , A. (2009). Asymptotic analysis of map estimation via the replica
method and compressed sensing. In Advances in Neural Information Processing Systems. 1545–1553.
R ASKUTTI , G., WAINWRIGHT, M. J. and Y U , B. (2011). Minimax rates of estimation for high-dimensional
linear regression over ℓq -balls. IEEE transactions on information theory, 57 6976–6994.
R EEVES , G. and D ONOHO , D. (2013). The minimax noise sensitivity in compressed sensing. In Information
Theory Proceedings (ISIT), 2013 IEEE International Symposium on. IEEE, 116–120.
R EEVES , G. and G ASTPAR , M. (2008). Sampling bounds for sparse support recovery in the presence of noise.
In Information Theory, 2008. ISIT 2008. IEEE International Symposium on. IEEE, 2187–2191.
36
R EEVES , G. and P FISTER , H. D. (2016). The replica-symmetric prediction for compressed sensing with
gaussian matrices is exact. In Information Theory (ISIT), 2016 IEEE International Symposium on. IEEE,
665–669.
S TEIN , C. M. (1981). Estimation of the mean of a multivariate normal distribution. The annals of Statistics
1135–1151.
S TOJNIC , M. (2009a). Block-length dependent thresholds in block-sparse compressed sensing. arXiv preprint
arXiv:0907.3679.
S TOJNIC , M. (2009b).
arXiv:0907.3666.
Various thresholds for ℓ1 -optimization in compressed sensing.
arXiv preprint
S TOJNIC , M. (2013).
arXiv:1306.3774.
Under-determined linear systems and ℓq -optimization thresholds.
arXiv preprint
T HRAMPOULIDIS , C., A BBASI , E. and H ASSIBI , B. (2016). Precise error analysis of regularized m-estimators
in high-dimensions. arXiv preprint arXiv:1601.06233.
T IBSHIRANI , R. (1996). Regression shrinkage and selection via the lasso. Journal of the Royal Statistical
Society. Series B 267–288.
WAINWRIGHT, M. J. (2009). Sharp thresholds for high-dimensional and noisy sparsity recovery using ℓ1 constrained quadratic programming (lasso). IEEE transactions on information theory, 55 2183–2202.
WANG , S., W ENG , H. and M ALEKI , A. (2017). Which bridge estimator is optimal for variable selection?
arXiv preprint arXiv:1705.08617.
W ENG , H., M ALEKI , A. and Z HENG , L. (2016). Overcoming the limitations of phase transition by higher
order analysis of regularization techniques. arXiv preprint arXiv:1603.07377.
Z HAO , P. and Y U , B. (2006). On model selection consistency of lasso. Journal of Machine learning research,
7 2541–2563.
Z HENG , L., M ALEKI , A., W ENG , H., WANG , X. and L ONG , T. (2017). Does ℓp -minimization outperform
ℓ1 -minimization? IEEE Transactions on Information Theory, accepted.
37
| 10math.ST
|
1
Traffic Models of Periodic Event-Triggered Control
Systems
arXiv:1711.03599v1 [cs.SY] 9 Nov 2017
Anqi Fu, and Manuel Mazo, Jr.
Abstract—Periodic event-triggered control (PETC) [13] is a
version of event-triggered control (ETC) that only requires to
measure the plant output periodically instead of continuously. In
this work, we present a construction of timing models for these
PETC implementations to capture the dynamics of the traffic they
generate. In the construction, we employ a two-step approach.
We first partition the state space into a finite number of regions.
Then in each region, the event-triggering behavior is analyzed
with the help of LMIs. The state transitions among different
regions result from computing the reachable state set starting
from each region within the computed event time intervals.
Index Terms—systems abstractions; periodic event-triggered
control; LMI; formal methods; reachability analysis.
I. I NTRODUCTION
Wireless networked control systems (WNCS) are control
systems that employ wireless networks as feedback channels.
In such systems, the physically distributed components are
co-located with their own wireless nodes and communicate
via a wireless network. These components can be designed
with great mobility once the nodes are supported by batteries.
Besides, each component can be established and updated
easily. Therefore, WNCS have great adaptability on obtaining
different control objectives and have been attracting much
attention. However, there are two major issues that must be
considered while designing such a system: limited bandwidth
and energy supply.
Most often, control tasks are designed to be executed
periodically. This periodic strategy, also named time-triggered
control (TTC), does not regard the system’s current state and
thus may waste bandwidth and energy. Alternatively, eventtriggered control (ETC) strategies are proposed to reduce
bandwidth occupation, see e.g. [5], [17], [19], [22], [25], [26],
and references therein. In ETC, the control tasks only execute
when necessary, e.g. when some pre-designed performance indicator is about to be violated. Thus the system is tightfisted in
communication. However, to validate the pre-designed eventtriggering conditions, sensors are required to sample the plant
output continuously. This continuous monitoring can consume
large amounts of energy. To reduce this energy consumption,
naturally one may want to replace the continuously sampling
by a discrete time sampling.
When applying discrete time sampling, to compensate the
delay caused by the discretization, one can either design a
The authors are with the Delft Center for Systems and Control, Delft University of Technology, Delft 2628 CD, The Netherlands e-mail: A.Fu-1,
[email protected].
This work is partly funded by China Scholarship Council (CSC).
stricter event-triggering condition based on the system dynamics, as e.g. [18]; or modify the Lyapunov function, as e.g.
[13]. In [13], Heemels et. al. present a periodic event-triggered
control (PETC) mechanism. In a PETC implementation, the
sensors are only required to measure the plant output and
validate the event conditions periodically. Only when some
pre-designed conditions are satisfied, fresh measurements are
employed to recompute the controller output. Therefore, PETC
enjoys the benefits of both cautious communication and discrete time measurement. Compared to [18], the event conditions can be less conservative to further reduce communications. Thus the energy consumed and bandwidth occupied are
reduced. Furthermore, the transmissions of the control input
from the controller to the plant are also included in the PETC
mechanism.
To further reduce the resource consumption and to fully
extract the potential gains from ETC, one can also consider
scheduling approaches. By efficiently scheduling listening
times on wireless communications and medium access time in
general, the energy consumption in a WNCS can be reduced
and bandwidth can be more efficiently reused. To enable
such scheduling, a model for the traffic generated by ETC
is required. In [16], Kolarijani and Mazo propose a type of
approximate power quotient system, to derive models that
capture the timing behaviors of ETC systems applying the
triggering mechanism from [22]. They first partition the state
space into finite cones. In each cone, they analyze the timing
behavior by over-approximation methods (see e.g. [3], [4], [6],
[11], [14], [20], [21]), linear matrix inequality (LMI) methods,
and reachability analysis (see e.g. [1] and [2]).
Similarly, in order to fully extract the potential gains from
PETC with scheduling approaches, a model for the traffic
generated by PETC is necessary. In this work, we present a
construction of the timing models of the PETC implementations from [13]. First of all, we modify the PETC mechanism
by giving an upper bound time such that if no event happens
within that interval, the system will be forced to generate an
event by the end of it. When constructing the models, the
approach has two steps. We first divide the state space into
a finite number of partitions. For a 2-dimensional system, the
partition looks like a dartboard. Then we construct a set of
LMIs to compute the output map. Transition relations among
different regions are derived by computing the reachable state
set starting from each region. Compared with the work from
[9], we do not require that the perturbation should vanish as
the state converges. Instead, we only assume the perturbation
to be both L2 and L∞ .
This paper is organized as follows. Section II presents the
2
necessary notation and definitions. The problem to be solved
is defined in Section III. Section IV shows all the details to
construct a power quotient system to model the traffic of a
centralized PETC implementation. A numerical example is
shown in Section V. Section VI summarizes the contributions
of this paper and discusses future work. To ease the readability,
the proofs are collected in the Appendix.
II. N OTATION AND PRELIMINARIES
We denote the n-dimensional Euclidean space by Rn , the
+
positive real numbers by R+ , by R+
0 = R ∪ {0}. The natural
numbers including zero is denoted by N. When zero is not
included, we denote the natural numbers as N+ . IN+ is the
set of all closed intervals [a, b] such that a, b ∈ N+ and a ≤ b.
For any set S, 2S denotes the set of all subsets of S, i.e. the
power set of S. Mm×n and Mn are the set of all m × n real
valued matrices and the set of all n × n real-valued symmetric
matrices respectively. A symmetric matrix M ∈ Rn×n is said
to be positive (negative) definite, denoted by M 0 (M ≺ 0),
whenever xT M x > 0 (xT M x < 0) for all x 6= 0, x ∈ Rn .
M 0 (M 0) means M is a positive (negative) semidefinite matrix. When Q ⊆ Z × Z is an equivalence relation
on a set Z, [z] denotes the equivalence class of z ∈ Z and
Z/Q denotes the set of all equivalence classes. For a locally
integrable
signal w: R+ → Rn , we denote by kwkL2 =
qR
∞
|w(t)|2 dt its L2 -norm, kwkL∞ = supt≥0 kw(t)k < ∞
0
its L∞ -norm. Furthermore, we define the space of all locally
integrable signals with a finite L2 -norm as L2 , the space of
all signals with a finite L∞ -norm as L∞ .
Now we review some notions from the field of system
theory.
Definition 2.1: (Metric)[7] Consider a set T , d : T × T →
R ∪ {+∞} is a metric (or a distance function) if the following
three conditions are satisfied ∀x, y, z ∈ T :
• d(x, y) = d(y, x);
• d(x, y) = 0 ↔ x = y;
• d(x, y) ≤ d(x, z) + d(y, z).
The ordered pair (T, d) is said to be a metric space.
Definition 2.2: (Hausdorff distance)[7] Assume X and Y
are two non-empty subsets of a metric space (T, d). The
Hausdoorff distance dH (X, Y ) is given by:
max sup inf d(x, y), sup inf d(x, y) .
(1)
x∈X y∈Y
y∈Y x∈X
Definition 2.3: (System)[23] A system is a sextuple
(X, X0 , U, −→, Y, H) consisting of:
• a set of states X;
• a set of initial states X0 ⊆ X;
• a set of inputs U ;
• a transition relation −→⊆ X × U × X;
• a set of outputs Y ;
• an output map H : X → Y .
The term finite-state (infinite-state) system indicates X is a
finite (an infinite) set. For a system, if the cardinality of U is
smaller than or equal to one, then this system is said to be
autonomous.
Definition 2.4: (Metric system)[23] A system S is said to
be a metric system if the set of outputs Y is equipped with a
metric d : Y × Y → R+
0.
Definition 2.5: (Approximate simulation relation)[23] Consider two metric systems Sa and Sb with Ya = Yb , and let
∈ R+
0 . A relation R ⊆ Xa × Xb is an -approximate
simulation relation from Sa to Sb if the following three
conditions are satisfied:
• ∀xa0 ∈ Xa0 , ∃xb0 ∈ Xb0 such that (xa0 , xb0 ) ∈ R;
• ∀(xa , xb ) ∈ R we have d (Ha (xa ), Hb (xb )) ≤ ;
0
• ∀(xa , xb ) ∈ R such that (xa , ua , xa ) ∈−→ in Sa implies
a
0
∃(xb , ub , xb ) ∈−→ in Sb satisfying (x0a , x0b ) ∈ R.
b
We denote the existence of an -approximate simulation
relation from Sa to Sb by Sa S Sb , and say that
Sb -approximately simulates Sa or Sa is -approximately
simulated by Sb . Whenever = 0, the inequality
d(Ha (xa ), Hb (xb )) ≤ implies Ha (xa ) = Hb (xb ) and the
resulting relation is called an (exact) simulation relation.
We introduce a notion of power quotient system and corresponding lemma for later analysis.
Definition 2.6: (Power quotient system)[16] Let S =
(X, X0 , U, −→, Y, H) be a system and R be an equivalence
relation on X.
The power quotient of S by R, denoted
by S/R ,
is the system
X/R , X/R,0 , U/R , −→, Y/R , H/R
/R
consisting
of:
•
•
•
•
X/R = X/R;
X/R,0 = x/R ∈ X/R |x/R ∩ X0 6= ∅ ;
U
/R = U ;
x/R , u, x0/R
∈−→ if ∃(x, u, x0 ) ∈−→ in S with x ∈
/R
x/R and x0 ∈ x0/R ;
Y
• Y/R ⊂ 2 ;
S
• H/R x/R =
x∈x/R H(x).
Lemma 2.7: [Lemma 1 in [16]] Let S be a metric system,
R be an equivalence relation on X, and let the metric system
S/R be the power quotient system of S by R. For any
(2)
≥
max
d H(x), H/R x/R ,
x ∈ x/R
x/R ∈ X/R
with d the Hausdorff distance over the set 2Y , S/R approximately simulates S, i.e. S S S/R .
The definition of Minkowski addition is introduced here for
the computation of the reachable sets.
Definition 2.8: (Minkowski addition) The Minkowski addition of two sets of vectors A and B in Euclidean space is
formed by adding each vector in A to each vector in B:
A ⊕ B = {a + b|a ∈ A, b ∈ B},
where ⊕ denotes the Minkowski addition.
III. P ROBLEM DEFINITION
The centralized PETC presented in [13] is reviewed here.
Consider a continuous linear time-invariant (LTI) plant of the
form:
(
ξ˙p (t) = Ap ξp (t) + Bp v̂(t) + Ew(t)
(3)
y(t) = Cp ξp (t),
3
where ξp (t) ∈ Rnp denotes the state vector
y(t) ∈ Rny denotes the plant output vector,
denotes the input applied to the plant, w(t) ∈
the perturbation. The plant is controlled by a
controller, given by:
(
ξc (tk+1 ) = Ac ξc (tk ) + Bc ŷ(tk )
of the plant,
v̂(t) ∈ Rnv
Rnw denotes
discrete-time
v(tk ) = Cc ξc (tk ) + Dc ŷ(tk ),
(4)
where ξc (tk ) ∈ Rnc denotes the state vector of the controller,
v(tk ) ∈ Rnv denotes the controller output vector, and ŷ(tk ) ∈
Rny denotes the input applied to the controller. A periodic
sampling sequence is given by:
Ts := {tk |tk := kh, k ∈ N},
(5)
where h > 0 is the sampling interval. Define two vectors:
T
u(t) : = y T (t) v T (t) ∈ Rnu
(6)
T
û(tk ) : = ŷ T (tk ) v̂ T (tk ) ∈ Rnu ,
with nu := ny + nv . u(t) is the output of the implementation,
û(t) is the input of the implementation. A zero-order hold
mechanism is applied between samplings to the input. At each
sampling time tk , the input applied to the implementation
û(tk ) is updated ∀tk ∈ Ts :
(
u(tk ),
if ku(tk ) − û(tk )k > σku(tk )k
û(tk ) =
(7)
û(tk−1 ), if ku(tk ) − û(tk )k ≤ σku(tk )k,
where σ > 0 is a given constant. Reformulating the event
condition as a quadratic form, the event sequence can be
defined by:
Te := tb |b ∈ N, tb ∈ Ts , ξ T (tb )Qξ(tb ) > 0 .
(8)
T
T
where ξ(t) := ξp (t) ξcT (t) ŷ T (t) v̂ T (t) ∈ Rnξ , with
nξ := np + nc + ny + nv . And:
Q1 Q2
Q=
QT
Q4
2
in which:
0
(1 − σ)CpT Cp
Q
=
1
0
(1 − σ)CcT Cc
−CpT
0
Q2 =
(1 − σ)CcT Dc −CcT
I + (1 − σ)DcT Dc −DcT
Q4 =
−Dc
I
0 is a zero matrix with proper dimension, I is an identity
matrix with appropriate dimension.
It is obvious that Te ⊆ Ts . According to Theorem V.2 in
[13], if the hypothesis therein are satisfied, then the system
(3-8):
1) is globally exponential stable (GES), i.e. ∃c > 0 and ρ >
0 s.t. ∀ξ(0) ∈ Rnξ with w = 0, kξ(t)k ≤ ce−ρt kξ(0)k
for all t ∈ R+ .
2) has L2 -gain from w to z smaller than or equal to γ, i.e.
∃σ : Rnξ → R+ s.t. ∀w ∈ L2 , ξ(0) ∈ Rnξ , the corresponding solution to the system and z(t) := g(ξ(t), w(t))
satisfies kzkL2 ≤ σ(ξ(0)) + γkwkL2 .
To model the timing behaviour of a PETC system, we aim at
constructing a power quotient system for this implementation.
Remark 3.1: Because of the uncertainty brought by the
perturbation, it may happen that the perturbation compensates
the effect of sampling, helping the state of the implementation
to converge. Therefore the event condition in (8) may not be
satisfied along the timeline. As a result, there may not be an
upper bound for the event intervals. However an upper bound
is necessary for constructing a useful power quotient system.
Remark 3.2: To apply scheduling approaches, an online
scheduler is required. The model we are going to construct
is non-deterministic, meaning that after an event the system
may end up in several possible regions, but those regions are
defined in terms of ξp , which means that from a measurement
is not always clear in which region the system is. That means
this online scheduler cannot figure out where the system
is from simple output measurements. Therefore, the online
scheduler should be able to access in which region the system
is.
Assumption 3.3: The current state region at each eventtriggered time tb can be obtained in real time.
Because of the observation in Remark 3.1, we use instead
the following event condition:
tb+1 = inf {tk |tk ∈ Ts , tk > tb ,
o
_
ξ T (tk )Qξ(tk ) > 0 tk ≥ tb + τ̄R(ξ(tb )) ,
(9)
where R(ξ(tb )) is the state region on state-space Rnξ at last
sampling time tb , τ̄R(ξ(tb )) is a regional maximum allowable
event interval (MAEI), which is dependent on R(ξ(tb )).
According to Assumption 3.3, R(ξ(tb )) is obtainable. If
this value is not possible to be accessed by the triggering
mechanisms, one can always employ a global upper bound
τ̄ :≥ τ̄R(ξ(tb )) . We will discuss the computation of τ̄R(tb )
in later sections. Note that, if the PETC implementation
employing (8) can guarantee some pre-designed stability and
performance, then the PETC implementation employing (9)
can guarantee the same stability and performance.
Consider a period:
τ (x) := tb+1 − tb = kx h.
(10)
By definition û(t) is constant ∀t ∈ [tb , tb+1 [ and dependent
on ξp (tb ) and ξc (tb ). The input û(t) can be expressed as:
Cp
0
û(t) = CE x, CE :=
,
Dc Cp Cc
where
T
x := ξpT (tb ) ξcT (tb ) .
T
Let ξx (k) := ξpT (tb + kh) ξcT (tb + kh)
be the state
T
T
T
evolution with initial state x = ξp (tb ) ξc (tb ) , and k ∈ N.
Now ξx (k) can be computed as:
ξx (k) = M (k)x + Θ(k),
where
M (k) :=
M1 (k)
Θ1 (k)
,
, Θ(k) :=
M2 (k)
0
(11)
4
Z kh
eAp s ds Ap I 0
M1 (k) := I 0 +
0
+Bp Dc Cp Cc ,
X
k−1
k
0
I
M
(k)
:=A
+
Ak−1−i
Bc Cp 0 ,
2
c
c
i=0
Z kh
Θ1 (k) :=
eAp (kh−s) Ew(s)ds.
Figure 1. An example of the state space partition, into (a) finite polyhedral
cones, (b) finite homocentric spheres, and (c) finite state-space partition.
0
Thus from the event condition in (9), kx in (10) can be
computed by:
(12)
kx = min k x , k x ,
τ̄
and
where k x := R(x)
h
k x := inf k ∈ N+
))
T
M (k)x + Θ(k)
M (k)x + Θ(k)
Q
>0
.
CE x
CE x
(13)
Now we present the main problem to be solved in this paper.
Consider the system:
S = (X, X0 , U, −→, Y, H),
(14)
where
n
• X = R x , nx = np + nc ;
n
• X0 ⊆ R x ;
• U = ∅;
0
0
• −→⊆ X × U × X such that ∀x, x ∈ X : (x, x ) ∈−→
0
iff ξx (H(x)) = x ;
+
• Y ⊂N ;
nx
• H :R
→ N+ where H(x) = kx .
S is an infinite-state system. The output set Y of system S
contains all the possible amount of sampling steps tb+1h−tb ∈
N, b ∈ N that the system (3-7), and (9) may exhibit. Once
the sampling time h is chosen, the event interval then can be
computed by kx h.
Problem 3.4: Construct a finite abstraction of system S
capturing enough information for scheduling.
Inspired by [16], we solve this problem by constructing a
power quotient systems S/P based on an adequately designed
equivalence relation P defined over the state set X of S. The
constructed systems S/P are semantically equivalent to timed
automata, which can be used for automatic scheduler design
[15].
In particular, the system S/P to be constructed is as follows:
S/P = X/P , X/P,0 , U/P , −→, Y/P , H/P ,
(15)
/P
•
•
•
X/P = Rn/Px := {R1 , · · · , Rq };
X
= Rn/Px ;
/P,0
x/P , x0/P ∈−→ if ∃x ∈ x/P , ∃x0 ∈ x0/P such that
Compared with the power quotient system constructed in
[16], a main difference is that since we focus on PETC, there
is no timing uncertainty.
IV. C ONSTRUCTION OF THE QUOTIENT SYSTEM
A. State set
From the results in [8], we remark the following fact:
Remark 4.1: When w = 0, excluding the origin, all the
states that lie on a line going through the origin have an
identical triggering behavior.
We also call the following assumption:
Assumption 4.2: The perturbation w satisfies w ∈ L2 and
w ∈ L∞ . Besides, assume an upper bound W > 0 for kwkL∞ ,
i.e. kwkL∞ ≤ W, is known.
Base on Remark 4.1 and Assumption 4.2, we propose statespace partition as follows:
(
n^
x −1
xT Ξs1 ,(i,i+1) x ≥ 0
Rs1 ,s2 = x ∈ Rnx
(16)
i=1
o
^
Ws2 −1 ≤ |x| < Ws2 ,
where s1 ∈ {1, · · · , q1 }, s2 ∈ {1, · · · , q2 }, q1 , q2 ∈ N
are pre-designed scalars. Ξs1 ,(i,j) is a constructed matrix;
{Wi |i ∈ {0, · · · , q2 }} is a sequence of scalars. Note that
W0 = 0, Wq2 = +∞, and the rest Ws2 are bounded
and
It is obvious that
S somewhere in between 0 and +∞.
nx
R
=
R
.
s1 ,s2
s1 ∈{1,··· ,q1 },s2 ∈{1,··· ,q2 }
This state-space partition combines partitioning the statespace into finite polyhedral cones (named as isotropic covering
[8]) and finite homocentric spheres. From (16), we can see
that, the isotropic covering describes the relation between
entries of the state vector, while the transverse isotropic
covering is used to capture the relation between the norm of
the state vector and the L∞ norm of the perturbations, which
will be shown later in Theorem 4.4. If w = 0, the homocentric
spheres can be omitted.
Details on the isotropic covering can be found in the
Appendix. Figure 1 shows a 2-dimensional example.
/P
•
•
ξx (H(x)) = x0 ;
Y/P ⊂ 2Y ⊂ IN+;
H
h /P x/P i= minx∈x/P H(x), maxx∈x/P H(x) :=
k x/P , k̄x/P .
S/P is a finite state system.
B. Output map
We first free the system dynamics from the uncertainty
brought by the perturbation.
Lemma 4.3: Consider the system (3-7) and (9), and that
Assumptions 4.2 hold. If there exist a scalar µ ≥ 0 and a
5
symmetric matrix Ψ such that (Q1 + Ψ)1 µI, then k x
generated by (13) is lower bounded by:
kx0 := inf{k ∈ N+ |Φ(k) 0},
where
Q1 + Ψ =
(Q1 + Ψ)1
(Q1 + Ψ)3
(Q1 + Ψ)2
(Q1 + Ψ)4
(17)
(Q1 + Ψ)1 ∈ Rnp ×np ,
Φ1 (k) Φ2 (k)
0
−Ψ
0 ,
Φ(k) := ΦT
2 (k)
0
0
Φ3 (k)
T
T
Φ1 (k) =M (k)Q1 M (k) + M (k)Q2 CE
T
T
+ CE
Q3 M (k) + CE
Q4 CE
T
T
Φ2 (k) =M (k)Q1 + CE Q3
Φ (k) =khµλ
T
3
max E E dAp (k),
(18)
(19)
and
kλmax (Ap +AT
p) − 1
e
, if λmax Ap + AT
p 6= 0,
T
dAp (k) =
λmax Ap + Ap
kh,
if λmax Ap + AT
p = 0.
Next we construct LMIs that bridge Lemma 4.3 and the
state-space partition.
Theorem 4.4: (Regional lower bound) Consider a scalar
k s1 ,s2 ∈ N and regions with s2 > 1. If all the hypothesis in
Lemma 4.3 hold and there exist scalars εk,(s1 ,s2 ),(i,i+1) ≥ 0
where i ∈ {1, · · · , nx −1} such that for all k ∈ {0, · · · , k s1 ,s2 }
the following LMIs hold:
H
Φ2 (k)
0,
(20)
ΦT
−Ψ
2 (k)
according to Remark 4.1, only applying isotropic covering is
enough.
We define Rs1 ,• to represent Rs1 ,s2 , ∀s2 ∈ {1, · · · , q2 }.
Corollary 4.7: (Regional lower bound when w = 0) Consider a scalar k s1 ,• ∈ N. If there exist scalars εk,s1 ,(i,i+1) ≥ 0
where i ∈ {1, · · · , nx −1} such that for all k ∈ {0, · · · , k s1 ,• }
the following LMIs hold:
X
Φ1 (k) +
εk,s1 ,(i,i+1) Ξs1 ,(i,i+1) 0,
(22)
i∈{1,··· ,nx −1}
with Φ1 (k) defined in (19), then the inter event time (8) of the
system (3-7) with w = 0 are regionally bounded from below
by (k s1 ,• + 1)h.
Corollary 4.8: (Regional upper bound when w = 0) Let
¯l ∈ N be a large enough scalar. Consider a scalar k̄s ,• ∈
1
k s1 ,• , · · · , ¯l . If there exist scalars ε̄k,s1 ,(i,i+1)
≥ 0 where
i ∈ {1, · · · , nx − 1} such that for all k ∈ k̄s1 ,• , · · · , ¯l the
following LMIs hold:
X
Φ1 (k) −
ε̄k,s1 ,(i,i+1) Ξs1 ,(i,i+1) 0,
(23)
i∈{1,··· ,nx −1}
with Φ1 (k) defined in (19), then the inter event time (8) of the
system (3-7) with w = 0 are regionally bounded from above
by k̄s1 ,• h.
Remark 4.9: For the choice of ¯l, we follow Remark 2 in [16],
and apply a line search approach: increasing ¯l until Φ1 (¯l) 0.
This results in ¯l being a global upper bound for the inter event
time (8) of the system (3-7) with w = 0.
It is obvious that ¯l ≥ k̄s1 ,• > k s1 ,• ≥ k s1 ,s2 , ∀s2 . We can
now set the regional MAEI τ̄R(ξ(tb )) in (9) as: τ̄R(ξ(tb )) :=
k̄s1 ,• h, ∀x ∈ Rs1 ,• .
where
H =Φ1 (k) + Φ3 (k)W 2 Ws−2
I
2 −1
X
+
εk,(s1 ,s2 ),(i,i+1) Ξs1 ,(i,i+1) ,
i∈{1,··· ,nx −1}
with Φ1 (k), Φ2 (k), and Φ3 (k) defined in (19), and Ψ from
Lemma 4.3, then the inter event times (9) for system (3-7)
are regionally bounded from below by (k s1 ,s2 + 1)h. For the
regions with s2 = 1, the regional lower bound is h.
Remark 4.5: In Theorem 4.4, we discuss the situations when
s2 > 1 and s2 = 1, since for all regions with s2 > 1, it holds
that Ws2 −1 6= 0; while for all regions with s2 = 1, Ws2 −1 = 0
holds. When Ws2 −1 6= 0, one can easily validate the feasibility
of the LMI (20); while when Ws2 −1 = 0, H will be diagonal
infinity, making the LMI (20) infeasible when k > 0. However,
according to the property of PETC, i.e. tb+1 ∈ Ts and tb+1 >
tb , the regional lower bound exists and is equal to h.
Following similar ideas of Theorem 4.4, we present next
lower and upper bounds starting from each state partition when
w = 0. Consider the following event condition:
(
)
T
M
(k)x
M
(k)x
kx = inf k ∈ N+
Q
>0 .
(21)
CE x
CE x
Remark 4.6: Since (21) does not consider perturbations,
when computing the lower and upper bound for each region,
C. Transition relation
In this subsection, we discuss the construction of the transition relation and the reachable state set. Denote the initial
state set as X0,(s1 ,s2 ) , after k-th samplings without an update,
the reachable state set is denoted as Xk,(s1 ,s2 ) . According to
(11), a relation can be obtained as:
Xk,(s1 ,s2 ) = M (k)X0,(s1 ,s2 ) + Θ(k).
(24)
It is obvious that, Xk,(s1 ,s2 ) cannot be computed directly,
because the perturbation is uncertain and the state region may
not be convex. Therefore, we aim to find sets X̂k,(s1 ,s2 ) such
that:
Xk,(s1 ,s2 ) ⊆ X̂k,(s1 ,s2 ) .
To compute X̂k,(s1 ,s2 ) , we take the following steps:
1) Partition the dynamics: According to (24), X̂k,(s1 ,s2 )
can be computed by:
1
2
X̂k,(s1 ,s2 ) = X̂k,(s
⊕ X̂k,(s
,
1 ,s2 )
1 ,s2 )
1
2
where ⊕ is the Minkowski addition, X̂k,(s
and X̂k,(s
1 ,s2 )
1 ,s2 )
are sets to be computed.
6
1
1
2) Compute X̂k,(s
: One can compute X̂k,(s
by:
1 ,s2 )
1 ,s2 )
1
X̂k,(s
= M (k)X̂0,(s1 ,s2 ) ,
1 ,s2 )
where X̂0,(s1 ,s2 ) is a polytope that over approximates
X0,(s1 ,s2 ) , i.e. X0,(s1 ,s2 ) ⊆ X̂0,(s1 ,s2 ) . X̂0,(s1 ,s2 ) can be
computed as in the optimization problem (1) in [2].
2
2
3) Compute X̂k,(s
: For the computation of X̂k,(s
,
1 ,s2 )
1 ,s2 )
it follows that:
2
= {x ∈ Rnx ||x| ≤ |Θ(k)|},
X̂k,(s
1 ,s2 )
where
kh
Z
eAp (kh−s) Ew(s)ds
|Θ(k)| =
0
kh
Z
eAp (kh−s) Ew(s) ds
≤
0
kh
Z
eAp (kh−s) ds|E|kwkL∞
≤
0
kh λ
max
Z
≤
e
AT
p +Ap
2
Figure 2. State-space partition and the labeling of each region.
(kh−s)
ds|E|W.
0
In which the last inequation holds according to (2.2) in [24].
of the system
Thus the reachable set X{k
s1 ,s2 ,k s1 ,• },(s1 ,s2 )
(3-7), and (9) starting from X0,(s1 ,s2 ) can be computed by:
X{k
⊆ X̂{k
s1 ,s2 ,k s1 ,• },(s1 ,s2 )
s1 ,s2 ,k s1 ,• },(s1 ,s2 )
[
=
X̂k,(s1 ,s2 ) .
k∈{ks ,s ,··· ,ks1 ,• }
1 2
To compute the transitions in S/P , one can check the
intersection between the over approximation of reachable state
set and all the state regions Rs01 ,s02 , ∀s01 ∈ {1, · · · , q1 }, s02 ∈
{1, · · · , q2 }. More specifically, one can check if the following
feasibility problem for each state region holds:
Rs01 ,s02 ∩ X̂{k
s1 ,s2 ,k s1 ,•
},(s1 ,s2 ) 6= ∅,
Figure 3. Computed result of the regional lower bound with W = 2.
in which case
Rs1 ,s2 , Rs01 ,s02 ∈−→ .
/P
D. Main result
Now we summarize the main result of the paper in the
following theorem.
=
Theorem 4.10: The metric
system S/P
X/P , X/P,0 , U/P , −→, Y/P , H/P ,
-approximately
/P
simulates S, where = max dH (y, y 0 ), y = H(x) ∈ Y ,
y 0 = H/P (x0 ) ∈ Y/P , ∀ (x, x0 ) ∈ P , and dH (·, ·) is the
Hausdorff distance.
V. N UMERICAL EXAMPLE
In this section, we consider a system employed in [13] and
[22]. The plant is given by:
˙ = 0 1 ξ(t) + 0 v(t) + 1 w(t),
ξ(t)
−2 3
1
0
and the controller is given by:
K= 1
−4 .
This plant is chosen since it is easy to show the feasibility of
the presented theory in 2-dimensional plots. The state-space
partition is presented in Figure 2.
We set W = 2, the convergence rate ρ = 0.01, L2 gain
γ = 2, sampling time h = 0.005s, event condition σ = 0.1.
By checking the LMI presented in [13], we can see there
exists a feasible solution, thus the stability and performance
can be guaranteed. The result of the computed lower bound by
Theorem 4.4 is shown in Figure 3. Figure 4 shows a zoomed-in
version. The computed upper bound by Corollary 4.8 is shown
in Figure 5. The resulting abstraction precision is = 0.15s.
The simulation results of the system evolution and event
intervals with perturbations are shown in Figure 6. The upper
bound triggered 6 events during the 10s simulation. Note
that, increasing the number of subdivisions can lead to less
7
Figure 4. Zoomed-in result of the regional lower bound with W = 2.
Figure 6. System evolution and event intervals when w = 2 sin(πt), t ∈
[3, 8]: state evaluation and perturbance, event intervals with the bounds.
Figure 5. Computed result of the regional upper bound with w = 0.
conserved lower and upper bounds of the inter event time.
The conservativeness can also be reduced by decreasing W.
The reachable state regions starting from each region is
shown in Figure 7. As an example, the reachable state region
of the initial region (s1 , s2 ) = (4, 6) is shown in Figure 8.
We also present a simulation when w = 0. The lower
bound is shown in Figure 9. The evolution of the system is
shown in Figure 10, which shows that, the inter event intervals
are within the computed bounds. The reachable state regions
starting from each region are shown in Figure 11.
VI. C ONCLUSION
In this paper, we present a construction of a power quotient
system for the traffic model of the PETC implementations
from [13]. The constructed models can be used to estimate the
next event time and the state set when the next event occurs.
These models allow to design scheduling to improve listening
time of wireless communications and medium access time to
increase the energy consumption and bandwidth occupation
efficiency.
Figure 7. Reachable regions starting from each state region, with labeling
from Figure 2.
In this paper, we consider an output feedback system with
a dynamic controller. However, the state partition is still
based on the states of the system and controller. The system
state may not always be obtainable. Therefore, to estimate
the system state in an ETC implementation from output
measurements is a very important extension to make this work
more practical. The periodic asynchronous event-triggered
control (PAETC) presented in [10] is an extension of PETC
considering quantization. One can either treat the quantization
error as part of the perturbations, or analyze this part separately
to increase the abstraction precision, since the dynamics of the
quantization error is dependent on the states. This is also an
interesting future investigation. Another interesting extension
is reconstruction of traffic models for each sensor node to
capture the local timing behavior in a decentralized PETC
8
Figure 8. Flow pipe of (s1 , s2 ) = (4, 6): indicating initial state set (red),
reachable state set (blue), and reachable regions (cyan).
Figure 10. System evolution and event intervals when w = 0: state evaluation
and event intervals vs computed bounds.
Figure 9. Computed result of the regional lower bound with w = 0.
implementation, by either global information or even only
local information.
A PPENDIX
Isotropic
covering:
Consider
x
=
T
x1 x2 · · · xn
∈ Rn . We first present a case
when x ∈ R2 . Let Θ = [− π2 , π2 [ be an interval. Splitting this
interval into q sub-intervals and Θs = [θs , θs [ be the s-th
sub-interval. Then for each sub-interval, one can construct a
cone pointing at the origin:
n
o
Rs = x ∈ R2 |xT Ξ̃s x ≥ 0 ,
where
Ξ̃s =
− sin θs sin θs 12 sin(θs + θs )
.
1
2 sin(θ s + θ s ) − cos θ s cos θ s
Remark 4.1 shows that x and −x have the same behaviours,
therefore it is sufficient to only consider half of the state-space.
Figure 11. Reachable regions starting from each conic region, with labeling
from Figure 2.
Now we derive the case when x ∈ Rn , n > 2. Define
(x)i,j = (xi , xj ) as the projection of this point on its i − j
coordinate. Now a polyhedral cone Rs can be defined as:
(
)
n−1
^
n
T
Rs = x ∈ R
(x)(i,i+1) Ξ̃s,(i,i+1) (x)(i,i+1) ≥ 0 ,
i=1
where Ξ̃s,(i,i+1) is a constructed matrix. A relation between
Ξ̃s,(i,i+1) and Ξs,(i,i+1) from (16) is given by:
[Ξs,(i,i+1) ](i,i)
=[Ξ̃s,(i,i+1) ](1,1)
=[Ξ̃s,(i,i+1) ](1,2)
[Ξs,(i,i+1) ](i,i+1)
[Ξs,(i,i+1) ](i+1,i)
[Ξs,(i,i+1) ](i+1,i+1)
[Ξs,(i,i+1) ](k,l)
=[Ξ̃s,(i,i+1) ](2,1)
=[Ξ̃s,(i,i+1) ](2,2)
=0,
9
where [M ](i,j) is the i-th row, j-th column entry of the matrix
M , k and l satisfy (k, l) 6= (i, i + 1).
Proof of Lemma 4.3: We decouple the event triggering
mechanism in (13) first:
T
M (k)x + Θ(k)
M (k)x + Θ(k)
Q
CE x
CE x
T
T
=x Φ1 (k)x + x Φ2 (k)Θ(k) + Θ
T
(k)ΦT
2 (k)x
+ ΘT (k)Q1 Θ(k)
T
≤xT (Φ1 (k) + Φ2 (k)Ψ−1 ΦT
2 (k))x + Θ (k)(Q1 + Ψ)Θ(k),
(25)
where the last inequality comes from Lemma 6.2 in [12]. Now
for the uncertainty part, we have:
ΘT (k)(Q1 + Ψ)Θ(k)
T
Θ1 (k)
(Q1 + Ψ)1
=
0
(Q1 + Ψ)3
(Q1 + Ψ)2
(Q1 + Ψ)4
Proof of Theorem 4.4: We first consider the regions with
s2 > 1. If all the hypothesis of the theorem hold, by applying
the Schur complement to (20), one has:
(29)
xT H + Φ2 (k)Ψ−1 ΦT
2 (k) x ≤ 0.
From (16), and applying the S-procedure, it holds that:
xT Φ1 (k) + Φ3 (k)W 2 Ws−2
I + Φ2 (k)Ψ−1 ΦT
2 (k) x ≤ 0.
2 −1
(30)
From (16) we also have:
xT x ≥ Ws22 −1 .
(31)
Since Φ3 (k), W, and Ws2 −1 are non-negative scalars and
Ws2 −1 > 0, we have the following inequality:
xT Φ3 (k)W 2 Ws−2
Ix = Φ3 (k)W 2 Ws−2
xT x
2 −1
2 −1
Θ1 (k)
0
=ΘT
1 (k)(Q1 + Ψ)1 Θ1 (k).
From the hypothesis of the theorem that there exists µ such
that (Q1 + Ψ)1 µI, together with Jensen’s inequality [12],
inequality (2.2) in [24], and Assumption 4.2, i.e. w ∈ L∞ ,
ΘT (k)(Q1 + Ψ)Θ(k) can be bounded from above by:
≥Φ3 (k)W 2 Ws−2
Ws22 −1 = Φ3 (k)W 2 ≥ Φ3 (k)kwk2L∞ ,
2 −1
(32)
in which the last inequality comes form the definition of W.
Now inserting (32) into (30) results in:
2
xT Φ1 (k) + Φ2 (k)Ψ−1 ΦT
2 (k) x + Φ3 (k)kwkL∞ ≤ 0,
which together with applying the Schur complement to (18)
provides the regional lower bound.
ΘT (k)(Q1 + Ψ)Θ(k) = ΘT
1 (k)(Q1 + Ψ)1 Θ1 (k)
!
!
When s2 = 1, k > 0, H will be diagonal infinity. Thus the
T Z
Z kh
kh
LMI (20) will be infeasible. According to the event-triggered
≤µ
eAp (kh−s) Ew(s)ds
eAp (kh−s) Ew(s)ds
condition (9), which indicates that tb+1 ∈ Ts and tb+1 > tb ,
0
0
the regional lower bound for those regions with s2 = 1 is h.
(by (Q1 + Ψ) µI)
This finishes the proof.
Z kh
T
Proof of Corollary 4.7: The result can be easily obtained
≤khµ
eAp (kh−s) Ew(s)
eAp (kh−s) Ew(s) ds
0
from Theorem 4.4 considering E = 0.
(by Jensen’s equality)
Proof of Corollary 4.8: The result can be easily obtained
Z kh
analogously
to Theorem 4.4 considering E = 0: if all the
T
≤khµ
e(kh−s)λmax (Ap +Ap ) wT (s)E T Ew(s)ds
hypothesis of this
Corollary hold, then according to (23),
0
Φ
(k)
0,
k
∈
k̄s1 ,• , · · · , ¯l . According to the definition of
1
(by (2.2) in [24])
Φ1 (k) in (19), for all k ≥ k̄s1 ,• , it holds that:
Z
kh (kh−s)λmax (Ap +AT )
p dskwk2
T
≤khµλmax E T E
e
L∞
M (k)x
M (k)x
0
Q
> 0,
CE x
CE x
(by w ∈ L∞ )
=khµλmax E T E dAp (k)kwk2L∞ .
which together with event condition (21) provides the regional
(26) upper bound.
With (26), (25) can be further bounded as:
Proof of Theorem 4.10: The result follows from Lemma
T
2.7
and
the construction described in this section.
M (k)x + Θ(k)
M (k)x + Θ(k)
Q
CE x
CE x
(27)
R EFERENCES
T
−1 T
2
≤x Φ1 (k) + Φ2 (k)Ψ Φ2 (k) x + Φ3 (k)kwkL∞ .
From the hypothesis of the theorem, if Φ(k) 0 holds,
then by applying the Schur complement to (18), the following
inequality holds:
2
xT Φ1 (k) + Φ2 (k)Ψ−1 ΦT
2 (k) x + Φ3 (k)kwkL∞ ≤ 0,
which indicates:
T
M (k)x + Θ(k)
M (k)x + Θ(k)
Q
≤ 0.
CE x
CE x
(28)
Therefore, k x generated by (13) is lower bounded by kx0
generated by (17). This ends the proof.
[1] Alongkrit Chutinan and Bruce H Krogh. Computing polyhedral approximations to flow pipes for dynamic systems. In Decision and Control,
1998. Proceedings of the 37th IEEE Conference on, volume 2, pages
2089–2094. IEEE, 1998.
[2] Alongkrit Chutinan and Bruce H Krogh. Computational techniques for
hybrid system verification. IEEE transactions on automatic control,
48(1):64–75, 2003.
[3] Marieke BG Cloosterman, Laurentiu Hetel, Nathan Van de Wouw,
WPMH Heemels, Jamal Daafouz, and Henk Nijmeijer. Controller
synthesis for networked control systems. Automatica, 46(10):1584–
1594, 2010.
[4] Marieke BG Cloosterman, Nathan Van de Wouw, WPMH Heemels,
and Hendrik Nijmeijer. Stability of networked control systems with
uncertain time-varying delays. IEEE Transactions on Automatic Control,
54(7):1575–1580, 2009.
10
[5] MCF Donkers and WPMH Heemels. Output-based event-triggered
control with guaranteed-gain and improved and decentralized eventtriggering. Automatic Control, IEEE Transactions on, 57(6):1362–1376,
2012.
[6] MCF Donkers, WPMH Heemels, Nathan Van de Wouw, and Laurentiu
Hetel. Stability analysis of networked control systems using a switched
linear systems approach. IEEE Transactions on Automatic control,
56(9):2101–2115, 2011.
[7] Günter Ewald. Combinatorial convexity and algebraic geometry, volume
168. Springer Science & Business Media, 2012.
[8] Christophe Fiter, Laurentiu Hetel, Wilfrid Perruquetti, and Jean-Pierre
Richard. A state dependent sampling for linear state feedback. Automatica, 48(8):1860–1867, 2012.
[9] Christophe Fiter, Laurentiu Hetel, Wilfrid Perruquetti, and Jean-Pierre
Richard. A robust stability framework for lti systems with time-varying
sampling. Automatica, 54:56–64, 2015.
[10] Anqi Fu and Manuel Mazo Jr. Periodic asynchronous event-triggered
control. CoRR, abs/1703.10073, 2017.
[11] Rob H Gielen, Sorin Olaru, Mircea Lazar, WPMH Heemels, Nathan
van de Wouw, and S-I Niculescu. On polytopic inclusions as a
modeling framework for systems with time-varying delays. Automatica,
46(3):615–619, 2010.
[12] Keqin Gu, Jie Chen, and Vladimir L Kharitonov. Stability of time-delay
systems. Springer Science & Business Media, 2003.
[13] WPMH Heemels, MCF Donkers, and Andrew R Teel. Periodic eventtriggered control for linear systems. Automatic Control, IEEE Transactions on, 58(4):847–861, 2013.
[14] Laurentiu Hetel, Jamal Daafouz, and Claude Iung. Stabilization of
arbitrary switched linear systems with unknown time-varying delays.
IEEE Transactions on Automatic Control, 51(10):1668–1674, 2006.
[15] Arman Sharifi Kolarijani, Dieky Adzkiya, and Manuel Mazo. Symbolic
abstractions for the scheduling of event-triggered control systems. In
Decision and Control (CDC), 2015 IEEE 54th Annual Conference on,
pages 6153–6158. IEEE, 2015.
[16] Arman Sharifi Kolarijani and Manuel Mazo Jr. A formal traffic characterization of lti event-triggered control systems. IEEE Transactions on
Control of Network Systems, 2016.
[17] Manuel Mazo Jr. and Ming Cao. Asynchronous decentralized eventtriggered control. Automatica, 50(12):3197–3203, 2014.
[18] Manuel Mazo Jr and Anqi Fu. Decentralized event-triggered controller
implementations. Event-Based Control and Signal Processing, page 121,
2015.
[19] Manuel Mazo Jr. and Paulo Tabuada. Decentralized event-triggered
control over wireless sensor/actuator networks. Automatic Control, IEEE
Transactions on, 56(10):2456–2461, 2011.
[20] Joëlle Skaf and Stephen Boyd. Analysis and synthesis of state-feedback
controllers with timing jitter. IEEE Transactions on Automatic Control,
54(3):652–657, 2009.
[21] Young Soo Suh. Stability and stabilization of nonuniform sampling
systems. Automatica, 44(12):3222–3226, 2008.
[22] Paulo Tabuada. Event-triggered real-time scheduling of stabilizing
control tasks. Automatic Control, IEEE Transactions on, 52(9):1680–
1685, 2007.
[23] Paulo Tabuada. Verification and control of hybrid systems: a symbolic
approach. Springer Science & Business Media, 2009.
[24] Charles Van Loan. The sensitivity of the matrix exponential. SIAM
Journal on Numerical Analysis, 14(6):971–981, 1977.
[25] Xiaofeng Wang and Michael D Lemmon. Event-triggering in distributed
networked control systems. Automatic Control, IEEE Transactions on,
56(3):586–601, 2011.
[26] Xiaofeng Wang and Michael D Lemmon. On event design in eventtriggered feedback systems. Automatica, 47(10):2319–2322, 2011.
| 3cs.SY
|
Derandomization for k-submodular
maximization
arXiv:1610.07729v2 [cs.DS] 15 Feb 2017
Hiroki Oshima
Department of Mathematical Informatics,
Graduate School of Information Science and Technology, The University of Tokyo
Abstract. Submodularity is one of the most important property of combinatorial optimization, and k-submodularity is a generalization of submodularity. Maximization of a k-submodular function is NP-hard, and
approximation algorithm has been studied. For monotone k-submodular
functions, [Iwata, Tanigawa, and Yoshida 2016] gave k/(2k−1)-approximation
algorithm. In this paper, we give a deterministic algorithm by derandomizing that algorithm. Our algorithm is k/(2k−1)-approximation and runs
in polynomial time.
1
Introduction
A set function f : 2V → R is submodular if, for any A, B ⊆ V , f (A) + f (B) ≥
f (A ∪ B) + f (A ∩ B). Submodularity is one of the most important properties
of combinatorial optimization. The rank functions of matroids and cut capacity
functions of networks are submodular. Submodular functions can be seen as
discrete version of convex functions.
For submodular function minimization, [4] showed the first polynomial-time
algorithm. The combinatorial strongly polynomial algorithms were shown by [5]
and [8]. On the other hand, submodular function maximization is NP-hard and
we can only use approximation algorithms. Let an input function for maximization be f , a maximizer of f be S ∗ , and an output of an algorithm be S. The
approximation ratio of the algorithm is defined as f (S)/f (S ∗ ) for deterministic
algorithms and E[f (S)]/f (S ∗ ) for randomized algorithms. A randomized version of Double Greedy algorithms in [2] achieves 1/2-approximation. [3] showed
(1/2 + ǫ)-approximation requires exponential time value oracle queries. This implies that, Double Greedy algorithm is one of the best algorithms in terms of the
approximation ratio. [1] showed a derandomized version of randomized Double
Greedy algorithm, and their algorithm achieves 1/2-approximation.
k-submodularity is an extension of submodularity. k-submodular function is
defined as below.
Definition 1. Let (k + 1)V := {(X1 , ..., Xk ) | Xi ⊆ V (i = 1, ..., k), Xi ∩ Xj =
∅ (i 6= j)}. A function f : (k + 1)V → R is called k-submodular if we have
f (x) + f (y) ≥ f (x ⊓ y) + f (x ⊔ y)
for any x = (X1 , ..., Xk ), y = (Y1 , ..., Yk ) ∈ (k + 1)V . Note that
x ⊓ y = (X1 ∩ Y1 , ..., Xk ∩ Yk ) and
[
[
x ⊔ y = (X1 ∪ Y1 \ (Xi ∪ Yi ), ..., Xk ∪ Yk \ (Xi ∪ Yi )).
i6=1
i6=k
It is a submodular function if k = 1. It is called a bisubmodular function if k = 2.
Maximization for k-submodular functions is also NP-hard and approximation algorithm have been studied. An input of the problem is a nonnegative
k-submodular function. Note that, for any k-submodular function f and any
c ∈ R, a function f ′ (x) := f (x) + c is k-submodular. An output of the problem is x = (X1 , ..., Xk ) ∈ (k + 1)V . Let an input k-submodular function be f , a
maximizer of f be o, and an output of an algorithm be s. Then we define the approximation ratio of the algorithm as f (s)/f (o) for deterministic algorithms, and
E[f (s)]/f (o) for randomized algorithms. For bisubmodular functions, [6] and [9]
showed that the algorithm for submodular functions in [2] can be extended. [9]
analyzed an extension for k-submodular functions. They
p showed a randomized
1/(1 + a)-approximation algorithm with a = max{1, (k − 1)/4} and a deterministic 1/3-approximation algorithm. Now we have a 1/2-approximation algorithm shown in [7]. In particular, for monotone k-submodular functions, [7] gave
k
-approximation algorithm. They also showed any ( k+1
a 2k−1
2k +ǫ)-approximation
algorithm requires exponential time value oracle queries.
In this paper, we give a deterministic approximation algorithm for monok
-approximation and runs in
tone k-submodular maximization. It satisfies 2k−1
polynomial-time. Our algorithm is a derandomized version of algorithm for
monotone functions in [7]. We also note the derandomization scheme is from
[1], used for Double Greedy algorithm.
2
Preliminary
Define a partial order on (k + 1)V for x = (X1 , ..., Xk ) and y = (Y1 , ..., Yk ) as
follows:
def
x y ⇐⇒ Xi ⊆ Yi (i = 1, ..., k).
Sk
Also, for x = (X1 , ..., Xk ) ∈ (k + 1)V , e ∈
/ l=1 Xl , and i ∈ {1, ..., k}, define
∆e,i f (x) = f (X1 , ..., Xi−1 , Xi ∪ {e}, Xi+1 , ..., Xk ) − f (X1 , ..., Xk ).
A monotone k-submodular function is k-submodular and satisfies f (x) ≤
f (y) for any x = (X1 , ..., Xk ) and y = (Y1 , ..., Yk ) in (k + 1)V with x y.
The property of k-submodularity can be written as another form.
Theorem 1. ([9] THEOREM 7) A function f : (k + 1)V → R is k-submodular
if and only if f is orthant submodular and pairwise monotone.
Note that orthant submodularity is to satisfy
∆e,i f (x) ≥ ∆e,i f (y) (x, y ∈ (k + 1)V , x y, e ∈
/
k
[
l=1
Yl , i ∈ {1, ..., k}),
and pairwise monotonicity is to satisfy
∆e,i f (x) + ∆e,j f (x) ≥ 0 (x ∈ (k + 1)V , e ∈
/
k
[
Xl , i, j ∈ {1, ..., k} (i 6= j)).
l=1
To analyze k-submodular functions, it is often convenient to identify (k + 1)V
as {0, 1, ..., k}V . A |V |-dimensional vector x ∈ {0, 1, ..., k}V is associated with
(X1 , ..., Xn ) ∈ (k + 1)V by Xi = {e ∈ V | x(e) = i}.
3
Existing randomized algorithms
3.1
Algorithm framework
In this section, we see the framework to maximize k-submodular functions (Algorithm 1 [7]). [6] and [9] used it with specific distributions.
Algorithm 1 ([7] Algorithm 1)
Input: A nonnegative k-submodular function f : {0, 1, ..., k}V → R+ .
Output: A vector s ∈ {0, 1, ..., k}V .
s←0.
Denote the elements of V by e(1) , ..., e(n) (|V | = n).
for j = 1, ..., n do
Set a probability distribution p(j) over {1, ..., k}.
(j)
Let s(e(j) ) ∈ {1, ..., k} be chosen randomly with Pr[s(e(j) ) = i] = pi .
end for
return s
Algorithm 1 is not only used for monotone functions. However, in this paper,
we only use it for monotone functions.
Now we define some variables to see Algorithm 1. Let o be an optimal solution, and we write s(j) as s at j-th iteration. Let other variables be as follows:
(
o(j) (e) (e 6= e(j) )
(j)
(j)
(j)
(j−1)
o = (o ⊔ s ) ⊔ s , t
(e) =
0
(e = e(j) )
(j)
yi
(j)
= ∆e(j) ,i f (s(j−1) ) , ai
= ∆e(j) ,i f (t(j−1) )
Algorithm 1 satisfies following lemma.
Lemma 1. ([7] LEMMA 2.1.)
Let c ∈ R+ . Conditioning on s(j−1) , suppose that
k
X
(j)
(j)
(j)
(ai∗ − ai )pi
≤c
k
X
(j) (j)
(yi pi )
i=1
i=1
holds for each j with 1 ≤ j ≤ n, where i = o(e(j) ). Then E[f (s)] ≥
∗
1
1+c f (o).
3.2
A randomized algorithm for monotone functions
k
In [7], a randomized 2k−1
-approximation algorithm for monotone k-submodular
functions (Algorithm 2) is shown.
Algorithm 2 ([7] Algorithm 3)
Input: A monotone k-submodular function f : {0, 1, ..., k}V → R+ .
Output: A vector s ∈ {0, 1, ..., k}V .
s ← 0, t ← k − 1.
Denote the elements of V by e(1) , ..., e(n) (|V | = n).
for j = 1, ..., n do
(j)
yi ← ∆e(j) ,i f (s) (1 ≤ i ≤ k).
P
(j)
β ← ki=1 (yi )t .
(j)
(j)
if β 6= 0 then pi ← (yi )t /β (1 ≤ i ≤ k).
else
(j)
(j)
p1 = 1, pi = 0 (i = 2, ..., k).
end if
(j)
Lets(e(j) ) ∈ {1, ..., k} be chosen randomly with Pr[s(e(j) ) = i] = pi .
end for
return s
Algorithm 2 runs in polynomial time. The approximation ratio of Algorithm
2 satisfies the theorem below.
Theorem 2. ([7] THEOREM 2.2.) Let o be a maximizer of a monotone ksubmodular function f and let s be the output of Algorithm 2. Then E[f (s)] ≥
k
2k−1 f (o).
In the proof of this theorem (see [7]), the inequality of Lemma 1 is proved
with c = 1 − k1 . We get ai ≥ 0 (∀i ∈ {1, ..., k}) from monotonicity, and ai ≤
yi (∀i ∈ {1, ..., k}) from orthant submodularity. Hence, the inequality
X
i6=i∗
(j) (j)
(yi∗ pi )
k
1 X (j) (j)
(y p )
≤ 1−
k i=1 i i
(1)
is used. The inequality of Lemma 1 is satisfied when the inequality (1) is valid.
4
Deterministic algorithm
In this section, we give a polynomial-time deterministic algorithm for maximizing
monotone k-submodular functions. Our algorithm is Algorithm 3. Algorithm 3
is a derandomized version of Algorithm 2. We note the derandomization scheme
of this algorithm is from [1].
Algorithm 3 A deterministic algorithm
Input: A monotone k-submodular function f : {0, 1, ..., k}V → R+ .
Output: A vector s ∈ {0, 1, ..., k}V .
P
D0 ← (1, 0), (D = {(p, s) | s ∈ (k + 1)V , 0 ≤ p ≤ 1} ( s∈D p = 1)).
(1)
(n)
Denote the elements of V by e , ..., e
(|V | = n).
for j = 1, ..., n do
yi (s) ← ∆e(j) ,i f (s) (∀s ∈ supp(Dj−1 ), i ∈ {1, ..., k}).
Find an extreme point solution (pi,s )i=1,...,k, s∈supp(Dj−1 ) of the following linear
formulation:
" k
#
X
1
1−
Es∼Dj−1
(2)
pi,s yi (s) ≥ Es∼Dj−1 [(1 − pl,s )yl (s)]
k
i=1
(l ∈ {1, ..., k})
k
X
pi,s = 1 (∀s ∈ supp(Dj−1 ))
(3)
pi,s ≥ 0 (∀s ∈ supp(Dj−1 ), i ∈ {1, ..., k}).
(4)
i=1
Construct a new distribution Dj :
Dj ←
k
[
{(pi,s · PrDj−1 [s], se(j) ,i ) | s ∈ supp(Dj−1 ), pi,s > 0}
i=1
se(j) ,i (e) =
end for
return arg maxs∈supp(Dn ) {f (s)}
(
s(e)
i
(e 6= e(j) )
(e = e(j) )
!
.
(5)
In the algorithm, we construct a distribution D which satisfies Es∼D [f (s)] ≥
Then the algorithm outputs the best solution in supp(D) := {s |
(p, s) ∈ D}. We can see the right hand side of (2) in Algorithm 3 is the expected value of the left hand side of (1) for s ∼ Dj−1 with i∗ = l. it is because
P
i6=l pi,s yl (s) = (1 − pl,s )yl (s). Also the left hand side of (2) is the expected
value of the right hand side of (1) with c = 1 − 1/k. From (3) and (4), Dj in (5)
is constructed as a distribution.
k
2k−1 f (o).
Algorithm 3 achieves the same approximation ratio as Algorithm 2.
Theorem 3. Let o be a maximizer of a monotone nonnegative k-submodular
k
f (o).
function f and let z be the output of Algorithm 3. Then f (z) ≥ 2k−1
Proof. We consider the j-th iteration. From (5), we get
Es∼Dj−1
" k
X
i=1
#
pi,s yi (s) = Es∼Dj−1
= Es∼Dj−1
"
"
k
X
#
pi,s (f (se(j) ,i ) − f (s))
i=1
k
X
#
pi,s f (se(j) ,i ) − f (s)
i=1
′
= Es′ ∼Dj [f (s )] − Es∼Dj−1 [f (s)] .
(6)
Now, we consider o[s] := (o ⊔ s) ⊔ s. Define the variables as follows:
r(e) =
(
o[s](e) (e 6= e(j) )
0
(e = e(j) )
ai (s) = ∆e(j) ,i f (r)
Then we have
f (o[s]) − f (o[se(j) ,i ]) = ai∗ (s) − ai (s) (i∗ = o(e(j) ))
(7)
From monotonicity and orthant submodularity of f , we have
ai∗ (s) − ai (s) ≤ yi∗ (s).
(8)
From (7) and (8), we get
Es∼Dj−1 [f (o[s])] − Es′ ∼Dj [f (o[s′ ])] = Es∼Dj−1
= Es∼Dj−1
"
"
k
X
#
pi,s f (o[s]) − f (o[se(j) ,i ])
i=1
k
X
pi,s
i=1
= Es∼Dj−1
≤ Es∼Dj−1
#
f (o[s]) − f (o[se(j) ,i ])
X
pi,s (ai∗ (s) − ai (s))
X
pi,s (yi∗ (s))
i6=i∗
i6=i∗
= Es∼Dj−1 [(1 − pi∗ ,s ) (yi∗ (s))] .
(9)
pi,s satisfies (2) for all l ∈ {1, 2, ..., k}. Hence we obtain
1
Es′ ∼Dj [f (s′ )] − Es∼Dj−1 [f (s)] ≥ Es∼Dj−1 [f (o[s])]−Es′ ∼Dj [f (o[s′ ])]
1−
k
(10)
from (6) and (9). By the summation of (10), we get
1
(Es′ ∼Dn [f (s′ )] − Es∼D0 [f (s)]) ≥ Es∼D0 [f (o[s])] − Es′ ∼Dn [f (o[s′ ])] .
1−
k
(11)
Note that o[s′ ] = s′ for s′ ∈ supp(Dn ), and o[s] = o for s ∈ supp(D0 ). Now we
have
1
1
′
′
Es ∼Dn [f (s )] − 1 −
f (0)
f (o) ≤ 2 −
k
k
1
≤ 2−
Es′ ∼Dn [f (s′ )]
k
1
≤ 2−
max {f (s′ )}
k s′ ∈supp(Dn )
The algorithm performs a polynomial number of value oracle queries.
Theorem 4. Algorithm 3 returns a solution after O(n2 k 2 ) value oracle queries.
Proof. Algorithm 3 uses the value oracle to caluculate yi (s). At j-th iteration,
the number of yi (s) is k|Dj−1 |. From (5), |Dj | equals the number of pi,s 6= 0.
Then we have to consider pi,s 6= 0 at j-th iteration.
By the definition, (pi,s )i=1,...,k, s∈supp(Dj−1 ) is an extreme point solution of
(2), (3), and (4). Note that, we can get a solution by setting (pi,s ) as the distribution of Algorithm 2 for each s ∈ supp(Dj−1 ). We can also see the feasible
region of (2), (3), and (4) is bounded. Then some extreme point solution exists.
Let |Dj−1 | = m. By (pi,s )i=1,...,k, s∈supp(Dj−1 ) ∈ Rkm and k equalities of
(3), km − k inequalities are tight at any extreme point solution. (2) have m
inequalities and (4) have km inequalities. Then, at least km − k − m inequalities
of (4) are tight. Hence, the number of pi,s 6= 0 is at most m + k.
Now we have |Dj | ≤ |Dj−1 | + k. We can also see |Dj | ≤ jk + 1. Then the
number of value oracle queries is
n
X
j=1
k|Dj−1 | ≤
n
X
k(jk + 1).
j=1
In our algorithm, we have to search for an extreme point solution. We can do
it by solving LP for some objective function. If we use LP for our algorithm, it
is polynomial-time not only for the number of queries but also for the number of
operations. The simplex method is not proved to be a polynomial-time method.
However, it is practical. Our algorithm needs only an extreme point solution,
then if we get a basic solution, it is enough. So we can use the first phase of
two-phase simplex method to find an extreme point solution.
5
Conclusion
We showed a derandomized algorithm for monotone k-submodular maximizak
tion. It is 2k−1
-approximation and polynomial-time algorithm.
One of open problems is a faster method for finding an extreme point solution
of the linear formulation. For submodular functions, [1] showed greedy methods
are effective. It is because their formulation is the form of fractional knapsack
problem. Our formulation is similar to theirs, and ours can be seen as the form of
an LP relaxation of multidimensional knapsack problem. However, faster methods are not given than general LP solutions. The number of constraints in our
formulation depends on k and the number of iterations. It is therefore difficult
to find an extreme point faster.
Constructing a deterministic algorithm for nonmonotone functions is also an
important open problem. For nonmonotone functions, we have pairwise monotonicity instead of monotonicity. In such a situation, for some i, ai can be negative. However, if yj > 0 for all j, we can’t find such i. Then, if we try to
use the same derandomizing method, the number of constraints in the linear
formulation and the size of D will be exponential. So algorithm can’t finish in
polynomial-time.
References
1. N. Buchbinder and M. Feldman. Deterministic algorithms for submodular maximization problems. In Proceedings of the Twenty-Seventh Annual ACM-SIAM
Symposium on Discrete Algorithms, pages 392–403. SIAM, 2016.
2. N. Buchbinder, M. Feldman, J. Seffi, and R. Schwartz. A tight linear time (1/2)approximation for unconstrained submodular maximization. SIAM Journal on
Computing, 44(5):1384–1402, 2015.
3. U. Feige, V. S. Mirrokni, and J. Vondrak. Maximizing non-monotone submodular
functions. SIAM Journal on Computing, 40(4):1133–1153, 2011.
4. M. Grötschel, L. Lovász, and A. Schrijver. The ellipsoid method and its consequences
in combinatorial optimization. Combinatorica, 1(2):169–197, 1981.
5. S. Iwata, L. Fleischer, and S. Fujishige. A combinatorial strongly polynomial algorithm for minimizing submodular functions. Journal of the ACM, 48(4):761–777,
2001.
6. S. Iwata, S. Tanigawa, and Y. Yoshida. Bisubmodular function maximization and
extensions. Technical report, Technical Report METR 2013-16, The University of
Tokyo, 2013.
7. S. Iwata, S. Tanigawa, and Y. Yoshida. Improved approximation algorithms for ksubmodular function maximization. In Proceedings of the Twenty-Seventh Annual
ACM-SIAM Symposium on Discrete Algorithms, pages 404–413. SIAM, 2016.
8. A. Schrijver. A combinatorial algorithm minimizing submodular functions in
strongly polynomial time. Journal of Combinatorial Theory, Series B, 80(2):346–
355, 2000.
9. J. Ward and S. Živný. Maximizing k-submodular functions and beyond. ACM
Trans. Algorithms, 12(4):47:1–47:26, August 2016.
| 8cs.DS
|
1
Graph Distances and Controllability of Networks
arXiv:1608.04309v1 [cs.SY] 15 Aug 2016
A. Yasin Yazıcıoğlu, Waseem Abbas, and Magnus Egerstedt
Abstract—In this technical note, we study the controllability of
diffusively coupled networks from a graph theoretic perspective.
We consider leader-follower networks, where the external control
inputs are injected to only some of the agents, namely the leaders.
Our main result relates the controllability of such systems to the
graph distances between the agents. More specifically, we present
a graph topological lower bound on the rank of the controllability
matrix. This lower bound is tight, and it is applicable to systems
with arbitrary network topologies, coupling weights, and number
of leaders. An algorithm for computing the lower bound is also
provided. Furthermore, as a prominent application, we present
how the proposed bound can be utilized to select a minimal set
of leaders for achieving controllability, even when the coupling
weights are unknown.
I. I NTRODUCTION
Networks of diffusively coupled agents appear in numerous
systems such as sensor networks (e.g., [1]), distributed robotics
(e.g., [2]), power grids (e.g., [3]), social networks (e.g., [4]),
and biological systems (e.g., [5]). A central question regarding
such networks is whether a desired global behavior can be
induced by directly manipulating only a small subset of the
agents, referred to as the “leaders” in the network. This
question has motivated numerous studies on the controllability
of networks. In particular, there has been a large interest in
relating the network controllability to the structure of the interaction graph. In this technical note, we relate the controllability
of diffusively coupled agents with single integrator dynamics
to the distances between the nodes on the interaction graph.
Various graph theoretic tools have recently been utilized
to provide some topology based characterizations of network
controllability. Some of the graph theoretic constructs that are
widely employed for this purpose include equitable partitions
(e.g., [6], [7]), maximum matching (e.g., [8], [11]), centrality
based measures (e.g., [13], [14]), and dominating sets (e.g.,
[15]). Recently, the graph distances have been used to acquire further insight on how the network structure and the
locations of the leaders influence the network controllability
[16], [17], [18]. The graph distances, which rely purely on the
shortest paths between the nodes, provide a computationally
tractable and perceptible characterization of the graph structure. Thus, the distance-based relationships reveal some innate
connections between the network topology and the network
controllability.
The main contribution of this technical note is a distancebased tight lower bound on the dimension of the controllable
A. Yasin Yazıcıoğlu is with the Laboratory for Information and Decision
Systems, Massachusetts Institute of Technology, [email protected].
Waseem Abbas is with the Institute for Software Integrated Systems,
Vanderbilt University, [email protected]
Magnus Egerstedt is with the School of Electrical and Computer Engineering, Georgia Institute of Technology, [email protected].
The paper was presented in part at the 51st IEEE Conference on Decision
and Control, Maui, HI, December 10-13, 2012 (see [18]).
subspace (Theroem 3.2). The bound is generic in the sense
that it is applicable to systems with arbitrary network topologies, coupling weights, and number of leaders. Based on the
distances between the leaders and the followers, we first define
the distance-to-leaders (DL) vectors. Then, we define a certain
ordering rule and derive the lower bound as the maximum
length of the sequences of the DL vectors that satisfy the rule
(Section III). An algorithm to compute the proposed bound is
also presented in Section IV.
A prominent attribute of the proposed bound is that, unlike
the dimension of the controllable subspace, it does not depend
on the coupling weights. Thus, the bound is useful in many
applications, particularly when the information about the network is incomplete. As an example, in Section V, we present
how the bound can be used in leader selection for achieving the
controllability of any given network, even when the coupling
weights are unknown. Finally, some conclusions are provided
in Section VI.
II. P RELIMINARIES
A. Graph Theory
A graph G = (V, E) consists of a node set
V = {1, 2, . . . , n} and an edge set E ⊆ V × V . For an
undirected graph, each edge is represented as an unordered
pair of nodes. For each i ∈ V , let Ni denote the neighborhood
of i, i.e.,
Ni = {j ∈ V | (i, j) ∈ E}
(1)
A path between a pair of nodes i, j ∈ V is a sequence of
nodes {i, . . . , j} such that each pair of consecutive nodes are
linked by an edge. The distance between the nodes, dist(i, j),
is equal to the number of the edges that belong to the shortest
path between the nodes. A graph is connected if there exists
a path between every pair of nodes. A graph is weighted if
there is a corresponding weighting function w : E 7→ R+ . The
adjacency matrix, A, of a weighted graph is defined as
w(i, j) if (i, j) ∈ E
Aij =
(2)
0
otherwise.
For any adjacency matrix A, the corresponding degree matrix,
∆, is defined as
P
if i = j
k∈Ni Aik
∆ij =
(3)
0
otherwise,
The graph Laplacian, L, is defined as the difference of the
degree matrix and the adjacency matrix, i.e.,
L = ∆ − A.
(4)
2
B. Leader-Follower Networks
A network of diffusively coupled agents can be represented
as a graph, where the nodes correspond to the agents, and the
weighted edges exist between the coupled agents. For such a
network G = (V, E), let the dynamics of each agent i ∈ V be
X
w(i, j)(xj − xi ),
(5)
ẋi =
j∈Ni
where xi denotes the state of i, and w(i, j) ∈ R+ represents
the strength of the coupling between i and j.
In a leader-follower setting, the objective is to drive the
overall system by injecting external control inputs to some of
the nodes, which are called the leaders. The set of leaders
can be represented as L = {l1 , . . . , lm } ⊆ V , where, without
loss of generality, the leaders are labeled such that lj < lj+1 .
For any leader-follower network, a global state vector x can
be obtained by stacking the states of all the nodes. Without
loss of generality, let x ∈ Rn , and let u ∈ Rm be the control
input injected to the leaders. Then, the overall dynamics of
the system can be expressed as
ẋ = −Lx + Bu,
where B is an n × m matrix with the following entries
1 if i = lj .
Bij =
0 otherwise.
(6)
(7)
For the system in (6), the controllable subspace consists of
the states that can be reached from x(0) = 0 in any finite time
via an appropriate choice of u(t). The controllable subspace
is the range space of the controllability matrix, i.e.,
Γ = B (−L)B (−L)2 B . . . (−L)n−1 B . (8)
III. L EADER -F OLLOWER D ISTANCES AND
C ONTROLLABILITY
In this section, we present a connection between the controllability of networks and the distances of the nodes to the
leaders on the interaction graph. More specifically, we utilize
such distances to define a tight lower bound on the dimension
of the controllable subspace, i.e. the rank of the controllability
matrix. First, we provide some definitions prior to our analysis.
Definition 3.1 (Distance-to-Leaders (DL) Vector): For each
node i in a network with m leaders, the DL vector di ∈ Rm
is defined as
di,j = dist(i, lj ),
(9)
where di,j denotes the j th entry of di , and lj denotes the j th
leader for j ∈ {1, 2, . . . , m}.
In our analysis, we utilize a specific sequence, which we define
as a pseudo-monotonically increasing sequence, of the DL
vectors. For any vector sequence D, let Di be the ith vector
in the sequence, and let Di,j denote the j th entry of Di .
Definition 3.2 (Pseudo-Monotonically Increasing (PMI) Sequence): A sequence D of vectors, where each vector is in
Rm , is a PMI sequence if for every Di there exists some
α(i) ∈ {1, 2, · · · , m} such that
Di,α(i) < Dj,α(i) , ∀i < j.
(10)
Condition (10) simply means that if Di is the ith vector in
the sequence with Di,α(i) being its α(i)th entry, then the
corresponding (i.e. α(i)th ) entries of all the subsequent vectors
in the sequence should be greater than Di,α(i) .
Example – Consider the network shown in Fig. 1. For this
network, one can build a PMI sequence of five DL vectors as
D = (D1 , D2 , D3 , D4 , D5 ) = (d1 , d6 , d5 , d3 , d4 )
2
3
0
1
2
,
,
,
,
,
=
0
3
1
2
2
where, for each Di , the α(i)th entry that satisfies (10) is
encircled. For instance, consider D1 , for which α(1) = 1
and D1,1 = 0. Note that the first entries of all the subsequent
vectors are greater than 0. Similarly, for the second vector D2 ,
α(2) = 2 and D2,2 = 0. Note that Dj,2 > 0 for j > 2, and so
on. For this example, another PMI sequence of five DL vectors
could be build as (d1 , d3 , d6 , d5 , d4 ), where α(1) = α(2) = 1
and α(3) = α(4) = α(5) = 2.
h
h
h
0
3
i
1
1
3
i
2
2
2
i
4
1
2
3
h
i
2
1
5
h
i
6
h
3
0
i
Fig. 1. A leader-follower network with two leaders (shown in gray), l1 = 1
and l2 = 6. Each node i has its DL vector di given next to itself.
For any connected G = (V, E) and any set of leaders
L ⊆ V , let DL denote the set of all PMI sequences of the
corresponding DL vectors. Furthermore, let δL denote the
length of the longest sequence in DL , i.e.
δL = max |D|.
(11)
D∈DL
In the following analysis, we show that, for any weighting
function w : E 7→ R+ , the rank of the resulting controllability
matrix is lower bounded by δL .
Lemma 3.1. Let G = (V, E) be a connected graph. Then, for
any weighting function w : E 7→ R+ ,
= 0 if 0 ≤ r < dist(i, j),
r
[(−L) ]ij
(12)
6= 0 if r = dist(i, j),
where dist(i, j) is the distance between i and j on G.
Proof: Using (4), (−L)r can be expanded as
(−L)r = (A − ∆)r = Ar +
r−1
X
(−1)r−m Sm ,
(13)
m=0
where Sm denotes the sum of all matrices that can be
expressed as a multiplication of m copies of A and r − m
copies of ∆. For instance, if r = 2, then S0 = ∆2 and
S1 = A∆ + ∆A. Note that, for w : E 7→ R+ , any matrix
3
that can be represented as such a multiplication has only nonnegative entries since ∆ and A have only non-negative entries.
Moreover, ∆ is a diagonal matrix and, for any connected
graph, it has only positive entries on the main diagonal. As
such, it does not alter the signs of entries when multiplied by
a matrix. Hence,
[Sm ]ij = 0 ⇔ [Am ]ij = 0.
(14)
Using (13),
[(−L)r ]ij = [Ar ]ij +
r−1
X
(−1)r−m [Sm ]ij .
(15)
m=0
Since A is the adjacency matrix of a weighted graph with
positive edge weights, [Ak ]ij is equal to a positive scalar times
the number of walks of length k from node i to node j. Hence,
[Ak ]ij = 0 for all 0 ≤ k < dist(i, j), and [Adist(i,j) ]ij 6= 0
for any connected graph. Consequently, (14) and (15) together
imply (12).
Theorem 3.2. Let G = (V, E) be a connected graph, and let
L ⊆ V be the set of leaders. Then, for any weighting function
w : E 7→ R+ , the controllability matrix Γ satisfies
rank(Γ) ≥ δL ,
(16)
where δL is defined in (11).
Proof: For any connected G = (V, E) and any set
of leaders L, let {d1 , d2 , · · · , dn } be the corresponding DL
vectors. Let D = (D1 , D2 , · · · , DδL ) be a PMI sequence of
maximum length. Now, consider vectors of the form
(−L)rp bα(p) ,
(17)
where α(p) is the index of Dp as per the definition of a PMI
sequence (Definition 3.2), rp = Dp,α(p) , and bα(p) denotes
the α(p)th column of the input matrix B. If Dp corresponds
to the DL vector of node i, i.e. Dp = di , then rp = di,α(p) .
As a result of Lemma 3.1, ith entry of the vector in (17) is
non-zero. Also, for any node j with dj,α(i) > di,α(i) , the j th
entry of the vector in (17) equal to zero. Using this along with
the definition of PMI sequences, we conclude that the n × δL
matrix
(−L)r1 bα(1) (−L)r2 bα(2) . . . (−L)rδL bα(δL ) ,
(18)
has a full column rank since each column contains the leftmost non-zero entry in some rows. Note that for every
p ∈ {1, 2, . . . , δL }, we have rp = Dp,α(p) ≤ n − 1 since
the distance between any two nodes is always smaller than or
equal to n − 1. Hence, each column of the matrix in (18) is
also a column of Γ. Consequently, rank(Γ) ≥ δL .
Since (16) holds for any weighting function w : E 7→ R+ ,
the proposed lower bound is closely related to the notion
of strong structural controllability. A network is said to be
structurally controllable if and only if there exists w : E 7→ R+
such that the resulting controllability matrix is of full rank
[9]. Furthermore, a network is said to be strongly structurally
controllable if and only if for any w : E 7→ R+ , the resulting
controllability matrix is of full rank [10]. In this regard, the
dimension of controllable subspace in the sense of strong
structural controllability can be defined as the minimum of the
ranks of all controllability matrices obtained by using arbitrary
weighting functions w : E 7→ R+ [12]. Accordingly, δL is
essentially a lower bound on the dimension of controllable
subspace in the sense of strong structural controllability.
We also emphasize that the lower bound in Theorem 3.2 is
tight, i.e., there exist G = (V, E), L ⊆ V , and w : E 7→ R+
such that rank(Γ) = δL . Any cycle graph with two adjacent
nodes being the leaders, or any path graph with a leaf node
being the leader are some of the examples that satisfy (16) with
equality. In these two examples, rank(Γ) = δL follows from
the fact that both cases lead to δL = n, where n is the total
number of nodes in the graph. In the remainder of this section,
we present the connections between the proposed lower bound
and some closely related distance-based measures, namely the
maximum distance to the leaders and the number of unique
DL vectors.
For networks with a single leader, any PMI sequence of
the DL vectors consists of one dimensional vectors with
monotonically increasing entries. Hence, for such networks,
δL is equal to one plus the maximum distance to the leader,
which was indeed proposed in [16] as a lower bound of the
controllability matrix for single-leader networks. An extension
to the case of multiple leaders was later presented in [17] by
taking the maximum of this value among all the leaders, i.e.
µL = max dist(i, j) + 1.
i∈V,j∈L
(19)
The relationship between µL and δL can be seen through
the following observation: If one considers only the PMI
sequences that satisfy (10) for some fixed entry, i.e. α(1) =
. . . = α(|D|), then the longest PMI sequence in this con∗
⊆ DL , has length µL . Hence, one can
strained set, DL
conclude that the following inequality holds for any leaderfollower network:
rank(Γ) ≥ δL ≥ µL .
(20)
In light of (20), while the two quantities are equal for singleleader networks, the proposed lower bound δL is richer than
µL in capturing the controllability of networks with multiple
leaders. In fact, since the maximum distance between any two
nodes in a graph is the diameter of the graph by definition,
µL is always less than or equal to one plus the diameter of
the graph, even when every node is a leader. In general, the
difference between δL and µL depends on the graph topology
and the leader assignment. For instance, the example in Fig. 1
yields δL = 5 and µL = 3. Numerical comparisons of the
bounds for Erdös-Renyi and Barabási-Albert graphs with two
leaders are illustrated in Fig. 2. In this figure, each point on
the plot corresponds to the average value for 50 randomly
generated cases (each case is a randomly generated graph and a
pair of randomly assigned leaders). The results indicate that δL
provides a significantly better utilization of the graph distances
in the controllability analysis of multi-leader networks, even
when the network has only a pair of leaders.
The proposed lower bound is also closely related to the
number of unique DL vectors. For any connected G = (V, E)
4
BA graphs
ER graphs
10
µL
δL
the leaders. If such a pair is assigned as the leaders, then
rank(Γ) < υL .
We would like to conclude this section with a remark
regarding the application of the presented results to directed
networks.
µL
δL
10
Lower bound
Lower bound
8
6
8
6
4
4
2
0.1
0.2
p
0.3
0.4
1
2
3
m
4
5
Fig. 2. Comparison of the lower bounds for two randomly selected leaders
on Erdös-Renyi random graphs with 50 nodes in which any two nodes are
adjacent with the probability p; and Barabási-Albert graph with 50 nodes in
which each new node is connected to m existing nodes through a preferential
attachment strategy.
and any leader set L ⊆ V , let υL be the number of unique DL
vectors. Note that, due to (10), each vector in a PMI sequence
has an entry that is strictly smaller than the corresponding
entries of all the following vectors in that sequence. Hence,
a PMI sequence cannot contain two identical vectors. Consequently, the proposed lower bound is always less than or equal
to the number of unique DL vectors, i.e.
υL ≥ δL .
(21)
The relationship in (21) facilitates a deeper understanding
for potential applications of the proposed lower bound. For
instance, for any k ∈ {1, . . . , n}, having υL = k is a necessary
condition to have δL = k. Hence, it is possible to conclude that
a network is completely controllable as per the proposed lower
bound, only if each follower has a distinctive DL vector. The
relationships in (20) and (21) may naturally yield the question
of whether υL can capture rank(Γ) better than δL and µL .
In the following result, we show that there is no such universal
relationship between rank(Γ) and υL .
Proposition 3.3. For leader-follower networks, the number of
unique DL vectors, υL , is not a universal bound of rank(Γ).
Proof: We prove this statement by providing some examples both for rank(Γ) > υL and for rank(Γ) < υL .
1) A path graph with uniform edge weights is controllable
from any single node if and only if the the number of nodes
is a power of two, i.e. n = 2k for some k ∈ N [19]. Note that,
for a path graph with a single leader, δL = n if and only if
the leader is a leaf node. Hence, for any n = 2k , if a non-leaf
node is the only leader of a path graph with uniform edge
weights, then rank(Γ) > υL .
2) A cycle graph with uniform edge weights is controllable
from any pair of nodes if and only if the the number of nodes
is a prime number [19]. Consider any cycle graph of n nodes
such that n is an odd composite number. For such a graph
with two leaders, the clockwise and counterclockwise paths
between the leaders have different lengths. Hence, any pair
of nodes that have equal distances from one of the leaders
have different distances from the other leader, i.e. υL = n.
Furthermore, in light of [19], there exists a pair of nodes
that render the system uncontrollable if they are assigned as
Remark 3.1 (Directed Networks) The formulation in (1)-(8)
is applicable to directed networks with the interaction graph
G = (V, E), where each (i, j) ∈ E denotes that i is influenced
by j as in (5). For such a network, powers of the adjacency
matrix A have the property that [Ar ]ij = 0 for all 0 ≤ r <
dist(i, j) and [Adist(i,j) ]ij 6= 0, where dist(i, j) is the length
of the shortest directed path from i to j. Hence, by using the
corresponding DL vectors as in (9), the results in both Lemma
3.1 and Theorem 3.2 can be extended to strongly connected
networks (i.e., there exists a directed path from every node to
every other node).
IV. A N A LGORITHM FOR C OMPUTING THE LOWER BOUND
In this section, we present an algorithm to compute the
proposed lower bound, δL . Note that the main contribution
of this work is the lower bound itself, and the algorithm in
this section is provided to facilitate some practical use of our
result.
Let S = {d1 , d2 , . . . , dn } be the set of all DL vectors for a
given leader-follower network. Given these vectors, we present
an iterative way of generating the longest PMI sequences. Let
Cp be the set of all DL vectors that can be assigned as the pth
element of such a sequence D. According to these definitions,
C1 = S. Once a vector from Cp is assigned as the pth element
of the sequence, Dp , and an index α(p) satisfying (10) is
chosen, the resulting Cp+1 can be obtained from Cp as
Cp+1 = {di ∈ Cp | di,α(p) > Dp,α(p) }.
(22)
In order to obtain longer sequences, this iteration must
be continued until Cp = ∅. However, in general there are
too many possible sequences that can be obtained this way,
and it is not feasible to find the maximum length for PMI
sequences by searching among all these possibilities. Instead,
we present a necessary condition for a PMI sequence to
have the maximum possible length. This necessary condition
significantly lowers the number of sequences to consider.
Lemma 4.1. Let D be a PMI sequence of DL vectors with
the maximum possible length, then its pth entry, Dp , satisfies
Dp,α(p) = min di,α(p) .
di ∈Cp
(23)
Proof: For the sake of contradiction, assume that this is
not true for a PMI sequence D with the maximum length.
Then, there exists a DL vector dj ∈ Cp such that dj,α(p) <
Dp,α(p) . By the construction of a PMI sequence, dj can not
be added to this sequence after Dp . However, dj can be
added right before Dp while keeping all the other parts of
D the same since dj,α(p) can be selected to satisfy (10) in
the resulting sequence. Hence, it is possible to obtain a longer
PMI sequence, which leads to the contradiction that D does
not have the maximum possible length.
5
In light of (22), as far as the sequence length is concerned,
the only important decision at each step p in building a PMI
sequence satisfying (23) is the choice of α(p). Based on this
observation, we propose Algorithm I for computing the lower
bound.
Algorithm I
1: initialize: C1 = {{d1 , d2 , . . . , dn }}; p = 1
2: while Cp,y =
6 ∅ for some y ∈ {1, · · · , |Cp |} do
3:
q=1
4:
for i = 1 : |Cp | do
5:
if Cp,i =
6 ∅ then
6:
for j = 1 : m do
7:
Cp+1,q = {dt ∈ Cp,i | dt,j > min ds,j }
to an element of Cp that is computed in the (p − 1)st iteration
of the while loop. The left child of a node Cp,i is obtained
from Cp,i by deleting all the DL vectors whose first entries
are equal to the minimum value of the first entries among all
the DL vectors in Cp,i , i.e., obtained from Cp,i as per (23) and
(22) for α(p) = 1. Similarly, the right child of a node Cp,i
is obtained by following the same procedure for α(p) = 2.
Accordingly, the elements in the first three levels are
C2,1
ds ∈Cp,i
8:
q =q+1
9:
end for
10:
end if
11:
end for
12:
p=p+1
13: end while
14: return p − 1
C2,2
C3,1
Proposition 4.2. Given the DL vectors for any connected
leader-follower network, Algorithm I returns δL .
Proof: By combining (22) and (23) (line 7 of Algorithm
I), at each step p, Algorithm I builds all the possible Cp+1 that
correspond to the PMI sequences of p vectors satisfying (23).
Hence, when Cp,y = ∅ for every y ∈ {1, · · · , |Cp |}, there is not
a longer PMI sequence that satisfies the necessary condition
in Lemma 4.1. Consequently, Algorithm I always returns the
length of the longest PMI sequence, δL .
Note that, in light of Remark 3.1, Algorithm I can also be
used to compute the proposed lower bound for any directed
network with a strongly connected interaction graph.
For a sample run of Algorithm I, consider the network in
Fig. 1. For this example, the algorithm terminates after the
fifth iteration of the while loop, and δL = 5. The resulting
flow of Algorithm I can be represented via a tree diagram as
illustrated in Fig. 3.
C1,1
C1 :
C3 :
Fig. 3.
C2,2
C2,1
C3,1
0
C3,2
C3,3
C3,4
An illustration of the flow of Algorithm I for the network in Fig. 1.
In Fig. 3., each node Cp,i at a given level p > 1 corresponds
C3,4 =
,
3
1
2
0
3
2
1
C3,2 = C3,3 =
In Algorithm I, the variable Cp is the multiset, where
each element Cp,i is the Cp resulting from (22) for specific
choices of α(1), . . . , α(p − 1), subject to the corresponding
PMI sequences satisfying (23). The main while loop iterates as
long as there exists a longer PMI sequence that satisfies (23).
Note that for each Cp,i 6= ∅, there are m (number of leaders)
different Cp+1,q , each corresponding to a particular choice of
α(p). As such, Algorithm I computes δL by generating no
more than mδL elements Cp,i .
C2 :
=
=
=
C1,1 =
0
3
1
,
2
1
,
3
2
,
1
2
,
2
;
0
3
;
3
1
2
0
1
1
2
2
,
,
,
,
;
2
3
1
2
2
3
,
,
;
2
0
1
1
2
2
;
,
,
,
2
3
1
2
1
1
2
,
,
,
.
2
3
2
,
1
,
2
,
2
,
3
V. D ISTANCE -BASED L EADER S ELECTION FOR
C ONTROLLABILITY
One of the main attributes of the proposed lower bound
δL is its independence of the edge weights. In contrast,
rank(Γ) depends on the values of the edge weights unless
there is some constraint such as all the weights being equal.
Consequently, computing δL typically requires significantly
less information about the overall system. This minimality of
the required information makes the lower bound attractive in
many applications such as leader selection for controllability.
Leader selection problems typically require finding a leader
set L that optimizes a system objective such as robustness,
mixing time, or controllability (e.g., [20], [21], [22], [23]).
For instance, consider the problem of finding a minimum
number of leaders that render a given network controllable
under the resulting leader-follower dynamics. If the edge
weights are known (or if they are known to be identical),
then the rank of the controllability matrix can be computed
for any set of leaders. Hence, a possible, yet not scalable,
way to find a minimal set of leaders for controllability is
to execute an exhaustive search. Note that, aside from the
complexity issues, the rank computation is not applicable if
the edge weights are unknown and arbitrary. In such cases,
the leader selection problem needs to be solved by leveraging
the structural properties of the interaction graph.
One approach to achieving controllability under arbitrary
coupling weights is to choose the minimal L that achieves
structural controllability (e.g., [8]). Structural controllability
implies that the selected leaders provide complete controllability for some, not all, weighting functions w : E 7→ R+ .
Hence, this approach may fall short in some applications,
especially when there are constraints on the admissible edge
weights. For instance, if all the edge weights in a network are
equal by design, then it is known that a complete graph is not
controllable by any single leader [6] whereas a single leader is
enough to achieve structural controllability [8]. Alternatively,
6
the notion of strong structural controllability can be employed
in the leader selection (e.g., [11]). In this regard, the proposed
bound δL can be used to ensure that the dimension of the
controllable subspace is not smaller than some desired value,
k ∈ {1, 2, . . . , n}, for any w : E 7→ R+ by formulating the
leader selection problem as
|L|
minimize
L∈2V
(24)
subject to δL ≥ k,
In light of Theorem 3.2, any element in the feasible set of
the problem in (24) renders rank(Γ) ≥ k for any weighting
function w : E 7→ R+ . Note that the problem in (24)
is always feasible, i.e., for any given G = (V, E) and
k ∈ {1, 2, . . . , n}, there always exists some L ⊆ V such that
δL ≥ k. Indeed, the feasibility can be shown by considering
the trivial case, L = V . In that case, for each DL vector, the
entry that contains the distance of the corresponding node
from itself satisfies (10) for any sequence of the corresponding
DL vectors. Consequently, any sequence of the DL vectors
is a PMI sequence if L = V , and δV = n. Note that the
feasibility would not be guaranteed if the problem was posed
by using µL instead of δL since µL is always upper bounded
by one plus the graph diameter. An example, where the leaders
were assigned by solving (24) for k = n, is illustrated in
Fig. 4. For this example, the leaders were selected through an
exhaustive search by first looking for a single-leader solution
and incrementing the number of leaders until a solution exists.
Algorithm I was used to compute δL for each candidate L.
1
2
15
3
12
4
5
6
14
13
11
8
10
7
9
Fig. 4. A graph of 15 nodes, G = (V, E), and a minimal selection of leaders
(shown in gray), L = {2, 6, 9, 12, 14, 15}, such that δL = 15. The network
is completely controllable via L for any weighting function w : E 7→ R+ .
VI. C ONCLUSION
In this technical note, we presented that the distances
between the leaders and the followers on the interaction graph
contain some fundamental information about the controllability of the leader-follower networks. In particular, we used the
distance-to-leaders (DL) vectors to derive a tight lower bound
on the dimension of the controllable subspace. The proposed
bound is applicable to networks with arbitrary interaction
graphs and weighting functions w : E 7→ R+ . We also
provided some connections between the proposed lower bound
and a pair of closely related distance-based measures, namely
the maximum distance from the leaders and the number
of distinct DL vectors. While the results were presented
for undirected networks, we also showed how they can be
extended to directed networks. Furthermore, we presented
an algorithm for computing the lower bound. The proposed
bound may find its applications in various networked control
problems, especially when the edge weights are unknown. As
a prominent application, we presented how it can be utilized
to find a minimal set of leaders that ensure the controllability
of a leader-follower network with a given interaction graph
under any weighting function w : E 7→ R+ .
R EFERENCES
[1] A. Speranzon, C. Fischione, and K. H. Johansson, “Distributed and collaborative estimation over wireless sensor networks”, IEEE Conference
Decision and Control, pp. 1025–1030, 2006.
[2] A. Jadbabaie, J. Lin and A. S. Morse, “Coordination of groups of mobile
autonomous agents using nearest neighbor rules”, IEEE Transactions on
Automatic Control, 48(6): 988–1001, 2003.
[3] F. Dorfler and F. Bullo, “Synchronization and transient stability in
power networks and nonuniform Kuramoto oscillators”, SIAM Journal
on Control and Optimization, 50(3): 1616–1642, 2012.
[4] J. Ghaderi and R. Srikant, “Opinion dynamics in social networks: A local
interaction game with stubborn agents,” American Control Conference,
pp. 1982–1987, 2013.
[5] S. Gu et al., “Controllability of structural brain networks,” Nature
Communications, 6, 2015.
[6] A. Rahmani, M. Ji and M. Egerstedt, “Controllability of multi-agent
systems from a graph theoretic perspective”, SIAM J. Control Optim.,
48(1): 162–186, 2009.
[7] M. Egerstedt, S. Martini, M. Cao, K. Camlibel, and A. Bicchi, “Interacting with networks: How does structure relate to controllability in
single-leader consensus networks?” IEEE Control Systems Magazine,
32(4): 66–73, 2012.
[8] Y.-Y. Liu, J.-J Slotine, and A.-L.Barabási, “Controllability of complex
networks,” Nature, 473(7346): 167–173, 2011.
[9] C.-T Lin, “Structural controllability,” IEEE Transactions on Automatic
Control, 19(3): 201–208, 1974.
[10] H. Mayeda and T. Yamada, “Strong structural controllability,” SIAM
Journal on Control and Optimization, 17(1): 123–138, 1979.
[11] A. Chapman and M. Mesbahi, “On strong structural controllability
of networked systems: a constrained matching approach,” American
Control Conference, pp. 6126–6131, 2013.
[12] J. Jarczyk, F. Svaricek, and B. Alt, “Strong structural controllability of
linear systems revisited,” IEEE Conference on Decision and Control,
pp. 1213–1218, 2013.
[13] Y.-Y.Liu, J.-J Slotine, and A.-L.Barabási, “Control centrality and hierarchical structure in complex networks,” Plos One, 7(9), 2012.
[14] Y. Pan and X. Li, “Structural controllability and controlling centrality
of temporal networks,” PloS One, 9(4), 2014.
[15] J. C. Nacher and T. Akutsu, “Analysis of critical and redundant nodes in
controlling directed and undirected complex networks using dominating
sets,” Journal of Complex Networks, 2(4): 394–412, 2014.
[16] S. Zhang, M. K. Camlibel, and M. Cao, “Controllability of diffusivelycoupled multi-agent systems with general and distance regular coupling
topologies”, IEEE Conference on Decision and Control, 2011.
[17] S. Zhang, M. Cao, and M. K. Camlibel, “Upper and lower bounds for
controllable subspaces of networks of diffusively coupled agents,” IEEE
Transactions on Automatic Control, 59(3): 745–750, 2014.
[18] A. Y. Yazıcıoğlu, W. Abbas, and M. Egerstedt, “A tight lower bound on
the controllability of networks with multiple leaders,” IEEE Conference
on Decision and Control, pp. 1978–1983, 2012.
[19] G. Parlangeli and G. Notarstefano, “On the reachability and observability
of path and cycle graphs,” IEEE Transactions on Automatic Control,
57(3): 743–748, 2012.
[20] F. Lin, M. Fardad, and M. R. Jovanovic, “Algorithms for leader selection
in stochastically forced consensus networks,” IEEE Transactions on
Automatic Control, 59(7): 1789–1802, 2014.
[21] A. Clark, B. Alomair, L. Bushnell, and R. Poovendran, “Leader selection
in multi-agent systems for smooth convergence via fast mixing,” IEEE
Conference on Decision and Control, pp. 818–824, 2012.
[22] A. Y. Yazıcıoğlu and M. Egerstedt, “Leader selection and network
assembly for controllability of leader-follower networks,” American
Control Conference, pp. 3802–3807, 2013.
[23] C. O. Aguilar and B. Gharesifard, “Graph controllability classes for the
Laplacian leader-follower dynamics,” IEEE Transactions on Automatic
Control, 60(6): 1611–1623, 2015.
| 3cs.SY
|
Continuous Hands-off Control by
CLOT Norm Minimization
Niharika Challapalli ∗ Masaaki Nagahara ∗∗
Mathukumalli Vidyasagar ∗∗∗
arXiv:1611.02071v1 [cs.SY] 7 Nov 2016
∗
Department of Electrical Engineering University of Texas at Dallas
Richardson, TX 75080, USA (e-mail: [email protected])
∗∗
Institute of Environmental Science and Technology, The University
of Kitakyushu, Hibikino 1-1, Wakamatsu-ku, Kitakyushu, Fukuoka
808-0135, JAPAN (e-mail: [email protected]).
∗∗∗
Department of Systems Engineering, University of Texas at Dallas,
Richardson, TX 75080, USA, and Department of Electrical
Engineering, Indian Institute of Technology Hyderabad, Kandi,
Telangana, India 502285 (e-mail: [email protected],
[email protected])
Abstract: In this paper, we consider hands-off control via minimization of the CLOT
(Combined L-One and Two) norm. The maximum hands-off control is the L0 -optimal (or the
sparsest) control among all feasible controls that are bounded by a specified value and transfer
the state from a given initial state to the origin within a fixed time duration. In general, the
maximum hands-off control is a bang-off-bang control taking values of ±1 and 0. For many real
applications, such discontinuity in the control is not desirable. To obtain a continuous but still
relatively sparse control, we propose to use the CLOT norm, a convex combination of L1 and
L2 norms. We show by numerical simulation that the CLOT control is continuous and much
sparser (i.e. has longer time duration on which the control takes 0) than the conventional EN
(elastic net) control, which is a convex combination of L1 and squared L2 norms.
Keywords: Optimal control, convex optimization, sparsity, maximum hands-off control,
bang-off-bang control
1. INTRODUCTION
Sparsity has recently emerged as an important topic in
signal/image processing, machine learning, statistics, etc.
If y ∈ Rm and A ∈ Rm×n are specified with m < n, then
the equation y = Ax is underdetermined and has infinitely
many solutions for x if A has rank m. Finding the sparsest
solution (that is, the solution with the fewest number of
nonzero elements) can be formulated as
min kzk0 subject to Az = b.
z
However, this problem is NP hard, as shown in (Natarajan,
1995). Therefore other approaches have been proposed for
this purpose. This area of research is known as “sparse regression.” One of the most popular is LASSO (Tibshirani,
1996), also referred to as basis pursuit (Chen et al., 1999),
in which the ℓ0 -norm is replaced by the ℓ1 -norm. Thus the
problem becomes
min kzk1 subject to Az = b.
z
The advantage of LASSO is that it is a convex optimization problem and therefore very large problems can be
solved efficiently, for example by using the Matlab-based
package cvx (Grant and Boyd, 2014). Moreover, under
mild technical assumptions, the LASSO-optimal solution
has no more than m nonzero components (Osborne et al.,
2000). However, the exact location of the nonzero components is very sensitive to the vector y. To overcome this
deficiency, another approach known as the Elastic Net was
proposed in (Zou and Hastie, 2005), where the ℓ1 norm in
LASSO is replaced by a weighted sum of ℓ1 and squared
ℓ2 norms. This leads to the optimization problem
min λ1 kzk1 + λ2 kzk22 subject to Az = b,
z
where λ1 and λ2 are positive weights such that λ1 +λ2 = 1.
It is shown in (Zou and Hastie, 2005, Theorem 1) that the
EN formulation gives the grouping effect ; If two columns of
the matrix A are highly correlated, then the corresponding
components of the solution for x have nearly equal values.
This ensures that the solution for x is not overly sensitive
to small changes in y. The name “elastic net” is meant
to suggest a stretchable fishing net that retains all the big
fish.
During the past decade and a half, another research area
known as “compressed sensing” has witnessed a great deal
of interest. In compressed sensing, the matrix A is not
specified; rather, the user gets to choose the integer m
(known as the number of measurements), as well as the
matrix A. The objective is to choose the matrix A as well
as a corresponding “decooder” map ∆ : Rm → Rn such
that, the unknown vector x is sparse and the measurement
vector y equals Ax, then ∆(Ax) = x for all sufficiently
sparse vectors x. More generally, if measurement vector
y = Ax + η where η is the measurement noise, and the
vector x is nearly sparse (but not exactly sparse), then
the recovered vector ∆(Ax + η) should be sufficiently close
to the true but unknown vector x. This is referred to as
“robust sparse recovery.” Minimizing the ℓ1 -norm is among
the more popular decoders. See the books by (Elad, 2010),
(Eldar and Kutyniok, 2012), and (Foucart and Rauhut,
2013) for the theory and some applications. Due to its
similarity to the LASSO formulation of (Tibshirani, 1996),
this approach to compressed sensing is also referred to as
LASSO.
Until recently the situation was that LASSO achieves
robust sparse recovery in compressed sensing, but did not
achieve the grouping effect in sparse regression. On the flip
side, EN achieves the grouping effect, but it was not known
whether it achieves robust sparse recovery. A recent paper
(Ahsen et al., 2016) sheds some light on this problem. It
is shown in (Ahsen et al., 2016) that EN does not achieve
robust sparse recovery. To achieve both the grouping effect
in sparse regression as well as robust sparse recovery in
compressed sensing, (Ahsen et al., 2016) has proposed the
CLOT (Combined L-One and Two) formulation:
min λ1 kzk1 + λ2 kzk2 subject to Az = b and λ1 + λ2 = 1.
z
The difference between EN and CLOT is the ℓ2 norm term;
EN has the squared ℓ2 norm while CLOT has the pure
ℓ2 norm. This slight change leads to both the grouping
effect and robust sparse recovery, as shown in (Ahsen et al.,
2016).
In parallel with these advances in sparse regression and recovery of unknown sparse vectors, sparsity techniques have
also been applied to control. Sparsity-promoting optimization has been applied to networked control in (Nagahara
et al., 2014), where quantization errors and data rate can
be reduced at the same time by sparse representation of
control packets. Other examples of control applications include optimal controller placement by (Casas et al., 2012;
Clason and Kunisch, 2012; Fardad et al., 2011), design of
feedback gains by (Lin et al., 2013; Polyak et al., 2013),
state estimation by (Charles et al., 2011), to name a few.
More recently, a novel control called the maximum handsoff control has been proposed in (Nagahara et al., 2016) for
continuous-time systems. The maximum hands-off control
is the L0 -optimal control (the control that has the minimum support length) among all feasible controls that are
bounded by a fixed value and transfer the state from a
given initial state to the origin within a fixed time duration. Such a control is effective for reduction of electricity or fuel consumption; an electric/hybrid vehicle shuts
off the internal combustion engine (i.e. hands-off control)
when the vehicle is stopped or the speed is lower than a
preset threshold; see (Chan, 2007) for example. Railway
vehicles also utilize hands-off control, often called coasting control, to cut electricity consumption; see (Liu and
Golovitcher, 2003) for details. In (Nagahara et al., 2016),
the authors have proved the theoretical relation between
the maximum hands-off control and the L1 optimal control under the assumption of normality. Also, important
properties of the maximum hands-off control have been
proved in (Ikeda and Nagahara, 2016) for the convexity of
the value function, and in (Chatterjee et al., 2016) for the
existence and the discreteness.
In general, the maximum hands-off control is a bang-offbang control taking values of ±1 and 0. For many real
applications, such a discontinuity property is not desirable.
To obtain a continuous but still sparse control, (Nagahara
et al., 2016) has proposed to use a combined L1 and
squared L2 minimization, like EN mentioned above. Let
us call this control an EN control. As in the case of EN
in the vector optimization, the EN control often shows
much less sparse (i.e. has a larger L0 norm) than the
maximum hands-off control. Then, we proposed to use the
CLOT norm, a convex combination of L1 and non-squared
L2 norms. We call the minimum CLOT-norm control the
CLOT control. We show by numerical simulation that the
CLOT control is continuous and much sparser (i.e. has
longer time duration on which the control takes 0) than
the conventional EN control.
The remainder of this article is organized as follows. In
Section 2, we formulate the control problem considered in
this paper. In Section 3, we give a discretization method
to numerically compute the optimal control. Results of the
numerical computations on a variety of problems are presented in Section 4. These examples illustrate the advantages of the CLOT control compared with the maximum
hands-off control and the EN control. We present some
conclusions in Section 5.
Notation
Let T > 0 and m ∈ N. For a continuous-time signal
u(t) ∈ R over a time interval [0, T ], we define its Lp (p ≥ 1)
and L∞ norms respectively by
Z T
1/p
p
kukp ,
|u(t)| dt
, kuk∞ , sup |u(t)|.
t∈[0,T ]
0
We denote the set of all signals with kukp < ∞ by Lp [0, T ]
for p ≥ 1 or p = ∞. We define the L0 norm of a signal u(t)
on the interval [0, T ] as
Z T
φ0 (u(t))dt,
kuk0 ,
0
where φ0 is the L0 kernel function defined by
1, if α 6= 0,
φ0 (α) ,
0, if α = 0
(1)
for a scalar α ∈ R. The L0 norm can be represented by
kuk0 = µL supp(u) ,
where supp(u) is the support of the signal u, and µL is the
Lebesgue measure on R.
2. PROBLEM FORMULATION
Let us consider a linear time-invariant system described
by
dx
(t) = Ax(t) + Bu(t), t ≥ 0, x(0) = ξ.
(2)
dt
Here we assume that x(t) ∈ Rn , u(t) ∈ R, and the initial
state x(0) = ξ is fixed and given. The control objective is
to drive the state x(t) from x(0) = ξ to the origin at time
T > 0, that is
x(T ) = 0.
(3)
We limit the control u(t) to satisfy
kuk∞ ≤ Umax
(4)
for fixed Umax > 0.
If the system (2) is controllable and the final time T is
larger than the optimal time T ∗ (the minimal time in
which there exist a control u(t) that drives x(t) from
x(0) = ξ to the origin; see (Hermes and Lasalle, 1969)),
then there exists at least one u(t) ∈ L∞ [0, T ] that satisfies
equations (2), (3), and (4). Let us call such a control a
feasible control. From (2) and (3), any feasible control u(t)
on [0, T ] satisfies
Z T
eA(T −t) Bu(t)dt,
0 = x(T ) = eAT ξ +
0
or
Z
First, we divide the time interval [0, T ] into N subintervals,
[0, T ] = [0, h) ∪ · · · ∪ [(N − 1)h, N h], where h is the
discretization step (or the sampling period) such that
T = N h. We assume that the state x(t) and the control
u(t) in (2) are constant over each subinterval. On the
discretization grid, t = 0, h, . . . , N h, the continuous-time
system (2) is described as
xd [m + 1] = Ad xd [m] + Bd ud [m], m = 0, 1, . . . , N − 1,
(11)
where xd [m] , x(mh), ud [m] , u(mh), and
Z h
Ad , eAh , Bd ,
eAt Bdt.
(12)
0
T
e
−At
Bu(t)dt + ξ = 0.
(5)
0
Define a linear operator Φ : L∞ [0, T ] → Rn by
Z T
Φu ,
e−At Bu(t)dt, u ∈ L∞ [0, T ].
0
By this, we define the set U of the feasible controls by
U , {u ∈ L∞ : Φu + ξ = 0, kuk∞ ≤ 1} .
Define the control vector
ud , [ud [0], ud[1], . . . , ud [N − 1]]⊤ .
Note that the final state x(T ) can be described as
x(T ) = xd [N ] = AN
d ξ + ΦN ud ,
(14)
−1
−2
ΦN , AN
Bd , AN
Bd , . . . , B d .
d
d
(15)
where
(6)
The problem of the maximum hands-off control is then
described by
min kuk0 subject to u ∈ U.
(7)
u
The L0 problem (7) is very hard to solve since the L0
cost function is non-convex and discontinuous. For this
problem, (Nagahara et al., 2016) has shown that the L0
optimal control in (7) is equivalent to the following L1
optimal control:
min kuk1 subject to u ∈ U,
(8)
Then the set U in (6) is approximately represented by
UN , ud ∈ RN : AN
d ξ + ΦN ud = 0, kud k∞ ≤ 1 . (16)
Next, we approximate the L1 norm of u by
Z T
kuk1 =
|u(t)|dt
=
≈
u
if the plant is normal, that is, if the (2) is controllable and
the matrix A is nonsingular. Let us call the L1 optimal
control as the LASSO control. If the plant is normal, then
the LASSO control is in general a bang-off-bang control
that is piecewise constant taking values in {0, ±1}. The
discontinuity of the LASSO solution is not desirable in real
applications, and a smoothed solution is also proposed in
(Nagahara et al., 2016) as
min kuk1 + λkuk22 subject to u ∈ U,
u
(13)
(9)
where λ > 0 is a design parameter for smoothness. Let us
call this control the EN (elastic net) control. In (Nagahara
et al., 2016), it is proved that the solution of (9) is a
continuous function on [0, T ].
While the EN control is continuous, it is shown by numerical experiments that the EN control is not sometimes
sparse. This is an analogy of the EN for finite-dimensional
vectors that EN does not achieve robust sparse recovery.
Borrowing the idea of CLOT in (Ahsen et al., 2016), we
define the CLOT optimal control problem by
min kuk1 + λkuk2 subject to u ∈ U.
(10)
u
=
0
N
−1 Z (m+1)h
X
m=0 mh
N
−1 Z (m+1)h
X
m=0
N
−1
X
m=0
mh
|u(t)|dt
|ud [m]|dt
(17)
|ud [m]|h
= kud k1 h.
In the same way, we obtain approximation of the L2 norm
of u as
Z
kuk22 =
T
0
|u(t)|2 dt ≈ kud k22 h.
(18)
Finally, the optimal control problems (8), (9) and (10) can
be approximated by
min hkuk1 subject to ud ∈ UN
(19)
ud ∈RN
min hkud k1 + hλkud k22 subject to ud ∈ UN
√
min hkud k1 + hλkud k2 subject to ud ∈ UN
ud ∈RN
ud ∈RN
(20)
(21)
The optimization problems are convex and can be efficiently solved by numerical software packages such as cvx
with Matlab; see (Grant and Boyd, 2014) for details.
We call this optimal control the CLOT control.
4. NUMERICAL EXAMPLES
3. DISCRETIZATION
Since the problems (8)–(10) are infinite dimensional, we
should approximate it to finite dimensional problems. For
this, we adopt the time discretization.
In this section we present numerical results from applying
the CLOT norm minimization approach to seven different
plants, and compare the results with those from applying
LASSO and EN.
Plant
P1 (s)
P1 (s)
P2 (s)
P2 (s)
P3 (s)
P4 (s)
7
P5 (s)
8
9
P6 (s)
P7 (s)
Poles
(0,0,0,0)
(0,0,0,0)
−0.025 ± j
−0.025 ± j
−1 ± 0.2j, ±j
−1 ± 0.2j,
−0.3 ± j
−5 ± j,
−0.3 ±√
2j ,
−1 ± 2 2j
0, 0, 0, 0, ±j
0, 0, 0, 0, ±j
T
20
20
20
20
20
20
x(0)
e4
e4
e2
(10, 1)⊤
e4
e4
λ
1
0.1
0.1
0.1
0.1
0.1
Figs.
1,2
3,4
5,6
7,8
9, 10
11, 12
20
e6
0.1
13, 14
40
40
e6
e6
0.1
0.1
L2 norm of state
25
EN
LASSO
CLOT
20
||x(t)|| 2
No.
1
2
3
4
5
6
15, 16
17, 18
15
10
5
Table 1. Details of various plants studied.
0
4.1 Details of Various Plants Studied
To save space in the table, the plant zeros are not shown;
P3 (s) has a zero at s = −2, P6 (s) has a zero at s = 2,
while P7 (s) has zeros at s = 1, 2. The remaining plants
do not have any zeros, so that the plant numerator equals
one.
Once the plant zeros and poles are specified, the plant numerator and denominator polynomials n, d were computed
using the Matlab command poly. Then the transfer function was computed as P = tf(n,d), and the state space realization was computed as [A,B,C,D] = ssdata(P). The
maximum control amplitude is taken 1, so that the control
must satisfy |u(t)| ≤ 1 for t ∈ [0, T ]. To save space, we
use the notation el to denote an l-column vector whose
elements all equal one. Note that in all but one case, the
initial condition equals en where n is the order of the plant.
10
15
20
Fig. 1. State trajectory for the plant P1 (s) with the initial
state (1, 1, 1, 1)⊤ and λ = 1.
control
1
EN
LASSO
CLOT
0.8
0.6
0.4
0.2
0
-0.2
-0.4
-0.6
-0.8
-1
0
5
10
15
20
t
Fig. 2. Control trajectory for the plant P1 (s) with the
initial state (1, 1, 1, 1)⊤ and λ = 1.
L2 norm of state
25
EN
LASSO
CLOT
Note that, with T = 20, the problems with plants P6 (s)
and P7 (s) are not feasible (meaning that T is smaller than
the minimum time needed to reach the origin); this is why
we took T = 40.
20
||x(t)|| 2
All optimization problems were solved after discretizing
the interval [0, T ] into both 2,000 as well as 4,000 samples,
to examine whether the sampling time affects the sparsity
density of the computed optimal control.
5
t
u(t)
For the reader’s convenience, the details of the various
plants are given in Table 1. The figure numbers show where
the corresponding computational results can be found.
Some conventions are adopted to reduce the clutter in the
table, as described next. All plants are of the form
np
nz
Y
Y
n(s)
P (s) =
(s − pi ).
(s − zi ), d(s) =
, n(s) =
d(s)
i=1
i=1
0
15
10
5
4.2 Plots of Optimal State and Control Trajectories
0
The plots of the ℓ2 -norm (or Euclidean norm) of the
state vector trajectory and the control signal for all these
examples are shown in the next several plots.
We begin with the plant P1 (s), the fourth-order integrator.
Figures 1 and 2 show the state and control trajectories
when λ = 1. The same system is analyzed using a smaller
value of λ = 0.1. One would expect that the resulting
control signals would be more sparse with a smaller λ, and
this is indeed the case. The results are shown in Figures
3 and 4. Based on the observation that the control signal
0
5
10
15
20
t
Fig. 3. State trajectory for the plant P1 (s) with the initial
state (1, 1, 1, 1)⊤ and λ = 0.1.
becomes more sparse with λ = 0.1 than with λ = 1, all
the other plants are analyzed with λ = 0.1.
Figures 5 and 6 display the state trajectory and the
control trajectories of the plant P2 (s) (damped harmonic
oscillator) when the initial state is (1, 1)⊤ . Figures 7 and
L2 norm of state
control
1
12
EN
LASSO
CLOT
0.8
0.6
10
0.4
8
0
||x(t)|| 2
u(t)
0.2
-0.2
-0.4
6
-0.6
-0.8
-1
4
EN
LASSO
CLOT
0
2
4
6
8
10
12
14
16
18
20
t
2
Fig. 4. Control trajectory for the plant P1 (s) with the
initial state (1, 1, 1, 1)⊤ and λ = 0.1.
L2 norm of state
1.5
0
0
5
10
15
20
t
Fig. 7. State trajectory for the plant P2 (s) with the initial
state (10, 1)⊤ and λ = 0.1.
EN
LASSO
CLOT
control
1
1
||x(t)|| 2
0.8
0.6
0.4
0.5
u(t)
0.2
0
-0.2
0
-0.4
0
5
10
15
20
t
-0.6
EN
LASSO
CLOT
-0.8
Fig. 5. State trajectory for the the plant P2 (s) with the
initial state (1, 1)⊤ and λ = 0.1.
control
1
-1
0
5
u(t)
0.6
0.4
5
0.2
4.5
0
4
-0.2
3.5
||x(t)|| 2
-0.4
-0.6
-1
EN
LASSO
CLOT
0
15
20
t
Fig. 8. Control trajectory for the plant P2 (s) with the
initial state (10, 1)⊤ and λ = 0.1.
0.8
-0.8
10
L2 norm of state
EN
LASSO
CLOT
3
2.5
2
1.5
5
10
15
20
t
1
0.5
Fig. 6. Control trajectory for the the plant P2 (s) with the
initial state (1, 1)⊤ and λ = 0.1.
0
0
5
10
15
20
t
8 show the state and control trajectories with the initial
state (10, 1)⊤ . It can be seen that, with this intial state,
the control signal changes sign more frequently.
Fig. 9. State trajectory for the plant P3 (s) with the initial
state (1, 1, 1, 1)⊤ and λ = 0.1.
To compare the sparsity densities of the three control
signals, we compute the fraction of time that each signal
is nonzero. In this connection, it should be noted that
the LASSO control signal is the solution of a linear programming problem; consequently its components exactly
equal zero at many time instants. In contrast, the EN
and CLOT control signals are the solutions of convex
optimization problems. Consequently, there are many time
instants when the control signal is “small” without being
smaller than the machine zero. Therefore, to compute
the sparsity density, we applied a threshold of 10−4 , and
treated a component of a control signal as being zero if
control
1
L2 norm of state
12
EN
LASSO
CLOT
0.8
10
0.6
0.4
8
||x(t)|| 2
u(t)
0.2
0
-0.2
4
-0.4
-0.6
2
EN
LASSO
CLOT
-0.8
-1
6
0
5
10
15
0
20
0
5
t
control
1
EN
LASSO
CLOT
0.8
0.6
3
0.4
2.5
0.2
2
u(t)
||x(t)|| 2
20
Fig. 13. State trajectory for the plant P5 (s) with the initial
state (1, 1, 1, 1, 1, 1)⊤ and λ = 0.1.
L2 norm of state
3.5
0
1.5
-0.2
1
-0.4
-0.6
0.5
EN
LASSO
CLOT
-0.8
0
0
5
10
15
-1
20
t
0
5
20
L2 norm of state
200
0.8
EN
LASSO
CLOT
180
160
0.4
140
||x(t)|| 2
0.6
0.2
0
-0.2
120
100
80
60
40
EN
LASSO
CLOT
-0.4
-0.6
15
Fig. 14. Control trajectory for the plant P5 (s) with the
initial state (1, 1, 1, 1, 1, 1)⊤ and λ = 0.1.
control
1
10
t
Fig. 11. State trajectory for the plant P4 (s) with the initial
state (1, 1, 1, 1)⊤ and λ = 0.1.
u(t)
15
t
Fig. 10. Control trajectory for the plant P3 (s) with the
initial state (1, 1, 1, 1)⊤ and λ = 0.1.
4
10
0
20
5
10
15
20
t
Fig. 12. Control trajectory for the plant P4 (s) with the
initial state (1, 1, 1, 1)⊤ and λ = 0.1.
its magnitude is smaller than this threshold. With this
convention, the sparsity densities of the various control
signals are as shown in Table 2. From this table it can
be seen that the control signal generated using CLOT
norm minimization has significantly lower sparsity density
compared to that of EN, and is not much higher than
0
0
10
20
30
40
t
Fig. 15. State trajectory for the plant P6 (s) with the initial
state (1, 1, 1, 1, 1, 1)⊤ and λ = 0.1.
that of LASSO. Also, as expected, the sparsity density
of LASSO does not change with λ, whereas the sparsity
densities of both EN and CLOT decrease as λ is decreased.
For this reason, in other examples we present only the
results for λ = 0.1.
No.
1
2
3
4
5
6
7
8
9
control
1
0.8
0.6
0.4
u(t)
0.2
0
-0.2
-0.4
-0.6
-0.8
-1
EN
LASSO
CLOT
0
5
10
15
20
25
30
35
40
t
Fig. 16. Control trajectory for the plant P6 (s) with the
initial state (1, 1, 1, 1, 1, 1)⊤ and λ = 0.1.
L2 norm of state
200
EN
LASSO
CLOT
180
160
||x(t)|| 2
140
EN
0.5915
0.3270
0.1155
0.5555
0.3050
0.0395
0.1100
0.1438
0.1438
CLOT
0.4475
0.2480
0.0830
0.4225
0.2180
0.0805
0.0845
0.1125
0.1125
Table 3. Sparsity densities for optimal controllers produced by various methods
three methods LASSO, EN, and CLOT. The advantage
of using the sparsity density instead of the sparsity count
(the absolute number of nonzero entries) is that when the
sample time is reduced, the sparsity count would increase,
whereas we would expect the sparsity density to remain
the same. As explained above, we have applied a threshold
of 10−4 in computing the sparsity densities of various
control signals.
Table 3 shows the sparsity densities for the nine examples
studied in Table 1, in the same order. From this table
it can be seen that the CLOT norm-based control signal
is always more sparse than the EN-based control signal.
Indeed, in some cases the sparsity density of the CLOT
control is comparable to that of the LASSO control.
120
100
80
60
40
20
0
LASSO
0.1690
0.1690
0.0480
0.4055
0.1655
0.0040
0.0595
0.0568
0.0568
0
10
20
30
40
t
Fig. 17. State trajectory for the plant P7 (s) with the initial
state (1, 1, 1, 1, 1, 1)⊤ and λ = 0.1.
We also increased the number of samples from 2,000
to 4,000, and the optimal values changed only in the
third significant figure in almost all examples for all three
methods. Therefore the figures in Table 3 are essentially
equal to the Lebesgue measure of the support set divided
by T .
5. CONCLUSIONS
control
1
0.8
0.6
0.4
u(t)
0.2
0
-0.2
-0.4
-0.6
-0.8
-1
EN
LASSO
CLOT
0
5
10
15
20
25
30
35
40
t
Fig. 18. Control trajectory for the plant P7 (s) with the
initial state (1, 1, 1, 1, 1, 1)⊤ and λ = 0.1.
λ
λ=1
λ = 0.1
LASSO
0.1725
0.1725
EN
0.6050
0.3795
CLOT
0.5900
0.2665
Table 2. Sparsity indices of the control signals
from various algorithms for the plant P1 (s)
(fourth-order integrator) with the initial state
(1, 1, 1, 1).
4.3 Comparison of Sparsity Densities
In this subsection we analyze the sparsity densities, that
is, the fraction of samples that are nonzero, using the
In this article, we propose the CLOT norm-based control
that minimizes the weighted sum of L1 and L2 norms
among feasible controls, to obtain a continuous control
signal that is sparser than the EN control introduced in
(Nagahara et al., 2016). We have shown a discretization
method, by which the CLOT optimal control problem
can be solved via finite-dimensional convex optimization.
Numerical experiments have shown the advantage of the
CLOT control compared with the LASSO and EN controls. Future work includes the analysis of the sparsity
and continuity of the CLOT control as a continuous-time
signal.
ACKNOWLEDGEMENTS
The research of MN was supported in part by JSPS
KAKENHI Grant Numbers 15H02668, 15K14006, and
16H01546. The research of MV and NC was supported
by the US National Science Foundation under Award No.
ECCS-1306630, the Cancer Prevention and Research Institute of Texas (CPRIT) under award No. RP140517, and
a grant from the Department of Science and Technology,
Government of India.
REFERENCES
Ahsen, M.E., Challapalli, N., and Vidyasagar, M. (2016).
Two new approaches to compressed sensing exhibiting
both robust sparse recovery and the gourping effect.
Journal of Machine Learning Research. (submitted;
preprint at arXiv 1410:8229).
Casas, E., Clason, C., and Kunisch, K. (2012). Approximation of elliptic control problems in measure spaces with
sparse solutions. SIAM J. Control Optim., 50, 1735–
1752.
Chan, C. (2007). The state of the art of electric, hybrid,
and fuel cell vehicles. Proc. IEEE, 95(4), 704–718.
Charles, A., Asif, M., Romberg, J., and Rozell, C. (2011).
Sparsity penalties in dynamical system estimation. In
45th Annual Conference on Information Sciences and
Systems (CISS), 1–6.
Chatterjee, D., Nagahara, M., Quevedo, D.E., and Rao,
K.M. (2016). Characterization of maximum hands-off
control. Systems & Control Letters, 94, 31–36.
Chen, S.S., Donoho, D.L., and Saunders, M.A. (1999).
Atomic decomposition by basis pursuit.
SIAM
J. Sci. Comput., 20(1), 33–61.
Clason, C. and Kunisch, K. (2012). A measure space
approach to optimal source placement. Comput. Optim.
Appl,, 53, 155–171.
Elad, M. (2010). Sparse and Redundant Representations.
Springer.
Eldar, Y.C. and Kutyniok, G. (2012). Compressed Sensing: Theory and Applications. Cambridge University
Press.
Fardad, M., Lin, F., and Jovanović, M. (2011). Sparsitypromoting optimal control for a class of distributed
systems. In American Control Conference (ACC), 2011,
2050–2055.
Foucart, S. and Rauhut, H. (2013). A Mathematical
Introduction to Compressive Sensing. Birkhäuser.
Grant, M. and Boyd, S. (2014). CVX: Matlab software for disciplined convex programming, version 2.1.
http://cvxr.com/cvx.
Hermes, H. and Lasalle, J.P. (1969). Functional Analysis
and Time Optimal Control. Academic Press.
Ikeda, T. and Nagahara, M. (2016). Value function in maximum hands-off control for linear systems. Automatica,
64, 190–195.
Lin, F., Fardad, M., and Jovanovic, M.R. (2013). Design
of optimal sparse feedback gains via the alternating
direction method of multipliers. IEEE Trans. Autom.
Control, 58(9), 2426–2431.
Liu, R. and Golovitcher, I.M. (2003). Energy-efficient
operation of rail vehicles. Transportation Research Part
A: Policy and Practice, 37(10), 917–932.
Nagahara, M., Quevedo, D.E., and Nevsić, D. (2016).
Maximum hands-off control: a paradigm of control effort
minimization. IEEE Trans. Autom. Control, 61(3), 735–
747.
Nagahara, M., Quevedo, D., and Østergaard, J. (2014).
Sparse packetized predictive control for networked control over erasure channels. IEEE Trans. Autom. Control,
59(7), 1899–1905.
Natarajan, B.K. (1995). Sparse approximate solutions to
linear systems. SIAM J. Comput., 24(2), 227–234.
Osborne, M.R., Presnell, B., and Turlach, B.A. (2000). On
the LASSO and its dual. Journal of Computational and
Graphical Statistics, 9, 319–337.
Polyak, B., Khlebnikov, M., and Shcherbakov, P. (2013).
An lmi approach to structured sparse feedback design in
linear control systems. In European Control Conference
(ECC), 833–838.
Tibshirani, R. (1996). Regression shrinkage and selection
via the LASSO. J. R. Statist. Soc. Ser. B, 58(1), 267–
288.
Zou, H. and Hastie, T. (2005). Regularization and variable
selection via the Elastic Net. Journal of the Royal
Statistical Society, Series B, 67, 301–320.
| 3cs.SY
|
ZERO DIVISOR GRAPHS OF QUOTIENT RINGS
arXiv:1508.02432v1 [math.AC] 10 Aug 2015
RACHAEL ALVIR
Abstract. The compressed zero-divisor graph ΓC (R) associated with a commutative ring R has
vertex set equal to the set of equivalence classes {[r] | r ∈ Z(R), r 6= 0} where r ∼ s whenever
ann(r) = ann(s). Distinct classes [r], [s] are adjacent in ΓC (R) if and only if xy = 0 for all
x ∈ [r], y ∈ [s]. In this paper, we explore the compressed zero-divisor graph associated with quotient
rings of unique factorization domains. Specifically, we prove several theorems which exhibit a method
of constructing Γ(R) for when one quotients out by a principal ideal, and prove sufficient conditions
for when two such compressed graphs are graph-isomorphic. We show these conditions are not
necessary unless one alters the definition of the compressed graph to admit looped vertices, and
conjecture necessary and sufficient conditions for two compressed graphs with loops to be isomorphic
when considering any quotient ring of a unique factorization domain.
1. Introduction
In Coloring of Commutative Rings [3], I. Beck introduces the zero-divisor graph Γ(R) associated with
the zero-divisor set of a commutative ring, whose vertex set is the set of zero-divisors. Two distinct
zero-divisors x, y are adjacent in Γ(R) if and only if xy = 0. The zero-divisor graph establishes a
"connection between graph theory and commutative ring theory which hopefully will turn out to
mutually beneficial for those two branches of mathematics." M. Axtell and J. Stickles [2] remark
that "in general, the set of zero-divisors lacks algebraic structure," suggesting that turning to the
zero-divisor graph may both reveal both ring-theoretical properties and impose a graph-theoretical
structure. Beck’s hopes have certainly been met; his now classical paper motivated an explosion
of research in this and similar associated graphs in the past decade. His definition has since been
modified to emphasize the fundamental structure of the zero-divisor set: Anderson’s definition given
in [1], which excludes the vertex 0 from the graph, is now considered standard.
In 2009, S. Spiroff and C. Wickham formalized the compressed zero-divisor graph ΓC (R), which has
vertex set equal to the set of equivalence classes {[r] | r ∈ Z(R), r 6= 0} where r ∼ s whenever
ann(r) = ann(s). Distinct classes [r], [s] are adjacent in ΓC (R) if and only if xy = 0 for all
x ∈ [r], y ∈ [s]. It is proved in [7] that xy = 0 for all x ∈ [r], y ∈ [s] if and only if rs = 0. In
other words, multiplication of equivalence classes is well-defined. This graph "represents a more
succinct description of the zero-divisor activity" [9]. Spiroff’s compressed graph was inspired by S.
Mulay’s work in [7] and has also been called the Mulay graph or the graph of equivalence classes of
zero-divisors. The compressed graph has many advantages over the traditional zero-divisor graph,
as it is often finite in cases where the zero-divisor set is infinite, and reveals associated primes.
1
The purpose of this paper is to study the compressed zero-divisor graph, and discover in what way
it better describes the core behavior of the zero-divisor set. This question becomes particularly
tractable in unique factorization domains, building off intuition built in Z/hni. Our main theorem
reveals that the overall structure of the zero-divisor activity for quotient rings of unique factorization
domains is determined by a finite set of key elements, which we call the zero-divisor basis for the
ring. As a result of this observation, we are able to state sufficient conditions for two compressed
graphs of such rings to be graph-isomorphic, and conjecture necessity when the compressed graph
admits looped vertices. In the final section, we conjecture that these results may be extended to
any quotient ring of a unique factorization domain.
2. Background
One motivation for the use of the compressed zero-divisor graph is the observation that new zerodivisors may be trivially found; every multiple of a zero-divisor is also a zero-divisor. Moreover,
these multiples often behave in exactly the same way as their parent zero-divisor: they annihilate
the same elements. This phenomena is expressed in the following lemma.
Lemma 1. Let R be a commutative ring, z ∈ Z(R), n 6∈ Z(R). Then [nz] = [z].
Proof. (⊆) Let x ∈ ann(nz). Then (nz)x = 0 ⇒ n(zx) = 0. Since n 6∈ Z(R), it follows by negating
the definition of zero-divisor that zx = 0. Therefore x ∈ ann(z).
(⊇) Let x ∈ ann(z). Then zx = 0 ⇒ (nz)x = 0 ⇒ x ∈ ann(nz).
The above is useful when considering the zero-divisor graph and thus appears in the literature,
although often in its weaker form where n is a unit. This observation leads us to consider that
some zero-divisors do not determine the behavior of the zero-divisor set, and have their behavior
determined by other "important" zero-divisors. Naturally, one wishes to identify which zero-divisors
actually determine the zero-divisor graph’s structure. To this end, we define two zero-divisors r, s
to be equivalent if ann(r) = ann(s), and denote the equivalence class of r with [r]. Because copycat
zero-divisors add unnecessary visual information to Γ(R), we wish to associate a graph with this
equivalence relation. The compressed zero-divisor graph then becomes the new object of study.
Are there any other situations, other than that expressed in lemma 1, in which the annihilators of
two elements are equal? This is addressed by the following lemma:
Lemma 2. Let S be a commutative ring, c ∈ S, I an ideal of S. Then c + I ∈ Z(S/I) if and only
if ∃d ∈ S − I such that cd + I = I.
Proof.
c + I ∈ Z(S/I) ⇐⇒ ∃d ∈ S s.t. cd + I = I and d + I 6= I
⇐⇒ ∃d ∈ S s.t. cd + I = I and d 6∈ I
2
We may restate this lemma so that it explicitly relates to the zero-divisor graph. We follow standard
notation in graph theory: given a graph G, its vertex set is denoted V (G), and edge set E(G).
Corollary 3. Let S be a commutative ring, I an ideal of S. Then ∃c, d ∈ S −I such that cd+I = I,
c + I 6= d + I if and only if
(1) c + I ∈ V (Γ(S/I)), and
(2) e = {c + I, d + I} ∈ E(Γ(S/I)).
Proof. The extra condition that c ∈ S − I ensures that 0 is not a vertex of Γ(S/I). The condition
that c + I 6= d + I ensures that edges exist only between distinct vertices.
Using this simple intuition as a springboard, we proceeed to consider the consequences of this
relationship between the ideal and the zero-divisor set of the quotient ring.
3. Results
Corollary 3 indicates that in order to investigate the zero-divisor set of a quotient ring, one must
look at the factors of the elements in the kernel the homomorphism. Not every factor, however, will
do. If I is the principal ideal hni, we will wish to restrict our attention only to the factors of n. We
therefore utilize the following definition.
Definition 1. Let D be a unique factorization domain and hni a principal ideal of D. A ZeroDivisor Basis B for D/hni is a set of all nontrivial divisors of n such that no two distinct elements
in the basis are associates. In symbols,
• d ∈ B ⇒ d | n, d is not a unit, d is not an associate of n.
• d1 , d2 ∈ B ⇒ d1 = d2 or d1 , d2 are not associates.
It is our claim that such factors are the only ones which determine the behavior of the zero-divisor
set, i.e., every zero-divisor has the same annihilator as the image of some irreducible divisor of n.
Lemma 4. Let D be a UFD, I an ideal of D, and φ the canonical homomorphism from D onto
D/I. Let a, n ∈ D. Then [φ(gcd(a, n))] is well-defined.
Proof. If I is trivial, then there is only one annihilator class in D/I and we are done. If not, then
since φ is onto, the image of a unit under φ is a unit. But a unit is never a zero-divisor. By Lemma
1, images of associates therefore share equivalence classes. However, every gcd(a, n) is unique up to
associates, so [φ(gcd(a, n))] is well-defined.
Theorem 5. Let D be a UFD, hni a principal ideal of D, and φ the canonical homomorphism from
D onto D/hni. Then ∀a ∈ D, [φ(a)] = [φ(gcd(a, n))].
3
Proof. If hni is maximal or trivial, there is only Q
one annihilator class in D/hni and we are done. If
not, then n is nonzero and not a unit. Let n = psi i be a factorization of n into irreducibles. Fix
a ∈ D.
If a = 0, then [φ(gcd(0, n))] = [φ(n)] = [0] and we are done.
Q
Suppose a 6= 0. We may write a = y pki i where
Q kigcd(y, n) =Q1. ki Then by Lemma 2 and since
y 6= 0, φ(y) is
not
a
zero-divisor,
so
[φ(a)]
=
[φ(
pi )]. But [φ( pi )] = [φ(gcd(a, n))] if and only
Q ki
if ∀x ∈ D, x Qpi ∈ hni ⇐⇒ x gcd(a, n) ∈ hni. It therefore suffices to show that the equivalence
∀x ∈ D, n | x pki i ⇐⇒ n | x gcd(a, n) holds.
(⇐) Let x ∈ D, and suppose Q
n | x gcd(a, n). Since gcd(y, n)Q= 1, then gcd(a, n) = gcd(
i
which implies that gcd(a, n) | pki Q
. We conclude that n | x pki i .
(⇒) Let x ∈ D, and suppose n | x pki i . Then
Y min(k ,s ) Y s −min(k ,s ) Y min(k ,s ) Y k −min(k ,s )
i i
i i
i i
i i
.
x
pi
pi i
pi
pi i
Q
pki i , n),
Since the cancellation property holds in UFD’s,
Y s −min(k ,s ) Y k −min(k ,s )
i i
i i
.
x
pi i
pi i
However, by definition of minimum, if ki − min(ki , si ) 6= 0, then si − min(ki , si ) = 0. In other
Q k −min(ki ,si ) si −min(ki ,si )
) = 1. By Euclid’s Lemma, we conclude that
, pi
words, gcd( pi i
Y s −min(k ,s )
i i
x,
pi i
which implies that
Y
Therefore n | x
Q
min(ki ,si )
pi
min(ki ,si )
pi
Y
s −min(ki ,si )
pi i
x
Y
min(ki ,si )
pi
, which is what we desired to show.
.
Theorem 6. Let D be a unique factorization domain, and hni a nontrivial principal ideal of D.
Let φ be the canonical homomorphism from D onto D/hni.
Each vertex of ΓC (D/hni) is the equivalence class [φ(d)] of exactly one d in the zero-divisor basis
B for D/hni. An edge exists between two distinct nodes [φ(d1 )], [φ(d2 )] if and only if d1 d2 ∈ hni.
Proof. If hni is maximal, then B is empty andQso also is ΓC (D/hni). Suppose hni is not maximal.
As hni is neither maximal nor trivial, let n = psi i .
It has already been shown that [φ(a)] = [φ(gcd(a, n))] for all a ∈ D. Thus every equivalence class
is the equivalence class of a divisor of n. Since the vertices of ΓC (D/hni) do not contain the classes
[0] or [1], every vertex of ΓC (D/hni) is the equivalence class of φ(d) for some d in B.
We show next that this is true for exactly one d ∈ B. Suppose that d1 , d2 are distinct elements in the
zero-divisor
Because the zero-divisor basis is unique up to associates, we may write
Q ti basis forQD/hni.
ki
d1 = u pi , d2 = v pi where u, v are units. Since d1 6= d2 and by definition of zero-divisor basis
4
Q
they are not associates, some tj 6= kj . Without loss of generality, let kj > tj . Consider d3 = psi i −ki .
Q t +(s −k )
Q
Then clearly φ(d3 ) annihilates φ(d2 ). However, d1 d3 = u pii i i = u pisi +ti −ki . But kj > tj
implies that sj + tj − kj < sj , so φ(d1 )φ(d3 ) 6= 0. We conclude that ann(φ(d1 )) 6= ann(φ(d2 )).
That an edge exists between distinct vertices [φ(d1 )], [φ(d2 )] if and only if d1 , d2 ∈ hni follows
immediately from the definition of compressed zero-divisor graph.
Corollary 7. The compressed graph of D/hni is always finite.
Proof. If hni is maximal or trivial, we are done because the compressed graph is empty. If not, then
because n may be expressed as a finite product of irreducibles, the zero-divisor basis of D/hni is
always finite.
Theorem 8. Let D1 , D2 be two unique
and let n1 ∈ D1 and n2 ∈ D2 be
QB tdomains,
QA sifactorization
i
non-zero and not units. Let n1 = i=1 pi , n2 = i=1 qi be factorizations of n1 , n2 into products of
irreducibles. If A = B and each si = ti , then ΓC (D1 /hn1 i) ∼
= ΓC (D2 /hn2 i).
Proof. A zero-divisor basis of D1 /hn1 i is
B1 = {d =
A
Y
pvi i | d 6= n, d 6= 1, 0 ≤ vi ≤ si },
i=1
and a basis of D1 /hn2 i is given by
B2 = {d =
B
Y
i
pw
i | d 6= n, d 6= 1, 0 ≤ wi ≤ si }.
i=1
Consider the map ψ (whose domain does not contain the equivalence classes of 0 or 1) defined by
hY
i hY
i
ψ
pzi i + hn1 i =
qizi + hn2 i .
By Theorem 6, ψ is a map between the vertex sets of ΓC (D1 /hn1 i) and ΓC (D2 /hn2 i). Since A = B,
each si = ti , and again by Theorem 6 each vertex corresponds to exactly one element in the zerodivisor basis, we conclude that ψ is a one-to-one correspondence.
5
Q
Q
Suppose [ pfi i ], [ pgi i ] are adjacent in ΓC (D1 /hn1 i). This happens if and only if
Y f Y g
pi i
pi i + hn1 i = hn1 i
Y f +g
⇐⇒
pi i i ∈ hn1 i
⇐⇒ ∀i, fi + gi ≥ si = ti
Y f +g
⇐⇒
qi i i ∈ hn2 i
Y f Y g
⇐⇒
qi i
qi i + hn2 i = hn2 i
hY i hY i
⇐⇒ ψ
pfi i , ψ
pgi i
are adjacent in ΓC (D2 /hn2 i).
Therefore ψ is an isomorphism.
Corollary 9. Let D be a UFD and hni a principal ideal of D. Then ΓC (D/hni) is isomorphic to
ΓC (Z/hmi) for some m ∈ Z.
It is perhaps appropriate we mention that requiring Γ(R) (and consequently ΓC (R)) be simple seems
to have caused some disagreement among the zero-divisor graph community. Axtell’s definition of
zero-divisor graph in [2] does not require that edges exist only between distinct vertices and refers
explicitly to "loops" in the graph, despite the fact that he claims Anderson’s definition is standard.
Anderson himself must remind his reader that "the zero-divisor graph does not detect the nilpotent
elements" [1]. For Redmond, Anderson’s definition posed potential problems, requiring "some
conditions that make the nilpotent elements easier to locate" [8].
In this paper also, we advocate changing the standard definitions of Γ(R) and ΓC (R) so that looped
vertices are allowed. First, only a graph with loops models all zero-divisor activity in the ring.
Additionally, although the former theorem holds for either definition of ΓC (R), its conditions are
not necessary unless we stipulate that ΓC (R) contain loops. As a counterexample, note that in the
unlooped case, ΓC (Z/hp3 i) ∼
= ΓC (Z/hpqi). We believe that sufficiency is held when ΓC (R) admits
loops, and that this sufficiency need only be shown for Z/hmi by the above corollary.
For certain quotient rings, the next theorem gives necessary and sufficient conditions for compressed
graph isomorphism regardless of whether or not we admit loops in ΓC (R).
Theorem 10. Let D1 , D2 be two UFD’s. Let p, p1 , . . . , pA ∈ D1 , q, q1 , . . . qB ∈ D2 be irreducibles,
where no two of the pi , qi ’s are associates respectively. Then ΓC (D1 /hps i) ∼
= ΓC (D2 /hq t i) if and only
QA
Q
B
if s = t, and ΓC (D1 /h i=1 pi i) ∼
= ΓC (D2 /h i=1 qi i) if and only if A = B.
Proof. Sufficiency has already been shown. We prove necessity by contraposition.
In the first case, suppose s 6= t. Then it is clear that ps , q t have different numbers of non-trivial
divisors up to associates, so the zero-divisor bases for the two rings will have different cardinalities.
Therefore the vertex sets of ΓC (D1 /hps i), ΓC (D2 /hq t i) cannot be put into a one-to-one correspondence, and the graphs cannot be isomorphic.
6
In the second case, suppose A 6= B. Similarly, it is clear that the vertex sets of
A
B
Y
Y
ΓC (D1 /h pi i), ΓC (D2 /h qi i)
have different cardinalities.
These graph-isomorphism results generalize those in [4], in which is is proved that Γ(Zp [x]/hxn i) ∼
=
Γ(Zpn ).
4. Conjectures
We would like to discuss when our results may be extended to Γ(R) itself. The following conjectures
sugges when this might be possible.
Conjecture 11. Let R1 , R2 be two commutative rings. Then Γ(R1 ) ∼
= Γ(R2 ) if and only if
(1) ΓC (R1 ) ∼
= ΓC (R2 ), and
(2) |R1 − Z(R1 )| = |R2 − Z(R2 )|.
We would also like to extend our results to when one quotients a UFD by any ideal I. Note first that
every ideal of a ring may be written as a union of principal ideals. The trivial union I = ∪x∈I hxi
suffices to show that this is true; equality holds because ideals are closed under multipliciation by
the elements of a ring by definition. A more general definition of zero-divisor basis follows.
Definition 2. Let D be a unique factorization domain, and let I = ∪α∈Λ hnα i be an expression of I
as a union of principal ideals. A zero-divisior basis B of D/I is the set of all divisors d of some
nα , d 6∈ I, such that no two distinct elements of B are associates.
If I is expressed minimally, we may be able to replace the stipulation that d 6∈ I with the requirement
that the divisor d merely be nontrivial.
Conjecture 12. Let D be a UFD, I = ∪α∈Λ hnα i be an ideal of D expressed as a minimal union, and
φ the canonical homomorphism from D onto D/I. Then ∀a ∈ D, [φ(a)] = [φ(gcd{a, nα for all α ∈
Λ}].
Conjecture 13. Let D be a unique factorization domain, and I an ideal of D where
I = ∪α∈Λ h
Qα
Y
sα
pαkk i
k=1
is a minimal expression of I as a union of principal ideals. The distinct nodes of the Q
compressed
zero-divisor graph for D/I are given by the equivalence classes of elements of the form
φ(
diQ
) where
Q
each di is an element
Q of the zero-divisor basis. An edge exists between two nodes φ( di ), φ( bi ) if
and only if nα | di bi for some α ∈ Λ.
7
Conjecture 14. Let D1 , D2 be unique factorization domains and I1 , I2 be any two ideals of D1 , D2
respectively which are neither maximal nor trivial. Suppose
I1 = ∪α∈Λ h
Qα
Y
sα
pαkk i.
k=1
Then ΓC (D1 /I1 ) ∼
= ΓC (D2 /I2 ) if we may write
I2 = ∪α∈Λ h
Qα
Y
sα
qαkk i.
k=1
References
[1] D. Anderson and P. Livingston, The Zero-Divisor Graph of a Commutative Ring. Journal of Algebra, Vol. 217,
pp. 434-447, 1999.
[2] M. Axtell and P. Livingston, Graphs and Zero-Divisors. The College Mathematics Journal, Vol. 41, No. 5, pp.
396-399, 2010.
[3] I. Beck, Coloring of Commutative Rings Journal of Algebra, Vol. 116, pp. 208-226, 1986
[4] D. Endean, K. Henry, and E. Manlove, Zero-Divisor Graphs of Zn and Polynomial Quotient Rings over Zn .
Rose-Hulman Undergraduate Mathematics Journal, Vol. 8, Nov. 12, 2007.
[5] D. Burton, Elementary Number Theory. The College Mathematics Journal, Mc-Graw Hill, 6th Edition, 2007.
[6] J. Gallian, Contemporary Abstract Algebra. Brooks/Cole, 8th Edition, 2013.
[7] S. Mulay, Cycles and Symmetries of Zero-Divisors. Commutative Algebra, Vol. 30, pp. 3533-3558, 2002.
[8] S. Redmond Generalizations of the Zero-Divisor Graph of a Ring Doctoral Dissertations, The University of
Tenessee, Knoxville, 2001.
[9] S. Spiroff and C. Wickham, A Zero-Divisor Graph Determined by Equivalence Classes of Zero-Divisors. Commutative Algebra, Vol. 39, pp. 2338-2348, 2011.
8
| 0math.AC
|
Control Strategy for Anaesthetic Drug Dosage with
Interaction Among Human Physiological Organs
Using Optimal Fractional Order PID Controller
Saptarshi Das1,2
Sourav Das2 and Koushik Maharatna1
1. School of Electronics and Computer Science, University
of Southampton, Southampton SO17 1BJ, UK.
Email: [email protected], [email protected]
2. Department of Power Engineering, Jadavpur University,
LB-8, Sector 3, Kolkata-700098, India.
Email: [email protected], [email protected]
Abstract—In this paper, an efficient control strategy for
physiological interaction based anaesthetic drug infusion model is
explored using the fractional order (FO) proportional integral
derivative (PID) controllers. The dynamic model is composed of
several human organs by considering the brain response to the
anaesthetic drug as output and the drug infusion rate as the
control input. Particle Swarm Optimisation (PSO) is employed to
obtain the optimal set of parameters for PID/FOPID controller
structures. With the proposed FOPID control scheme much less
amount of drug-infusion system can be designed to attain a
specific anaesthetic target and also shows high robustness for
±50% parametric uncertainty in the patient’s brain model.
Keywords—anaesthetic drug; dosage control; fractional order
PID controller; physiological organs; PSO
I.
INTRODUCTION
Control strategy formulation for anaesthetic drug dosage is
very crucial in clinical surgery and falls in a particular category
of biomedical system design known as pharmacology [1-3]. In
pharmacology, there are two major steps involved known as
pharmacokinetics and pharmacodynamics [4]. The anaesthetic
drug injected in a patient’s body gets infused in the arterial
blood flow and then the arterial blood carrying the drug reaches
to different physiological organs. Determining the drug
concentration in arterial blood flow and in different tissues i.e.
dosage to concentration is known as the pharmacokinetics.
The interaction of the drug with different physiological organs
and the overall effect of the drug i.e. concentration to effect is
known as pharmacodynamics [4]. Amongst many others
anaesthetic drugs, fentanyl is widely used in relief of acute pain
like cancer [5] and in different surgeries [6]. The drug dosage
in clinical surgery is generally controlled by the
Electroencephalogram (EEG) recording during the anaesthesia
[7] until a predefined unconsciousness in not reached which
can be characterized by observing slow oscillations in EEG
signals. Since different physiological organs have different
time constants to absorb, react and finally release the drug
again in the blood stream, their interaction and contribution on
the overall physiological dynamics of anaesthetic study is
highly complex and may lead clinicians to misinterpret the
observed event. As an example, some organs may store the
drug in a larger extent or reacts to the drug slowly than the
others and its immediate effect on the reduction of fast
oscillations in EEG waves may not be significant. This type of
phenomena may confuse the clinicians to enhance the drug
dosage to attend a pre-specified EEG activity indicative to an
anaesthetic state in a typical case which might be lifethreatening for the patient. In this scenario a physiological
model based simulation study is necessary to device a control
strategy with possible variation in patient’s mathematical
model from the nominal case, since over dosage of the drug by
an open-loop type EEG observation based control may
endanger the patient in the process of anaesthesia. A realistic
(data-based) model for control strategy formulation can thus be
implemented for automated anaesthesia in clinical surgery
using brain activity (EEG) monitoring as a sensory feedback to
the comparator to generate the tracking error. This results in a
control action going to an actuator to pump the drug into
patient’s body [8], using a prior knowledge of the set-point or
reference as quantitative measure of consciousness [4, 8].
Therefore the task of the controller design in the present
scenario can be summarised as minimising the tracking error of
the brain response given by the Hill equation, modified Hill
equation (in frequency domain) and bispectral index (BIS) of
EEG by delicately manipulating the drug input to the patient
[4]. A realistic mathematical model for fentanyl drug was
developed in [9-10] and is known as Mapleson-Higgins model.
The Mapleson model was composed of a few set of algebraic
equations derived from biochemistry. In this model, each organ
of human body like lungs, peripheral shunt, kidney, gut and
spleen, liver, other viscera, muscle, fat, sample brain is
considered as a separate compartment. It is also assumed that
each of the organs gets equal arterial blood flow. Mahfouf et al.
[11] translated the static algebraic equation based Mapleson
model into a dynamic model which considers the temporal
variation in the drug concentration at the inlet and outlet of
each physiological organ. They also carried out model
reduction of the large dynamical system for generalized
predictive control (GPC) design. In this paper, we use the
original (unreduced) higher order dynamic model in order to
design efficient control scheme. It has been shown by Das et
al. [12]-[13] that fractional order (FO) controllers are very
effective in handling higher order dynamics due to their
inherent infinite-dimensional nature over integer order
controllers which formulates the scope of the present study.
Control strategies for anaesthetic dosage have been formulated
on much simpler models using PID controllers [14]-[16], fuzzy
[17] and neuro-fuzzy [18] controllers in earlier research. Wada
et al. [19] developed a more detailed physiological system
level pharmacokinetic model without any control scheme. A
three state nonlinear compartmental model for clinical
pharmacology has been described for different control studies
including adaptive control [20], neural network control [21-22],
nonnegative dynamical systems [23], disturbance rejection
control [24]. Results of clinical trials of anaesthesia control
scheme, based on three-compartmental model with noise EEG
measurements has been reported in Haddad et al. [25] for 10
patients. The focus of the present study is to formulate an
optimal FO control strategy [26-28] with the dynamical model
reported in Mahfouf et al. [11] considering interaction amongst
physiological organs.
The rest of the paper is organised as follow: section II
describes the overall system model for different physiological
organs and their interaction with the drug. The optimal
controller design task is described in section III and the system
simulation in section IV. The paper ends with the conclusion in
section V, followed by the references.
II.
DYNAMIC MODEL OF FENTANYL INTERACTION WITH
PHYSIOLOGICAL ORGANS
A. Overall System Description for Automated Anaesthesia
controller to generate a control action u ( t ) , giving a command
to the actuator or mechanical pump to pump the drug (Fig. 1).
B. Dynamical Model for Each Human Organs
Mahfouf et al. [11] developed individual system models by
applying system identification techniques on original Mapleson
model with the consideration of 70 kg body weight and
6.481/min cardiac output which represent a base-case clinical
scenario. In order to study the generalising capability of the
model outside the nominal range, an interpolation based model
identification has been reported in [11] for realistic variation
either in body-weight, cardiac output or simultaneously both of
them. From the generalized interpolated scheme, a patient
model was developed with 93 kg body weight, 5.41/min body
weight while 100μg of fentanyl has been injected over a period
of 60 sec. The corresponding interpolated transfer function
models [11] of various human organs are described in (1)-(9).
G Fat =
− 1.437 × 10 − 8 s + 1.722 × 10 −6
s 2 + 0.4126 s + 0.0003241
G Lungs = 64.78 ( s 2 + 4.17 s + 6.97 )
G Gut-spleen =
As described earlier, the first static model of fentanyl
interaction from pharmacokinetics and pharmacodynamics
point of view was known as Mapleson model [9]-[10].
Mahfouf et al. [11] extended the concept for dynamic models
by representing each organs dynamics with ordinary
differential equations or single-input-single-output (SISO)
continuous time transfer function models. The model mainly
captures the drug flow from one organ to other and not the drug
concentration in a specific organ. The drug is added through
intravenous (IV) injection which gets infused in the arterial
blood and then is perfused in all organs with a fraction of the
total arterial blood flow. The brain reaction to the drug y ( t ) ,
manifested in the form of EEG is evaluated using the Hillequation or some index like BIS and then fed-back for
comparison with the target anaesthetic level to generate an
error e ( t ) which will be minimised by the FOPID or PI λ D μ
(2)
(3)
G Kidneys = 0.0132 ( s + 0.7436 )
(4)
G Liver = 0.006243 ( s + 0.04257 )
(5)
G Other-viscera = 0.001725 ( s + 0.09009 )
(6)
− 2.764 × 10 − 7 s + 3.312 × 10 − 5
s 2 + 0.4152 s + 0.001867
(7)
G Muscle =
Fig. 1. Overall fentanyl dose-effect model with proposed control strategy.
− 1.34 × 10 − 5 s + 0.001604
s 2 + 0.9059 s + 0.09356
(1)
G Brain = 1.614 × 10 − 5
( s + 0.1533 )
(8)
G Nasal = 5.459 × 10 −6
( s + 0.08507 )
(9)
The peripheral shunt has been modelled as only as a gain
without any time constants i.e. K peripheral-shunt = 0.0241 . The
above models explain the dynamic relationship between the
outgoing drug concentration in the blood flow from each tissue
and the incoming arterial pool drug amount whereas it cannot
model the drug concentration in each issue. If the drug
concentration in the outgoing flow from brain is represented as
C b , then the drug effect on the brain be calculated by the Hill
equation (10) using the effect-site concentration at 50% of drug
effect ( EC 50 = 7.8 ng/ml) and steepness or slope factor ( γ ).
Effect ( C b ) = C bγ
III.
( EC
γ
50
+ C bγ ) ,
γ = 4.3
(10)
OPTIMAL CONTROL SCHEME OF DRUG INFUSION WITH
FRACTIONAL ORDER PID CONTROLLER
A. Choice of the Control Objective
In clinical practices of anaesthesia, computer controlled
drug infusion is generally adopted to meet a target
concentration infusion (TCI) rather than manually controlling
the infusion rate [8, 14, 15, 22, 25]. Most of these techniques
rely on open loop control which assumes that the population
model is a good representative of any patient which may not be
valid in many cases. A more sensible scheme should be to
continuously monitor brain response (EEG) to the drug-dosage
and use it as a feedback mechanism to minimise the set-point
tracking error by an efficient controller structure. The control
signal essentially modifies the intravenous drug infusion rate
and should not be violently manipulated to reach a faster
anaesthetic effect. So apart from minimizing the tracking
error e ( t ) , it is also an important task to minimize the variation
(or derivative) of the drug infusion rate to prevent any sudden
shock in the automated IV injection pump and chance of
infusing large amount of drug in small time i.e. an increased
control effort u ( t ) . The objective function for the optimal
controller design has been formulated as (11) as a weighted
sum of Integral of Time multiplied Squared Error (ITSE) and
Integral of Squared Deviation Control Output (ISDCO).
J =
∫
∞
0
(w ⋅t ⋅e
1
2
( t ) + w2 ( Δ u ( t ) )
2
) dt
(11)
B. Controller Structure and its Tuning Using PSO Optimiser
Fractional order PI λ D μ controller design with various
other time domain performance criteria has been explored in
Das et al. [12] and the results shows that squared error term in
(11) puts more penalties on the tracking error and the time
multiplication term makes the overall response faster and
reduces the chance of loop oscillations in later stages. It is
evident that such a tracking criterion will definitely increase the
required control effort whose variation (temporal derivative) is
thus added as a minimising criteria in (11). The above control
objective is to be met by an integer and fractional order PID
controller structure (12) where the controller gains
{K p , K i , K d } and the integro-differential orders {λ , μ } are to
individual particle or pbest ( pi ) and that of the global swarm
or gbest ( pg ), while the velocity and positions are manipulated
over successive iterations using (14), until all particles
converges to the global best solution.
vi ( t + 1) = ωvi ( t ) + c1ϕ1 ( pi ( t ) − xi ( t ) ) + c2ϕ2 ( pg ( t ) − xi ( t ) )
xi ( t + 1) = xi ( t ) + vi ( t + 1)
(14)
Here, {c1 , c2 } = {0.5,1} are known as the inertia factor, cognitive
learning rate and social learning rate and {ϕ1 , ϕ2 } are uniformly
distributed random variables within the interval [ 0,1] . The
parameter ω , known as the inertia factor for the swarm is
linearly varied from 0.9 to 0.1. In the present study, the
unconstrained version of PSO is employed with only bound on
the controller parameters as { K p , K i , K d } ∈ [ 0.001,10 ] and
{λ , μ } ∈ [ 0, 2 ] . Due the implementation issues of ORA for FO
operators for {λ , μ } > 1 , we explored four classes of FOPID
structures (15) and tested the tracking performance and control
effort of each controller structure.
FOPID 1 →
({λ , μ } < 1) ;
FOPID 3 → ( λ > 1, μ < 1) ;
IV.
FOPID 2 → ( λ < 1, μ > 1) ;
FOPID 4 →
(15)
({λ , μ } > 1)
SIMULATION, RESULTS AND DISCUSSION
be tuned with a global optimisation algorithm.
C (s ) = K p + (Ki sλ ) + Kd sμ
(12)
For PID controller only the gains are to be optimized by
considering the orders as unity. In (12), each FO operator is
continuously rationalised within the optimization process using
a 5th order Oustaloup’s recursive approximation or ORA (13)
for a chosen frequency band of ω ∈ {ωl , ωb } = 10−2 ,102
{
}
rad/sec [29] and the rationalised pole-zero and gains are given
by { K , ωk , ωk′ } .
N
s K ∏ ( s + ωk′ ) ( s + ωk )
γ
(13)
k =− N
ωk = ωb (ωh ωb )
k + N + (1+γ ) 2
2 N +1
, ωk′ = ωb ( ωh ωb )
k + N + (1−γ ) 2
2 N +1
γ
, K = ωh
Here, the PID/FOPID controller parameters are optimized
using the PSO algorithm which is a widely used global
optimiser. The swarm starts with particles having velocity vi
and position xi and in each time step they try to move towards
the global best with latest value of the best found solution for
Fig. 2. Convergence characterteristics of different controller structures.
TABLE I.
OPTIMUM VALUES OF THE CONTROLLER PARAMETERS
Controller
Jmin
Controller parameters
Kp
Ki
Kd
λ
μ
PID
499.2007
3.8243
8.6647
0.001
-
-
FOPID1
58.3018
0.0212
2.3014
0.0783
0.8301
0.1013
FOPID2
792.1196
5.5757
3.3381
0.001
0.798
0.1488
FOPID3
68.721
0.2106
1.5393
0.001
0.001
0.021
FOPID4
728.6634
0.4213
1.6329
0.001
0.5237
0.1033
The PSO based optimal parameter selection is carried out
for the 5 controller structure with a goal of minimizing the
objective function (11) by considering a step input target at
t = 1 min and has been reported in Table I. The located minima
( J min ) in Table I show that the FOPID1 structure with
{λ , μ } < 1 gives the most optimal result than other FOPID
variants and PID controller which is counter-proved by the
PSO convergence characteristic, corresponding to FOPID1. In
most of the case low derivative gain implies that a PI/PIλ type
controller is more suitable for this particular system.
A. Performance on Nominal Patient Model
With the optimal parameters of the PID/FOPID controller
in Table 1, the nominal anaesthetic drug delivery system,
described in (1)-(10) and Fig. 1 is now simulated and the
tracking performance and required control efforts are compared
in Fig. 3 and Fig. 4 respectively. It is evident that although the
with PID controller the tracking is much faster, it needs more
amount of drug infusion within a short period of time (5 mins).
Whereas the FOPID1 structure meets the same anaesthetic
target while pushing much less amount of drug into patient’s
body over a longer period of time (20 mins).
Testing vulnerability of control loops with dc gain variation is
a widely used robustness measure and has been described in
Das et al. [12]. The dc gain of the nominal brain model is
1.0528×10-4. The rest of the physiological organs i.e.
peripheral-shunt, kidney, liver, other-viscera, muscle, fat, nasal
receive the same arterial blood flow in Mapleson model
described in Fig. 1, but does not directly affect the output y ( t ) .
Hence, they will have much less influence if the respective
parameters are perturbed. Fig. 5-6 reports simulations with the
best found cases of PID and FOPID controller respectively
under a ±50% dc gain perturbation in the brain model (8).
Fig. 5. Tracking performance and control effort with PID controller for
±50% dc-gain perturbation of the brain model.
Fig. 3. Tracking performance for different controller structures.
Fig. 6. Tracking performance and control effort with FOPID controller for
±50% dc-gain perturbation of the brain model.
Fig. 4. Control effort for different controller structures.
B. Robustness of Control Scheme in Perturbed Condition
In the previous subsection, the simulations have been
reported for the nominal model whereas it is highly likely that
the model differs significantly for different patients and for
different conditions of the same patient. Since the brain model
directly affects the output of the system as shown in Fig. 1, i.e.
the brain response to fentanyl drug directly feedback to the
controller, we here report simulation studies of the brain
response for the drug in a ±50% dc gain perturbation scenario.
It is evident from Fig. 5 that for a decrease in the dc-gain of
nominal brain model, the control effort rapidly increases,
signifying that more drug is injected into the patient’s body. It
is evident that the rise time of the PID controlled system is
much faster (10 mins), but the amount of drug-injected is
significantly high (17-35 units). On contrary, the FOPID
controller in Fig. 6 provides a relatively slower tracking
performance (50 mins). But there is a significant amount of
saving in the drug injection level which is bounded within 7-18
units even in the perturbed condition. In clinical practices,
meeting the specified unconsciousness level is not the sole
criterion because this may create a sudden shock in different
human physiological systems which may be harmful for the
patient [8]. Also, in order to attain same level of anaesthetic
effect but within a shorter time- period, the drug concentration
in brain needs to be raised rapidly which has both economical
constraint and physiological ill-effects along with faster
mechanical pumping needed for automated drug-delivery.
Whereas a smoother and bounded control action with less
amount of drug infusion into the patient can attain the same
level of anaesthesthetic fentanyl drug, if equipped with an
efficient control strategy i.e. using proposed optimal FOPID
controller.
[14]
[15]
[16]
V.
CONCLUSION
The paper devises a new fractional order control strategy
for automatic fentanyl drug dosage control for anaesthesia in
clinical practices. The proposed FOPID control scheme
requires less amount of dug to be injected than with a PID
controller to meet same anaesthetic target. The smoother
control action provided by FOPID controller outperforms
classical PID controller in a sense of restricting the chance of
feeling a sudden shock in the brain response due to rapid
increase in the amount of anaesthetic drug concentration in
arterial blood flow within a very short time interval. Future
work may be directed towards validation of the control scheme
applied on Mapleson’s dynamic model, with real clinical data.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
M.C.K. Khoo, “Physiological control systems: analysis, simulation and
estimation”, IEEE Press Series on Biomedical Engineering, 2000.
G.D. Baura, “System theory and practical applications of biomedical
systems”, IEEE Press Series on Biomedical Engineering, 2002.
R.B. Northorp, “Signals and systems analysis in biomedical
engineering”, CRC Press, 2010.
J.M. Bailey and W.M. Haddad, “Drug dosing control in clinical
pharmacology”, IEEE Control Systems Magazine, vol. 25, no. 2, pp. 3551, Apr. 2005.
R.K. Portenoy et al., “Oral transmucosal fentanyl citrate (OTFC) for the
treatment of breakthrough pain in cancer patients: a controlled dose
titration study”, Pain, vol. 79, no. 2–3, pp. 303-312, Feb. 1999.
K.J.S. Anand, W.G. Sippell, and A.Aynsley Green, “Randomised trial
on fentanyl anaesthesia in preterm babies undergoing surgery: effects on
the stress response”, The Lancet, vol. 329, no. 8527, pp. 243-248, Jan.
1987.
N. Ty Smith et al. “EEGs during high-dosage fentanyl-, sufentanil-, or
morphine-oxygen anesthesia”, Anesthesia & Analgesia, vol. 63, no. 4,
pp. 386-393, 1984.
H. Schwilden and H. Stoeckel, “Effective therapeutic infusions produced
by closed-loop feedback control of methohexital administration during
total intrvanous anesthesia with fentanyl”, Anesthesiology, vol. 73, no. 2,
pp. 225-229, 1990.
N.R. Davis and W.W. Mapleson, “A physiological model for the
distribution of injected agents, with special reference to pethidine”,
British Journal of Anaesthesia, vol. 70, no. 3, pp. 248-258, 1993.
W.W. Mapleson, “Circulation-time models of the uptake of inhaled
anaesthetics and data for quantifying them”, British Journal of
Anaesthesia, vol. 45, no. 4, pp. 319-334, 1973.
M. Mahfouf, D.A. Linkens, and D. Xue, “A new generic approach to
model reduction for complex physiologically based drug models”,
Control Engineering Practice, vol. 10, no. 1, pp. 67-81, Jan. 2002.
S. Das, S. Saha, S. Das, and A. Gupta, “On the selection of tuning
methodology for FOPID controllers for the control of higher order
processes”, ISA Transactions, vol. 5, no. 3, pp. 376-388, July 2011.
S. Das, A. Gupta, and S. Das, “Generalized frequency domain robust
tuning of a family of fractional order PI/PID controllers to handle higher
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
order process dynamics”, Advanced Material Research, vol. 403-408
(MEMS, NANO and Smart Systems), pp. 4859-4866, 2012.
D.A. O’Hara, D.K. Bogen, and A. Noordergraaf, “The use of computer
controlling the delivery of anesthesia”, Anesthesiology, vol. 77, no. 3,
pp. 563-581, 1992.
T. Sakai, A. Matsuki, P.F. White, and A.H. Giesecke, “Use of an EEGbiseptral closed-loop delivery system for administering propofol”, Acta
Anaesthesia Scandinavica, vol. 44, no. 8, pp. 1007-1010, Sep. 2000.
R.R. Jaklitsch and D.R. Westenskow, “A model-based self-adjusting
two-phase controller for vacuronium-induced muscle relaxation during
anesthesia”, IEEE Transactions on Biomedical Engineering, vol. BME34, no. 8, pp. 583-594, Aug. 1987.
J.S. Shieh, D.A. Linkens, and J.E. Peacock, “Hierarchical rule-based and
self-organizing fuzzy logic control for depth of anaesthesia”, IEEE
Transactions on Systems, Man, and Cybernetics-Part C: Applications
and Reviews, vol. 29, no. 1, pp. 98-109, Feb. 1998.
M. Mahfouf, C.S. Nunes, D.A. Linkens, and J.E. Peacock, “Modelling
and multivariable control in anaesthesia using neural-fuzzy paradigms:
part II. closed loop control of simultaneous administration of propofol
and remifentanil”, Artificial Intelligence in Medicine, vol. 35, no. 3, pp.
207-213, Nov. 2005.
D.R. Wada, D.R. Stanski, and W.F. Ebling, “A PC-based graphical
simulator for physiological pharmacokinetic models”, Computer
Methods and Programs in Biomedicine, vol. 46, no. 3, pp. 245-255, Apr.
1995.
W.M. Haddad, T. Hayakawa, and J.M. Bailey, “Adaptive control for
nonlinear compartmental dynamical systems with applications to clinical
pharmacology”, Systems & Control Letters, vol. 55, no. 1, pp. 62-70,
Jan. 2006.
W.M. Haddad, J.M. Bailey, T. Hayakawa, and N. Hovakimyan, “Neural
network adaptive output feedback control for intensive care unit sedation
and intraoperative anesthesia”, IEEE Transactions on Neural Networks,
vol. 18, no. 4, pp. 1049-1066, Jul. 2007.
W.M. Haddad and J.M. Bailey, “Closed-loop control for intensive care
unit sedation”, Best Practice & Research Clinical Anaesthesiology, vol.
23, no. 1, pp. 95-114, Mar. 2009.
W.M. Haddad, T. Hayakawa, and J.M. Bailey, “Adaptive control for
non-negative and compartmental dynamical systems with applications to
general anesthesia”, International Journal of Adaptive Control and
Signal Processing, vol. 17, no. 3, pp. 209-235, Apr. 2003.
K. Volyanskyy, W.M. Haddad, and J.M. Bailey, “Adaptive disturbance
rejection control for compartmental systems with application to
intraoperative anesthesia influence by hemorrhage and hemodilution
effects”, International Journal of Adaptive Control and Signal
Processing, vol. 23, no. 1, pp. 1-29, Jan. 2009.
W.M. Haddad, K.Y. Volyanskyy, J.M. Bailey, and J.J. Im,
“Neuroadaptive output feedback control for automated anesthesia with
noisy EEG measurements”, IEEE Transactions on Control Systems
Technology, vol. 19, no. 2, pp. 311-326, Mar. 2011.
S. Das, I. Pan, S. Das, and A. Gupta, “Master-slave chaos
synchronization via optimal fractional order PIλDμ controller with
bacterial foraging algorithm”, Nonlinear Dynamics, vol. 69, no. 4, pp.
2193-2206, Sep. 2012.
S. Das, I. Pan, K. Halder, S. Das and A. Gupta, “LQR based improved
discrete PID controller design via optimum selection of weighting
matrices using fractional order integral performance index”, Applied
Mathematical Modelling, vol. 37, no. 6, pp. 4253-4268, Mar. 2013.
I. Pan and S. Das, “Intelligent fractional order systems and control: an
introduction”, Series: Studies in Computational Intelligence, vol. 438,
2013, Springer-Heidelberg.
F. Merrikh-Bayat, “Rules for selecting the parameters of Oustaloup
recursive approximation for the simulation of linear feedback systems
containing PIλDμ controller”, Communications in Nonlinear Science and
Numerical Simulation, vol. 17, no. 4, pp. 1852-1861, Apr. 2012.
| 3cs.SY
|
SYSTEMS OF PARAMETERS AND HOLONOMICITY OF
A-HYPERGEOMETRIC SYSTEMS
arXiv:1302.0048v1 [math.AG] 1 Feb 2013
CHRISTINE BERKESCH, STEPHEN GRIFFETH, AND EZRA MILLER
Abstract. The main result is an elementary proof of holonomicity for A-hypergeometric
systems, with no requirements on the behavior of their singularities, originally due to
Adolphson [Ado94] after the regular singular case by Gelfand and Gelfand [GG86]. Our
method yields a direct de novo proof that A-hypergeometric systems form holonomic families over their parameter spaces, as shown by Matusevich, Miller, and Walther [MMW05].
Introduction
An A-hypergeometric system is the D-module counterpart of a toric ideal. Solutions
to A-hypergeometric systems are functions, with a fixed infinitesimal homogeneity, on an
affine toric variety. The solution space of an A-hypergeometric system behaves well in
part because the system is holonomic, which in particular implies that the vector space
of germs of analytic solutions at any nonsingular point has finite dimension.
This note provides an elementary proof of holonomicity for arbitrary A-hypergeometric
systems, relying only on the statement that a module over the Weyl algebra in n variables
is holonomic precisely when its characteristic variety has dimension at most n (see [Gab81]
or [BGK+ 87, Theorem 1.12]), along with standard facts about transversality of subvarieties and about Krull dimension. In particular, our proof requires no assumption about
the singularities of the A-hypergeometric system; equivalently, the associated toric ideal
need not be standard graded. Holonomicity was proved in the regular singular case by
Gelfand and Gelfand [GG86], and later by Adolphson [Ado94, §3] regardless of the behavior of the singularities of the system. Adolphson’s proof relies on careful algebraic
analysis of the coordinate rings of a collection of varieties whose union is the characteristic variety of the system. Another proof of the holonomicity of an A-hypergeometric
system, by Schulze and Walther [SW08], yields a more general result: for a weight vector L from a large family of possibilities, the L-characteristic variety for the L-filtration
is a union of conormal varieties and hence has dimension n; holonomicity follows when
L = (0, . . . , 0, 1, . . . , 1) induces the order filtration on the Weyl algebra. The L-filtration
method uses an explicit combinatorial interpretation of initial ideals of toric ideals, which
requires a series of technical lemmas.
Holonomicity of A-hypergeometric systems forms part of the statement and proof, by
Matusevich, Miller, and Walther [MMW05], that A-hypergeometric systems determine
Date: 22 January 2013.
2010 Mathematics Subject Classification. Primary: 33C70; Secondary: 13N10, 14M25, 16S32, 33C99.
EM had support from NSF grant DMS-1001437. SG acknowledges the financial support of Fondecyt
Proyecto Regular 1110072.
1
2
CHRISTINE BERKESCH, STEPHEN GRIFFETH, AND EZRA MILLER
holonomic families over their parameter spaces. The new proof of that statement here
serves as a model suitable for generalization to hypergeometric systems for reductive
groups, in the sense of Kapranov [Kap98].
The main step (Theorem 1.2) in our proof is an easy geometric argument showing that
the Euler operators corresponding to the rows of an integer matrix A form part of a system
of parameters on the product kn × XA , where k is any algebraically closed field and XA is
the toric variety over k determined by A. This observation leads quickly in Section 2 to
the conclusion that the characteristic variety of the associated A-hypergeometric system
has dimension at most n, and hence that the system is holonomic. Since the algebraic
part of the proof holds when the entries of β are considered as independent variables that
commute with all other variables, the desired stronger consequence is immediate: the Ahypergeometric system forms a holonomic family over its parameter space (Theorem 2.1).
1. Systems of parameters via transversality
Fix a field k. Let x = x1 , . . . , xn and ξ = ξ1 , . . . , ξn be sets of coordinates on kn and let
xξ denote the column vector with entries x1 ξ1 , . . . , xn ξn . Given a rectangular matrix L
with n columns, write Lxξ for the vector of bilinear forms given by multiplying L times xξ.
Lemma 1.1. Let k2n = knx × knξ have coordinates (x, ξ) and let X ⊆ knξ be a subvariety.
If L is an ℓ × n matrix with entries in k, then the variety Var(Lxξ) of Lxξ in k2n is
transverse to kn × X at any smooth point of kn × X whose ξ-coordinates are all nonzero.
Proof. It suffices to prove the statement after passing to the algebraic closure of k, so
assume k is algebraically closed. Let (p, q) be a smooth point of kn × X that lies in
Var(Lxξ) and has all coordinates of q nonzero. The tangent space to kn × X at (p, q)
contains kn × {0}. The tangent space T(p,q) to Var(Lxξ) is the kernel of the ℓ × 2n matrix
[L(q) L(p)], where L(p) (respectively, L(q)) is the ℓ×n matrix that results after multiplying
each column of L by the corresponding coordinate of p (respectively, q). Since the q
coordinates are all non-zero, T(p,q) projects surjectively onto the last n coordinates; indeed,
if η ∈ knξ is given, then taking yi = −pi ηi /qi yields y ∈ knx with L(q)y + L(p)η = 0. Thus
the tangent spaces at (p, q) sum to the ambient space, so the intersection is transverse.
The next result applies the lemma to an affine toric variety X. A fixed d × n integer
matrix A = [a1 a2 · · · an−1 an ] defines an action of the algebraic torus T = (k∗ )d on knξ by
t · ξ = (ta1 ξ1 , . . . , tan ξn ).
The orbit Orb(A) of the point 1 = (1, . . . , 1) ∈ kn is the image of an algebraic map
T → kn that sends t → t · 1. The closure of Orb(A) in kn is the affine toric variety
XA = Var(IA ) cut out by the toric ideal
IA = hξ u − ξ v | Au = Avi ⊆ k[ξ],
of A in the polynomial ring k[ξ] = k[ξ1 , . . . , ξn ]. The T -action induces an A-grading on k[ξ]
via deg(ξi ) = ai , and the semigroup ring SA = k[ξ]/IA is A-graded [MS, Chapters 7–8].
SYSTEMS OF PARAMETERS AND HOLONOMICITY OF A-HYPERGEOMETRIC SYSTEMS
3
For any face τ of the real cone R≥0 A generated by the columns of A, write τ A and let
1 ∈ {0, 1}n ⊂ kn be the vector with nonzero entry 1τi = 1 precisely when A has
F a nonzero
column ai ∈ τ . The variety XA decomposes as a finite disjoint union XA = τ A Orb(τ )
of orbits, where Orb(τ ) = T ·1τ . Each orbit has dimension dim Orb(τ ) = rank(Aτ ), where
Aτ is the submatrix of A consisting of those columns lying in τ , and dim XA = rank(A).
Theorem 1.2. The ring k[x, ξ]/ IA + hAxξi has Krull dimension n. In particular, if A
has rank d then the forms Axξ are part of a system of parameters for k[x] ⊗k SA .
τ
Proof. Let kτ ⊆ kn be the subspace consisting of vectors with 0 in coordinate i if
ai ∈
/ τ , and let |τ | be its dimension. Since k[x, ξ]/IA = k[x] ⊗k SA has dimension
n + rank(A) and the number of k-linearly independent generators of hAxξi is at most
rank(A), the Krull dimension in question is at least n. Hence it suffices to prove that
kn × Orb(τ ) ∩ Var(Axξ) ⊆ kn × kτ has dimension at most n. Let xτ and ξτ denote the
subsets corresponding to τ in the variable sets x and ξ, respectively. The projection of
the intersection onto the subspace kτ × kτ has image contained in
kτ × Orb(τ ) ∩ Var(Aτ xτ ξτ ) ⊆ kτ × kτ .
It therefore suffices to show that the dimension of this latter intersection is at most |τ |.
By Lemma 1.1, the intersection is transverse in kτ × kτ . But the dimension of Orb(τ ) is
the codimension of Var(Aτ xτ ξτ ) in kτ × kτ , which completes the proof.
2. Hypergeometric holonomicity
In this section, the matrix A is a d × n integer matrix of full rank d. Let
D = Chx, ∂ [∂i , xj ] = δij and [xi , xj ] = 0 = [∂i , ∂j ]i
denote the Weyl algebra over the complex numbers C, where x = x1 , . . . , xn and ∂i
corresponds to ∂x∂ i . This is the ring of C-linear differential operators on C[x].
For β ∈ Cd , the A-hypergeometric system with parameter β is the left D-module
MA (β) = D/D · (IA∂ , {Ei − βi }di=1 ),
where IA∂ = h∂ u − ∂ v | Au = Avi ⊆ C[∂] is the toric ideal associated to A and
n
X
Ei − βi =
aij xj ∂j − βi
j=1
are Euler operators associated to A.
The order filtration F filters D by order of differential operators. The symbol of an
operator P is its image in(P ) ∈ grF D. Writing ξi = in(∂i ), this means grF D is the
commutative polynomial ring C[x, ξ]. The characteristic variety of a left D-module M is
the variety in A2n of the associated graded ideal grF ann(M) of the annihilator of M. A
nonzero D-module is holonomic if its characteristic variety has dimension n; this is equivalent to requiring that the dimension be at most n; see [Gab81] or [BGK+ 87, Theorem 1.12].
4
CHRISTINE BERKESCH, STEPHEN GRIFFETH, AND EZRA MILLER
The rank of a holonomic D-module M is the (always finite) dimension of C(x) ⊗C[x] M as
a vector space over C(x); this number equals the dimension of the vector space of germs
of analytic solutions of M at any nonsingular point in Cn [SST00, Theorem 1.4.9].
Viewing the A-hypergeometric system MA (β) as having a varying parameter β ∈ Cd ,
the rank of MA (β) is upper semicontinuous as a function of β [MMW05, Theorem 2.6].
This follows by viewing MA (β) as a holonomic family [MMW05, Definition 2.1] parametrized by β ∈ Cd . By definition, this means not only that MA (β) is holonomic for
each β, but also that it satisfies a coherence condition over Cd , namely: after replacing
β with variables b = b1 , . . . , bd , the module C(x) ⊗C[x] MA (b) is finitely generated over
C(x)[b]. (The definition of holonomic family in [MMW05] allows sheaves of D-modules
over arbitrary complex base schemes, but that generality is not needed here.)
The derivation of the holonomic family property for MA (b) from the holonomicity of the
A-hypergeometric system is more or less the same as in [MMW05, Theorem 7.5], which was
phrased in the generality of Euler–Koszul homology of toric modules. The brief deduction
here isolates the steps necessary for A-hypergeometric systems; its brevity stems from the
special status of affine semigroup rings among all toric modules [MMW05, Definition 4.5].
Theorem 2.1. The module MA (b) forms a holonomic family over Cd with coordinates b.
In more detail, as a D[b]-module the parametric A-hypergeometric system MA (b) satisfies:
1. the fiber MA (β) = MA (b) ⊗C[b] C[b]/hb − βi is holonomic for all β; and
2. the module C(x) ⊗C[x] MA (b) is finitely generated over C(x)[b].
Proof. Since R = C[x, ξ]/hin(IA ), Axξi surjects onto grF MA (β), it is enough to show that
the ring R has dimension n. If MA (β) is standard Z-graded (equivalently, the rowspan
of A over the rational numbers contains the row [1 1 · · · 1 1] of length n), then in(IA ) =
IA ⊆ C[ξ], and the result follows from Theorem 1.2.
When MA (β) is not standard Z-graded, let  be the (d + 1) × (n + 1) matrix obtained
by adding a row of 1’s across the top of A and then adding as the leftmost column
(1, 0, . . . , 0). If ξ0 denotes a new variable corresponding to the leftmost column of Â, and
ˆ
ξˆ = {ξ0 } ∪ ξ, then C[ξ]/ in(IA ) ∼
= C[ξ]/hI
 , ξ0 i. In particular,
ˆ
C[x̂, ξ]
C[x̂, ξ]
∼
,
=
ˆ
hin(IA ), Axξi
hIÂ , ξ0 , Âx̂ξi
where x̂ = {x0 } ∪ x. Since hI , ξ0i is Â-graded and  has a row [1 1 · · · 1 1], we have
reduced to the case where MA (β) is Z-graded, completing part 1.
With R as in part 1, the ring R[b] surjects onto grF MA (b), so it suffices for part 2
to show that R[b] becomes finitely generated over C(x)[b] upon inverting all nonzero
polynomials in x. Since the ideal hin(IA ), Axξi has no generators involving b variables, it
suffices to show that R(x) itself has finite dimension over C(x). The desired result from
the statement proved for part 1: any scheme of dimension n has finite degree over Cnx .
SYSTEMS OF PARAMETERS AND HOLONOMICITY OF A-HYPERGEOMETRIC SYSTEMS
5
References
[Ado94]
Alan Adolphson, Hypergeometric functions and rings generated by monomials, Duke Math.
J. 73 (1994), 269–290.
[BGK+ 87] A. Borel, P.-P. Grivel, B. Kaup, A. Haefliger, B. Malgrange, and F. Ehlers, Algebraic Dmodules, Perspectives in Mathematics 2, Academic Press, Inc., Boston, MA, 1987.
[Gab81]
Ofer Gabber, The integrability of the characteristic variety, Amer. J. Math. 103 (1981), no.
3, 445–468.
[GG86]
I. M. Gelfand and S. I. Gelfand, Generalized hypergeometric equations, (Russian) Dokl. Akad.
Nauk SSSR 288 (1986), no. 2, 279–283. English Translation: Soviet Math. Dokl. 33 (1986),
no. 3, 643–646.
[GGZ87] I. M. Gelfand, M. I. Graev, and A. V. Zelevinsky, Holonomic systems of equations and series
of hypergeometric type, Dokl. Akad. Nauk SSSR 295 (1987), no. 1, 14–19.
[GKZ90] I. M. Gelfand, M. Kapranov, and A. V. Zelevinsky, Generalized Euler integrals and Ahypergeometric functions, Adv. Math. 84 (1990), no. 2, 255–271.
[GKZ93] I. M. Gelfand, A. V. Zelevinsky, and M. M. Kapranov, Hypergeometric functions and toric
varieties, Funktsional. Anal. i Prilozhen. 23 (1989), no. 2, 12–26. Correction in ibid, 27
(1993), no. 4, 91.
[GKZ94] I. M. Gelfand, M. Kapranov, and A. V. Zelevinsky, Discriminants, resultants and multidimensional determinants, Mathematics: Theory & Applications. Birkhäuser Boston, Inc., Boston,
MA, 1994.
[Kap98]
Mikhail Kapranov, Hypergeometric functions on reductive groups, Integrable systems and algebraic geometry (Kobe/Kyoto, 1997), World Sci. Publishing, River Edge, NJ, 1998, pp. 236–
281.
[MMW05] Laura Felicia Matusevich, Ezra Miller, and Uli Walther, Homological methods for hypergeometric families, J. Amer. Math. Soc. 18 (2005), no. 4, 919–941.
[MS]
Ezra Miller and Bernd Sturmfels, Combinatorial commutative algebra, Graduate Texts in
Mathematics, 227. Springer-Verlag, New York, 2005.
[SST00]
Mutsumi Saito, Bernd Sturmfels, and Nobuki Takayama, Gröbner Deformations of Hypergeometric Differential Equations, Springer–Verlag, Berlin, 2000.
[SW08]
Mathias Schulze and Uli Walther, Irregularity of hypergeometric systems via slopes along
coordinate subspaces, Duke Math. J. 142 (2008), no. 3, 465–509.
Department of Mathematics, Duke University, Box 90320, Durham, NC 27708
E-mail address: [email protected]
Instituto de Mathemática y Fı́sica, Universidad de Talca, Camino Lircay, Talca, Chile
E-mail address: [email protected]
Department of Mathematics, Duke University, Box 90320, Durham, NC 27708
E-mail address: [email protected]
| 0math.AC
|
Top-Down Synthesis of Multi-Agent Formation Control:
An Eigenstructure Assignment based Approach
arXiv:1708.04851v1 [cs.SY] 16 Aug 2017
Takatoshi Motoyama and Kai Cai
Abstract— We propose a top-down approach for formation
control of heterogeneous multi-agent systems, based on the
method of eigenstructure assignment. Given the problem of
achieving scalable formations on the plane, our approach
globally computes a state feedback control that assigns desired closed-loop eigenvalues/eigenvectors. We characterize the
relation between the eigenvalues/eigenvectors and the resulting
inter-agent communication topology, and design special (sparse)
topologies such that the synthesized control may be implemented locally by the individual agents. Moreover, we present
a hierarchical synthesis procedure that significantly improves
computational efficiency. Finally, we extend the proposed approach to achieve rigid formation and circular motion, and
illustrate these results by simulation examples.
I. I NTRODUCTION
Cooperative control of multi-agent systems has been an
active research area in the systems control community [1],
[2], [3], [4], [5]. Among many problems, formation control
has received much attention [6] owing to its wide applications such as satellite formation flying, search and rescue,
terrain exploration, and foraging. A main problem studied
is stabilization to a rigid formation, where the goal is to
steer the agents to achieve a formation with a specified
size and only freedoms of translation and rotation. Several
control strategies have been proposed: affine feedback laws
[7], [8], nonlinear gradient-based control [9], [10], and anglebased algorithms [11]. Achieving a scalable formation with
unspecified size has also been studied [12], [13]; a scalable
formation may allow the group to adapt to unknown environment with obstacles or targets. In addition, [14], [15] have
presented methods of controlling formations in motion.
These different methods for formation control have a
common feature in design: namely bottom-up. Specifically,
the inter-agent communication topology is given a priori,
which defines the neighbors for each agent. Then based only
on the neighborhood information, local control strategies
are designed for the individual agents. The properties of
the designed local strategies are finally analyzed at the
systemic (i.e. global) level, and correctness is proved under
certain graphical conditions on the communication topology.
This bottom-up design is indeed the mainstream approach
for cooperative control of multi-agent systems that places
emphasis on distributed control.
In this paper, we propose a distinct, top-down approach
for formation control, based on a known method called
eigenstructure assignment [16], [17], [18], [19]. Different
The authors are with Dept. of Electrical and Information Engineering,
Osaka City University, Japan. Emails: [email protected],
[email protected].
from the bottom-up approach, here there need not be any
communication topology imposed a priori (in fact the agents
are typically assumed independent, i.e. uncoupled), and
no design will be done at the local level. Indeed, given
a multi-agent formation control problem characterized by
specific eigenvalues and eigenvectors (precisely defined in
Section II), our approach constructs on the global level a
feedback matrix (if it exists) that renders the closed-loop
system to possess those desired eigenvalues/eigenvectors,
thereby achieving desired formations. Moreover, the synthesized feedback matrix (its off-diagonal entries being zero or
nonzero) defines the communication topology, and accordingly the computed feedback control may be implemented
by individual agents. Thus our approach features “compute
globally, implement locally”.
The inter-agent communication topology is a result of
control synthesis, rather than given a priori. We characterize the relation between the resulting topology and the
eigenstructure chosen for the synthesis. Further, we show
that by appropriately choosing desired eigenvalues and the
corresponding eigenvectors, special topologies (star, cyclic,
line) can be designed, and the computed feedback control
may be implemented locally over these (sparse) topologies.
Although our method requires centralized computation of
control gain matrices, we show that a straightforward extension of the approach to a hierarchical synthesis procedure
significantly reduces computation time. Empirical evidence is
provided to show the efficiency of the proposed hierarchical
synthesis procedure; in particular, computation of a feedback
control for a group of 1000 agents needs merely a fraction
of a second, which is likely to suffice for many practical
purposes.
The main advantage of our top-down approach is that
it is systematic, in the sense that it treats heterogeneous
agent dynamics and different cooperative control specifications (characterizable by desired eigenstructure) by the
same synthesis procedure. We show that scalable formation,
rigid formation, and cooperative circular motion can all be
addressed using the same method. Additionally, we show that
this method is amenable to deal with more general cases
where some agents are not self-stabilizable and the initial
inter-agent connections are arbitrary.
We first proposed this eigenstructure assignment based
approach in [20], where we applied it to solve the consensus
problem. Then the conference precursor [21] of this paper
extended the approach to solve scalable and rigid formations, and proposed a hierarchical synthesis procedure to
significantly shorten the computation time. This paper differs
from [21] in the following aspects. (i) A precise relation
between eigenstructure and topology is characterized (Section III). (ii) A method for imposing topological constraints
on eigenstructure assignment is presented (Section III.B).
(iii) More general cases where the initial inter-agent topology is arbitrary and/or there exist non-stabilizable agents
are addressed (Section IV). (iv) The problem of achieving
cooperative circular motion is solved. (v) All the proofs are
provided.
We note that [22] also proposed an eigenstructure assignment method and applied it to the multi-agent consensus
problem. Their approach is bottom-up: first a communication
topology is imposed among the agents, then local control
strategies are designed based on eigenstructure assignment
respecting the topology, and finally the correctness of the
proposed strategies is verified at the global level. By contrast, our approach is top-down: no topology is imposed
a priori, and topology is a result of control synthesis.
Moreover, we characterize the relation between topology and
eigenstructure, and design special topologies by selecting
special eigenstructures. In addition, the problems addressed
in the paper are distinct, namely scalable/rigid formation
and circular motion on the plane, which involve complex
eigenvalues and eigenvectors.
The rest of the paper is organized as follows. In Section II
we review the basics of eigenstructure assignment and formulate the multi-agent formation control problem. In Section III
we solve the problem by eigenstructure assignment, and
discuss the relations between eigenvalues/eigenvectors and
topologies. In Section IV we study the more general cases
where the initial inter-agent topology is arbitrary and/or there
exist non-stabilizable agents. In Section V we present a
hierarchical synthesis procedure to reduce computation time,
and in Section VI extend the method to achieve rigid formation and circular motion. Simulation examples are given in
Section VII and our conclusions stated in Section VIII.
N1 (λ)
N (λ) :=
∈ C(n+m)×m
N2 (λ)
First we review the basics of eigenstructure assignment [16]. Consider a linear time-invariant finite-dimensional
system modeled by
(1)
where x ∈ Cn is the state vector, u ∈ Cm the input vector,
and A ∈ Rn×n , B ∈ Rn×m .
Suppose we modify (1) by state feedback u = F x. It
is well-known (e.g. [23]) that F may be chosen to assign
any (self-conjugate) set of closed-loop eigenvalues for ẋ =
(A + BF )x if and only if (A, B) is controllable. Unless
m = 1 (single input), however, F is not uniquely determined
by a set of closed-loop eigenvalues. Indeed, with state
feedback F one has additional freedom to assign certain sets
of closed-loop eigenvectors. Simultaneously assigning both
eigenvalues and eigenvectors is referred to as eigenstructure
assignment.
(2)
with linearly independent columns such that
N1 (λ)
λI − A B
= 0.
N2 (λ)
(3)
Thus the columns of N (λ) form a basis of Ker[λI − A B];
Ker denotes kernel. Also we will use Im to denote image.
Lemma 1: ([16]) Consider the system (1) and suppose that
(A, B) is controllable and KerB = 0. Let {λ1 , . . . , λn } be
a set of distinct complex numbers, and {v1 , . . . , vn } a set of
linearly independent vectors in Cn . Then there is a unique
F such that for every i ∈ [1, n], (A + BF )vi = λi vi if and
only if
(∀i ∈ [1, n])vi ∈ ImN1 (λi )
(4)
where N1 (·) is in (2).
Lemma 1 provides a necessary and sufficient condition
of eigenstructure assignment. When the condition holds and
thus F exists for assigning distinct complex eigenvalues λi
and the corresponding eigenvectors vi (i ∈ [1, n]), F may be
constructed by the following procedure [16].
(i) For each λi compute a basis of Ker[λi I − A B]. Stack
the basis vectors to form N (λi ) in (2); partition N (λi )
properly to get N1 (λi ) and N2 (λi ).
(ii) Find wi = −N2 (λi )ki , where ki ∈ C is such that
N1 (λi )ki = vi (the condition KerB = 0 in Lemma 1
ensures that N1 (λi ) has independent columns; thus ki may
be uniquely determined).
(iii) Compute F by
F = [w1 · · · wn ][v1 · · · vn ]−1 .
II. PRELIMINARIES AND PROBLEM
FORMULATION
A. Preliminaries on Eigenstructure Assignment
ẋ = Ax + Bu
Let λ ∈ C. It is shown in [16] that if (A, B) is controllable,
then there exists
(5)
Note that the entries of F may include complex numbers
in general. If {λ1 , . . . , λn } is a self-conjugate set of distinct
complex numbers, and vi = v̄j wherever λi = λ̄j (¯· denotes
complex conjugate), then all entries of F are real numbers.
The procedure (i)-(iii) of computing F has complexity
O(n3 ), inasmuch as the calculations involved are solving
systems of linear equations, matrix inverse and multiplication
(e.g. [24]).
We note that the above eigenstructure assignment result
may be extended to the case of repeated eigenvalues with
generalized eigenvectors. For details refer to [17] or Appendix.
B. Problem Formulation
Consider a heterogeneous multi-agent system where each
agent is modeled by a first-order ODE:
ẋi = ai xi + bi ui ,
i = 1, . . . , n.
(6)
Here xi ∈ C is the state variable, ui ∈ C the control variable,
ai ∈ R and bi (6= 0) ∈ R are constant parameters. Thus each
agent is a point mass moving on the complex plane, with
possibly stable (ai < 0), semistable (ai = 0) or unstable
(ai > 0) dynamics. The requirement bi 6= 0 is to ensure
stabilizability/controllability of (ai , bi ); thus each agent is
stabilizable/controllable. Note that represented by (6), the
agents are independent (i.e. uncoupled) and no inter-agent
topology is imposed at this stage.
In vector-matrix form, the system of n independent agents
is
ẋ = Ax + Bu
(7)
where x := [x1 · · · xn ]⊤ ∈ Cn , u := [u1 · · · un ]⊤ ∈ Cn ,
A := diag(a1 , . . . , an ) and B := diag(b1 , . . . , bn ); here
diag(·) denotes a diagonal matrix with the specified diagonal
entries. Consider modifying (7) by a state feedback u = F x
and thus the closed-loop system is
ẋ = (A + BF )x.
(8)
Straightforward calculation shows that the diagonal entries
of A + BF are ai + bi Fii , and the off-diagonal entries bi Fij .
Since bi 6= 0, the off-diagonal entries (A + BF )ij 6= 0 if
and only if Fij 6= 0 (i 6= j).
In view of the structure of A + BF , we can define a
corresponding directed graph G = (V, E) as follows: the
node set V := {1, . . . , n} with node i ∈ V standing for
agent i (or state xi ); the edge set E ⊆ V × V with edge
(j, i) ∈ V if and only if F ’s off-diagonal entry Fij 6= 0 .
Since Fij 6= 0 implies that xi uses xj in its state update,
we say for this case that agent j communicates its state
xj to agent i, or j is a neighbor of i. The graph G is
therefore called a communication network among agents,
whose topology is decided by the off-diagonal entries of F .
Thus the communication topology is not imposed a priori,
but emerges as the result of applying the state feedback
control u = F x.
Now we define the formation control problem of the multiagent system (7).
Problem 1: Consider the multi-agent system (7) and specify a vector f ∈ Cn (f 6= 0). Design a state feedback
control u = F x such that for every initial condition x(0),
limt→∞ x(t) = cf for some constant c ∈ C.
In Problem 1, the specified vector f represents a desired formation configuration in the plane. By formation
configuration we mean that the geometric information of
the formation remains when scaling and rotational effects
are discarded. Indeed, by writing the constant √
c ∈ C in
the polar coordinate form (i.e. c = ρejθ , j = −1), the
final formation cf is the configuration f scaled by ρ and
rotated by θ. The constant c is unknown a priori and in
general depends on the initial condition x(0). Note also that
Problem 1 includes the consensus problem as a special case
when f = 1 := [1 · · · 1]⊤ .
To solve Problem 1, we note the following fact.
Proposition 1: Consider the multi-agent system (7) and
state feedback u = F x. If A+BF has a simple eigenvalue 0,
with the corresponding eigenvector f , and other eigenvalues
have negative real parts, then for every initial condition x(0),
limt→∞ x(t) = cf for some c ∈ C.
Proof: The solution of the closed-loop system (8)
is x(t) = e(A+BF )t x(0). Since A + BF has a simple
eigenvalue 0, with the corresponding eigenvector f , and other
eigenvalues have negative real parts, it follows from the
standard linear systems analysis that x(t) → (w⊤ x(0))f as
t → ∞. Here w ∈ Cn is the left-eigenvector of A+BF with
respect to the eigenvalue 0. Therefore limt→∞ x(t) = cf ,
where c := w⊤ x(0).
In view of Proposition 1, if the specified eigenvalues and
the corresponding eigenvectors may be assigned by state
feedback u = F x, then Problem 1 is solved. To this end,
we resort to eigenstructure assignment.
III. M AIN R ESULTS
In this section, we solve Problem 1, the formation control
problem of multi-agent systems, by the method of eigenstructure assignment. The following is our first main result.
Theorem 1: Consider the multi-agent system (7) and let
f be a desired formation configuration. Then there always
exists a state feedback control u = F x that solves Problem 1,
i.e.
(∀x(0) ∈ Cn )(∃c ∈ C) lim x(t) = cf.
t→∞
Proof: By Proposition 1, the multi-agent system (7)
with u = F x achieves a formation configuration f ∈
Cn if the closed-loop matrix A + BF has the following
eigenstructure: (i) its eigenvalues {λ1 , λ2 , . . . , λn } satisfy
0 = λ1 < |λ2 | ≤ · · · ≤ |λn |, and (∀i ∈ [2, n])Re(λi ) < 0
(9)
(ii) the corresponding eigenvectors
{v1 , v2 , . . . , vn } are linearly independent, and v1 = f
(10)
So we must verify that the above eigenstructure is assignable
by state feedback u = F x for the multi-agent system (7).
Note that except for (λ1 , v1 ) which is fixed, we have freedom
to choose (λi , vi ), i ∈ [2, n]. For simplicity we let λi be all
distinct, and thus Lemma 1 can be applied.
In (7), we have A = diag(a1 , . . . , an ), B =
diag(b1 , . . . , bn ), and bi 6= 0 for all i ∈ [1, n]. Thus it is easily
checked that the pair (A, B) is controllable and KerB = 0.
To show that there exists F such that (A + BF )vi = λi vi ,
for each i ∈ [1, n] (with λi , vi specified above), it suffices to
verify the condition (4) of Lemma 1.
First, for λ1 = 0, we find a basis for
Ker[λ1 I − A B] = Ker[−A B]
and derive N1 (λ1 ) = B and N2 (λ1 ) = A (N1 (·), N2 (·) in
(2)). Thus ImN1 (λ1 ) = Cn , and hence v1 = f ∈ ImN1 (λ1 ),
i.e. the condition (4) of Lemma 1 holds.
Next, let i ∈ [2, n]; we find a basis for Ker[λi I − A B]
and derive N1 (λi ) = B and N2 (λi ) = A − λi I. So again
ImN1 (λi ) = Cn , and vi ∈ ImN1 (λi ), i.e. the condition (4) of
control gain). As an example, for (ii) in Example 1 assign
the second largest eigenvalue λ2 = −2 (originally −1), and
change v4 = [0 0 21 − 1]. This results in a new feedback
matrix
−4 1 2 1
−1 −2 2 1
F2′ =
−2 0 0 2
0
1 2 −3
Fig. 1.
Example 1
Lemma 1 holds. Therefore, we conclude that there always
exists a state feedback u = F x such that the multi-agent
system (7) achieves the formation configuration f .
In the proof we considered distinct eigenvalues λi , i ∈
[1, n]; hence the control gain matrix F may be computed
by (5). The computed F in turn gives rise to the agents’
communication graph G. The following is an illustrative
example.
Example 1: Consider the multi-agent system (7) of 4
single integrators (that is, ai = 0 and bi = 1, i = 1, ..., 4).
(i) Square
formation with f = [1 j − 1 − j]⊤
√
(j = −1). Let the desired closed-loop eigenvalues be
λ1 = 0, λ2 = −1, λ3 = −2, λ4 = −3 and the corresponding
eigenvectors be v1 = f , v2 = [1 1 0 0]⊤ , v3 =
[0 1 1 0]⊤ , v4 = [0 0 1 0]⊤ . By (5) one computes the
control gain matrix F1 , which determines the corresponding
communication graph G1 (see Fig. 1).
Observe that F1 contains complex entries, which may be
viewed as control gains for the real and imaginary axes,
respectively, or scaling and rotating gains on the complex
plane. Also note that G1 has a spanning tree with node 4
the root, and the computed feedback control u = F x can be
implemented by the four agents individually.
(ii) Consensus with f = [1 1 1 1]⊤ . Let the desired
eigenvalues be λ1 = 0, λ2 = −1, λ3 = −3, λ4 = −4 and
the corresponding eigenvectors be v1 = f , v2 = [1 1 0 1]⊤ ,
v3 = [1 0 0 1]⊤ , v4 = [0 0 1 − 1]⊤ . Again by (5) one
computes the control gain matrix F2 and the corresponding
graph G2 (see Fig. 1).
Note that in this case F2 is real and G2 strongly connected.
But unlike the usual consensus algorithm (e.g. [2]), −F2
is not a graph Laplacian matrix for the entries (2, 1) and
(3, 1) are positive. Thus our eigenstructure assignment based
approach may generate a larger class of consensus algorithms
with negative weights.
We remark that in our approach, the convergence speed
to the desired formation configuration is assignable. This is
because the convergence speed is dominated by the eigenvalue λ2 , with the second largest real part, of the closedloop system ẋ = (A + BF )x; and in our approach λ2
is freely assignable. The smaller the Re(λ2 ) is, the faster
the convergence to formation occurs (at the cost of higher
which has zero entries at the same locations as F2 . Thus with
the same topology, F2′ achieves faster convergence speed.
As we have seen in Example 1, the feedback matrix
F ’s off-diagonal entries, which determine the topology of
G, are dependent on the choice of eigenvalues as well
as eigenvectors. Namely different sets of eigenvalues and
eigenvectors result in different inter-agent communication
topologies. Our next result characterizes a precise relation
between the eigenvalues/eigenvectors and the topologies.
Theorem 2: Consider the multi-agent system (7) and f
a desired formation configuration. Let the eigenstructure λi
and vi (i = 1, ..., n) be as in (9) and (10), and denote the
rows of [v1 · · · vn ]−1 by vi∗ . Then the communication graph
G = (V, E) of the (closed-loop) multi-agent system is such
that
(i1 , j1 ), . . . , (iK , jK ) ∈
/E
(K ≥ 1)
if and only if the vector
[λ2 · · · λn ]⊤
is orthogonal to the subspace spanned by the K vectors:
[v2 i1 v2∗ j1 · · · vn i1 vn∗ j1 ]⊤ , · · · , [v2 iK v2∗ jK · · · vn iK vn∗ jK ]⊤ .
Proof: For each λi , i ∈ [1, n], we derive from (3) that
(λi I − A)N1 (λi ) + BN2 (λi ) = 0
Choose N1 (λi ) = B and N2 (λi ) = −(λi I − A) to satisfy
the above equation. Then ki = N1−1 (λi )vi = B −1 vi and
wi = −N2 (λi )ki = (λi I − A)B −1 vi . By (5) we have
F = [w1 · · · wn ][v1 · · · vn ]−1
= [(λ1 I − A)B −1 v1 · · · (λn I − A)B −1 vn ][v1 · · · vn ]−1
= B −1 (−A[v1 · · · vn ] + [λ1 v1 · · · λn vn ])[v1 · · · vn ]−1
= −B −1 A + B −1 [v1 · · · vn ]diag(λ1 , . . . , λn )[v1∗ · · · vn∗ ]⊤ .
Thus the closed-loop matrix
A + BF = [v1 · · · vn ]diag(λ1 , . . . , λn )[v1∗ · · · vn∗ ]⊤ .
(11)
The (i, j)-entry of A + BF is
∗
∗
∗
(A + BF )ij = λ1 v1i v1j
+ λ2 v2i v2j
+ · · · + λn vni vnj
∗
∗
= λ2 v2i v2j
+ · · · + λn vni vnj
= [λ2 · · ·
∗
λn ][v2i v2j
···
(λ1 =
∗ ⊤
vni vnj ] .
0)
Therefore (A + BF )i1 j1 = · · · = (A + BF )iK jK = 0, i.e. in
the communication graph (i1 , j1 ), . . . , (iK , jK ) ∈
/ E, if and
only if the vector [λ2 · · · λn ]⊤ is orthogonal to each of the
following K vectors:
[v2 i1 v2∗ j1 · · · vn i1 vn∗ j1 ]⊤ , · · · , [v2 iK v2∗ jK · · · vn iK vn∗ jK ]⊤ .
Namely [λ2 · · · λn ]⊤ is orthogonal to the subspace spanned
by these K vectors.
Once the desired eigenvalues and eigenvectors are chosen,
Theorem 2 provides a necessary and sufficient condition
to check the interconnection topology among the agents,
without actually computing the feedback matrix F . On
the other hand, the problem of choosing an appropriate
eigenstructure to match a given topology is more difficult,
inasmuch as there are many free variables to be determined in
the eigenvalues and eigenvectors. While we shall investigate
the general problem of eigenstructure design for imposing
particular topologies in our future work, in the next subsection, nevertheless, we show that choosing certain appropriate
eigenstructures results in certain special (sparse) topologies.
With these topologies the synthesized control u = F x may
be implemented in a distributed fashion.
A. Special Topologies
We show how to derive the following three types of special
topologies by choosing appropriate eigenstructures.
1) Star Topology: A directed graph G = (V, E) is a star
topology if there is a single root node, say node 1, and
E = {(1, i)|i ∈ [2, n]}. Thus all the other nodes receive
information from, and only from, the root node 1. In terms
of the total number of edges, a star topology is one of the
sparsest topologies, with the least number (n − 1) of edges,
that contain a spanning tree. Now consider the following
eigenstructure.
eigenvalues: λ1 = 0, λ2 , . . . , λn distinct
and Re(λ2 ), . . . , Re(λn ) < 0
f1 0 · · ·
f2 1 · · ·
eigenvectors: [v1 v2 · · · vn ] = .
.. . .
..
.
.
(independent)
fn 0 · · ·
we derive
0
0
λ2
..
.
0
− λf2 f2
1
A + BF =
..
.
− λnf1fn
···
···
..
.
···
0
0
..
.
λn
.
Therefore the corresponding graph G is a star topology with
node 1 the root.
2) Cyclic Topology: A directed graph G = (V, E) is a
cyclic topology if E = {(1, 2), (2, 3), ..., (n − 1, n), (n, 1)}.
Consider the following eigenstructure.
eigenvalues: {λ1 , λ2 , . . . , λn } = {0, ω − 1, . . . , ω n−1 − 1}
eigenvectors: [v1 v2 · · · vn ] =
(independent)
where ω := e2πj/n (j =
√
f1
f2
f3
..
.
f1
f2 ω
f3 ω 2
..
.
···
···
···
..
.
f1
f2 ω n−1
f3 ω 2(n−1)
..
.
fn
fn ω n−1
···
fn ω (n−1)(n−1)
(13)
−1).
Proposition 3: Consider the multi-agent system (7). If the
eigenstructure (13) is used in the synthesis of feedback
control u = F x, then Problem 1 is solved and the resulting
G is a cyclic topology.
Proof: Following the same lines as the proof of
Proposition 2, and using the eigenstructure in (13) and
1
1
1
···
f1
f2
fn
1
ω̄
ω̄ n−1
···
f1
f2
fn
11
ω̄ 2
ω̄ 2(n−1)
−1
···
[v1 v2 · · · vn ] = f1
f2
fn
n .
..
..
..
.
.
(n−1)
(n−1)(n−1)
ω̄
ω̄
1
·
·
·
f1
f2
fn
we derive
0
0
..
.
1
(12)
Proposition 2: Consider the multi-agent system (7). If the
eigenstructure (12) is used in the synthesis of feedback
control u = F x, then Problem 1 is solved and the resulting
graph G is a star topology.
Proof: First, it follows from the proof of Theorem 1
that the eigenstructure (12) can be assigned to the closedloop matrix A + BF . Then by Proposition 1, Problem 1 is
solved.
Now proceed analogously to the proof of Theorem 2
and derive A + BF as in (11). Substituting into (11) the
eigenvalues and eigenvectors in (12), as well as
1
0 ··· 0
f1
− f2 1 · · · 0
f1
−1
[v1 v2 · · · vn ] =
.. . .
..
..
. .
.
.
− ffn1 0 · · · 1
−1 ff21
0 −1
..
..
.
.
A + BF =
0
fn
f1
0
0
0
f2
f3
..
.
0
0
···
···
..
.
..
.
0
0
..
.
fn−1
fn
···
−1
.
By inspection, we conclude that the corresponding graph G
is a cyclic topology.
3) Line Topology: A directed graph G = (V, E) is a
(directed) line topology if there is a single root node, say
node 1, and E = {(1, 2), (2, 3), ..., (n − 1, n)}. A line
topology is also one of the sparsest topologies containing
a spanning tree. Now consider the following eigenstructure.
eigenvalues: λ1 = 0, λ2 = · · · = λn = −1
f1
f2
..
.
eigenvectors: [v1 v2 · · · vn ] =
(independent)
fn−1
fn
0
0
..
.
0
−fn
···
···
.
..
···
0
−f2
..
.
−fn−1
−fn
(14)
Proposition 4: Consider the multi-agent system (7). If the
eigenstructure (14) is used in the synthesis of feedback
control u = F x, then Problem 1 is solved and the resulting
G is a line topology.
Note that in (14) we have repeated eigenvalues (λ2 )
and the corresponding generalized eigenvectors. As a result,
Lemma 1 and (5) for computing the control gain matrix
F cannot be applied to this case. Instead, we resort to
the generalized method of [17], and provide a proof of
Proposition 4 in Appendix.
By (16) we set the new feedback matrix
B. Topology Constrained Eigenstructure Assignment
namely F̂ is the same as the originally computed F except
for the ith row replaced by F̂i⊤ computed in (16) and F̂ij =
0.1
While the new feedback matrix F̂ satisfies the imposed
topological constraint, the eigenstructure of A + B F̂ is
generally different from that of A + BF . Therefore, we
must verify if the new eigenvalues/eigenvectors still satisfy
(9) and (10), i.e. achieve formation control. This verification
need not always be successful, but in case it does turn
out successful, we are guaranteed to achieve the desired
formation with a feedback matrix satisfying the imposed
topological constraint. We illustrate the above method by the
following example.
Example 2: Consider the multi-agent system (7) of 5 single integrators (that is, ai = 0 and bi = 1, i = 1, ..., 5), and
the desired formation is simply consensus (f = [1 1 1 1 1]⊤ ).
Choose the following eigenvalues and eigenvectors
We end this section by presenting an alternative approach
to imposing topological constraints on eigenstructure assignment.
Suppose that we have computed by (5) a feedback matrix
F to achieve a desired formation, i.e. the closed-loop matrix
(A+BF )’s eigenvalues λ1 , ..., λn and eigenvectors v1 , ..., vn
satisfy (9) and (10). Now assume that a topological constraint
is imposed such that agent i cannot receive information from
agent j (for reasons such as cost or physical impossibility).
But unfortunately, in the computed F the (i, j)-entry Fij 6=
0. Thus our goal is to derive a new feedback matrix F̂ , by
suitably modifying F , such that F̂ij = 0. In doing so, the
new closed-loop matrix A+B F̂ will generally have different
eigenvalues λ̂1 , ..., λ̂n and eigenvectors v̂1 , ..., v̂n . Hence we
must check if these new eigenvalues and eigenvectors still
satisfy (9) and (10).
Our approach proceeds as follows, which is inspired by
the “constrained feedback” method in [18]. Writing V :=
[v1 · · · vn ] and J := diag(λ1 , ..., λn ), we have from (11):
(A + BF )V = V J
⇒BF V = V J − AV
⇒F V = B −1 (V J − AV ).
F1
..
.
F̂ :=
F̂i1
···
F̂i(j−1)
0
..
.
F̂i(j+1)
···
Fn
F̂in
(17)
eigenvalues: {λ1 , λ2 , λ3 , λ4 , λ5 } = {0, −1, −2, −3, −4}
1
1
eigenvectors: [v1 v2 v3 v4 v5 ] =
1
1
1
0
1
0
0
0
0
0
1
0
1
0
0
1
1
0
0
1
−1
0
1
the feedback matrix F to achieve
Let ψ := B −1 (V J − AV ) and denote by ψi the ith row
of ψ, also Fi the ith row of F . Then the above equation is
rewritten in terms of Kronecker product and row stacking as
follows:
⊤ ⊤
⊤
ψ1
F1
V
0
.
.
.
..
.. = .. .
and compute by (5)
consensus:
0
2.5
F =
2
3
3
To constrain the (i, j)-entry of F to be zero, we focus on
the equation V ⊤ Fi⊤ = ψi⊤ . Deleting Fij from Fi⊤ as well
as the jth column of V ⊤ , we obtain the reduced equation:
Suppose that the topological constraint is that agent 2
cannot receive information from agent 4, i.e. the (2, 4)-entry
of F (F24 = −1.5) must be set to be zero. For this we first
derive equation V ⊤ Fi⊤ = ψi⊤ as follows:
0
V⊤
Fn⊤
V̂ ⊤ F̂i⊤ = ψi⊤
ψn⊤
(15)
where V̂ ⊤ ∈ Cn×(n−1) is the matrix V ⊤ with jth column deleted and F̂i⊤ ∈ Cn−1 the vector Fi⊤ with jth
element deleted. Now view the entries of F̂i⊤ as the unknowns (i.e. (15) contains n equations with n − 1 unknowns
F̂i1 , ..., F̂i(j−1) F̂i(j+1) , ..., F̂in ). Using the pseudoinverse of
V̂ ⊤ , denoted by (V̂ ⊤ )† , we derive
F̂i⊤ = (V̂ ⊤ )† ψi⊤ .
(16)
1
0
0
0
0
1
1
0
0
1
1
0
1
1
−1
0
0
0
0
−1 1.5 −1.5 −1.5
0 −3
0
1
.
0
0
−3
0
0
1
−1
−3
1
0
0
1
0
1 F21
0
F22 −1
0
1
F23 = 0 .
0 F24 0
1 F25
−4
1 The above derivation may be readily extended to deal with more than
one topological constraint.
Deleting F24 from Fi⊤ and the 4th column of V ⊤ , we obtain
the reduced equation (15):
0
1 1 1 1 F̂
−1
0 1 0 0 21
0 0 1 1 F̂22 = 0 .
0
0 0 1 0 F̂23
−4
0 1 −1 1 F̂25
Solve this equation for the unknowns F̂21 , F̂22 , F̂23 , F̂25 , we
compute by (16):
F̂21
1.8571
F̂22 −1.4286
F̂2⊤ =
F̂23 = 0.8571 .
−1.2857
F̂25
Finally set as (17) the new feedback matrix
0
0
0
0
0
1.8571 −1.4286 0.8571 0 −1.2857
.
0
−3
0
1
F̂ =
2
3
0
0
−3
0
3
0
1
−1
−3
A. Arbitrary Inter-Agent Connections
First we consider the case where the agents have arbitrary
initial interconnection, while keeping the assumption that
they are individually stabilizable. That is, we consider the
following multi-agent system
ẋ = Ax + Bu
n
n
(18)
n×n
where x ∈ C , u ∈ C , A ∈ R
and B =
diag(b1 , . . . , bn ) (bi 6= 0). The matrix A is now an arbitrary
real matrix, modeling an arbitrary (initial) communication
topology among the agents.
It turns out, despite the general A matrix, that the same
conclusion as Theorem 1 holds.
Theorem 3: Consider the multi-agent system (18) and let
f be a desired formation configuration. Then there always
exists a state feedback control u = F x that achieves
formation control, i.e.
(∀x(0) ∈ Cn )(∃c ∈ C) lim x(t) = cf.
t→∞
Proof: The proof proceeds similarly to that of Theorem 1. First, for the diagonal matrix B in (18), we have
(regardless of A) that the pair (A, B) is controllable and
Observe that (only) the second row of F̂ has entries all KerB = 0.
It is left to verify if the (distinct) eigenvalues λ1 , ..., λn
different from that of the original F , and the (2, 4)-entry
F̂24 = 0. Moreover the eigenstructure of the new closed- and eigenvectors v1 , ..., vn as in (9) and (10) satisfy the
condition (4) of Lemma 1. Let i ∈ [1, n]. Since
loop matrix A + B F̂ (= F̂ ) is
B
λi I − A B
=0
eigenvalues: {λ̂1 , λ̂2 , λ̂3 , λ̂4 , λ̂5 } = {0, −1.4286, −2, −3, −4}
B −1 (A − λi I)B
eigenvectors: [v̂1 v̂2 v̂3 v̂4 v̂5 ]
we find a basis for Ker[λi I − A B] and derive
1
1
=
1
1
1
0
0
0
0
2.2361 −1.0477 −0.8047 −1.1352
0
−1.3969 1.4753
1.3623
.
0
0
1.4753
0
0
−1.3969
0
−1.3623
Hence these new eigenvalues/eigenvectors still satisfy (9)
and (10), and therefore consensus is achieved despite of the
imposed topological constraint. (In fact, since λ̂2 < λ2 , we
have faster convergence with the new F̂ .)
IV. G ENERAL M ULTI -AGENT S YSTEMS
So far we have considered the multi-agent system in
(7), where the agents are uncoupled and each is (self-)
stabilizable (the matrices A, B are diagonal and B’s diagonal
entries nonzero). For (7) we have shown in Theorem 1 that a
state feedback control, based on eigenstructure assignment,
always exists to drive the agents to a desired formation.
More generally, however, the agents may be initially
interconnected (owing to physical coupling or existence of
communication channels), and/or some agents might not be
capable of stabilizing themselves (though they can receive
information from others). It is thus of interest to inquire,
based on the eigenstructure assignment approach, what conclusions we can draw for formation control in these more
general cases.
N1 (λi ) = B
N2 (λi ) = B −1 (A − λi I)B.
Thus ImN1 (λi ) = Cn , and vi ∈ ImN1 (λi ), i.e. the condition (4) of Lemma 1 holds. Therefore, there always exists
a state feedback u = F x such that the multi-agent system
(18) achieves the formation configuration f .
In the proof of Theorem 1, we derived N1 (λi ) = B and
N2 (λi ) = A − λi I. Since A was diagonal and diagonal
matrices commute, there held
B
λi I − A B
= 0.
A − λi I
For a general A as in Theorem 3, we have found instead
N1 (λi ) = B and N2 (λi ) = B −1 (A − λi I)B that deal
with arbitrary A without depending on the commutativity
of matrices.
Theorem 3 asserts that, as long as the agents are individually stabilizable, formation control is achievable by
eigenstructure assignment regardless of how the agents are
initially interconnected. The final topology, on the other
hand, is in general determined by the initial connections
‘plus’ additional ones resulted from the chosen eigenvalues/eigenvectors (as has been discussed in Section III). It
may also be possible, however, that the initial connections are
‘decoupled’ by the corresponding entries of the synthesized
feedback matrix. This is illustrated by the following example.
Consider again Example 1(i), but change A from the zero
matrix to the following
0
0.5 0
0
0 0
A=
−0.5 0 0
0
0 2
0
0
;
0
0
bi 6= 0, i ∈ [1, m].
that is, agents 1 and 2, 3 and 1, 4 and 3 are initially interconnected. Assigning the same eigenstructure as in Example 1(i),
we obtain the feedback matrix
−1 −0.5 0
j
1
−2
0 −2 − j
.
F =
−0.5
1
−3 1 − 2j
0
0
−2
0
Then the closed-loop matrix A+BF (where B is the identity
matrix) is
−1 0
1 −2
A + BF =
−1 1
0
0
Theorem 4: Consider the multi-agent system (19) and let
f be a desired formation configuration. Also let λ1 , ..., λn
and v1 , ..., vn be the desired eigenvalues and eigenvectors
satisfying (9) and (10). If
(i) the pair (A, B) is controllable, and
(ii) ImB ⊆ Im(A − λi I) for all i ∈ [1, n], and
(iii) vi ∈ ImN1 (λi ) for all i ∈ [1, n], where N1 (λi )
satisfies (A − λi I)N1 (λi ) = B,
then there exists a state feedback control u = F x that
achieves formation control, i.e.
(∀x(0) ∈ Cn )(∃c ∈ C) lim x(t) = cf.
t→∞
Proof: First observe from (19) that KerB = 0, since B’s
columns are linearly independent. Now let i ∈ [1, n]. Since
(A, B) is controllable (condition (i)), there exist N1 (λi ) and
N2 (λi ) such that (3) holds. Setting N2 (λi ) = I, we derive
from (3) the following matrix equation
0
j
0 −2 − j
−3 1 − 2j
0
0
which is the same as the feedback matrix F1 (as well as
the closed-loop matrix) in Example 1(i). Thus despite the
initial coupling, the final topology turns out to be the same
as that of Example 1(i). In particular, in the final topology
agents 1 and 2, 4 and 3 are uncoupled – their initial couplings
are ‘canceled’ by the corresponding entries of the feedback
matrix F .
B. Existence of Non-Stabilizable Agents
Continuing to consider arbitrary initial topology (i.e. general A), we further assume that some agents cannot stabilize
themselves (i.e. the corresponding diagonal entries of B
in (18) are zero). Equivalently, the non-stabilizable agents
have no control inputs. In this case, achieving a desired
formation is possible only if those non-stabilizable agents
may take advantage of information received from others (via
connections specified by A). This is a problem of global
formation stabilization with locally unstabilizable agents,
which has rarely been studied in the literature. We aim
to provide an answer using our top-down eigenstructure
assignment based approach.
Without loss of generality, assume that only the first m
(< n) agents are stabilizable. Thus the multi-agent system
we consider in this subsection is
ẋ = Ax + Bu
where x ∈ Cn , u ∈ Cm , A ∈ Rn×n and
b1
..
.
bm
B=
∈ Rn×m (m < n)
0
(19)
(A − λi I) N1 (λi ) = B.
(20)
Since ImB ⊆ Im(A − λi I) (condition (ii)), this equation has
a solution N1 (λi ) (which is determined by A, B, λi ). Finally,
since vi ∈ ImN1 (λi ) (condition (iii)), the condition (4) of
Lemma 1 is satisfied. Therefore the desired eigenvalues and
eigenvectors satisfying (9) and (10) may be assigned by a
state feedback control u = F x, i.e. formation control is
achieved.
Theorem 4 provides sufficient conditions to ensure solvability of the formation control problem for multi-agent
systems with non-stabilizable agents. In the following we
illustrate this result by working out a concrete example,
where A represents a directed line topology and there is only
one agent that is stabilizable (i.e. B is simply a vector).
Example 3: Consider the multi-agent system ẋ = Ax +
Bu with
a1 0
0
b1
â2 a2
0
A=
, B = ..
.. ..
.
.
.
0
ân
an
0
where a1 , ..., an , â2 , ..., ân , b1 are nonzero. Namely A represents a directed line topology with agent 1 the root, and B
means that only agent 1 is stabilizable. Thus this is a singleinput multi-agent system – by controlling only the root of a
directed line.
First, it is verified that (A, B) is controllable, i.e. condition (i) of Theorem 4 is satisfied. To ensure condition (ii),
ImB ⊆ Im(A − λi I), it suffices to choose each desired
eigenvalue λi (i ∈ [1, n]) such that λi 6= aj for j ∈ [1, n] (i.e.
every eigenvalue is distinct from the nonzero diagonal entries
of A). At the same time, these eigenvalues must satisfy (9).
Having condition (ii) hold, equation (20) has a solution
N1 (λi ). Let us solve (20)
b1
a1 − λi
0
0
â2
a
−
λ
2
i
0
N1 (λi ) = .
.
.
..
..
..
0
0
ân an − λi
and obtain an explicit solution
b1
a1 −λi
â2 b1
− (a1 −λi )(a2 −λi )
.
N1 (λi ) =
..
.
â2 ···ân b1
n−1
(−1)
(a1 −λi )(a2 −λi )···(an −λi )
Hence to ensure condition (iii) of Theorem 4, we must
choose each desired eigenvector vi (i ∈ [1, n]) such that
vi ∈ ImN1 (λi ) and (10) is satisfied. In particular, for i = 1
we have λi = 0 and v1 = f ; thus v1 ∈ ImN1 (λ1 ) means
that the formation vector f must be such that
i⊤
h
n b1
(21)
f = c ab11 − aâ12ab12 · · · (−1)n−1 aâ12a···â
2 ···an
where c ∈ C (c 6= 0). This characterizes the set of
all achievable formation configurations for the single-input
multi-agent system under consideration.
We conclude that, by controlling only one agent, indeed
the root agent of a directed line topology, it is not possible
to achieve arbitrary formation configurations but those determined by the nonzeros entries of the matrices A and B in
the specific manner as given in (21).
V. H IERARCHICAL E IGENSTRUCTURE A SSIGNMENT
In the previous sections, we have shown that a control gain
matrix F can always be computed (as long as every agent is
stabilizable) such that the multi-agent formation Problem 1
is solved. Computing such F by (5) (see the eigenstructure
assignment procedure in Section II) has complexity O(n3 ),
where n is the number of agents. Consequently the computation cost becomes expensive as the number of agents
increases.
To address this issue of centralized computation, we
propose in this section a hierarchical synthesis procedure.
We shall show that the control gain matrix F computed by
this hierarchical procedure again solves Problem 1, which
moreover significantly improves computational efficiency
(empirical evidence provided in Section VII).
For clarity of presentation, let us return to consider the
multi-agent system (7), and Problem 1 with the desired
formation configuration f ∈ Cn (f 6= 0). Partition the agents
into l (≥ 1) pairwise disjoint groups. Let group k (∈ [1, l])
have nk (≥ 1) agents; nk may be different and Σlk=1 nk = n.
Now for the configuration f and x, u, A, B in (7), write
in accordance with the partition (possibly with reordering)
w1
y1
g1
..
..
..
f = . ,x = . ,u = . ,
gl
A1
A=
..
.
wl
B1
,
B
=
yl
Al
..
.
Bl
where gk , yk , wk ∈ Cnk and Ak , Bk ∈ Cnk ×nk , k ∈ [1, l].
Thus for each group k, the dynamics is
ẏk = Ak yk + Bk wk .
(22)
For later use, also write gk1 , yk1 , wk1 (resp. Ak1 , Bk1 )
for the first component of gk , yk , wk (resp. (1,1)-entry
of Ak , Bk ), and g0 := [g11 · · · gl1 ]⊤ , y0 := [y11 · · · yl1 ]⊤ ,
w0 := [w11 · · · wl1 ]⊤ , A0 := diag(A11 , · · · , Al1 ), B0 :=
diag(B11 , · · · , Bl1 ).
The vector gk (k ∈ [1, l]) is the local formation configuration for group k, while g0 is the formation configuration
for the set of the first component agent from each group. We
assume that these configurations are all nonzero, i.e. gk 6= 0
for k ∈ [1, l] and g0 6= 0. Now we present the hierarchical
synthesis procedure.
(i) For each group k ∈ [1, l] and its dynamics (22),
compute Fk by (5) such that Ak + Bk Fk has a simple
eigenvalue 0 with the corresponding eigenvector gk , and
other eigenvalues have negative real parts; moreover the
topology defined by Fk has a unique root node yk1 (e.g.
star or line by the method given in Section III.A).
(ii) Treat {yk1 |k ∈ [1, l]} (the group leaders) as a higherlevel group, with the dynamics
ẏ0 = A0 y0 + B0 w0 .
(23)
Compute F0 ∈ Cl×l by (5) such that A0 + B0 F0 has a
simple eigenvalue 0 with the corresponding eigenvector g0 ,
and other eigenvalues have negative real parts.
(iii) Set the control gain matrix F := F low + F high,
where
F1
..
F low :=
.
Fl
and F high is partitioned according to F low , with each block
(i, j), i, j ∈ [1, l]
1 0 ··· 0
0 0 · · · 0
(F high )ij = (F0 )ij · . . .
..
.
.
.
. .
. .
(F0 )ij
0
= .
..
0
0 0 ··· 0
0 ··· 0
0 · · · 0
.. . .
.. .
.
.
.
0 ··· 0
The computational complexity of Step (i) is O(n̂3 ), where
n̂ := max{n1 , ..., nl }; and Step (ii) is O(l3 ). Let ñ :=
max{n̂, l}. Then the complexity of the entire hierarchical
synthesis procedure is O(ñ3 ). With proper group partition,
this hierarchical procedure can significantly reduce computation time, as demonstrated by an empirical study in
Section VII.
Note that in Step (i) of the above procedure, requiring
the topology defined by each Fk to have a unique root, i.e.
a single leader, is for simplicity of presentation. It can be
extended to the case of multiple leaders, and then in Step (ii)
treat all the leaders at the higher-level. On the other hand, the
number of leaders should be kept small such that the highlevel control synthesis in Step (ii) can be done efficiently.
The correctness of the hierarchical synthesis procedure is
asserted in the following.
Theorem 5: Consider the multi-agent system (7) and let f
be a desired formation configuration. Then the state feedback
control u = F x synthesized by the hierarchical synthesis
procedure solves Problem 1, i.e.
(∀x(0) ∈ Cn )(∃c ∈ C) lim x(t) = cf.
t→∞
Proof: For each k ∈ [1, l] let yk′ := [yk2 · · · yknk ]⊤ and
:= [gk2 · · · gknk ]⊤ ∈ Cnk −1 . Thus yk′ and gk′ are yk , gk
with the first element removed. By Step (i) of the hierarchical
synthesis procedure, since yk1 is the unique root node, we
can write ẏk = (Ak + Bk Fk )yk as follows:
yk1
0 |
0
ẏk1
′ .
′ =
y
ẏ Hk
Gk
gk′
k
k
Then by the eigenstructure of Ak +Bk Fk , all the eigenvalues
of Gk have negative real parts and
gk1
Hk
Gk
(24)
gk′ = 0.
⊤
⊤
Reorder x = [y1⊤ · · · yl⊤ ]⊤ to get x̂ := [y0⊤ y1′ · · · yn′ ]⊤ .
Then there is a permutation matrix that similarly transforms
the control gain matrix F in Step (iii) to F̂ , and x̂˙ = F̂ x̂ is
ẏ0
y0
A0 + B0 F0
0
ẏ1′ H1
y1′
G1
=
..
.. .
..
..
.
.
.
.
′
Hl
Gl
ẏl
yl′
It then follows from the eigenstructure of A0 + B0 F0
assigned in Step (ii) and (24) above that the matrix F̂ has
a simple eigenvalue 0 with the corresponding eigenvector
′
′
fˆ := [g0⊤ g1⊤ · · · gl ⊤ ]⊤ , and other eigenvalues have negative
real parts. Hence (cf. Proposition 1),
(∀x̂(0) ∈ Cn )(∃ĉ ∈ C) lim x̂(t) = ĉfˆ.
t→∞
Since x̂ (resp. fˆ) is just a reordering of x (resp. f ), the
conclusion follows and the proof is complete.
VI. R IGID F ORMATION
AND
C IRCULAR M OTION
In this section we show that our method of eigenstructure
assignment may be easily extended to address problems of
rigid formation and circular motion.
A. Rigid Formation
First, we extend our method to study the problem of
achieving a rigid formation, one that has translational and
rotational freedom but fixed size.
Problem 2: Consider the multi-agent system (7) and specify f ∈ Cn (f 6= 0) and d > 0. Design a control u such that
for every initial condition x(0), limt→∞ x(t) = c1 + df ejθ
for some c ∈ C and θ ∈ [0, 2π).
In Problem 2, the goal of the multi-agent system (7) is to
achieve a rigid formation df , with translational freedom in
c, rotational freedom in θ, and fixed size d.
We now present the rigid-formation synthesis procedure.
(i) Compute F by (5) such that A + BF has two eigenvalues 0 with the corresponding (non-generalized) eigenvectors
1 and f , and other eigenvalues have negative real parts;2
moreover the topology defined by F is 2-rooted3 with exactly
2 roots (say nodes 1 and 2). This topology may be achieved
by assigning appropriate eigenstructures, e.g.
eigenvalues: λ1 = λ2 = 0, λ3 , . . . , λn distinct
and Re(λ3 ), . . . , Re(λn ) < 0
1 f1 0
1 f2 0
eigenvectors: [v1 v2 v3 · · · vn ] = 1 f3 1
..
..
..
(independent)
.
.
.
1 fn
0
···
···
···
..
.
0
0
0
..
.
···
1
(25)
(ii) Let f1 , f2 be the first two components of f , and set
ẋ1
(x2 − x1 )(||x2 − x1 ||2 − d2 |f2 − f1 |2 )
=
=: r(x1 , x2 ).
2
2
2
ẋ2
(x1 − x2 )(||x1 − x2 || − d |f1 − f2 | )
(iii) Set the control
u := F x + B −1
r(x1 , x2 )
0
.
(26)
The idea of the above synthesis procedure is to first use
eigenstructure assignment to achieve a desired formation
configuration with two leaders, and then control the size of
the formation by stabilizing the distance between the two
leaders to the prescribed d. The latter is inspired by [13].
Our result is the following.
Proposition 5: Consider the multi-agent system (7) and
let f ∈ Cn , d > 0. Then the control u in (26) synthesized
by the rigid-formation synthesis procedure solves Problem 2
for all initial conditions x(0) with x1 (0) 6= x2 (0).
2 For repeated eigenvalues with non-generalized eigenvectors, the eigenstructure assignment result Lemma 1 and the computation of control gain
matrix F in (5) remain the same as for the case of distinct eigenvalues.
3 A 2-rooted topology is one where there exist 2 nodes from which every
other node v can be reached by a directed path after removing an arbitrary
node other than v [13].
(∀x(0) ∈ Cn )(∃c, c′ ∈ C) lim x(t) = c1 + c′ f.
t→∞
Moreover, choosing the eigenstructure in (25) and following
similarly to the proof of Proposition 2, we can show that
the resulting topology defined by F is 2-rooted with nodes
1 and 2 the only two roots.
With the 2-rooted topology and the design in Step (ii),
it follows from [13, Theorem 4.4] that for all x(0) with
x1 (0) 6= x2 (0), we have c′ = df ejθ for some θ ∈ [0, 2π).
An illustrative example of achieving rigid formations is
provided in Section VII below.
B. Circular Motion
We apply the eigenstructure assignment approach to solve
a cooperative circular motion problem, in which the agents
all circle around the same center while keeping a desired
formation configuration. This cooperative task may find
useful applications in target tracking and encircling (e.g. [25],
[26]).
Problem 3: Consider the multi-agent system (7) and specify f ∈ Cn (f 6= 0) and b ∈ R (b 6= 0). Design a state
feedback control u = F x such that for every initial condition
x(0),√limt→∞ x(t) = c1 + c′ f ebjt for some c, c′ ∈ C and
j = −1.
In Problem 3, the goal is that the agents of (7) all
circle around the same center c at rate b, while keeping the
formation configuration f scaled by |c′ |.
Our result is the following.
Proposition 6: Consider the multi-agent system (7) and
let f ∈ Cn , b ∈ R. Then there always exists a state feedback
control u = F x that solves Problem 3.
Proof: By a similar argument to that in the proof of
Theorem 1, we can show that for (7) there always exists F
such that (A + BF ) has the following eigenstructure:
eigenvalues: λ1 = 0, λ2 = bj, λ3 , . . . , λn distinct
and Re(λ3 ), . . . , Re(λn ) < 0
eigenvectors: v1 = 1, v2 = f, {v1 , v2 , ..., vn } independent
Then (cf. Proposition 1),
(∀x(0) ∈ Cn )(∃c, c′ ∈ C) lim x(t) = c1 + c′ f ebjt .
1
position(Im)
Proof: First, by a similar argument to that in the
proof of Theorem 1, we can show that the desired eigenvalues/eigenvectors (two eigenvalues at 0 with eigenvectors
1 and f ; all other eigenvalues with negative real parts) may
always be assigned for the multi-agent system (7). As a result
(cf. Proposition 1),
0.5
0
-0.5
-1
-1
0
1
position(Re)
Fig. 2. Scalable regular pentagon formation (x: initial positions, ◦: steadystate positions)
system (7) can be made to achieve circular motion while
keeping a rigid formation with some specified size d > 0.
Circular motion may be applied to the task of target
encircling, which is illustrated by an example in the next
section.
VII. SIMULATIONS
We illustrate the eigenstructure assignment based approach
by several simulation examples. For all the examples, we
consider the multi-agent system (7) with 5 heterogeneous
agents, where
A = diag(1.6, 4.7, 3.0, −0.7, −4.2)
B = diag(0.2, 1.5, −0.5, −3.3, −3.7).
Thus the first 3 agents are unstable while the latter 2 are
stable; all agents are stabilizable.
First, to achieve a scalable (regular) pentagon formation,
assign the following eigenstructure:
eigenvalues: {λ1 , . . . , λ5 } = {0, −1, −2, −3, −4}
2πj×1
e 5
−1 0
0
e 2πj×2
5
1
0
0
2πj×3
eigenvectors: [v1 · · · v5 ] = e 5
−2 −1 1
2πj×4
e 5
−2 0 −1
2πj×5
e 5
−2 0 −2
0
0
0 .
0
1
By (5) we compute the control gain matrix
t→∞
That is, Problem 3 is solved.
The key point to achieving circular motion is to assign
one, and only one, pure imaginary eigenvalue bj, associated
with the formation vector f . The circular motion is counterclockwise if b > 0, and clockwise if b < 0. One may easily
speed up or slow down the circular motion by specifying the
value |b|.
Also note that, by a similar synthesis procedure to that for
rigid formation in the previous subsection, the multi-agent
Agent 1
Agent 2
Agent 3
Agent 4
Agent 5
F =
−10.5 − 1.8164j
0.3333 + 0.2422j
−0.4721 − 2.3511j
−0.0442 − 0.4403j
−0.3979 + 0.4391j
2.5 − 1.8164j
−3.4667 + 0.2422j
−0.4721 − 2.3511j
1.1679 − 0.4403j
0.1427 + 0.4391j
0
0
0
0
0
0
.
10
−2
0
0
0.697
0
0 −0.5405 −0.0541
Simulating the closed-loop system with initial condition
x(0) = [1+j 1−0.5j 1 j −1+j]⊤ , the result is displayed
in Fig. 2. Observe that a regular pentagon is formed, and the
topology determined by F contains a spanning tree.
Next, to achieve a rigid pentagon formation, we follow the
method presented in Section VI.A: first assign the following
agent1
agent2
agent3
agent4
agent5
2.5
2
position(Im)
position(Im)
10
5
0
-5
1.5
1
target
0.5
0
agent1
agent2
agent3
agent4
agent5
-0.5
-10
0
5
10
15
20
25
-1
-2
-1
0
1
2
position(Re)
position(Re)
Fig. 3. Rigid regular pentagon formation, with size d = 5, 10, 15 (x:
initial positions, ◦: steady-state positions)
Fig. 4. Target encircling by circular motion (x: initial positions, ◦: steadystate positions)
Moreover, choose the following eigenstructure
eigenstructure:
eigenvalues: {λ1 , . . . , λ6 } = {0, j, −1, −2, −3, −4}
eigenvalues: {λ1 , . . . , λ5 } = {0, 0, −1, −2, −3}
2πj×1
0 0 0
1 e 5
1 e 2πj×2
5
0 0 0
2πj×3
eigenvectors: [v1 · · · v5 ] = 1 e 5
1 0 0
2πj×4
1 e 5
0 1 0
2πj×5
0 0 1
1 e 5
and by (5) compute the control gain matrix
F =
−8
0
0.618 + 1.9021j
−0.303 + 0.9326j
−1.0614 + 0.7711j
0
−3.1333
−2.618 − 1.9021j
−0.303 − 0.9326j
0.2506 − 0.7711j
0
0
0
0
0
0
.
8
0
0
0 0.3939
0
0
0
−0.3243
Thus the topology determined by F is 2-rooted with nodes
1 and 2 the only two roots. Then for different sizes (d =
5, 10, 15), we obtain by (26) the control u. Simulating the
closed-loop system with the same initial condition x(0) as
above, the result is displayed in Fig. 3, where pentagons with
specified sizes are formed.
Further, we consider the task of target encircling and solve
it by circular motion introduced in Section VI.B. Suppose
that there is a static target, say x6 with ẋ6 = u6 (u6 is
constantly zero), and the goal is make the same 5 agents as
above circle around x6 . For this we treat the target x6 as
part of the multi-agent system; hence the augmented A′ and
B ′ are
A′ = diag(1.6, 4.7, 3.0, −0.7, −4.2, 0)
B ′ = diag(0.2, 1.5, −0.5, −3.3, −3.7, 1).
1
1
1
eigenvectors: [v1 · · · v6 ] =
1
1
1
2πj×1
e 5
2πj×2
e 5
2πj×3
e 5
2πj×4
e 5
2πj×5
e 5
0
0
1
0
0
0
0
0
0
1
0
0
0
0
0
0
1
0
0
0
0
0
.
0
1
0
Thus the desired formation is (again) a regular pentagon and
the target x6 is at the center of this pentagon. Moreover, by
the eigenvectors the resulting topology will contain a spanning tree with x6 (the target) being the root. Corresponding
to the formation vector is the eigenvalue j; hence the agents
will perform circular motion at rate 1. Since the center will
not move (x6 at the center is the root), this makes the first
5 agents encircle the target x6 .
By (5) we compute the control gain matrix
F =
−8 + 5j
−0.428 + 0.84j
4.4116 − 0.7331j
0.5574 + 0.7795j
−0.5911 + 0.9447j
0
0
0
0
0
−5j
−3.8 0
0
0
1.0947 − 0.84j
0
10
0
0
−8.4116 + 0.7331j
0
0 0.697
0
−1.4664 − 0.7795j
0
0
0
−0.0541 −0.49 − 0.9447j
0
0
0
0
0
to assign the above eigenstructure. Indeed, the corresponding
topology has a spanning tree whose root is x6 and ẋ6 = 0.
Simulating the closed-loop system with the initial condition
x(0) = [1−0.5j −2+2j −2+j −1+j −j 1+j]⊤ , the
result is displayed in Fig. 4. Observe that the target stays put
at its initial position 1 + j, while other agents circle around
it.
Finally, we present an empirical study on the computation
time of synthesizing feedback matrix F . In particular, we
compare the centralized synthesis by (5) and the hierarchical
synthesis in Section V; the result is listed in Table I for different numbers of agents.4 Here for the hierarchical synthesis,
we partition the agents in such a way that the number of
4 Computation is done by Matlab R2014b on a laptop with Intel(R)
Core(TM) i7-4510U [email protected] 2.60GHz and 8.00GB memory.
TABLE I
C OMPARISON OF COMPUTATION TIME ( UNIT: SECONDS )
agent #
100
500
900
1000
centralized method by (5)
0.398
57.308
552.8419
1068.729
hierarchical method in Sec. V
0.027
0.179
0.394
0.525
groups and the number of agents in each group are ‘balanced’
(to make ñ small): e.g. 100 agents are partitioned into 10
groups of 10 agents each; 500 agents are partitioned into 16
groups of 23 agents each plus 6 groups of 22 each. Observe
that the hierarchical synthesis is significantly more efficient
than the centralized one, and the efficiency increases as the
number of agents increases. In particular, for 1000 agents
only 0.525 seconds needed, the hierarchical approach might
well be sufficient for many practical purposes.
VIII. C ONCLUDING R EMARKS
We have proposed a top-down, eigenstructure assignment
based approach to synthesize state feedback control for
solving multi-agent formation problems. The relation between the eigenstructures used in control synthesis and the
resulting topologies among agents has been characterized,
and special topologies have been designed by choosing
appropriate eigenstructures. More general cases where the
initial inter-agent coupling is arbitrary and/or there exist
non-stabilizable agents have been studied, and a hierarchical
synthesis procedure has been presented that improves computational efficiency. Further, the approach has been extended
to achieve rigid formation and circular motion.
In our view, the proposed top-down approach to multiagent formation control is complimentary to the existing
(mainstream) bottom-up approach (rather than opposed to).
Indeed, the bottom-up approach, if successful, can produce
scalable control strategies effective for possibly time-varying
topologies, nonlinear agent dynamics, and robustness issues
like communication failures, which are the cases very difficult to be dealt with by the top-down approach. On the other
hand, bottom-up design is generally challenging, requiring
significant insight into the problem at hand and possibly
many trial-and-errors in the design process; by contrast, topdown design is straightforward and can be automated by
algorithms. Hence we suggest the following. When a control
researcher or engineer faces a distributed control design
problem for achieving some new cooperative tasks, one can
start with a linear time-invariant version of the problem and
try the top-down approach to derive a solution. With the ideas
and insights gained from such a solution, one may then try
the bottom-up design possibly for time-varying and nonlinear
cases.
In future work, we aim to apply the top-down, eigenstructure assignment based approach to solve more complex
cooperative control problems of multi-agent systems. In
particular, our immediate goals are to achieve formations in
three dimensions with obstacle avoidance abilities, as well
as to deal with agents with higher-order (heterogeneous,
possibly non-stabilizable) dynamics.
IX. A PPENDIX
We provide the proof of Proposition 4. For this we
first briefly review the eigenstructure assignment method in
[17] for dealing with repeated eigenvalues and generalized
eigenvectors.
Lemma 2: ([17]) Consider the system (1) and suppose that (A, B) is controllable and KerB = 0. Let
{d1 , . . . , dk } (k ≤ n) be a set of positive integers satisfying
P
k
i=1 di = n, {λ1 , . . . , λk } be a set of complex numbers,
and {v11 , ..., v1d1 , . . . , vk1 , ..., vkdk } a set of linearly independent vectors in Cn . Then there is a feedback matrix F
such that for every i ∈ [1, k],
(λi I − A − BF )vi1 = 0
(λi I − A − BF )vij = vi(j−1) ,
j = 2, . . . , di
if and only if
(∃wij ∈ Cm )
vi1 (λi )
λi I − A − B
=0
wi1 (λi )
vij (λi )
λi I − A − B
= vi(j−1) ,
wij (λi )
j = 2, . . . , di .
(27)
Lemma 2 provides a necessary and sufficient condition
for assigning repeated eigenvalues λi (i ∈ [1, k]) with
eigenvector vi1 and generalized eigenvectors vi2 , ..., vidi
(corresponding to a Jordan block of the closed-loop matrix
A + BF ). When the condition holds and thus F exists, F
may be constructed by the following procedure [17].
(i) Compute the following (maximal-rank) matrices
N1i
S
Ni =
, Si = 1i
N2i
S2i
satisfying
[λi I − A B]
N1i
= 0,
N2i
[λi I − A B]
S1i
= −I.
S2i
(Si needs to be computed only when di > 1.)
(ii) From the following vector chain
vi1 = N1i pi1
vi2 = N1i pi2 − S1i vi1
..
.
vidi = N1i pidi − S1i vi(di −1)
find the vectors pi1 , ..., pidi . Then generate a new vector
chain as follows:
wi1 = −N2i pi1
wi2 = −N2i pi2 + S2i vi1
..
.
widi = −N2i pidi + S2i vi(di −1) .
(iii) Compute F satisfying F vij = wij for all i ∈
[1, k], j ∈ [1, di ]. (If no solution exists, alter one or more
of the vectors pij in Step (ii).)
Now we are ready to prove Proposition 4.
Proof of Proposition 4: Consider the multi-agent system (7) and assign the following eigenstructure:
eigenvalues: λ1 = 0, λ2 = · · · = λn = −1
eigenvectors: [v11 v21 · · · v2(n−1) ] =
f1
f2
..
.
fn−1
fn
0
0
..
.
0
−fn
···
···
.
..
···
0
−f2
..
.
−fn−1
−fn
First, for λ1 = 0 (with d1 = 1), in Step (i) we only need
to compute N1 and obtain N11 = B, N21 = A. Then in
Step (ii), from
v11 = N11 p11
we have p11 = B −1 v11 . Hence
w11 = −N21 p11 = −AB −1 v11 = [−
an f n ⊤
a1 f 1
···−
] .
b1
bn
It is verified that w11 , together with v11 , λ1 , satisfies the first
equation of (27).
Second, for λ2 = −1 (with d2 = n − 1), in Step (i)
we derive N12 = B, N22 = (A + I), S12 = B, S22 =
(A + I) − B −1 . Then in Step (ii), from the chain
v21 = N12 p21
v22 = N12 p22 − S12 v21
..
.
v2(n−1) = N12 p2(n−1) − S12 v2(n−2)
we find
fn ⊤
]
bn
fn
fn−1
−
− fn ]⊤
= [0 · · · 0 −
bn−1
bn
..
.
f2
f3
fn
= [0 −
−
− f3 · · · −
− fn ]⊤ .
b2
b3
bn
p21 = [0 · · · 0 −
p22
p2(n−1)
Hence we obtain
w21 = N12 p21
(an + 1)fn ⊤
]
bn
w22 = N12 p22 − S12 v21
(an−1 + 1)fn−1 an fn ⊤
]
= [0 · · · 0
bn−1
bn
..
.
w2(n−1) = N12 p2(n−1) − S12 v2(n−2)
an fn ⊤
(a2 + 1)f2 a3 f3
···
] .
= [0
b2
b3
bn
= [0 · · · 0
The chain {w21 , w22 , ..., w2(n−1) }, together with
{v21 , v22 , ..., v2(n−1) } and λ2 (= −1), is verified to
satisfy (27). Hence it follows from Lemma 2 that the above
eigenstructure can be assigned to the closed-loop matrix
A + BF . Then by Proposition 1, Problem 1 is solved.
Finally we compute the feedback matrix F . Let W =
[w11 w21 · · · w2(n−1) ]. Since
1
0
···
0
0
f1
1
0
0
· · · fn−1
− f1n
.
.
−1
.
.
.
.
V
=
.
1
.
.
0
f2
1
1
−
0
f1
f2
we obtain by F = W V −1 that
−a1
0
b1
−(1+a2 )
f2
b2 f1
b2
F =
..
.
0
···
..
0
.
fn
bn fn−1
Therefore the closed-loop matrix is
0
0
···
f2 −1
f1
A + BF =
..
..
.
.
fn
0
fn−1
−(1+an )
bn
0
.
−1
and the corresponding graph G is a line topology.
R EFERENCES
[1] A. Jadbabaie, J. Lin, and A. S. Morse, “Coordination of groups of
mobile autonomous agents sing nearest neighbor rules,” IEEE Trans.
Autom. Control, vol. 48, no. 6, pp. 988–1001, 2003.
[2] R. Olfati-Saber, J. A. Fax, and R. M. Murray, “Consensus and
cooperation in networked multi-agent systems,” Proc. IEEE, vol. 95,
no. 1, pp. 215–233, 2007.
[3] W. Ren and R. W. Beard, Distributed Consensus in Multi-vehicle
Cooperative Control: Theory and Applications.
Springer Verlag,
2008.
[4] F. Bullo, J. Cortés, and S. Martı́nez, Distributed Control of Robotic
Networks. Princeton University Press, 2009.
[5] M. Mesbahi and M. Egerstedt, Graph Theoretic Methods in Multiagent
Networks. Prenceton University Press, 2010.
[6] B. Anderson, C. Yu, B. Fidan, and J. M. Hendrickx, “Rigid graph
control architectures for autonomous formations,” IEEE Control Syst.
Mag., vol. 28, no. 6, pp. 48–63, 2008.
[7] J. A. Fax and R. M. Murray, “Information flow and cooperative control
of vehicle formations,” IEEE Trans. Autom. Control, vol. 49, no. 9,
pp. 1465–1476, 2004.
[8] J. Cortés, “Global and robust formation-shape stabilizatioin of relative
sensing networks,” Automatica, vol. 45, no. 10, pp. 2754–2762, 2009.
[9] L. Krick, M. Broucke, and B. Francis, “Stabilisation of infinitesimally
rigid formations of multi-robot networks,” Int. J. Control, vol. 82,
no. 3, pp. 423–439, 2009.
[10] M. Cao, A. S. Morse, C. Yu, and B. Anderson, “Maintaining a directed,
triangular formation of mobile autonomous agents,” Commun. Inform.
and Syst., vol. 11, no. 1, pp. 1–16, 2011.
[11] M. Basiri, A. Bishop, and P. Jensfelt, “Distributed control of triangular
formations with angle-only constraints,” Syst. & Control Lett., vol. 59,
no. 2, pp. 147–154, 2010.
[12] S. Coogan and M. Arcak, “Scaling the size of a formation using
relative position feedback,” Automatica, vol. 48, no. 10, pp. 2677–
2685, 2012.
[13] Z. Lin, L. Wang, Z. Han, and M. Fu, “Distributed formation control
of multi-agent systems using complex laplacian,” IEEE Trans. Autom.
Control, vol. 59, no. 7, pp. 1765–1777, 2014.
[14] H. Bai, M. Arcak, and J. T. Wen, “Adaptive design for reference
velocity recovery in motion coordination,” Syst. & Control Lett.,
vol. 57, no. 8, pp. 602–610, 2008.
[15] W. Ding, G. Yan, and Z. Lin, “Collective motions and formations under
pursuit strategies on directed acyclic graphs,” Automatica, vol. 46,
no. 1, pp. 174–181, 2010.
[16] B. C. Moore, “On the flexibility offered by state feedback in multivariable systems beyond closed loop eigenvalue assignment,” IEEE
Trans. Autom. Control, vol. 21, no. 5, pp. 689–692, 1976.
[17] G. Klein and B. C. Moore, “Eigenvalue-generalized eigenvector assignment with state feedback,” IEEE Trans. Autom. Control, vol. 22,
no. 1, pp. 140–141, 1977.
[18] A. N. Andry, E. Y. Shapiro, and J. C. Chung, “Eigenstructure assignment for linear systems,” IEEE Trans. Aerospace and Electronic
Systems, vol. AES-19, no. 5, pp. 711–729, 1983.
[19] G. P. Liu and R. J. Patton, Eigenstructure Assignment for Control
System Design. Wiley, 1998.
[20] K. Cai and T. Motoyama, “Eigenstructure assignment for synthesis of
multi-agent consensus algorithms,” in Proc. 58th Japan Joint Autom.
Control Conf., Kobe, Japan, 2015, pp. 2B1–2.
[21] T. Motoyama and K. Cai, “Top-down synthesis of multi-agent formation control: an eigenstructure assignment based approach,” in Proc.
of American Control Conf., Seattle, WA, 2017, pp. 259–264.
[22] A. Wu and T. Iwasaki, “Eigenstructure assignment with applicaiton
to consensus of linear heterogeneous agents,” in Proc. 54th Conf.
Decision and Control, Osaka, Japan, 2015, pp. 2067–2072.
[23] W. M. Wonham, “On pole assignment in multi-input controllable linear
systems,” IEEE Trans. Autom. Control, vol. 12, no. 6, pp. 660–665,
1967.
[24] G. H. Golub and C. F. van Loan, Matrix Computations. The Johns
Hopkins University Press, 3rd ed, 1996.
[25] T. Kim and T. Sugie, “Cooperative control for target-capturing task
based on a cyclic pursuit strategy,” Automatica, vol. 43, no. 8, pp.
1426–1431, 2007.
[26] Y. Lan, G. Yan, and Z. Lin, “Distributed control of cooperative target
enclosing based on reachability and invariance analysis,” Syst. &
Control Lett., vol. 59, no. 7, pp. 381–389, 2010.
| 3cs.SY
|
arXiv:1606.07264v2 [math.GT] 13 Sep 2016
GRAPHS OF HYPERBOLIC GROUPS AND A LIMIT SET
INTERSECTION THEOREM
PRANAB SARDAR
Abstract. We define the notion of limit set intersection property for a collection of subgroups of a hyperbolic group; namely, for a hyperbolic group G and
a collection of subgroups S we say that S satisfies the limit set intersection
property if for all H, K ∈ S we have Λ(H) ∩ Λ(K) = Λ(H ∩ K). Given a hyperbolic group admitting a decomposition into a finite graph of hyperbolic groups
structure with QI embedded condition, we show that the set of conjugates of
all the vertex and edge groups satisfy the limit set intersection property.
1. Introduction
Limit set intersection theorems first appear in the work of Susskind and Swarup
([SS92]) in the context of geometrically finite Kleinian groups. Later on Anderson
([Anda], [Andb]) undertook a detailed study of this for general Kleinian groups.
In the context of (Gromov) hyperbolic groups this is true for quasiconvex subgroups(see [GMRS97], Lemma 2.6). (Recently W. Yang has looked at the case
of relatively quasiconvex subgroups of relatively hyperbolic groups. See [Yan12].)
However, this theorem is false for general subgroups of hyperbolic groups and no
characterizations other than quasi-convexity are known for a pair of subgroups H, K
of a hyperbolic group G which guarantee that Λ(H) ∩ Λ(K) = Λ(H ∩ K). This
motivates us to look for subgroups other than quasiconvex subgroups which satisfy
the limit set intersection property. Our starting point is the following celebrated
theorem of Bestvina and Feighn.
Theorem 1.1. ([BF92]) Suppose (G, Y ) is a graph of hyperbolic groups with QI
embedded condition and the hallways flare condition. Then the fundamental group,
say G, of this graph of groups is hyperbolic.
Graphs of groups are briefly recalled in section 3. There are many examples of
hyperbolic groups admitting such a decomposition into graphs of groups where the
vertex or edge groups are not quasiconvex. Nevertheless, with the terminologies of
the above theorem, we have:
Theorem. The set of all conjugates of the vertex and edge groups of G satisfy
the limit set intersection property.
We note that a special case of our theorem was already known by results of Ilya
Kapovich ([Kap01]). There the author showed that given a k-acylindrical graph
of hyperbolic groups (G, Y ) with quasi-isometrically embedded condition and with
fundamental group G (which turnns out to be hyperbolic by Theorem 1.1,) the
Date: March 30, 2018.
2010 Mathematics Subject Classification. Primary 20F67.
Key words and phrases. Hyperbolic groups, limit sets, Bass-Serre theory.
1
2
PRANAB SARDAR
vertex groups are quasiconvex subgroups of G. Hence, the conjugates of all the
vertex groups satisfy the limit set intersection property in this case.
Acknowledgments: This work started during the author’s post doctoral term
in the University of California, Davis. The author would like to thank Michael
Kapovich for many helpful discussions in this regard. The author would also like to
thank Mahan Mj for helpful discussions and Ilya Kapovich for useful email correspondence. This research was supported by the University of California, Davis. It is
partially supported by the DST INSPIRE faculty award DST /IN SP IRE/04/2014/002236.
2. Boundary of Gromov hyperbolic spaces and Limit sets of subspaces
We assume that the reader is familiar with the basics of (Gromov) hyperbolic
metric spaces and the coarse language. We shall however recall some basic definitions and results that will be explicitly used in the sections to follow. For details
one is referred to [Gro85] or [BH99].
Notation and convention. In this section we shall assume that all the hyperbolic metric spaces are proper geodesic metric spaces. We use QI to mean both
quasi-isometry and quasi-isometric depending on the context. Hausdorff distance
of two subsets A, B of a metric space Z is denoted by Hd(A, B). For any subset A
of a metric space Y and any D ≥ 0, ND (A) will denote the D-neighborhood of A
in Y . We assume that all our groups are finitely generated. For any graph Y we
shall denote by V (Y ) and E(Y ) the vertex and the edge sets of Y respectively.
Definition 2.1. 1. Suppose G is a group generated by a finite set S ⊂ G and let γ ⊂
Γ(G, S) be a path joining two vertices u, v ∈ Γ(G, S). Let u0 = u, u1 , u2 , ..., un = v
be the consecutive vertices on γ. Let ui+1 = ui xi , xi ∈ S ∪ S −1 for 0 ≤ i ≤ n − 1.
Then we shall say that the word w = x0 x1 ...xn−1 labels the path γ.
2. Also, given w ∈ F(S)- the free group on S, its image in G under the natural
map F(S) → G will be called the element of G represented by w.
Definition 2.2. (See [BH99]) 1. Let X be a hyperbolic metric space and x ∈ X
be a base point. Then the (Gromov) boundary ∂X of X is the equivalence classes
of geodesic rays α such that α(0) = x where two geodesic rays α, β are said to be
equivalent if Hd(α, β) < ∞.
The equivalence class of a geodesic ray α is denoted by α(∞).
2. If {xn } is an unbounded sequence of points in X, we say that {xn } converges
to some boundary point ξ ∈ ∂X if the following holds: Let αn be any geodesic
joining x to xn . Then any subsequence of {αn } contains a subsequence uniformly
converging on compact sets to a geodesic ray α such that α(∞) = ξ. In this case,
we say that ξ is the limit of {xn } and write limn→∞ xn = ξ.
3. The limit set of a subset Y of X is the set {ξ ∈ ∂X : ∃ {yn } ⊂ Y with limn→∞ yn =
ξ}. We denote this set by Λ(Y ).
The following lemma is a basic exercise in hyperbolic geometry and so we mention
it without proof. It basically uses the thin triangle property of hyperbolic metric
spaces. (See [BH99], Chapter III.H, Exercise 3.11.)
Lemma 2.3. Suppose {xn }, {yn } are two sequences in a hyperbolic metric space X
both converging to some points of ∂X. If {d(xn , yn )} is bounded then limn→∞ xn =
limn→∞ yn .
GRAPHS OF HYPERBOLIC GROUPS AND A LIMIT SET INTERSECTION THEOREM
3
Lemma 2.4. 1. There is a natural topology on the boundary ∂X of any proper
hyperbolic metric space X with respect to which ∂X becomes a compact space.
2. If f : X → Y is a quasi-isometric embdedding of proper hyperbolic metric
spaces then f induces a topological embedding ∂f : ∂Y → ∂X.
If f is a quasi-isometry then ∂f is a homeomorphism.
We refer the reader to Proposition 3.7 and Theorem 3.9 in Chapter III.H of
[BH99] for a proof of Lemma 2.4.
Definition 2.5. 1. A map f : Y → X between two metric spaces is said to be a
proper embedding if for all M > 0 there is N > 0 such that dX (f (x), f (y)) ≤ M
implies dY (x, y) ≤ N for all x, y ∈ Y .
A family of proper embeddings between metric spaces fi : Xi → Yi , i ∈ I- where
I is an indexing set, is said to be uniformly proper if for all M > 0 there is an
N > 0 such that for all i ∈ I and x, y ∈ Xi , dYi (fi (x), fi (y)) ≤ N implies that
dXi (x, y) ≤ M .
2. If f : Y → X is a proper embeddings of proper hyperbolic metric spaces then
we say that Cannon-Thurston(CT) map exists for f if f gives rise to a continuous
map ∂f : ∂Y → ∂X.
This means that given a sequence of points {yn } in Y converging to ξ ∈ ∂Y , the
sequence {f (yn )} converges to a point of ∂X and the resulting map is continuous.
Note that our terminology is slightly different from Mitra([Mit98]). The following
lemma is immediate.
Lemma 2.6. Suppose X, Y are hyperbolic metric spaces and f : Y → X is a proper
embedding. If the CT map exists for f then we have Λ(f (Y )) = ∂f (∂Y ).
We mention the following lemma with brief remarks about proofs since it states
some standard facts from hyperbolic geometry.
Lemma 2.7. Suppose Z is proper δ-hyperbolic metric space and {xn } and {yn }
are two sequences in Z such that limn→∞ xn = limn→∞ yn = ξ ∈ ∂X. For each n
let αn , βn be two geodesics in X joining x1 , xn and y1 , yn respectively.
(1) Then there is subsequences {nk } of natural numbers such that the sequences
of geodesics {αnk } and {βnk } converge uniformly on compact sets to two geodesics
α, β joining x1 , y1 respectively to ξ.
(2) Moreover, there is a constant D depending only on δ and d(x1 , y1 ) and
sequences of points pnk ∈ αnk and qnk ∈ βnk such that d(pnk , qnk ) ≤ D, and
limk→∞ pnk = limk→∞ qnk = ξ.
(3) The conclusion (2) remains valid if we replace αn , βn by K-quasi-geodesics
for some K ≥ 1; in other words if xn , yn are joined to x1 , y1 by K-quasi-geodesics
αn , βn respectively then there is a constant D depending on δ, d(x1 , y1 ) and K, a
subsequence {nk } of natural numbers and sequences of points pnk ∈ αnk , qnk ∈ βnk
such that d(pnk , qnk ) ≤ D, and limk→∞ pnk = limk→∞ qnk = ξ.
For a proof of (1), (2) see Lemma 3.3, and Lemma 3.13 and for (3) Theorem
1.7(stability of quasi-geodesics) in Chapter III.H of [BH99]. More precisely, for
′
′
proving (3) we may choose geodesic segments αn ’s, βn ’s connecting the endpoints of
the quasi-geodesics αn ’s and βn ’s respectively and then apply (1) for these geodesics
′
′
′
′
to extract subsequences {αnk } and {βnk } of {αn } and {βn } respectively both converging uniformly on compact sets. Then we can find two sequences of points
4
PRANAB SARDAR
′
′
′
′
pnk ∈ αnk , qnk ∈ βnk satisfying (2). Finally, by stability of quasi-geodesics for all k
′
′
there are pnk ∈ αnk , qnk ∈ βnk such that d(pnk , pnk ) and d(qnk , qnk ) are uniformly
small. That will prove (3).
Definition 2.8. Suppose G is a Gromov hyperbolic group. Let S be any collection
of subgroups of G. We say that S has the limit set intersection property if for all
H, K ∈ S we have Λ(H) ∩ Λ(K) = Λ(H ∩ K).
We state two elementary results on limit sets for future use.
Lemma 2.9. Suppose G is a hyperbolic group and H is any subset of G. Then for
all x ∈ G we have
(1) Λ(xH) = Λ(xHx−1 ).
(2) Λ(xH) = xΛ(H).
P roof : (1) follows from Lemma 2.3. For (2) one notes that G acts naturally on
a Cayley graph X of G by isometries and thus by homeomorphisms on ∂X = ∂G
by Lemma 2.4. ✷
3. Graphs of groups
We presume that the reader is familiar with the Bass-Serre theory. However, we
briefly recall all the concepts that we shall need. For details one is referred to section
5.3 of J.P. Serre’s book Trees ([Ser00]). Although we always work with nonoriented
metric graphs like Cayley graphs, we need oriented graphs possibly with multiple
edges between adjacent vertices and loops to describe graphs of groups. Hence the
following definition is quoted from [Ser00].
Definition 3.1. A graph Y is a pair (V, E) together with two maps
E →V ×V,
e 7→ (o(e), t(e)) and
E → E,
e 7→ ē
such that o(ē) = t(e), t(ē) = o(e) and ē¯ = e for all e ∈ E.
For an edge e we refer to o(e) as the origin and t(e) as the terminus of e; the edge
ē is the same edge e with opposite orientation. We write V (Y ) for V and E(Y ) for
E. We refer to V (Y ) as the set of vertices of Y and E(Y ) as the set of edges of Y .
We shall denote by |e| the edge e without any orientation.
Definition 3.2. A graph of groups (G, Y ) consists of the following data:
(1) a (finite) graph Y as defined above,
(2) for all v ∈ V (Y ) (and edge e ∈ E(Y )) there is group Gv (respectively Ge )
together with two injective homomorphisms φe,0(e) : Ge → Go(e) and φe,t(e) : Ge →
Gt(e) for all e ∈ E(Y ) such that the following conditions hold:
(i) Ge = Gē ,
(ii) φe,o(e) = φē,t(ē) and φe,t(e) = φē,o(ē) .
We shall refer to the maps φe,v ’s as the canonical maps of the graph of groups.
We shall refer to the groups Gv and Ge , v ∈ V (Y ) and e ∈ E(Y ) as vertex groups
and edge groups respectively. For topological motivations of graph of groups and
the following definition of the fundamental group of a graph of groups one is referred
to [SW79] or [Hat01].
Definition 3.3. Fundamental group of a graph of groups Suppose (G, Y ) is
a graph of groups where Y is a (finite) connected oriented graph. Let T ⊂ Y be a
GRAPHS OF HYPERBOLIC GROUPS AND A LIMIT SET INTERSECTION THEOREM
5
maximal tree. Then the fundamental group G = π1 (G, Y, T ) of (G, Y ) is defined in
terms of generators and relators as follows:
The generators of G are the elements of the disjoint union of the generating sets
of the vertex groups Gv , v ∈ V (Y ) and the set E(Y ) of oriented edges of Y .
The relators are of four of types: (1) Those coming from the vertex groups; (2)
ē = e−1 for all edge e, (3) e = 1 for |e| ∈ T and (4) eφe,t(e) (a)e−1 = φe,o(e) (a) for
all oriented edge e and a ∈ Ge .
Bass Serre tree of a graph of groups
Suppose (G, Y ) is a graph of groups and let T be a maximal tree in Y as in the
above definition. Let G = π1 (G, Y, T ) be the fundamental group
F of the graph of
groups. The Bass-Serre tree, say T , is the tree with vertex set v∈V (Y ) G/Gv and
F
edge set e∈E(Y ) G/Gee where Gee = φe,t(e) (Ge ) < Gt(e) . The edge relations are
given by
t(gGee ) = geGt(e) , o(gGee ) = gGo(e) ....(∗)
Note that when |e| ∈ T then we have e = 1 in G.
Tree of metric spaces from a graph of groups
Given a graph of groups (G, Y ) and a maximal tree T ⊂ Y one can form in a
natural way a graph, say X, on which the fundamental group G = π1 (G, Y, T ) acts
by isometries properly and cocompactly and which admits a simplicial Lipschitz
G-equivariant map X → T . The construction of X can be described as follows.
We assume that Y is a finite connected graph and all the vertex groups and
the edge groups are finitely generated. We fix a finite generating set Sv for each
one of the vertex groups Gv ; similarly for each edge groups Ge we fix a finite
generating set Se and assume that φe,t(e) (Se ) ⊂ St(e) for all e ∈ E(Y ). Let S =
∪v∈V (Y ) Sv ∪ (E(Y ) \ E(T )) be a generating set of G where in E(Y ) \ E(T ) we shall
include only nonoriented edges of Y not in T . We define X from the disjoint union
of the following graphs by introducing some extra edges as follows:
(1) Vertex spaces: For all ṽ = gGv ∈ V (T ), where v ∈ Y and g ∈ G we
let Xṽ denote the subgraph of Γ(G, S) with vertex set the coset gGv ; two vertices
gx, gy ∈ Xṽ are connected by an edge iff x−1 y ∈ Sv . We shall refer to these
subspaces of X as vertex spaces.
(2) Edge spaces: Similarly for any edge ẽ = gGee of T , let Xẽ denote the
subgraph of Γ(G, S) with vertex set geGee where where two vertices gex, gey are
connected by an edge iff x−1 y ∈ φe,t(e) (Se ). We shall refer to these subspaces of X
as edge spaces.
(3) The extra edges connect the edge spaces with the vertex spaces as follows:
For all edge ẽ = gGee of T connecting the vertices ũ = gGo(e) and ṽ = geGt(e) of
T , and x ∈ Gee join gex ∈ Xẽ = geGee to gex ∈ Xṽ = geGt(e) and gexe−1 ∈ Xũ =
gGo(e) by edges of length 1/2 each. We define fẽ,ṽ : Xẽ → Xṽ and fẽ,ũ : Xẽ → Xũ
by setting fẽ,ṽ (gex) = gex and fẽ,ũ (gex) = gexe−1 .
We have a natural simplicial map π : X → T (more precisely to the first barycentric subdivision of T ). This map is the coarse analog of the tree of metric spaces
introduced by [BF92] (see also [Mit98]). By abuse of terminology we shall refer
to this also as a tree of metric spaces or graphs. We recall some notations and
definitions from [Mit98] and collect some basic properties.
(1) We note that Xu = π −1 (u) and Xẽ = π −1 (e) for all u ∈ V (T ) and e ∈ E(T ).
For all u ∈ V (T ) the intrinsic path metric of Xu will be denoted by du . Similarly,
6
PRANAB SARDAR
we use de for the intrinsic path metric on Xe . It follows that with these intrinsic
metrics the metric spaces Xe , Xu are isometric to the Cayley graphs Γ(Ge , Se ) and
Γ(Gu , Su ) respectively. Therefore, if all the vertex and edge groups are Gromov
hyperbolic then the vertex and edge spaces of X are uniformly hyperbolic metric
spaces.
(2) Quasi-isometric lifts of geodesics: Suppose u, v ∈ T and let [u, v] denote
the geodesic in T joining them. A K-QI section of π over [u, v] or a K-QI lift of
[u, v] (in X) is a set theoretic section s : [u, v] → X of π which is also a K-QI
embedding. In general, we are only interested in defining these sections over the
vertices in [u, v].
(3) Hallways flare condition: We will say that π : X → T satisfies the
hallways flare condition if for all K ≥ 1 there are numbers λK > 1, MK ≥ 1, nK ≥ 1
such that given a geodesic α : [−nK , nK ] → T and two K-QI lifts α1 , α2 of α, if
dα(0) (α1 (0), α2 (0)) ≥ MK then
max{dα(nK ) (α1 (nK ), α2 (nK )), dα(−nK ) (α1 (−nK ), α2 (−nK ))} ≥ λK dα(0) (α1 (0), α2 (0)).
(4) Graphs of groups with QI embedded conditions. Suppose (G, Y ) is
a graph of groups such that each vertex and edge group is finitely generated. We
say that it satisfies the QI embedded condition if all the inclusion maps of the edge
groups into the vertex groups are quasi-isometric embeddings with respect any choice
of finite generating sets for the vertex and edge groups.
It is clear that if (G, Y ) is a graph of groups with QI embedded condition then
all the maps fe,u : Xe → Xu are uniform QI embeddings.
Lemma 3.4. There is a naturally defined proper and cocompact action of G on X
such that the map π : X → T is G-equivariant.
Proof: We note that X is obtained from the disjoint union of the cosets of the
vertex and edge groups of (G, Y ). The group G has a natural action on this disjoint
union. It is also easy to check that under this action adjacent vertices of X go to
adjacent vertices. Thus we have a simplicial G-action on X. Clearly the natural
map π : X → T is G-equivariant. To show that the action is proper it is enough to
show that the vertex stabilizers are uniformly finite. However, if a point x ∈ gGv
is fixed by an element h ∈ G then h fixes gGv ∈ V (T ). However, stabilizers of gGv
is simply gGv g −1 and the action of gGv g −1 on gGv ⊂ X is fixed point free. Hence,
the G-action on X is fixed point free.
That the G-action is cocompact on X follows from the fact that the G-actions
on V (T ) and E(T ) are cofinite. ✷
Fix a vertex v0 ∈ Y and the vertex Gv0 ∈ V (T ). Look at the corresponding
vertex space Gv0 ⊂ X and let x0 denote 1 ∈ Gv0 . Let Θ : G → X denote the orbit
map g 7→ gx0 . By Milnor-Schwarz lemma this orbit map is a quasi-isometry since
the G-action is proper and cocompact by the above lemma.
Lemma 3.5. There is a constant D0 such that for all vertex space gGv ⊂ X we
have Hd(Θ(gGv ), gGv ) ≤ D0 .
It follows that for any g.x ∈ gGv ⊂ X we have g.x ∈ Θ−1 (B(gx, D0 )).
P roof : For proving the lemma let γv be a geodesic in X joining x0 to the identity
element of Gv . Then for all x ∈ Gv , gxγv is a path joining gxx0 and gx ∈ gGv .
Hence one can choose D0 to be the maximum of the lengths of γv ’s, v ∈ V (Y ). ✷
The following corollary is an immediate consequence of the above two lemmas.
GRAPHS OF HYPERBOLIC GROUPS AND A LIMIT SET INTERSECTION THEOREM
7
Corollary 3.6. The vertex spaces and edge spaces of X are uniformly properly
embedded in X.
Notation: We shall use iw : Xw → X denote the canonical inclusion of the
vertex and edge spaces of X into X. Let ṽ = gGv ∈ V (T ). It follows from
the above corollary that Θ induces a coarsely well-defined quasi-isometry from
gGv ⊂ G to Xṽ . Namely, we can send any x ∈ gGv to a point y of Xṽ such that
dX (Θ(x), y) ≤ D0 . where D0 is as in the above corollary. We shall denote this by
Θg,v : gGv → Xṽ .
4. The main theorem
For the rest of the paper we shall assume that G is a hyperbolic group which
admits a graph of groups decomposition (G, Y ) with the QI embedded condition
where all the vertex and edge groups are hyperbolic. Let T be the Bass-Serre tree
of this graph of groups.
We aim to show that in G the family of subgroups {Gv : v ∈ V (T )} satisfies the
limit set intersection property:
Theorem 4.1. Suppose a hyperbolic group G admits a decomposition into a graph
of hyperbolic groups (G, Y ) with quasi-isometrically embedded condition and suppose
T is the correspoding Bass-Serre tree. Then for all w1 , w2 ∈ V (T ) we have Λ(Gw1 )∩
Λ(Gw2 ) = Λ(Gw1 ∩ Gw2 ).
The idea of the proof is to pass to the tree of space π : X → T using the orbit
map Θ : G → X defined in the previous section and then use the techniques of
[Mit98]. The following theorem is an important ingredient of the proof.
Theorem 4.2. ([Mit98]) The inclusion maps iw : Xw → X admit CT maps ∂iw :
∂Xw → ∂X for all w ∈ V (T ).
Recall that if u, v ∈ V (T ) are connected by an edge e there are natural maps
fe,u : Xe → Xu and fe,v : Xe → Xv . We know that these maps are uniform QI
embeddings. We assume that they are all K-QI embeddings for some K > 1. They
induce embeddings ∂fe,u : ∂Xe → ∂Xu and ∂fe,v : ∂Xe → ∂Xv by Lemma 2.4.
Therefore, we get partially defined maps from ∂Xu to ∂Xv with domain Im(∂fe,u ).
Let us denote this by ψu,v : ∂Xu → ∂Xv . By definition for all x ∈ Xe we have
ψu,v (fe,u (x)) = fe,v (x).
Definition 4.3. (1) If ξ ∈ ∂Xu is in the domain of ψu,v and ψu,v (ξ) = η then we
say that η is a flow of ξ and that ξ can be flowed to ∂Xv .
(2) Suppose w0 6= wn ∈ V (T ) and w0 , w1 , · · · , wn are consecutive vertices of the
geodesic [w0 , wn ] ⊂ T . We say that a point ξ ∈ ∂Xw0 can be flowed to ∂Xwn if there
are ξi ∈ ∂Xwi , 0 ≤ i ≤ n where ξ0 = ξ such that ξi+1 = ψwi ,wi+1 (ξi ), 0 ≤ i ≤ n − 1.
In this case, ξn is called the flow of ξ0 in Xwn .
Since the maps ψu,v are injective on the their domains for all u 6= v ∈ V (T ) and
ξ ∈ ∂Xu the flow of ξ in ∂Xv is unique if it exists.
Lemma 4.4. Suppose w1 , w2 ∈ V (T ) and ξi ∈ ∂Xwi , i = 1, 2 such that ξ2 is a flow
of ξ1 . Let αi be a geodesic in the vertex space Xwi such that αi (∞) = ξi , i = 1, 2.
Then Hd(α1 , α2 ) < ∞.
8
PRANAB SARDAR
P roof : It is enough to check it when w1 , w2 are adjacent vertices. Suppose e is
the edge connecting w1 , w2 . The lemma follows from the stability of quasi-geodesics
in the hyperbolic space Xwi ’s and the fact that every point of Xe is at distance 1/2
from Xwi , i = 1, 2. ✷
Corollary 4.5. Under the CT maps ∂iwj : ∂Xwj → ∂X, j = 1, 2 the points ξ1 , ξ2
go the same point of ∂X, i.e. ∂iw1 (ξ1 ) = ∂iw2 (ξ2 ).
Lemma 4.6. Let w1 , w2 ∈ T and suppose they are joined by an edge e. Suppose
ξ1 ∈ ∂Xw1 can not be flowed to ∂Xw2 . Let α ⊂ Xw1 be a geodesic ray such that
α(∞) = ξ1 . Then for all D > 0 the set ND (α) ∩ fe,w1 (Xe ) is bounded.
P roof : If ND (α) ∩ fe,w1 (Xe ) is not bounded for some D > 0 then ξ1 is in
the limit set of fe,w1 (Xe ) and so ξ1 can be flowed to ∂Xw2 by Lemma 2.6. This
contradiction proves the lemma. ✷
Now we briefly recall the ladder construction of Mitra which was crucial for the
proof of the main theorem of [Mit98]. We shall need it for the proof of Theorem
4.1.
Mitra’s Ladder B(λ).
Fix D0 , D1 > 0. Let v ∈ V (T ) and λ be a finite geodesic segment of Xv . We
shall define the set B(λ) to be a union of vertex space geodesics λw ⊂ Xw where w
is in a subtree T1 of T containing v. The construction is inductive. Inductively one
constructs the n-sphere ST1 (v, n) of T1 centred at v and the corresponding λw ’s,
w ∈ S(v, n).
ST1 (v, 1): There are only finitely many edges e incident on v such that ND0 (λ) ∩
fe,v (Xe ) 6= ∅. Then S(v, 1) is the set of terminal points of all the edges e that
start at v such that the diameter of ND0 (λ) ∩ fe,v (Xe ) is at least D1 . In this
case, for each edge e connecting v to say v1 ∈ S(v, 1), we choose two points,
say x, y ∈ ND0 (λ) ∩ fe,v (Xe ) such that dv (x, y) is maximum. Then we choose
x1 , y1 ∈ Xv1 such that d(x, x1 ) = 1 and d(y, y1 ) = 1 and define λv1 to be a geodesic
in Xv1 joining x1 , y1 .
ST1 (v, n + 1) from ST1 (v, n): Suppose w1 ∈ S(v, n). Then a vertex w2 adjacent
to w1 with dT (v, w2 ) = n + 1 belongs to S(v, n + 1) if the diameter of ND0 (λw1 ) ∩
fe,w1 (Xe ) is at least D1 , where e is the edge connecting w1 , w2 , has diameter at
least D1 in Xw1 . To define λw2 one chooses two points x, y ∈ ND0 (λw1 ) ∩ fe,w1 (Xe )
such that dw1 (x, y) is maximum, then let x1 , y1 ∈ Xw2 be such that d(x, x1 ) = 1
and d(y, y1 ) = 1 and define λw2 to be a geodesic in Xw2 joining x1 , y1 .
Theorem 4.7. (Mitra [Mit98]) There are constants D0 > 0, D1 > 0 and C > 0
depending on the defining parameters of the tree of metric spaces π : X → T such
that the following holds:
For any v ∈ V (T ) and a geodesic segment λ ⊂ Xv the corresponding ladder B(λ)
is a C-quasi-convex subset of X.
To prove this theorem, Mitra defines a coarse Lipschitz retraction map P : X →
B(λ) which we now recall. For the proof of how this works one is referred to [Mit98].
However, we shall subsequently assume that appropriate choices of D0 , D1 are made
in our context so that all the ladders are uniformly quasiconvex subsets of X.
Coarsely Lipschitz retraction on the ladders
Suppose λ ⊂ Xv is a geodesic. Let T1 = π(B(λ)). For each w ∈ T1 , λw =
Xw ∩ B(λ) is a geodesic in Xw . We know that there is a coarsely well defined
GRAPHS OF HYPERBOLIC GROUPS AND A LIMIT SET INTERSECTION THEOREM
9
nearest point projection Pw : Xw → λw . (See Proposition 3.11 in Chapter III.Γ
of [BH99].) Now for each x ∈ Xw , w ∈ T1 define P (x) = Pw (x). If x ∈ Xw and
w 6∈ T1 then connect w to T1 by a geodesic in T . Since T is a tree there is a unique
such geodesic. Let w1 ∈ T1 be the end point of this geodesic and let e be the edge
on this geodesic incident on w1 going out of T1 . Mitra proved that in this case the
projection of fe,w1 (Xe ) on λw1 is uniformly small. It follows by careful choice of
D0 , D1 . (See Lemma 3.1 in [Mit98].) Choose a point xw1 on this projection. Define
P (x) = xw1 .
Theorem 4.8. ([Mit98]) The map P : X → B(λ) is a coarsely Lipschitz retraction.
In other words, it is a retraction and there are constants A, B such that d(P (x), P (y)) ≤
Ad(x, y) + B for all x, y ∈ X.
Using the above theorems of Mitra now we shall prove the converse of Corollary
4.5. This is the last ingredient for the proof of Theorem 4.1.
Proposition 4.9. Suppose v 6= w ∈ T and there are points ξv ∈ ∂Xv and ξw ∈
∂Xw which map to the same point ξ ∈ ∂X under the CT maps ∂Xv → ∂X and
∂Xw → ∂X respectively. Then ξv can be flowed to ∂Xw .
P roof : Using Lemma 4.4 we can assume that the point v is such that ξv can
not further be flowed along vw and similarly ξw can not be flowed in the direction
of wv where v 6= w. Let α : [0, ∞) → Xv and β : [0, ∞) → Xw be geodesic rays in
Xv , Xw respectively such that α(∞) = ξv and β(∞) = ξw . Let ev , ew be the first
edges from the points v, w along the direction of vw and wv respectively. Then
ND0 (α) ∩ fev ,v (Xev ) ⊂ Xv and ND0 (β) ∩ few ,w (Xew ) ⊂ Xw are both bunded sets
by Lemma 4.6 where D0 is as in Theorem 4.7.
For all n ∈ N let αn := α|[0,n] and βn := β|[0,n] respectively. The ladders
B(αn ), B(βn ) are uniformly quasi-convex subsets of X by Theorem 4.8. Hence there
are uniform ambient quasi-geodesics of X in these ladders joining α(0), α(n) and
β(0), β(n) respectively. Choose one such for each one of them and let us call them γn
′
and γn respectively. Now, since α and β limit on the same point ξ ∈ ∂X, by Lemma
2.7(3) there is a uniform constant D such that for a subsequence {nk } of natural
′
numbers there are points xnk ∈ γnk and ynk ∈ γnk such that d(xnk , ynk ) ≤ D and
limk→∞ xnk = limk→∞ ynk = ξ ∈ ∂X.
Let v1 , w1 be the vertices on the geodesic [v, w] ⊂ T adjacent to v, w respectively.
Let Avk := B(αnk ) ∩ Xv1 and Awk := B(βnk ) ∩ Xw1 respectively.
If we remove the edge space Xev from X then the remaining space has two
components- one containing Xv and the other containing Xw . Call them Y1 , Y2
respectively. We note that since the diameter of Avk is uniformly bounded, if at all
nonempty, the portion of γnk contained in Y2 , if at all it travels into Y2 , is uniformly
bounded. This implies that the portion of γnk joining α(0) and Avk is uniformly
small if Avk 6= ∅.
Hence, there are infinitely many k ∈ N such that xnk ∈ Y1 and ynk ∈ Y2 . Since
we are dealing with a tree of spaces and d(xnk , ynk ) ≤ D for all k ∈ N, this implies
there are points zk ∈ fev (Xev ) such that d(xnk , zk ) ≤ D for all k ∈ N. Thus ξv can
be flowed to ∂Xv1 by Lemma 2.6. This contradiction proves the proposition. ✷
Proof of Theorem 4.1:
Suppose wi = gi Gvi , i = 1, 2, for some g1 , g2 ∈ G and v1 , v2 ∈ V (Y ). This
implies Gwi = gi Gvi gi−1 , i = 1, 2. Also, Λ(gi Gvi gi−1 ) = Λ(gi Gvi ) by Lemma 2.9(1).
10
PRANAB SARDAR
Hence we need to show that Λ(g1 Gv1 )∩Λ(g2 Gv2 ) = Λ(g1 Gv1 g1−1 ∩g2 Gv2 g2−1 ). Using
Lemma 2.9(2), therefore, it is enough to show that
Λ(Gv1 ) ∩ Λ(gGv2 ) = Λ(Gv1 ∩ gGv2 g −1 ) for all v1 , v2 ∈ V (Y ), g ∈ G.
Clearly, Λ(Gv1 ∩ gGv2 g −1 ) ⊂ Λ(Gv1 ) ∩ Λ(gGv2 ). Thus we need to show that
Λ(Gv1 ) ∩ Λ(gGv2 ) ⊂ Λ(Gv1 ∩ gGv2 g −1 ).
Given an element ξ ∈ Λ(Gv1 ) ∩ Λ(gGv2 ) there are ξ1 ∈ ∂Gv1 and ξ2 ∈ ∂(gGv2 )
both of which map to ξ under the CT maps ∂Gv1 → ∂G and ∂(gGv2 ) → ∂G by
Lemma 2.6. Now, we have a quasi-isometry Θ : Γ(G, S) → X. By Lemma 3.5 each
coset of any vertex group in G is mapped uniformly Hausdorff close to the same
coset in X. Hence Θ induces uniform quasi-isometries Θg,v from gGv ⊂ Γ(G, S)
to gGv ⊂ X for all g ∈ G, v ∈ Y . For avoiding confusion let us denote the subset
Gv1 ⊂ X by Xw1 and gGv2 ⊂ X by Xw2 . It follows that ∂Θ1,v1 (ξ1 ) ∈ ∂Xw1 and
∂Θg,v2 (ξ2 ) ∈ ∂Xw2 are mapped to the same element of ∂X under the CT maps
∂Xwi → ∂X, i = 1, 2. Hence by Proposition 4.9 ∂Θ1,v1 (ξ1 ) can be flowed to,
′
′
say ξ2 ∈ ∂Xw2 . By Lemma 4.4 the image of ξ2 and Θg,v2 (ξ2 ) under the CT map
∂Xw2 → ∂X are the same. Hence, we can replace ξ2 by (∂Θg,v2 )−1 (ξ2 ) and assume
that Θ1,v1 (ξ1 ) flows to Θg,v2 (ξ2 ).
Then by Lemma 4.4 for any geodesic rays αi ⊂ Xwi with αi (∞) = ∂Θxi ,vi (ξi )
for i = 1, 2 where x1 = 1 and x2 = g we have Hd(α1 , α2 ) < ∞. Pulling back these
geodesics by Θ1,v1 and Θg,v2 we get uniform quasi-geodesic rays, say β1 ⊂ Gv1 and
β2 ⊂ gGv2 such that βi (∞) = ξi , i = 1, 2 and Hd(β1 , β2 ) < ∞.
Now let pi = β1 (i) and qi ∈ β2 , i ∈ N be such that d(pi , qi ) ≤ D where
Hd(β1 , β2 ) = D. Join pi to qi by a geodesic in Γ(G, S). Suppose wi is the word labeling this geodesic. Since there are only finitely many possibilities for such words,
′
−1
there is a constant subsequence {wnk } of {wn }. Let hk = p−1
n1 pnk and hk = qn1 qnk .
′
Let x be the group element represented by wnk . Then we have pn1 .hk .x = pn1 .x.hk
′
′
or hk = xhk x−1 . Since hk connects two elements of gGv2 , it is in Gv2 . Hence hk ∈
−1
−1
= Gv1 ∩ gGv2 g −1 .
Gv1 ∩ xGv2 x−1 . Thus pn1 hk p−1
n1 ∈ pn1 Gv1 pn1 ∩ pn1 xGv2 (pn1 x)
−1
−1
Finally, since d(pn1 hk pn1 , pn1 hk ) = d(pn1 hk pn1 , pnk ) = d(1, pn1 ) for all k ∈ N,
limn→∞ pn1 hk p−1
n1 = limn→∞ pnk = ξ1 . This completes the proof. ✷
The following corollary has been pointed out by Mahan Mj. We use the same
notations as in the main theorem.
Corollary 4.10. If Hi ⊂ Gwi , i = 1, 2 are two quasiconvex subgroups then Λ(H1 )∩
Λ(H2 ) = Λ(H1 ∩ H2 ).
P roof : Assume that wi = gi Gvi , i = 1, 2. Then Gwi = gi Gvi gi−1 . Let Ki =
< Gvi . We may construct a new finite graph starting from Y by adding
two vertices u1 , u2 where ui is connected to vi by an edge ei , i = 1, 2. Let us call
this graph Y1 . Define a new graph of groups (G1 , Y1 ) by keeping the definition same
on Y and setting Gui = Gei = Ki , i = 1, 2 and defining φei ,ui = 1Ki and φei ,vi
to be the inclusion map Ki ⊂ Gvi . This produces a new graph of groups with QI
embedded condition and with fundamental group isomorphic to G. Suppose the
Bass-Serre tree of the new graph of groups is T1 .
′
Now we can apply Theorem 4.1 to Gw′ , i = 1, 2 where wi = gi Ki ∈ T1 , i = 1, 2
i
to finish the proof. ✷
gi−1 Hi gi
Example 4.11. We now give an example where intersection of limit sets is not
equal to the limit set of the intersection. Suppose G is a hyperbolic group with an
GRAPHS OF HYPERBOLIC GROUPS AND A LIMIT SET INTERSECTION THEOREM 11
infinite normal subgroup H such that G/H is not torsion. Let g ∈ G be such that its
image in G/H is an element of infinite order. Let K =< g >. Then H ∩ K = (1)
whence Λ(H ∩ K) = ∅. However, H being an infinite normal subgroup of G we have
Λ(H) = ∂G. Thus Λ(H) ∩ Λ(K) = Λ(K) 6= ∅.
We end with a question.
Question 4.12. If a hyperbolic group G admits a decomposition into a graph of hyperbolic groups with qi embedded condition and Gv is a vertex group how to describe
Λ(Gv ) ⊂ ∂G?
It has been pointed out to me by Prof. Ilya Kapovich that the first interesting
case where this question should be considered is a hyperbolic strictly ascending
HNN extension of a finitely generated nonabelian free group F
G =< F, t|t−1 wt = φ(w), ∀w ∈ F >
where φ : F → F is an injective but not surjective endomorphism of F . One would
also like to describe ∂G in this case.
References
[Anda]
J. W. Anderson, The limit set intersection theorems for finitely generated kleinian
groups, Math. Res. Lett, vol 3(1996), no 5, 675–692.
, Limit set intersection theorems for kleinian groups and a conjecture of
[Andb]
susskind, Comput. Methods Funct. Theory, October 2014, vol 14, issue 2, 453–464.
[BF92]
M. Bestvina and M. Feighn, A Combination theorem for Negatively Curved Groups,
J. Differential Geom., vol 35 (1992), 85–101.
[BH99]
M. Bridson and A Haefliger, Metric spaces of nonpositive curvature, Grundlehren der
mathematischen Wissenchaften, Vol 319, Springer-Verlag (1999).
[GMRS97] R. Gitik, M. Mitra, E. Rips, and M. Sageev, Widths of Subgroups, Trans. AMS (Jan.
’97), 321–329.
[Gro85]
M. Gromov, Hyperbolic Groups, in Essays in Group Theory, ed. Gersten, MSRI
Publ.,vol.8, Springer Verlag (1985), 75–263.
[Hat01]
A. Hatcher, Algebraic topology, Cambridge University Press (2001).
[Kap01]
I. Kapovich, The combination theorem and quasiconvexity, Int. J. Algebra Comput.
11, Issue 02 (2001), 185–216.
[Mit98]
M. Mitra, Cannon-Thurston Maps for Trees of Hyperbolic Metric Spaces, J. Differential Geom. 48 (1998), 135–164.
[Mit04]
Mahan Mitra, Height in Splittings of Hyperbolic Groups, Proc. Indian Acad. of Sciences, v. 114, no.1 (Feb. 2004), 39–54.
[Ser00]
J. P. Serre, Trees, Springer-Verlag, ISBN 3-540-44237-5 (2000).
[SS92]
P. Susskind and G. A. Swarup, Limit sets of geometrically finite hyperbolic groups,
Amer. J. Math., Vol. 114, No. 2 (Apr., 1992) (1992), 233–250.
[SW79]
P. Scott and C. T. C. Wall, Topological Methods in Group Theory, Homological group
theory (C. T. C. Wall, ed.), London Math. Soc. Lecture Notes Series, vol. 36, Cambridge Univ. Press (1979).
[Yan12]
Wen-Yuan Yang, Limit sets of relatively hyperbolic groups, Geom. Dedicata, vol 156,
issue 1 (2012), 1–12.
Indian Institute of Science Education and Research Mohali
| 4math.GR
|
1
A Statistical Characterization of Localization
Performance in Wireless Networks
Christopher E. O’Lone, Graduate Student Member, IEEE,
arXiv:1710.07716v1 [cs.NI] 20 Oct 2017
Harpreet S. Dhillon, Member, IEEE, and R. M. Buehrer, Fellow, IEEE
Abstract
Localization performance in wireless networks has been traditionally benchmarked using the CramérRao lower bound (CRLB), given a fixed geometry of anchor nodes and a target. However, by endowing
the target and anchor locations with distributions, this paper recasts this traditional, scalar benchmark
as a random variable. The goal of this work is to derive an analytical expression for the distribution of
this now random CRLB, in the context of Time-of-Arrival-based positioning.
To derive this distribution, this work first analyzes how the CRLB is affected by the order statistics
of the angles between consecutive participating anchors (i.e., internodal angles). This analysis reveals
an intimate connection between the second largest internodal angle and the CRLB, which leads to
an accurate approximation of the CRLB. Using this approximation, a closed-form expression for the
distribution of the CRLB, conditioned on the number of participating anchors, is obtained.
Next, this conditioning is eliminated to derive an analytical expression for the marginal CRLB
distribution. Since this marginal distribution accounts for all target and anchor positions, across all
numbers of participating anchors, it therefore statistically characterizes localization error throughout an
entire wireless network. This paper concludes with a comprehensive analysis of this new network-wideCRLB paradigm.
Index Terms
Cramér-Rao lower bound, localization, order statistics, Poisson point process, stochastic geometry,
Time of Arrival (TOA), mutual information, wireless networks.
The authors are with Wireless@VT, Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg,
VA, USA. Email: {olone, hdhillon, buehrer}@vt.edu.
This paper was presented in part at the IEEE ICC 2017 Workshop on Advances in Network Localization and Navigation
(ANLN), Paris, France [1].
2
I. I NTRODUCTION
The Global Positioning System (GPS) has for decades been the standard mechanism for position location anywhere in the world. However, the deployment locations of recent and emerging
wireless networks have begun to put a strain on the effectiveness of GPS as a localization solution.
For example, as populations increase, precipitating the expansion of urban environments, cell
phone use in urban canyons, as well as indoors, is continually increasing. The rise of these GPSconstrained environments highlight the need to fall back on the existing network infrastructure
for localization purposes.
Additionally, with the emergence of Wireless Sensor Networks (WSNs) and their increased
emphasis on energy efficiency and cost-effectiveness, [2], [3], the possibility of equipping each
potential target node with a GPS chip quickly becomes impractical. Furthermore, the deployment of these networks in GPS-constrained environments further necessitates a reliance on the
terrestrial network for a localization solution. Thus, localization within a network, performed by
the network itself in the absence of GPS, has begun to garner attention, [4], [5].
Benchmarking localization performance in wireless networks has traditionally been done using
the Cramér-Rao lower bound, which provides a lower bound on the position error of any unbiased
estimator [6]. Common practice has been to analyze the CRLB in fixed scenarios of anchor nodes
and a target, e.g., [7], [8], [9], [10]. This strategy produces a scalar/fixed value for the CRLB and
is specific to the scenario being analyzed. While this idea does provide insight into fundamental
limits of localization performance, it is rather limited in that it does not take into account all
possible setups of anchor nodes and target positions within a network.
In order to account for all possible setups, it is useful to appeal to the field of stochastic
geometry. Whereas in the past stochastic geometry has been applied towards the study of
“connectivity, capacity, outage probability, and other fundamental limits of wireless networks,”
[11], [12], we now however apply it towards the study localization performance in wireless
networks. Modeling anchor node and target placements with point processes opens the possibility
of characterizing the CRLB over all setups of anchor nodes and target positions. Thus, the CRLB
is no longer a fixed value, but rather a random variable (RV) conditioned on the number of
participating anchors, where the randomness is induced by the inherent randomness of the anchor
positions. Upon marginalizing out the number of participating anchors, the resulting marginal
distribution of the CRLB will characterize localization performance throughout an entire wireless
3
network.
A. Related Work
The quest for a network-wide distribution of localization performance comprises two main
steps. The first step involves finding the distribution of the CRLB conditioned on the number
of participating anchor nodes, and the second step involves finding the probability that a given
number of anchors can participate in a localization procedure.
With regards to the first step, there have been several attempts in the literature to obtain this
conditional distribution. An excellent first attempt can be found in the series of papers, [13],
[14], [15], in which approximations of this conditional distribution were presented for ReceivedSignal-Strength (RSS), Time-of-Arrival (TOA), and Angle-of-Arrival (AOA) based localization,
respectively. These approximations were obtained through asymptotic arguments by driving the
number of participating anchor nodes to infinity. While these approximate distributions are very
accurate for larger numbers of participating anchors, they are less than ideal for lower numbers.
However, it is desirable that this conditional distribution be accurate for lower numbers of
participating anchors, since this is the dominate case in terrestrial networks, e.g., cellular.
This conditional distribution of the CRLB was also explored in [16]. Here, the authors were
able to derive the true expression for this conditional distribution through a clever re-writing of
the CRLB using complex exponentials. This distribution was then used to derive and analyze the
so-called “localization outage probability” in scenarios with a fixed number of randomly placed
anchor nodes. While this expression represents the true conditional distribution, its complexity
puts it at a disadvantage over simpler approximations (discussed further in Section III-D).
The second step, which involves finding the participation probability of a given number of
anchor nodes, was explored in [17]. In this work, the authors modeled a cellular network with a
homogeneous Poisson point process (PPP), which consequently allowed them to derive bounds
on L-localizability, i.e., the probability that a mobile device can hear at least L base stations for
participation in a localization procedure.1 Further, by employing a “dominant interferer analysis,”
they were able to derive an accurate expression for the probability of L-localizability, which
can easily be extended to give the probability of hearing a given number of anchor nodes for
participation in a localization procedure.
1 The
term hearability (or hearable) is used to describe anchor nodes that are able to participate in a localization procedure,
i.e., their received SINR at the target is above some threshold.
4
B. Contributions
This paper proposes a novel statistical characterization of a wireless network’s ability to
perform TOA-based localization. Using stochastic geometry to model target and anchor node
placements throughout a network, and using the CRLB as the localization performance benchmark, this paper presents an analytical derivation of the CRLB’s distribution.2 This distribution
offers many insights into localization performance within wireless networks that previously were
only attainable through lengthy, parameter-specific, network simulations. Thus, this distribution
1) offers a means for comparing networks in terms of their localization performance, by
enabling the calculation of network-wide localization statistics, e.g., avg. localization error,
2) unlocks insight into how changing network parameters, such as SINR thresholds, processing
gain, frequency reuse, etc., affect localization performance throughout a network, and
3) provides network designers with an analytical tool for determining whether a network meets,
for example, the FCC E911 standards [18].
In pursuit of this distribution, this paper makes four key contributions. First, this work presents
an analysis of how the CRLB is affected by the order statistics of the internodal angles. This
analysis reveals an intimate connection between the second largest internodal angle and the
CRLB, which leads to an accurate approximation of the CRLB. Second, this approximation is
then used to obtain the distribution of the CRLB conditioned on the number of hearable anchors.
Although this is a distribution of the CRLB approximation, its simplicity and accuracy offer clear
advantages over the true distribution presented in [16] and the approximate distribution presented
in [14]. These advantages are discussed further in Section III-D.
Third, this work then takes a major step by combining this conditional distribution of the CRLB
with the distribution of the number of participating anchors. This eliminates the conditioning
on a given number of anchors, allowing for the analytical expression of the marginal CRLB
distribution to be obtained. Since this marginal distribution now simultaneously accounts for
all possible target and anchor node positions, across all numbers of participating anchor nodes,
it therefore statistically characterizes localization error throughout an entire wireless network,
and thus signals a departure from the existing literature. Additionally, since the two component
distributions are parameterized by various network parameters, our resulting marginal distribution
2 We
will be using the square root of the CRLB as our performance benchmark, however, we just state the CRLB here as to
not unnecessarily clutter the discussion. This will be described further in Section III-A.
5
of the CRLB will also be parameterized by these network parameters. Consequently, our final
contribution involves a comprehensive analysis of this new network-wide CRLB paradigm, where
we examine how varying network parameters affects the distribution of the CRLB — thereby
revealing how these network parameters affect localization performance throughout the network.
II. P ROBLEM S ETUP
This section details the assumptions we propose in determining the network layout as well
as the localization procedure. Additionally, we describe important notation and definitions used
throughout the paper and conclude with how the assumptions impact the network setup.
A. Network Setup and Localization Assumptions
Assumption 1. We assume a ubiquitous, two-dimensional wireless network with anchor nodes
distributed according to a homogeneous PPP over R2 . Further, we assume potential targets to be
distributed likewise, where the anchor and target point processes are assumed to be independent.
Remark. This assumption for modeling wireless networks is common in the literature, e.g., [19],
[20], [21], [22], [23].
Assumption 2. We assume a 2-Way TOA-based positioning technique is used within the twodimensional network.
Remark. Although Time-Difference-of-Arrival (TDOA) is also commonly implemented, 2-Way
TOA represents a viable approach, and additionally offers a lower bound on TDOA performance.
Furthermore, the 2-Way assumption eliminates the need for clock synchronization between the
target and anchor nodes.
Assumption 3. Range measurements are independent and exhibit zero-mean, normally distributed range error.
Remark. A reader familiar with wireless positioning will recognize this as a classic Line-of-Sight
(LOS) assumption. However, those familiar with localization in terrestrial networks will realize
that Non-Line-of-Sight (NLOS) measurements are more common. Thus, while we move forward
under this LOS assumption in order to make progress under this new paradigm, we will see in
Section IV that we can adapt our model to accommodate NLOS measurements by selecting
ranging errors consistent with NLOS propagation.
6
TABLE I
S UMMARY OF N OTATION
Symbol
fX (·)
h(X)
u(x)
k·k
1[·]
tr(X)
L
S
Θk
∠k
X(k)
α
β
K
Description
Probability distribution function (pdf) of X
Differential entropy of X
Unit step function, 0 when x < 0, 1 when x ≥ 0
`2 -norm
Indicator function; 1[A] = 1 if A true, 0 otherwise
Trace of the matrix X
Number of participating anchors, L ∈ {0, 1, 2, . . . }
The localization performance benchmark
Anchor node angle k, a random variable
Internodal angle k, a random variable
k th order statistic of a sequence {Xi } of RVs
Path loss exponent, α > 2
Post-proc. SINR threshold
Frequency reuse factor
Symbol
FX (·)
I(X; Y )
N (µ, σ 2 )
P[A]
b·c
XT
N
M
θk
ϕk
λ
γ
q
σr2
Description
Cumulative distribution function (cdf) of X
Mutual Information between X and Y
Normal distribution, mean µ, variance σ 2
Probability of event A
Floor function
Transpose of the matrix X
Max anchors tasked to perform localization
Fixed localization error, in meters, M ∈ R+
A realization of Θk
A realization of ∠k
Density of PPP of anchor locations
Processing gain
Average network load (i.e., network traffic)
Common range error variance
Assumption 4. The range error variance, σr2 , is common among measurements from participating
anchor nodes and is considered a known quantity.
Remark. This assumption is often made in the literature for range-based localization, e.g., [10],
[25], and although not realistic in every scenario, it allows us to gain initial insight into the
problem and will be relaxed in future work.
B. Notation
The notation used throughout this paper can be found in Table I.
C. Localizability
We now define the terms localizable and unlocalizable, which were introduced in [17].
Definition 1. We say that a target is localizable if it detects localization signals from a sufficient
number of anchor nodes such that its position can be determined without ambiguity.
Remark. Under Assumption 2, this implies that L ≥ 3. We also define unlocalizable to be the
negation of Definition 1.
For the purposes of this setup and subsequent derivations, we will initially only consider
scenarios in which the target is localizable, to avoid unnecessary complication. Later in Section
7
III-E and those which follow, we will account for scenarios in which the target is unlocalizable,
and will modify our results accordingly.
D. Impact of Assumptions
With these assumptions in place, we now describe how they impact the network setup.
From Assumption 1, since the anchors and potential targets are distributed by independent,
homogeneous PPPs over R2 (i.e., stationary), then without loss of generality, we may perform
our analysis for a typical target placed at the origin of the xy-plane [21]. This is due to the
fact that the independence and stationarity assumptions imply that no matter where the target is
placed in the network, the distribution of anchors relative to the target appears the same.
Next, we assume that the number of hearable anchors is some fixed value, L, and begin by
numbering these anchors in terms of their increasing distance from the origin (target position).
This is depicted in Fig. 1 for a particular realization of a homogeneous PPP in which there
are four hearable anchor nodes. Fig. 1 also depicts how their corresponding angles, measured
counterclockwise from the +x-axis, are labeled accordingly. Assumption 1 further implies that
these angles of the hearable anchors are i.i.d. random variables that come from a uniform
distribution on [0, 2π).
Definition 2. If the target is placed at the origin of an x y-plane, then the term anchor node
angle, Θ k , is defined to be the angle corresponding to hearable anchor node k, measured
i.i.d.
counterclockwise from the +x-axis. Note that Θ k ∼ unif[0, 2π), ∀k ∈ {1, . . . , L}.
In later sections we will see that the distances between the anchor nodes and the target are
important for determining how many anchors are able to participate in a given localization procedure. However, under Assumption 4, once particular anchor nodes are identified as participating
in a localization procedure, then they are endowed with the common range error variance. As
we will see in the following section, this assumption, along with Assumptions 2 and 3 will
lead to the CRLB (with L fixed) as being dependent on only the angles between participating
anchor nodes (i.e., internodal angles). Thus, since the CRLB expression is only dependent on
the internodal angles, the distances between participating anchor nodes and the target need not
be considered. Hence, we may view the participating anchors as being placed on a circle about
the origin. This is depicted in Fig. 2, under the same PPP realization as in Fig 1.
8
y
1
y
θ1
θ3
2
θ2
θ (3)
4
θ4
x
ϕ(2)
θ (2)
ϕ(1) θ (1)
ϕ(3)
ϕ(4)
x
θ (4)
3
Fig. 1. I NITIAL L ABELING S CHEME . The dots represent
Fig. 2. E QUIVALENT S ETUP. This is the realization from
a particular realization of anchors placed according to a
Fig. 1, where only participating anchor nodes and the in-
homogeneous PPP. The origin represents the location of the
ternodal angles they trace out are considered, whereas their
target. The anchors participating in the localization procedure
distances from the target are not. The realizations of the RVs
are labeled in increasing order w.r.t. their distance from the
are given by Θ(k) = θ (k) and ∠(k) = ϕ(k) . Note, the anchor
origin. Their corresponding anchor node angles are labeled
node angle order stats “renumber” the participating anchors
accordingly. Note the realization of the RV Θk is Θk = θ k .
in terms of increasing angle c.c.w. starting from the +x-axis.
Next, we formally define the term internodal angle. Since the anchor node angles are such
i.i.d.
that Θ k ∼ unif[0, 2π), for k ∈ {1, . . . , L}, we may examine their corresponding order statistics,
Θ(1), Θ(2), . . . , Θ(L) , where 0 ≤ Θ(1) ≤ Θ(2) ≤ · · · ≤ Θ(L) ≤ 2π by definition. Thus, the order
statistics of the participating anchor node angles effectively “renumber” the nodes in terms of
increasing angle, starting counterclockwise from the +x-axis. This is also depicted in Fig. 2.
Definition 3. If participating anchor nodes are considered according to their anchor node angle
order statistics, then an internodal angle, ∠ k , is defined to be the angle between two consecutive
participating anchor nodes. That is, ∠ k = Θ(k+1) − Θ(k) for 1 ≤ k < L and ∠ L = 2π − (Θ(L) − Θ(1) ).
Remark. Since the internodal angles are functions of RVs, they themselves are RVs. Thus, we
may also consider their order statistics, ∠(1), ∠(2), . . . , ∠(L) . These order statistics of the internodal
angles are depicted for the particular PPP realization in Fig. 2.
In summary, Fig 2 depicts an example of a typical setup realization, given L = 4, once all of
the assumptions are taken into consideration.
9
III. D ERIVATION OF THE N ETWORK -W IDE CRLB D ISTRIBUTION
In this section, we first formally define our localization performance benchmark: the square
root of the CRLB. Using this definition and assuming a random placement of anchors, as well
as a random L, we then describe how this work generalizes localization performance results
currently in the literature. In what follows, we present the steps necessary to derive the marginal
distribution of our localization performance benchmark.
A. The Localization Performance Benchmark
Consider the traditional localization scenario, where the number of participating anchor nodes
(L) and their positions, as well as the target position, are all fixed. We represent the set of
coordinates of these anchors by
n
o
T
ΨL = ψi ∈ R2 ψi = xi, yi , i ∈ {1, 2, 3, ..., L} .
T
The coordinates of the target are denoted by ψt = xt, yt .
Next, under Assumptions 2, 3, and 4, the 2-Way range measurements between the target and
the L participating anchors are given by
ri = di + ni ,
where ri is the measured distance divided by 2 (i.e., the measured 1-Way distance),
q
2
2
xi − xt + yi − yt
di = kψi − ψt k =
i.i.d.
is the true 1-Way distance, and ni ∼ N (0, σr2 ) for all i ∈ {1, 2, . . . , L}.
Remark. Note that under Assumption 4, σr2 is common among the range measurements. For
2
2
2-Way TOA we set this to be σr2 = σ2-Way
/4. If 1-Way TOA is considered, then σr2 = σ1-Way
.
Thus, moving forward we may consider the range measurements to always be 1-Way, regardless
of whether 1-Way or 2-Way TOA is used.
Continuing, Assumption 3 enables the likelihood function to be easily written as a product.
Denoting the vector of range measurements as r = [r1, . . . , rL ]T , the likelihood function is
!
L
Ö
2
(r
−
d
)
1
i
i
exp −
.
L ψt r, ΨL, σr2 =
√
2
2σ
2πσ
r
r
i=1
From this likelihood function, we obtain the following Fisher Information Matrix (FIM)
ÍL
ÍL
2
i=1 cos θ i
i=1 cos θ i sin θ i
1
J L (φt ) = 2
,
ÍL
σr Í L cos θ sin θ
2
sin θi
i
i
i=1
i=1
10
where cos θi =
xi −xt
di
and sin θi =
yi −yt
di .
Remark. Note that if the target is placed at the origin, then the angles here, i.e., the θi ’s, are a
particular realization of the anchor node angles from Definition 2.
Taking the inverse of the FIM above, then the CRLB for any unbiased estimator, ψ̂t = [ x̂t, ŷt ]T ,
of the target position, ψt = [xt, yt ]T , is given by
CRLB = tr J−1
(ψ
)
t ,
L
(1)
as defined in Ch. 2.4.1 of [24].
Definition 4. We define our localization performance benchmark, S, to be the square root of
the CRLB in (1):
r
S , tr J−1
(ψ
)
t .
L
(2)
Remark. This benchmark is often referred to as the position error bound (PEB) in the literature,
[25], [26].
To conclude, notice that from (2), a closed-form expression for S can be obtained:
√
L
S = σr v
u
!2 ,
t L
L
L
Õ
Õ
Õ
cos2 θi
sin2 θi −
cos θi sin θi
i=1
i=1
(3)
i=1
which is a function of the anchor node angles.
B. Departure From the Traditional Localization Setup
In the previous section, we assumed a traditional setup, in which the number of participating
anchor nodes (L) and their positions (ΨL ), as well as the target position (ψt ), were all fixed. In
this section however, we now assume that both ΨL and L are random and briefly describe how
the random placement of anchors impacts our localization performance benchmark, S, and how
the randomness of L signals a departure from the existing literature.
We begin by describing how the random placement of anchors affects our localization performance benchmark. This is accomplished by now invoking Assumption 1 and examining
the impact that this has on the expression for S given by (3). Recall from Section II-D that
Assumption 1 implies that ψt = [0, 0]T and that the anchor node angles are i.i.d. on [0, 2π).
Thus, the θi realizations in (3) are now replaced with the random variables, Θi , from Definition
11
2. Since S is now a function of random variables, it itself becomes a random variable, and we
may now seek its distribution.
While work in the past has sought this distribution for S, e.g., [14], [16], there always
remained one implicit assumption: a fixed L. Therefore, the results presented thus far in the
literature have only applied to localization setups with a fixed number of anchor nodes, and hence
were not applicable network-wide. To address this issue, we now consider L to be a random
variable, whose distribution statistically quantifies the number of anchor nodes participating in
a localization procedure. This new interpretation of L will consequently allow us to decouple S
from L, thereby enabling the marginal distribution of S to account for all possible positioning
scenarios within a network. In addition to the contributions outlined in Section I-B, taking
advantage of this new interpretation of L, to subsequently obtain the marginal distribution of S,
is the main contribution setting this work apart from the existing literature.
C. Approximation of the CRLB
Before deriving the conditional distribution of S given L, we use this section to acquire an
approximation of our expression for S in (3). This will consequently allow for an accurate,
tractable, closed-form expression for the conditional distribution of S to be obtained.
1) Approximation Preliminaries and Goals: To facilitate the search for an accurate approximation, we recall that (3) is now in terms of the random variables Θi , and thus can be rewritten
using the internodal angles from Definition 3. This given by
√
L
S = σr v
u
! ,
tÕ
j−1
L−1 Õ
L
Õ
∠k
sin2
i=1 j=i+1
(4)
k=i
Definition 5. We define the terms underneath the square-root in the denominator in (4) by the
random variable D. That is,
D=
L−1 Õ
L
Õ
i=1 j=i+1
sin2
j−1
Õ
!
∠k .
(5)
k=i
Thus, we would like to find an approximation for D which comprises two key traits: (1) it
allows for a straightforward transformation of random variables, i.e., the number of sin2 (·) terms
does not change with L (and would ideally only involve a single term), and (2) it simultaneously
does not sacrifice accuracy, i.e., the approximation should preserve as much “information”
12
as possible about the setup of anchors, implying that the approximation should dominate (or
contribute the most to) the total value of D.
2) Initial Approach and Intuition: In trying to find an approximation that satisfies both
traits, we consider the following possibilities. First, consider approximating D with the sine
squared of an arbitrary internodal angle, sin2 (∠ k ), or with a sum of consecutive internodal angles,
sin2 (∠ k +∠ k+1 +...), where the starting angle, ∠ k , is arbitrary. While these possible approximations
may seem like reasonable candidates for satisfying the first trait, they unfortunately fall short
of satisfying the second trait. To see why, it is illustrative to examine Fig. 2 under different
realizations/placements of anchor nodes. By only looking at the same unordered internodal angle
on every realization, little knowledge is gained about the total setup of anchors. For example,
on one realization, the arbitrary internodal angle being examined might be large and would
therefore give a strong indication of how the rest of the anchors are placed, however, on another
realization, this same internodal angle might be small, thus giving little information about the
placement of the remaining anchors. Hence, in general, arbitrary internodal angles do not provide
accurate approximations due to their inconsistency in describing the anchor node setup, which
consequently leads to their (sine squared terms’) inability to capture the total value of D across
all realizations of anchors for a given L.
3) A Quantitative Approach Using Mutual Information: Taking advantage of the intuition
gained above, it should now be clear that we would like an approximation that utilizes angles
which tend to consistently dominate any given setup. Therefore, it makes sense to examine
larger internodal angles, and thus, the use of internodal angle order statistics follows naturally.
Since we ideally desire a single-term approximation, we examine the possibility of using the
sine-squared of the largest, second largest, and third largest internodal angles, i.e.,3
W(L) = sin2 (∠(L) ),
W(L−1) = sin2 (∠(L−1) ),
and
W(L−2) = sin2 (∠(L−2) ).
(6)
Note that these larger internodal angles should intuitively contain more “information” about the
setup of anchors, and consequently D, since they greatly restrict the placement of the remaining
anchors. Since each of the order statistic approximations above might seem viable under this
3 We
will not examine sums of the larger internodal angle order statistics, e.g., sin2 (∠(L) + ∠(L−1) ) or sin2 (∠(L) ) + sin2 (∠(L−1) ),
for the following two reasons: (1) they would lead to a more complex expression for the conditional distribution of S than
desired, and (2) they offer no gain in accuracy over using the sine squared of just a single internodal angle order statistic, as
evidenced through simulation.
13
1.6
I(D; W(L) |L)
I(D; W(L−1) |L)
I(D; W(L−2) |L)
Mutual Information (Bits)
1.4
1.2
1
0.8
0.6
0.4
0.2
0
3
4
5
6
7
Number of Participating Anchor Nodes (L)
Fig. 3.
J USTIFYING A PPROXIMATIONS T HROUGH M UTUAL I NFORMATION. The mutual informations were calculated
numerically by computing (8) and (9), where the necessary distributions were generated using a Monte Carlo simulation of
10 million anchor node realizations. The bin width of these distributions was chosen to be 0.01, Matlab’s ‘spline’ option was
used to interpolate the integrands in (8) and (9), and the supports of D and W(i) are given by D = [0, L 2 /4] and W(i) = [0, 1],
where i ∈ {L, L − 1, L − 2}. Furthermore, we adopt the convention: 0 log2 0 = 0 “based on continuity arguments” [29].
qualitative notion of information, we thus turn towards a quantitative notion, in order to justify
the use of one of these approximations.
Towards this end, we utilize the concept of mutual information. The reason behind this choice,
over that of correlation for example, is because mutual information captures both linear and
nonlinear dependencies between two random variables, since it is zero if and only if the two
random variables are independent [28]. Hence, we examine the mutual information between D
and the random variables W(L) , W(L−1) , and W(L−2) , so that we may quantify which approximation
carries the most information about D. Thus, we condition on L equaling some integer `(≥ 3)
and calculate:
I(D; W(i) |L = `) = h(D|L = `) − h(D|W(i), L = `),
where i ∈ {L, L − 1, L − 2}, and the differential entropies are given by
∫
1
h(D|L = `) = fD (d|`) log2
dd,
and
fD (d|`)
D
∫ ∫
1
h(D|W(i), L = `) =
fDW(i) (d, w|`) log2
dd dw,
fD (d|w, `)
(7)
(8)
(9)
W(i) D
where W(i) and D are the supports of W(i) and D, respectively [29]. The mutual information
between the approximations in (6) and D are given in Fig. 3, versus L. From Fig. 3, it is evident
14
that the mutual information between D and the approximation W(L−1) is the highest across all
numbers of participating anchors shown.
4) Investigating the High Mutual Information of D and W(L−1) : To explore the reasoning
behind this result, we examine the effect that W(L−1) has on the total value of D. We begin by
rewriting D as follows:
Proposition 1. The random variable D from Definition 5 can be equivalently expressed as
!
j+i−1
L−2 Õ
L−i
L
Õ
Õ
Õ
sin2 ∠(k) +
sin2
∠k .
D=
i=2 j=1
k=1
k= j
Proof. See Appendix A.
By separating the sine-squared terms of the internodal angle order statistics from the total
sum, Proposition 1 makes it clearer as to how our approximations from (6) may affect the total
value of D. To reveal the effects of W(L−1) in particular, we present the following lemma along
with its corollaries:
Lemma 2. The cdf of the second largest order statistic of the internodal angles, ∠(L−1) , conditioned on L, is given by
F∠(L−1)
X
Õ
nϕ
n−1 L
ϕ|L =
(−1)
(n − 1) 1 −
2π
n
n=0
! L−1
,
(10)
where X = min L, b2π/ϕc and the support is 0 ≤ ∠(L−1) ≤ π. (Note L ≥ 2, since if L < 2,
∠(L−1) would not exist.)
Proof. We refer the reader to the conference version of this paper, i.e., Appendix B of [1].
Corollary 2.1. Given a finite L, the expected value of the second largest order statistic of the
internodal angles, ∠(L−1) , conditioned on L, is given by
!
L
Õ
L
2π(n
−
1)
E[∠(L−1) |L] =
(−1)n
n
nL
n=2
Proof. See Appendix B.
Corollary 2.2. Given a finite L, the variance of ∠(L−1) , conditioned on L, is given by
!"
#
L
2
Õ
4π
L n−1
2
c
VAR[∠(L−1) |L] =
(−1)n
+ ,
L n=2
n
n
n(L − 1) L
(11)
(12)
15
where c =
m+1 L m−1
m=2 (−1)
m
m
ÍL
.
2
2
2
Proof. Note: VAR[∠(L−1) |L] = E[∠(L−1)
|L] − E[∠(L−1) |L] , where the derivation of E[∠(L−1)
|L]
is analogous to that of E[∠(L−1) |L] in the proof of Corollary 2.1.
Next, we plot Corollary 2.1, plus/minus one and two standard deviations of ∠(L−1) . This is
given in Fig. 4, versus L. Here, we can see that the second largest internodal angle is centered
and concentrated around π/2, suggesting that W(L−1) = sin2 (∠(L−1) ) will be concentrated about
its maximum of one. This implies that, for the majority of anchor node placements, sin2 (∠(L−1) )
will be a dominant term in the expression for D in Prop. 1. Thus, the sin2 (∠(L−1) ) term will tend
to contribute the most, that a given sin2 (·) term could contribute, to the total value of D. This
is especially true for small values of L, which is our focus.
Also for low L, ∠(L−1) is intuitively the dominant angle in that it places the greatest constraints
on the remaining angles. That is, once ∠(L−1) is determined, it restricts both ∠(L) and ∠(L−2) ,
and thus gives the greatest sense of the total setup of anchors. Note, when considering order
statistics other than ∠(L−1) , the constraints placed on the remaining angles are not as pronounced.
Furthermore, by examining different realizations of anchors (Fig. 2 as an example), along with
Prop. 1, one can see that when W(L−1) is small (∠(L−1) ≈ 0 or π), than so is D, and when W(L−1)
is large (∠(L−1) ≈ π/2), a large value of D follows. Thus, W(L−1) ’s consistency as a dominant
term in Prop. 1, along with its intuitive correlation with D, offer supporting evidence as to why
I(D; W(L−1) |L = `) is higher than both I(D; W(L) |L = `) and I(D; W(L−2) |L = `) for low L.
In summary, mutual information has proved its utility by revealing that W(L−1) is perhaps the
best approximation of D, for the desirable lower values of L. Since W(L−1) possesses the two
desirable traits for an approximation, discussed at the beginning of this section, we henceforth
use W(L−1) in our approximation of D.
5) Completing the Approximation: To complete the approximation of D, and consequently
S, all that now remains is to ensure that D and W(L−1) have the same range of possible values,
i.e., the same support. This will ensure that our ultimate approximation for S will produce the
same range of values as the true S. In order to accomplish this, we approximate D with a scaled
version of W(L−1) , i.e., D ≈ k W(L−1) , and thus search for the value of the constant k so that
kW(L−1) yields the desired support. Since D = [0, dmax ] and W(L−1) = [0, 1] (which follows from
the support of ∠(L−1) , Lemma 2), then in order to have the support of kW(L−1) equal that of D,
we simply need to set k = dmax . The value of dmax is presented in the following lemma:
16
1
π
E[6
E[6
E[6
7 π /8
(L−1)
(L−1)
(L−1)
| L]
| L] ± σ
| L] ± 2σ
0.9
0.8
P[S ≤ abscissa | L]
0.7
5 π /8
π /2
3 π /8
E[6
(L−1) |L]
(Radians)
6 π /8
Increasing L
(L = 3, 5, 7, 9)
0.6
0.5
0.4
0.3
2 π /8
0.2
π /8
Solid: True
Dashed: Theorem 4
0.1
0
3
4
5
6
7
8
9
0
10
20
30
Number of Participating Anchor Nodes (L)
40
50
60
70
Meters
Fig. 4. T HE S ECOND L ARGEST I NTERNODAL A NGLE O R -
Fig. 5. ACCURACY OF T HEOREM 4. The true conditional cdf
S TATISTIC . This figure gives a sense of the concentration
of S given L was generated using a Monte Carlo simulation of
of the distribution of ∠(L−1) around π/2. E[∠(L−1) |L] is given
q
by Cor. 2.1 and σ = VAR[∠(L−1) |L] is from Cor. 2.2.
(4) over 1 million random setup realizations of the internodal
DER
angles. Note, σr = 20 m.
Lemma 3. Let L be finite. If D is given as in (5), then its maximum value is dmax = L 2 /4.
Proof. See Appendix C.
Thus, we now have D ≈ (L 2 /4) · W(L−1) , which completes our approximation of D. Lastly,
substituting this approximation for D into the expression for S in (4) finally yields:
Approximation 1. The localization performance benchmark, S, can be approximated by
r
4
1
S ≈ σr ·
·
,
L sin(∠(L−1) )
(13)
where 0 ≤ ∠(L−1) ≤ π, as stated in Lemma 2.
D. The Conditional CRLB Distribution
Theorem 4. If the localization performance benchmark, S, is given by Approximation 1, then
the cdf of S conditioned on L is
! L−1 X
! L−1
X2
1
Õ
Õ
L
nϕ
L
nϕ
2
1
FS (s | L, σr ) =
(−1)n−1
(n − 1) 1 −
−
(−1)n−1
(n − 1) 1 −
, (14)
n
2π
n
2π
n=0
n=0
p
where ϕ1 = sin−1 (a/s), ϕ2 = π − sin−1 (a/s), a = σr · 4/L, X1 = min L, b2π/ϕ1 c , X2 =
min L, b2π/ϕ2 c , and the support is S ∈ [a, ∞).
17
Proof. See Appendix D.
Remark. Although Theorem 4 is the conditional distribution of our approximation of S, it
provides two clear advantages over the true conditional distribution presented in [16] and over
the approximate conditional distribution presented in [14]. First, Theorem 4 offers a simple,
closed-form, algebraic expression involving only finite sums, as opposed to the rather complex
expression in [16] involving an improper integral of products of scaled Bessel functions. Second,
Theorem 4 is remarkably accurate for lower numbers of participating anchor nodes, see Fig. 5.
This comes in contrast to the approximate distribution presented in [14], which was derived
asymptotically and therefore only accurate for higher numbers of participating anchors. This
selective accuracy of Theorem 4 is desirable since a device is more likely to hear lower numbers
of participating anchors, especially in infrastructure-based, terrestrial wireless networks.4
E. The Distribution of the Number of Participating Anchors
The next step needed to achieve our goal is to find the distribution of the number of participating anchors, fL (`). In this section, we build upon the localizability results from [17] in order
to obtain this distribution. Towards this end, we present the relevant theorems from this work
and modify them for our use here. Finally, we conclude with a discussion on the applicability
of these results.
1) Overview of Localizability Work: Recall from Section I-A that the goal of [17] was to
derive an expression for the probability that a mobile can hear at least ` base stations for
participation in a localization procedure in a cellular network, i.e., P[L ≥ `]. To derive this
expression, the authors assumed that base stations were placed according to a homogeneous
PPP, and then examined the SIRs of the base station signals received at a “typical user” placed
at the origin.5 Specifically, they examined the SIR of the ` th base station (denoted SIR` ), since
this was used directly to determine P[L ≥ `].
Since SIR` depends on the locations of interfering base stations, then the base stations’
placement according to a PPP implies that SIR` becomes a random variable. Consequently, its
distribution also becomes a function of the PPP density, λ. Additionally, the authors incorporate
4 By
infrastructure-based wireless networks, we mean any wireless network setup with mobile devices, fixed access points,
and separate uplink/downlink channels.
5 SIR
= Signal to Interference Ratio. Noise is ignored since [17] assumes an interference-limited network.
18
a network loading parameter, q, into SIR` , where 0 ≤ q ≤ 1. This means that any given base
station can be considered active (i.e., interfering with base station `’s signal) with probability
q. Furthermore, SIR` is also a function of pathloss, α, where α > 2, and the distances of base
stations to the target.
With SIR` statistically characterized, the authors were able to determine P[L ≥ `] by noting
that P[L ≥ `] = P[SIR` ≥ β/γ], where β/γ is the pre-processing SIR threshold for detection
of a signal.6 Here, γ is the processing gain at the mobile (assumed to also average out the
effect of small scale fading), and β is the post-processing threshold. Thus, since P[L ≥ `] =
P[SIR` ≥ β/γ], then P[L ≥ `] must also depend on all of the network parameters described
above. We denote this dependency by P[L ≥ ` | α, λ, q, γ, β].
Before continuing to the localizability results, we mention one last caveat regarding the PPP
density. That is, when shadowing is present, it can easily be incorporated into the PPP network
model through small displacements of the base station locations. This results in a new PPP
density, which accounts for this effect of shadowing. This new shadowing-transformed density
is given by λ̃ = λ E[Sz2/α ], where Sz is assumed to be a log-normal random variable representing
the effect of shadowing on the signal from base station z to the origin [31].7 Thus, by using λ̃,
we incorporate shadowing under the log-normal model presented in Section II of [31].
2) The Localizability Results: In this section, we present the main theorem which will enable
us to obtain fL (`).
Lemma 5. (Theorem 2, [17]) The probability that a mobile device can hear at least ` base
stations for participation in a localization procedure is given by
P[L ≥ ` | α, λ̃, q, γ, β] =
`−1
© Õ
α−2
1− e− 2qβ/γ
n=0
«
α−2
2qβ/γ
n!
n
∫ ∞∫ r`
`−1
−α
` Õ
ª
r
β
4(
λ̃π)
`
® fΩ (0) +
1
≥
f
(ω)
Ω
2−α −r 2−α
®
r
(` − 1)! ω=1
γ
2πq
λ̃
2(ω−1)
2−α
`
1
0 0 r −α +
· r 2 −r 2 + α−2 r`
2−α
1
¬
`
1
× r1 (r`2 − r12 )ω−1r`2(`−ω)−1 ωe−λ̃πr` dr1 dr`,
2
where ` ∈ {1, 2, . . . }, and Ω is a random variable denoting the number of active participating
6 Note
that for q < 1, this equality holds for all but a few rare corner cases. However, the probability of these cases occurring
is vanishingly small and thus has little to no impact on the accuracy of the subsequent localizability results [17].
7 The
Sz are assumed to be i.i.d. ∀z. Sz ’s log-normal behavior implies it is distributed normally when expressed in dB [31].
19
base stations interfering with the ` th . Note, Ω ∼ Binomial(` − 1, q) = fΩ (ω). Additionally, for the
trivial case of ` = 0, we define P[L ≥ 0] = 1. (Note: γ and β are in linear terms, not dB.)
Remark. This theorem was derived under the following assumptions: (1) a dominant interferer
and (2) interference-limited networks. We refer the reader to Section III-D of [17] for further
details regarding these assumptions and the consequent derivation of this theorem.
3) The Distribution of L: With these localizability results, we now finally present the distribution of the number of participating anchors.
Theorem 6. The pdf of L is given by
fL (` | α, λ̃, q, γ, β) = P[L ≥ ` | α, λ̃, q, γ, β] − P[L ≥ ` + 1 | α, λ̃, q, γ, β],
where the support is L ∈ {0, 1, 2, . . . } and the probabilities are given by Lemma 5.
4) The Distribution of L with Frequency Reuse: Using Theorem 6, we may obtain another
expression for fL (`) which incorporates a frequency reuse parameter, K. This parameter models
the ability of base stations to transmit on K separate frequency bands, thereby limiting interference to a per-band basis. This can easily be incorporated into the model by considering K
independent PPPs whose densities are that of the original PPP divided by K. Thus, if nk is
the number of participating base stations in band k, then the total number of participating base
Í
stations is given by L = K
k=1 n k . Thus, to find P[L = `] under frequency reuse, we simply need
to account for all of the per-band combinations of participating base stations such that their sum
equals `. This is given in the following corollary, which is a modification of Theorem 3 of [17].
Corollary 6.1. The pdf of L, given a frequency reuse factor of K, is
!
K
Õ Ö
λ̃
fL (` | α, λ̃, q, γ, β, K) =
fL nk α, , q, γ, β ,
K
k=1
{nÍ1,...,n K }
i ni =`
where the multiplicands are given by Thm. 6, K ∈ {1, 2, . . . }, and the support is L ∈ {0, 1, 2, . . . }.
Remark. When K = 1, this corollary reduces to Theorem 6. Further, this corollary may be
evaluated numerically through the use of a recursive function.
5) Applicability of the Results: Now that we have obtained the pdf of L, we conclude
with a brief discussion regarding its applicability. We begin by taking note of the support of
fL (`). Whereas up until this section we have proceeded under the assumption that the target is
20
localizable, the support of fL (`) now allows us to consider cases where the target is unlocalizable,
i.e., L = 0, 1, 2. Thus, as will be addressed in the following section, we may use these cases to
determine the percentage of the network where a target is unlocalizable.
Lastly, we note that while the localizability results in [17] (Lemma 5) were presented in
the context of cellular networks, these results are actually applicable to any infrastructure-based
wireless network using downlink measurements, so long as the distribution parameters are altered
accordingly. This implies that the distribution for L (Corollary 6.1) also has this applicability,
since it was derived using Lemma 5. Thus, since we use Corollary 6.1, along with a modified
Theorem 4, to derive the marginal distribution of S, then this final distribution will also be
applicable to any infrastructure-based wireless network employing a TOA localization strategy.
F. The Marginal CRLB Distribution
In this section, we modify Theorem 4 and combine this with Corollary 6.1 to obtain the
marginal distribution of S. First, we state one last network assumption often used in practice:
Assumption 5. For a given localization procedure, only a finite number of anchor nodes, N
(≥ 3), are ever tasked to transmit localization signals.
Remark. Just because N anchors are tasked, does not mean that all N signals are necessarily
heard.
Under this assumption, and further considering scenarios where the target is unlocalizable, we
modify Theorem 4 as follows:
FS (s | L = N, σr )
0
FS (s | L, σr ) = FS (s | L, σr )
u(s − M)
L≥N
L = 3, . . . , N − 1
(15)
L = 0, 1, 2
where FS0 is the new modified conditional distribution of S, FS is the previous conditional
distribution given in Theorem 4, and M ∈ R+ is a predetermined localization error value used
to account for unlocalizable scenarios (described in more detail below).
Remark. While Theorem 4 only accounted for scenarios in which the target was localizable,
this modified form, however, now accounts for unlocalizable scenarios. For these scenarios, this
modified conditional distribution yields a step function, which is a valid cdf and corresponds to
a deterministic value for the localization error, i.e., P[S = M | L] = 1. Thus, we account for
21
cases where the target is unlocalizable by assigning an arbitrary localization error value for M,
which is chosen to represent cases where there is ambiguity in a target’s position estimate.8
Remark. It is possible that a mobile may hear more anchors than are tasked to perform the
localization procedure, i.e., L > N. In this case, the N participating anchors are likely those with
the highest received SIR at the target, if connectivity information is known a priori. Therefore,
in this scenario, localization performance will only be based on the N anchors tasked. This is
clearly reflected in the modified conditional distribution of S in (15).
Using this modified Theorem 4 in (15), along with Corollary 6.1, we may now obtain the
distribution of localization error for an entire wireless network:
Theorem 7. The marginal cdf of the localization performance benchmark, S, is
h
i
FS (s | σr , α, λ̃, q, γ, β, K, M, N) = FS (s | ` = N, σr ) 1 − P[L ≤ N − 1|α, λ̃, q, γ, β, K]
+
N−1
Õ
FS (s | `, σr ) fL (` | α, λ̃, q, γ, β, K)
`=3
+ u(s − M) P[L ≤ 2|α, λ̃, q, γ, β, K],
where FS (s | L = `, σr ) is given by Theorem 4, fL (` | α, λ̃, q, γ, β, K) is given by Corollary 6.1,
Íx
and P[L ≤ x|α, λ̃, q, γ, β, K] = `=0
fL (` | α, λ̃, q, γ, β, K).
Proof. Multiplying the modified conditional distribution of S, given in (15), by the marginal
distribution of L from Corollary 6.1 gives the joint distribution of S and L. Then, setting L
equal to a particular realization, `, and summing over all realizations, gives us the marginal cdf
of S, as desired.
Remark. First, recall that the conditional distribution of our approximation of S, FS (s | L = `, σr )
given by Theorem 4, is accurate for lower ` values. Next, note that: (1) fL (`) declines rapidly
as ` increases (an intuitive result, since the probability of hearing many anchor nodes should
be small in infrastructure-based wireless networks), and (2) only a maximum of N nodes are
tasked to perform a localization procedure (Assumption 5). Thus, these two facts validate the
use of our approximation, since the cases where our approximation is less than ideal (i.e., for
8 In
this paper, we choose a value for M that applies for all L < 3. Thus, a large enough M allows for a clear distinction
between the localizable and unlocalizable portions of the network through a quick examination of the cdf of S. Note however,
that one could account for the L = 0, 1, 2 scenarios separately. For example, if L = 1 then in a cellular network one may want
to choose M to be the cell radius, since the user equipment typically knows in which cell it is located [32].
22
large L) will now either be multiplied by fL (`) ≈ 0, or considered invalid in a realistic network
under Assumption 5. As a consequence, Theorem 7 will also retain this accuracy.
Remark. We conclude by noting that this distribution accounts for localization error over all
setups of anchor nodes, numbers of participating anchors, and placements of a target anywhere in
the network. Hence, this distribution completely characterizes localization performance throughout an entire wireless network and represents the main contribution of this work.
IV. N UMERICAL A NALYSIS
In this section, we examine the accuracy of Theorem 7 and investigate how changing network
parameters affects localization performance throughout the network.
A. Description of Simulation Setup
Here, we discuss the parameters that are fixed across all simulations and include a description
of how the simulations were conducted.
1) Fixed Parameter Choices and their Effect on Model Assumptions: For these simulations,
we consider the case of a cellular network, and thus, we place anchor nodes such that the
PPP density matches that of a ubiquitous hexagonal grid with 500m intersite distances (i.e.,
√
λ = 2/ 3 · 5002 m2 ) [17]. Furthermore, we choose a shadowing standard deviation of 8 dB,
which defines our shadowing-transformed density parameter, λ̃.
Next, we set our pathloss exponent, α ≈ 4, which was chosen to represent a pathloss similar to
that seen in a typical cellular network. Note that this pathloss value is indicative of NLOS range
measurements, which are inherently a part of localization in cellular networks. Recall however,
that Assumption 3 implied the use of Line-of-Sight (LOS) measurements. Thus, we attempt to
mimic NLOS in our simulations by selecting a range error to account for a reasonable delay
spread under NLOS conditions. This is described further in the following section. We note that
a subject of future work will be to seek a refinement of this model by incorporating NLOS
directly into the range measurements.
The last parameter that remains fixed across simulations is M. This parameter was chosen to
be large enough such that an examination of the cdf of S will reveal which percentage of the
network the target is unlocalizable. Towards this end, it was sufficient to choose M ≈ 200 m for
our simulations here. Again, the choice of this value is arbitrary and left up to network designers
and how they would like to treat the unlocalizable cases.
23
1
1
Increasing
Frequency Reuse
(K = 1, 2, 3, 6)
0.9
0.8
0.9
0.8
0.7
P[S ≤ abscissa]
P[S ≤ abscissa]
0.7
0.6
0.5
0.4
0.3
0.6
Decreasing q
(q = 1, 0.75, 0.50, 0.25)
0.5
0.4
0.3
0.2
0.2
Solid: True
Dashed: Theorem 7
0.1
Solid: True
Dashed: Theorem 7
0.1
0
0
0
5
10
15
20
25
30
35
40
45
50
0
5
10
15
20
Meters
Fig. 6.
T HE E FFECT
OF
F REQUENCY R EUSE. This result
25
30
35
40
45
50
Meters
Fig. 7.
T HE I MPACT
OF
D ECREASING N ETWORK L OAD.
exposes the large impact that frequency reuse has on local-
This plot demonstrates the improvement in localization perfor-
ization performance throughout the network. The parameters
mance due to a decrease in network loading. The parameters
are: N = 10, β = 10 dB, γ = 20 dB, q = 1, and σr = 20 m.
were chosen as follows: N = 10, β = 10 dB, γ = 20 dB,
The plots’ “piece-wise” appearance is due to L being discrete.
K = 2, and σr = 20 m.
2) Conducting the Simulations: The true marginal cdf of S was generated through a simulation
over 100,000 positioning scenarios. Each scenario consisted of an average placement of 1,000
anchor nodes, placed according to a homogeneous PPP, with the target located at the origin. Next,
the anchor nodes whose SIRs surpassed the detection threshold were deemed to participate in
the localization procedure, and their corresponding coordinates were used to calculate the true
value of S given by Definition 4. If more than N anchor nodes had signals above the threshold,
then the N anchors with highest SIRs were used to calculate S.
B. The Effect of Frequency Reuse on the Network-Wide Distribution of Localization Error
In this section, we explore how frequency reuse impacts localization performance throughout
the network. This simulation, as well as all subsequent simulations, compares the true (simulated)
distribution of S with our analytical model from Theorem 7. All parameters were fixed at the
levels stated in Fig. 6, while the only parameter varied was the frequency reuse factor, K. The
range error standard deviation, σr , was chosen according to the detection threshold, β, and
the CRLB of a range estimate (see [6], equ. 3.40), assuming a 10MHz channel bandwidth.
Approximately 10m was added to account for a reasonable delay spread in NLOS conditions.
From Fig. 6, the most notable impact that frequency reuse has on localization performance is
24
that of localizability. That is, with just a small increase in frequency reuse from K = 1 to K = 2,
the portion of the network with which a target is localizable increases from only ≈ 25% to an
astonishing ≈ 85%. Furthermore, localization error is also reduced, although the improvement
is not as drastic as the increase in localizability. Additionally, as frequency reuse increases, the
gains in localizability stop after K = 3, with the gains in localization error also declining after
K = 3 as well. Thus, we can conclude that an increase in frequency reuse is strongly advisable if
once desires an increase in localization performance within a network, a result which coincides
with what has been seen in practice, viz. 3GPP. Lastly, we note the excellent match between
the true simulated distribution and our analytically derived distribution given by Theorem 7. We
will see that this accuracy of Theorem 7 is retained across all of our results in this section.
C. Examining the Effects of Network Loading
Here we examine the effect that network loading has on localization performance throughout
the network. This is accomplished by varying the percentage of the network, q, actively transmitting (interfering) during a localization procedure. All parameter values other than q were
fixed and σr was chosen in the same manner as in the frequency reuse case.
From the distributions plotted in Fig. 7, we can see that a decrease in network load leads to
an improvement in localizability, as well as an improvement in localization error. However, the
improvement is not as pronounced as in the frequency reuse case. Further, examining the 80th
percentile for example, it is evident that the rate of improvement in localization error declines
as the network load declines as well. Thus, since low network traffic is usually never desirable,
a network designer looking to optimize localization performance may find solace in the fact that
gains in performance begin to decline as network loading decreases also.
D. The Impact of Processing Gain
In this section, we examine the effects of changing the processing gain, since it is perhaps the
easiest parameter for a network designer to change in practice. (Note that we choose σr here as in
the previous simulations.) From Fig. 8, it is evident that as the processing gain increases, there is
a corresponding improvement in localizability across the network, as well as an improvement in
localization error. As a consequence, there exists a clear trade-off between sacrificing processing
time for gains in localization performance. However, it appears that these improvements begin
to level off at a processing gain of ≈25 dB. This is promising, as processing gains higher than
1
1
0.9
0.9
0.8
0.8
0.7
0.7
P[S ≤ abscissa]
P[S ≤ abscissa]
25
0.6
Increasing Processing Gain
(γ = 15 dB, 20 dB, 25 dB)
0.5
0.4
0.3
Increasing σr
(σr = 20m, 40m, 60m, 80m)
0.6
0.5
0.4
0.3
0.2
0.2
Solid: True
Dashed: Theorem 7
0.1
0
Solid: True
Dashed: Theorem 7
0.1
0
0
10
20
30
40
50
60
70
0
Meters
Fig. 8. T HE E FFECT
OF I NCREASING
20
40
60
80
100
120
140
160
Meters
P ROCESSING G AIN.
Fig. 9. T HE I MPACT OF I NCREASING R ANGE E RROR. Inject-
This figure highlights the trade-off that exists between pro-
ing range error results in a predictable effect on localization
cessing time and localization performance. The distribution
performance throughout the network, yet has no effect on
parameter values are: N = 10, β = 5 dB, q = 1, K = 2, and
localizability. The parameter values are: N = 10, β = 10 dB,
σr = 30 m.
γ = 20 dB, K = 3, and q = 1.
this can quickly become impractical. Examining the 80th percentile, we can see that a 10 dB
increase in processing gain can lead to about a 30m improvement in localization error throughout
the network. Thus, increasing the processing gain can be an easily implementable solution for
achieving moderate gains in localization performance.
E. Range Error and its Impact on Localization Performance within the Network
With this last result, we attempt to mimic the effect of an increasing NLOS bias by injecting
additional range error into the measurements. In examining Fig. 9, we note that the first σr value,
i.e., σr = 20 m, was chosen as in the frequency reuse simulation. Therefore, the subsequent
choices represent that of mimicking the impact of increasing NLOS bias. From Fig. 9, we can
see that increasing range error has no effect on localizability within the network. This should
be clear from the analytical model, since σr does not appear as a parameter in Corollary 6.1.
Additionally, injecting more range error into the measurements results in a predictable effect
on the distribution of localization performance. This is also evidenced by examining Theorem
4, where σr appears as a scale parameter. Thus, mimicking the effects of NLOS measurements
results in a scaling of the distribution of S, implying a predictable reduction in localization
performance.
26
V. C ONCLUSION
This paper presents a novel parameterized distribution of localization error, applicable throughout an entire wireless network. Invoking a PPP network model, as well as common assumptions
for TOA localization, has enabled this distribution to simultaneously account for all possible positioning scenarios within a network. Deriving this result involved two main steps: (1) a derivation
of an approximate distribution of our localization performance benchmark, S, conditioned on
the number of hearable anchor nodes, L, which yielded a conditional distribution with desirable
accuracy and tractability properties, and (2) a modification of results from [17] to attain the
distribution of L. Thus, using these two distributions, we arrived at the final, marginal distribution
of S, which also retained the same parameterizations as its two component distributions.
What followed was a numerical analysis of this network-wide distribution of localization
performance. This analysis revealed that our distribution can offer an accurate, baseline tool for
network designers, in that it can be used to get a sense of localization performance within a
wireless network, while also providing insight into which network parameters to change in order
to meet localization requirements.
Since this marginal distribution of S is a distribution of the TOA-CRLB throughout the
network, it consequently provides a benchmark for describing localization performance in any
network employing an unbiased, efficient, TOA-based localization algorithm. The amount of
insights that this network-wide distribution of localization error reveals are numerous, and the
results presented in this paper have only begun to explore this new paradigm. It is our hope
that this work spawns additional research into this new concept, and that future work, such
as incorporating NLOS measurements, accounting for collaboration, adding other localization
strategies (TDOA/AOA), etc., can further refine the model presented here.
In closing, this work presents an initial attempt to provide network designers with a tool for
analyzing localization performance throughout a network, freeing them from lengthly simulations
by offering an accurate, analytical solution.
27
A PPENDIX A
P ROOF OF P ROPOSITION 1
It first helps to visualize the sin2 (·) terms of the sum in (5) on a 2-D grid, where the i’s
represent the rows and the j’s represent the columns. As an example, the case of L = 4 gives
j=1 j=2
i=1
j=3
j=4
∠1 + ∠2 ∠1 + ∠2 + ∠3
∠1
i=2
∠2 + ∠3
∠2
i=3
∠3
where just the arguments of the sin2 (·) terms are represented in the grid for clarity. From this
arrangement, it is evident that the sum in (5) represents the process of summing each row
sequentially, starting at i = 1.
Now, however, we choose to sum the terms diagonally, starting with the lowest diagonal and
working our way upward. This yields
D=
L−1 Õ
L−i
Õ
i=1 j=1
sin2
j+i−1
Õ
!
∠k .
(16)
k= j
Considering the cases i = 1 and i = L − 1 separately, we may rewrite (16) as
!
!
j+i−1
L−1
L−1
L−2 Õ
L−i
Õ
Õ
Õ
Õ
2
2
2
∠ k + sin
∠k .
D=
sin ∠ k +
sin
i=2 j=1
k=1
k= j
k=1
Next, note that
2
sin
L−1
Õ
!
∠ k = sin
2
2π −
L−1
Õ
!
∠ k = sin2 2π − (Θ(L) − Θ(1) ) = sin2 ∠ L ,
(17)
k=1
k=1
where the last two equalities follow from Definition 3. Hence,
D=
L
Õ
k=1
sin2 ∠ k +
L−2 Õ
L−i
Õ
sin2
i=2 j=1
j+i−1
Õ
!
∠k .
k= j
Lastly, we complete the proof by noting that the first sum may be equivalently expressed by
replacing the internodal angles with their order statistics.
A PPENDIX B
P ROOF OF C OROLLARY 2.1
Using Lemma 2 and our assumption of a finite L, the pdf of ∠(L−1) conditioned on L is
!
! L−2
X
Õ
d
L
n(n
−
1)(L
−
1)
nϕ
f∠(L−1) (ϕ|L) =
F∠ (ϕ|L) =
(−1)n
1−
,
dϕ (L−1)
n
2π
2π
n=0
28
where X = min L, b2π/ϕc and the support is 0 ≤ ∠(L−1) ≤ π, as in Lemma 2.
Next, note that the lower summation limit may be rewritten as n = 2 and that the upper
summation limit, X, can be simplified to just L by appending an indicator function to the
summand. This gives the logically equivalent expression:
!
! L−2 "
#
L
Õ
n(n − 1)(L − 1)
nϕ
2π
n L
f∠(L−1) (ϕ|L) =
(−1)
1−
1 ϕ≤
.
n
2π
2π
n
n=2
Using the above expression for the pdf, the expectation is derived as follows:
∫ π
E[∠(L−1) |L] =
ϕ f∠(L−1) (ϕ|L) dϕ
0
!
! L−2
L n(n − 1)(L − 1)
nϕ
ϕ
(−1)
1−
dϕ
=
n
2π
2π
0
n=2
! ∫ 2π
! L−2
L
Õ
n
nϕ
n(n − 1)(L − 1)
n L
=
(−1)
ϕ 1−
dϕ
n
2π
2π
0
n=2
!
L
Õ
L
2π(n
−
1)
=
(−1)n
,
nL
n
n=2
∫
2π
n
L
Õ
n
(18)
(19)
(20)
where (18) follows from absorbing the indicator function into the integration limits since n ≥ 2,
(19) follows from our assumption of a finite L, and (20) is derived through integration by parts.
A PPENDIX C
P ROOF OF L EMMA 3
This is a straightforward application of the lowest Geometric Dilution Of Precision (GDOP)
presented in [30]. First, since L is finite, then D is a continuous real function defined on a
compact subset of R L . Thus, its maximum must exist. Call it dmax .
Next, under our Assumptions 2, 3, and 4, GDOP, presented in [27], can be written as GDOP =
p
L/D, where D follows from the lemma assumption. Further, under our assumptions, [30] asserts
√
that the lowest GDOP is given by GDOPmin = 2/ L. Since GDOPmin must occur when D is at
p
√
its maximum, we have that 2/ L = L/dmax , and the lemma follows.
A PPENDIX D
P ROOF OF T HEOREM 4
Under Approximation 1, we have S = a/sin(∠(L−1) ), where a is defined in Theorem 4. To
determine the support of S conditioned on L, we know from Lemma 2 that if 0 ≤ ∠(L−1) ≤ π,
29
then the support for the RV sin(∠(L−1) ) must be 0 ≤ sin(∠(L−1) ) ≤ 1. From here, we see that
0 ≤ sin(∠(L−1) ) ≤ 1
⇒
1≤
1
sin(∠(L−1) )
⇒
a≤
a
sin(∠(L−1) )
⇒
a ≤ S,
and hence, S ∈ [a, ∞).
Next, to find the cdf of S conditioned on L, consider the following
FS (s | L, σr ) = P[S ≤ s | L, σr ]
"
a
≤s
=P
sin(∠(L−1) )
"
= P ∠(L−1) ≤ π−sin−1
#
(21)
L
a
s
!
#
"
L − P ∠(L−1) ≤ sin−1
a
s
!
#
L
= P[∠(L−1) ≤ ϕ2 | L] − P[∠(L−1) ≤ ϕ1 | L]
= F∠(L−1) ϕ2 | L − F∠(L−1) ϕ1 | L ,
(22)
(23)
where (21) follows from Approximation 1 and the fact that we may drop the parameter, σr , as
a condition since the dependency is now explicit. Further, ϕ1 and ϕ2 from (22) are defined in
Theorem 4, and (23), through use of Lemma 2, gives (14) from Theorem 4, as desired.
R EFERENCES
[1] C. E. O’Lone and R. M. Buehrer, “Towards a Characterization of Localization Performance in Networks with Random
Geometries,” in IEEE International Conference on Communications (ICC), Paris, France, May 2017.
[2] P. Baronti, P. Pillai, V. W. C. Chook, S. Chessa, A. Gotta, and Y. F. Hu, “Wireless sensor networks: A survey on the state
of the art and the 802.15.4 and ZigBee standards,” in Comput. Commun. 30, pp. 1655-1695, May 2007.
[3] M. A. M. Vieira, C. N. Coelho, D. C. da Silva, and J. M. da Mata, “Survey on wireless sensor network devices,” in Proc.
of IEEE Conference on Emerging Technologies and Factory Automation., vol. 1, pp. 537-544, 2003.
[4] N. Patwari, J. N. Ash, S. Kyperountas, A. O. Hero, R. L. Moses, and N. S. Correal, “Locating the nodes: cooperative
localization in wireless sensor networks,” in IEEE Signal Processing Magazine, vol. 22, no. 4, pp. 54-69, July 2005.
[5] N. A. Alrajeh, M. Bashir, and B. Shams, “Localization Techniques in Wireless Sensor Networks,” in International Journal
of Distributed Sensor Networks, vol. 9, no. 6, 2013.
[6] S. M. Kay, Fundamentals of Statistical Signal Processing. Upper Saddle River, NJ: Prentice-Hall, Inc., vol. 1, 1993.
[7] C. Chang and A. Sahai, “Estimation bounds for localization,” in First Annual IEEE Communications Society Conference
on Sensor and Ad Hoc Communications and Networks. IEEE SECON, pp. 415-424., 2004.
[8] H. Wang, L. Yip, K. Yao, and D. Estrin, “Lower bounds of localization uncertainty in sensor networks,” in IEEE International
Conference on Acoustics, Speech, and Signal Processing, vol. 3, pp. iii-917-20, 2004.
[9] I. Guvenc and C. C. Chong, “A Survey on TOA Based Wireless Localization and NLOS Mitigation Techniques,” in IEEE
Communications Surveys & Tutorials, vol. 11, no. 3, pp. 107-124, 3rd Quarter 2009.
[10] A. Savvides et al., “On The Error Characteristics of Multihop Node Localization In Ad-Hoc Sensor Networks,” in ISPN’03
Proceedings of the 2nd international conference on Information Processing in Sensor Networks, pp. 317-332, 2003.
30
[11] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, “Stochastic Geometry and Random Graphs for
the Analysis and Design of Wireless Networks,” in IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, Sept., 2009.
[12] M. Haenggi, Stochastic Geometry for Wireless Networks. New York: Cambridge University Press, 2013
[13] B. Huang, T. Li, B. D. O. Anderson, and C. Yu, “On the performance limit of sensor localization,” in 50th IEEE Conference
on Decision and Control and European Control Conference, Orlando, FL, pp. 7870-7875, 2011.
[14] B. Huang et al., “On the performance limit of single-hop TOA localization,” in 12th International Conference on Control
Automation Robotics & Vision (ICARCV), Guangzhou, pp. 42-46, 2012.
[15] B. Huang et al., “Performance Limits in Sensor Localization,” in Automatica, vol. 49, no. 2, pp. 503-509, Feb. 2013.
[16] F. Zhou and Y. Shen, “On the Outage Probability of Localization in Randomly Deployed Wireless Networks,” in IEEE
Communications Letters, vol. 21, no. 4, pp. 901-904, April 2017.
[17] J. Schloemann, H. S. Dhillon, and R. M. Buehrer, “Towards a Tractable Analysis of Localization Fundamentals in Cellular
Networks,” in IEEE Trans. Wireless Commun., vol. 15, no. 3, pp. 1768-1782, March 2016.
[18] Code of Federal Regulations, “911 Service,” 47 C.F.R. 20.18 (h), 2015
[19] J. G. Andrews, F. Baccelli, and R. K. Ganti, “A Tractable Approach to Coverage and Rate in Cellular Networks,” in IEEE
Trans. Commun., vol. 59, no. 11, pp. 3122-3134, Nov. 2011.
[20] H. S. Dhillon, R. K. Ganti, F. Baccelli, and J. G. Andrews, “Modeling and Analysis of K-Tier Downlink Heterogeneous
Cellular Networks,” in IEEE J. Sel. Areas Commun., vol. 30, no. 3, pp. 550-560, Apr. 2012.
[21] B. Blaszczyszyn, M. K. Karray, and H. P. Keeler, “Using Poisson processes to model lattice cellular networks,” in Proc.
IEEE INFOCOM, pp. 773-781, Apr. 2013.
[22] H. P. Keeler, N. Ross, and A. Xia, “When do wireless network signals appear Poisson?,” in arXiv:1411.3757, 2014.
[23] B. Blaszczyszyn, M. K. Karray, and H. P. Keeler, “Wireless networks appear Poissonian due to strong shadowing,” in
IEEE Trans. Wireless Commun., vol. 14, no. 8, Aug. 2015.
[24] R. Zekavat and R. M. Buehrer, Handbook of Position Location: Theory, Practice, and Advances. Wiley, 2012.
[25] D. B. Jourdan, D. Dardari, and M. Z. Win, “Position Error Bound for UWB Localization in Dense Cluttered Environments,”
IEEE International Conference on Communications, Istanbul, 2006, pp. 3705-3710.
[26] D. B. Jourdan and N. Roy, “Optimal Sensor Placement for Agent Localization,” IEEE/ION Position, Location, And
Navigation Symposium, 2006, pp. 128-139.
[27] J. Schloemann, H. S. Dhillon, and R. M. Buehrer, “A Tractable Metric for Evaluating Base Station Geometries in Cellular
Network Localization”, IEEE Wireless Commun. Lett., vol. 5, no. 2, pp. 140-143, Apr. 2016.
[28] J. Nounagnon, “Using Kullback-Leibler Divergence to Analyze the Performance of Collaborative Positioning,” Ph.D.
Dissertation, Bradley Dept. of Electrical and Computer Eng., Virgina Tech, Blacksburg, VA, 2016.
[29] T. M. Cover and J. A. Thomas, Elements of Information Theory. New York, NY: Wiley-Interscience, 1991, chs. 2 and 9.
[30] X. Lv, K. Liu and P. Hu, “Geometry Influence on GDOP in TOA and AOA Positioning Systems,” Second International
Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, Hubei, 2010, pp. 58-61.
[31] H. S. Dhillon and J. G. Andrews, “Downlink Rate Distribution in Heterogeneous Cellular Networks under Generalized
Cell Selection,” in IEEE Wireless Communications Letters, vol. 3, no. 1, pp. 42-45, February 2014.
[32] T. Bhandari, H. S. Dhillon, and R. M. Buehrer, “The Impact of Proximate Base Station Measurements on Localizability
in Cellular Systems, in Proc. IEEE SPAWC, Edinburgh, UK, July 2016. (Invited paper)
| 7cs.IT
|
BALANCED ALLOCATION: PATIENCE IS NOT A VIRTUE∗
arXiv:1602.08298v2 [cs.DS] 22 Jan 2018
JOHN AUGUSTINE† , WILLIAM K. MOSES JR.‡ , AMANDA REDLICH§ , AND ELI UPFAL¶
Abstract.
Load balancing is a well-studied problem, with balls-in-bins being the primary framework. The
greedy algorithm Greedy[d] of Azar et al. places each ball by probing d > 1 random bins and placing
the ball in the least loaded of them. With high probability, the maximum load under Greedy[d]
is exponentially lower than the result when balls are placed uniformly randomly. Vöcking showed
that a slightly asymmetric variant, Left[d], provides a further significant improvement. However, this
improvement comes at an additional computational cost of imposing structure on the bins.
Here, we present a fully decentralized and easy-to-implement algorithm called FirstDiff[d] that
combines the simplicity of Greedy[d] and the improved balance of Left[d]. The key idea in FirstDiff[d]
is to probe until a different bin size from the first observation is located, then place the ball. Although
the number of probes could be quite large for some of the balls, we show that FirstDiff[d] requires
only at most d probes on average per ball (in both the standard and the heavily-loaded settings).
Thus the number of probes is no greater than either that of Greedy[d] or Left[d]. More importantly,
we show that FirstDiff[d] closely matches the improved maximum load ensured by Left[d] in both the
standard and heavily-loaded settings. We further provide a tight lower bound on the maximum load
up to O(log log log n) terms. We additionally give experimental data that FirstDiff[d] is indeed as
good as Left[d], if not better, in practice.
Key words.
allocation
Load balancing, FirstDiff, Balanced allocation, Randomized algorithms, Task
AMS subject classifications. 60C05, 60J10, 68R05
1. Introduction. Load balancing is the study of distributing loads across multiple entities such that the load is minimized across all the entities. This problem
arises naturally in many settings, including the distribution of requests across multiple servers, in peer-to-peer networks when requests need to be spread out amongst
the participating nodes, and in hashing. Much research has focused on practical
implementations of solutions to these problems [12, 6, 13].
Our work builds on several classic algorithms in the theoretical balls-in-bins
model. In this model, m balls are to be placed sequentially into n bins and each
ball probes the load in random bins in order to make its choice. Here we give a new
algorithm, FirstDiff[d], which performs as well as the best known algorithm, Left[d],
while being significantly easier to implement.
The allocation time for a ball is the number of probes made to different bins before
placement. The challenge is to balance the allocation time versus the maximum bin
load. For example, using one probe per ball, i.e. placing each ball uniformly at
∗ An earlier version of this paper appeared in [1]. The previous version had only expectation
upper bounds for average number of probes and no lower bounds. This version has lower bounds on
maximum load and high probability upper bounds for average number of probes, as well as cleaner
proofs for the same.
† Department of Computer Science & Engineering, Indian Institute of Technology Madras, Chennai, India. ([email protected]). Supported by the IIT Madras New Faculty Seed Grant, the
IIT Madras Exploratory Research Project, and the Indo-German Max Planck Center for Computer
Science (IMPECS).
‡ Department of Computer Science & Engineering, Indian Institute of Technology Madras, Chennai, India. ([email protected]).
§ Department of Mathematics, Bowdoin College, ME, USA ([email protected]). This material
is based upon work supported by the National Science Foundation under Grant No. DMS-0931908
while the author was in residence at the Institute for Computational and Experimental Research in
Mathematics in Providence, RI, during the Spring 2014 semester.
¶ Department of Computer Science, Brown University, RI, USA ([email protected]).
1
2
J. AUGUSTINE, W. K. MOSES JR., A. REDLICH, AND E. UPFAL
random, the maximum load of any bin when m = n will be lnlnlnnn (1 + o(1)) (with high
probability1 ) and total allocation time of n probes [11]. On the other hand, using d
probes per ball and placing the ball in the lightest bin, i.e. Greedy[d], first studied by
Azar et. al [2], decreases the maximum load to lnlnlndn + O(1) with allocation time of
nd. In other words, using d ≥ 2 choices improves the maximum load exponentially,
at a linear allocation cost.
Vöcking [15] introduced a slightly asymmetric algorithm, Left[d], which quite
surprisingly guaranteed (w.h.p.) a maximum load of dlnlnlnφnd + O(1) (where φd is a
constant between 1.61 and 2 when d ≥ 2) using the same allocation time of nd probes
as Greedy[d] when m = n. This analysis of maximum load for Greedy[d] and Left[d]
was extended to the heavily-loaded case (when m ≫ n) by Berenbrink et al. [3].
However, Left[d] in [15] and [3] utilizes additional processing. Bins are initially sorted
into groups and treated differently according to group membership. Thus practical
implementation, especially in distributed settings, requires significant computational
effort in addition to the probes themselves.
Our Contribution. We present a new algorithm, FirstDiff[d]. This algorithm requires no pre-sorting of bins; instead FirstDiff[d] uses real-time feedback to adjust its
number of probes for each ball2 .
The natural comparison is with the classic Greedy[d] algorithm; FirstDiff[d] uses
the same number of probes, on average, as Greedy[d] but produces a significantly
smaller maximum load. In fact, we show that the maximum load is as small as that of
Left[d] when m = n. Furthermore, it is comparable to Left[d] when heavily loaded. For
both the m = n and heavily loaded cases, FirstDiff[d] has much lower computational
overhead than Left[d].
This simpler implementation makes FirstDiff[d] especially suitable for practical
applications; it is amenable to parallelization, for example, and requires no central
control or underlying structure. Some applications have a target maximum load and
aim to minimize the necessary number of probes. From this perspective, our algorithm
again improves on Greedy[d]: the maximum load of FirstDiff[ln d] is comparable to that
of Greedy[d], and uses exponentially fewer probes per ball.
Theorem 3.1 Use FirstDiff[d], where maximum number of probes allowed per ball is
22d/3 , to allocate n balls into n bins. The average number of probes required per ball
is at most d on expectation and w.h.p. Furthermore, the maximum load of any bin is
log n
at most log
n ≥ max(2, n0 ), where
0.66d + O(1) with high probability when d ≥ 4 and
4
log n
≤ n12 .
n0 is the smallest value of n such that for all n > n0 , 36 log n 72e5n
Theorem 4.1 Use FirstDiff[d], where maximum number of probes allowed per ball
is 2d/2.17 , to allocate m balls into n bins. When m ≥ 72(nλ log n + n) where λ is
taken from Lemma 4.5, n ≥ n0 where n0 is the smallest value of n that satisfies
0.00332n(λ log n + 1)d/2d/2.17 ≥ log n, and d ≥ 6, it takes at most d probes on average
to place every ball on expectation and with high probability. Furthermore, for an
absolute constant c,
Pr Max. load of any bin >
m
n
+
log log n
0.46d
+ c log log log n ≤ c(log log n)−4 .
Our technique for proving that the average number of probes is bounded is novel
1 We use the phrase “with high probability” (or w.h.p. in short) to denote probability of the form
1 − O(n−c ) for some suitable c > 0. Furthermore, every log in this paper is to base 2 unless otherwise
mentioned.
2 Thus we are concerned with the average number of probes per ball throughout this paper.
BALANCED ALLOCATION: PATIENCE IS NOT A VIRTUE
3
to the best of our knowledge. As the number of probes required by each ball is
dependent on the configuration of the balls-in-bins at the time the ball is placed,
the naive approach to computing its expected value quickly becomes too conditional.
Instead, we show that this conditioning can be eliminated by carefully overcounting
the number of probes required for each configuration, leading to a proof that is then
quite simple. The heavily-loaded case is significantly more complex than the m = n
case; however the basic ideas remain the same.
The upper bound on the maximum load is proved using the layered induction
technique. However, because FirstDiff[d] is a dynamic algorithm, the standard recursion used in layered induction must be altered. We use coupling and some more
complex analysis to adjust the standard layered induction to this context.
We furthermore provide a tight lower bound on the maximum load for a broad
class of algorithms which use variable probing.
Theorem 5.1 Let Alg[k] be any algorithm that places m balls into n bins, where
m ≥ n, sequentially one by one and satisfies the following conditions:
1. At most k probes are used to place each ball.
2. For each ball, each probe is made uniformly at random to one of the n bins.
3. For each ball, each probe is independent of every other probe.
The maximum load of any bin after placing all m balls using Alg[k] is at least m
n +
ln ln n
ln k − Θ(1) with high probability.
We use the above theorem to provide a lower bound on the maximum load of
FirstDiff[d], which is tight up to O(log log log n) terms.
Theorem 5.2 The maximum load of any bin after placing m balls into n bins using
FirstDiff[d], where maximum number of probes allowed per ball is 2Θ(d) , is at least
ln ln n
m
n + Θ(d) − Θ(1) with high probability.
Related Work. Several other algorithms in which the number of probes performed
by each ball is adaptive in nature have emerged in the past, such as work done by
Czumaj and Stemann [5] and by Berenbrink et al. [4].
Czumaj and Stemann [5] present an interesting “threshold” algorithm. First they
define a process Adaptive-Allocation-Process, where each load value has an associated
threshold and a ball is placed when the number of probes that were made to find a bin
of a particular load exceeded the associated threshold. Then, by carefully selecting the
thresholds for the load values, they develop M-Threshold, where each ball probes bins
until it finds one whose load is within some predetermined threshold. The bounds
on maximum load and on average allocation time are better than our algorithm’s,
but the trade-off is that computing the required threshold value often depends on the
knowledge (typically unavailable in practical applications) of the total number of balls
that will ever be placed. Furthermore their proofs are for m = n and don’t extend
easily to when m > n.
More recently, Berenbrink et al. [4] develop a new threshold algorithm, Adaptive,
which is similar to M-Threshold but where the threshold value used for a given ball
being placed depends on the number of balls placed thus far. They analyze this algorithm when m ≥ n and also extend the analysis of M-Threshold from [5] to the
m ≥ n case. They show that both algorithms have good bounds on maximum load
and average allocation time, but again this comes at the trade-off of requiring some
sort of global knowledge when placing the balls. In the case of Adaptive, each ball
must know what its order in the global placement of balls is, and in the case of M-
4
J. AUGUSTINE, W. K. MOSES JR., A. REDLICH, AND E. UPFAL
Threshold, each ball must know the total number of balls that will ever be placed.
Our algorithm is unique in that it requires no such global knowledge at all; it is able
to make decisions based on the probed bins’ load values alone.
Definitions. In the course of this paper we will use several terms from probability
theory, which we define below for convenience.
Consider two Markov chains At and Bt over time t ≥ 0 with state spaces S1 and
S2 respectively. A coupling (cf. [8]) of At and Bt is a Markov chain (At , Bt ) over time
t ≥ 0 with state space S1 × S2 such that At and Bt maintain their original transition
probabilities.
Consider two vectors u, v ∈ Zn . Let u′ and v ′ be permutations of u and v
′
respectively such that u′i ≥ u′i+1 and vi′ ≥ vi+1
for all 1 ≤ i ≤ n − 1. We say u
majorizes v (or v is majorized by u) when
i
i
P
P
u′j ≥
vj′ , ∀1 ≤ i ≤ n.
j=1
j=1
For a given allocation algorithm C which places balls into n bins, we define the load
vector ut ∈ (Z∗ )n of that process after t balls have been placed as follows: the ith
index of ut denotes the load of the ith bin (we can assume a total order on the bins
according to their IDs). Note that ut , t ≥ 0, is a Markov chain.
Consider two allocation algorithms C and D that allocate m balls. Let the load
vectors for C and D after t balls have been placed using the respective algorithms be
ut and v t respectively. We say that C majorizes D (or D is majorized by C) if there
is a coupling between C and D such that ut majorizes v t for all 0 ≤ t ≤ m.
Berenbrink et al. [3] provide an illustration of the above ideas being applied in
the load balancing context.
We also use Theorem 2.1 from Janson [7] in order to achieve high probability
concentration bounds on geometric random variables. We first set up the terms in
the theorem and then restate it below. Let X1 , . . . , Xn be n ≥ 1 geometric random
n
P
Xi ,
variables with parameters p1 , . . . , pn respectively. Define p∗ = mini pi , X =
and µ = E[X] =
n
P
i=1
i=1
1
pi .
Now we have the following lemma.
Lemma 1.1 (Theorem 2.1 in [7]).
P r(X ≥ Λµ) ≤ e−p∗ µ(Λ−1−ln Λ) .
For any p1 , . . . , pn ∈ (0, 1] and any Λ ≥ 1,
Organization of Paper. The structure of this paper is as follows. In Section 2, we
define the model formally and present the FirstDiff[d] algorithm. We then analyze the
algorithm when m = n in Section 3 and give a proof that the total number of probes
used by FirstDiff[d] to place n balls is nd with high probability, while the maximum
log n
bin load is still upper bounded by log
0.66d + O(1) with high probability. We provide
the analysis of the algorithm when m > n in Section 4, namely that the number
of probes is on average d per ball with high probability and the maximum bin load
log log n
is upper bounded by m
n + 0.46d + O(log log log n) with probability close to 1. We
provide a matching lower bound for maximum bin load tight up to the O(log log log n)
term for algorithms with variable number of probes and FirstDiff[d] in particular in
Section 5. In Section 6, we give experimental evidence that our FirstDiff[d] algorithm
indeed results in a maximum load that is comparable to Left[d] when m = n. Finally,
we provide some concluding remarks and scope for future work in Section 7.
BALANCED ALLOCATION: PATIENCE IS NOT A VIRTUE
5
2. The FirstDiff[d] Algorithm. The idea behind this algorithm is to use probes
more efficiently. In the standard d-choice model, effort is wasted in some phases. For
example, early on in the distribution, most bins have size 0 and there is no need to
search before placing a ball. On the other hand, more effort in other phases would
lead to significant improvement. For example, if .9n balls have been distributed, most
bins already have size at least 1 and thus it is harder to avoid creating a bin of size
2. FirstDiff[d] takes this variation into account by probing until it finds a difference,
then making its decision.
This algorithm uses probes more efficiently than other, fixed-choice algorithms,
while still having a balanced outcome. Each ball probes at most 2Θ(d) bins (where
d ≥ 6 and by extension 2Θ(d) > 2) uniformly at random until it has found two bins
with different loads (or a bin with zero load) and places the ball in the least loaded of
the probed bins (or the zero loaded bin). If all 2Θ(d) probed bins are equally loaded,
the ball is placed (without loss of generality) in the last probed bin. The pseudocode
for FirstDiff[d] is below. Note that we use the Θ() to hide a constant value. The exact
values are different for m = n and m ≫ n and are 2/3 and 1/2.17 respectively.
Algorithm 1 FirstDiff[d]
(Assume 2Θ(d) > 2. The following algorithm is executed for each ball.)
1: Repeat 2Θ(d) times
2:
Probe a new bin chosen uniformly at random
3:
if The probed bin has zero load then
4:
Place the ball in the probed bin and exit
5:
if The probed bin has load that is different from those probed before then
6:
Place the ball in the least loaded bin (breaking ties arbitrarily) and exit
7: Place the ball in the last probed bin
As we can see, the manner in which a ball can be placed using FirstDiff[d] can be
classified as follows:
1. The first probe was made to a bin with load zero.
2. All probes were made to bins of the same load.
3. One or more probes were made to bins of larger load followed by a probe to
a bin of lesser load.
4. One or more probes were made to bins of lesser load followed by a probe to
a bin of larger load.
3. Analysis of FirstDiff[d] when m = n.
Theorem 3.1. Use FirstDiff[d], where maximum number of probes allowed per
ball is 22d/3 , to allocate n balls into n bins. The average number of probes required per
ball is at most d on expectation and w.h.p. Furthermore, the maximum load of any
log n
bin is at most log
n0 ),
0.66d + O(1) with high probability when d ≥ 4 and n ≥ max(2,
4
72e log n
≤ n12 .
where n0 is the smallest value of n such that for all n > n0 , 36 log n
5n
Proof. First, we show that an upper bound on the average number of probes per
ball is d on expectation and w.h.p. Subsequently, we show that the maximum load at
the end of placing all n balls is as desired w.h.p.
6
J. AUGUSTINE, W. K. MOSES JR., A. REDLICH, AND E. UPFAL
3.1. Proof of Number of Probes.
Lemma 3.2. The number of probes required to place m = n balls into n bins using
FirstDiff[d], where maximum number of probes allowed per ball is 22d/3 , is at most nd
on expectation and with high probability when d ≥ 4.
Proof. Let k be the maximum number of probes allowed to be used by FirstDiff[d]
per ball, i.e. k = 22d/3 . We show that the total number of probes required to place
all balls does not exceed 1.5n log k w.h.p. and thus nd probes are required to place
all balls.
Let the balls be indexed from 1 to n in the order in which they are placed. Our
analysis proceeds in two phases. For a value of T that will be fixed subsequently, the
first T + 1 balls are analyzed in the first phase and remaining balls are analyzed in
the second. Consider the ball indexed by t, 1 ≤ t ≤ n. Let Xt be the random variable
denoting the number of probes it takes for FirstDiff[d] to place ball t.
Phase One: t ≤ T + 1. We couple FirstDiff[d] with the related process that probes
until it finds a difference in bin loads or runs out of probes, without treating empty
bins as special; in other words, the FirstDiff[d] algorithm without lines 3 and 4. One
additional rule for the related process is that if an empty bin is probed first, then after
the process finishes probing, the ball will be placed in that first probed bin, i.e. the
empty bin. Note that this is a valid coupling; if an empty bin is probed then under
both FirstDiff[d] and this process the ball is placed in an empty bin, and if no empty
bin is probed the two processes are exactly the same. Let Yt be the number of probes
required by this related process to place ball t in the configuration where there are
t − 1 bins of load 1 and n − t + 1 bins of load 0. Notice that for any configuration
of balls in bins, Xt ≤ Yt ; furthermore, the configuration after placement under both
FirstDiff[d] and this new process is the same. You can see this by a simple sequence
of couplings.
First, choose some arbitrary configuration with nαi bins of size i for i = 0, 1, 2, . . ..
That configuration will be probed until bins of two different sizes are discovered,
i.e. until the set probed
Pn intersects two distinct αi and αj . Couple this with the
configuration that has i=1 nαi bins of size 1 and the rest of size 0. This configuration
requires more probes than the original configuration; it continues until the set probed
intersects α0 and α6=0 . Second, note that the configuration with t − 1 bins of size 1
and n − t + 1 bins of size 0 requires even more probes than this one. This is because
restricting the bins to size 1 can only decrease the number of empty bins. Finally,
note that the ball’s placement under either FirstDiff[d] or this new process leads to
the same configuration at time t + 1 (up to isomorphism); if FirstDiff[d] places a ball
in an empty bin, so does this process.
We first derive the expected value of Yt . The expected number of probes used
by FirstDiff[d] is upper bounded by the expected number of probes until a size-0 bin
appears, i.e. the expected number of probes used by the FirstDiff[d] algorithm without
line 1. This is of course n/(n − t + 1). The overall expected number of probes for the
BALANCED ALLOCATION: PATIENCE IS NOT A VIRTUE
7
first T + 1 steps is
E[Y ] = E[
T
+1
X
Yt ]
t=1
=
T
+1
X
E[Yt ]
t=1
≤
T
+1
X
t=1
=n
n
n−t+1
n
X
1
i
i=n−T
∼ n(log n − log(n − T ))
n
= n log
.
n−T
Now we will find T such that the expected number of probes in phase one, E[Y ],
is n log k, i.e.
n
= n log k.
n log
n−T
Solving, we get T = n(1 − 1/k). Now, recall that we want a high probability bound
on the number of probes required to place each ball in Phase One when running
Pn(1−1/k)
FirstDiff[d], i.e.
Xt . Recall that Xt ≤ Yt , and as such a high probability
t=0
Pn(1−1/k)
Yt suffices. We can now use Lemma 1.1 with Λ = 1.01, µ =
bound on t=0
n log k, and p∗ = k1 .
n(1−1/k)
n(1−1/k)
X
X
Pr
Xt ≥ 1.01n log k ≤ P r
Yt ≥ 1.01n log k
t=0
t=0
≤e
1
·(n log k)·(1.01−1−ln 1.01)
−k
1
since k << n
≤O
n
Phase Two: t > T + 1. Rather than analyzing in detail, we use the fact that the
number of probes for each ball is bounded by k, i.e. Xt ≤ k, ∀t > T + 1. So the
number of probes overall in this phase is at most
k(n − T − 1) = k(n − n(1 − 1/k) − 1) = n − k.
So the total number of probes w.h.p. is 1.01n log k + n − k ≤ 1.5n log k (when
k = 22d/3 and d ≥ 4). When k = 22d/3 , an upper bound on the number of probes to
place all n balls is nd probes on expectation and w.h.p., as desired.
3.2. Proof of Maximum Load.
Lemma 3.3. The maximum load in any bin after using FirstDiff[d], where maximum number of probes allowed per ball is 22d/3 , to allocate n balls into n bins is at
log n
n ≥ max(2, n0 ), where n0
most log
0.66d + O(1) with high probability when d ≥ 4 and
4
log n
is the smallest value of n such that for all n > n0 , 36 log n 72e5n
≤ n12 .
8
J. AUGUSTINE, W. K. MOSES JR., A. REDLICH, AND E. UPFAL
Proof. While the proof follows along the lines of the standard layered induction
argument [8, 14], we have to make a few non-trivial adaptations to fit our context
where the number of probes is not fixed.
Let k be the maximum number of probes allowed to be used by FirstDiff[d] per
ball, i.e. k = 22d/3 . Define vi as the fraction of bins of load at least i after n balls are
placed. Define ui as the number of balls of height at least i after n balls are placed.
It is clear that vi ∗ n ≤ ui .
We wish to show that the Pr(Max. load ≥ logloglogk n + γ) ≤ n1c for some constants
γ ≥ 1 and c ≥ 1. Set i∗ = logloglogk n + 11 and γ = 15. Equivalently, we wish to show
that Pr(vi∗ +4 > 0) ≤ n1c for some constant c ≥ 1.
In order to aid us in this proof, let us define a non-increasing series of numbers
1
.
β11 , β12 , . . . , βi∗ as upper bounds on v11 , v12 , . . . vi∗ . Let us set β11 = 11
Now,
Pr(vi∗ +4 > 0) = Pr(vi∗ +4 > 0|vi∗ ≤ βi∗ )Pr(vi∗ ≤ βi∗ )
+ Pr(vi∗ +4 > 0|vi∗ > βi∗ )Pr(vi∗ > βi∗ )
≤ Pr(vi∗ +4 > 0|vi∗ ≤ βi∗ ) + Pr(vi∗ > βi∗ )
= Pr(vi∗ +4 > 0|vi∗ ≤ βi∗ )
+ Pr(vi∗ > βi∗ |vi∗ −1 ≤ βi∗ −1 )Pr(vi∗ −1 ≤ βi∗ −1 )
+ Pr(vi∗ > βi∗ |vi∗ −1 > βi∗ −1 )Pr(vi∗ −1 > βi∗ −1 )
≤ Pr(vi∗ +4 > 0|vi∗ ≤ βi∗ )
∗
(1)
+
i
X
Pr(vi > βi |vi−1 ≤ βi−1 ) + Pr(v11 > β11 )
i=12
Here, Pr(v11 > β11 ) = 0. It remains to find upper bounds for the remaining two
terms in the above equation.
We now derive a recursive relationship between the βi ’s for i ≥ 11. βi+1 acts as
an upper bound for the fraction of bins of height at least i + 1 after n balls are placed.
In order for a ball placed to land up at height at least i + 1, one of 3 conditions must
occur:
• All k probes are made to bins of height at least i.
• Several probes are made to bins of height at least i and one is made to a bin
of height at least i + 1.
• One probe is made to a bin of height at least i and several probes are made
to bins of height at least i + 1.
Thus the probability that a ball is placed at height at least i + 1, conditioning on
vj ≤ βj for j ≤ i + 1 at that time, is
≤ βik + βi βi+1 1 + βi + βi2 + . . . + βik−2
k−2
2
+ . . . + βi+1
+ βi βi+1 1 + βi+1 + βi+1
!
k−1
1 − βi+1
1 − βik−1
k
+
≤ βi + βi βi+1
1 − βi
1 − βi+1
1
≤ βik + β11 βi+1 2 ∗
1 − β11
2β
i+1
≤ βik +
10
BALANCED ALLOCATION: PATIENCE IS NOT A VIRTUE
9
Let vi+1 (t) be the fraction of bins with load at least i + 1 after the 1 ≤ t ≤ n ball
is placed in a bin.
Let t∗ = min[arg mint vi+1 (t) > βi+1 , n], i.e. t∗ is the first t such that vi+1 (t) >
βi+1 or n if there is no such t. The probability that t∗ < n is bounded by the
i+1
) is greater than βi+1 n.
probability that a binomial random variable B(n, βik + 2β10
Fix βi+1 =
10 k
3 βi
≥
2n(βik +
n
2βi+1
10
)
. Then using a Chernoff bound, we can say that
with high probability, t∗ = n or vi+1 ≤ βi+1 , so long as e
some constant c ≥ 1.
n
, e−
Now, so long as βi+1 ≥ 18 log
n
18 log n
. This
the value of βi dips below
n
log β11 = − log 11 and log βi+1 = log( 10
3 )
log βi∗ = log
10
3
βik +
2βi+1
βik +
10
−
3
= O( n1c ) for
2βi+1
10
3
= O( n1c ). Notice that at i = i∗ ,
can be seen by solving the recurrence with
+ k log βi .
(1 + k + k 2 + . . . + k logk log n−1 )
+ k logk logn (− log 11)
log log n
10
k k
−1
= log
− (log n)(log 11)
3
k−1
10
− log 11
≤ (log n) log
3
≤ −1.7 log n
Therefore, as it is, βi∗ ≤
n
, we set
βi at least at 18 log
n
(2)
1
n1.7
≤
18 log n
n
βi+1 = max
when n ≥ 2. In order to keep the value of
10 k 18 log n
β ,
3 i
n
With the values of βi defined, we proceed to bound Pr(vi > βi |vi−1 ≤ βi−1 ), ∀12 ≤
i ≤ i∗ . For a given i,
Pr(vi > βi |vi−1 ≤ βi−1 ) = Pr(nvi > nβi |vi−1 ≤ βi−1 )
≤ Pr(ui > nβi |vi−1 ≤ βi−1 )
We upper bound the above inequality using the following idea. Let Yr be an
indicator variable set to 1 when the following 2 conditions are met: (i) the rth ball
placed is of height at least i and (ii) vi−1 ≤ βi−1 . Yr is set to 0 otherwise. Now
2
k
βi ≤
for all 1 ≤ r ≤ n, the probability that Yr = 1 is upper bounded by βi−1
+ 10
βi
3
2
β
+
β
≤
.
Therefore,
the
probability
that
the
number
of
balls
of
height
at
10 i
10 i
2
βi
least i exceeds βi is upper bounded by Pr(B(n, 2 ) > nβi ), where B(·, ·) is a binomial
random variable with given parameters.
µδ2
Recall the Chernoff bound, for 0 < δ ≤ 1, Pr(X ≥ (1 + δ)µ) ≤ e− 3 , where X is
the sum of independent Poisson trials and µ is the expectation of X. If we set δ = 1,
then we have
10
J. AUGUSTINE, W. K. MOSES JR., A. REDLICH, AND E. UPFAL
βi
) > nβi )
2
n · ( β2i )
−
3
≤e
Pr(vi > βi |vi−1 ≤ βi−1 ) ≤ Pr(B(n,
n
n · ( 18 log
)
n
18 log n
6
, ∀i ≤ i∗ )
≤e
(since βi ≥
n
1
≤ 3
n
−
Thus we have
∗
i
X
Pr(vj > βj |vj−1 ≤ βj−1 ) ≤
j=12
log log n
n3
∗
(3)
=⇒
i
X
j=l+1
Pr(vj > βj |vj−1 ≤ βj−1 ) ≤
1
(since n ≥ 2)
2n2
Finally, we need to upper bound Pr(vi∗ +4 > 0|vi∗ ≤ βi∗ ). Consider a particular bin
of load at least i∗ . Now the probability that a ball will fall into that bin is
!!
1
1
+ 2βi∗ +1
≤ · βik−1
∗
n
1 − βik∗ +1
1
1
≤ · βik−1
+ 2βi∗ +1
∗
n
1 − β11
22
1
+ βi∗ (since βi is a non-increasing function)
≤ · βik−1
∗
n
10
1 32
≤ ·
· βi∗ (since k ≥ 2 and βi∗ ≤ 1)
n 10
Now, we upper bound the probability that 4 balls fall into a given bin of load at
least i∗ and then use a union bound over all the bins of load at least i∗ to show that
the probability that the fraction of bins of load at least βi∗ +4 exceeds 0 is negligible.
First, the probability that 4 balls fall into a given bin of load at least βi∗ is
1 32
≤ Pr(B(n, ( ·
∗ βi∗ )) ≥ 4)
n 10
4
n
1 32
·
· βi∗
≤
n 10
4
4
1
1 32
·
· βi∗ ·
≤ e·n·
n 10
4
4
32 eβi∗
·
≤
10
4
Taking the union bound across all possible βi∗ n bins, we have the following inequality
BALANCED ALLOCATION: PATIENCE IS NOT A VIRTUE
Pr(vi∗ +4 > 0|vi∗
=⇒ Pr(vi∗ +4 > 0|vi∗
=⇒ Pr(vi∗ +4 > 0|vi∗
(4)
11
4
32 eβi∗
≤ βi∗ ) ≤ (βi∗ n) ·
·
10
4
4
32 18e log n
·
≤ βi∗ ) ≤ (18 log n) ·
10
4n
1
≤ βi∗ ) ≤
(since n ≥ n0 )
2n2
Putting together equations 1, 3, and 4, we get
1
1
+ 2
2n2
2n
1
≤ 2
n
Pr(vi∗ +4 > 0) ≤
Thus
log log n
Pr Max. Load ≥
+ 15 = Pr(vi∗ +4 > 0)
log k
1
≤ 2
n
From Lemma 3.2 and Lemma 3.3, we immediately arrive at Theorem 3.1.
4. Analysis of FirstDiff[d] when m ≫ n.
Theorem 4.1. Use FirstDiff[d], where maximum number of probes allowed per
ball is 2d/2.17 , to allocate m balls into n bins. When m ≥ 72(nλ log n + n) where λ
is taken from Lemma 4.5, n ≥ n0 where n0 is the smallest value of n that satisfies
0.00332n(λ log n + 1)d/2d/2.17 ≥ log n, and d ≥ 6, it takes at most d probes on average
to place every ball on expectation and with high probability. Furthermore, for an
absolute constant c,
Pr Max. load of any bin >
m
n
+
log log n
0.46d
+ c log log log n ≤ c(log log n)−4 .
Proof. First we show that the average number of probes per ball is at most d on
expectation and w.h.p. We then show the maximum load bound holds w.h.p.
4.1. Proof of Number of Probes.
Remark: The earlier version of this paper [1] had a different proof in this subsection.
The overall idea of overcounting the number of probes remains the same but the
specific argument of how to justify and go about such an overcounting is changed and
cleaner now. More specifically, we have replaced Lemmas 4.2, 4.3, and 4.4 with the
argument that follows the header “Overcounting method” and concludes at the header
“Expectation bound”. Also note that Lemma 4.6 from our earlier version is no longer
required due to the way we’ve constructed our argument.
The main difficulty with analyzing the number of probes comes from the fact that
the number of probes needed for each ball depends on where each of the previous balls
were placed. Intuitively, if all the previous balls were placed such that each bin has
the same number of balls, the number of probes will be 2d/2.17 . On the other hand, if a
significant number of bins are at different load levels, then, the ball will be placed with
very few probes. One might hope to prove that the system always displays a variety of
12
J. AUGUSTINE, W. K. MOSES JR., A. REDLICH, AND E. UPFAL
loads, but unfortunately, the system (as we verified experimentally) oscillates between
being very evenly loaded and otherwise. Therefore, we have to take a slightly more
nuanced approach that takes into account that the number of probes cycles between
high (i.e. as high as 2d/2.17 ) when the loads are even and as low as 2 when there is
more variety in the load.
Lemma 4.2. When m ≥ 72(nλ log n + n) where λ is taken from Lemma 4.5, n ≥
n0 where n0 is the smallest value of n that satisfies 0.00332n(λ log n + 1)d/2d/2.17 ≥
log n, and d ≥ 6, using FirstDiff[d], where maximum number of probes allowed per ball
is 2d/2.17 , takes at most md probes on expectation and with high probability to place
the m balls in n bins.
Proof. Let the maximum number of probes allowed per ball using FirstDiff[d] be
k, i.e. k = 2d/2.17 . Throughout this proof, we will assume that the maximum load
of any bin is at most m/n + λ log n, which holds with high probability owing to
Lemma 4.5. The low probability event that the maximum load exceeds m/n + λ log n
will contribute very little to the overall number of probes because the probability
that any ball exceeds a height of m/n + λ log n will be an arbitrarily small inverse
polynomial in n. Therefore, such a ball will contribute o(1) probes to the overall
number of probes even when we liberally account k probes for each such ball (as long
as k ≪ n). Let m balls be placed into n bins; we assume m ≥ 72(nλ log n + n).
In order to prove the lemma, we proceed in three stages. In the first stage, we
consider an arbitrary sequence of placing m balls into the n bins. We develop a
method that allows us to overcount the number of probes required to place the ball at
each step of this placement. In the second stage, we proceed to calculate the expected
number of probes required to place the balls. Finally in the third stage, we show how
to get a high probability bound on the number of probes required to place each ball.
Overcounting method
First, we couple the process of FirstDiff[d] with a similar process where the zero bin
condition to place balls is not used. In this similar process, if a zero bin is probed first,
more probes are made until either a bin with a different load is probed or until all k
probes are made. Then, the ball is placed in the first bin probed (the zero bin). In
case the first bin probed is not a zero bin, then the process acts exactly as FirstDiff[d].
It is clear that this process will take more probes than FirstDiff[d] while still making
the same placements as FirstDiff[d]. Thus, any upper bounds on number of probes
obtained for this process apply to FirstDiff[d]. For the remainder of this proof, we
analyze this process.
Now we describe the method we use to overcount the number of probes. Consider
an arbitrary sequence of placing m balls into n bins. We will describe a method
to associate each configuration that arises from such a placement with a “canonical”
configuration, which we define later in this proof. Each such canonical configuration
requires more probes to place the ball than the actual configuration. We ensure
that the mapping of actual configurations to canonical configurations is a one-to-one
mapping. Thus, by counting the number of probes required to place a ball in every
possible canonical configuration, we overcount the number of probes required to place
every ball.
Imagine coupling according to probe sequences. That is, consider all [n]k × [n]k ×
. . . × [n]k = [n]km possible sequences of probes. Each timestep corresponds to a
particular length-k sequence of bin labels [n], which direct the bins to be probed.
Note that the probe sequences are each equally likely, and that they fully determine
BALANCED ALLOCATION: PATIENCE IS NOT A VIRTUE
13
the placement.
For each probe sequence S, let X S be the sequence of configurations generated by
S. Let xS be the sequence of numbers-of-probes-used at each timestep of X S . (Note
that S gives k potential probes at each timestep, but the entries of xS are often less
than k, as often the ball is placed without using the maximum number of probes.)
For convenience, we drop the superscript S subsequently and use X and x to refer to
the vectors.
Now we give a few definitions. Consider a particular bin with balls placed in
it, one on top of another. If exactly ℓ − 1 balls are placed below a given ball, we
say that ball is at height ℓ or level ℓ. Balls of the same height are said to be of the
same level. We say a level contains b balls if there are b balls at that level. A level
containing n balls is said to be complete. A level containing at least one ball but less
than n balls is said to be incomplete. For a given configuration, consider the highest
complete level ℓ. For the given configuration, we define a plateau as any level ≥ ℓ
with at least one ball at that level. Intuitively, the plateaus for the configuration are
the highest complete level and any higher incomplete levels. Notice that it is possible
that a given configuration may only have one plateau when there are no incomplete
levels. Further, notice that for a given configuration if two plateaus exist at levels ℓ
and ℓ + 2 with number of balls b1 and b2 , it implies that there exists a plateau at level
ℓ + 1 with number of balls in [b2 , b1 ].
Consider a particular configuration Xi in the sequence X. Call its number of
plateaus p. Consider the plateaus in increasing order of their levels and call them
ℓ1 , ℓ2 , . . . ℓp . Call the number of balls at each level ℓi , bi .
We now define the canonical configuration Cℓ,b . This is the configuration with no
balls at level greater than ℓ, b balls at level ℓ, and n balls at every level less than ℓ.
We will associate each configuration Xi with a set of canonical configurations Ci .
For each plateau of Xi at level ℓj , include the canonical configuration Cℓj ,bj in the
set.
Note that for any probe sequence (not just the specific sequence S), the number of
probes utilized by Xi (e.g. xi for the sequence S) is less than or equal to the number
of probes utilized by any of the configurations in Ci . Therefore the expected number
of probes used to place a ball in configuration Xi is less than or equal to the expected
number of probes used to place a ball in any of the configurations in Ci . We now
describe a way to select one particular configuration out of Ci to associate with each
configuration Xi . We choose this configuration such that the mapping between all
configurations Xi , 1 ≤ i ≤ m, and the selected canonical configurations will be a oneto-one mapping. Furthermore, we show that every selected canonical configurations
will be unique from the others and thus the set of all selected canonical configurations
will not be a multiset. Thus, by counting the number of probes required to place balls
in every possible canonical configuration, we overcount the number of probes required
to place balls in any sequence S.
Look at the canonical configurations associated with configurations Xi , 1 ≤ i ≤ m
over some entire sequence. Let C0 refer to the set of canonical configurations before
any ball is placed and let it be the empty set. The set of canonical configurations Ci−1
differs from Ci in at most three configurations. Consider that i − 1 balls have been
placed and there are now p plateaus with levels ℓi , 1 ≤ i ≤ p and corresponding bi ,
1 ≤ i ≤ p values.
• If the ith ball is placed at level ℓj , level ℓj+1 exists (≥ 1 balls are present at
level ℓj+1 ), and bj+1 6= n − 1, then Ci = (Ci−1 \{Cℓj+1 ,bj+1 }) ∪ {Cℓj+1 ,bj+1 +1 }.
• If level ℓj+1 exists and bj+1 = n − 1, then Ci = (Ci−1 \{Cℓj ,bj , Cℓj+1 ,bj+1 }) ∪
14
J. AUGUSTINE, W. K. MOSES JR., A. REDLICH, AND E. UPFAL
{Cℓj+1 ,n }.
• If level ℓj+1 does not exist, then Ci = Ci−1 ∪ {Cℓj +1,1 }.
Notice that in every scenario, there is exactly one configuration that is added to
Ci−1 to get Ci . We denote the newly-added configuration as the selected canonical
configuration of Ci .
Now, for a given sequence of configurations Xi , 1 ≤ i ≤ m it is clear that each
selected canonical configuration is uniquely chosen. We show in the following lemma,
Lemma 4.3, that every selected canonical configuration in the sequence is unique and
different from the other selected canonical configurations. In other words, the set of
selected canonical configurations will not be a multiset. Furthermore, it has earlier
been established that for any configuration and one of its canonical configurations, it
takes at least as many probes to place a ball in the latter as it does in the former.
Thus, by calculating the S
number of probes it would take to place balls in all possible
m
canonical configurations i=1 Ci , we can overcount the number of probes required to
place all balls into bins.
Lemma 4.3. The set of selected canonical configurations for any sequence of configurations Xi , 1 ≤ i ≤ m will not be a multiset.
Proof. Consider an arbitrary sequence and within it an arbitrary configuration Xi
for some 1 ≤ i ≤ m. To reach this configuration, a ball was placed previously in some
level ℓ − 1 and extended level ℓ from b balls to b + 1 balls, 0 ≤ b ≤ n − 1. The selected
canonical configuration for Xi will be Cℓ,b+1 . Since balls can only be added and never
deleted, once a level is extended to some b + 1 number of balls, placing another ball
can never extend that same level to b + 1 balls. That level can only be henceforth
extended to a larger number of balls up to n balls. Thus a given configuration Cℓ,b+1
will never appear twice in the set of selected canonical configurations.
Expectation bound
As mentioned earlier, we assume the maximum load of any bin is m/n+ λ log n. Thus,
for any given sequence of placements, the final configuration never has any balls at
level m/n + λ log n + 1. Thus, when calculating the number of probes taken to place
all balls, we need only consider the number of probes required to place a ball in every
canonical configuration Cℓ,b , 0 ≤ ℓ ≤ m/n + λ log n, 0 ≤ b ≤ n − 1.
For a given canonical configuration Cℓ,b let Yℓ,b be a random variable denoting
the number of probes required to place the ball using FirstDiff[d] without the zero
bin condition. Let Y be a random variable denoting the total number of probes
required to place a ball in each of the possible canonical configurations. Thus Y =
Pm/n+λ log n Pn−1
ℓ=1
b=0 Yℓ,b .
For a given configuration Cℓ,b , a ball is placed when either it first hits bins of level
ℓ several times and then a bin of level ℓ − 1, it hits bins of level ℓ − 1 several times and
then a bin of level ℓ, or it makes k probes. Thus, using geometric random variables,
we see that E[Yℓ,b ] = min(b/(n − b) + (n − b)/b, k). For the first nk and last nk − 1
canonical configurations for a given level, let us give away the maximum number of
probes, i.e. Yℓ,b = k for any ℓ and for 0 ≤ b ≤ nk − 1 and n − nk + 1 ≤ b ≤ n − 1.
We now want to calculate the expected number of probes for the middle canonical
configurations.
Therefore
15
BALANCED ALLOCATION: PATIENCE IS NOT A VIRTUE
m
n +λ log n
n− n
k
X
X
b= n
k
ℓ=0
n
X n − b n−
Xk b
E[Yℓ,b ] =
+ λ log n + 1
+
n
b
n
n n − b
b= k
b= k
n
n
n−
n− n
n− n
n−
m
Xk 1
Xk b
Xk 1
Xk n − b
+ λ log n + 1 n
−
+n
−
=
n
n b
n b
n n − b
n n − b
b= k
b= k
b= k
b= k
n
n
n−
k
m
Xk 1
X
4n
1
+ λ log n + 1 n
+n
− 2n +
=
n
b
y
k
b= n
y=n− n
k
k
n
n− k
m
X 1
2
=
+ λ log n + 1 2n
− 1 +
n
b
k
n
b= k
n
2
n
− log
−1+
≈ 2 (m + nλ log n + n) log n −
k
k
k
2
= 2 (m + nλ log n + n) log(k − 1) − 1 +
k
m
n− n
k
High probability bound
Now, we may apply Lemma 1.1 with Λ = 1.01, µ taken from above, and p∗ = k1 .
m
n
Pr
≤e
+λ log n n− n
k
X
ℓ=0
X
b= n
k
1
·2(m+nλ log
−k
≤O
Yℓ,b > 2.02(m + nλ log n + n)(log(k − 1) − 1 +
2
n+n)(log(k−1)−1+ k
)·(1.01−1−ln 1.01)
2
)
k
1
(since k > 2 and n ≥ n0 )
n
Therefore, with high probability, the total number of probes
m
n +λ log n
Y =
X
n−1
X
X
X
ℓ=0
Yℓ,b
b=0
m
n
n +λ log n k −1
≤
ℓ=0
b=0
m
n +λ log
Yℓ,b +
X
ℓ=0
n n− n
k
X
m
n +λ log n
(Yℓ,b ) +
b= n
k
X
ℓ=0
n−1
X
Yℓ,b
b=n− n
k +1
n
n
m
2
+
+ λ log n + 1 k + 2.02 (m + nλ log n + n) log(k − 1) − 1 +
+ λ log n + 1 k
−1
n
k
k
n
k
≤ 2.14(m + nλ log n + n) log k
≤
m
≤ 2.17m log k (since m ≥ 72(nλ log n + n))
Thus when m balls are placed into n bins, an upper bound on both the expected
total probes and the total probes with high probability is 2.17m log k. Therefore on
expectation and with high probability, the number of probes per ball is at most d
since k = 2d/2.17 .
16
J. AUGUSTINE, W. K. MOSES JR., A. REDLICH, AND E. UPFAL
4.2. Proof of Maximum Load.
Lemma 4.4. Use FirstDiff[d], where maximum number of probes allowed per ball
is 2d/2.17 , to allocate m balls into n bins. For any m, for an absolute constant c,
Pr Max. load of any bin >
m
n
+
log log n
0.46d
+ c log log log n ≤ c(log log n)−4 .
Proof. This proof follows along the lines of that of Theorem 2 from [14]. In order
to prove Lemma 4.4, we make use of a theorem from [10] which gives us an initial,
loose, bound on the gap Gt between the maximum load and average load for an
arbitrary m. We then use a lemma to tighten this gap. We use one final lemma to
show that if this bound on the gap holds after all m balls are placed, then it will hold
at any time prior to that.
First, we establish some notation. Let k be the maximum number of probes
permitted to be made per ball by FirstDiff[d], i.e. k = 2d/2.17 . After placing nt
balls, let us define the load vector X t as representing the difference between the load
of each bin and the average load (as in [3, 10]). Without loss of generality we order the individual values of the vector in non-increasing order of load difference, i.e.
X1t ≥ X2t ≥ . . . ≥ Xnt . So Xit is the load in the ith most loaded bin minus t. For
convenience, denote X1t (i.e. the gap between the heaviest load and the average) as Gt .
Initial bound on gap
We now give an upper bound for the gap between the maximum loaded bin and the
average load after placing some arbitrary number of balls nt. In other words, we show
Pr(Gt ≥ x) is negligible for some x. This x will be our initial bound on the gap Gt .
Lemma 4.5. For arbitrary constant c, after placing an arbitrary nt balls into bins
n
bn
under FirstDiff[d], there exist some constants a and b such that Pr(Gt ≥ c log
a ) ≤ nc .
1
t
Thus there exists a constant λ that gives Pr(G ≥ λ log n) ≤ nc for a desired c value.
In order to prove Lemma 4.5, we need two additional facts. The first is the following
basic observation:
Lemma 4.6. FirstDiff[d] is majorized by Greedy[2] when d ≥ 2.
Proof. Let the load vectors for FirstDiff[d] and Greedy[2] after t balls have been
placed using the respective algorithms be ut and v t respectively. Now we follow
the standard coupling argument (refer to Section 5 in [3] for an example). Couple
FirstDiff[d] with Greedy[2] by letting the bins probed by Greedy[2] be the first 2 bins
probed by FirstDiff[d]. We know that FirstDiff[d] makes at least 2 probes when d ≥ 2.
It is clear that FirstDiff[d] will always place a ball in a bin with load less than or equal
to that of the bin chosen by Greedy[2]. This ensures that if majorization was preserved
prior to the placement of the ball, then the new load vectors will continue to preserve
majorization; again, see [3] for a detailed example. Initially, u0 is majorized by v 0
since both vectors are the same. Using induction, it can be seen that if ut is majorized
by v t at the time the tth ball was placed, it would continue to be majorized at time
t + 1, 0 ≤ t ≤ m − 1. Therefore, FirstDiff[d] is majorized by Greedy[2] when d ≥ 2.
The other fact is the following theorem about Greedy[d] taken from [10] (used
similarly in [14] as Theorem 3).
Theorem 4.7. [10] Let Y t be the load vector generated by Greedy[d]. Then for
every d > 1 there exist positive constants
a and
b such that for all n and all t,
P a|Y t |
E
e i
≤ bn.
i
We are now ready to prove Lemma 4.5.
17
BALANCED ALLOCATION: PATIENCE IS NOT A VIRTUE
Proof of Lemma 4.5.. Combining Lemma 4.6 with Theorem 4.7 tells us that, if
X t is the load vector generated by FirstDiff[d],
!
X
a|Xit |
≤ bn.
e
E
i
Clearly, Pr(Gt ≥
c log n
a )
Pr(Gt ≥
t
= Pr(eaG ≥ nc ). Observe that
P
t
t
ea|Xi | ≥ eaG . Then
i
t
c log n
) = Pr(eaG ≥ nc )
a
t
E[eaG ]
≤
(by Markov’s inequality)
nc
bn
≤ c (by Theorem 4.7 and Lemma 4.6)
n
and the theorem is proved.
Reducing the gap
Lemma 4.5 gives an initial bound on Gt of order log n. The next step is to reduce it
to our desired gap value. For this reduction, we use a modified version of Lemma 2
from [14], with a similar but more involved proof. We now give the modified lemma
and prove it.
Lemma 4.8. For every k, there exists a universal constant γ such that the fol1
lowing holds: for any t, ℓ, L such that 1 ≤ ℓ ≤ L ≤ n 4 , L = Ω(log log n) and
1
t
Pr(G ≥ L) ≤ 2 ,
3
+ n12 ,
Pr(Gt+L ≥ logloglogk n + ℓ + γ) ≤ Pr(Gt ≥ L) + 16bL
eaℓ
where a and b are the constants from Theorem 4.7.
Proof. This proof consists of many steps. We first observe that Lemma 4.8 follows directly from Lemma 4.5 for sufficiently small n. We then use layered induction
to bound the proportion of bins of each size for larger n. This in turn allows us to
compute our desired bound on the probability of a large gap occurring.
Proof of
Define n1
Define n2
Lemma 4.8 for smaller values of n
to be the minimum value of n such that L ≥ 2 (recall L = Ω(log log n)).
tobe the minimum
value of n such that
1
(18 log n) ∗
4
18en 4 log n
n
≤
1
2n2 .
Define n3 to be the minimum value of n such that
n ≥ 54 log n. Define absolute constant n0 = max(n1 , n2 , n3 ).
Notice that, when n ≤ n0 , Lemma 4.5 implies that Lemma 4.8 holds with γ =
O(log n0 ). If n ≤ n0 , then
Pr(Gt+ℓ ≥ log log n + ℓ + γ) ≤ Pr(Gt+L ≥ γ).
Consider the right hand side of Lemma 4.8.
Pr(Gt ≥ L) +
1
16bL3
+ 2 ≥ n−2 ,
exp(aℓ) n
so it will be sufficient to prove the inequality
Pr(Gt+L ≥ γ) ≤ n−2 .
18
J. AUGUSTINE, W. K. MOSES JR., A. REDLICH, AND E. UPFAL
Since there are no conditions on t in Lemma 4.5, we may rewrite it as
Pr(Gt+L ≥ λ log n) ≤ n−c .
Let c = 2 and compute the constant λ accordingly. Set γ = λ log n0 ≥ λ log n. Then
n−2 ≥ Pr(Gt+L ≥ λ log n) ≥ Pr(Gt+L ≥ γ),
and we are done.
Rewriting initial probability inequality
We now prove Lemma 4.8 assuming n > n0 . Start by rewriting the probability in
terms of Pr(Gt ≥ L).
Pr(Gt+L ≥
log log n
log log n
+ ℓ + γ) = Pr(Gt+L ≥
+ ℓ + γ|Gt ≥ L)Pr(Gt ≥ L)
log k
log k
log log n
+ Pr(Gt+L ≥
+ ℓ + γ|Gt < L)Pr(Gt < L)
log k
log log n
≤ Pr(Gt ≥ L) + Pr(Gt+L ≥
+ ℓ + γ|Gt < L)
log k
To prove the theorem, then, it is enough to to show that
3
1
Pr(Gt+L ≥ logloglogk n + ℓ + γ|Gt < L) ≤ 16bL
eaℓ + n2 .
Bins’ loads
Define vi to be the fraction of bins of load at least t + L + i after (t + L)n balls are
placed. Let us set i∗ = logloglogk n + ℓ and set γ = 4. Using this new notation, we want to
show that Pr(Gt+L ≥ i∗ + 4|Gt < L) is negligible. This can be thought of as showing
that the probability of the fraction of bins of load at least t + L + i∗ + 4 exceeding 0
after (t + L)n balls are placed, conditioned on the event that Gt < L, is negligible.
Suppose we have a non-increasing series of numbers β0 , β1 , . . . , βi , . . . that are
upper bounds for v0 , v1 , . . . , vi , . . .. Then we know that
Pr(vi∗ +4 > 0) = Pr(vi∗ +4 > 0|vi∗ ≤ βi∗ )Pr(vi∗ ≤ βi∗ ) + Pr(vi∗ +4 > 0|vi∗ > βi∗ )Pr(vi∗ > βi∗ )
≤ Pr(vi∗ +4 > 0|vi∗ ≤ βi∗ ) + Pr(vi∗ > βi∗ )
∗
i
X
≤ Pr(vi∗ +4 > 0|vi∗ ≤ βi∗ ) +
Pr(vj > βj |vj−1 ≤ βj−1 ) + Pr(vℓ > βℓ ) (successively expanding
j=ℓ+1
and bounding the Pr(vi∗ > βi∗ ) term and its derivatives)
Conditioning both sides on Gt < L, we have
Pr(vi∗ +4 > 0|Gt < L) ≤ Pr(vi∗ +4 > 0|vi∗ ≤ βi∗ , Gt < L)
∗
+
i
X
Pr(vi > βi |vi−1 ≤ βi−1 , Gt < L)
i=ℓ+1
(5)
+ Pr(vℓ > βℓ |Gt < L)
It remains to find appropriate βi values. We use a layered induction approach to show
that vi ’s don’t exceed the corresponding βi ’s with high probability. This then allows
19
BALANCED ALLOCATION: PATIENCE IS NOT A VIRTUE
us to upper bound each of the 3 components of equation 5.
Base case of layered induction
In order to use layered induction, we need a base case. Let us set βℓ =
in the statement of the theorem. Now,
1
8L3 ,
for the ℓ
T
Pr((vℓ > 8L1 3 ) (Gt < L))
Pr(Gt < L)
1
1
≤ 2 · Pr(vℓ >
) (since, by the statement of the theorem Pr(Gt < L) ≥ )
3
8L
2
8bL3
≤ 2 · aℓ (applying Markov’s inequality and using Theorem 4.7)
e
16bL3
≤ aℓ
e
Pr(vℓ > βℓ |Gt < L) =
Therefore we have the third term of Equation 5 bounded:
(6)
Pr(vℓ > βℓ |Gt < L) ≤
16bL3
eaℓ
Recurrence relation for layered induction
We now define the remaining βi values recursively. Note that for all i ≥ ℓ, βi ≤ βℓ .
Let ui be defined as the number of balls of height at least t + L + i after (L + t)n balls
are placed.
Initially there were nt balls in the system. Then we threw another nL balls into
the system. Remember that t+L is the average load of a bin after nL balls are further
placed. Because we condition on Gt < L, we have it that any ball of height i, i ≥ 1,
must have been one of the nL balls placed.
Therefore the number of bins of load t + L + i + 1 after (t + L)n balls are placed is
upper bounded by the number of balls of height at least t+ L + i + 1. So vi+1 n ≤ ui+1 .
In order to upper bound vi+1 , we can upper bound ui+1 .
Recall the algorithm places a ball in a bin of load t + L + i if it probes k times
and sees a bin of load t + L + i each time; or if it probes j < k times and sees a bin
of load t + L + i each time, then probes a bin of load ≥ t + L + i + 1; or if it probes
j < k times and sees a bin of load at least t + L + i + 1 each time (where the load of
the bin probed each time is the same), then probes a bin of load t + L + i. Thus the
probability that a ball will end up at height at least t + L + i + 1 is
k−2
2
≤ βik + βi βi+1 1 + βi + βi2 + . . . + βik−2 + βi βi+1 1 + βi+1 + βi+1
+ . . . + βi+1
!
k−1
1 − βi+1
1 − βik−1
k
≤ βi + βi βi+1
+
1 − βi
1 − βi+1
1
≤ βik + βl βi+1 2 ∗
1 − βl
2βi+1
≤ βik +
8L3 − 1
Let vi+1 (f ) be the fraction of bins with load at least t + i + 1 after the tn + f th ,
1 ≤ f ≤ nL, ball is placed in a bin.
20
J. AUGUSTINE, W. K. MOSES JR., A. REDLICH, AND E. UPFAL
Let f ∗ = min[arg minf vi+1 (f ) > βi+1 , nL], i.e. f ∗ is the first f such that
vi+1 (f ) > βi+1 or nL if there is no such f . By our preceding argument, the probability that f ∗ < nL is bounded by the probability that a binomial random variable
2βi+1
B(nL, ≤ βik + 8L
3 −1 ) is greater than βi+1 nL.
Fix
2βi+1
2nL(βik + 8L
3 −1 )
8L3 − 1
k
βi+1 = 2L 3
β ≥
.
8L − 4L − 1 i
n
Then using a Chernoff bound,
we can
say that with high probability, f ∗ = nL or
vi+1 ≤ βi+1 , so long as e−
βik +
2βi+1
8L3 −1
3
= O( n1c ) for some constant c ≥ 1.
2βi+1
βik +
8L3 −1
−
3
n
Now, so long as βi+1 ≥ 18 log
, e
= O( n1c ). In other words, this
n
upper bound holds for the placement of all nt + nL balls.
We now show that according to the previous recurrence relation, βi∗ dips below
We later propose a modified recurrence relation which sets the value of βi to
n
. This ensures
the maximum of the value of obtained from the recurrence and 18 log
n
18 log n
. This upper bound will be used later in the argument. We have,
that βi∗ =
n
from the value of βℓ and the above discussion,
log βℓ = −3 log(2L) and
3
−1
log βi+1 = k log βi + log(2L) + log( 8L8L
3 −4L−1 )
Solving the recursion for log βℓ+log log n , we get
2L(8L3 − 1)
k log log n − 1
− 3k log log n log(2L)
log
log βℓ+log log n =
k−1
8L3 − 4L − 1
8L3 − 1
≤ k log log n (−3k + 4) log(2L) + log
8L3 − 4L − 1
8L3 − 1
≤ k log log n (−6 + 4) log(2L) + log
8L3 − 4L − 1
18 log n
.
n
≤ k log log n ((−1.5) log(2L)) (when L ≥ 2)
≤ 2log log n ((−1.5) log(2L))
≤ (−1.5)(log n)
n
,
Therefore, βi∗ ≤ n−1.5 , when L ≥ 2. Since n ≥ n1 , we have L ≥ 2. Thus βi∗ < 18 log
n
as desired.
Now, we need to bound Pr(vi > βi |vi−1 ≤ βi−1 , Gt < L) for all i’s from ℓ + 1 to
3
−1
k 18 log n
i∗ . Let us set βi+1 = max(2L 8L8L
).
3 −4L−1 βi ,
n
Using the values of βi generated above, we prove that for all i such that ℓ + 1 ≤
i ≤ i∗ , Pr(vi > βi |vi−1 ≤ βi−1 , Gt < L) ≤ n13 .
For a given i,
Pr(vi > βi |vi−1 ≤ βi−1 , Gt < L) = Pr(nvi > nβi |vi−1 ≤ βi−1 , Gt < L)
≤ Pr(ui > nβi |vi−1 ≤ βi−1 , Gt < L)
We now upper bound the above inequality using the following idea. Let Yr be an
indicator variable set to 1 when all three of the following conditions are met: (i) the
21
BALANCED ALLOCATION: PATIENCE IS NOT A VIRTUE
nt + rth ball placed is of height at least t + L + i, (ii) vi−1 ≤ βi−1 and (iii) Gt < L.
Yr is set to 0 otherwise. Now for all 1 ≤ r ≤ nL, the probability that Yr = 1 is upper
2βi+1
βi
8L3 −1
k
t
bounded by βik + 8L
3 −1 ≤ 8L3 −4L−1 βi−1 ≤ 2L . Since we condition on G < L, the
number of balls of height at least t + L or more come only from the nL balls placed.
Therefore, the probability that the number of balls of height at least n + L + i exceeds
βi
βi is upper bounded by Pr(B(nL, 2L
) > βi ), where B(., .) is a binomial random
variable with given parameters.
µδ2
According to Chernoff’s bound, for 0 < δ ≤ 1, Pr(X ≥ (1 + δ)µ) ≤ e− 3 , where
X is the sum of independent Poisson trials and µ is the expectation of X. If we set
δ = 1, then we have
Pr(vi > βi |vi−1 ≤ βi−1 , Gt < L)
βi
≤ Pr(B(nL,
) > βi )
2L
n ∗ ( β2i )
−
3
≤e
n
n ∗ ( 18 log
)
n
18 log n
6
≤e
(since βi ≥
, ∀i ≤ i∗ )
n
1
≤ 3
n
−
Thus we bound the middle term in Equation 5
∗
i
X
Pr(vj > βj |vj−1 ≤ βj−1 , Gt < L) ≤
log log n
n3
Pr(vj > βj |vj−1 ≤ βj−1 , Gt < L) ≤
1
(since n ≥ n1 )
2n2
j=ℓ+1
∗
(7)
=⇒
i
X
j=ℓ+1
Top layers of layered induction
Finally, we need to upper bound the first term in Equation 5,
Pr(vi∗ +4 > 0|vi∗ ≤ βi∗ , Gt < L). Consider a bin of load at least i∗ . We will upper
bound the probability that a ball falls into this specific bin. Regardless of how the
probes are made for that ball, one of them must be made to that specific bin. Thus
we have a formula similar to our original recursion, but with a factor of 1/n.
22
J. AUGUSTINE, W. K. MOSES JR., A. REDLICH, AND E. UPFAL
Therefore the probability that a ball will fall into that bin is
≤
≤
≤
≤
≤
≤
1
1 k−1 1
+ βi∗ +1 1 + βi∗ +1 + βi2∗ +1 + . . . + βik−2
βi
+ βi∗ +1 1 + βi∗ + βi∗ + . . . + βik−2
∗
∗ +1
n
n
n
1
1
k−1
· βi∗ + 2βi∗ +1
n
1 − βi∗ +1
1
1
· βik−1
+ 2βi∗
∗
n
1 − βi∗
1
2n
· βik−1
βi∗
+
∗
n
n − 18 log n
1 3n − 18 log n
·
· βi∗ (since k ≥ 2 and βi∗ ≤ 1)
n n − 18 log n
4
· βi∗ (since n > n3 )
n
Now, we upper bound the probability that 4 balls fall into a given bin of load
at least βi∗ and then use a union bound over all the bins of height at least βi∗ to
show that the probability that the fraction of bins of load at least βi∗ +4 exceeds 0 is
negligible.
First, the probability that 4 balls fall into a given bin of load at least βi∗ is
4
≤ Pr(B(nL, ( · βi∗ )) ≥ 4)
n
4
nL
4
· βi∗
≤
n
4
4
4
1
≤ e · nL · ( · βi∗ ) ·
n
4
4
≤ (eLβi∗ )
Taking the union bound across all possible βi∗ n bins, we have the following inequality
4
Pr(vi∗ +4 > 0|vi∗ ≤ βi∗ , Gt < L) ≤ (βi∗ n) · (eLβi∗ )
4
18eL log n
t
∗
∗
∗
=⇒ Pr(vi +4 > 0|vi ≤ βi , G < L) ≤ (18 log n) ·
n
1
(since n ≥ n2 )
=⇒ Pr(vi∗ +4 > 0|vi∗ ≤ βi∗ , Gt < L) ≤
2n2
(8)
Putting together equations 5, 6, 7, and 8, we get
16bL3
1
1
+ 2+ 2
eaℓ
2n
2n
1
16bL3
+ 2
≤
aℓ
e
n
Pr(vi∗ +4 > 0|Gt < L) ≤
Thus
23
BALANCED ALLOCATION: PATIENCE IS NOT A VIRTUE
Pr(Gt+L ≥
log log n
+ ℓ + 4|Gt < L) = Pr(vi∗ +4 > 0|Gt < L)
log k
1
16bL3
+ 2
≤
eaℓ
n
Finally
Pr(Gt+L ≥
log log n
log log n
+ ℓ + 4) ≤ Pr(Gt ≥ L) + Pr(Gt+L ≥
+ ℓ + 4|Gt < L)
log k
log k
1
16bL3
≤ Pr(Gt ≥ L) + aℓ + 2
e
n
Hence Lemma 4.8 is proved.
By Lemma 4.5, we know that at some arbitrary time t, the gap will be O(log n)
with high probability. Now applying Lemma 4.8 once with L = O(log n) and ℓ =
O(log log n) with appropriately chosen constants, we get Pr(Gt+L ≥ logloglogk n +O(log log n)+
γ) ≤ O((log log n)−4 ). Applying the lemma again with L = O(log log n) and ℓ =
O(log log log n) with appropriately chosen constants, we get
c
Pr(Gt > logloglogk n + c log log log n) ≤ (log log
n)4 when time t = ω(log n).
We now show that as more balls are placed, the probability that the gap exceeds
a particular value increases. This is true by Lemma 4 from [14]:
′
′
Lemma 4.9. [14] For t ≥ t′ , Gt is stochastically dominated by Gt . Thus E[Gt ] ≤
′
E[Gt ] and for every z, Pr(Gt ≥ z) ≤ Pr(Gt ≥ z).
Although the setting is different in [14], their proof of Lemma 4.9 applies here
as well. Thus knowing the gap is large when time t = ω(log n) with probability
O((log log n)−4 ), implies that for all values of t′ < t, the gap exceeds the desired value
with at most the same probability. Substituting k = 2d/2.17 in Pr(Gt > logloglogk n +
c
c log log log n) ≤ (log log
n)4 and modifying the inequality to talk about max. load after
m balls have been thrown results in the lemma statement.
Thus concludes the proof of Lemma 4.4.
Putting together Lemma 4.2 and Lemma 4.4, we get Theorem 4.1.
5. Lower Bound on Maximum Bin Load. We now provide a lower bound
to the maximum load of any bin after using FirstDiff[d] as well as other types of algorithms which use a variable number of probes for Class 1 type algorithms as defined
by Vöcking [15]. Class 1 algorithms are those where for each ball, the locations are
chosen uniformly and independently at random from the bins available. We first give
a general theorem for this type of algorithm and then apply it to FirstDiff[d].
Theorem 5.1. Let Alg[k] be any algorithm that places m balls into n bins, where
m ≥ n, sequentially one by one and satisfies the following conditions:
1. At most k probes are used to place each ball.
2. For each ball, each probe is made uniformly at random to one of the n bins.
3. For each ball, each probe is independent of every other probe.
The maximum load of any bin after placing all m balls using Alg[k] is at least m
n +
ln ln n
−
Θ(1)
with
high
probability.
ln k
24
J. AUGUSTINE, W. K. MOSES JR., A. REDLICH, AND E. UPFAL
Proof. We show that Greedy[k] is majorized by Alg[k], i.e. Greedy[k] always performs better than Alg[k] in terms of load balancing. Thus any lower bound that
applies to the max. load of any bin after using Greedy[k] must also apply to Alg[k].
Let the load vectors for Greedy[k] and Alg[k] after t balls have been placed using
the respective algorithms be ut and v t respectively. We use induction on the number
of balls placed to prove our claim of majorization. Initially, no ball is placed and by
default u0 is majorized by v 0 . Assume that ut−1 is majorized by v t−1 . We now use the
standard coupling argument to prove the induction hypothesis. For the placement of
the tth ball, let Alg[k] use wt probes. Couple Greedy[k] with Alg[k] by letting the first
wt bins probed by Greedy[k] be the same bins probed by Alg[k]. Greedy[k] will always
make at least wt probes and thus possibly makes probes to lesser loaded bins than
those probed by Alg[k]. Since Greedy[k] places a ball into the least loaded bin it finds,
it will place a ball into a bin with load at most the same as the one chosen by Alg[k].
Therefore ut is majorized by v t . Thus by induction, we see that ut is majorized by v t
for all 0 ≤ t ≤ m. Therefore Greedy[k] is majorized by Alg[k].
It is known that the max. load of any bin after the placement of m balls into n
ln ln n
bins (m ≥ n) using Greedy[k] is at least m
n + ln k − Θ(1) with high probability [3].
Therefore, the same lower bound also applies to Alg[k].
Now we are ready to prove our lower bound on the max. load of any bin after
using FirstDiff[d].
Theorem 5.2. The maximum load of any bin after placing m balls into n bins
using FirstDiff[d], where maximum number of probes allowed per ball is 2Θ(d) , is at
ln ln n
least m
n + Θ(d) − Θ(1) with high probability.
Proof. We see that FirstDiff[d] uses at most 2Θ(d) probes and satisfies the requirements of Theorem 5.1. Thus by substituting k = 2Θ(d) , we get the desired bound.
Table 1
Experimental results for the maximum load for n balls and n bins based on 100 experiments for
each configuration. Note that the maximum number of probes per ball in FirstDiff[d], denoted as k,
is chosen such that the average number of probes per ball is fewer than d.
n
28
Greedy[d]
2...11%
3...87%
4... 2%
d = 2, k = 3
Left[d]
FirstDiff[d]
2...43%
2...81%
3...57%
3...19%
Greedy[d]
2...88%
3...12%
d = 3, k = 10
Left[d]
FirstDiff[d]
2...100%
2...100%
Greedy[d]
2...100%
d = 4, k = 30
Left[d]
FirstDiff[d]
2...100%
2...100%
2...10%
3...90%
2...12%
3...88%
2...96%
3... 4%
2...100%
2...93%
3... 7%
2...100%
2...100%
2...100%
3...100
2...31%
3...69%
2...100%
3...100%
2...49%
3...51%
2...100%
3...98%
4... 2%
2...100%
2...100%
3...100%
3...100%
3...100%
4...100%
3...96%
4... 4%
2...100%
2...100%
3...100%
3...100%
3...100%
4...100%
3...37%
4...63%
212
3...99%
4... 1%
3...100%
216
3...63%
4...37%
2...100%
220
3...100%
2...100%
224
3...100%
6. Experimental Results. We experimentally compare the performance of
FirstDiff[d] with Left[d] and Greedy[d] in Table 1. Similar to the experimental results in [15], we perform all 3 algorithms in different configurations of bins and d
BALANCED ALLOCATION: PATIENCE IS NOT A VIRTUE
25
values. Let k be the maximum number of probes allowed to be used by FirstDiff[d]
per ball. For each value of d ∈ [2, 4], we choose a corresponding value of k such
that the average number of probes required by each ball in FirstDiff[d] is at most d.
For each configuration, we run each algorithm 100 times and note the percentage of
times the maximum loaded bin had a particular value. It is of interest to note that
FirstDiff[d], despite using on average less than d probes per ball, appears to perform
better than both Greedy[d] and FirstDiff[d] in terms of maximum load.
7. Conclusions and Future Work. In this paper, we have introduced a novel
algorithm called FirstDiff[d] for the well-studied load balancing problem. This algorithm combines the benefits of two prominent algorithms, namely, Greedy[d] and
Left[d]. FirstDiff[d] generates a maximum load comparable to that of Left[d], while
being as fully decentralized as Greedy[d]. From another perspective, we observe that
FirstDiff[log d] and Greedy[d] result in a comparable maximum load, while the number
of probes used by FirstDiff[log d] is exponentially smaller than that of Greedy[d]. In
other words, we exhibit an algorithm that performs as well as an optimal algorithm,
with significantly less computational requirements. We believe that our work has
opened up a new family of algorithms that could prove to be quite useful in a variety
of contexts spanning both theory and practice.
A number of questions arise out of our work. From a theoretical perspective, we
are interested in developing a finer-grained analysis of the number of probes; experimental results suggest the number of probes used to place the ith ball depends on
the congruence class of i modulo n. From an applied perspective, we are interested in
understanding how FirstDiff[d] would play out in real world load balancing scenarios
like cloud computing, where the environment (i.e. the servers, their interconnections,
etc.) and the workload (jobs, applications, users, etc.) are likely to be a lot more
heterogeneous and dynamic.
Acknowledgements. We are thankful to Anant Nag for useful discussions and
developing a balls-in-bins library [9] that was helpful for our experiments. We are
also grateful to Thomas Sauerwald for his helpful thoughts when he visited Institute
for Computational and Experimental Research in Mathematics (ICERM) at Brown
University. Finally, John Augustine and Amanda Redlich are thankful to ICERM for
having hosted them as part of a semester long program.
REFERENCES
[1] J. Augustine, W. K. Moses Jr., A. Redlich, and E. Upfal, Balanced allocation: patience
is not a virtue, in Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on
Discrete Algorithms, Society for Industrial and Applied Mathematics, 2016, pp. 655–671.
[2] Y. Azar, A. Z. Broder, A. R. Karlin, and E. Upfal, Balanced allocations, SIAM journal
on computing, 29 (1999), pp. 180–200.
[3] P. Berenbrink, A. Czumaj, A. Steger, and B. Vöcking, Balanced allocations: The heavily
loaded case, SIAM Journal on Computing, 35 (2006), pp. 1350–1385.
[4] P. Berenbrink, K. Khodamoradi, T. Sauerwald, and A. Stauffer, Balls-into-bins with
nearly optimal load distribution, in Proceedings of the 25th ACM symposium on Parallelism
in algorithms and architectures, ACM, 2013, pp. 326–335.
[5] A. Czumaj and V. Stemann, Randomized allocation processes, Random Structures & Algorithms, 18 (2001), pp. 297–331.
[6] S. Fu, C.-Z. Xu, and H. Shen, Randomized load balancing strategies with churn resilience in
peer-to-peer networks, Journal of Network and Computer Applications, 34 (2011), pp. 252–
261.
[7] S. Janson, Tail bounds for sums of geometric and exponential variables, Technical report,
(2014).
26
J. AUGUSTINE, W. K. MOSES JR., A. REDLICH, AND E. UPFAL
[8] M. Mitzenmacher and E. Upfal, Probability and computing: Randomized algorithms and
probabilistic analysis, Cambridge University Press, 2005.
[9] A. Nag, Problems in Balls and Bins Model, master’s thesis, Indian Institute of Technology
Madras, India, 2014.
[10] Y. Peres, K. Talwar, and U. Wieder, The (1+ β)-choice process and weighted balls-into-bins,
in Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms,
Society for Industrial and Applied Mathematics, 2010, pp. 1613–1619.
[11] M. Raab and A. Steger, “balls into bins”–a simple and tight analysis, in Randomization and
Approximation Techniques in Computer Science, Springer, 1998, pp. 159–170.
[12] H. Shen and C.-Z. Xu, Locality-aware and churn-resilient load-balancing algorithms in structured peer-to-peer networks, Parallel and Distributed Systems, IEEE Transactions on, 18
(2007), pp. 849–862.
[13] X.-J. Shen, L. Liu, Z.-J. Zha, P.-Y. Gu, Z.-Q. Jiang, J.-M. Chen, and J. Panneerselvam,
Achieving dynamic load balancing through mobile agents in small world p2p networks,
Computer Networks, 75 (2014), pp. 134–148.
[14] K. Talwar and U. Wieder, Balanced allocations: A simple proof for the heavily loaded case,
in Automata, Languages, and Programming, Springer, 2014, pp. 979–990.
[15] B. Vöcking, How asymmetry helps load balancing, Journal of the ACM (JACM), 50 (2003),
pp. 568–589.
| 8cs.DS
|
arXiv:1611.08266v1 [cs.CE] 24 Nov 2016
分类号
密级
UDC
编号
中国科学院研究生院
博士学位论文
三维并行自适应有限元动态负载平衡及 hp 自适应策略研究
刘 辉
指导教师
张林波 研究员、博士
中国科学院数学与系统科学研究院
申请学位级别
论文提交日期
培养单位
学位授予单位
博士
学科专业名称
计算数学
论文答辩日期
中国科学院数学与系统科学研究院
中国科学院研究生院
答辩委员会主席
摘
要
本文工作围绕着 PHG 平台展开. PHG 是“科学与工程计算国家重点实验
室”正在发展的一个并行自适应有限元软件平台. PHG 适合分布式存储并行计
算机, 其设计目标是支持使用 h, p 及 hp 自适应有限元方法和有限体积方法求解
二维和三维偏微分方程组. PHG 支持多种网格及曲面单元, 支持多种网格输入格
式, 提供常用的基函数, 支持多种线性方程组解法器和预条件子, 提供接口以调用
外部线性方程组和特征值问题求解软件包, 同时提供前处理及后处理功能等. 本
文的工作主要涉及两方面的内容. 第一方面内容是研究、实现 PHG 中的网格划
分算法及动态负载平衡模块, 包括研究哈密尔顿路的构造和希尔伯特序的编码解
码算法, 以及基于这些算法的网格划分和动态负载平衡方法. 第二方面内容是基
于 PHG 平台研究 hp 自适应有限元算法中的自适应策略并开展数值实验. 具体
内容如下:
(1) 针对 PHG 所处理的协调四面体网格, 本文在网格的对偶图连通的条件下证
明了过顶点哈密尔顿圈和任意两个单元之间的过顶点哈密尔顿路的存在性,
并在此基础上设计了线性复杂度的四面体网格上过顶点哈密尔顿圈和过顶点
哈密尔顿路的构造算法. 文中还对相应并行算法的构造进行了探讨.
(2) 设计了任意维空间中具有线性复杂度的希尔伯特序编码解码算法并提出了希
尔伯特空间填充曲线的一种变体. 本文同时对编码解码算法进行了改进,设
计了复杂度更低的算法, 降低了计算量. 文中给出的希尔伯特空间填充曲线
的变体保证曲线的编码顺序不随曲线阶数的改变而变化.
(3) 设计实现了加密树及空间填充曲线划分方法并设计了 PHG 的动态负载平衡
模块, 同时实现并改进了 Zoltan 中的一个一维划分算法用于对排序后的单元
进行一维划分. 此外, 本文还实现了 PLUM 中设计的子网格 – 进程映射算法,
用于减少动态负载平衡中的数据迁移量. 数值实验表明, 本文在 PHG 中所实
现的空间填充曲线划分算法不论在划分时间还是划分质量上均优于其它一些
软件包 (其中包括由美国 Sandia 国家实验室开发的著名的网格划分和数据迁
移软件包 Zoltan) 中所提供的相应算法. 本文所实现的基于希尔伯特序的网
格划分算法已经成为 PHG 中默认的网格划分方法, 经受了一些并行规模达
数千子网格、计算规模超过十亿单元的大型应用的考验, 表现出很高的效率
和很强的稳健性.
(4) 设计了一个基于误差下降预测的 hp 自适应策略. 当前, hp 自适应有限元算法
i
ii
学位论文
研究中的一个难点是自适应策略的设计, 目前尚没有成熟的、已被广泛接受
的算法. 本文对 hp 自适应策略进行了研究,在前人提出的几种基于误差下
降预测的 hp 自适应策略的基础上给出了一个新的 hp 自适应加密策略, 该策
略适用于二维三角形、四边形和三维四面体、六面体等不同类型的单元, 适
用于正则加密、二分加密等不同自适应加密方式. 数值实验表明, 该策略可
以达到最优的误差指数下降, 并在数值解的精度和计算效率上优于文献中的
一些策略. 这部分工作的另外一个目的是验证 PHG 的 hp 自适应模块的正确
性和适用性.
关键词: PHG, 自适应有限元, 并行计算, 哈密尔顿路, 空间填充曲线, 动态
负载平衡, hp 自适应策略
Researches on Dynamic Load Balancing Algorithms and
hp Adaptivity in 3-D Parallel Adaptive Finite Element
Computations
Liu Hui (majored in computational mathematics)
Directed by Prof. Zhang Lin-bo
This work is related to PHG (Parallel Hierarchical Grid). PHG is a toolbox for
developing parallel adaptive finite element programs, which is under active development
at the State Key Laboratory of Scientific and Engineering Computing. PHG is designed
for distributed memory parallel computers, and its purpose is to support development
of parallel algorithms and codes for solving real world application problems using h, p,
or hp adaptive finite element methods. PHG supports importing meshes from several
mesh file formats. PHG provides solvers and preconditioners, as well as interfaces to
many external packages, for solving linear systems of equations and eigenvalue problems
resulted from adaptive finite element discretization.
This work is divided into two parts. The first part consists of design and realization
of the dynamic load balancing module of PHG, including studies on mesh partitioning
and data migration algorithms. The second part studies hp adaptive strategies for finite
element computations.
The main results of this work are as follows.
(1) For the tetrahedral meshes used in PHG, under reasonable assumptions, we proved
the existence of through-vertex Hamiltonian paths between arbitrary two vertices,
as well as the existence of through-vertex Hamiltonian cycles, and designed an
efficient algorithm with linear complexity for constructing through-vertex Hamiltonian paths. The resulting algorithm has been implemented in PHG, and is used
for ordering elements in the coarsest mesh for the refinement tree mesh partitioning
algorithm.
(2) We designed encoding and decoding algorithms for high dimensional Hilbert order. Hilbert order has good locality, and it has wide applications in various fields
in computer science, such as memory management, database, and dynamic load
balancing. We analysed existing algorithms for computing 2D and 3D Hilbert order, and designed improved algorithms for computing Hilbert order in arbitrary
iii
学位论文
iv
space dimensions. We also proposed an alternate form of Hilbert space filling curve
which has the advantage of preserving the ordering between different levels. The
algorithms have been implemented in PHG and are used in mesh partitioning.
(3) We implemented refinement tree and space filling curve based mesh partitioning
algorithms in PHG, and designed the dynamic load balancing module of PHG. The
refinement tree based partitioning algorithm was originally proposed by Mitchell,
the one implemented in PHG was improved in several aspects. The space filling
curve based mesh partitioning function in PHG can use either Hilbert or Morton
space filling curve. We also implemented a submesh to process mapping algorithm
from the PLUM package in PHG, and use it to reduce the amount of data migration
during mesh redistribution. Numerical experiments show that the dynamic load
balancing functions work well on thousands of processes with more than one billion
elements, and the space filling curve based mesh partitioning module of PHG is
faster and yields better results than the corresponding function in other well known
mesh partitioning packages.
(4) We studied existing hp adaptive strategies in the literature, and proposed a new
strategy. Numerical experiments show that our new strategy achieves exponential
convergence, and is superior, in both precision of the solutions and computation
time, to the strategy compared. This part of the work also serves to validate the
hp adaptivity module of PHG.
Keywords: PHG, adaptive finite element method, parallel computing, Hamiltonian path, Hilbert order, dynamic load balancing, hp adaptive strategy
目
摘
录
要
第一章
§1.1
§1.2
§1.3
§1.4
§1.5
第二章
§2.1
§2.2
§2.3
§2.4
§2.5
第三章
§3.1
§3.2
§3.3
§3.4
§3.5
§3.6
第四章
§4.1
i
引言
自适应有限元方法 . . . . . . . . .
动态负载平衡 . . . . . . . . . . . .
并行自适应有限元软件平台 PHG
论文主要工作 . . . . . . . . . . . .
论文内容安排 . . . . . . . . . . . .
哈密尔顿路和哈密尔顿圈
协调四面体网格 . . . . . .
哈密尔顿路与哈密尔顿圈 .
存在性定理 . . . . . . . . .
§2.3.1 基本定义 . . . . . .
§2.3.2 存在性定理 . . . . .
算法及数值算例 . . . . . .
本章小结 . . . . . . . . . .
空间填充曲线
基础知识 . . . . . . . . . .
希尔伯特序 . . . . . . . . .
希尔伯特序编码解码算法 .
§3.3.1 预备知识 . . . . . .
§3.3.2 编码算法 . . . . . .
§3.3.3 解码算法 . . . . . .
希尔伯特曲线的新变体 . .
算法的具体化 . . . . . . . .
本章小结 . . . . . . . . . .
1
. . . . . . . . . . . . . . . . . . . .
1
. . . . . . . . . . . . . . . . . . . .
4
. . . . . . . . . . . . . . . . . . . .
5
. . . . . . . . . . . . . . . . . . . .
7
. . . . . . . . . . . . . . . . . . . .
8
9
. . . . . . . . . . . . . . . . . . . . . . . .
9
. . . . . . . . . . . . . . . . . . . . . . . .
10
. . . . . . . . . . . . . . . . . . . . . . . .
11
. . . . . . . . . . . . . . . . . . . . . . . .
11
. . . . . . . . . . . . . . . . . . . . . . . .
13
. . . . . . . . . . . . . . . . . . . . . . . .
15
. . . . . . . . . . . . . . . . . . . . . . . .
16
19
. . . . . . . . . . . . . . . . . . . . . . . .
19
. . . . . . . . . . . . . . . . . . . . . . . .
22
. . . . . . . . . . . . . . . . . . . . . . . .
25
. . . . . . . . . . . . . . . . . . . . . . . .
25
. . . . . . . . . . . . . . . . . . . . . . . .
28
. . . . . . . . . . . . . . . . . . . . . . . .
31
. . . . . . . . . . . . . . . . . . . . . . . .
33
. . . . . . . . . . . . . . . . . . . . . . . .
35
. . . . . . . . . . . . . . . . . . . . . . . .
36
PHG 动态负载平衡模块的设计与实现
39
PHG 的层次网格结构与动态负载平衡 . . . . . . . . . . . . . . . . .
39
§4.1.1 二分自适应网格加密、放粗与 PHG 的层次网格结构
§4.1.2 网格划分
. . . .
39
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
40
v
学位论文
vi
PHG 的分布式二叉树 . . . . . . . . . . . . . . . . . . . . . . .
43
§4.1.4 动态负载平衡 . . . . . . . . . . . . . . . . . . . . . . . . . . . .
44
§4.2.1 加密树划分方法 . . . . . . . . . . . . . . . . . . . . . . . . . .
46
§4.2.3 一维划分算法 . . . . . . . . . . . . . . . . . . . . . . . . . . . .
51
§4.2.5 划分质量度量 . . . . . . . . . . . . . . . . . . . . . . . . . . . .
54
§4.1.3
§4.2 网格划分方法 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
45
§4.2.2 空间填充曲线划分方法 . . . . . . . . . . . . . . . . . . . . . .
49
§4.2.4 子网格―进程映射 . . . . . . . . . . . . . . . . . . . . . . . . .
52
PHG 的动态负载平衡模块 . . . . . . . . . . . . . . . . . . . . . . . .
55
§4.3.1 动态负载平衡函数 . . . . . . . . . . . . . . . . . . . . . . . . .
55
§4.4 数值算例 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
55
§4.4.2 划分质量对自适应有限元计算性能的影响 . . . . . . . . . . .
57
§4.3
§4.3.2 网格划分和数据迁移 . . . . . . . . . . . . . . . . . . . . . . .
55
§4.4.1 划分质量比较 . . . . . . . . . . . . . . . . . . . . . . . . . . . .
56
§4.5 本章小结 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
68
第五章
hp 自适应策略设计
69
§5.1 基础知识 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
69
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
69
§5.1.2 有限元离散 . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
70
§5.2 hp 自适应有限元 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
75
§5.2.2 hp 自适应加密策略 . . . . . . . . . . . . . . . . . . . . . . . .
76
§5.3.1 hp 自适应策略 . . . . . . . . . . . . . . . . . . . . . . . . . . .
78
§5.5 本章小结 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
86
§5.1.1 模型问题
§5.1.3 自适应有限元 . . . . . . . . . . . . . . . . . . . . . . . . . . . .
71
§5.2.1 有限元解空间和变分形式 . . . . . . . . . . . . . . . . . . . . .
75
§5.3 一种新的 hp 自适应策略 . . . . . . . . . . . . . . . . . . . . . . . . .
78
§5.4 数值算例 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
82
第六章
总结与展望
参考文献
87
89
发表文章目录
105
致
107
谢
第一章
引言
偏微分方程出现在十八世纪, 由物理学家在求解实际问题时提出, 目前已广
泛应用到物理、化学、生物以及经济等领域. 由于存在复杂的初始条件、边界条
件等, 许多问题得不到解析解, 只可以用数值方法求出近似解, 常用方法有有限差
分方法、有限元方法、有限体积方法等. 它们先将问题离散, 然后使用计算机求
解. 随着科技的进步, 需要求解的问题规模越来越大, 对计算精度及运行时间的
要求越来越高. 正是这些因素的存在, 促使着人们发展更有效的数值方法、计算
机硬件和软件. 数值方法的发展和并行计算机软硬件的进步, 为我们求解挑战性
问题带来了机遇.
§1.1
自适应有限元方法
有限元方法是求解偏微分方程的一种数值方法, 此方法在 20 世纪 50 年代
初由工程师们提出, 并用于求解简单的结构问题. 有限元方法的原始思想来自
Courant, 他在 1943 年提出在三角形网格上用分片线性函数去逼近 Dirichlet 问
题. 有限元方法作为一种系统的数值方法, 并奠定数学基础, 则是在 60 年代中期,
由以冯康先生为代表的中国学者与西方学者独立并行地完成 [207].
有限元方法从物理问题出发, 利用变分原理, 整体地考虑物理问题, 得到方程
的变分表达式, 同时对物理问题的计算区域做剖分形成计算网格, 然后在剖分区
域 (单元) 上用简单函数去逼近原问题的解. 有限元方法将一个无穷维问题转化
成有限维问题, 通过求解这个问题, 得到近似解. 有限元方法的优点之一是能方
便地处理复杂区域.
来源于实际问题的偏微分方程往往存在局部奇性, 采用传统有限元方法求解
时, 在解有奇性的区域需要使用非常细的网格才能保证有限元解的精度. 传统有
限元由于使用一致网格, 会导致网格规模非常大. 而解光滑的区域并不需要这么
细的网格, 从而会浪费计算资源. 更有效的做法是仅加密解有奇性的区域. 这是
自适应有限元方法思想的由来.
自适应有限元方法根据解的性质动态地调整网格/基函数. 对自适应有限元
方法 [199], 要解决的问题是如何确定有奇性的区域以及如何对数值解给出一个可
信的误差估计. 标准的先验误差估计只能给出数值解的渐近误差行为, 并且需要
知道解的正则性, 而解的正则性往往是不知道的. 自适应有限元方法需要从数值
解及已知的数据导出误差估计 – 后验误差估计, 并且后验误差估计的计算代价需
要远小于数值解求解的代价. 此外, 误差估计需要是局部的, 并且是真实误差的
1
学位论文
2
上下界, 其中上界表明解的精度是可信的, 小于事先给定的误差, 下界表明误差估
计是精确的, 网格/基函数将在需要调整的地方被调整. 自适应过程是一个计算数
值解、计算误差、调整网格/基函数、重新计算的迭代过程, 具体步骤如图 1.1 所
示 [204]. 常用的自适应方法有: h 自适应方法, p 自适应方法, hp 自适应方法以及
r 自适应方法.
图 1.1 自适应有限元流程图
为了能让自适应流程 1.1 高效运行, 需要有正确的离散方法、求解器、误差
指示子、网格标记策略和合适的加密策略, 同时也要选取适当的参数. 误差指示
子是自适应有限元方法的关键之一, 常用的误差指示子主要有: 残量型误差指示
第一章 引言
3
子, 对偶权重残量误差指示子, 多重基误差指示子, 平均化方法以及平衡残量误差
指示子等.
在给定误差指示子的情况下, 如何选取单元进行加密/放粗同样会影响自适
应有限元的收敛性和效率. 常用的单元标记策略主要有最大误差策略 (max stratedy), 误差等分布策略 (equidistribution stratedy), 保证误差下降策略 (guaranteed
error reduction strategy) [39], MNS (MNS-refinement strategy) 策略 [40] 等. 后面章
节将对标记策略做详细的介绍.
自适应有限元方法另一个关键模块是网格单元类型及加密策略的选取. 二维
区域常选取四边形或者三角形作为基本单元. 四边形网格常采取正则加密, 加密
部分单元会导致悬点的出现, 否则只能进行一致加密. 当执行这种加密时, 在一条
边上可能会出现多个悬点, 这会对有限元空间及程序的数据结构有很多的限制.
为了克服这个问题, 开发人员常采用 Bank[41, 42] 设计的一悬点 (1-irregular) 和三
邻居 (three-neighbors) 原则. 一悬点原则限制每条边上的悬点最多只有一个, 如果
某条边由于邻居单元的加密引入新的悬点, 则该单元需要被加密以保证一悬点原
则. 三邻居原则指出如果四边形的三条边都有悬点, 则该单元需要被加密. 对三角
形单元, 常用的加密算法有正则加密和二分加密 [43]. 正则加密 [44] 是连接三角
形的三个中点, 将一个三角形单元加密成四个子单元, 对于出现的悬点, 则是对
邻居使用一个临时的二分加密以保证协调性. 二分加密是连接顶点和顶点对应的
边, 将一个三角形加密成两个子单元. 二分加密算法有最长边二分加密 [45, 46, 47]
和最新顶点二分加密 [48]. 由 Rivara 提出的最长边二分加密算法是将最长边作为
加密边, 将其中点与相对的顶点相连, 把单元分成两个子单元. 由 Sewell 提出的
最新顶点加密算法是将三角形中最新产生的顶点作为加密顶点, 连接对应边的中
点, 将三角形加密成两个子单元.
三维网格常选取四面体或者六面体作为单元. 六面体的自适应要复杂一些,
有的算法基于八叉树, 即将一个六面体剖分成八个子六面体, 由于会出现悬点, 接
着对邻居做临时的剖分, 将这些邻居单元剖分成金字塔和棱柱, 当临时单元被标
记为加密单元时, 先把它们恢复成六面体, 然后剖分 [49]. 有的做法是定义加密模
板, 当某个单元被标记为加密单元时, 为该单元及邻居选择合适的模板, 生成一个
没有悬点的六面体网格 [50]. 六面体网格的自适应是很复杂的, 程序的运行时间
也较长, 而四面体网格的自适应则要方便得多. 四面体常采用二分加密算法, 和
三角形一样, 可采用最长边加密和最新顶点加密. 四面体二分加密时选取一条边
作为加密边将其一分为二, 产生两个子单元. 最长边二分加密算法由 Rivara 提出
[45, 46, 47]. 最新顶点二分加密算法首先由 Sewell 针对二维区域提出 [48], 然后由
Bänsch 扩展到三维区域 [51]. 最新的进展可以参考 Kossaczky[52], Liu 和 Joe [54],
学位论文
4
及 Arnold [53] 等人的文章.
在网格二分加密的并行算法方面, 许多科研人员做出了有意义的工作. Rivara
等人 [55] 为四面体网格的全局加密设计了并行算法, 但不适合局部加密. Pébay 和
Thompson [57] 对基于边分割的四面体网格设计了并行算法. Jones 和 Plassmann
[43] 为三角形网格设计了并行局部自适应加密算法. Barry、Jones 及 Plassmann
[56] 同时给出了一个实现并行自适应有限元程序的框架. Castãnos 和 Savage [58]
为四面体网格设计了一种并行局部自适应加密算法, 并且应用在软件包 Pared 中.
最近, 张 [1] 为四面体最新顶点二分加密策略设计了并行算法, 并且应用在并行自
适应有限元软件平台 PHG (Parallel Hierarchical Grid) [59] 中.
§1.2
动态负载平衡
偏微分方程的并行数值求解的关键因素之一是处理好进程间的数据分布. 数
据分布指根据进程数对数据进行划分, 将数据分布存储在各进程中. 计算过程中
数据分布保持不变的程序, 如传统有限元程序, 在整个计算过程中仅需在开始做
一次静态划分. 然而对自适应有限元程序, 由于每个进程的负载是在不断地变化
的, 并且这个变化是不可以或很难预测的. 这种情况下, 就需要动态地调整数据分
布以保持负载平衡. 好的数据划分方法既要使得每个进程拥有相同的计算负载,
又要减少进程间的通信.
并行自适应有限元计算中最常用的数据划分方法是划分计算网格, 每个进程
负责一个子网格上的计算, 为保证可扩展性, 每个进程仅存储该子网格及定义在
其上的数据, 不在本地的数据在需要时通过进程间通信获得. 这种计算模型包含
三个模块: 数据划分、维护本地数据结构以方便计算和进程间通信、在需要的时
候进行通信. 在自适应有限元程序中, 工作负载是与网格的单元、面、边及顶点
相关的. 数据划分问题就是将这些对象划分到不同的进程中, 使每个进程拥有尽
可能相同数目的对象. 在有限元计算中, 以单元划分数据是最常用的. 然而每个
单元的负载可能并不相同, 例如在不同的单元上求解不同的物理问题或者像在 p
自适应有限元中每个单元的自由度数可能并不相同, 可以给每个单元一个权重以
表示计算负载. 数据划分的目标就是使得每个进程拥有相同的权重, 同时使得有
限元计算中的通信量最小.
在计算过程中根据各进程中负载的变化调整数据的划分以保持负载平衡称
为动态负载平衡. 并行自适应有限元计算中, 由于各进程的负载不断变化, 动态
负载平衡是必需的. 动态负载平衡中的数据划分算法需满足一些条件: 1) 能在分
布式的数据上并行执行; 2) 执行速度快, 因为它们是纯开销, 并且可能被频繁地
第一章 引言
5
调用; 3) 最好是增量的, 即网格微小的变化仅导致划分的微小变化; 4) 内存使用
是适度的; 5) 容易使用.
对粒子模拟, 粒子间的作用是由距离决定的, 通常距离近的相互影响较大, 按
照距离划分数据会降低通信量. 而对于基于网格的计算, 如有限元、有限体积等
方法, 通信一般发生在邻居之间, 邻接关系决定了通信模式. 动态负载平衡中的
数据划分算法也分为两类: 基于几何性质的算法和基于图的算法. 基于几何性质
的算法利用对象的几何信息, 如坐标信息, 主要算法有递归坐标二分算法 (RCB,
Recursive Coordinate Bisection) [60] 、递归惯量二分算法 (RIB, Recursive Inertial
Bisection) [61]、空间填充曲线算法 (SFC, Space-Filling Curve) [62] 等; 基于图的算
法利用对象的拓扑关系, 如邻居关系或者顶点边的连接信息等, 主要方法有递归
图二分算法 (RGB, Recursive Graph Bisection) [60]、贪婪算法 [63]、递归谱二分方
法 (RSB, Recursive Spectral Bisection) [60]、K-L 方法 (Keinighnan-Lin Algorithm)
[64] 等. 著名的网格划分软件包有: ParMETIS[14], Zoltan[19], JOSTLE[65] 等.
§1.3
并行自适应有限元软件平台 PHG
PHG (Parallel Hierarchical Grid) 是一个并行自适应有限元软件包, 由科学与
工程计算国家重点实验室研制. 该软件包主要用 C 语言开发 (部分使用 C++), 底
层的通信由 MPI 完成, 面向分布式存储并行机, 具有很强的可移植性. PHG 对用
户隐藏了通信接口, 无需用户干预通信, 顶层代码和串行代码一样. PHG 提供了
一个可扩展的并行自适应有限元程序框架, 它提供了网格输入、网格划分、网格
加密/放粗、自由度操作、线性系统组装和求解、特征值求解、可视化、性能统计
等功能. PHG 采取了面向对象的设计, 方便用户添加新的功能. 下面简要介绍一
下 PHG 的功能及特点:
(1) 网格对象. PHG 目前处理的网格对象为协调四面体网格, 输入文件可以为 ALBERTA [66], MEDIT [67], GAMBIT [68] 等格式, 可以处理周期网格及镜像网
格. PHG 提供了丰富的边界类型及边界管理函数, 可以满足各种常规的需求.
网格局部自适应采用最新顶点二分加密算法 [1], 网格的加密/放粗层次结构
被保留, 并分布在不同的进程中. 在周期网格中, PHG 自动维护网格的周期
性.
(2) 动态负载平衡. PHG 提供动态负载平衡功能, 提供了加密树划分方法 [84]、空
间填充曲线划分方法 [62] 等网格划分方法. PHG 同时提供了接口以调用外
部函数库, 如 Zoltan, ParMETIS 等, 方便用户根据需要选取不同的算法.
学位论文
6
(3) 自由度管理. 自由度对象是 PHG 的基本数据结构之一, 用于描述和处理分布
在网格上的各种数据. 它可以用于定义有限元函数、空间, 也可以用于存储、
处理任何其他分布在网格上的数据, 如几何信息等. PHG 提供了自由度的创
建、插值、赋值、复制、基本算术运算等操作, 同时提供了有限元函数的微积
分运算. PHG 还提供了一些特殊类型的自由度, 如常量自由度、解析自由度、
几何量自由度等. PHG 提供了统一的创建自由度的模板用来创建各种自由
度.
(4) 数值积分. 为方便有限元计算 PHG 提供了三角形和四面体上任意阶的数值
积分公式 [69], 这些积分公式的权重都是非负的, 并且所有的积分点均不在单
元外部. PHG 提供了基函数缓存机制, 极大减少重复计算, 加快积分过程.
(5) 向量和稀疏矩阵管理. PHG 提供了一组函数用于管理连续分块存储的分布
式向量, 以及基于行划分、行压缩存储的分布式稀疏矩阵. 向量和矩阵的分
布通过映射进行描述与管理. 这些模块的提供, 使得线性系统可以独立于网
格而存在, 亦使得 PHG 可以独立作为线性方程组解法器使用.
(6) 线性解法器. PHG 提供了一套统一的接口用于求解线性方程组. PHG 本身
实现了一些解法器, 如 PCG, GMRES 等, 和一些预条件子. PHG 同时提供了
丰富的接口, 以供用户调用外部解法器软件包, 如 PETSc, HYPRE, SuperLU,
MUMPS, SPC, LASPack, SPOOLES 等. PHG 定义了线性解法器对象 SOLVER,
用户可以通过该对象方便地定义、操作线性方程组的未知量、系数矩阵和右
端项. PHG 定义的解法器对象独立于特定的方法, 方便用户按照自己的需要
添加解法器及预条件子.
(7) 特征值解法器. PHG 目前没有实现自己的特征值求解器, 但提供了与 PARPACK,
JDBSYM, LOBPCG, SLEPc, Trilinos/Anasazi 和 PRIMME 等软件包的接口, 用
于计算广义特征值和特征向量. 特征值、特征向量的计算采用统一接口, 可
在运行程序时通过命令行选项选择任何一个可用的特征值求解器.
(8) 可视化. PHG 目前实现了 OpenDX[70] 以及 VTK[71] 等格式可视化文件的输
出, 可以输出自由度数据及网格数据.
(9) 参数控制. PHG 提供了灵活的命令行选项管理机制用于控制程序中的参数.
PHG 的选项按照目录分类, 可读性很强.
(10) 性能统计. PHG 提供了获取程序运行时浮点性能及内存使用的函数, 方便用
户获取程序的实际性能.
第一章 引言
7
PHG 同时提供了内存管理、信息输出、输入等功能, 其中信息输出按照用户
指定的输出等级, 满足不同的调试要求. 完整的 PHG 功能以及具体的函数接口
在这里不再一一介绍, 用户可以在 PHG 网站 [59] 中获得.
§1.4
论文主要工作
本论文的工作是围绕 PHG 平台开展的, 主要包括两部分内容. 第一部分内容
涉及网格划分和动态负载平衡算法, 论文中研究了哈密尔顿路、希尔伯特序、网
格划分算法等, 并在此基础上设计和实现了 PHG 的动态负载平衡模块. 第二部
分内容涉及 hp 自适应策略的研究, 论文针对二分加密网格设计了 hp 自适应策
略, 并与已有策略进行了比较. 论文所完成的主要工作具体如下:
(1) 证明了过顶点哈密尔顿路和哈密尔顿圈的存在性并设计实现了线性复杂度的
算法. 针对 PHG 所处理的协调四面体网格, 本文在网格的对偶图连通的条件
下证明了过顶点哈密尔顿圈和任意两个单元之间的过顶点哈密尔顿路的存在
性, 并在此基础上设计了线性复杂度的四面体网格上过顶点哈密尔顿圈和过
顶点哈密尔顿路的构造算法. 文中还对相应并行算法的构造进行了探讨. 本
文在 PHG 平台中实现了该算法, 并将其应用于加密树网格划分方法中初始
网格单元的排序. 将来如果需要, 该算法亦可作为单元排序方法直接应用于
网格划分中.
(2) 设计了任意维空间中具有线性复杂度的希尔伯特序的编码解码算法并提出了
希尔伯特空间填充曲线的一种变体. 希尔伯特序具有良好的空间局部性, 广
泛应用于内存管理、数据库索引、动态负载平衡等领域. 本文总结、分析了文
献中已有的生成二维和三维空间希尔伯特序的算法, 设计了任意维空间中具
有线性复杂度的希尔伯特序编码、解码高效算法, 同时并对算法进行了改进,
设计了复杂度更低的算法, 降低了计算量. 文中还给出了希尔伯特空间填充
曲线的一个变体, 它可保证曲线的编码顺序不随曲线阶数的改变而变化. 本
文在 PHG 平台中实现了二维及三维算法, 并成功将其应用于网格划分中.
(3) 设计实现了加密树及空间填充曲线划分方法并设计了 PHG 的动态负载平衡
模块. 加密树划分方法最初由 Mitchell 提出, 本文在实现该算法的同时亦对
算法进行了改进, 降低了算法的计算复杂度, 提高了算法实现的效率. 同时实
现了空间填充曲线划分框架, 可以使用希尔伯特空间填充曲线或 Morton 空
间填充曲线, 并实现并改进了 Zoltan 中的一个一维划分算法用于对排序后的
单元进行一维划分. 此外, 本文还实现了 PLUM 中设计的子网格 – 进程映射
学位论文
8
算法, 用于减少动态负载平衡中的数据迁移量. 数值实验表明, 本文在 PHG
中所实现的空间填充曲线划分算法不论在划分时间还是划分质量上均优于其
它一些软件包 (其中包括由美国 Sandia 国家实验室开发的著名的网格划分和
数据迁移软件包 Zoltan) 中所提供的相应算法. 本文所实现的基于希尔伯特
序的网格划分算法已经成为 PHG 中默认的网格划分方法, 经受了一些并行
规模达数千子网格、计算规模超过十亿单元的大型应用的考验, 表现出很高
的效率和很强的稳健性.
(4) 设计了一个基于误差下降预测的 hp 自适应策略. 当前, hp 自适应有限元算法
研究中的一个难点是自适应策略的设计, 目前尚没有成熟的、已被广泛接受
的算法. 本文对 hp 自适应策略进行了研究,在前人提出的几种基于误差下
降预测的 hp 自适应策略的基础上给出了一个新的 hp 自适应加密策略, 该策
略适用于二维三角形、四边形和三维四面体、六面体等不同类型的单元, 适
用于正则加密、二分加密等不同自适应加密方式. 数值实验表明, 该策略可
以达到最优的误差指数下降, 并在数值解的精度和计算效率上优于文献中的
一些策略. 这部分工作的另外一个目的是验证 PHG 的 hp 自适应模块的正确
性和适用性.
§1.5
论文内容安排
论文分为六章. 第一章为引言, 本章对自适应有限元及并行自适应有限元软
件平台 PHG 进行简要介绍. 第二、三、四章研究动态负载平衡方法, 其中第二章
研究哈密尔顿路和哈密尔顿圈. 第三章研究希尔伯特序的编码解码算法. 第四章
介绍 PHG 的动态负载平衡及数据迁移算法. 第五章研究 hp 自适应策略. 最后一
章给出总结及未来工作.
第二章
哈密尔顿路和哈密尔顿圈
在三维自适应有限元计算中, 协调四面体网格是最常用的网格类型之一. 四
面体单元适合非结构网格, 适合处理复杂边界, 其数据结构也简单. 在并行自适
应有限元计算中, 一种常用的网格划分方法是先将网格线性化, 即将单元进行排
序, 接着根据进程数将单元按照线性化后的顺序分成几段, 每一段映射给不同的
进程. 哈密尔顿路是常用的单元排序方法之一. 本章研究 PHG 中的非结构协调
四面体网格上哈密尔顿路的基本性质及构造方法. 目前在 PHG 中, 哈密尔顿路
被用于 RTK 网格划分方法 (加密树划分方法) 中初始单元顺序的确定,将来如果
需要亦可将它直接用于网格划分。
§2.1
协调四面体网格
本章中, 单元是一个四面体, 它被看作 R3 中的闭区域. 一个四面体有四个顶
点、六条边和四个三角形面, 如图 2.1 所示. 本章中涉及到的四面体都是非退化
的, 即四个顶点不在一个平面上.
图 2.1 四面体单元
定义 2.1.1. 令 Ω 为 R3 中一个连通的开区域, 一个四面体网格 M 是四面体单元
o
o
o
的集合, 记作 {Ti }, 这些单元满足如下条件: Ω = ∪Ti , Ti ∩ Tj = ∅ (i 6= j), 其中 T
表示单元 T 的内部, ∅ 为空集.
一个顶点如果位于区域 Ω 的边界上, 则被称作边界点, 否则是内部点. |M|
表示网格 M 的单元数目. 两个单元 Ti 和 Tj (i 6= j) 如果有一个公共面, 则它们
9
学位论文
10
被称为邻居.
定义 2.1.2. 网格 M 被称为协调的, 如果对 M 中任意两个不同的单元 Ti 和 Tj ,
Ti ∩ Tj 是一个顶点、一条边、一个面或者空集.
协调四面体网格的生成方法主要有八叉树方法 [76, 77]、Delaunay 方法 [78, 79]
等, 常用的四面体网格生成软件有 Gmsh [80]、Netgen [81]、TetGen [82] 等. 协调四
面体网格局部自适应加密算法主要有最长边二分加密算法 [45, 46, 47]、最新顶点
加密算法 [1, 48, 51, 53, 52, 54] 等, 其质量度量标准主要有最小 – 最大立体角、最
小平面角、半径比、边长比等.
§2.2
哈密尔顿路与哈密尔顿圈
自适应有限元方法根据数值解调整计算网格/基函数. 在分布式存储并行计
算机中, 自适应会导致负载不平衡, 网格划分对并行程序而言是一个重要的模块.
它被用来对网格进行初始划分, 并且当网格变化时, 对网格进行重划分, 以保证并
行程序在计算过程中有均衡的负载. 一类重要的网格划分方法是: 先把网格单元
排序, 形成一个一维的列表, 然后把这个列表划分成段, 每段具有相等的权重. 哈
密尔顿路 (Hamiltonian path) 是这类方法中的排序方法之一 [62, 125, 129].
哈密尔顿路是图论中的概念, 它是一条通过所有结点的路, 且每个结点仅通
过一次. 在四面体网格中, 哈密尔顿路被定义成一个单元序列, 每个单元仅出现
一次. Heber 等人 [85] 对二维三角形单元网格证明了哈密尔顿路的存在性, 其中
哈密尔顿路通过一个顶点或者一条边进入下一个单元, 同样通过一个顶点或者一
条边离开一个单元, 定理的证明需要如下条件: 三角形网格是协调的并且不能存
在局部割点 (local cut vertex) [83]. Mitchell [83] 针对二维及三维空间研究了三角
形、四边形、四面体、六面体网格的哈密尔顿路和哈密尔顿圈的存在性. 对于
四面体网格, 由于仅通过面的哈密尔顿路不一定存在, 因此 Mitchell 的文章中引
入了过顶点哈密尔顿路 (through-vertex Hamiltonian path) 以及过顶点哈密尔顿圈
(through-vertex Hamiltonian cycle) 的概念. Mitchell 证明了: 如果协调四面体网格
没有局部割点和局部割边, 那么过顶点哈密尔顿路和哈密尔顿圈存在. 证明是构
造性的, 可以直接得到构造算法.
本文将在一个假设下, 即网格的对偶图连通, 证明过顶点哈密尔顿路和哈密
尔顿圈的存在性. 证明同样是构造性的, 可以直接导出线性复杂度的算法.
第二章 哈密尔顿路和哈密尔顿圈
11
存在性定理
§2.3
本节将研究四面体网格上过顶点哈密尔顿路和哈密尔顿圈的存在性, 内容分
为两部分, 第一部分先给出基本定义, 介绍一些记号和概念; 第二部分给出存在性
定理.
§2.3.1
基本定义
为了叙述的方便, 在这里将介绍所用到的概念及记号, 其中部分概念来源于
Mitchell 的文章 [83].
定义 2.3.1. 协调四面体网格 M 的对偶图定义为一个无向图, 在这个图中, 网格
M 中每一个单元对应图中的一个顶点, M 中的两个邻居单元则对应图中的一条
边.
定义 2.3.2. 在一个图中, 如果任意两个顶点之间存在一条通路, 则称图是连通的.
定义 2.3.3. 在协调四面体网格 M 中, 一条长度为 n 的路 (path), 是一个单元序
列, 记作 T1 T2 . . . Tn , Ti ∈ M, i = 1, . . . , n, 其中 Ti ∩ Ti+1 6= ∅, 并且 Ti 6= Ti+1 ,
i = 1, n − 1.
定义 2.3.4. 在协调四面体网格 M 中, 一个长度为 n 的圈 (cycle), 是一条长度为
n + 1 的路, 其中 T1 = Tn+1 .
定义 2.3.5. 协调四面体网格 M 上的一条哈密尔顿路 (Hamiltonian path) 是一条
路, 其中网格 M 的每个单元正好出现一次.
定义 2.3.6. 协调四面体网格 M 上的一条部分哈密尔顿路 (partial Hamiltonian
path) 是一条路, 其中每个单元至多出现一次.
定义 2.3.7. 协调四面体网格 M 上的一个哈密尔顿圈 (Hamiltonian cycle) 是一个
圈, 其中网格 M 的每个单元正好出现一次.
定义 2.3.8. 一条过顶点路 (through-vertex path) 是一条路, 其中总是通过顶点进
入或离开一个单元, 并且对同一个单元, 进入或者离开此单元的顶点不是同一个.
在上述定义下, 可以引申出过顶点哈密尔顿路.
定义 2.3.9. 一条(部分) 过顶点哈密尔顿路 (through-vertex Hamiltonian path) 是
一条过顶点路, 并且是一条(部分) 哈密尔顿路.
学位论文
12
过顶点哈密尔顿路可以表示为 H = T1 v1 T2 · · · vn−1 Tn , 其中 Ti 6= Tj (i 6= j) 且
vi 6= vi+1 (1 ≤ i ≤ n − 2), vi 表示连接 Ti 和 Ti+1 的顶点. 过顶点哈密尔顿圈可以
类似表示.
令 M 为区域 Ω 上的一个网格, v 为 M 中的一个顶点, 如果 Ω\v 是非连通的,
则称 v 为 M 中的一个割点. 如果 v 满足如下条件: ∃R > 0 使得 ∀ r (0 < r ≤ R),
(B(v, r) ∩ Ω) \ v 是非连通的, 则称 v 为 M 的局部割点 [83], 其中 B(v, r) 表示以 v
中心的半径为 r 的球. 割点和局部割点如图 2.2 和 2.3 所示. 图 2.2 中顶点 v 是
割点, 图 2.3 中顶点 v 是局部割点. 为了简便, 我们使用了二维图形. 类似的, 可
以定义割边及局部割边.
v
图 2.2 含有割点 v 的网格
图 2.3 含有局部割点 v 的网格
从定义可以很容易看出, 对偶图连通的四面体网格是没有割点的, 但可能会
有局部割点. 没有割点及局部割点的四面体网格由于可能存在割边或者局部割
第二章 哈密尔顿路和哈密尔顿圈
13
边, 对偶图亦不一定连通.
§2.3.2
存在性定理
对协调四面体网格, 本节将证明过顶点哈密尔顿路和哈密尔顿圈的存在性.
本节先给出三个引理, 它们将在后面的证明过程中被用到. 第一个引理给出邻居
间共享顶点的个数. 它是我们构造和扩充哈密尔顿路的基础.
引理 2.1. 假设网格 M 是协调四面体网格, 其对偶图是连通的并且 |M| ≥ 2, 则
有如下结论成立:
(1) 若 M1 和 M2 是 M 的非空子集, 且 M1 ∩ M2 = ∅, M1 ∪ M2 = M, 则存在
单元 T1 ∈ M1 及 T2 ∈ M2 , 使得它们的交集 T1 ∩ T2 是一个公共面, 即它们是
邻居.
(2) 如果 T , T1 和 T2 是 M 中不同的单元, 并且 T1 和 T2 均是 T 的邻居, 则这三
个单元拥有两个公共顶点.
(3) 如果 T , T1 , T2 和 T3 是 M 中不同的单元, 并且 T1 , T2 和 T3 均是 T 的邻居,
则这四个单元拥有一个公共顶点.
证明. 结论 (1) 是对偶图连通的直接推论.
结论 (2): 因为单元 T1 和 T2 都是 T 的邻居, 它们中的每一个都分别和 T 共
享一个面, 并且很容易验证这两个面共享一条边, 所以 T1 , T2 及 T 三个单元共享
一条边, 拥有两个相同的顶点, 结论成立.
结论 (3): 因为 T1 , T2 和 T3 都是 T 的邻居, 它们中的每一个都和 T 共享一
个面, 在四面体中, 任意三个面共享一个顶点, 结论成立.
引理 2.2. 若协调四面体网格 M 的对偶图是连通的, H = T1 v1 T2 v2 · · · Tk−1 vk−1 Tk
(k ≥ 2) 为 M 的一个部分过顶点哈密尔顿路. 那么,
(1) 如果 T1 和 T2 是邻居, 那么 T1 的任何不属于 H 的邻居可以插入到 H 中, 并
且位于 T1 和 T2 之间.
(2) 如果 Tk−1 和 Tk 是邻居, 那么 Tk 的任何不属于 H 的邻居可以插入到 H 中,
并且位于 Tk−1 和 Tk 之间.
证明. 由于两个结论是相似的, 仅给出结论 (1) 的证明过程.
令 T 为 T1 的不属于 H 的邻居. 根据引理 2.1 可知, T1 , T2 和 T 有两个共同
的顶点, 记作 u1 、u2 .
学位论文
14
如果 H 仅包含 T1 和 T2 , 即 k = 2, 那么 T 可以按照如下的方式插入到 H 中:
H = T1 u1 T u 2 T2 .
现在假设 k > 2. 如果 v1 ∈ {u1 , u2 }, 不失一般性, 假设 v1 = u2 , 那么 T 可以
按照如下方式插入到 H 中: H = T1 u1 T v1 T2 v2 · · · Tk . 如果 v1 ∈
/ {u1 , u2 }, 那么 u1
和 u2 中必定有一个顶点和 v2 是不同的, 记作 u1 , 在这种情况下 T 可以按照如下
方式插入到 H 中: H = T1 v1 T u1 T2 v2 · · · Tk . 重复这个过程, T1 的任意一个邻居都
可以插入到 T1 和 T2 之间.
由第二个引理可以知道, 如果创建合适的初始路, 那么我们可以保持该哈密
尔顿路的头部和尾部不变, 把它们所有的邻居单元插入到这两个单元之间. 接下
来介绍第三个引理. 这个引理指出, 如果某个部分过顶点哈密尔顿路没有包含所
有的单元, 则可以通过插入新的单元来扩展这条路, 直至包含所有的单元.
引理 2.3. 若协调四面体网格 M 的对偶图是连通的, H = T1 v1 · · · vn−1 Tn 是 M
中一条非空的部分过顶点哈密尔顿路, 它包含了 T1 及 Tn 的所有邻居. 令 M1 =
{T1 , · · · , Tn }, 如果 M1 6= M, 则 H 可以通过插入新单元来扩展, 并且插入的单元
位于 T1 和 Tn 之间.
证明. 记 M2 = M\M1 . 如果 M2 是非空的, 根据引理 2.1, 存在 T ∈ M2 及
Ti ∈ M1 (1 < i < n) , 使得 T 和 Ti 是邻居.
由于 Ti 有四个顶点, 那么 Ti 和 T 共有的三个顶点之一必定是 Ti 的入口顶点
vi−1 或者出口顶点 vi , 不失一般性, 假定它是 vi (否则的话, 可以反转 H, 在完成插
入之后, 再重新反转), 并且 Ti 和 T 的三个共有顶点之一必定不是 vi−1 或者 vi , 记
作 v. 那么新的部分过顶点哈密尔顿路可以构造为: H = T1 v1 . . . Ti vT vi Ti+1 . . . Tn .
定理得证.
注记: 引理 2.3 的一个条件: 部分过顶点哈密尔顿路包含 T1 及 Tn 的全部邻居是
必需的. 反例, 假定 H = T1 vTn , 其中 T1 和 T2 仅共享一个顶点 v, 如果 T1 有不含
有顶点 v 的邻居 T , 那么不可能将 T 插入到 T1 和 Tn 之间.
定理 2.4. 假设协调四面体网格 M 的对偶图是连通的, 且 |M| ≥ 2. 对网格 M
中任意两个单元 T1 和 Tn , T1 6= Tn , 存在一条 T1 到 Tn 的过顶点哈密尔顿路.
证明. 由于 M 的对偶图是连通的, 可以在网格 M 中找到单元序列 T1 T2 · · · Tn ,
使得序列中任意两个相邻单元是邻居, 并且可以创建初始的过顶点哈密尔顿路
H = T1 v1 T2 v2 · · · vn−1 Tn (采用归纳法, 假设已经创建 H = T1 v1 · · · Ti−1 vi−1 Ti . 对
第二章 哈密尔顿路和哈密尔顿圈
15
单元 Ti+1 , 它和 Ti 有三个公共顶点, 其中之一和 vi−1 是不同的, 记作 vi , 然后 H
可以扩展成 H = T1 v1 · · · Ti−1 vi−1 Ti vi Ti+1 . 重复这个过程, 便可构造出包含 T1 , · · · ,
Tn 的初始部分过顶点哈密尔顿路). 利用引理 2.2, 可以把 T1 和 Tn 的所有邻居插
入到 H 中, 并且全部位于 T1 和 Tn 之间. 接着利用引理 2.3, 可将所有剩余的单
元插入到 H 中. 证明完毕.
下面一个定理是定理 2.4 的直接推论, 它给出协调四面体网格中过顶点哈密
尔顿圈的存在性.
定理 2.5. 如果协调四面体网格 M 的对偶图是连通的, 并且 |M| ≥ 2, 那么在网
格 M 中存在过顶点哈密尔顿圈.
证明. 选取两个邻居单元 T1 和 Tn . 根据定理 2.4, 存在一个哈密尔顿路 H =
T1 v1 T2 v2 . . . vn−1 Tn . 由于 T1 和 Tn 是邻居, 它们有三个公共顶点, 其中一个是
和 v1 及 vn−1 不同的, 记作 vn . 那么可以按照如下方式创建哈密尔顿圈, H =
T1 v1 T2 v2 . . . vn−1 Tn vn T1 .
最后一个定理, 定理 2.6, 对于将来设计哈密尔顿路及哈密尔顿圈的并行算法
是有用的. 由于并行程序中网格是分布在不同进程中的, 这个定理指出, 每个进
程可以独立地创建自己的哈密尔顿路和哈密尔顿圈, 然后将这些部分哈密尔顿路
和哈密尔顿圈组合起来, 形成一个完整的哈密尔顿路和哈密尔顿圈.
定理 2.6. 若四面体网格 M 的对偶图是连通的, M1 ⊂ M 及 M2 ⊂ M 是网格
M 的子网格, 满足条件: |M1 | ≥ 1, M2 ≥ 1, M1 ∩ M2 = ∅ 及 M1 ∪ M2 = M. 如
果 M1 和 M2 的对偶图也是连通的, 那么可以分别对两个子网格构建哈密尔顿
路, 记作 H1 和 H2 , 使得 H = H1 vH2 是 M 的一个过顶点哈密尔顿路, 其中 v 是
M1 和 M2 的一个公共顶点.
证明. 由于 M 的对偶图是连通的, 根据引理 2.1, 存在 T1 ∈ M1 及 T2 ∈ M2
使得 T1 和 T2 是邻居. 由于两个子网格的对偶图均是连通的, 根据定理 2.4, 在
两个子网格中分别存在过顶点哈密尔顿路 H1 = T0 · · · v1 T1 及 H2 = T2 v2 · · · Tn .
因为 T1 和 T2 是邻居, 它们有三个公共顶点, 其中必然有一个顶点和顶点 v1 及
v2 是不同的, 记作 v, 从而 M 上的过顶点哈密尔顿路可以按照如下的方式创建
H = H1 vH2 = T0 · · · v1 T1 vT2 v2 · · · Tn .
§2.4
算法及数值算例
上一节中定理的证明是构造性的, 它们可以直接转化成构建过顶点哈密尔顿
学位论文
16
路和哈密尔顿圈的高效算法. 由证明过程也可以看出, 几个定理的证明是很相似
的, 算法同样也是类似的. 为简便起见, 本节仅给出构造过顶点哈密尔顿路的算
法. 由于证明本身是构造性的, 在此仅给出主要步骤, 具体细节可以在定理的证
明过程中得到. 算法共有三个步骤. 第一步是创建初始的哈密尔顿路; 第二步是
插入头部和尾部单元所有的邻居; 第三步是扩展哈密尔顿路使得这条路包含网格
所有的单元.
算法 1: 哈密尔顿路构造算法
假设 M 是一个协调四面体网格, 其对偶图是连通的, n = |M| ≥ 2. 对任意给定的四
面体 T1 和 Tn , 一个过顶点哈密尔顿路 H = T1 v1 T2 · · · vn−1 Tn 可以按如下三个步骤
构造:
Step 1. 创建一条初始路. 这条路中, 任意两个相邻的单元都有一个公共面. 具体的
创建办法见定理 2.4.
Step 2. 把 T1 和 Tn 的所有邻居插入到初始哈密尔顿路中. 具体做法参看引理 2.2
的证明.
Step 3. 将所有剩余的单元插入到哈密尔顿路中. 具体做法参看引理 2.3 的证明.
下面分析算法 1 的计算复杂度. 第一步是一个图论问题, 这个问题可以由宽
度优先搜索 (breadth fist search) 算法实现, 复杂度为 O(n), 其中 n 为网格的单元
数目. 由于每个单元的邻居是有限的, 被 O(n) 控制, 因此第二步插入邻居过程的
复杂度是 O(n). 在第三步时, 插入每个单元的代价是 O(1), 而剩余单元的数目是
有界的, 不超过 n, 因此第三步的计算复杂度是 O(n). 综合以上分析, 算法的计算
复杂度是 O(n).
我们在自适应有限元工具包 PHG (Parallel Hierarchical Grid) [1, 59] 中实现
了算法 1. 下面给出一些测试结果, 测试平台是一台 DELL PowerEdge 2950 服务
器 (2 个四核 1.60GHz Intel E5310 CPU, 4MB 二级缓存). 我们选取了五组不同的
网格, 单元数目从十多万到几百万不等. 这些网格均由 J. Schöberl 开发的网格生
成软件 NETGEN [81] 生成. 表 2.1 给出了程序的计算时间统计, 可以看出即使单
元数达到三百万的规模, 用于生成过顶点哈密尔顿路的时间仍然少于四秒. 同时,
程序的运行时间是与网格规模成比例增长的, 表明算法的计算复杂度是线性的.
§2.5
本章小结
本章证明了协调四面体网格上过顶点哈密尔顿路和哈密尔顿圈在一定条件
下的存在性, 并实现了线性复杂度的算法, 该算法可用于网格划分中单元的排序.
第二章 哈密尔顿路和哈密尔顿圈
17
表 2.1 程序运行时间
单元数
面数
顶点数
时间 (seconds)
单元/秒
Mesh 1
155,456
323,264
32,238
0.127770
1,216,686
Mesh 2
239,616
480,704
40,781
0.240720
995,413
Mesh 3
453,736
923,336
85,338
0.515140
880,801
Mesh 4
1,243,648
2,536,704
232,288
1.265506
982,727
Mesh 5
3,211,264
6,498,304
573,628
3.736147
859,512
18
学位论文
第三章
空间填充曲线
空间填充曲线提供了一类有效的网格划分方法. 这类曲线出现于 19 世纪, 由
于其特殊的性质一直吸引数学家进行研究, 研究主要集中在空间填充曲线的数学
性质上, 如连续性、可微性等. 空间填充曲线具有良好的空间局部性, 近几十年,
人们将其广泛应用在内存管理、数据库索引、动态负载平衡、图像处理等领域, 在
空间填充曲线的算法研究方面取得了长足的进步. 本章对高维希尔伯特空间填充
曲线的编码解码算法进行研究.
§3.1
基础知识
George Cantor 在 1878 年指出任意两个有限维光滑流形具有相同的势 [86].
该结果暗示从单位区间 [0, 1] 到单位正方形区域 [0, 1]2 存在双射. 问题是这种类
型的映射是不是连续的. 数学家 Netto 在 1879 年给出一个著名结果 [86], 指出这
样的双射是间断的.
定理 3.1. (Netto 定理) 如果 f 是一个从 m 维光滑流形到 n 维光滑流形的双射,
其中 m 6= n, 那么 f 是间断的.
有了这个定理之后, 问题变成: 如果去掉双射的限制, 是否存在一个满射将
区间 [0, 1] 映射到正方形区域 [0, 1]2 上. Giuseppe Peano (1858–1932) 在 1890 年发
现了第一个这样的曲线. 因此, 具有这样性质的曲线不仅被称为空间填充曲线, 又
被称为 Peano 曲线. 曲线的广义定义如下:
定义 3.1.1. 一个 n 维空间填充曲线是一个连续的满射, 将单位区间 [0, 1] 映射到
n 维超立方 [0, 1]n .
在 Peano 之后, 其他数学家也对这个问题进行了深入研究, 进一步的例子分
别被 D. Hilbert (1891), E.H. Moore (1900), W. F. Osgood (1903), H. Lebesgue (1904),
W. Sierpiński (1912), G. Pólya (1913), K. Knopp (1917) 等人给出 [86]. 一般情况下,
空间填充曲线由线段序列迭代, 当迭代次数趋于无穷时生成. 用希尔伯特空间填
充曲线做例子, 如图 3.1, 3.2 及 3.3 所示: 图 3.1 是经过一次迭代产生的曲线; 图
3.2 是经过二次迭代产生的曲线; 图 3.3 是经过六次迭代产生的曲线.
空间填充曲线主要有: Peano 空间填充曲线、希尔伯特空间填充曲线、Moore
空间填充曲线、Sierpiński 空间填充曲线、Morton 空间填充曲线、Lebesgue 空间填
充曲线、Osgood 空间填充曲线等. 其中 Sierpiński 空间填充曲线 [105] 如图 3.4 所
示, Morton 空间填充曲线 [88] 如图 3.5 所示 (高维曲线同样存在, 出于简洁的考
19
学位论文
20
图 3.1 一阶希尔伯特空间填充曲线
图 3.2 二阶希尔伯特空间填充曲线
虑, 仅给出了二维图). 这些曲线大多是在一个世纪前发现的, 但它们的具体应用
却是在近几十年. 空间填充曲线具有自相似性、空间局部性等特点, 被广泛用在
数学、算法、地理信息系统、图像处理、数据库、电路设计、加密、内存管理、数
据压缩、科学计算及动态负载平衡等领域 [89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 100,
101, 102, 103, 104]. Velho 等人利用空间填充曲线设计了图像抖动算法, 应用于激
光打印机等 [87, 104, 118]. Salmon 等人利用空间填充曲线为 N - 体模拟程序进行
数据划分及重排序以改进程序的空间局部性 [103]. Challacombe 等人利用空间填
充曲线在并行机上对稀疏矩阵进行划分 [95]. Mellor-Crummey 等人 [100, 101] 以
第三章 空间填充曲线
21
图 3.3 六阶希尔伯特空间填充曲线
图 3.4 Sierpiński 空间填充曲线 (一阶, 二阶, 三阶)
及 Hu 等人 [96] 利用空间填充曲线对数据及计算重排序以改善内存使用. Matias
等人 [98] 利用空间填充曲线对视频进行处理. Hwansoo Han[99] 等人将空间填充
曲线用在 CFD 计算等科学计算领域中. 空间填充曲线有良好的空间局部性, 也
被用在数据压缩 [106]、索引 [107] 等方面. 在并行计算方面, 空间填充曲线划分
算法也是动态负载平衡常用的算法 [18, 19, 62, 123], 其中希尔伯特空间填充曲线,
Morton 空间填充曲线, Sierpiński 空间填充曲线具有最好的空间局部性, 应用也是
最广泛的. 由于 Morton 空间填充曲线的算法简单, 人们首先使用这种曲线, 应用
领域相当广泛, 但由图 3.5 可以看出, 该曲线具有跳跃性, 其空间局部性相对于另
外两种曲线要差一些. 随着希尔伯特空间填充曲线和 Sierpiński 空间填充曲线的
编码解码算法日趋成熟, 这两种空间填充曲线越来越占有主导地位, 尤其是希尔
学位论文
22
图 3.5 Morton 空间填充曲线 (二阶)
伯特空间填充曲线.
§3.2
希尔伯特序
G. Peano 第一个发现了空间填充曲线, 但第一个给出空间填充曲线一般化生
成方法的人却是希尔伯特 (D. Hilbert, 1891) [86, 118]. 在这里, 用二维希尔伯特空
间填充曲线作为例子来阐述空间填充曲线的生成过程, I 表示区间 [0, 1], Q 表示
正方形 [0, 1]2 . 希尔伯特空间填充曲线的生成方式是: 将区间 I 剖分成四个子区
间, 将 Q 剖分成四个子正方形, 第一次迭代的结果如图 3.1 所示; 接着将 I 的每
个子区间剖分成四个子区间, I 子区间的个数为 16, 将 Q 的每个子正方形剖分成
四个子正方形, 子正方形的个数同样为 16, 第二次迭代的结果如图 3.2; 经过六次
迭代产生的曲线如图 3.3 所示. 该过程一直持续, 当趋于无穷时, 产生一个充满整
个正方形的曲线. 这些子正方形的安排按照如下方式: 相邻子区间对应的子正方
形有一条公共边.
假设迭代次数为 m, 迭代过程会将单位区间 I 及单位正方形 Q 剖分成 22m
个子区间和 22m 个子正方形. 对区间 I 的每个子区间编号, 编号取值为整数, 其
范围为 I2m = {0, 1, · · · , 22m − 1} , 单位正方形 Q 被分成了 22m 个子正方形, 每个
m
子正方形赋予一个整数坐标, 其取值范围为 Qm
2 = {(x, y) : 0 ≤ x, y < 2 − 1}. 迭
代次数 m 又称为阶 (order)、分辨率 (resolution) 或深度 (depth). 在下面的讨论
中, 阶这个术语将会被一直使用. 我们用 Hnm 表示 m- 阶 n- 维希尔伯特空间填充
曲线. 仍用二维希尔伯特空间填充曲线做例子, 取 m 为 2, 集合 Q22 中每一个整数
第三章 空间填充曲线
23
坐标均对应集合 I22 中的一个编号, H22 如图 3.6 所示, 曲线的起始点为 0, 终点为
15, 用黑色实心圆表示. 我们可以看出 H22 是由 H21 生成的: H22 包含了四个经过
空间变换的 H21 , 如图 3.6 所示; H23 也是由四个经过空间变换的 H22 得到. 从这个
观察可以得到一般化的希尔伯特空间填充曲线生成方法: H2m 可以由四个 H2m−1
拼接得到, 只是这四个 H2m−1 分别需要做一次空间变换. 具体的变换方式将在接
下来的内容中仔细分析.
6
5
4
9
10
8
7
11
3
2
13
12
0
1
14
15
图 3.6 希尔伯特序 (H22 , 二阶)
0
1
2
3
8
9
10
11
4
6
12
14
5
7
13
15
图 3.7 Z-order (Morton order, 二阶)
24
学位论文
对任意的正整数 m, 上述方法为集合 Qm
2 定义了一种顺序 (order). 由于该顺
序是由希尔伯特空间填充曲线定义的, 又被称为希尔伯特序 (Hilbert order, Hilbert
code). 对于不同类型的空间填充曲线, 可以定义不同的排序方法 (ordering), 如
Morton 空间填充曲线, 由于其曲线与 Z 很相似, 又称为 Z- 序 (Z-order, Morton
order, Morton code) [88], 图 3.7 是一个二阶 Morton 空间填充曲线定义的 Z- 序.
m
m
m
Qm
2 与 I2 是一个一一对应关系, 将 Q2 中一个坐标映射成 I2 中一个整数的过程
称为编码 (enconding), 编码过程为每一个坐标建立一个索引 (index); 将 I2m 中一
个整数映射成 Qm
2 中一个坐标的过程称为解码 (decoding), 解码过程是一个曲线
遍历的过程. 高维空间填充曲线的编码解码定义和二维是一样的. 希尔伯特空间
填充曲线和希尔伯特序是同一个内容, 只是名称不一样.
接下来的内容集中在希尔伯特序 (希尔伯特空间填充曲线) 上. 很多研究人员
对希尔伯特空间填充曲线的计算方法进行了研究, 提出了许多有效的算法, 它们可
以划分为两类: 递归算法 [109, 110, 111, 112] 和迭代算法 [62, 113, 114, 115, 116, 118].
对递归算法, Butz, Goldschlager[109, 110] 等人设计了简洁的算法, 这些算法是空间
填充曲线递归算法的基础. Breinholt 和 Schierz[108] 设计了效率更高的递归算法.
Witten 等人使用 GROPER 语言描述了一种递归技术 [111]. Cole 在一个图形系统
上实现了递归过程, 并为 Peano 及 Sierpiński 空间填充曲线描述了递归算法 [112].
在通常情况下, 迭代算法的速度要快于递归算法, 尤其是表驱动 (table-driven) 的
迭代算法 [62, 113, 114, 115, 116, 118]. Fisher[113], Liu 和 Schrack[115, 116] 为二维
和三维问题设计了基于二进制操作的迭代算法. Faloutsos 等人 [117] 通过分析希
尔伯特空间填充曲线和 Z- 序之间的关系, 实现了编码解码算法. 在文 [62] 中, 作
者展示了基于表的算法, 其中使用了两个表分别存储了各个象限的变换信息及状
态信息, 由于仅需要查表而不需要重新计算, 极大提高了生成速度. 以上提到的算
法一般都被限制在二维和三维空间, 对高维空间填充曲线, 由于复杂性很高, 这方
面的工作比较少. Butz[109] 的递归算法可以对高维曲线进行计算, 但复杂度较高,
速度慢, 不适合大规模计算. Lawder[119] 重新对 Butz 的算法进行研究, 并给出了
改进. 最近 Kamata 等人 [120] 提出了基于硬件的高维算法. Li 等人 [121] 分析了
高维希尔伯特空间填充曲线不同象限的变换关系.
下面介绍本文作者在希尔伯特序编码和解码算法方面的工作. 本文的工作基
于文章 [118, 121]. Li 等人设计了算法分析高维希尔伯特序的演化规则, 这些规
则包含了坐标变换信息, 由于问题的复杂性, 作者并没有给出编码解码算法. 本
文对这些演化规则进行了细致地分析和理解, 并给出这些变换的数学表达式和解
释, 在此基础上, 设计了编码和解码算法. 对于编码和解码算法, 分别给出了基于
位运算的算法和基于算术运算的算法. 基于位运算的算法是基于算术运算算法
第三章 空间填充曲线
25
的改进, 计算效率更高. 算法的时间计算复杂度为 O(mn). 对于给定的编码解码
问题, 算法可以在 m 步给出结果. Chen 等人 [118] 利用希尔伯特空间填充曲线特
有的性质, 针对二维问题设计了复杂度更低的编码解码算法, 计算复杂度为 O(k),
其中 k 定义为 k = log2 (max(x, y)) + 1, 与 m (k ≤ m) 的大小无关. 利用类似的性
质, 可以将三维希尔伯特序的编码解码算法的复杂度降为 O(k) [123], 其中 k 定义
为 k = log2 (max(x, y, z)) + 1. 本章给出了这种思想的理论依据, 并推广到高维希
尔伯特空间填充曲线, 得到一系列复杂度更低的算法. 同一个坐标, 在不同阶数
的希尔伯特空间填充曲线中的序并不一定相同, 我们对传统的希尔伯特空间填充
曲线做了改造, 得到希尔伯特曲线新的变体, 该曲线满足性质: 同时属于不同阶
曲线的一组坐标在这些曲线中的顺序是一样的. 本章为该曲线变体设计了编码解
码算法.
§3.3
希尔伯特序编码解码算法
本节将介绍编码算法和解码算法. 我们先给出预备知识, 然后分析文章 [121]
中介绍的算法, 分析高维希尔伯特空间填充曲线的性质, 给出理论结果, 在此基础
上介绍编码和解码算法, 其中每类算法将使用四种不同的方式表达, 两种使用算
术运算表达, 两种使用位运算表达, 并且具有不同的计算复杂度. 这里介绍的算法
对任意维数 (n ≥ 2) 的希尔伯特空间填充曲线均适用. 本文给出的是算法框架, 可
以作为模板应用到不同维数的问题中.
§3.3.1
预备知识
本节所有的操作均在非负整数上进行. 需要声明的是操作同样可以在实数
m
域上进行, 只需将输入及输出做一次转换即可. 令 Qm
n 为整数坐标集合, Qn =
{(xn , · · · , x2 , x1 )|0 ≤ xi < 2m , 1 ≤ i ≤ n}, (xn , · · · , x1 ) (∈ Qm
n ) 是希尔伯特空间填充
m
曲线的坐标, xi 为坐标的第 i 个分量. 记 In = {0, 1, · · · , 2nm − 1}. 当 n 为 2 时,
即通常的平面 (此时有 x2 = x, x1 = y); 当 n 为 3 时, 即通常的三维空间 (此时有
x3 = x, x2 = y, x1 = z). 当所有的 xi 和 yi (1 ≤ i ≤ n) 均为 0 或者 1 时, 定义如下
逻辑运算 ∧
(xn , · · · , x2 , x1 ) ∧ (yn , · · · , y2 , y1 ) = (xn ∧ yn , · · · , x2 ∧ y2 , x1 ∧ y1 ),
在这里 ∧ 代表异或运算符 XOR.
(3.1)
学位论文
26
引入符号 (a1 a2 · · · ak )d 表示 d 进制数字, 其中 0 ≤ ai < d, 1 ≤ i ≤ k, 且 k 可
以为任意的正整数. 当 d 为 2 时, 表示二进制; 当 d 为 10 时, 表示通常的十进制.
各种不同的数字表示方式可以互相转换. 当 d 为 2 时, 定义取反运算符 Rek 如下:
Rek (j) = Rek ((a1 a2 · · · ak )2 ) = (b1 b2 · · · bk )2 ,
bi = 1 − ai , 1 ≤ i ≤ k,
(3.2)
其中 j 是一个十进制数, j = (a1 a2 · · · ak )2 为 j 的二进制表示, j 满足条件 0 ≤ j <
2k . 对二进制数, 可以引入通常的按位与 (and), 右移, 左移运算符, 分别记作 &, À
和 ¿. 引入定义 [122]
pin (a1 , a2 , · · ·
, an ) = (
i
X
aj ) mod 2,
(3.3)
j=1
其中 ai 等于 0 或者 1 (1 ≤ i ≤ n). 借助 pin , 定义映射 fn
fn (a1 , a2 , · · · , an ) = (b1 b2 · · · bn )2 = j,
b1 = a1 ,
bi =
(
ai , if pni−1 = 0
1 − ai , if pni−1 = 1
, (3.4)
其中 ai 等于 0 或者 1, 并且 j 为十进制数. 该函数将一个向量 (a1 , a2 , · · · , an ) 映
射成一个整数. 同时定义 fn 的逆映射 bn
bn (j) = bn ((a1 a2 · · · an )2 ) = (b1 , b2 , · · · , bn ),
b1 = a1 ,
bi =
(
ai , if ai−1 = 0
,
1 − ai , if ai−1 = 1
(3.5)
其中 j 为一个十进制数且等于 (a1 a2 · · · an )2 .
注记: 在实际应用中, 对特定的 n, 映射 bn 及 fn 可以事先计算好存储在表中, 需
要的时候直接查询. 对于 bn , 可以采用如下方式快速计算
bn ((a1 · · · an )2 ) = (a1 , · · · , an ) ∧ (0, a1 , · · · , an−1 ).
(3.6)
由于 fn 和 bn 互为逆映射, 计算 bn 之后, 可以直接得到 fn 的结果.
下面部分概念来自文章 [121]. n- 维希尔伯特单元 (n-dimensional cell) 是一个
1 阶的 n- 维希尔伯特空间填充曲线. n- 维希尔伯特因子列表 (Hilbert gene list) 是
一系列坐标变换指令, 它们给出了从 (m−1)- 阶希尔伯特空间填充曲线到 m- 阶曲
线的变换指令. 坐标的变换指令分为两类: 交换指令 (exchange command) 和反转
指令 (reverse command). 它们可以解释为坐标关于某个超平面的对称变换. 希尔
第三章 空间填充曲线
27
伯特空间填充曲线是有方向的, 它有一个入口和一个出口. 当对一个希尔伯特单
元做坐标变换时, 入口和出口的空间坐标可能会改变. 对一个 n- 维空间, 它有 2n
个象限, 例如二维平面有四个象限, 三维空间有八个象限, 编号均从 0 开始, 编号
方式由 fn 直接计算. 每个象限均有不同的变换指令. 引入 Hni,0 和 Hni,1 (0 ≤ i < 2n )
表示单元经过 i- 象限的指令变换后的入口和出口坐标. 在文章 [121] 中, 作者介
绍了如何生成希尔伯特单元和希尔伯特因子列表.
希尔伯特单元在文章 [121] 中是按照递归的方式生成的, 如果要生成 n- 维希
尔伯特单元, 需先生成 (n − 1)- 维希尔伯特单元. 本文分析了其生成方式, 基于理
论分析, 设计了映射 bn 直接生成单元, 同时引入了 bn 的逆映射 fn . bn 将在解码
算法中被使用, fn 在编码算法中被使用.
下面我们对希尔伯特因子列表进行分析, 给出其数学解释并给出具体的变换
表达式. 希尔伯特因子列表包含两种指令: 交换指令和反转指令. 这两组指令均
可以解释为关于某个超平面的对称变换. 对于交换指令, 如果变换发生在分量 xi
与 xj (i 6= j) 之间, 则其对称面为超平面 xi −xj = 0, 坐标 (xn , · · · , xi , · · · , xj , · · · , x1 )
经过变换之后则变为 (xn , · · · , xj , · · · , xi , · · · , x1 ), 该结果可以由简单的数学演算直
接推导出来, 简单说就是交换第 i 个与第 j 个位置的分量, 这是称其为交换指令
的原因. 对反转指令, 假设变换的位置为 i 并且当前希尔伯特空间填充曲线的阶
m
数为 m, 则其对称面为超平面 xi = 2 2−1 , 坐标 (xn , · · · , xi , · · · , x1 ) 经过变换后变
为 (xn , · · · , 2m − 1 − xi , · · · , x1 ). 该操作与映射 Rem (xi ) 是等价的. 反转变换改变
的仅是 xi 位置的坐标值, 结果与指令的执行顺序是无关的. 这两种变换的逆变换
均是自身, 它们均是保长度的, 并且保持曲线上各个点的相对位置不变, 即对给定
的曲线, 变换只会改变曲线在空间中的位置信息, 但不会改变各个坐标对应的序
的相对编号. 总结如下:
性质 3.2. 交换变换的本质是镜面对称变换, 如果变换发生在分量 xi 与 xj (i 6= j)
之间, 其对称面为超平面 xi − xj = 0; 反转变换的本质也是镜面对称变换, 如果变
m
换发生在 xi 分量且当前曲线的阶数为 m, 则对称面为超平面 xi = 2 2−1 , 如果有
多个反转变换, 结果与执行顺序无关. 交换和反转变换的逆变换均为自身.
文章 [121] 给出了生成这些指令的算法, 为了表达的方便, 本文对生成算法进
行了重写, 表达式如下:
n
i,0
i,1
Gi,0
n = (bn (0) ∧ bn (2 − 1)) ∧ (Hn ∧ Hn ),
i,0
Gi,1
n = bn (0) ∧ Hn ,
(0 ≤ i < 2n ),
(0 ≤ i < 2n ).
(3.7)
(3.8)
学位论文
28
Gni,0 和 Gi,1
n 表示第 i 象限的交换指令和反转指令. 根据 bn 的定义, 可以将 bn (0) 及
bn (2n −1) 分别写成如下形式 (0, · · · , 0) 和 (1, 0, 0, · · · , 0), 有关系 bn (0)∧bn (2n −1) =
(1, 0, 0, · · · , 0) 成立. 希尔伯特单元的出口和入口坐标仅有一个分量不同, 并且两
种变换是保持曲线上各点的相对位置不变, 经过变换后的单元的入口坐标和出口
坐标仅有一个分量的值是不同的, 所以入口坐标 Hni,0 与出口坐标 Hni,1 做异或运
算, 得到的结果中除了一个分量为 1 外全部为 0. 根据式 (3.7), Gi,0
n 的分量要么全
部为 0 要么仅有两个不为 0. 这意味着, 每个象限上要么不执行交换指令要么仅
需要执行一次. 如果 Gi,0
n 的第 i 个与第 j 个分量为 1, 则在这两个分量之间执行
交换指令. 反转指令则可能需要执行多次.
在此介绍希尔伯特曲线的一个特殊性质. 分析象限 0 的性质, 根据定义可
以把 bn (0), bn (2n − 1), Hn0,0 及 Hn0,1 分别写成如下形式: (0, · · · , 0), (1, 0, · · · , 0),
0,1
(0, · · · , 0) 和 (0, · · · , 0, 1). 根据式 (3.7) 及 (3.8), 有 G0,0
n = (1, 0, · · · , 0, 1) 和 Gn =
(0, · · · , 0). 这意味着在第 0 象限, 有且仅有交换变换, 变换发生在第一个和最后一
个分量之间. 这是设计计算复杂度更低的算法的理论基础.
性质 3.3. 在每个象限中, 最多执行一次交换变换, 反转变换可以被执行多次. 在
0,1
0 象限中, G0,0
n = (1, 0, · · · , 0, 1), Gn = (0, · · · , 0), 有且仅有交换变换.
§3.3.2
编码算法
本文给出 n 维空间 (n ≥ 2) 希尔伯特空间填充曲线的编码算法. 本小节仅给
出算法模板, 当给定具体的维数 n 后, 可以根据这个模板导出相应的算法.
前面已经提到, 希尔伯特空间填充曲线是自相似的, 曲线的生成是一个迭代
(递归) 过程, m- 阶希尔伯特空间填充曲线 Hnm 的生成需要 (m − 1)- 阶曲线 Hnm−1 .
具体过程可以描述为: n 维空间有 2n 个象限, 其每一个象限包含一个 (m − 1)- 阶
希尔伯特空间填充曲线, 对每个象限的 (m − 1)- 阶希尔伯特空间填充曲线实施该
象限对应的交换指令和反转指令, 然后连接相邻象限中曲线的入口和出口, 即可
得到一个 m- 阶的希尔伯特空间填充曲线. 如图 3.1 及 3.2 所示, 可以看出 H22 的
四个子正方形中的每个均包含一个 H21 . 从曲线的入口出发, 遍历曲线, 可以为曲
线中每个点建立一个序, 这是编码过程.
下面详细分析编码过程。对任意给定的坐标 P ,它的序等于从入口开始遍历
曲线到指定位置所经过的点的个数. 假设当前曲线的阶数为 m, 它由 2n 个 (m−1)阶曲线生成, P 必定位于某个 (m − 1)- 阶曲线中, 假设位于第 i 象限中, 遍历此曲
线, 在它到达所处的 (m − 1)- 阶曲线之前, 要经过 i 个 (m − 1)- 阶曲线. 使用记号
Xm (P ) 表示点 P 在 m- 阶曲线中的希尔伯特序, 那么它的希尔伯特序可以由下式
表示:
第三章 空间填充曲线
29
em−1 (P ),
Xm (P ) = i × 2n(m−1) + X
em−1 (P ) 表示点 P 在经过变换的 (m − 1)- 阶希尔伯特曲线中的序. 前面已
其中 X
经讲过, 交换指令和反转指令是保持长度的, 不会改变曲线的序, 所以我们将 P
所处的某个 (m − 1)- 阶曲线做逆变换, 变换成一个没有经过改变的 (m − 1)- 阶曲
线, 上式相应地变为
Xm (P ) = i × 2n(m−1) + Xm−1 (P ).
(3.9)
该式是设计迭代算法的出发点, 它保证我们可以使用统一的算法框架计算希尔伯
特序.
假设当前希尔伯特空间填充曲线的阶数为 m, 任意一个点 (xn , · · · , x1 ) (∈
m m−1 · · · x1 ) . 希
Qm
n ), 其每个分量 xi (1 ≤ i ≤ n) 可以写成二进制表示 xi = (xi xi
i 2
m
尔伯特序保存在整数 (rm rm−1 · · · r1 )2n (∈ In ) 中. 算法中用到的变换信息 Gi,0
n 及
i,1
n
Gn (0 ≤ i < 2 ) 需事先计算好, 具体的过程可以从文章 [121] 得到.
希尔伯特空间填充曲线的生成是从低阶到高阶的递归过程, 这样的方式可以
生成一个完整的曲线. 由于编码解码问题仅需计算一个点, 这样的方式是浪费时
间和空间的, 根据式 (3.9), 本文采取从高阶到低阶的一个回溯过程, 以迭代的方
式计算. 变换指令有两类, 在编码过程中, 反转指令先执行, 然后是交换指令. 下
面给出第一个算法, 它基于算术运算, 具体过程如下:
编码算法 1.1.
m
m
(1) 如果 m = 0, 程序终止. 否则, rm = fn (xm
n , xn−1 , · · · , x1 ).
m−1 .
(2) 对每个整数 i (1 ≤ i ≤ n), 如果 xm
i = 1, 那么 xi = xi − 2
(3) 反转. 对每个整数 i (1 ≤ i ≤ n), 如果 Gnrm ,1 的第 i 个分量是 1, 那么 xi =
2m−1 − 1 − xi .
(4) 交换. 如果 Grnm ,0 存在两个非零分量, 其位置为 i 和 j, 则交换 xi 和 xj .
(5) m = m − 1, 转至 (1).
在编码算法 1.1 中, 如果将整数写成二进制数, 会发现在步骤 (2) 中, xi =
是被 (xim−1 · · · x1i )2 所代替, 仅丢掉一个高位有效数字, 该运算可以由
简单的按位与操作 (&) 完成. 步骤 (3) 中的算术运算等价于一个按位取反运算,
1
(xm
i · · · xi )2
30
学位论文
等价于 Rem−1 操作. 在实际应用中, 位运算的效率要高于算术运算, 上述算法可
以按照位运算的方式重写:
编码算法 2.1.
m
m
(1) 如果 m = 0, 程序终止. 否则, rm = fn (xm
n , xn−1 , · · · , x1 ).
1
(2) 对每个整数 i (1 ≤ i ≤ n), xi = (xm−1
· · · x1i )2 = (xm
i · · · xi )2 & (011 · · · 1)2 .
i
(3) 反转. 对每个整数 i (1 ≤ i ≤ n), 如果 Gnrm ,1 的第 i 个分量是 1, 那么 xi =
Rem−1 (xi ) = (xm−1
· · · x1i )2 ∧ (1 · · · 1).
i
(4) 交换. 如果 Grnm ,0 存在两个非零分量, 其位置为 i 和 j, 则交换 xi 和 xj .
(5) m = m − 1, 转至 (1).
编码算法 1.1 和 编码算法 2.1 只是表达不同, 它们具有相同的复杂度. 下
面分析它们的计算复杂度. 算法在步骤 (2) 和 (3) 需要更新 n 个坐标, 复杂度为
O(n), 步骤 (4) 的计算复杂度为 O(1), 算法会在 m 步内终止, 因此算法的时间复
杂度为 O(nm). 对于空间复杂度, 算法需要存储 2n 个象限的变换信息, 空间复杂
度为 O(2n ). 问题本身的复杂度是按照指数增长的, 这是前人的工作大多集中在
二维及三维的原因. 当 n 较小时, 存储变换信息所占的内存是可以接受的, 例如
维数 n 为 20 时, 所占内存大概为 2M. 当维数较高时, 高效实现仍然是挑战性的.
根据 fn 的定义, 有 r = fn (0, 0, · · · , 0) = 0. 由性质 3.3 知道在象限 0 中仅有
交换指令. 观察 编码算法 1.1, 会发现仅有步骤 (4) 被执行. 这个过程将一直执行
到 r 是非零值, 在这个过程仅有坐标分量 xn 与 x1 交换, 并且交换两次的结果是
保持坐标不变. 这个过程可以跳过, 如果跳过的次数为偶数, 保持坐标不变; 如果
次数为奇数, 则交换 xn 与 x1 . 通过这个观察, 可以设计计算复杂度更低的算法.
定义 k = floor(log2 (max{xn , · · · , x1 })) + 1, 并令 log2 (0) 等于 0. 上述两个算法可以
分别改写成如下形式:
编码算法 1.2.
(1) 设定 (rm · · · r1 )2n 为 0. 如果 m 与 k 具有不同的奇偶性, 则交换 x1 与 xn .
m = k.
m
m
(2) 如果 m = 0, 程序终止. 否则 rm = fn (xm
n , xn−1 , · · · , x1 ).
m−1 .
(3) 对每个整数 i (1 ≤ i ≤ n), 如果 xm
i 为 1, 则 xi = xi − 2
(4) 反转. 对每个整数 i (1 ≤ i ≤ n), 如果 Grnm ,1 的第 i 个分量是 1, 那么 xi =
2m−1 − 1 − xi .
(5) 交换. 如果 Grnm ,0 存在两个非零分量, 其位置为 i 和 j, 则交换 xi 和 xj .
第三章 空间填充曲线
31
(6) m = m − 1, 转至 (2).
编码算法 2.2.
(1) 设定 (rm · · · r1 )2n 为 0. 如果 m 与 k 具有不同的奇偶性, 则交换 x1 与 xn .
m = k.
m
m
(2) 如果 m = 0, 程序终止. 否则 rm = fn (xm
n , xn−1 , · · · , x1 ).
1
(3) 对每个整数 i (1 ≤ i ≤ n), xi = (xm−1
· · · x1i )2 = (xm
i · · · xi )2 & (011 · · · 1)2 .
i
(4) 反转. 对每个整数 i (1 ≤ i ≤ n), 如果 Grnm ,1 的第 i 个分量是 1, 那么 xi =
Rem−1 (xi ).
(5) 交换. 如果 Grnm ,0 存在两个非零分量, 其位置为 i 和 j, 则交换 xi 和 xj .
(6) m = m − 1, 转至 (2).
编码算法 1.2 和 编码算法 2.2 的时间计算复杂度为 O(kn), 对某个给定的坐
标, 其时间复杂度是与曲线的阶数 m 无关的. 对阶数 m 较高的应用, 这两个算法
更有优势. 它们的空间复杂度与 编码算法 1.1 及 编码算法 2.1 是一样的, 都是
O(2n ).
§3.3.3
解码算法
解码过程是给定整数 z (∈ Inm ) 及希尔伯特空间填充曲线的阶 m, 求出整数
对应的空间坐标 (xn , · · · , x2 , x1 ) (∈ Qm
n ) 的过程. 解码算法所需要的理论基础均已
在上面给出, 此处仅给出每个编码算法对应的解码算法, 不再对解码算法做详细
的讨论.
记 m 为希尔伯特空间填充曲线的阶, (rm rm−1 · · · r1 )2n 为整数 z 的 2n - 进制
数表示. 引入 k, 它表示 (rm rm−1 · · · r1 )2n 中第一个非零元素的位置, 即 rk > 0 且
ri = 0 (i > k). 同时假定当 z 为 0 时, k 为 1. 假定 log2n (0) 为 0, k 的定义等价于
k = floor(log2n (z)) + 1. 计算结果保存在坐标 (xn , · · · , x2 , x1 ) (∈ Qm
n ) 中.
在解码算法中, 交换指令先执行, 然后是反转指令. 下面分别给出上述四个
编码算法对应的解码算法.
解码算法 1.1.
(1) 初始化 (xn , · · · , x1 ), (xn , · · · , x2 , x1 ) = bn (r1 ). v = 2.
(2) 如果 v > m, 程序终止. 否则 (sn , · · · , s2 , s1 ) = bn (rv ).
(3) 交换. 如果 Grnv ,0 在位置 i 及 j 有非零值, 则交换 xi 与 xj .
(4) 反转. 对每个整数 i (1 ≤ i ≤ n), 如果 Grnv ,1 的第 i 分量为 1, 则 xi = 2v−1 −1−xi .
32
学位论文
(5) 对每个整数 i (1 ≤ i ≤ n), 如果 si 等于 1, 则 xi = xi + 2v−1 .
(6) v = v + 1, 转至 (2).
解码算法 2.1.
(1) 初始化 (xn , · · · , x1 ), (xn , · · · , x2 , x1 ) = bn (r1 ). v = 2.
(2) 如果 v > m, 程序终止. 否则 (sn , · · · , s2 , s1 ) = bn (rv ).
(3) 交换. 如果 Grnv ,0 在位置 i 及 j 有非零值, 则交换 xi 与 xj .
(4) 反转. 对每个整数 i (1 ≤ i ≤ n), 如果 Grnv ,1 的第 i 分量为 1, 则 xi = Rev−1 (xi ).
(5) 对每个整数 i (1 ≤ i ≤ n), 如果 si 等于 1, 则 xi = (xi ) ∧ (1 ¿ (v − 1)).
(6) v = v + 1, 转至 (2).
解码算法 1.2.
(1) 初始化 (xn , · · · , x1 ), (xn , · · · , x2 , x1 ) = bn (r1 ). v = 2.
(2) 如果 v > k, 程序终止. 否则 (sn , · · · , s2 , s1 ) = bn (rv ).
(3) 交换. 如果 Grnv ,0 在位置 i 及 j 有非零值, 则交换 xi 与 xj .
(4) 反转. 对每个整数 i (1 ≤ i ≤ n), 如果 Grnv ,1 的第 i 分量为 1, 则 xi = 2v−1 −1−xi .
(5) 对每个整数 i (1 ≤ i ≤ n), 如果 si 等于 1, 则 xi = xi + 2v−1 .
(6) v = v + 1, 转至 (2).
(7) 如果 m 与 k 具有不同的奇偶性, 则交换 xn 与 x1 . 最终的坐标为 (xn , · · · , x1 ).
解码算法 2.2.
(1) 初始化 (xn , · · · , x1 ), (xn , · · · , x2 , x1 ) = bn (r1 ). v = 2.
(2) 如果 v > k, 程序终止. 否则 (sn , · · · , s2 , s1 ) = bn (rv ).
(3) 交换. 如果 Grnv ,0 在位置 i 及 j 有非零值, 则交换 xi 与 xj .
(4) 反转. 对每个整数 i (1 ≤ i ≤ n), 如果 Grnv ,1 的第 i 分量为 1, 则 xi = Rev−1 (xi ).
(5) 对每个整数 i (1 ≤ i ≤ n), 如果 si 等于 1, 则 xi = (xi ) ∧ (1 ¿ (v − 1)).
(6) v = v + 1, 转至 (2).
(7) 如果 m 与 k 具有不同的奇偶性, 则交换 xn 与 x1 . 最终的坐标为 (xn , · · · , x1 ).
这四个算法的时间计算复杂度与对应的编码算法的复杂度是一样的. 解码算
法 1.1 和 解码算法 2.1 的时间计算复杂度为 O(nm), 其余两个的时间计算复杂
度为 O(nk). 它们具有相同的空间复杂度, 均为 O(2n ).
第三章 空间填充曲线
§3.4
33
希尔伯特曲线的新变体
由前面的分析可知, Hnm 可以由 Hnm−1 得到, Hnm 的第 0 象限包含的并不是
Hnm−1 本身, 而是经过交换指令变换得到的曲线. 用二维曲线做例子, 如图 3.8 所
示, H22 的第 0 象限中的曲线并不是 H21 , H23 的第 0 象限的曲线并不是 H22 . 这就说
明, 同一个坐标在不同阶的曲线中的序可能是不同的. 当曲线的阶数改变时, 需
要重新计算希尔伯特序.
Hnm 第 0 象限的曲线由 Hnm−1 经过一次交换指令得到, 而交换变换的逆变换
是自身,即同一个交换指令执行两次保持曲线不变. 从图 3.8 可以看出, H11 恰巧
是 H23 的起始曲线. 这说明只要对奇数或者偶数阶的曲线做一次 xn 与 x1 间的交
e m 第 0 象限的曲线是 H
e m−1 自身. 本文选择对偶数
换变换, 就能保证变体曲线 H
n
n
阶曲线进行一次 xn 与 x1 之间交换变换, 得到了希尔伯特空间填充曲线的一个变
e m . 在曲线 H
e m 中, 同一坐标在不同阶曲线中对应的序都是相同的, 同一个
体H
n
n
序对应的坐标值也是一样的. 同样取二维空间做例子, 如图 3.9 示, 可以看到此时
e 3 第 0 象限的曲线是 H
e2 , H
e 2 第 0 象限的曲线是 H
e 1.
H
2
2
2
2
图 3.8 希尔伯特曲线 (H21 , H22 , H23 )
下面给出该变体曲线的编码及解码算法. 由于仅偶数阶希尔伯特曲线被实施
了一次交换变换, 奇数阶曲线没有改变, 可以这么做: 奇数阶的曲线没有被改变,
编码解码算法和原来的算法相同; 对偶数阶的曲线, 可以先实施一次交换变换回
到原来的希尔伯特曲线, 然后调用原来的算法. 这样的好处是不用重写各种算法,
不用重新计算不同象限的变换指令.
由于变体曲线的算法与传统的算法非常相似, 本文仅给出一个编码算法和解
学位论文
34
e 2, H
e 3)
e 1, H
图 3.9 希尔伯特曲线变体 (H
2
2
2
码算法作为代表, 其他基于位运算或者复杂度更低的算法, 都可以类似得到. 算
法描述如下:
编码算法 3.1.
(1) 如果 m 偶数, 交换 xn 与 x1 .
m
m
(2) 如果 m = 0, 程序终止. 否则, rm = fn (xm
n , xn−1 , · · · , x1 ).
m−1 .
(3) 对每个整数 i (1 ≤ i ≤ n), 如果 xm
i = 1, 那么 xi = xi − 2
(4) 反转. 对每个整数 i (1 ≤ i ≤ n), 如果 Gnrm ,1 的第 i 个分量是 1, 那么 xi =
2m−1 − 1 − xi .
(5) 交换. 如果 Grnm ,0 存在两个非零分量, 其位置为 i 和 j, 则交换 xi 和 xj .
(6) m = m − 1, 转至 (2).
解码算法 3.1.
(1) 初始化 (xn , · · · , x1 ), (xn , · · · , x2 , x1 ) = bn (r1 ). v = 2.
(2) 如果 v > m, 程序终止. 否则 (sn , · · · , s2 , s1 ) = bn (rv ).
(3) 交换. 如果 Grnv ,0 在位置 i 及 j 有非零值, 则交换 xi 与 xj .
(4) 反转. 对每个整数 i (1 ≤ i ≤ n), 如果 Grnv ,1 的第 i 分量为 1, 则 xi = 2v−1 −1−xi .
(5) 对每个整数 i (1 ≤ i ≤ n), 如果 si 等于 1, 则 xi = xi + 2v−1 .
(6) v = v + 1, 转至 (2).
(7) 如果 m 偶数, 交换 xn 与 x1 .
第三章 空间填充曲线
35
这两个算法的时间计算复杂度均为 O(nm), 它们的空间复杂度为 O(2n ). 这
两个算法需要的空间变换信息和前一节的是一样的. 复杂度更低的算法亦可以类
似得到, 这里不再给出.
§3.5
算法的具体化
前几节对希尔伯特空间填充曲线做了理论分析并给出了算法模板, 适用于任
意维数的希尔伯特空间填充曲线. 下面对算法做具体化, 同时提供一些程序优化
建议. 我们仅选取两个算法模板做例子, 出于简单的考虑, 将选择二维希尔伯特空
间填充曲线, 高维空间是完全类似的. 选取编码算法 1.1 和 解码算法 1.1.
现代计算机内存容量较大, 一个常见的编程思想就是通过增加内存使用而加
i,1
n
快程序运行速度. 上述所有算法都需要计算 bn , fn , Gi,0
n 及 Gn (0 ≤ i < 2 ), 对特
定的维数 n, 这些信息是保持不变的, 可以把这些信息事先计算好存储在源文件
中, 在计算时直接查询, 这种技术会大大提高程序的运行速度.
2
1
(0, 1)
(1, 1)
(0, 0)
(1, 0)
0
3
Y
X
图 3.10 希尔伯特单元 (H21 )
在上节的算法描述中使用 (x2 , x1 ) 表示坐标, 本文用更符合习惯的 (x, y) (x =
x2 , y = x1 ) 代替, 先给出二维希尔伯特单元 H21 , 如图 3.10 所示, 并给出了曲线方
向及每个点的整数坐标. 映射 b2 及 f2 根据定义可以直接求得, 它们存储在表 3.1
中, 同时标注在图 3.10 中. 变换指令和反转指令存储在表 3.2 中. 直接观察可以
学位论文
36
i,1
看出, f2 , b2 , Gi,0
2 及 G2 (0 ≤ i < 4) 按照数组的方式存储有较好的查询效率.
表 3.1 左边表格为映射 f2 , 右边表格为映射 b2
f2 (0, 0)
0
b2 (0)
(0, 0)
f2 (0, 1)
1
b2 (1)
(0, 1)
f2 (1, 1)
2
b2 (2)
(1, 1)
f2 (1, 0)
3
b2 (3)
(1, 0)
表 3.2 左边的表格为交换指令, 右边的表格为反转指令
G0,0
2
(1, 1)
G20,1
(0, 0)
G1,0
2
(0, 0)
G21,1
(0, 0)
G2,0
2
(0, 0)
G22,1
(0, 0)
G3,0
2
(1, 1)
G23,1
(1, 1)
观察 编码算法 1.1, 坐标 (xn , · · · , x1 ) 在步骤 (2) ∼ (4) 中被更新, 其中用了
三个步骤描述使算法清晰, 而在实际应用中, 可以把三个步骤组合到一块, 用一个
表达式来表示, 将成倍加快程序的速度. 记当前曲线的阶为 v, xnew , ynew 分别为
更新后的坐标. 取第三象限做例子, 在这个象限中, 先执行反转指令, 然后是交换
指令. 步骤 (2) 是一个消去 x, y 的高位有效位的过程, 有 (xv , y v ) = (1, 0), 所以
(xnew , ynew ) = (x − 2v−1 , y). 步骤 (3) 是反转变换, 有 G23,1 = (1, 1), 需要对两个坐
标做反转, 有 (xnew , ynew ) = (2v − 1 − x, 2v−1 − 1 − y). 步骤 (4) 是一个交换的过程,
v−1 − 1 − y, 2v − 1 − x). 类似地可以推导
由于 G3,0
2 = (1, 1), 最终有 (xnew , ynew ) = (2
出另外三个象限的更新规则. 我们把这四个象限的更新规则总结到表 3.3 中. 对
解码算法可做类似的优化, 我们把解码算法的坐标更新规则总结在表 3.4 中. 在
实际计算中, 将 编码算法 1.1的步骤 (2) ∼ (4) 用一个坐标更新步骤代替, 将 解
码算法 1.1的步骤 (3) ∼ (5) 同样用一个坐标更新步骤代替. 至此便完成了二维空
间填充曲线编码解码算法的具体化。
§3.6
本章小结
本文简要地介绍了空间填充曲线的知识, 并在这些知识的基础上给出高维曲
线的编码解码算法. 对编码问题, 给出了四种算法, 两种基于算术运算, 两种基于
位运算, 它们的时间计算复杂度分别为 O(nm) 和 O(kn), 其中复杂度 O(kn) 与曲
第三章 空间填充曲线
37
表 3.3 编码过程的坐标更新规则
Quadrant
xnew
ynew
0
y
x
1
x
y − 2v−1
2
x − 2v−1
y − 2v−1
3
2v−1 − 1 − y
2v − 1 − x
表 3.4 解码过程的坐标更新规则
Quadrant
xnew
ynew
0
y
x
1
x
y + 2v−1
2
x + 2v−1
y + 2v−1
3
2v − 1 − y
2v−1 − 1 − x
线的阶数 m 无关, 在高阶编码解码应用中有优势. 解码问题是编码问题的逆问
题, 同样给出了四个算法.
此外, 本文还给出了希尔伯特曲线的一个变体, 该变体相对于传统的希尔伯
特曲线有一个优势, 即任意一个坐标或者序, 它对应的序或者坐标, 不随曲线的阶
数改变而变化. 该性质有助于在实际应用中减少计算时间. 相应的, 给出了这个
变体的编码解码算法.
最后通过二维的例子展示了将本章给出的算法具体化的过程, 并给出了程序
优化的建议.
38
学位论文
第四章
PHG 动态负载平衡模块的设计与实现
偏微分方程的并行求解, 关键问题之一是网格划分, 它不仅要求每个进程拥
有相等的计算负载, 同时要求有良好的划分质量, 以减少进程间通信. 在自适应
有限元计算过程中, 网格/基函数不断调整, 会导致负载不平衡, 必须动态地调整
网格分布, 从而实现动态负载平衡. 动态负载平衡算法需要速度快、网格划分质
量高、具有增量性质并且是并行运行的. 本章介绍 PHG 中动态负载平衡的算法
及实现.
PHG 的层次网格结构与动态负载平衡
§4.1
PHG 的计算网格为协调四面体网格. PHG 采用的是最新顶点二分加密算法,
存储了四面体单元所有的前辈, 以二叉树的形式表示. PHG 将网格分布到不同进
程中, 每个进程拥有一个子网格, 子网格的单元 (叶子) 是互不重叠的, 同时进程
中存储了单元所有的前辈, 形成一个分布式层次网格结构. 本节介绍 PHG 的层
次网格结构、网格划分及分布式层次网格.
§4.1.1
二分自适应网格加密、放粗与 PHG 的层次网格结构
PHG 的自适应网格加密方法为最新顶点二分加密算法 [1], 也称为“边加密”
算法. 对一个单元加密时, 将它一条边 (称为加密边) 的中点与与之相对的两个顶
点相连, 将单元一分为二, 如图 4.1 所示. 一个单元被加密后, 加密产生的单元称
为它的子单元, 该单元称为加密所产生的子单元的父单元.
Parent
Child 0
Child 1
图 4.1 四面体二分加密
39
学位论文
40
PHG 的四面体网格经过多次二分加密后, 形成一个以单元为结点的二叉树
结构, 一个单元经过加密后产生两条分枝, 分别对应它的两个子单元. 所有叶子
单元构成当前网格层, PHG 保证当前网格层总是协调的. 下面用二维协调三角形
网格做例子 (三维协调四面体网格的二叉树结构与二维协调三角形网格相同), 如
图 4.2 所示. 在这个例子中, 初始网格包含一个单元 e0 , 将它加密一次得到两个新
单元 e1 和 e2 , 再将 e1 和 e2 各加密一次得到四个新单元 e3 , e4 , e5 , e6 , 最后将 e3 ,
e4 和 e5 各加密一次得到新单元 e7 , e8 , e9 , e10 , e11 和 e12 , 最终网格由 e6 , e7 , e8 , e9 ,
e10 , e11 和 e12 构成.
V
V1
e0
e1
e4
V2
e5
e2
e3
e6
V
e0
e1
e10 e12
e3
e9 e11
e7
e8
e2
e6
e7
e4
e8
e9
e5
e10
e11
e6
e12
图 4.2 层次网格结构的二叉树表示
层次网格结构简单, 数据组织直观, 直接反映了 PHG 的内存管理模式. PHG
设计了单元数据结构 SIMPLEX, 提供了子单元成员分别指向两个子单元, 通过这个
成员实现了二叉树. PHG 实现了深度优先搜索算法遍历整个加密树, 同时提供了
函数接口访问所有网格单元; PHG 提供了邻居成员指向各个面对应的邻居单元,
通过指针实现邻居单元的快速访问; PHG 提供了 parent 成员指向父单元, 对根
单元而言 parent 为空指针, 在该成员的帮助下, 可以实现自下而上的回溯访问.
§4.1.2
网格划分
PHG 采用的划分方法是以单元为单位将网格划分为子网格, 每个进程负责
一个子网格, 每个进程仅存储它所拥有的子网格上的数据, 不在本地的数据通过
进程间通信获得. 对于传统并行有限元, 由于计算过程中网格保持不变, 仅需做一
次网格划分, 划分质量要求很高, 但对划分时间的限制较少. 而对并行自适应有
限元或者涉及时间的问题, 网格/基函数根据数值解调整, 会导致负载不平衡, 程
序需要根据计算负载对网格分布做动态调整. 在这类应用中, 网格划分方法需要
第四章 PHG 动态负载平衡模块的设计与实现
41
满足以下条件: 1) 能在分布式数据上并行执行; 2) 执行速度快, 因为它们可能会
被频繁调用; 3) 能产生高质量的划分; 4) 最好是增量的, 即网格的微小变化仅导
致划分的微小变化; 5) 内存使用是适量的.
并行计算中的数据划分方法可以分为两类: 基于几何性质的划分方法和基于
图的划分方法 [125, 126, 127, 128, 129]. 基于几何性质的划分方法是利用对象 (粒
子、单元等) 的几何信息划分数据, 如坐标, 常用的方法有递归坐标二分方法 RCB
(Recursive Coordinate Bisection) [60, 140, 141] 、递归惯量二分方法 RIB (Recursive
Inertial Bisection) [61, 142]、空间填充曲线划分方法 SFC (Space-Filling Curve) [62,
130, 131, 145, 146] 等. 基于图的划分方法是利用对象的拓扑信息, 如网格中单元的
邻居关系, 常用方法有递归图二分方法 (Recursive Graph Bisection) [60]、贪婪算法
[63]、递归谱二分方法 RSB (Recursive Spectral Bisection) [60, 142, 143, 144]、K-L 算
法 (Keinighnan-Lin Algorithm) [64]、多水平方法 (multilevel methods) [16, 135, 136,
137, 132, 133, 134] 和扩散方法 (diffusive methods) [18, 138, 139] 等. 图方法和几何
方法各有优缺点. 图方法运行时间长, 由于显式地控制通信量, 划分质量高. 几何
方法在空间局部性很重要或者拓扑结构不存在的情况下是非常有效的, 几何方法
没有显式控制通信量, 它只是根据空间位置信息划分, 可能会导致通信量很大, 但
几何划分方法简单, 它们容易实现并且速度快. 同时, 像递归坐标二分方法、空间
填充曲线划分方法等, 它们是隐式增量的 [125], 数据迁移的代价比较小. 在并行
自适应有限元计算中, 最终目标是极小化总体计算时间, 包括划分时间、数据迁
移时间及有限元求解时间. 它们是相关的: 质量高的划分会减少有限元计算时间,
但可能会需要更多的划分时间; 质量差的划分需要时间少, 但可能增加有限元计
算时间. 在实际应用中, 需要根据实际情况综合考虑这些因素. 下面给出几种常
用划分方法的细节:
• 递归坐标二分方法 (RCB) [60, 140, 141]. 交替地在每个空间方向上用一个平
面 (3D) 或者一条直线(2D) 将对象分成两个子集, 使得两个子集中的对象数
目 (或权重) 是近似相等的. 划分的平面或者直线垂直于给定的方向. 对于一
个待划分的集合, RCB 选择最长方向进行分割. RCB 方法没有考虑集合的形
状及长宽比. Jones 和 Plassmann[141] 对这个算法做了改进, 他们将新的方法
叫做 URB (Unbalanced Recursive Bisection). 由于通信量与长宽比有很大的关
系, URB 将待分集合分成两个长宽比接近的集合. 假设有 n 个进程, URB 会
从子集大小比例为 1 : (n - 1), 2 : (n - 2), 3 : (n - 3) 等划分中选择满足上述条
件的划分. Jones 和 Plassmann 在文章中指出该划分会降低通信量. RCB 及
URB 是隐式增量的.
42
学位论文
• 递归惯量二分方法 (RIB) [61, 142]. RIB 也是递归地选择一个平面或者直线将
对象集合分成两个大小相等的子集, 但它选择的平面或者直线不是垂直于坐
标轴的, 而是根据对象的分布, 在空间中选择一个最长方向, 用一个垂直于这
个方向的平面或者直线将对象分成两个子集. 该方法对惯量轴敏感, 因而不
是增量的划分方法.
• 空间填充曲线划分方法 (SFC) [62, 130, 131, 145, 146]. 该方法由 Patra 和 Oden
首先应用在网格自适应加密问题中 [145, 146]. SFC 方法是根据空间填充曲线
将 n- 维问题映射成 1- 维问题, 然后对 1- 维问题进行划分. 对于映射, 可以选
择希尔伯特序, Morton 序等. 该方法是增量的, 方法简单, 容易实现. SFC 方
法划分质量不如图划分质量高, 但运行速度快, 在动态负载平衡中很有竞争
力.
• 多水平方法 (multilevel method) [16, 132, 133, 134, 135, 136, 137]. 多水平方法
是图划分中最流行的方法. 多水平方法类似 V- 循环多重网格方法, 通过将一
些顶点缩成一个顶点, 将图放粗成一个更小的图, 形成一个放粗序列, 然后在
最小的图上进行划分, 最后通过加密过程得到划分结果.
• 递归谱二分方法 (RSB) [60, 142, 143, 144]. 谱划分方法先构造图的 Laplacian
矩阵, 然后求该矩阵的第二小的特征值对应的特征向量 (Fiedler vector), 每个
顶点给定一个对应于这个特征向量的值, 从而将图划分问题变成一维划分问
题. 谱方法划分质量高, 但特征值特征向量的求解代价高, 一般用在静态划分
中.
网格划分是并行计算的核心算法之一. 常用的图划分及几何划分软件如下:
• PaToh[151]. PaToH (Partitioning Tools for Hypergraph) 是一款串行多水平超图
划分软件, 号称是最快的串行超图划分软件. 它可以划分普通的超图, 也可以
划分带有多个限制条件的超图.
• Chaco[152]. Chaco 是一个串行多水平图划分软件. 主要功能有: 扩展了谱方
法, 允许使用两个或者三个 Laplacian 特征向量将图四等分或者八等分, 并为
谱方法提供了高效健壮的特征值特征向量解法器; 提供了通用的 KernighanLin/Fiduccia-Mattheyses 算法, 可以处理带权图; 改进了图和并行体系结构之
间的映射算法; 提供了各种后处理功能以改进划分质量.
• SCOTCH[154] 及 PT-SCOTCH[153]. SCOTCH 是一个串行软件, 提供了图划
第四章 PHG 动态负载平衡模块的设计与实现
43
分、静态映射、稀疏矩阵排序、网格和超图划分; PT-SCOTCH 是 SCOTCH
的并行化版本.
• Parkway[150]. Parkway 是一个并行超图划分软件, 它基于 C++ 和 MPI 实现
了多水平超图划分算法.
• METIS[17], hMETIS[155] 及 ParMETIS[14]. METIS (Serial Graph Partitioning
and Fill-reducing Matrix Ordering) 是一个串行程序集合, 提供了图划分、有
限元网格划分以及稀疏矩阵填充约化 (fill-reducing) 排序功能. METIS 中实
现的算法是基于多水平二分递归算法、k- 路多水平算法及多限制划分算法
等. ParMETIS (Parallel Graph Partitioning and Fill-reducing Matrix Ordering)
是 METIS 的并行版本, 基于 MPI, 适合并行自适应计算及大规模并行处理.
hMETIS (Hypergraph & Circuit Partitioning) 是一个串行超图划分软件, 它基
于多水平超图划分算法实现.
• Zoltan [19, 18]. Zoltan 是美国 Sandia 国家实验室开发的一个软件, 它包含一
系列并行工具以简化并行程序的编程. 它提供了几何划分、图划分、超图划
分功能, 同时提供了数据迁移工具、并行图染色、非结构通信服务及动态内
存管理等. 它为程序在不同划分算法之间切换提供了方便.
• JOSTLE [65]. JOSTLE 是为在分布式并行机上划分非结构网格 (有限元网格、
有限体积网格等) 设计的, 同时可以对网格进行重划分. JOSTLE 将网格看成
非结构图, 使用最新的图划分算法实现, 提供了多水平图划分算法及扩散算
法, 运行速度很快, 拥有串行和并行两个版本.
§4.1.3
PHG 的分布式二叉树
PHG 的网格是分布式存储的, 网格划分基于单元 (二叉树中的叶子) 进行, 当
用 p 个进程并行处理时, PHG 将网格划分成 p 个子网格, 即将网格中单元集合分
解成 p 个互不相交的子集, 每个子集构成一个子网格. 相应地, 描述网格层次结构
的二叉树被划分成 p 棵子树, 每棵子树包含子网格中的叶子单元和它们所有的前
辈 (上层单元). 图 4.3 是将图 4.2 中的网格划分为两个子网格 (p = 2) 时的子网
格和子树示意图, 其中第一个子网格包含叶子单元 e7 , e8 和 e9 , 第二个子网格包
含叶子单元 e6 , e10 , e11 和 e12 . 在不同子树中, 叶子单元互不相同, 但非叶子单元
则可能有重复. 这种子树结构既方便在网格层次间进行遍历, 又具有并行可扩展
性. 缺点是动态负载平衡时需要迁移子树及进行子树的重组, 大大增加了动态负
载平衡实现的复杂度.
学位论文
44
e0
e10 e12
e9
e7
e8
submesh 0
e0
e1
e11
e1
e3
e6
e4
e7
submesh 1
e8
e9
e2
e4
e5
e10
subtree 0
e11
e6
e12
subtree 1
图 4.3 分布式层次网格
§4.1.4
动态负载平衡
在自适应有限元计算中, 网格/基函数调整后, 如果进程的计算负载不平衡,
需要重新调整网格和数据分布, 使得各个进程保持相等量的计算负载, 保证每个
进程都处于繁忙状态, 同时尽可能减少它们之间的通信. PHG 中动态负载平衡与
有限元计算的关系如图 4.4 所示. PHG 中, 负载不平衡因子定义如下,
LIF =
Pp−1
Wi
,
p × max{W0 , · · · , Wp−1 }
i=0
(4.1)
其中 Wi 表示进程 i 的计算负载. PHG 的动态负载平衡主要由如下几个步骤构
成:
(1) 检查网格在各进程中的分布是否平衡, 即判断 LIF 是否大于事先设定的阈值.
如果 LIF 大于事先设定的阈值, 则调用相关的函数重新进行网格划分; 否则,
则继续使用当前的网格划分;
(2) 网格划分: 调用划分程序重新划分网格, 使得每个进程拥有相等的计算负载,
同时使得进程间的通信量最少.
(3) 子网格 – 进程映射: 对新的划分, 计算子网格到进程的映射, 使得从老划分到
新划分的数据迁移量最少.
(4) 网格单元迁移和二叉树重组: 网格分布发生了改变, 将单元按新划分发送到
所属的进程, 重组子网格和二叉树.
(5) 自由度数据迁移: 将单元上的自由度数据迁移到对应的进程上, 重建有限元
空间, 维护数据的正确性和完整性.
本节仅给出动态负载平衡的几个主要步骤, 后面内容将详细介绍网格划分算
法、子网格 – 进程映射、数据迁移等.
第四章 PHG 动态负载平衡模块的设计与实现
45
图 4.4 PHG 中的动态负载平衡
§4.2
网格划分方法
PHG 提供了与软件包 ParMETIS[14, 16] 和 Zoltan[18, 19] 的接口, 前者提供
了多水平图划分方法, 后者提供了超图划分方法以及常用的几何划分方法, 如递
归坐标二分方法、递归惯量二分方法、希尔伯特空间填充曲线划分方法. 除此之
外, 我们在 PHG 中实现两种网格划分方法: 加密树划分方法 [83, 84] 和空间填充
曲线划分方法 [62, 125, 126, 127, 128]. 本节下面部分对这两个方法及实现进行介
绍.
学位论文
46
§4.2.1
加密树划分方法
PHG 存储自适应过程中生成的加密树, 利用加密树划分方法实施网格划分是
一个很自然的想法. 加密树划分方法 (refinement-tree partition method) 由 William
Mitchell[84] 提出, 该方法基于加密/放粗过程中产生的二叉树, 它调用深度优先遍
历算法访问二叉树, 按照访问顺序对网格单元排序. 二叉树的遍历需要满足条件:
先访问左孩子, 然后是右孩子. 由于要求当前叶子结点与下一个被访问的叶子结
点有一个共享面, 加密树划分方法有良好的划分质量. 取二维区域做例子, 如图
4.5 所示, 这棵加密树与图 4.2 中的加密树是相同的, 只是调整了孩子结点的顺序,
对这棵加密树采用常规的深度优先遍历, 按照访问顺序相邻两个叶子单元之间有
一个公共边 (三维为面). 如果加密树不能使上述条件成立, 则需要动态地调整孩
子结点的访问次序使条件成立.
V
V1
e0
e1
e4
V2
e5
e2
e3
e6
V
e0
e1
e10 e12
e3
e9 e11
e7
e8
e2
e6
e7
e4
e8
e9
e5
e10
e11
e6
e12
图 4.5 二分加密产生的加密树
在加密树中按下面方法给每一个结点赋予一个权重 w: 叶子结点的权重由
用户给定, 非叶子结点的权重为以该结点为根的子树的所有叶子结点的权重和.
Mitchell 的算法由两步组成, 第一步先计算每一个结点的权重, 第二步将加密树二
分, 使得每个集合 (set) 中的叶子数目相等, 递归调用二分算法来完成网格划分.
按照 Mitchell 的分析, 算法的计算复杂度为 O(N log p + p log N ), 其中 N 为叶子结
点数目. 细节如算法 2 所示.
上述算法需要计算每一个结点的权重, 由于父单元在多个进程中同时存在,
在计算父单元的权重时, 通信比较复杂. 我们重新设计了算法, 为每一个叶子结
点定义前缀和 (prefix sum). 按照叶子结点的访问顺序, 叶子结点的前缀和定义为:
在到达该叶子结点之前访问的所有叶子结点的权重之和. 下面给出形式化定义,
第四章 PHG 动态负载平衡模块的设计与实现
47
算法 2: 二分加密树划分算法
algorithm bisect
compute subtree weights
bisect subtree(root)
end algorithm bisect
algorithm bisect subtree(node)
if node is a leaf then
assign node to the smaller set
elseif node has one child then
bisect subtree(child)
else node has two children
select a set for each child
for each child examine the sum of the subtree weight with
the accumulated weight of the selected set
for the smaller of the two sums, assign the subtree rooted
at that child to the selected set and add the subtree weight
to the weight of the set
bisect subtree(other child)
endif
end algorithm bisect subtree
按照叶子结点的访问顺序, 为每一个叶子结点赋予一个位置编号, 从 0 开始, 则第
i 个叶子结点的前缀和为
Si =
i−1
X
wj
(4.2)
j=0
其中 wj 为叶子结点 j 的权重, 式 (4.2) 可以改写为
Si =
i−1
X
j=0
wj = Sq +
i−1
X
wj , (q < i).
(4.3)
j=q
假设所有叶子结点的权重之和为 W , 进程数为 p, 那么所有前缀和属于区间 [W
i/p, W (i+1)/p) 的叶子单元分配给子网格 i (0 ≤ i < p). 通过分析可以看出, 只要
计算出叶子结点的前缀和, 就可以通过计算叶子结点所属区间来完成划分.
学位论文
48
当网格位于一个进程中时, 仅需遍历一次加密树即可完成划分, 算法复杂度
为 O(N ). 当网格分布在不同进程中时, 假设进程数为 p, 每个进程含有的叶子结
点数目分别为 ni (0 ≤ i < p), 进程 i 上叶子结点权重之和为 Wi (0 ≤ i < p). 定义
叶子单元在本进程中的局部位置编号, 即叶子结点按照在本进程中访问顺序从 0
开始的编号. 定义 Si,j 为进程 i 上局部编号为 j 的叶子单元的前缀和, 那么由式
(4.3) 可以推导出
Si,j =
i−1
X
k=0
Wk +
j−1
X
wj = Si,j−1 + wj−1 ,
(4.4)
k=0
上式表明, 只要知道了 Wi (0 ≤ i < p) 就可以在每一个进程中计算出所有叶子结
点的前缀和. 在每个进程上, 遍历一次加密树就可以知道本进程所有叶子结点的
权重和 Wi (0 ≤ i < p), 然后通过第二次遍历就可以同时完成计算前缀和及网格
划分. 算法如下所示.
算法 3: PHG 实现的加密树划分算法
Step 1. 每个进程访问本地的子树, 计算所有本地叶子结点的权重和 Wi .
Step 2. 调用 MPI_Scan 操作, 为每个进程收集其需要的 Wi (0 ≤ i < p).
Step 3. 访问本地子树, 根据式 (4.4) 计算每一个叶子结点的前缀和, 并同时完成划
分.
本文设计的算法简洁, 仅需遍历两次加密树以及一次 MPI_Scan 通信, 算法的
计算复杂度为 O(N ). 对加密树划分算法, 由于初始网格会包含许多单元, 因而也
会有多个加密树, 加密树的访问顺序是按照根结点的顺序, 只需对初始网格 (根结
点) 排序, 并在整个自适应过程中维护这个序, 以保证在整个自适应过程中访问子
树的顺序是相同的. PHG 提供了三种单元排序方式: 哈密尔顿路排序, 希尔伯特
序和 Morton 序. 哈密尔顿路排序是将单元按照第二章设计的哈密尔顿路算法排
序; 希尔伯特序和 Morton 序方法是将单元的重心坐标按照这两种序的定义映射
到一维区间, 在一维区间上按照数值大小排序.
函数 phgPartitionRTK 实现了加密树划分算法, 接口如下:
BOOLEAN phgPartitionRTK(GRID *g, int np, DOF *w, FLOAT p),
其中 np 给出子网格数量, 自由度对象 w 给出单元的权重, p 为权重的指数, 单元
e 实际的权重为 wep .
PHG 设计了如下辅助函数用于对初始网格排序:
第四章 PHG 动态负载平衡模块的设计与实现
49
(1) 函数 phgHamiltonPath 实现了哈密尔顿路排序, 接口如下:
int phgHamiltonPath(GRID *g),
其中返回 0 表示成功, 非 0 表示程序失败;
(2) 函数 phgHilbertOrder 实现了希尔伯特序排序, 接口如下:
int phgHilbertOrder(GRID *g),
其中返回 0 表示成功, 非 0 表示程序失败;
(3) 函数 phgMortonOrder 实现了 Morton 序排序, 接口如下:
int phgMortonOrder(GRID *g),
其中返回 0 表示成功, 非 0 表示程序失败;
(4) 函数 phgGridInitOrder 负责调用上面三个函数之一完成对初始网格的排序,
接口如下:
int phgGridInitOrder(GRID *g, BOOLEAN dist),
其中 dist 变量表明网格是否为分布式的, 返回 0 表示成功, 非 0 表示程序失
败.
目前上述几个排序程序都是串行的.
§4.2.2
空间填充曲线划分方法
网格划分中利用空间填充曲线将高维空间映射成一维空间, 完成单元的排
序, 从而将高维划分问题转化为一维划分问题. Morton 空间填充曲线和希尔伯特
空间填充曲线均具有较好的空间局部性, 划分质量比较好, 是最常用的两种曲线
[62, 130, 131, 145, 146].
空间填充曲线划分方法分为三个步骤. 第一个步骤是计算空间填充曲线, 首
先将计算区域映射到立方体 (0, 1)3 , 然后调用空间填充曲线生成算法将立方体映
射到区间 (0, 1); 第二个步骤是划分区间 (0, 1), 使得属于每个区间单元的权重和
相等; 第三个步骤是调用子网格 – 进程映射算法, 对子网格重新编号以减少数据
迁移.
对计算区域 Ω, 存在一个长方体 (三维, 在二维情况下为长方形) 包围盒 (bounding box) 包含这个区域, 假设包围盒在 x, y, z 三个方向的长度分别为 lenx , leny , lenz ,
学位论文
50
将区域映射到 (0, 1)3 的通常的做法是
x1 = (x − x0 ) / lenx , y1 = (y − y0 ) / leny , z1 = (z − z0 ) / lenz ,
其中 (x0 , y0 , z0 ) 是包围盒坐标最小的顶点, (x1 , y1 , z1 ) 为坐标 (x, y, z) 经过变换后
在立方体 (0, 1)3 中的坐标. 上述变换改变了区域的长宽比, 使得变换后的长宽比
为 1 : 1 : 1, 破坏了区域的空间局部性. PHG 中取 len = max(lenx , leny , lenz ), 采用
变换
x1 = (x − x0 ) / len, y1 = (y − y0 ) / len, z1 = (z − z0 ) / len,
该变换保持区域的空间局部性, 改善了划分质量, 这一点将在后面用数值算例加
以验证.
对空间填充曲线划分算法, 我们提供了两种空间填充曲线生成程序: Morton
空间填充曲线和希尔伯特空间填充曲线. 前者的算法简单, 但曲线本身有较大的
跳跃, 使得空间局部性略差. 希尔伯特空间填充曲线的空间局部性要好很多, 但
生成算法复杂.
利用空间填充曲线对单元排序, 然后调用 §4.2.3 中介绍的一维划分算法及
§4.2.4 中介绍的子网格 – 进程映射算法便可完成网格划分. 我们在 PHG 中实现
了下述空间填充曲线生成及网格划分函数:
(1) 函数 phgSFCInvHilbert2D 及 phgSFCInvHilbert3D 实现了二维和三维希尔伯
特空间填充曲线向一维区间 [0, 1] 的映射, 接口如下:
BOOLEAN phgSFCInvHilbert2D(SFC *hsfc, INT n),
BOOLEAN phgSFCInvHilbert3D(SFC *hsfc, INT n),
其中数组 hsfc 存储需要转换的坐标 (∈ [0, 1]3 ) 和映射, n 为数组的长度, 数据
结构 SFC 定义如下:
typedef struct {
SFC_FLOAT co[3];
SFC_FLOAT sfc;
INT index.
} SFC;
其中成员 co[3] 给出空间点的坐标 (∈ [0, 1]3 ), sfc 返回映射结果, 辅助成员
index 存储着单元的本地索引.
第四章 PHG 动态负载平衡模块的设计与实现
51
(2) 函数 phgSFCInvMorton2D 及 phgSFCInvMorton2D 实现了二维和三维 Morton 空
间填充曲线向一维区间 [0, 1] 的映射, 接口如下:
BOOLEAN phgSFCInvMorton2D(SFC *msfc, INT n);
BOOLEAN phgSFCInvMorton3D(SFC *msfc, INT n);
其中参数 msfc 和 n 的意义与希尔伯特空间填充曲线相同. 这两种曲线的阶
数都是 25, 在源文件中直接修改 MAXLEVEL 的数值可以获得阶数 20 到 30 之
间的空间填充曲线.
(3) 函数 phgPartitionSFC 实现了空间填充曲线划分方法, 接口如下:
BOOLEAN phgPartitionSFC(GRID *g, int np, DOF *w, FLOAT p);
其中 g 为网格信息, 划分编号直接存储在单元 e 的成员 mark 中, np 为子网
格数量, 自由度对象 w 为权重, p 为权重的指数, e 的实际权重取为 wep .
§4.2.3
一维划分算法
上节的空间填充曲线划分方法及其他一些网格划分方法最终均将问题转化
为一维划分问题, 因此实现一个高效健壮的一维划分程序是必要的.
假设当前进程数为 p 以及给定区间 [a, b), 这里的一维划分问题为: 如何将 [a,
b) 划分成 p 个子区间 [a, a1 ), [a1 , a2 ), · · · , [ap−2 , ap−1 ), [ap−1 , b), 使得每个区间上包
含的对象的权重和相等.
从问题的描述可以看出, 一维划分需要计算 p − 1 个分割点 a1 , a2 , · · · , ap−2 ,
ap−1 . 我们在 PHG 中实现了一个一维划分算法求解该问题, 其基本算法来源于
Zoltan[18], 它是二分搜索算法的推广. 在二分搜索算法中, 只需求解一个点 a1 , 将
区间分成两个子区间. 如果将区间 k (k ≥ 2) 分而不是二分, 那么 a1 将位于某个
子区间中, 接着将这个子区间 k 分, 重新得到 [a, b) 的一个划分, a1 将位于上述 k
个更小的子区间中的一个. 重复这个过程, 可以在给定的精度下搜索到 a1 . 将这
个算法推广, 将区间 [a, b) 划分成 N (N À p) 个子区间, ai (0 < i < p) 将位于某
个子区间, 然后将子区间细分, 最终在给定的精度下可以搜索到 a1 , a2 , · · · , ap−2 ,
ap−1 .
具体实现时, 我们取子区间数为 N = (p − 1) ∗ k + 1, 程序为每一个划分点
ai (0 < i < p) 维护一个包围盒 (bounding box). 在每一次划分之前先更新这些
包围盒, 缩小 ai (0 < i < p) 的取值范围, 重新划分区间 [0, 1) 的时候, 直接划
分 ai 所在的包围盒, 而不是 ai (0 < i < p) 所在的某个子区间, 这样会加速求解
ai (0 < i < p) 的过程. 对该一维划分算法, 我们实现了两个不同的版本: 第一个版
学位论文
52
本 phgPartition1DV1 的子区间数目始终为 N ; 第二个版本 phgPartition1DV2 是
一个自适应版本, 其子区间数目不是固定的, 当某个 ai (0 < i < p) 达到精度要求
之后, 其所在的包围盒将不再细分, 子区间数目是一个递减的过程, 通过减少不必
要的划分, 加快划分速度. 两个函数的接口如下:
FLOAT phgPartition1DV1(DOTS *x, INT lenx, int np, MPI_Comm comm),
FLOAT phgPartition1DV2(DOTS *x, INT lenx, int np, MPI_Comm comm).
其中 x 是对象数组, 包含当前进程所有对象的权重、坐标 (∈ [0, 1), lenx 是数组的
长度, np 是子网格数, comm 是当前的通信器. DOTS 的定义如下:
typedef struct {
FLOAT key;
FLOAT w;
int pn;
} DOTS;
其中 key (∈ (0, 1)) 是一维坐标, w (≥ 0) 是对象的权重, 通常情况下为正数, pn 是
对象所在划分的编号, 用于返回结果.
§4.2.4
子网格―进程映射
网格划分完成后, 需要将子网格映射到进程上, 该映射尽量使得从老划分到
新划分的数据迁移量最小 [148]. Oliker 和 Biswas 设计了一个启发式算法处理这
个问题, 他们的算法可以得到次优解 [72, 147, 148]. 我们在 PHG 中实现了该算法.
Oliker 和 Biswas 的算法先对数据迁移建模. 用相似矩阵 S (similarity matrix)
表示数据在所有进程中的分布情况. S 在 PHG 中是一个 pold × p 的矩阵, pold 是
当前子网格数, p 为新子网格数 (在通信器不变的情况下, pold 与 p 是相等的), 相
似矩阵 S 的元素 Si,j 表示编号为 i 的子网格中需要迁移到编号为 j 的子网格中
的数据量. 实际计算中, 每个进程并发地计算相似矩阵的一行, 然后通过一个主
进程收集这些信息创建一个相似矩阵, 根据这个相似矩阵计算子网格 – 进程映射
关系, 最后通过一个广播操作将映射关系发送给所有进程.
优化子网格 – 进程映射时, 需要针对不同的体系结构上需要建立不同的代价
方程 (cost function) 以优化数据迁移开销. 常用的两种度量是: TotalV 和 MaxV.
TotalV 极小化所有进程数据迁移量之和; MaxV 极小化单个进程的最大数据迁移
量. Oliker 和 Biswas 的算法中使用的度量是 TotalV. 给定一个相似矩阵 S, 其数
据总和是确定的, 极小化数据迁移与极大化保持数据不动是等价的, 目标是寻找
一个映射 i → pi (i = 0, · · · , p − 1) 极大化如下代价方程
第四章 PHG 动态负载平衡模块的设计与实现
F =
X
53
Si,j ,
pj =i
0≤j<p
其中 (p0 , p1 , · · · , pp−1 ) 是 (0, 1, · · · , p-1) 的一个置换.
Oliker 和 Biswas 设计了一个启发式贪婪算法解决该问题, 所得到的映射是次
优的, 算法的伪代码如下所示, 本文对算法稍微做了修改以适应 PHG 中的应用情
况.
算法 4: 启发式子网格―进程映射算法
for (j = 0; j < p; j++) part_map[j] = unassigned;
for (i = 0; i < p; i++) proc_unmap[i] = 1;
generate list L of entries in S in descending order;
count = 0;
while( count < p) {
find next entry S[i][j] in L such that
proc_unmap[i] > 0 and part_map[j] = 1;
proc_unmap[i] = 0;
part_map[j] = assigned;
count++;
map partition j to processor i;
}
我们在 PHG 中实现了三个子网格 – 进程映射函数, 接口分别如下:
int phgPartitionRemap(GRID *g, int nprocs, MPI_Comm comm),
int phgPartitionRemapV2(GRID *g, int nprocs, MPI_Comm comm),
int phgPartitionRemapV3(double ds[],int perm[],int np, MPI_Comm comm),
前两个函数中, g 为 PHG 的网格, 对其中每个单元 e, e->mark 进入函数时存储了
它在新划分中所属的子网格编号, 而从函数返回时则存储着重映射后的新编号.
学位论文
54
phgPartitionRemapV3 是一个通用的函数接口, ds 存储了当前进程迁往每个进程
的数据迁移量, 映射结果在 perm 中返回, np 为新划分的个数, 数组 ds 与 perm 的
长度均为 np. 该函数除可用于子网格 – 进程映射外, 还可用于计算其他一些应用
中优化通信的映射.
函数 phgPartitionRemap 和 phgPartitionRemapV2 的功能是一样的, 后者仅
存储相似矩阵的非零元, 有着更好的空间复杂度. 如果重映射后子网格编号发生
了变化, 则它们返回一个大于零的值; 如果编号没有变化, 则返回零; 如果计算失
败, 则它们返回小于零的值, 此时子网格编号保持不变.
§4.2.5
划分质量度量
对并行自适应有限元计算而言, 网格划分质量直接影响总体计算时间. 最重
要的划分质量度量指标是进程的计算负载的平衡. 此外, 还需要考虑极小化通信
代价, 该目标对应着极小化子网格共享面的数目, 因为共享面上的数据近似等于
计算中需要通信的数据. 在图划分中, 共享面与割边 (cut edge) 的概念是等价的.
这里, 我们采用两个度量指标来衡量划分质量: 表面比 (surface index) 和进程间
连通系数 (interprocess connectivity). 表面比衡量的是通信量的大小, 进程间连通
系数衡量的是需要通信的进程数 [62, 149].
表面比定义为子网格的边界面的数目与所有面的数目的比值 (在二维中为边
的数目比值). 如果共有 n 个子网格, bi 和 fi 分别代表子网格 i 中边界面的数目
和总面数, 那么最大局部表面比 (maximum local surface index) 定义为
bi
.
0≤i<n fi
rM = max
(4.5)
假如 bt 和 ft 分别表示所有子网格的边界面数目之和与整个网格中面的总数目,
那么可以定义全局表面比 (global surface index)
rG =
bt
.
ft
(4.6)
而平均表面比 (average surface index) 则定义为
n−1
rA =
1 X bi
.
n
fi
(4.7)
i=0
进程间连通系数是指与给定子网格相互连通的子网格的数量. 它衡量与该进
程进行通信的进程数目. 最大进程间连通系数 (maximum interprocess connectivity)
是程序可扩展性的一个重要衡量指标 [62].
第四章 PHG 动态负载平衡模块的设计与实现
55
PHG 的动态负载平衡模块
§4.3
前面介绍了 PHG 中的网格划分算法, 本节将介绍 PHG 的动态负载平衡模
块及相应的用户接口函数, 并给出一些实现细节.
§4.3.1
动态负载平衡函数
PHG 中, 网格的负载不平衡因子保存在网格对象中, 并由 PHG 自动计算及
维护. PHG 的动态负载平衡函数由用户调用, 一般在网格/基函数调整后立即调
用, PHG 的动态负载平衡函数接口如下:
int phgBalanceGrid(GRID *g, FLOAT lif, INT sm, DOF *w, FLOAT p),
其中 g 为网格对象; lif 是动态负载平衡的阈值, 网格的负载不平衡因子大于该
阈值则进行网格重划分; sm 用来控制子网格的数目, 使得子网格的平均单元数目
不小于这个值, 用户可以将其设置负值或者零, 此时表示子网格的最小平均单元
数目为 1; w 和 p 两个参数给出单元的计算负载, 即单元 K 的计算负载为 wpK , w
可以为 NULL, 表示所有单元的计算负载相等.
§4.3.2
网格划分和数据迁移
PHG 的网格对象与一个 MPI 通信器相关联, 通信器中的进程数等于当前网
格划分的子网格数, 当动态负载平衡函数被调用时, PHG 将首先根据 sm 参数、当
前网格中的单元数、最大可用的进程数等判断是否需要调整通信器, 如果需要将
创建一个包含更多进程的通信器. 接着调用划分程序划分网格, 划分结果直接保
存在每个单元中, 单元 e 的成员 mark 存储了该单元所属的子网格编号.
网格划分函数结束时, 返回一个逻辑值说明网格分布是否被改变, FALSE 表明
网格分布保持不变, TRUE 表明网格分布发生改变. 如果网格分布发生改变, 动态
负载平衡函数将调用数据重分布函数重组子网格以及迁移自由度数据等. 其中,
重组子网格包括迁移网格单元、为新的子网格建立相应的分布式二叉树、建立子
网格内部及子网格间的邻居关系等, 包含许多复杂的通信和处理, 在此不做详述.
§4.4
数值算例
本节给出数值算例, 比较不同划分方法的性能、划分质量以及对有限元计
算性能影响. 数值算例分为两个部分, 第一部分考察不同划分方法的划分质量,
衡量指标采用前面介绍的表面比 (surface index) 和进程间连通系数 (interprocess
connectivity). 第二部分使用自适应有限元方法求解偏微分方程, 比较不同划分方
学位论文
56
法对程序性能的影响.
§4.4.1
划分质量比较
本节比较不同划分方法划分质量的优劣, 划分方法包括: ParMETIS, HSFC
(PHG 的希尔伯特空间填充曲线划分方法), MSFC (PHG 的 Morton 空间填充曲线
划分方法), RCB (Zoltan 的递归坐标二分划分方法) 和 Zoltan 的 HSFC. 其中第
一个是图划分方法, 其余几个是几何划分方法.
本节使用了两个网格, 第一个网格 Ω1 是一个圆柱体, 如图 4.6 所示, 直径小
但长度较长, 有较大的长宽比, 网格的单元数目为 2,522,624. 第二个网格 Ω2 是一
个多孔薄板区域, 面积较大, 但很薄, 同时有很多的小孔, 如图 4.7 所示, 单元数目
为 3,713,792. 两个网格均由 Netgen[81] 生成.
图 4.6 测试网格 Ω1 (圆柱体)
表 4.1 给出各种划分方法产生的子网格的最大进程间连通系数. 对第一个
网格 Ω1 , ParMETIS 的划分质量最好, 其次是 RCB, MSFC, PHG/HSFC, 最后是
Zoltan/HSFC, 当子网格数目小于或等于 64 时, PHG/HSFC 的最大进程间连通系
数明显低于 Zoltan/HSFC. 对第二个网格结论是类似的. 需要说明的是这两个区
域比较规则, 很适合 RCB 这类算法.
表 4.2 给出子网格的最大表面比和平均表面比, 这两个指标直接衡量了通信
量的大小, 其中最大表面比衡量了单个进程最大的数据发送/接收量, 平均表面
比衡量了全局的数据发送/接收量, 比值越小表明划分质量越好. 从表中可以看出
ParMETIS 的边界面所占的比例始终最低, 说明其划分质量最好; Zoltan/HSFC 的
数值总是最大, 表明其划分质量在这几个划分方法里最差; MSFC 的划分质量比
PHG/HSFC 略差, 但同样优于 Zoltan/HSFC; 由于区域为规则区域, RCB 的划分
质量优于 PHG/HSFC, MSFC 及 Zoltan/HSFC. 从表 4.1–4.2 可以看出, 图划分方
法的划分质量始终好于几何方法的划分质量, 但前者计算划分的时间亦远大于后
者.
第四章 PHG 动态负载平衡模块的设计与实现
57
图 4.7 测试网格 Ω2 (多孔薄板)
§4.4.2
划分质量对自适应有限元计算性能的影响
本节将 ParMETIS, Zoltan/HSFC, PHG/HSFC, PHG/RTK (PHG 的加密树划
分方法), MSFC (PHG 中的 Morton 空间填充曲线划分方法), RCB (Zoltan 的递归
坐标二分方法) 六种划分方法应用到自适应有限元计算中, 以研究不同划分方法
对并行程序总体性能的影响. 我们将统计划分时间, 比较各个方法的划分速度; 统
计动态负载平衡时间, 比较划分质量对数据迁移的影响; 统计有限元离散线性方
程组求解时间, 比较划分质量对通信的影响; 统计每一个自适应步的总计算时间,
比较不同划分方法对并行程序总体性能影响. 本节将计算三个不同的算例, 分别
求解三种不同类型的偏微分方程.
测试的硬件平台为科学与工程计算国家重点实验室的浪潮 TS10000 高性能集
群 (LSSC-III), 计算结点为浪潮 NX7140N 刀片, 每个刀片包含两颗 Intel X5550 四
核处理器和 24GB 内存, 其单核双精度浮点峰值性能为 10.68Gflops, 282 个计算结
点的总浮点峰值性能为 24Tflops. 所有结点同时通过千兆以太网和 DDR Infiniband
网络互联.
学位论文
58
表 4.1 Ω1 与 Ω2 的最大进程间连通系数
Ω1
# submeshes
16
32
64
128
160
192
ParMETIS
2
2
5
8
8
9
RCB
2
2
5
11
12
13
MSFC
4
5
10
16
19
21
PHG/HSFC
3
6
13
23
24
23
Zoltan/HSFC
12
18
21
23
24
24
Ω2
# submeshes
16
32
64
128
160
192
ParMETIS
7
7
7
10
11
12
RCB
7
7
8
11
12
12
MSFC
9
13
18
21
22
25
PHG/HSFC
8
10
13
18
20
21
Zoltan/HSFC
12
19
23
25
27
31
例 4.4.1. 本例求解如下 Dirichlet 边界条件 Helmholtz 方程,
−∆u + u = f
u(x, y, z) = g
(x, y, z) ∈ Ω
on ∂Ω.
计算区域为圆柱体区域 Ω1 , 取解析解如下:
u = cos(2πx) cos(2πy) cos(2πz),
该算例中解是光滑的, 因此网格加密基本上是均匀的.
测试中使用了 32 个计算结点, 128 个进程. 计算区域如图 4.6 所示, 初始网
格 T1 由 Netgen [81] 生成, 含有 4,927 个四面体单元. 使用三阶协调拉格朗日元对
方程进行离散, 调用数值代数软件包 Hypre 的 BoomerAMG 解法器 [22] 求解有限元
离散产生的线性系统. 网格自适应使用一个后验型的误差指示子, 其定义如下
2
ηK
= h2K kfh + ∆uh + uh k2L2 (K) +
X
f ⊂∂K∩Ω
hf ∂uh 2
k[
]k 2 .
2 ∂nf L (f )
在网格划分时, 单元的权重取为 1, 为了观察网格划分, 负载不平衡因子阈值设置
得较小 (1.05), 划分次数较多, 有利于统计时间. 网格单元标记策略为最大标记策
略 (maximum strategy), 参数 θ 取 0.5 (参看 §5.1.3.2).
第四章 PHG 动态负载平衡模块的设计与实现
59
表 4.2 Ω1 与 Ω2 的表面比
maximum surface index (%, Ω1 )
# submeshes
16
32
64
128
160
192
ParMETIS
0.74 1.48 2.88 5.00 5.78 5.71
RCB
1.0
2.18 4.07 6.06 7.06 7.60
MSFC
4.2
6.51 10.6 16.2 18.9 20.7
PHG/HSFC
3.80 8.31 15.5 19.5 20.4 21.5
Zoltan/HSFC 13.9 19.1 25.4 28.1 30.9 35.8
average surface index (%, Ω1 )
# submeshes
16
32
64
128
160
192
ParMETIS
0.64 1.28 2.39 3.62 4.05 4.42
RCB
0.85 1.68 3.43 5.17 6.03 6.58
MSFC
2.93 5.14 7.44
PHG/HSFC
2.78 5.03 7.18 9.34 10.2 10.8
9.8
10.7 11.5
Zoltan/HSFC 8.72 11.8 16.2 20.6 22.0 23.6
maximum surface index (%, Ω2 )
# submeshes
16
32
64
128
160
192
ParMETIS
2.45 2.56 3.30 5.32 6.13 6.10
RCB
2.57 4.74 6.29 9.16 9.66 11.6
MSFC
3.0
PHG/HSFC
2.86 4.74 7.03 9.78 10.6 11.3
5.11 7.06 9.74 11.1 11.8
Zoltan/HSFC 8.89 12.3 16.5 19.5 21.2 22.8
average surface index (%, Ω2 )
# submeshes
16
32
64
128
160
192
ParMETIS
1.12 1.45 2.18 3.43 3.87 4.21
RCB
1.89 3.04 3.93 5.90 6.58
MSFC
2.24 3.61 5.21 7.34 8.22 8.92
PHG/HSFC
2.19 3.29 4.88 6.92 7.81 8.27
7.2
Zoltan/HSFC 5.10 6.86 9.47 12.6 14.1 15.3
学位论文
60
cylinder, 128 procs
0.35
ParMETIS
RTK
PHG/HSFC
MSFC
Zoltan/HSFC
RCB
0.3
Partitioning time (s)
0.25
0.2
0.15
0.1
0.05
0
0
2e+06
4e+06
6e+06
8e+06
1e+07
1.2e+07
1.4e+07
Number of elements
图 4.8 网格划分时间 (例 4.4.1)
图 4.8 给出划分时间, 从中可以看出 RTK 方法的划分速度最快, 其次是
MSFC, PHG/HSFC, Zoltan/HSFC. PHG 实现的 HSFC 及 MSFC 均比 Zoltan/HSFC
速度要快. ParMETIS 和 RCB 最慢. 从图上可以看出网格分布对 ParMETIS 的划
分时间有较大影响, 随着网格调整, 其划分时间出现剧烈震荡. 总体来讲, 几何划
分方法对网格分布不敏感, RCB, MSFC, PHG/HSFC, Zoltan/HSFC 的划分时间随
着网格规模的增大以较稳定的速率增加.
图 4.9 给出动态负载平衡时间, 其中包含了网格划分和数据迁移时间, 其中数
据迁移时间占的比重较大. 一个好的划分方法应该是增量的, 即网格的微小变化
仅导致划分的微小变化, 这样会使得数据迁移量比较小. 从图上可以看出 RTK 的
时间最短, 表明其数据迁移量较少, RTK 的时间增长也很稳定. 其次是 ParMETIS,
ParMETIS 同样表现出震荡. 接着是 MSFC, PHG/HSFC, RCB, 用时最长的是
Zoltan/HSFC. 它们的时间增长趋势均比较稳定, 说明这些方法均有较好的可扩
展性和比较低的计算复杂度.
一般情况下线性方程组的求解时间在自适应有限元计算中占统治地位, 图
4.10 和 4.11 分别给出线性方程组求解时间和每一个自适应步的时间. 从图中可
以看出, RCB, ParMETIS, RTK 运行时间最短. 对 RCB 而言, 其划分质量一般要比
ParMETIS 及 RTK 差一些, 这个算例是特例, 因为计算区域是一个长圆柱体, 非常
第四章 PHG 动态负载平衡模块的设计与实现
61
cylinder, 128 procs
2.2
ParMETIS
RTK
PHG/HSFC
MSFC
Zoltan/HSFC
RCB
2
time of dynamic load balancing time
1.8
1.6
1.4
1.2
1
0.8
0.6
0.4
0.2
0
0
2e+06
4e+06
6e+06
8e+06
1e+07
1.2e+07
1.4e+07
Number of elements
图 4.9 动态负载平衡时间 (例 4.4.1)
cylinder, 128 procs
180
ParMETIS
RTK
PHG/HSFC
MSFC
Zoltan/HSFC
RCB
160
time of solving linear system (s)
140
120
100
80
60
40
20
0
0
1e+07
2e+07
3e+07
4e+07
5e+07
Number of DOF
图 4.10 有限元离散系统求解时间, 横坐标为自由度数 (例 4.4.1)
6e+07
学位论文
62
cylinder, 128 procs
180
ParMETIS
RTK
PHG/HSFC
MSFC
Zoltan/HSFC
RCB
160
overall computational time (s)
140
120
100
80
60
40
20
0
0
1e+07
2e+07
3e+07
4e+07
5e+07
6e+07
Number of DOF
图 4.11 每一个自适应步时间 (例 4.4.1)
适合 RCB. 其次是 MSFC, PHG/HSFC, 用时最长的是 Zoltan/HSFC. Zoltan/HSFC
与 PHG/HSFC 是同一类型的划分方法, 由于 PHG 在映射时采取了保持区域长宽
比的方式, 维持了区域的空间局部性, PHG/HSFC 的划分质量比 Zoltan/HSFC 高,
求解时间也较少.
表 4.3 总体运行时间及划分次数 (例 4.4.1)
Method
total running time(s)
# of repartitionings
RCB
3049.60
60
ParMETIS
3360.73
189
RTK
3465.63
59
MSFC
4088.01
58
PHG/HSFC
4493.43
59
Zoltan/HSFC
8954.21
50
表 4.3 给出该算例采用不同划分方法时的运行时间及划分次数, 算例包含 190
个自适应步. RCB 运行时间最短, 说明对计算区域比较规则的问题, 简单的几何
划分方法是非常有效的. Zoltan/HSFC 的运行时间最长, 是别的方法的两倍以上,
第四章 PHG 动态负载平衡模块的设计与实现
63
表现最差. ParMETIS 的划分次数最多, 是别的方法的三倍. 划分次数过多会导致
数据迁移频繁, 当网络带宽较低时, 就需要考虑数据迁移问题, 但由于其划分质量
好, 线性方程组的求解时间较短.
例 4.4.2. 本例求解一个带有 Dirichlet 边界条件的 Poisson 方程
−∆u = f
u(x, y, z) = g
(x, y, z) ∈ Ω
on ∂Ω.
其计算区域为多孔薄板区域 Ω2 , 取解析解为
u = 4(1 − e−100x − (1 − e−100 )x)y(1 − y)e−z ,
它在 x = 0 处呈现边界层现象.
计算区域如图 4.7 示, 初始网格是一致网格, 由 Netgen 生成, 含有 49,271 个
四面体单元. 测试使用了 32 个计算节点, 128 个进程, 与前一个算例一样, 使用三
阶拉格朗日元进行离散, 使用 PCG (Preconditioned Conjugate Gradient method) 求
解离散得到的线性方程组, 采用残量型误差指示子, 形式如下
2
ηK
= h2K kfh + ∆uh k2L2 (K) +
X
f ⊂∂K∩Ω
hf ∂uh 2
k[
]k 2 .
2 ∂nf L (f )
标记策略为最大标记策略 (maximum strategy), 参数取为 0.5 (参看 §5.1.3.2).
图 4.12–4.15 分别给出了划分时间、动态负载平衡时间、线性方程组求解时
间及每个自适应步计算时间. 划分时间如图 4.12 所示, 最快的仍然为 RTK, 其次
为 MSFC, PHG/HSFC, Zoltan/HSFC, 最后是 ParMETIS 和 RCB. RCB 最慢, 同算
例 4.4.1 一样, ParMETIS 又表现出震荡.
动态负载平衡时间如图 4.13 示, RTK 用时最少, 并且 RTK 的运行时间随着
网格单元数量以线性增长; 其次是 ParMETIS, 它的运行略慢, 但其划分质量高,
通过减少数据迁移减少了负载平衡时间; 接着是 MSFC, PHG/HSFC; 运行最慢的
是 Zoltan/HSFC 及 RCB.
线性方程组求解及每个自适应步的时间如图 4.14 和 4.15 所示, MSFC 运行
时间最短, Zoltan/HSFC 运行时间最长, 其他几个划分方法的运行时间相差不大.
RCB 在这个例子中的表现不如在例 4.4.1 中的表现, 因为在前者的计算区域是一
个狭长的圆柱体, 较适合 RCB.
表 4.4 给出了总体运行时间及划分次数, 总的自适应次数为 238 次. 运行时
间最长的为 Zoltan/HSFC, 几乎是别的方法的 2 倍. 算例 4.4.1 及 4.4.2 均表明: 在
学位论文
64
thin plate, 128 procs
2.5
ParMETIS
RTK
PHG/HSFC
MSFC
Zoltan/HSFC
RCB
Partitioning time (s)
2
1.5
1
0.5
0
0
1e+07
2e+07
3e+07
4e+07
5e+07
6e+07
7e+07
8e+07
6e+07
7e+07
8e+07
Number of elements
图 4.12 网格划分时间 (例 4.4.2)
thin plate, 128 procs
14
ParMETIS
RTK
PHG/HSFC
MSFC
Zoltan/HSFC
RCB
time of dynamic load balancing time
12
10
8
6
4
2
0
0
1e+07
2e+07
3e+07
4e+07
5e+07
Number of elements
图 4.13 动态负载平衡时间 (例 4.4.2)
第四章 PHG 动态负载平衡模块的设计与实现
65
thin plate, 128 procs
700
ParMETIS
RTK
PHG/HSFC
MSFC
Zoltan/HSFC
RCB
time of solving linear system (s)
600
500
400
300
200
100
0
0
5e+07
1e+08
1.5e+08
2e+08
2.5e+08
3e+08
3.5e+08
Number of DOF
图 4.14 有限元离散系统求解时间, 横坐标为自由度数 (例 4.4.2)
thin plate, 128 procs
800
ParMETIS
RTK
PHG/HSFC
MSFC
Zoltan/HSFC
RCB
700
overall computational time (s)
600
500
400
300
200
100
0
0
5e+07
1e+08
1.5e+08
2e+08
2.5e+08
Number of DOF
图 4.15 每一个自适应步时间 (例 4.4.2)
3e+08
3.5e+08
学位论文
66
表 4.4 总体运行时间及划分次数 (例 4.4.2)
Method
total running time(s)
# of repartitionings
MSFC
6269.41
83
RTK
6514.84
89
PHG/HSFC
6570.44
83
RCB
6667.12
89
ParMETIS
6758.62
237
Zoltan/HSFC
12079.33
74
映射的过程中, 保持区域的空间局部性对划分质量是很重要的. 其他几个方法的
运行时间比较接近. 值得一提的是 ParMETIS, 和上一个例子一样, 其划分次数最
多, 这是由于问题的奇点是局部的, 网格的自适应局部加密会引起负载不平衡, 需
要调整网格分布. 一般说来, Morton 空间填充曲线的空间局部性要弱于希尔伯特
空间填充曲线, 但在这两个例子中, MSFC 的计算效果却始终优于希尔伯特空间
填充曲线划分方法 (PHG/HSFC & Zoltan/HSFC), 所以在选择划分方法时应根据
问题本身的特点、计算区域和划分质量等多个因素确定合适的划分策略, 以加快
运算速度, 优化计算资源.
例 4.4.3. 本例求解的方程为线性抛物型方程
ut − ∆u = f
取解析解为
u = exp((25((x −
u=g
in Ω × (0, T )
on Γ × [0, T ].
(4.8)
1 2
1 2
− sin(8πt))2 + (y − − cos(8πt))2 + (z − 1)2 ) + 0.9)−1 − 2.5).
2 5
2 5
计算区域为 Ω3 = (0, 1)3 , 时间区间为 [0, 1]. 解的极大值在 z = 1 平面上运动, 网
格在极值附近最密. 由于这是一个依赖于时间的问题, 网格自适应同时包含加密
和放粗.
初始计算网格包含六个四面体, 时间离散采用向后欧拉格式, 空间离散采用
二阶拉格朗日元, 使用 PCG (Preconditioned Conjugate Gradient method) 求解得到
的线性方程组, 在时间和空间方向上同时采用自适应 [66, 156], 误差指示子为残
量型的, 标记策略为最大标记策略 (maximum strategy), 加密和放粗的参数分别选
为 0.6 和 0.1.
第四章 PHG 动态负载平衡模块的设计与实现
67
表 4.5 程序运行时间 (例 4.4.3, 128 进程)
Method
Time TAL(s)
Time DLB(s)
Time SOL (s)
Time STP(s)
PHG/HSFC
6525
0.0734
0.1886
0.9192
Zoltan/HSFC
6744
0.0917
0.1928
0.9501
MSFC
6902
0.0730
0.1966
0.9724
RTK
7015
0.0738
0.2050
0.9884
RCB
7131
0.1126
0.1938
1.0046
ParMETIS
7151
0.1421
0.2114
1.0075
表 4.6 程序运行时间 (例 4.4.3, 192 进程)
Method
Time TAL(s)
Time DLB(s)
Time SOL(s)
Time STP(s)
PHG/HSFC
6597
0.0932
0.1808
0.9294
MSFC
6601
0.0936
0.1863
0.9299
Zoltan/HSFC
6646
0.1046
0.1862
0.9362
RCB
7197
0.1176
0.1862
1.0139
RTK
7185
0.0799
0.2124
1.0123
ParMETIS
7218
0.1982
0.1942
1.0169
这里给出两组测试结果. 第一组测试使用 32 个计算结点、128 个进程, 共
运行了 7098 个时间步, 每个时间步的平均单元数量为 663,151, 平均自由度数为
919,036. 结果见表 4.5, 其中第一项时间为总运行时间 (TAL), 第二项为单次动态
负载平衡的平均时间 (DLB), 第三项为单次线性方程组的平均求解时间 (SOL),
第四项为单个时间步的平均计算时间 (STP). 从表 4.5 中可以看出, 几何划分方
法的效果优于图划分方法, PHG/HSFC, Zoltan/HSFC, 及 MSFC 均优于 RTK 及
ParMETIS, RCB 除外. 其中 PHG/HSFC 运行时间最短, ParMETIS 运行时间最
长. 可以看出, 当网格变化较剧烈时, 几何划分方法也有优势. 一般来说, 在静态
划分中, 图划分方法划分质量最好, 最有优势; 在动态划分中, 情况则不一定.
第二组测试数据如表 4.6 所示, 其中使用了 32 结点、192 进程. 结果与第一
组测试类似, 几何划分方法用时较少, 仍优于图划分方法. 在本算例的两个表格
中, PHG/HSFC 均比 Zoltan/HSFC 用时略少, 说明 PHG 实现的版本的划分质量
略高, 但没有前面两个算例的差别那么大, 因为在这个算例中, 计算区域为 (0, 1)3 ,
Zoltan/HSFC 的映射结果和 PHG/HSFC 是类似的. 两个版本的差别在区域的长
学位论文
68
宽比较大时体现得更为明显.
§4.5
本章小结
本章介绍了 PHG 的层次网格结构, 网格划分方法及动态负载平衡模块, 并通
过数值实验比较了各种网格划分方法在并行自适应有限元计算中的优劣.
通常来讲, 几何划分方法的速度快、实现简单, 但划分质量不高; 图划分方法
的速度慢、算法复杂, 但划分质量非常高. 对静态问题或者网格变化较小的问题,
图划分方法是最好的选择; 对网格频繁调整的问题, 几何划分方法是很有竞争力
的. 在实际应用中, 应综合考虑网格划分、数据迁移、问题求解等多个因素确定
合适的划分方法.
第五章
hp 自适应策略设计
hp 自适应有限元方法同时调整网格和单元上的基函数, 它具有 h 自适应有
限元方法和 p 自适应有限元方法的优点. 在适当的策略下, hp 自适应有限元方法
可以达到指数阶收敛. 关于 hp 自适应有限元方法已有许多研究成果, 但自适应
策略仍旧是其难点之一, 目前尚没有成熟的、广泛被接受的算法, 本章将对 hp 自
适应策略进行研究.
基础知识
§5.1
在实际应用中, 很多科学和工程问题都可以使用偏微分方程或者常微分方程
进行建模, 由于问题的解析解很难获得, 通常通过求解数值解来给出解析解的近
似. 自适应有限元是求解偏微分方程的高效数值方法之一, 它根据数值解及已知
数据对误差作出估计, 并且根据误差指示子调整网格/基函数, 利用最少的计算资
源达到最好的计算结果. 自适应有限元方便处理奇性问题, 也方便处理复杂区域,
是当今科学与工程计算的热点研究领域之一 [157, 158, 159, 165, 199, 200, 201, 202].
§5.1.1
模型问题
考虑椭圆形偏微分方程,
−∇ · (A(x)∇u) =
f in Ω,
u|ΓD = gD on ΓD ,
(5.1)
∂u
= gN on ΓN ,
A(x)
∂ν
T
S
其中 A 为对称正定矩阵, ΓD , ΓN ⊂ ∂Ω, ΓD ΓN = ∅, ΓD ΓN = ∂Ω. 方程 (5.1) 的
变分形式为: 求解 u ∈ H 1 (Ω), 其中 u = ū + G, ū ∈ V = {v ∈ H 1 (Ω), v|ΓD = 0}, G ∈
H 1 (Ω), G|ΓD = gD , 并且
Z
Ω
Z
A∇ū · ∇vdx =
f vdx −
Z
a(u, v) =
Z
Ω
Ω
引入如下符号:
∇G · ∇vdx +
Ω
l(v) =
Z
Ω
f vdx −
Z
Ω
Z
ΓN
gN vdS, ∀v ∈ V.
A∇u · ∇vdx,
∇G · ∇vdx +
69
(5.2)
(5.3)
Z
ΓN
gN vdS.
(5.4)
学位论文
70
则问题变为求解 ū ∈ V , 使得下述变分形式成立,
∀v ∈ V.
a(ū, v) = l(v),
(5.5)
双线性型 a(·, ·) 是 V - 椭圆的并且有界, l 是有界的线性泛函, 由 Lax-Milgram
定理可知, u 存在唯一 [158, 207]. 为了简单起见, 后文将不再区分 ū 与 u.
§5.1.2
有限元离散
在变分问题 (5.5) 中, V 是无限维 Banach 空间, 计算机无法处理无限维空
间, 需要构造 V 的有限维子空间 Vh 进行近似, 并求解如下有限维离散问题: 求
u ∈ Vh ⊂ V , 满足如下变分形式
a(uh , vh ) = l(vh ),
∀vh ∈ Vh .
(5.6)
同样由 Lax-Milgram 定理可知, 该问题的解存在唯一.
为了构造子空间 Vh , 首先对计算区域 Ω 做剖分.
定义 5.1.1. (区域 Ω 的网格剖分) 将 Ω̄ 剖分成有限个闭子区域 K1 , · · · , Km , 每一
个子区域 Ki (1 ≤ i ≤ m) 称为一个单元, 全部单元组成的集合为 Th 称为 Ω 的一
个网格剖分, 简称剖分. 单元满足如下性质:
o
(1) 对每个单元 K ∈ Th , K 是闭集, 其内部 K 是非空且连通的;
(2) 单元 K 的边界 ∂K 是 Lipschitz 连续的;
(3) Ω̄ =
S
K∈Th
K;
o
(4) 任何两个不同的单元 K1 , K2 ∈ Th , K1
T
o
K2 = ∅;
(5) 每个 K ∈ Th , ∂K 或者是 ∂Ω 的一部分, 或者是相邻单元的边界.
剖分 Th 称为区域 Ω 上的一个计算网格. 在二维区域中, 常用单元类型为三
角形和四边形; 在三维区域中, 常用单元类型为四面体和六面体. 并行自适应有限
元软件平台 PHG 采用的单元类型为四面体.
在网格 Th 中, 任意单元 K, 记 PK 为某种多项式集合. 可以构造有限元空间
Vh 使得其中的函数在网格 Th 每一个单元上是一个多项式, 形式如下
Xh = {vh : vh |K ∈ PK , ∀K ∈ Th },
Vh = {vh ∈ Xh : vh |ΓD = 0},
第五章 hp 自适应策略设计
71
当限定多项式次数时, Vh 为有限维空间, 设其维数为 n, 则可以选取 n 个基
函数 {ϕ1 , · · · , ϕn }. 令
uh =
n
X
u i ϕi ,
(5.7)
i=1
则变分问题 (5.6) 等价于如下线性代数方程组
n
X
a(ϕi , ϕj )ui = l(ϕj ),
i=1
j = 1, · · · , n.
(5.8)
其系数矩阵为刚度矩阵 A = [a(ϕi , ϕj )]ni,j=1 , 未知量为 u = (u1 , · · · , un )T , 右端项为
b = (l(ϕ1 ), · · · , l(ϕn ))T , 问题最终可以写成
Au = b.
(5.9)
至此便得到了变分问题 (5.6) 的有限元离散.
§5.1.3
自适应有限元
误差估计和自适应加密由 Babuška 和 Rheinholdt 首先引入到有限元计算中
[160, 161]. 他们的方法基于估计数值解的残留, 使用残留得到一个局部更精确的
新解, 同时定义了网格加密过程. 受他们的启发, 其他计算数学家深入地研究了
这个方法, 设计了更有效的离散格式, 误差指示子等, 关于自适应有限元的理论结
果及最新进展见文献 [162, 163, 164, 165, 166, 195, 199, 200, 202, 203].
§5.1.3.1
误差指示子和自适应策略
误差指示子是自适应有限元方法重要的组件, 它真实反映了实际误差. 一个
好的误差指示子是真实误差的一个上界和下界, 上界表明真实误差被误差指示子
控制, 即计算是可信的; 下界表明误差指示子被真实误差控制, 即误差指示子是有
效的. 常用的误差指示子有如下几类:
• 残量型误差指示子 (residual estimate) [201, 202, 203]: 通过计算残量的范数来
估计数值解的误差.
• 对偶权重残量误差指示子 (dual weighted residual estimate) [199]: 先计算数值
解的残量, 然后乘以一个表示误差依赖关系的权重. 这种类型的误差指示子
需要求解一个对偶变分问题.
• 多重基误差指示子 (hierarchical basis error estimate) [200]: 通过计算高阶元或
者加密网格的有限元解, 估计两个解之间的残量.
学位论文
72
• 平均化方法 (averaging methods) [200]: 使用局部外插或者数值解梯度平均估
计误差子.
• 平衡残量误差指示子 (equilibrated residual error estimate) [200]: 将问题划分为
自平衡的系统, 然后在每个点或者单元的一个 patch 中求解一个局部的 Dirichlet 或者 Neumann 问题, 通过局部问题给出误差指示子.
自适应过程中, 如果全局后验误差估计小于给定值, 则有限元解被认为达到
了精度要求, 自适应循环结束; 否则, 局部自适应加密进程被调用, 通过调整单元
分布、单元中的基函数及加密误差比较大的单元得到一个新的有限元空间, 计算
在新空间上继续进行. 主要的自适应方法有如下几种:
• h 自适应方法: 通过将误差大的网格单元加密成多个子单元实现, 它保持基
函数的阶不变. 该方法的收敛阶是代数的, 是自适应有限元中最成熟最常用
的方法.
• p 自适应方法: 保持网格不变, 通过改变基函数的阶实现自适应. 该方法收敛
速度快, 如果网格选取适当并且解足够光滑, 可以达到指数阶收敛. 但它对网
格的要求比较高, 得到的线性方程组的条件数较高, 方程求解速度慢.
• hp 自适应方法: hp 自适应方法同时调整网格和基函数. 优点是收敛速度快,
在合适的策略下, 可以达到指数阶收敛, 缺点是理论不成熟, 缺乏稳健有效的
自适应策略.
• r 自适应方法: 移动网格方法, 保持网格规模不变, 根据数值解的误差分布修
改网格点的位置. 在误差大的地方放置更多的网格点. 该方法在流体、燃烧、
热传导等问题中应用较广泛.
§5.1.3.2
单元标记策略
本节仅限于讨论如何选取加密单元, 放粗单元的选取是类似的, 只需要改变
一些不等式的方向即可. 许多研究人员对标记策略进行了探讨并提出了一些有效
的策略. Dörfler 在文 [39] 中针对 Poisson 问题提出了保证误差下降策略, Morin 等
人在文 [40] 中提出了 MNS 加密标记策略. 目前常用的单元加密标记策略主要有:
最大策略 (maximum strategy, MAX), 误差等分布策略 (equidistribution strategy,
EQDIST), 保证误差下降策略 (guaranteed error reduction strategy, GERS), 和 MNS
加密策略 (MNS-refinement strategy, MNS). 本节先给出这些策略的数学描述.
第五章 hp 自适应策略设计
73
首先介绍几个符号: Th 表示当前网格的单元集合; S 表示当前网格的边 (二
维) 或面 (三维) 的集合; ηK (K ∈ Th ) 和 ηs (s ∈ S) 表示 (定义在单元和面上的) 误
差指示子; oscA (A ⊂ Th ) 是刻划数据振荡的量 (data oscillation); ε 是停止标准, 即
期望计算达到的精度 (tolerance); p 表示误差指示子的指数, 与误差所使用的范数
有关 (通常等于 2).
我们希望误差渐进相等地分布在各个单元上, 因而在标记加密单元时, 应尽
量选择误差指示子较大的单元. 标记策略设计都遵循这一原理. 常用标记策略描
述如下:
最大策略 (maximum strategy, MAX)
选取 θ ∈ (0, 1), 将所有满足下述条件的单元标记为加密单元:
ηK ≥ θ max
ηK 0
0
(5.10)
K ∈Th
误差等分布策略 (equidistribution strategy, EQDIST)
P p 1/p
ηK ) , 假如误差指示子
假定 Th 中单元的数目为 N , 全局误差为 η = (
K∈Th
ηK 在所有单元中均相等, 则有 η =
N 1/p ηK .
由此, 可以导出下述两个策略.
EQDIST1
选取 θ ∈ (0, 1), 标记满足下述条件的单元为加密单元:
ηK ≥ θ
η
N 1/p
(5.11)
EQDIST2
选取 θ ∈ (0, 1), 标记满足下述条件的单元为加密单元:
ηK ≥ θ
ε
N 1/p
(5.12)
保证误差下降策略 (guaranteed error reduction strategy, GERS)
Dörfler 在 [39] 中对于 Poisson 问题提出了能保证误差下降的策略, 该策略同
样可以应用到其他问题. 给定 θ ∈ (0, 1), 则加密单元的集合为满足下述条件
的 Th 的最小子集 A (⊆ Th ):
X
K∈A
p
ηK
≥ θp
X
p
ηK
(5.13)
K∈Th
MNS 策略加密 (MNS-refinement strategy, MNS)
该策略是 Morin 等人在证明自适应有限元的收敛性时提出的 [40]. 策略使用
学位论文
74
定义在网格的边 (二维) 或面 (三维) 上的误差指示子 ηs 和定义在单元上、刻
划数据振荡的量 osc. 首先, 根据给定的参数 θ1 ∈ (0, 1), 构造满足下述条件的
S 的最小子集 S1 :
X
s∈S1
ηsp ≥ θ1p
X
ηsp
(5.14)
s∈S
将所有至少有一条边 (二维) 或面 (三维) 属于 S1 的单元标记为加密单元, 并
记加密单元的集合为 A1 . 对于 osc, 则根据给定的参数 θ2 ∈ (0, 1), 扩大 A1 , 使
得加密单元集合是满足下述条件的 Th 的最小子集 A (A1 ⊆ A ⊆ Th ):
oscA ≥ θ2 oscTh .
(5.15)
对 MAX 和 EQDIST 策略, 参数 θ 的值越大, 标记的单元的数目越少; 而对于
GERS 和 MNS 加密策略, 参数 θ 的值越大, 标记的单元则越多.
§5.1.3.3
标记策略的并行算法
本节讨论 GERS 和 MNS 加密策略在基于消息传递的分布式存储并行计算
机上的实现问题, 同时介绍并行自适应有限元软件平台 PHG (Parallel Hierarchical
Grid) 中实现这些标记策略的统一函数接口. 由于 MAX 策略和 EQUIDIST 策略
很容易实现, 这里不作讨论.
根据上一节的介绍可知, GERS 策略和 MNS 加密策略的实现均可归结为如
下问题: 给定集合 G, 定义在 G 上的误差指示子 ηK (K ∈ G), 及参数 θ ∈ (0, 1), 求
满足下式的 G 的最小子集 A:
X
K∈A
ηK ≥ θ
X
ηK .
(5.16)
K∈ G
这里, 集合 G 被划分成一些互不相交的子集, 分布在各个进程中.
上述问题最直接的算法是先将 G 中的元素按照误差指示子 ηK 的大小排序,
然后从大到小依次选出 A 中的元素, 算法的计算复杂度为 O(N log N ), N = |G|.
PHG 没有采用这一算法, 因为它需要进行并行排序, 通信量较大.
给定 γ ∈ [0, 1], 定义集合 Aγ 如下:
Aγ = {K | K ∈ G, ηK ≥ γ max
ηK 0 }
0
记 ηγ =
P
K∈Aγ
K ∈G
ηK (它是集合 Aγ 中误差指示子的和), η =
P
ηK , 则问题转化为给
K∈G
定 θ 求 γ 使得 ηγ = θη. 易知 γ 是 θ 的减函数. 我们用二分法计算满足要求的 γ.
第五章 hp 自适应策略设计
75
上述算法很容易并行实现, 每次二分计算中的通信仅为一次规约操作, 算法
的计算复杂度为 O(N ). 为了提高通信粒度, 也可以采用 k 分 (k > 2) 的方法, 通
过适当增加计算量来减少通信次数.
我们为 PHG 设计了统一的函数接口来完成单元标记, 该函数可以同时对加
密和放粗进行标记, 函数接口定义如下:
void phgMarkElements(STRATEGY strategy_r, DOF *eta_r, FLOAT theta,
DOF *osc, FLOAT zeta, int depth_r, STRATEGY strategy_c,
DOF *eta_c, FLOAT gamma, int depth_c, FLOAT a),
其中, strategy_r 和 strategy_c 分别表示加密和放粗策略, 可以取值 MARK_MAX,
MARK_EQDIST, MARK_GERS, MARK_MNS, MARK_ALL, MARK_NONE, 其中最后两个分别表示
标记全部单元和不标记任何单元; eta_r, osc 和 eta_c 分别给出加密误差指示子,
数据振荡和放粗误差指示子; theta, zeta 和 gamma 给出标记参数; 而 depth_r
和 depth_c 则给出被标记的单元加密和放粗次数. 参数 a 仅被 EQDIST 策略
使用, 对于加密而言, 标记的单元集合为 {K | ηK ≥ theta × a}. strategy_r 和
strategy_c 也可以取值为 MARK_DEFAULT, 它允许用户在运行程序时通过命令行选
项 -strategy, -refine-strategy 和 -coarsen-strategy 指定标记策略. 默认策略
为 MARK_GERS.
在这些策略中, GERS 是一个较好的选择, 通常情况下它表现出比其他策略
更好的稳健性.
hp 自适应有限元
§5.2
hp 自适应有限元由 Ivo Babuška 等人最早提出, 它收敛速度快, 受到研究人
员的重视. hp 自适应策略仍然是 hp 自适应有限元方法的难点之一. 本节对自适
应策略进行探讨.
§5.2.1
有限元解空间和变分形式
本节接下来的内容中网格限定为协调四面体网格. 在经典 h 自适应有限元
中, 每个单元上的基函数的阶是相同的, 其有限元空间 Vh 的构造相对简单. hp 自
适应有限元中, 每个单元上的基函数的阶不一定相同. 用符号 Vh,p 和 Th,p 分别表
示有限元空间和网格. 在协调四面体网格中, 单元上的基函数按照其所在的位置
或者定义方式分为顶点基函数、边基函数、面基函数和体基函数, 它们分别定义
在四面体的顶点、边、面和单元内部. 假设给定每个单元中体基函数的阶, 我们采
用最小原则 (minimum rule) [167] 来定义各类基函数的阶, 它可使得有限元空间独
学位论文
76
立于具体的基函数 [158]. 根据最小原则, 顶点、边或面基函数的阶取为包含该顶
点、边或面的所有单元体基函数的阶的最小值.
所有这些基函数张成 Th,p 上的协调有限元空间 Vh,p . hp 自适应有限元的变
分问题为: 求解 uh,p ∈ Vh,p , 使得下式成立,
a(uh,p , vh,p ) = l(vh,p ),
∀vh,p ∈ Vh,p .
(5.17)
有限元空间 Vh,p 的基函数有很多选择, 但一般要求基函数满足两个条件:
• 基函数的支集 (support) 应该是局部的, 从而使得最终的刚度矩阵是稀疏的;
• 基函数应该是层次的 (hierarchic), 低阶基函数集合是高阶基函数集合的子集.
层次性用于保证有限元空间的协调性.
常用的层次基函数基于 Jacobi 多项式, Legendre 多项式和 Lobatto 函数构造, 详
细内容参考 [168, 169, 170].
§5.2.2
hp 自适应加密策略
hp 自适应有限元的难点之一是自适应加密策略, 即在单元上如何选取 h 加
密和 p 加密. 原则是, 应该在方程的解光滑的区域选择 p 加密, 在解有奇性的区
域选择 h 加密. 不幸的是, 解的性质在通常情况下是不知道的. 研究人员设计了
不同的方法确定解的正则性. 下面介绍一些常见的 hp 自适应加密策略:
(1) 利用解的正则性先验信息 (use of a priori knowledge of solution regularity).
p 加密可以在解的光滑区域达到指数阶收敛, 但在有奇性的区域却没有 h 加
密有效. 由于这个原因, 许多 hp 加密策略在解有奇性的区域采用 h 加密, 别
的区域采取 p 加密. 最简单的策略是利用正则性的先验信息. 例如, 如果线性
椭圆偏微分方程的系数是光滑的并且边界条件是分片解析的, 那么在区域的
凹角处有点奇性 [172]. Ainsworth 和 Senior [172], Bernardi 等人 [184] 以及
Valenciano 等人 [185] 利用区域及已知数据的先验信息在有奇性的区域采用 h
加密, 在其他区域采用 p 加密.
(2) 类型参数 (type parameter).
Gui 和 Babuška [182] 及 Affia 等人 [186] 使用类型参数的概念, 设计了 hp 自
适应策略. 给定误差指示子 ηK,pK 和 ηK,pK −1 , 定义
R(K) =
ηK,pK
ηK,pK −1 ,
0,
ηK,pK −1 6= 0
ηK,pK −1 = 0,
第五章 hp 自适应策略设计
77
R 用来评估解的光滑性. 给定参数 γ (0 ≤ γ < ∞), 如果 R(K) ≥ γ, 单元 K 将
采取 h 加密; 如果 R(K) < γ, 单元 K 将采取 p 加密. 另外, 如果 γ = 0, 单元
K 将只采取 h 加密, 而如果 γ = ∞, 则单元 K 将只采取 p 加密.
(3) 用低阶函数空间估计解的正则性 (estimate regularity using smaller p estimates).
Süli, Houston 和 Schwab [173] 利用两个低阶基函数空间计算误差下降阶, 根
据下降阶估计解的正则性. 设单元基函数的阶为 p, 如果在单元上计算基函
数阶分别为 p − 1, p − 2 时的误差 ηp−1 和 ηp−2 , 有下面近似表达式成立
ηp−1
p − 1 1−m
≈(
)
,
ηp−2
p−2
于是正则度 m 可定义为:
m≈1−
log(ηp−1 /ηp−2 )
.
log((p − 1)/(p − 2))
当 p ≤ m − 1 时, 采取 p 加密; 否则采取 h 加密.
(4) 利用高阶函数空间估计解的正则性 (estimate regularity using larger p estimates).
Ainsworth 和 Senior[177] 给出利用高阶基函数空间估计解正则性的策略. 设当
前单元 K 上基函数阶为 p, 分别计算基函数阶为 p + 1, p + 2, p + 3 时的误
差. 该策略将问题 (5.17) 转化为满足平衡条件 (equilibrium condition) 的局部
Neumann 问题. 假设基函数阶为 p + j 时的误差为 ej , 那么有下面近似表达式
成立
ke0 k2K − kej k2K ≈ C 2 (p + j)−2α ,
其中 C, α 为正的常数. 局部正则度 m 定义为 m = 1 + α. 如果 p ≤ m − 1 = α,
则采取 p 加密, 否则采取 h 加密.
(5) 参考解 (reference solution).
Demkowicz 及其合作者 [190, 191, 192] 设计了一个 hp 自适应策略. 假定当前计
算网格及数值解分别为 Th,p 和 uh,p , 对网格和基函数做一致的 h 和 p 加密, 得
到一个更细的网格 Th/2,p+1 , 在这个网格上可以求得一个新的数值解 uh/2,p+1 .
uh,p 与 uh/2,p+1 差值的某个范数作为全局误差, 如
η = kuh,p − uh/2,p+1 kH 1 (Ω) .
下一步是决定每个单元的最优加密方式, 考虑所有可能的 h 加密方式和 p 加
密方式, 从中选择一个最优的加密方法. 该策略是有效的, 但非常复杂, 计算
量特别大. Šolı́n 等人 [193] 给出了一个简化的版本.
学位论文
78
(6) 误差下降预测 (predict error estimate on assumption of smoothness).
Melenk 等人 [174] 以及 Heuveline 等人 [176] 给出了启发式加密策略. 对二维四
边形和三维六面体单元, 他们假设解是光滑的, 根据近似理论, 可以预测 h 加
密及 p 加密的误差下降趋势, 而根据这个预测判断解是否是光滑的. 如果实
际误差达到预测, 表明解是光滑的; 如果达不到预测, 则表明解不够光滑. 对
光滑的区域采取 p 加密, 对非光滑区域采取 h 加密.
hp 自适应有限元的加密策略没有 h 自适应有限元那样成熟, 构造简单有效
的自适应加密方法仍然是一个很大的挑战, hp 自适应有限元基本理论也在发展
之中. 上面给出了一些自适应策略的简单描述, 详细的过程可以参考相关文献, 还
有一些其他的策略, 可以参考文献 [167, 171, 175, 177, 183, 187, 188, 189, 194, 196].
一种新的 hp 自适应策略
§5.3
本节介绍我们设计的 hp 自适应加密策略, 该策略基于误差下降预测. 该策略
中, 我们对不同的加密方式预测误差下降的速度, 如果实际误差与预测一致, 表明
解是光滑的, 对单元采取 p 加密; 如果误差下降没有达到预期, 表明解不够光滑,
对单元采取 h 加密. 这个策略很大程度上受到 Melenk 等人 [174] 以及 Heuveline
等人 [176] 工作的启发. 本文对 h 加密及 p 加密的误差下降估计采用不同的假设,
得到不同的误差下降估计公式, 这个策略不仅适合二维四边形和三维六面体, 也
适合二维三角形单元和三维四面体单元.
本节考虑线性椭圆型偏微分方程
−4u = f in Ω,
u=
(5.18)
0 on ∂Ω,
其中 Ω ⊂ Rd , d = 2, 3, f ∈ L2 (Ω). 我们的目标是设计和定义计算网格 Th,p 和一个
有限元空间 Vh,p ⊂ H01 (Ω), 计算数值解 uh,p ∈ Vh,p 使得变分形式 (5.17) 成立, 并达
到事先设定的停止标准.
p
下面介绍一些记号. 记 k · k 为能量模, kuk = a(u, u); ε 为停止标准; ηK 为
P
1
定义在单元 K 上的误差指示子; η 定义为 η = ( K∈Th,p ηK ) 2 . 用 pK 和 hK 分别
表示单元 K 上的基函数的阶及单元的尺寸. 如果一个单元被加密成多个子单元,
那么 cK 表示其子单元的个数. 最后引入符号 N 表示自由度数目.
§5.3.1
hp 自适应策略
Melenk 等人 [174] 以及 Heuveline 等人 [176] 提出的 hp 自适应策略基于如下近
似理论: 如果对网格做一致剖分, 并且所有单元上基函数的阶均为 p, 记 e = u−uh,p
第五章 hp 自适应策略设计
79
为误差, 如果 u ∈ H m (Ω), 那么当采用分片多项式基函数时有 [177, 178]
kekH 1 (Ω) ≤ C
hµ
p(m−1)
kukH m (Ω) ,
(5.19)
其中 h 是网格的尺寸, µ = min(p, m − 1), C 是独立于 h 及 p 的常数.
Melenk 及其合作者 [174] 针对二维四边形网格提出了一种基于误差下降预测
的 hp 自适应策略: 在四边形网格中, 假设当前单元的误差指示子为 ηK , 如果单元
被加密成四个子单元, 那么每一个子单元上的误差预测为 0.5 · 0.5pK ηK ; 如果单元
上的基函数阶提高一阶, 那么误差预测 γp ηK , γp (∈ (0, 1)) 为常数; 如果单元没有
被调整 (包括网格及基函数), 则误差预测为 ηK , 即保持不变. 在自适应过程中, 一
个单元被标记为加密单元, 则判断其误差下降是否达到预期: 如果误差下降达到
预期, 表明解是光滑的, 下一个自适应步将采取 p 加密; 否则将采取 h 加密.
Heuveline 及其合作者 [176] 针对二维四边形和三维六面体也提出了基于误差
下降预测的策略. 他们的策略是尽可能地多采用 p 加密, 该策略分为几种情况: 1)
如果被标记加密的单元在上一个自适应步中没有被加密过, 则采取 p 加密; 2) 如
old , 如果误差小于这个预测,
果单元 K 是通过 p 加密得到的, 那么误差预测为 hk ηK
则采取 p 加密, 否则采取 h 加密; 3) 如果单元是通过 h 加密得到的, 那么误差预
old , 其中 K
测为 2−pK ηK
M 为其父单元, 如果误差小于这个预测, 则采取 p 加密, 否
M
则采取 h 加密.
这两个策略适合二维四边形单元和三维六面体单元, 不能直接应用于三角形
的局部自适应二分加密及四面体的局部自适应二分加密. 另外 Heuveline 及其合
作者设计的策略存在对 hK 的依赖, 策略对单元尺寸敏感. 当单元尺寸较大的时
候 (hK ≥ 1), 自适应过程中会有过多的 p 加密, 不能适当地调整网格; 而当尺寸较
小的时候 (hK ¿ 1), 则会有太多的 h 加密, 收敛速度不一定能达到指数. 我们希
望将这两个策略推广到网格二分加密的情况, 并且使得策略与网格尺寸无关.
这里给出一个 hp 自适应策略, 该策略允许单元采取 h, p 及 hp 自适应加密.
对 h 及 p 自适应加密做不同的假设: 对 h 自适应加密, 假设可以达到代数阶收敛;
对 p 自适应加密, 假设可以达到指数阶收敛, 然后使用不同的误差估计来预测误
差下降因子. 本文中一个单元允许同时采取 h 及 p 自适应加密, 并给出了这种情
况的误差下降预测.
在 h 自适应有限元方法中, 误差大的单元被加密成几个子单元, 其最优收敛
速度是代数的, 表达式可以写成
kek ≤ C1 N
−p
d
,
(5.20)
学位论文
80
其中 p 是单元上基函数的阶, C1 为常数. 将不等式 (5.20) 写成等式, 具有如下形
式
kek = C1 N
−p
d
= C2 (
X
1
2 2
ηK
) ,
(5.21)
K∈T
其中 C2 是依赖于所采用的误差指示子的常数. 这是本文自适应策略的基本出发
点.
如果对网格 Th,p 采取一致 h 加密, 每个单元被加密成 cK 个子单元, 得到新
1 , 同时假设拥有相同父单元的子单元拥有相同的误差指示子. 现在自
的网格 Th,p
由度的数目近似为 cK N . 如果解是光滑的, 并且达到最优代数收敛, 那么有下式
近似成立
C1 (cK N )
−p
d
= C2 (
X
1
2 2
ηK
) = C2 (cK λ2h
1
K∈Th,p
X
1
2 2
ηK
) ,
(5.22)
K∈Th,p
其中 λh 是误差下降因子. 综合式 (5.21) 及式 (5.22), 对 h 自适应加密, 可以得到
误差下降因子
λ2h =
1 1 2p
( )d.
cK cK
我们采用和文章 [176] 一样的想法: 即尽可能多地采取 p 加密. 对 h 自适应加密,
本文使用一个放大的值做误差下降因子, 表达式如下
λh = (
1 p
)d .
cK
(5.23)
下面推导 p 加密的误差下降因子. 误差估计式 (5.19) 中需要知道解析解 u 的
正则性 m, 由于一般情况下 m 是不知道的. 这里采用了一个启发式的技术. 假设
p 大于等于 m, 并将不等式 (5.19) 写成等式, 则当基函数提高一阶时, 有
kekH 1 (Ω) = C(
p m−1 hµ
)
kukH m (Ω) ,
p+1
p(m−1)
从而误差下降因子为
λp = (
p m−1
)
.
p+1
对给定的问题, 需要使用合适的值近似 m − 1. 在单元 K 上, 我们使用单元 K 上
的基函数的阶近似解在单元上的局部正则性. 取 m − 1 = p/2. 这个选择是合适
的, 因为假设选取的值过低, 表明解的局部正则性比估计的好, 那么下一步自适应
加密将采取 p 加密, 否则下一个自适应步的加密将采取 h 加密. 最终得到 p 加密
误差下降因子为
λp = (
p p
)2 .
p+1
(5.24)
第五章 hp 自适应策略设计
81
在实际应用中, 当某一个单元采取 h 加密时, 为了保证网格的协调性, 有可
能使邻居单元也被 h 加密, 如果这个邻居单元被标记了 p 加密, 将允许这个单元
同时进行 h 自适应加密及 p 自适应加密. 组合上面两个误差下降因子得到 hp 加
密的误差下降因子为,
λhp = (
p p 1 p
)2 ( )d .
p+1
cK
(5.25)
误差下降估计式 (5.23), (5.24) 及 (5.25) 对网格的 h 加密类型并没有限制, 仅需要
知道每个单元 h 加密后产生的子单元的个数 cK . 该策略消除了 Heuveline 及其合
作者提出的策略对 h 的依赖, 使得我们的策略与网格尺寸无关.
接下来给出我们的 hp 自适应加密策略, 此处使用 Heuveline 及其合作者 [176]
设计的一个框架, 并做了一些修改. 自适应过程如下:
(1) 对当前计算网格 Th,p , 如果误差指示子 η 满足停止标准 (η ≤ ε), 则停止自适
应循环.
(2) 使用最大策略标记加密单元.
(3) 对网格 Th,p 中每一个单元 K, 如果 K 被标记为加密单元:
• 如果 K 是通过上一个自适应步的 h 加密得到的, 并且基函数的阶没有改
变. 记其父单元为 KM , 检查是否有
2
2
ηK
≤ λ2h ηK
.
M
如果上式成立, 将单元 K 标记为 p 加密, 将基函数的阶提高一阶; 否则,
将单元 K 标记为 h 加密;
• 如果 K 是通过上一个自适应步的 p 加密得到的, 记其父单元为 KM , 检
查是否有
2
2
ηK
≤ λ2p ηK
.
M
如果上式成立, 将单元 K 标记为 p 加密, 将基函数的阶提高一阶; 否则,
将单元 K 标记为 h 加密;
• 如果 K 是通过上一个自适应步的 hp 加密得到的, 记其父单元为 KM , 检
查是否有
2
2
ηK
≤ λ2hp ηK
.
M
如果上式成立, 将单元 K 标记为 p 加密, 将基函数的阶提高一阶; 否则,
将单元 K 标记为 h 加密;
学位论文
82
• 如果单元 K 在上一个自适应步没有被加密 (单元大小及基函数阶保持不
变), 则将单元 K 标记为 p 加密, 将基函数的阶提高一阶.
(4) 根据单元的加密类型, 对单元实施 p 加密及 h 加密, 转至 (1).
§5.4
数值算例
本节用三个数值算例验证我们设计的 hp 自适应策略. 数值算例中比较了三
个不同的自适应策略: h 自适应方法, 本文设计的 hp 自适应策略及 Melenk 及其
合作者设计的 hp 自适应框架 [174]. 测试程序利用 PHG 编制, 测试环境同前一
章.
由于问题是三维的, d 为 3, 网格局部自适应加密算法为二分加密算法, 一个
单元被加密成两个子单元, 因此 cK 为 2. 因而误差下降因子变为
1 p
λh = ( ) 3 ,
2
p p
)2 ,
p+1
(5.27)
p p 1 p
)2 ( )3 .
p+1
2
(5.28)
λp = (
λhp = (
(5.26)
这里使用的误差指示子由 Melenk 及其合作者设计 [174], 该误差指示子原为二维
问题设计, 同样可以用在三维问题上, 其形式如下
2
ηK
=
h2K
kfpK + ∆uN k2L2 (k) +
p2K
X
f ⊂∂K∩Ω
hf ∂uN 2
k[
]k 2 .
2pf ∂nf L (f )
(5.29)
其中 fpK 为 f 在 p − 1 阶基函数空间上的 L2 (K) 投影, hf 为单元 K 上面 f 的直
径, pf = max(p|K1 , p|K2 ), 其中 f 为单元 K1 及 K2 的共享面.
最大策略中参数 θ 选取为 0.5, 基函数为 H 1 层次基, 基函数初始阶数为 2, 最
大阶数为 15, 解法器为预条件共轭梯度法 (PCG, Preconditioned Conjugate Gradient
method), 预条件子为 block Jacobi.
在三维问题中, 合适的 hp 自适应策略可以使误差达到指数阶收敛, 最优收敛
有如下形式 [179]
kek ≤ Ce−γN
1/5
,
(5.30)
其中 C 及 γ 为常数, N 为自由度数. 本节的图形中, 横轴以及纵轴的变量分别为
自由度数和能量误差, 它们的刻度分别为 N 1/5 和对数. 如果误差达到指数阶收
敛, 那么误差曲线应该是一条直线.
第五章 hp 自适应策略设计
83
图形中, HAFEM 表示仅使用 h 加密的结果, HP/PHG 和 HP/MK 则分别表示我们
的策略和 Melenk 及其合作者的策略, 二者的一个不同点在于: 如果一个被标记的
单元在上一个自适应步中没有被调整 (包括网格和基函数), 那么 HP/PHG 将对这
个单元采取 p 自适应加密, 而 Melenk 等人的做法则是如果单元在这个自适应步
中的误差指示子小于上一个自适应步中的误差指示子则采取 p 自适应加密, 否则
采取 h 自适应加密.
例 5.4.1. 取解析解为 u = e−z (1 + e100(x+y−1) )−1 , 它在平面 x + y − 1 = 0 上呈现内
层现象, 计算区域为 Ω = (0, 1)3 , 初始网格为一致网格, 单元数为 24.
10
HAFEM
HP/PHG
HP/MK
Energy error
1
0.1
0.01
3125
1e+5
7.60e+5
3.2e+6
9.77e+6
Number of DOF
图 5.1 误差曲线 (例 5.4.1)
表 5.1 不同策略的最终单元数、自由度数及能量误差 (例 5.4.1)
# elements
# DOF
Energy error
HP/PHG
23,920
750,009
1.08e-2
HP/MK
86,520
1,271,317
1.46e-2
HAFEM
6,969,762
9,528,910
1.44e-2
例 5.4.1 的计算结果如图 5.1 所示, 策略 HP/PHG 及 HP/MK 均达到了指数收敛,
但 HP/PHG 的收敛速度明显快于 HP/MK. 从表 5.1 也可以看出, HP/MK 的网格规模及
学位论文
84
自由度规模远大于 HP/PHG 的规模, 说明 HP/MK 更多地做 h 自适应加密, 而 HP/PHG
更多地做 p 自适应加密, 效率更高. hp 自适应有限元与 h 自适应有限元相比, 前
者的收敛速度远快于后者.
例 5.4.2. 取解析解为 u = cos(2πx) cos(2πy) cos(2πz), 该问题的难点在于解的高阶
导数, 其奇数阶与偶数阶导数在每个点的行为不一样, p 自适应加密不一定能改
善数值解 [196]. 计算区域为 L- 形区域, Ω = (−1, 1)3 \ [0, 1] × [−1, 0] × [−1, 1], 初始
网格是一致的, 含 144 个单元.
10
HAFEM
HP/PHG
HP/MK
Energy error
1
0.1
0.01
0.001
0.0001
32
1024
7776
3.28e+4
1e+5
2.49e+5
5.38e+5
1.05e+6
1.89e+6
3.2e+6
Number of DOF
图 5.2 误差曲线 (例 5.4.2)
表 5.2 不同策略的最终单元数、自由度数及能量误差 (例 5.4.2)
# elements
# DOF
Energy error
HP/PHG
3,772
246,046
1.01e-4
HP/MK
35,696
1,171,216
1.67e-4
HAFEM
1,663,068
2,263,137
3.57e-2
计算结果见图 5.2 和表 5.2, 两种 hp 自适应策略均达到指数收敛, 但差别更
明显, HP/MK 策略产生的最终网格单元数比 HP/PHG 高出近一个数量级, 自由度数
目大概是 5 倍, 但最终的误差仍然大于 HP/PHG 的误差, 说明 HP/PHG 策略的效率
第五章 hp 自适应策略设计
85
高于 HP/MK. 从表 5.2 可以看出, h 自适应有限元产生的单元数量比 HP/PHG 高出
两个数量级, 自由度数高一个数量级, 误差却大了两个数量级, hp 自适应有限元
方法相对于 h 自适应有限元方法的优势明显.
1
例 5.4.3. 解析解为 u = (x2 + y 2 + z 2 ) 4 , 求解区域是 Fichera 区域, Ω = (−1, 1)3 \
[0, 1]3 . 这个问题的计算区域有奇性, 同时解析解有一个点奇性. 初始网格为一致
网格, 单元数目为 172.
1
HAFEM
HP/PHG
HP/MK
Energy error
0.1
0.01
0.001
0.0001
1e-05
32
1024
7776
3.28e+4
1e+5
2.49e+5
5.38e+5
1.05e+6
1.89e+6
3.2e+6
Number of DOF
图 5.3 误差曲线 (例 5.4.3)
表 5.3 不同策略的最终单元数、自由度数及能量误差 (例 5.4.3)
# elements
# DOF
Energy error
3,429
155,812
1.07e-5
HP/MK
163,204
1,158,279
1.20e-4
HAFEM
1,377,588
1,904,054
4.44e-4
HP/PHG
例 5.4.3 的计算结果见图 5.3 和表 5.3. 两种 hp 自适应策略均达到指数收敛,
并且收敛曲线更光滑, 说明误差下降预测是准确的. 自适应策略 HP/MK 的单元数
是策略 HP/PHG 的 50 倍, 自由度数目大约是 8 倍, 误差却大了一个数量级, 表明我
学位论文
86
们的自适应策略更有效. h 自适应有限元仅达到了代数收敛, 而 hp 自适应有限元
方法达到了指数收敛.
§5.5
本章小结
本章介绍了 hp 自适应有限元及常用的 hp 自适应策略. 在研究现有 hp 自适
应策略的基础上提出了一个新的 hp 自适应策略, 该策略基于误差下降预测. 我
们给出了不同加密策略下误差下降速度的预测公式. 数值实验表明, 我们提出的
hp 自适应策略对所测试的问题可以达到指数收敛, 并且优于 Melenk 及其合作者
提出的策略.
第六章
总结与展望
本文对并行自适应有限元计算中的动态负载平衡及 hp 自适应策略进行了研
究. 对动态负载平衡, 我们研究了过顶点哈密尔顿圈及哈密尔顿路, 给出了存在性
定理, 并设计了线性复杂度的构造算法; 设计了任意维希尔伯特序的编码解码算
法, 并提出该曲线的一个变体; 改进并实现了加密树以及空间填充曲线两种网格
划分方法. 对 hp 自适应有限元方法, 我们提出了一个新的自适应加密策略.
动态负载平衡是并行自适应计算中的一个重要的、必不可少的环节. 在并行
自适应有限元计算中,动态负载平衡通常通过网格重划分实现, 网格重划分的速
度、网格重划分的质量以及网格重划分后数据迁移的开销是影响整个并行自适应
有限元计算并行效率和并行可扩展性的重要因素. 此外, 网格重划分后, 新的子网
格的重组和数据迁移涉及到复杂的数据处理和通信, 其并行程序设计亦是一项非
常具有挑战性的工作. 本文介绍了作者在网格划分算法和 PHG 动态负载平衡模
块的设计与实现方面的工作. 本文所实现的 PHG 动态负载平衡模块已经在实际
应用中经受住了考验, 可以胜任数千 CPU 核、十亿以上单元规模的并行自适应
有限元计算的要求 (该部分内容可以参见崔涛的博士论文), 并且在整个自适应有
限元计算时间中只占很小的比例,展现出很高的效率和很好的稳健性, 基本能够
满足当前应用的需求. 在未来, 我们将根据随着并行规模的增大及应用的复杂化
而对动态负载平衡提出的新要求, 继续对相关算法及模块进行改进和完善.
hp 自适应有限元方法能够达到很高的计算效率, 是一类非常有前景的算法,
是当前科学计算研究的热点问题之一. 当前, hp 自适应有限元方法远未成熟, 离
实际应用尚有很大的距离, 其中的难点之一便是 hp 自适应策略的设计. 本文利用
PHG 平台对 hp 自适应有限元的支持, 对 hp 自适应策略进行了研究和数值实验.
文中提出了一种新的 hp 自适应策略, 它在所适用的网格及网格加密方式方面比
文献中提出的一种策略有所扩展, 并且数值实验的结果表明其在计算效果上亦优
于文献中的策略. 此外, 这些数值实验亦验证了 PHG 平台中与 hp 自适应相关的
模块的正确性和适用性. 这些研究是初步的, 有待于未来从理论上和应用上进一
步深入和展开.
87
88
学位论文
参考文献
[1] L. Zhang, A Parallel Algorithm for Adaptive Local Refinement of Tetrahedral Meshes
Using Bisection, Numer. Math.: Theory, Methods and Applications, 2009(2): 65–89
[2] G. A. Geist, J. A. Kohl and P. M. Papadopoulos, PVM and MPI: a Comparison of
Features, Calculateurs Paralleles, 1996(8): 137–150
[3] Al Geist, Adam Beguelin, Jack Dongarra, Weicheng Jiang, Robert Manchek and Vaidy
Sunderam, PVM: Parallel Virtual Machine A Users’ Guide and Tutorial for Networked
Parallel Computing, The MIT Press, 1994
[4] PVM: Parallel Virtual Machine, http://www.csm.ornl.gov/pvm/pvm home.html
[5] MPI: Message Passing Interface, http://www.mcs.anl.gov/research/projects/mpi/index.htm
[6] The MPI Standard, http://www.mcs.anl.gov/research/projects/mpi/standard.html
[7] MPI-2: Extensions to the Message-Passing Interface,
http://www.mcs.anl.gov/research/projects/mpi/mpi-standard/mpi-report-2.0/mpi2report.htm
[8] MPICH–An Implementation of MPI, http://www-unix.mcs.anl.gov/mpi/mpich/
[9] Bill Gallmeister, POSIX 4 Programmers Guide: Programming for the Real World,
O’Reilly Media, 1995
[10] Dick Buttlar, Jacqueline Farrell and Bradford Nichols, PThreads Programming: A
POSIX Standard for Better Multiprocessing , O’Reilly Media, 1996
[11] Barbara Chapman, Gabriele Jost and Ruud van der Pas, Using OpenMP: Portable Shared
Memory Parallel Programming, The MIT Press, 2007
[12] Rhit Chandra, Leonardo Dagum, Dave Kohr, Dror Maydan, Jeff McDonald and Ramesh
Menon, Parallel Programming in OpenMP, Morgan Kaufmann Publisher, 2001
[13] George Karypis and Vipin Kumar, METIS–Family of Multilevel Partioning Algorithms,
http://glaros.dtc.umn.edu/gkhome/metis/metis/overview
[14] George Karypis and Vipin Kumar, PARMETIS–Parallel Graph Partitioning and Fillreducing Matrix Ordering,
http://glaros.dtc.umn.edu/gkhome/metis/parmetis/overview
[15] Kirk Schloegel, George Karypis and Vipin Kumar, A Unified Algorithm for Loadbalancing Adaptive Scientific Simulations,Supercomputing, 2000
89
学位论文
90
[16] Kirk Schloegel, George Karypis and Vipin Kumar, Parallel Multilevel Algorithms for
Multi-Constraint Graph Partitioning,EuroPar, 2000
[17] George Karypis, Kirk Schloegel and Vipin Kumar, ParMETIS: Parallel Graph Partitioning and Sparse Matrix Ordering Library version 3.1, 2003
[18] E. Boman, K. Devine, R. Heaphy, B. Hendrickson, V. Leung, L.A. Riesen, C. Vaughan,
U. Catalyurek, D. Bozdag, W. Mitchell and J. Teresco, Zoltan v3: Parallel Partitioning,
Load Balancing and Data-Management Services, User’s Guide, Sandia National Laboratories Tech. Rep. SAND2007-4748W, 2007
[19] E. Boman, K. Devine, R. Heaphy, B. Hendrickson, V. Leung, L.A. Riesen, C. Vaughan, U.
Catalyurek, D. Bozdag and W. Mitchell, Zoltan v3: Parallel Partitioning, Load Balancing
and Data-Management Services, Developer’s Guide, Sandia National Laboratories Tech.
Rep. SAND2007-4749W, 2007
[20] Karen Devine, Erik Boman, Robert Heaphy, Bruce Hendrickson and Courtenay Vaughan,
Zoltan Data Management Services for Parallel Dynamic Applications, Computing in
Science and Engineering, 2002(4): 90–97
[21] Erik Boman, Karen Devine, Lee Ann Fisk, Robert Heaphy, Bruce Hendrickson, Vitus
Leung, Courtenay Vaughan, Umit Catalyurek, Doruk Bozdag and William Mitchell,
Zoltan home page, http://www.cs.sandia.gov/Zoltan
[22] R. Falgout, V. E. Henson, U. M. Yang, T. Kole, B. Lee, J. Painter, C. Tong and P.
Vassilevski, HYPRE–High Performance Preconditioners,
http://www.llnl.gov/CASC/linear solvers/
[23] Satish Balay, Kris Buschelman, William D. Gropp, Dinesh Kaushik, Matthew G. Knepley, Lois Curfman McInnes, Barry F. Smith and Hong Zhang, PETSc Web page,
http://www.mcs.anl.gov/petsc
[24] Satish Balay, Kris Buschelman, Victor Eijkhout, William D. Gropp, Dinesh Kaushik,
Matthew G. Knepley, Lois Curfman McInnes, Barry F. Smith and Hong Zhang, PETSc
Users Manual, ANL-95/11 – Revision 3.0.0, Argonne National Laboratory, 2008
[25] Satish Balay, William D. Gropp, Lois Curfman McInnes and Barry F. Smith, Efficient
Management of Parallelism in Object Oriented Numerical Software Libraries, Modern
Software Tools in Scientific Computing, Birkhäuser Press, 1997: 163–202
[26] P. Bastian, K. Birken, K. Johannsen, S. Lang, N. Neuss, H. Rentz-Reichert and C.
Wieners, UG–A Flexible Software Toolbox for Solving Partial Differential Equations,
Computing and Visualization in Science, 1997(1): 27–40
参考文献
91
[27] P. Bastian, K. Birken, K. Johannsen, S. Lang, V. Reichenberger, C. Wieners, G. Wittum,
and C. Wrobel, A parallel software-platform for solving problems of partial differential
equations using unstructured grids and adaptive multigrid methods, High performance
computing in science and engineering, Springer, 1999: 326–339
[28] P.R. Amestoy, I.S. Duff and J.-Y. L’Excellent, Multifrontal parallel distributed symmetric
and unsymmetric solvers, Methods in Appl. Mech. Eng., 2000(184): 501–520.
[29] P.R. Amestoy, I.S. Duff, J.-Y. L’Excellent and J. Koster, A fully asynchronous multifrontal solver using distributed dynamic scheduling, SIAM Journal on Matrix Analysis
and Applications, 2001(23[1]): 15–41
[30] Xiaoye S. Li and James W. Demmel, SuperLU DIST: A Scalable Distributed-Memory
Sparse Direct Solver for Unsymmetric Linear Systems, ACM Trans. Mathematical Software, 2003(29[2]): 110–140
[31] L. S. Blackford, J. Choi, A. Cleary, E. D’Azevedo, J. Demmel, I. Dhillon, J. Dongarra, S.
Hammarling, G. Henry, A. Petitet, K. Stanley, D. Walker and R. C. Whaley, ScaLAPACK
Users’ Guide, Society for Industrial and Applied Mathematics, 1997
[32] Kristi Maschhoff and Danny Sorensen, A portable implementation of ARPACK for distributed memory parallel architectures, Copper Mountain Conference on Iterative Methods, 1996
[33] Vicente Hernandez, Jose E. Roman and Vicente Vidal, SLEPc: A Scalable and Flexible
Toolkit for the Solution of Eigenvalue Problems, ACM Transactions on Mathematical
Software, 2005(31[3]): 351–362
[34] V. Hernandez, J. E. Roman and V. Vidal, SLEPc: Scalable Library for Eigenvalue Problem Computations, Lecture Notes in Computer Science, 2003(2565): 377–391
[35] Steve Benson, Lois Curfman McInnes, Jorge Moré, Todd Munson and Jason Sarich,
TAO User Manual (Revision 1.9), Mathematics and Computer Science Division, Argonne
National Laboratory, 2007, http://www.mcs.anl.gov/tao
[36] Peter MacNeice, Kevin M. Olson, Clark Mobarry, Rosalinda de Fainchtein and Charles
Packer, PARAMESH : A parallel adaptive mesh refinement community toolkit, Computer
Physics Communications, 2000(126): 330–354
[37] M.J. Hagger, Automatic domain decomposition on unstructured grids (DOUG), Advances in Computational Mathematics, 1997: 28–54
学位论文
92
[38] James Ahrens, Berk Geveci and Charles Law, ParaView: An End-User Tool for Large
Data Visualization, In the Visualization Handbook, Elsevier, 2005,
http://www.paraview.org
[39] W. Dörfler, A convergent adaptive algorithm for Poisson’s equation, SIAM J. Numer.
Anal, 1996(33): 1106–1124.
[40] P. Morin, R. H. Nochetto and K. G. Siebert, Convergence of Adaptive Finite Element
Methods, SIAM Review, 2002(44[2]), 631–658.
[41] R.E. Bank, The efficient implementation of local mesh refinement algorithms, Adaptive
Computational Methods for Partial Differential Equations, SIAM, 1983: 74–81
[42] R.E. Bank, PLTMG: A software package for solving elliptic partial differential equations,
Users’ guide 7.0, volume 15 of Frontiers in Applied Mathematics, SIAM, 1994
[43] Mark T. Jones and Paul E. Plassmann, Parallel algorithms for adaptive mesh refinement,
SIAM Journal on Scientific Computing, 1997(18[3]): 686–708
[44] R. E. Bank, A. H. Sherman and A. Weiser, Refinement algorithms and data structures
for regular local mesh refinement, in Scientific Computing, IMACS/North-Holland Publishing Company, Amsterdan, 1983: 3–17
[45] M. C. Rivara, Mesh refinement processes based on the generalized bisection of simplices,
SIAM Journal of Numerical Analysis, 1984(21): 604–613
[46] M. C. Rivara and P. Inostroza, Using Longest-side Bisection Techniques for the Automatic
Refinement fo Delaunay Triangulations, International Journal for Numerical Methods in
Engineering, 1997(40): 581–597
[47] M. C.Rivara and M. Venere, Cost Analysis of the longest-side (triangle bisection) Refinement Algorithms for Triangulations, Engineering with Computers, 1996(12): 224–234
[48] E. G. Sewell, A finite element program with automatic user-controlled mesh grading, in
Advances in Computer Methods for Partial Differential Equations III, New Brunswick,
1979: 8–10
[49] Rupak Biswas and Roger C. Strawn, Tetrahedral and hexahedral mesh adaptation for
CFD problems, Applied Numerical Mathematics, 1998(26[1-2]): 135–151
[50] Yoshitaka Wada and Hiroshi Okuda, Effective adaptation tenique for hexahedral mesh,
Concurrency and Computation: Practice and Experience, 2002(14[6-7]): 451–463
[51] E. Bänsch, An adaptive finite element strategy for the three dimensional time dependent
Navier-Stokes equations, J. Comput. Appl. Math., 1991(36): 3–28
参考文献
93
[52] I. Kossaczky, A Recursive Approach to Local Mesh Refinement in Two and Three dimensions, J. Comput. Appl. Math., 1994(55): 275–288
[53] D. N. Arnold, A. Mukherjee and L. Pouly, Locally Adapted Tetrahedral Meshes Using
Bisection, SIAM J. Sci. Comput., 2000(22[2]), 431–448
[54] A. Liu and B. Joe, Quality Local Refinement of Tetrahedral Meshes Based on Bisection,
SIAM J. Sci. Comput., 1995(16[6]): 1269–1291
[55] M. C. Rivara, D. Pizarro and N. Chrisochoides, Parallel refinement of tetrahedral
meshes using terminaledge bisection algorithm, Proceedings 13th International Meshing
Roundtable, Williamsbourg USA, 2004
[56] W. J. Barry, M. T. Jones and P. E. Plassmann, Parallel adaptive mesh refinement techniques for plasticity problems, Advances in Engineering Software, 1998(29[3]): 217–225
[57] Philippe P. Pébay and David C. Thompson, Parallel Mesh Refinement Without Communication, Proceedings 13th International Meshing Roundtable, Williamsbourg USA
September, 2004
[58] J. G. Castãnos and J. E. Savage, Parallel Refinement of Unstructured Meshes, Proceedings of the IASTED International Conference on Parallel and Distributed Computing
and Systems, MIT, Boston, USA, 1999
[59] PHG: Parallel Hierachical Grid, http://lsec.cc.ac.cn/phg
[60] R. D. Williams, Performance of dynamic load balancing algorithms for unstructured mesh
calculations, Concurrency: Practice and Experience, 1991(3): 457–481
[61] J. de Keyser and D. Roose, Grid partitioning by inertial recursive bisection, Report TW
174, Dept of Computer Science, Belgium, 1992
[62] P. M. Campbell, K. D. Devine, J. E. Flaherty, L. G. Gervasio and J. D. Teresco, Dynamic
octree load balancing using space-filling curves, Technical Report, CS-03-01, 2003
[63] C. Farhat, A simple and efficient automatic FEM domain decomposer, Computer and
Structures, 1988(28): 579–602
[64] C. M. Fiduccia and R. M. Mattheyses, A linear-time heuristic for improving network
partitions, ACM IEEE 19 Design Automation Conference Proceedings, 1982(1982): 175–
181
[65] C. Walshaw and M. Cross, JOSTLE: Parallel Multilevel Graph-Partitioning Software An Overview, In F. Magoules, editor, Mesh Partitioning Techniques and Domain Decomposition Techniques, Civil-Comp Ltd., 2007: 27–58
学位论文
94
[66] A. Schmidt and K. G. Siebert, ALBERTA: An Adaptive Hierarchical Finite Element
Toolbox, http://www.alberta-fem.de/
[67] Pascal J. FREY, Medit: an interactive mesh visualization software,
http://www.ann.jussieu.fr/~frey/logiciels/medit.html
[68] ANSYS Fluent, http://www.ansys.com/products/fluid-dynamics/
[69] Linbo Zhang, Tao Cui and Hui Liu, Symmetric Quadrature Rules on Triangles and
Tetrahedra, J.Comp.Math, 2009(27[1]): 89–96
[70] OpenDX: Open Visualization Data Explorer, http://www.opendx.org
[71] VTK: Visualization Toolkit, http://www.vtk.org
[72] Leonid Oliker and Rupak Biswas, PLUM: parallel load balancing for adaptive unstructured meshes, Journal of Parallel and Distributed Computing, 1998(52[2]): 150–177
[73] Dia, http://projects.gnome.org/dia/
[74] A.O. Cifuentes and A. Kalbag, A performance study of tetrahedral and hexahedral elements in 3-D finite element structure analysis, Finite Elements in Analysis and Design,
1992(12): 313–318
[75] Steven E. Benzley, Ernest Perry, Karl Merkley, Brett Clark and Greg Sjaardama, A
Comparison of all Hexagonal and all Tetrahedral Finite Element Meahes for Elastic and
Elasto-plastic Analysis
[76] Mark A.Yerry and Mark S. Shephard, Three-Dimensional Mesh Generation by Modified
Octree Technique, International Journal for Numerical Methods in Engineering, 1984(20):
1965–1990
[77] Mark S. Shephard and Marcel K. Georges, Three-Dimensional Mesh Generation by Finite
Octree Technique, International Journal for Numerical Methods in Engineering, 1991(32):
709–749
[78] C. L. Lawson, Software for C1 Surface Interpolation, Mathematical Software III, 1977:
161–194
[79] David F. Watson, Computing the Delaunay Tesselation with Application to Voronoi
Polytopes, The Computer Journal, 1981(24[2]): 167–172
[80] C. Geuzaine and J.-F. Remacle, Gmsh: a three-dimensional finite element mesh generator with built-in pre- and post-processing facilities, International Journal for Numerical
Methods in Engineering, 2009(79[11]): 1309–1331
参考文献
95
[81] J. Schöberl, NETGEN: An advancing front 2D/3D-mesh generator based on abstract
rules, Computing and Visualization in Science, 1997(1[1]): 41–52
[82] TetGen: A Quality Tetrahedral Mesh Generator and a 3D Delaunay Triangulator,
http://tetgen.berlios.de/
[83] W. F. Mitchell, Hamiltonian paths through two- and three-dimensional grids, Journal of
Research of the NIST, 2005(110): 127–136
[84] W. F. Mitchell, The Refinement-Tree Partition for Parallel Solution of Partial Differential
Equations, Journal of Research of the NIST, 1998(103): 405–414
[85] G. Heber, R. Biswas and G. R. Gao, Self-avoiding walks over two-dimensional adaptive unstructured meshes, NAS Techinical Report, NAS-98-007, NASA Ames Research
Center, 1998
[86] Hans Sagan, Space-Filling Curves, Springer-Veriag, New York, 1994
[87] L. Velho and J Gomes de Miranda, Digital halftoning with space-filling curves, Computer
Graphics, 1991(25): 81–90
[88] G. M. Morton, A computer Oriented Geodetic DataBase and a New Technique in File
Sequencing, Technical Report, Ottawa, Canada, 1966
[89] Guohua Jin and John Mellor-Crummey, Using Space-filling Curves for Computation
Reordering, In Proceedings of the Los Alamos Computer Science Institute Sixth Annual
Symposium, 2005
[90] C. J. Alpert and A. B. Kahng, Multi-way partitioning via spacefilling curves and dynamic
programming, In Proceedings of the 31st Annual Conference on Design Automation
Conference, 1994: 652–657
[91] D. Abel and D. Mark, A comparative analysis of some two-dimensional orderings, International J. of Geographical Information and Systems, 1990(4[1]): 21–31
[92] J. Bartholdi III and P. Goldsman, Vertex-labeling algorithms for the Hilbert spacefilling
curve, Software: Practice and Experience, 2001(31): 395–408
[93] C. Böhm, S. Berchtold and D. A. Keim, Seaching in hign-dimensional spaces: Index
structures for improving the performance of multimedia databases, ACM Computing
Surveys, 2001(33): 322–373
[94] A. R. Butz, Space filling curves and mathematical programming, Information and Control, 1968(12): 314–330
学位论文
96
[95] M. Challacombe, A general parallel sparse-blocked matrix multiply for linear scaling scf
theory, Computer Physics Communications, 2000(128[1-2]):93–107
[96] Y. C. Hu, A. Cox and W. Zwaenepoel, Improving fine-grained irregular shared-memory
benchmarks by data reordering, In Proceedings of the 2000 ACM/IEEE Conference on
Supercomputing, Dallas, TX, 2000
[97] G. Jin, J. Mellor-Crummey and R. Fowler, Increasing temporal locality with skewing and
recursive blocking, In Proceedings of the 2001 ACM/IEEE Conference on Supercomputing, Denver, CO, Nov 2001
[98] Y. Matias and A. Shamir, A video scrambling technique based on space filling curve, In
Advances in Cryptology–CRYPTO’89, 1987: 398–416
[99] Hwansoo Han and Chau-wen Tseng, Improving Locality For Adaptive Irregular Scientific
Codes,In 13 th Int’l Workshop on Languages and Compilers for Parallel Computing, 1999
[100] J. Mellor-Crummey, D. Whalley and K. Kennedy, Improving memory hierarchy performance for irregular applications, In Proceedings of the 13th ACM International Conference on Supercomputing, Rhodes, Greece, June 1999: 425–433
[101] J. Mellor-Crummey, D. Whalley and K. Kennedy, Improving memory hierarchy performance for irregular applications using data and computation reorderings, International
Journal of Parallel Programming, 2001(29[3]): 217–247
[102] L. K. Platzman and J. J. Bartholdi III, Spacefilling curves and the planar travelling
salesman problem, J. of the ACM, 1989(36): 719–737
[103] J. Salmon and M.Warren, Parallel out-of-core methods for n-body simulation, In Proceedings of the 8th SIAM Conference on Parallel Processing for Scientific Computing,
1997
[104] Y. Zhang and R. E. Webber, Space diffusion: An improved parallel halftoning technique
using spacefilling curves, In Proceedings of the 20th Annual Conference on Computer
Graphics and Interactive Techniques, 1993: 305–312
[105] Sierpiński Curve, http://mathworld.wolfram.com/SierpinskiCurve.html
[106] David Salomon, Data Compression: The Complete Reference, Springer-Verlag, 2000
[107] Jochen Alber and Rolf Niedermeier, On Multi-Dimensional Hilbert Indexings, Theory of
Computing Systems, Springer, 1998: 329–338
[108] G. Breinholt and C. Schierz, Algorithm 781: Generating Hilbert’s space-filling curve by
recursion, ACM Trans. on Mathematical Software, 1998(24[2]): 184–189
参考文献
97
[109] A. R. Butz, Altrnative algorithm for Hilbert’s space-filling curve, IEEE Transactions on
Computers, 1971(20): 424–426
[110] L. M. Goldschlager, Short algorithms for space-filling curves, Software—Practice and
Experience 1981(11): 99–100
[111] I. H. Witten and B. Wyvill, On the generation and use of space-filling curves, Software—
Practice and Experience 1983(13): 519–525
[112] A. J. Cole, A note on space filling curve, Software—Practice and Experience 1983(13):
1181–1189
[113] A. J. Fisher, A new algorithm for generation hilbert curves, Software: Practice and
Experience,1986(16): 5–12
[114] J. G. Griffiths, Table-driven algorithms for generating space-filling curves, ComputerAided Design 1985(17[1]): 37–41
[115] X. Liu and G. F. Schrack, Encoding and decoding the Hilbert order, Software—Practice
and Experience 1996(26[12]): 1335–1346
[116] X. Liu and G. F. Schrack, An algorithm for encoding and decoding the 3-D Hilbert order,
IEEE transactions on image processing 1997(6): 1333–1337
[117] C. Faloutsos and S. Roseman, Fractals for secondary key retrieval, In Pr oceedings of the
8th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems,
Philadelphia, Pensylvania, USA, 1989: 247–252
[118] N. Chen, N. Wang and B. Shi, A new algorithm for encoding and decoding the Hilbert
order, Software—Practice and Experience 2007(37[8]): 897–908
[119] J. K. Lawder, Calculation of Mappings Between One and n-dimensional Values Using
the Hilbert Space-filling Curve, Technical Report, 2000
[120] S. Kamata, R. O. Eason and Y. Bandou, A new algorithm for N-dimensional Hilbert
scanning, IEEE Trans on Image Processing, 1999(8[7]): 964–973
[121] C. Li and Y. Feng, Algorithm for analyzing n-dimensional Hilbert curve, vol. 3739,
Springer Berlin/Heidelberg, 2005: 657–662
[122] Robert W. Doran, The Gray Code, Journal of Universal Computer Science, 2007(13[11]):
1573–1597
学位论文
98
[123] H. Liu, Dynamic load balancing on adaptive unstructured meshes, High Performance
Computing and Communications, 10th IEEE International Conference on 2008(0): 870–
875
[124] A. Schmidt and K. G. Siebert, ALBERTA: An Adaptive Hierarchical Finite Element
Toolbox, http://www.alberta-fem.de/
[125] Bruce Hendrickson and Karen Devine, Dynamic load balancing in computational mechanics, Computer Methods in Applied Mechanics and Engineering, 2000(184): 485–500
[126] P. K. Jimack, An overview of dynamic load-balancing for parallel adaptive computational mechanics codes, Parallel and Distributed Processing for Computational Mechanics, Saxe-Coburg Publications, 1997
[127] Vol Nr and Per-Olof Fjällström, Algorithms for Graph Partitioning: A Survey, 1998
[128] Y. F. Hu and R. J. Blake, Load balancing for unstructured mesh applications, Progress
in computer research, 2001: 117–148
[129] K. D. Devine, E. G. Boman, R. T. Heaphy, B. A. Hendrickson, J. D. Teresco, J. Faik, J.
E. Flaherty and L. G. Gervasio, New challenges in dynamic load balancing, Appl. Numer.
Math, 2004(52): 133–152
[130] P. M. Campbell, The performance of an octree load balancer for parallel adaptive finite
element computation, Master’s thesis, Computer Science Dept., Rensselaer Polytechnic
Institute, Troy, NY, 2001
[131] Umit Catalyurek and Cevdet Aykanat, Decomposing Irregularly Sparse Matrices for
Parallel Matrix-Vector Multiplication, Proceedings of the Third International Workshop
on Parallel Algorithms for Irregularly Structured Problems, 1996: 75–86
[132] T. Bui and C. Jones, A heuristic for reducing Fill in sparse matrix factorization, in Proc.
6th SIAM Conf. Parallel Processing for Scientific Computing, SIAM, 1993: 445–452
[133] B. Hendrickson and R. Leland, A multilevel algorithm for partitioning graphs, in Proc.
Supercomputing’95, ACM, Dec. 1995
[134] G. Karypis and V. Kumar, A fast and high quality multilevel scheme for partitioning
irregular graphs, Tech. Rep. CORR 95-035, University of Minnesota, Dept. Computer
Science, Minneapolis, MN, June 1995
[135] C. Chang, T. Kurc, A. Sussman, U. Catalyurek and J. Saltz, A hypergraph-based workload partitioning strategy for parallel data aggregation, In: Proc. of 11th SIAM Conf.
Parallel Processing for Scientific Computing, SIAM, Philadelphia, PA.
参考文献
99
[136] G. Cybenko, Dynamic load balancing for distributed memory multiprocessors, Journal
of Parallel and Distributed Computing, 1989(7[2]): 279–301
[137] Karen Devine, Erik Boman, Robert Heapby, Bruce Hendrickson and Courtenay Vaughan,
Zoltan Data Management Service for Parallel Dynamic Applications, Computing in Science and Engineering, 2002(4[2]): 90–97
[138] Karen D. Devine and Joseph E. Flaherty, Parallel adaptive hp-refinement techniques for
conservation laws, Applied Numerical Mathematics, 1996(20[4]): 367–386
[139] Karen Devine and Bruce Hendrickson, Tinkertoy parallel programming: a case study with
Zoltan, International Journal of Computational Science and Engineering, 2005(1[2-4]):
64–72
[140] M. J. Berger and S. H. Bokhari, A partitioning strategy for nonuniform problems on
multiprocessors, IEEE Trans. Computers, 1987(C-36): 570–580
[141] M. T. Jones and P. E. Plassmann, Computational results for parallel unstructured mesh
computations, Computing Systems in Engineering, 1994(5): 297–309
[142] H. D. Simon, Partitioning of unstructured problems for parallel processing, in Proc. Conference on Parallel Methods on Large Scale Structural Analysis and Physics Applications,
Pergammon Press, 1991
[143] R. Van Driessche and D. Roose, Dynamic load balancing with a spectral bisection algorithm for the constrained graph partitioning problem, in High Performance Computing
and Networking, no. 919 in Lecture Notes in Computer Science, Springer, 1995: 392–397
[144] A. Pothen, H. Simon and K. Liou, Partitioning sparse matrices with eigenvectors of
graphs, SIAM J. Matrix Anal., 1990(11): 430–452
[145] J. T. Oden, A. Patra and Y. Feng, Domain decomposition for adaptive hp finite element
methods, in Proc. Seventh Intl. Conf. Domain Decomposition Methods, State College,
Pennsylvania, October 1993
[146] A. Patra and J. T. Oden, Problem decomposition for adaptive hp finite element methods,
J. Computing Systems in Engg., 1995(6[2]): 97–109
[147] Leonid Oliker and Rupak Biswas, Efficient Load Balancing and Data Remapping for
Adaptive Grid Calculations, 9th ACM Symposium on Parallel Algorithms and Architectures, 1997: 33–42
[148] Rupak Biswas and Leonid Oliker, Experiments with Repartitioning and Load Balancing
Adaptive Meshes, 1997
学位论文
100
[149] James D. Teresco and Lida P. Ungar, A Comparison of Zoltan Dynamic Load Balancers
for Adaptive Computation, Department of Computer Science, Williams College, Technical Report CS-03-02, 2003
[150] A. Trifunovic and W. Knottenbelt, Parkway 2.0: A Parallel Multilevel Hypergraph Partitioning Tool, Proc. 19th International Symposium on Computer and Information Sciences, 2004: 789–800
[151] U. V. Catalyürek and C. Aykanat, A hypergraph-partitioning approach for coarse-grain
decomposition, In ACM/IEEE SC2001, Denver, CO, November 2001
[152] Bruce Hendrickson and Robert Leland, The Chaco User’s Guide: Version 2.0, Sandia
Tech Report SAND94–2692, 1994
[153] C. Chevalier and F. Pellegrini, PT-SCOTCH: a tool for efficient parallel graph ordering,
Parallel Computing, 2008(34[6-8]): 318–331
[154] F. Pellegrini and J. Roman, SCOTCH: A Software Package for Static Mapping by Dual
Recursive Bipartitioning of Process and Architecture Graphs, Proceedings of HPCN’96,
Brussels, Belgium. LNCS 1067, Springer, 1996: 493–498
[155] George Karypis and Vipin Kumar, Multilevel k-way Hypergraph Partitioning, 36th Design Automation Conference, 1999: 343–348
[156] Zhiming Chen and Feng Jia, An adaptive finite element method with reliable and efficient
error control for linear parabolic problems, Math. Comp., 2004(73): 1163–1197
[157] E. Zhelezina, Adaptive finite element method for the numerical simulation of electric,
magnetic and acoustic fields, Ph.D. thesis, Univ. Erlangen, 2005
[158] Martin Źitka, hp-FEM for large-scale singular 3D problems, MSc Thesis, Department of
Mathematical Sciences, University of Texas At EL PASO, May 2006
[159] Svatava Vyvialová, Analysis and optimation of a class of hierarchic finite element methods, MSc Thesis, Department of Mathematical Sciences, University of Texas At EL
PASO, May 2006
[160] I. Babuska and W. C. Rheinboldt, A posteriori error estimates for the finite element
method, International Journal for Numerical Methods in Engineering, 1978(11): 1592–
1615
[161] I. Babuska and W. C. Rheinboldt, Adaptive approaches and reliability estimates in
finite element analysis, Computer Methods in Applied Mechanics and Engineering,
1979(17/18): 519–540
参考文献
101
[162] A. K. Noor and I. Babuska, Quality assessment and control of finite element simulations,
Finite Elements and Design, 1987(3): 1–26
[163] O. C. Zhienkiewicz, Achievements and some unsolved problems of the finite element
method, International Journal for Numerical Methods in Engineering, 2000(47): 9–28
[164] J. K. Oden and L. Demkowicz, Advances in adaptive improvements: A survey of adaptive
finite element methods in computational mechanics, In Accuracy Estimates and Adaptive
Refinements in Finite Element Computations (ASME), pages 1987: 1–43
[165] M. Ainsworth and J. T. Oden, A posteriori error estimation in finite element analysis,
Computer Methods in Applied Mechanics and Engineering, 1997(142): 1–88
[166] Z. M. Chen and S. Dai, On the Efficiency of Adaptive Finite Element Methods for Elliptic Problems with Discontinuous Coefficients, SIAM Journal on Scientific Computing,
2002(24): 443–462
[167] P. Šolı́n, K. Segeth and I. Doležel, Higher-Order Finite Element Methods, Chapman &
Hall/CRC Press, 2003
[168] Randolph E. Bank, Hierarchical Bases and the Finite Element Method, Acta Numerica,
1997
[169] S. Adjerid, M. Aiffa and J. E. Flaherty, Hierarchical finite element bases for triangular
and tetrahedral elements, Computer Methods in Applied Mechanics and Engineering,
volume 2001(190[22-23]): 2925–2941
[170] Spencer J. Sherwin and George Em Karniadakis, A new triangular and tetrahedral basis
for high-order hp finite element methods, International Journal for Numerical Methods
in Engineering 1995(38[22]): 3775–3802
[171] W. F. Mitchell and M. A. McClain, A survey of hp-adaptive strategies for elliptic partial
differential equations, Accepted by Annals of the European Academy of Sciences, 2010
[172] M. Ainsworth and B. Senior, hp-finite element procedures on non-uniform geometric
meshes: adaptivity and constrained approximation, Grid Generation and Adaptive Algorithms 1999(113): 1–28
[173] E. Süli, P. Houston and Ch. Schwab, hp-finite element methods for hyperbolic problems,
The Mathematics of Finite Elements and Applications X. MAFELAP, Elsevier, 2000:
143–162.
[174] J. M. Melenk and B. I. Wohlmuth, On residual-based a-posteriori error estimation in
hp-FEM, Advances in Computational Mathematics, 2001(15): 311–331
学位论文
102
[175] T. Eibner and J. M. Melenk, An adaptive strategy for hp-FEM based on testing for
analyticity, Compute Mech, 2007(39): 575–595
[176] V. Heuveline and R. Rannacher, Duality-based adaptivity in the hp-finite element
method, J. Numer. Math, 2003(11): 1–18
[177] M. Ainsworth and B. Senior, An adaptive refinement strategy for hp-finite element computation, Applied Numerical Mathematics, 1998(26): 165–178
[178] I. Babuška and M. Suri, The optimal convergence rate of the p-version of the finite
element method, SIAM Journal on Numerical Analysis, 1987(24): 750–776
[179] I. Babuška, B. Andersson, B. Guo, J. M. Melenk and H. S. Oh, Finite element method for
solving problems with singular solutions, Journal of Computational and Applied Mathematics, 1996(1): 51–70
[180] B. Q. Guo and I. Babuška, The h-p version of the finite element method. Part 1. The
basic approximation results, Comput. Mech, 1986(1): 21–41
[181] B. Q. Guo and I. Babuška, The h-p version of the finite element method. Part 2. General
results and applications, Comput. Mech, 1986(1): 203–226
[182] W. Gui and I. Babuška, The h, p and h-p versions of the finite element method in 1
Dimension. Part III. The adaptive h-p version, Numer. Math, 1986(49): 659–683
[183] P. Houston and E. Süli, A note on the design of hp-adaptive finite element methods
for elliptic partial differential equations, Computer Methods in Applied Mechanics and
Engineering, 2005(194): 229–243
[184] C. Bernardi, N. Fiétier and R. G. Owens, An error indicator for mortar element solutions
to the Stokes problem, IMA J. Num. Anal., 2001(21): 857–886
[185] J. Valenciano and R. G. Owens, An h-p adaptive spectral element method for Stokes
flow, Appl. Numer. Math. 2000(33): 365–371
[186] S. Adjerid, M. Aiffa and J. E. Flaherty, Computational methods for singularly perturbed
systems, in: J.Cronin, R.E. O’Malley (Eds.), Singular Perturbation Concepts of Differential Equations, AMS Providence, 1998
[187] J. T. Oden and A. Patra, A parallel adaptive strategy for hp finite elements, Comput.
Methods. Appl. Mech. Engrg. 1995(121): 449–470
[188] J. T. Oden, A. Patra and Y. Feng, An hp adaptive strategy, Adaptive Multilevel and
Hierarchical Computational Strategies, 1992(157): 23–46
参考文献
103
[189] C. Mavriplis, Adaptive mesh strategies for the spectral element method, Comput. Methods. Appl. Mech. Engrg. 1994(116): 77–86
[190] L. Demkowicz, W. Rachowicz and P. Devloo, A fully automatic hp-adaptivity, J. Sci.
Comp. 2002(17[1-4]): 117–142
[191] W. Rachowicz, L. Demkowicz and J. T. Oden, Toward a universal h-p adaptive finite
element strategy, Part 3. Design of h-p meshes, Comput. Methods. Appl. Mech. Engrg.,
1989(77): 181–212
[192] P. Šolı́n and L. Demkowicz, Goal-oriented hp-adaptivity for elliptic problems, Comput.
Meth. Appl. Mech. Engrg., 2004(193): 449–468
[193] P. Šolı́n, J. Červený and I. Doležel, Arbitrary-level hanging nodes and automatic adaptivity in the hp-FEM, Math. Comput. Simulation, 2008(77): 117–132
[194] P. Houseton and E. Süli, A note on the design of hp-adaptive finite element methods for
elliptic partial differential equations, Comput. Methods Appl. Mech. Engrg., 2005(194):
229–243
[195] M. T. Jones and P. E. Plassmann, Adaptive refinement of unstructured finite-element
meshes, Finite Elements in Analysis and Design, 1997(25[12]): 41–60
[196] G. W. Zumbusch, Simultanous h-p Adaption in Multilevel Finite Elements, Zuse Institute
Berlin, TR-95-14, 1995
[197] Jack Dongarra, Ian Foster, Geoffrey Fox, Wiliam Gropp, Ken Kennedy, Linda Torczon
and Andy White, Sourcebook of Parallel Computing, Morgan Kaufmann Publishers Inc,
San Francisco, CA, USA, 2003
[198] Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest and Clifford Stein, Introduction to Algorithm, Second Edition, The MIT Press, 2001
[199] Wolfgang Bangerth and Rolf Rannacher, Adaptive finite element methods for differential
equations, Birkhäuser Verlag, Basel, Switzerland, 2003
[200] R. Verfürth, Adaptive finite element methods, Lecture notes, 2007
[201] K. Eriksson, D. Estep, P. Hansbo and C. Johnson, Introduction to Adaptive Methods
for Differential Equations, Acta Numerica, 1995: 1–54.
[202] R. H. Nochetto, Adaptive finite element methods for elliptic PDE, CNA Summer School,
2006.
学位论文
104
[203] C. Bernardi and R. Verfürth, Adaptive finite element methods for elliptic equations with
non-smoooth coefficients, Numerische Mathematik 2000(85): 579–608.
[204] 崔涛, PHG 中线性棱单元的实现及三维电磁时谐场问题并行自适应数值模拟实验, 硕
士论文, 中国科学院数学与系统科学研究院, 中国科学院数学与系统科学研究院, 2006
[205] 张林波, 迟学斌, 莫则尧, 李若, 并行计算导论, 清华出版社, 2006
[206] 陈国良, 并行计算 — 结构, 算法和编程, 第一版, 高等教育出版社, 1999
[207] 王烈衡, 许学军, 有限元方法的数学基础, 第一版, 科学出版社, 2004
发表文章目录
[1] Hui Liu, Dynamic Load Balancing on Adaptive Unstructured Meshes, 10th IEEE International Conference on High Performance Computing and Communications, 2008: 870–875.
[2] Linbo Zhang, Tao Cui and Hui Liu, Symmetric Quadrature Rules on Triangles and Tetrahedra, J.Comp.Math, 2009(27[1]): 89–96
[3] 刘辉, 张林波, 自适应有限元常用标记策略及其在 PHG 中的并行实现, 数值计算与计算
机应用, 2009(30[4])
[4] Hui Liu and Linbo Zhang, Existence and construction of Hamiltonian paths and cycles
on conforming tetrahedral meshes, International Journal of Computer Mathematics (accepted)
105
106
学位论文
致
谢
本文是在张林波研究员的指导下完成的, 在论文完成之际, 我衷心地感谢我
的导师张林波研究员, 感谢张老师将我引入科学计算的殿堂, 感谢张老师对我的
指导、关怀和支持. 张老师知识渊博, 治学态度严谨, 思维敏锐, 工作作风精益求
精, 诲人不倦, 平易近人, 对我影响深远. 本论文从选题到完成, 每一步都是在导
师的指导下完成的, 倾注了导师大量的心血. 我的每一点进步, 都离不开张老师的
指导和帮助. 在此, 谨向张老师表示崇高的敬意和衷心的感谢.
感谢林群院士, 曹礼群老师, 郑伟英老师在学习和工作上的支持和帮助, 同
时, 和你们的讨论也使我获益匪浅. 谢谢你们.
感谢计算数学与科学工程计算研究所, 研究所学术氛围浓厚, 学习环境舒适.
本文的工作是在科学与工程计算国家重点实验室完成的, 感谢实验室提供的优越
的科研环境和高水平的计算环境. 感谢白英老师、吴继萍老师、丁如娟老师、张
纪平老师、朱琳爱义老师的支持和帮助. 感谢数学与系统科学研究院的老师及图
书馆等部门老师.
感谢我们课题组的成员. 感谢钱莹师姐, 崔涛师兄, 冷伟, 成杰, 王昆, 谢妍,
感谢你们在学习和工作上给予的帮助和建设性的意见. 感谢钱莹师姐和崔涛师兄
在论文上给予的帮助.
在这五年中, 结识了很多的朋友, 王辛师姐、肖源明师兄、刘歆师兄、阴小波
师兄、翟方曼师姐、初晴、张黎、丁晓东、张静静、杜锐、唐明筠、付云姗、胡娟、
赵旭鹰、陈华杰、刘伟、田霞、陈景润、滕飞、聂宁明、程明厚、张娅、翟淑星、
杨熙、李明、李金, 谢谢你们在学习和生活上给予的支持、鼓励和帮助. 感谢初晴
和她老公王震在工作上给予的宝贵的建议和无私的帮助. 谢谢你们.
感谢家人的养育和支持, 感谢家人无私的奉献. 谢谢你们.
107
| 5cs.CE
|
Effective Differential Lüroth’s Theorem∗
Lisi D’Alfonso♮
Gabriela Jeronimo♯
Pablo Solernó♯
arXiv:1202.6344v2 [math.AC] 1 Jul 2013
♮ Departamento de Ciencias Exactas, Ciclo Básico Común, Universidad de Buenos Aires,
Ciudad Universitaria, 1428, Buenos Aires, Argentina
♯ Departamento de Matemática and IMAS, UBA-CONICET,
Facultad de Ciencias Exactas y Naturales,Universidad de Buenos Aires,
Ciudad Universitaria, 1428, Buenos Aires, Argentina
E-mail addresses: [email protected], [email protected], [email protected]
July 19, 2013
Abstract
This paper focuses on effectivity aspects of the Lüroth’s theorem in differential
fields. Let F be an ordinary differential field of characteristic 0 and F hui be the field
of differential rational functions generated by a single indeterminate u. Let be given
non constant rational functions v1 , . . . , vn ∈ F hui generating a differential subfield
G ⊆ F hui. The differential Lüroth’s theorem proved by Ritt in 1932 states that there
exists v ∈ G such that G = F hvi. Here we prove that the total order and degree of a
generator v are bounded by minj ord(vj ) and (nd(e + 1) + 1)2e+1 , respectively, where
e := maxj ord(vj ) and d := maxj deg(vj ). As a byproduct, our techniques enable us
to compute a Lüroth generator by dealing with a polynomial ideal in a polynomial
ring in finitely many variables.
1
Introduction
In 1876, J. Lüroth in [16] presented his famous result, currently known as the Lüroth’s
Theorem: if k ⊂ L ⊂ k(u) is an extension of fields, where k(u) is the field of rational
functions in one variable u, then L = k(v) for a suitable v ∈ L (see [23, §10.2] for a modern
proof). In 1893 G. Castelnuovo solved the same problem for rational function fields in two
variables over an algebraically closed ground field. For three variables, Lüroth’s problem
has been solved negatively.
In 1932 J.F. Ritt [19] addressed the differential version of this result: Let F be an
ordinary differential field of characteristic 0, u an indeterminate over F and Fhui the
∗
Partially supported by the following Argentinian grants: ANPCyT PICT 2007/816, UBACYT
2002010010041801 (2011-2014) and UBACYT 20020090100069 (2010-2012).
1
smallest field containing F, u and all its derivatives. Then, if G is a differential field such
that F ⊂ G ⊂ Fhui, there is an element v ∈ G such that G = Fhvi. Such an element will
be called a Lüroth generator of the extension F ⊂ G.
In fact, Ritt considered the case of a differential field F of meromorphic functions in an
open set of the complex plane and G a finitely generated extension of F. Later, E. Kolchin
in [14] and [15] gave a new proof of this theorem for any differential field of characteristic
0 and without the hypothesis of finiteness on G. Contrary to the classical setting, the
differential Lüroth problem fails in the case of two variables (see [18]). A possible weak
generalization of Lüroth’s theorem to dimension greater than one is the conjecture in control theory which states that every system linearizable by dynamic feedback is linearizable
by endogenous feedback, or in algebraic terms, that a subextension of a differentially flat
extension is differentially flat ([7], [8, Section 4.2]).
The present paper deals with quantitative aspects of the Differential Lüroth’s Theorem
and the computation of a Lüroth generator v of a finite differential field extension. More
precisely (see Propositions 5 and 19):
Theorem 1 Let F be an ordinary differential field of characteristic 0, u differentially
transcendental over F and G := FhP1 (u)/Q1 (u), . . . , Pn (u)/Qn (u)i, where Pj , Qj ∈ F{u}
are relatively prime differential polynomials of order at most e ≥ 1 (i.e. at least one
derivative of u occurs in Pj or Qj for some j) and total degree bounded by d such that
Pj /Qj ∈
/ F for every 1 ≤ j ≤ n. Then, any Lüroth generator v of F ⊂ G can be written
as the quotient of two relatively prime differential polynomials P (u), Q(u) ∈ F{u} with
order bounded by min{ord(Pj /Qj ); 1 ≤ j ≤ n} and total degree bounded by min{(d +
1)(e+1)n , (nd(e + 1) + 1)2e+1 .
Our approach combines elements of Ritt’s and Kolchin’s proofs (mainly the introduction of the differential polynomial ideal related to the graph of the rational map
u 7→ (Pj /Qj )1≤j≤n ) with estimations concerning the order and the differentiation index of
differential ideals developed in [21], [4] and [5]. These estimations allow us to reduce the
problem of computing a Lüroth generator to a Gröbner basis computation in a polynomial
ring in finitely many variables (see Remark 17).
An algorithmic version of Ritt’s proof of the differential Lüroth’s Theorem is given
in [9]. The authors propose a deterministic algorithm that relies on the computation of
ascending chains by means of the Wu-Ritt’s zero decomposition algorithm; however, no
quantitative questions on the order or the degree of the Lüroth generator are addressed.
For effectiveness considerations of the classical not differential version, we refer the interested reader to [17], [22], [1], [10], [11], [3].
This paper is organized as follows. In Section 2 we introduce the notations, definitions and previous results from differential algebra (mainly concerning the order and the
differentiation index) needed in the rest of the paper. In Section 3 we present a straightforward optimal upper bound on the order of any Lüroth generator and we discuss some
ingredients that appear in the classical proofs of Lüroth’s Theorem by Ritt and Kolchin
2
and that we will use in our arguments. In Section 4, by means of estimates on the differentiation index and the order of an associated DAE system, we reduce the computation
of a Lüroth generator to an elimination problem in effective classical algebraic geometry;
as a byproduct, we obtain upper bounds for the degree of a Lüroth generator. Finally, in
Section 5 we show two simple examples illustrating our constructions.
2
Preliminaries
In this section we introduce the notation used throughout the paper and recall some
definitions and results from differential algebra.
2.1
Basic definitions and notation
A differential field (F, ∆) is a field F with a set of derivations ∆ = {δi }i∈I , δi : F → F.
In this paper, all differential fields are ordinary differential fields; that is to say, they are
equipped with only one derivation δ; for instance, F = Q, R or C with δ = 0, or F = Q(t)
with the usual derivation δ(t) = 1. For this reason, we will simply write differential field
(instead of ordinary differential field).
Let (F, δ) be a differential field of characteristic 0.
The ring of differential polynomials in α indeterminates z := z1 , . . . , zα , which is denoted by F{z1 , . . . , zα } or simply F{z}, is defined as the commutative polynomial ring
(p)
F[zj , 1 ≤ j ≤ α, p ∈ N0 ] (in infinitely many indeterminates), extending the derivation
(i)
(i+1)
of F by letting δ(zj ) = zj
(i)
, that is, zj
stands for the ith derivative of zj (as cus(p)
(p)
tomarily, the first derivatives are also denoted by żj ). We write z (p) := z1 , . . . , zα and
z [p] := z, z (1) , . . . , z (p) for every p ∈ N0 .
The fraction field of F{z} is a differential field, denoted by Fhzi, with the derivation
obtained by extending the derivation δ to the quotients in the usual way. For g ∈ F{z},
(i)
the order of g with respect to zj is ord(g, zj ) := max{i ∈ N0 : zj appears in g}, and the
order of g is ord(g) := max{ord(g, zj ) : 1 ≤ j ≤ α}; this notion of order extends naturally
to Fhzi by taking the maximum of the orders of the numerator and the denominator in a
reduced representation of the rational fraction.
Given differential polynomials H := h1 , . . . , hβ ∈ F{z}, we write [H] to denote the
smallest differential ideal of F{z} containing H (i.e. the smallest ideal containing the
polynomials H and all their derivatives of arbitrary order). The minimum radical differential ideal of F{z} containing H is denoted by {H}. For every i ∈ N, we write
(i)
(i)
H (i) := h1 , . . . , hβ and H [i] := H, H (1) , . . . , H (i) .
A differential field extension G/F consists of two differential fields (F, δF ) and (G, δG )
such that F ⊆ G and δF is the restriction to F of δG . Given a subset Σ ⊂ G, FhΣi denotes
the minimal differential subfield of G containing F and Σ.
An element ξ ∈ G is said to be differentially transcendental over F if the family
of its derivatives {ξ (p) : p ∈ N0 } is algebraically independent over F; otherwise, it is
said to be differentially algebraic over F. A differential transcendence basis of G/F is a
minimal subset Σ ⊂ G such that the differential field extension G/FhΣi is differentially
algebraic. All the differential transcendence bases of a differential field extension have
3
the same cardinality (see [13, Ch. II, Sec. 9, Theorem 4]), which is called its differential
transcendence degree.
2.2
Differential polynomials, ideals and manifolds
Here we recall some definitions and properties concerning differential polynomials and
their solutions.
Let g ∈ F{z} = F{z1 , . . . , zα }. The class of g for the order z1 < z2 < · · · < zα of the
(i)
variables is defined to be the greatest j such that zj appears in g for some i ≥ 0 if g ∈
/ F,
and 0 if g ∈ F. If g is of class j > 0 and of order p in zj , the separant of g, which will
(p)
be denoted by Sg , is ∂g/∂zj and the initial of g, denoted by Ig , is the coefficient of the
(p)
highest power of zj in g.
Given g1 and g2 in F{z}, g2 is said to be of higher rank in zj than g1 if either
(p)
ord(g2 , zj ) > ord(g1 , zj ) or ord(g2 , zj ) = ord(g1 , zj ) = p and the degree of g2 in zj is
(p)
greater than the degree of g1 in zj . Finally, g2 is said to be of higher rank than g1 if g2
is of higher class than g1 or they are of the same class j > 0 and g2 is of higher rank in zj
than g1 .
We will use some elementary facts of the well-known theory of characteristic sets. For
the definitions and basic properties of rankings and characteristic sets, we refer the reader
to [13, Ch. I, §8-10].
Let H be a (not necessarily finite) system of differential polynomials in F{z}. The
manifold of H is the set of all the zeros η ∈ G α of H for all possible differential extensions
G/F.
Every radical differential ideal {H} of F{z} has a unique representation as a finite
irredundant intersection of prime differential ideals, which are called the essential prime
divisors of {H} (see [20, Ch. II, §16-17]).
For a differential polynomial g in F{z} of positive class and algebraically irreducible,
there is only one essential prime divisor of {g} which does not contain Sg ; the manifold of
this prime differential ideal is called the general solution of g (see [20, Ch. II, §12-16]).
2.3
Hilbert-Kolchin function and differentiation index
Let P be a prime differential ideal of F{z}. The differential dimension of P, denoted by
diffdim(P), is the differential transcendence degree of the extension F ֒→ Frac(F{z}/P)
(where Frac denotes the fraction field). The differential Hilbert-Kolchin function of P
with respect to F is the function HP,F : N0 → N0 defined as:
HP,F (i) := the (algebraic) transcendence degree of Frac(F[z [i] ]/(P ∩ F[z [i] ])) over F.
For i ≫ 0, this function equals the linear function diffdim(P)(i + 1) + ord(P), where
ord(P) ∈ N0 is an invariant called the order of P ([13, Ch. II, Sec. 12, Theorem 6]). The
minimum i from which this equality holds is the Hilbert-Kolchin regularity of P.
Let F be a finite set of differential polynomials contained in P of order bounded by a
non-negative integer e. Throughout the paper we assume that e ≥ 1, in other words, all
the systems we consider are actually differential but not purely algebraic.
4
Definition 2 The set F is quasi-regular at P if, for every k ∈ N0 , the Jacobian matrix
of the polynomials F, Ḟ , . . . , F (k) with respect to the variables z [e+k] has full row rank over
the fraction field of F{z}/P.
A fundamental invariant associated to ordinary differential algebraic equation systems
is the differentiation index. There are several definitions of this notion (see [4] and the
references given there), but in every case it represents a measure of the implicitness of the
given system. Here we will use the following definition, introduced in [4, Section 3], in
the context of quasi-regular differential polynomial systems with respect to a fixed prime
differential ideal P:
Definition 3 The P−differentiation index σ of a quasi-regular system F of polynomials
in F{z} of order at most e is
σ := min{k ∈ N0 : (F, Ḟ , . . . , F (k) )Pe+k ∩ F[z [e] ]Pe = [F ]P ∩ F[z [e] ]Pe },
where, for every k ∈ N0 , Pe+k := P ∩ F[z [e+k] ] (i.e. the contraction of the prime ideal P),
F[z [e+k] ]Pe+k denotes the localized ring at the prime ideal Pe+k and (F, Ḟ , . . . , F (k) )Pe+k
is the algebraic ideal generated by F, Ḟ , . . . , F (k) in F[z [e+k] ]Pe+k .
Roughly speaking, the differentiation index of the system F is the minimum number of
derivatives of the polynomials F needed to write all the relations given by the differential
ideal P up to order e.
3
Differential Lüroth’s Theorem
In [19, Chapter VIII] (see also [20] and [13]), the classical Lüroth’s Theorem for transcendental field extensions is generalized to the differential algebra framework:
Theorem 4 (Differential Lüroth’s Theorem) Let F be an ordinary differential field
of characteristic 0 and let u be differentially transcendental over F. Let G be a differential
field such that F ⊂ G ⊂ Fhui. Then, there is an element v ∈ G such that G = Fhvi.
Our goal is the following: for n > 1, let be given differential polynomials P1 , . . . , Pn ,
Q1 , . . . , Qn ∈ F{u}, with Pj /Qj ∈
/ F and Pj , Qj relatively prime polynomials for every
1 ≤ j ≤ n, and denote
G := FhP1 (u)/Q1 (u), . . . , Pn (u)/Qn (u)i,
which is a subfield of Fhui. We want to compute a Lüroth generator of G/F, that is, a
pair of differential polynomials P, Q ∈ F{u} such that Q 6≡ 0 and G = FhP (u)/Q(u)i.
We are also interested in the study of a priori upper bounds for the orders and degrees of
both polynomials P and Q.
An optimal estimate for the order of the polynomials P and Q can be obtained by
elementary computations (see Section 3.1). However, the problem of estimating their
degrees seems to be a more delicate question which requires a more careful analysis that
we will do in the subsequent sections of the paper.
5
3.1
Bound for the order
We start by proving an upper bound for the order of a Lüroth generator.
Proposition 5 Under the previous assumptions and notation, any element v ∈ G such
that G = Fhvi satisfies ord(v) ≤ min{ord(Pj /Qj ) : 1 ≤ j ≤ n}.
Proof. Let v ∈ G be such that G = Fhvi and ε := ord(v).
For j = 1, . . . , n, let vj = Pj (u)/Qj (u). By assumption, vj ∈
/ F. Let T be a new
differential indeterminate over F. Since vj ∈ G = Fhvi, there exists Θj ∈ FhT i such that
vj = Θj (v). Let Nj = ord(Θj ). Then, ord(vj ) ≤ Nj + ε. In addition,
∂vj
∂(Θj (v)) X ∂Θj
∂Θj
∂v (i)
∂v (Nj )
(v)
=
=
=
(v)
.
∂T (i)
∂u(Nj +ε)
∂u(Nj +ε)
∂u(Nj +ε)
∂T (Nj )
∂u(Nj +ε)
i≥0
Since Nj is the order of Θj , it follows that
scendental over F, we have that
∂Θj
∂T (Nj )
∂vj
∂Θj
∂T (Nj )
6= 0, and as v is differentially tran-
(v) 6= 0. Furthermore,
∂v(Nj )
∂u(Nj +ε)
=
∂v
∂u(ε)
6= 0, since
ε = ord(v). We conclude that (Nj +ε) 6= 0 and, therefore, ord(vj ) = Nj + ε.
∂u
The proposition follows.
Note that the above proposition shows that all possible Lüroth generators v have the
same order. In fact, two arbitrary generators are related by an homographic map with
coefficients in F (see for instance [14, §1], [20, Ch. II, §44]).
3.2
Ritt’s approach
Here we discuss some ingredients which appear in the classical proofs of Theorem 4 (see
[20, 14]) and that we also consider in our approach.
Following [20, II. §39 and §40], let y be a new differential indeterminate over the
field Fhui (and, in particular, over G) and consider the differential prime ideal Σ of all
differential polynomials in G{y} vanishing at u:
Σ := {A ∈ G{y} such that A(u) = 0}.
(1)
Lemma 6 The manifold of Σ is the general solution of an irreducible differential polynomial B ∈ G{y}. More precisely, B is a differential polynomial in Σ with the lowest rank
in y.
Proof. Let B ∈ Σ be a differential polynomial with the lowest rank in y. Note that
B ∈ G{y} is algebraically irreducible, since Σ is prime. We denote the order of B by k
and the separant of B by SB = ∂B/∂y (k) . Consider the differential ideal
Σ1 (B) := {A ∈ G{y} | SB A ≡ 0 mod {B}}.
As shown in [20, II. §12], the ideal Σ1 (B) is prime; moreover, we have that A ∈ Σ1 (B) if
a A ≡ 0 mod [B] for some a ∈ N and, in particular, if A ∈ Σ (B) is of order
and only if SB
0
1
at most k = ord(B), then A is a multiple of B (see [20, II. §13]). Furthermore, Σ1 (B) is
6
an essential prime divisor of {B} and, in the representation of {B} as an intersection of
its essential prime divisors, it is the only prime which does not contain SB ([20, II. §15]).
Therefore, the manifold of Σ1 (B) is the general solution of B.
In order to prove the lemma, it suffices to show that Σ = Σ1 (B).
Let A ∈ Σ1 (B). Then, SB A ∈ {B}. Taking into account that Σ is prime, {B} ⊂ Σ,
and SB ∈
/ Σ, it follows that A ∈ Σ.
To see the other inclusion, consider a differential polynomial A ∈ Σ. By the minimality
of B, we have that A is of rank at least the rank of B. Reducing A modulo B, we obtain
a relation of the type
b c
SB
IB A ≡ R mod [B],
where b, c ∈ N0 , IB is the initial of B and R is a differential polynomial whose rank is
lower than the rank of B. Since A and B lie in the differential ideal Σ, it follows that
b I c A ∈ [B] and,
R ∈ Σ, and so, the minimality of B implies that R = 0. In particular, SB
B
c
therefore, IB A ∈ Σ1 (B). Now, IB ∈
/ Σ1 (B) since, otherwise, it would be a differential
polynomial in Σ with a rank lower than the rank of B (recall that Σ1 (B) ⊂ Σ); it follows
that A ∈ Σ1 (B).
Multiplying the polynomial B ∈ G{y} given by Lemma 6 by a suitable denominator,
we obtain a differential polynomial C ∈ F{u, y} with no factor in F{u}. The following
result is proved in [20, II. §42 and §43]:
Proposition 7 If P0 (u) and Q0 (u) are two non-zero coefficients of C (regarded as a
polynomial in F{u}{y}) such that P0 (u)/Q0 (u) ∈
/ F, the polynomial
D(u, y) := Q0 (u)P0 (y) − P0 (u)Q0 (y)
is a multiple of C by a factor in F, and G = FhP0 (u)/Q0 (u)i.
Note that, by the definition of C, the ratio between two coefficients of C coincides with
the ratio of the corresponding coefficients of B.
3.3
An alternative characterization of a Lüroth generator
Under the previous assumptions, consider the map of differential algebras defined by
ψ : F{x1 , . . . , xn , u} → F{P1 (u)/Q1 (u), . . . , Pn (u)/Qn (u), u}
xi
7→
Pi (u)/Qi (u)
u
7→
u
Let P ⊂ F{x, u} be the kernel of the morphism ψ; then, we have an isomorphism
F{P1 (u)/Q1 (u), . . . , Pn (u)/Qn (u), u} ≃ F{x1 , . . . , xn , u}/P.
This implies that P is a prime differential ideal and, moreover, that the fraction field of
F{x1 , . . . , xn , u}/P is isomorphic to Fhui. In addition, the previous isomorphism gives
an inclusion
F{P1 (u)/Q1 (u), . . . , Pn (u)/Qn (u)} ֒→ F{x1 , . . . , xn , u}/P,
7
and the inclusion induced from this map in the fraction fields leads to the original extension
G = FhP1 (u)/Q1 (u), . . . , Pn (u)/Qn (u)i ֒→ Fhui.
As above, let y be a new differential indeterminate over Fhui and Σ the ideal of G{y}
introduced in (1). If A ∈ G{y} is a non-zero differential polynomial in Σ, multiplying it by
an adequate element in F{P1 (u)/Q1 (u), . . . , Pn (u)/Qn (u)}, we obtain a differential polynomial in F{P1 (u)/Q1 (u), . . . , Pn (u)/Qn (u)}{y}, with the same rank in y as A. Taking
a representative (with respect to ψ) in F{x1 , . . . , xn } for each of its coefficients, we get
b ∈ F{x1 , . . . , xn , y}, with the same rank in y as A, such that
a differential polynomial A
b
A(x1 , . . . , xn , u) ∈ P.
Conversely, given a differential polynomial M ∈ F{x1 , . . . , xn , u} such that M ∈ P and
not every coefficient of M as a polynomial in F{x1 , . . . , xn }{u} lies in P ∩ F{x1 , . . . , xn },
the differential polynomial
f(y) := M (P1 (u)/Q1 (u), . . . , Pn (u)/Qn (u), y) ∈ G{y}
M
(2)
is not the zero polynomial, vanishes at u and has a rank in y no higher than that of M .
We conclude that if M ∈ F{x1 , . . . , xn , u} is a differential polynomial with the lowest rank in u among all the differential polynomials as above, the associated differential
f(y) is a multiple by a factor in G of the minimal polynomial B of u over G
polynomial M
introduced in Lemma 6. Therefore, by Proposition 7, a Lüroth generator of G/F can be
f ∈ G{y} provided that this ratio does
obtained as the ratio of any pair of coefficients of M
not lie in F. Moreover:
Proposition 8 Let M ∈ F{x1 , . . . , xn , u} be a differential polynomial in P\(P∩F{x1 , . . . , xn }){u}
f(y) ∈ G{y} be as in (2). Assume that M
f ∈ F(u[ǫ] ){y}
with the lowest rank in u and let M
for a suitable non-negative integer ǫ. Consider two generic points υ1 , υ2 ∈ Qǫ+1 . Let P (y)
f(y) by substituting u[ǫ] = υ1 and
and Q(y) be the differential polynomials obtained from M
u[ǫ] = υ2 respectively. Then P (u)/Q(u) is a Lüroth generator of G/F.
Proof. By Proposition 7, we have that
f(y) = M (P1 (u)/Q1 (u), . . . , Pn (u)/Qn (u), y) = γ(Q0 (u)P0 (y) − P0 (u)Q0 (y))
M
for some γ ∈ G, and P0 , Q0 are such that G = FhP0 (u)/Q0 (u)i. Then, by means of two
specializations υ1 , υ2 of the variables u[ǫ] so that Q0 , Q1 , . . . , Qn and γ do not vanish and
P0 (υ1 )/Q0 (υ1 ) 6= P0 (υ2 )/Q0 (υ2 ), we obtain polynomials of the form
P (y) = α1 P0 (y) − β1 Q0 (y)
and
Q(y) = α2 P0 (y) − β2 Q0 (y),
where α1 , α2 , β1 , β2 ∈ F and α1 β2 −α2 β1 6= 0. The proposition follows since FhP (u)/Q(u)i =
FhP0 (u)/Q0 (u)i = G.
4
Reduction to a polynomial ring and degree bound
In this section, we will obtain upper bounds for the order and the degree of the differential
polynomial M ∈ F{x1 , . . . , xn , u} (see Proposition 8) involved in our characterization of
a Lüroth generator of G/F. These bounds imply, in particular, an upper bound for the
degrees of the numerator and the denominator of the generator (see Section 4.3).
8
4.1
Bounding the order of a minimal polynomial M
Here we estimate the order in the variables x = x1 , . . . , xn and u of a differential polynomial M (x, u) ∈ P \ (P ∩ F{x1 , . . . , xn }){u} of minimal rank in u, where P is the prime
differential ideal introduced in Section 3.3.
Remark 9 The differential dimension of P equals 1, since the fraction field of F{x1 , . . . , xn , u}/P
is isomorphic to Fhui.
Let e := max{ord(Pj /Qj ) : 1 ≤ j ≤ n}. Without loss of generality, we may assume
that ord(P1 (u)/Q1 (u)) ≥ · · · ≥ ord(Pn (u)/Qn (u)). Consider the elimination order in
F{x1 , . . . , xn , u} with x1 < · · · < xn < u.
Since P1 (u)/Q1 (u) ∈
/ F, it is transcendental over F. Now, as the variable u(e+1)
appears in the derivative (P1 (u)/Q1 (u))′ but it does not appear in P1 (u)/Q1 (u), it follows
that (P1 (u)/Q1 (u))′ is (algebraically) transcendental over F(P1 (u)/Q1 (u)). Continuing in
the same way with the successive derivatives, we conclude that P1 (u)/Q1 (u) is differentially
transcendental over F. This implies that the differential ideal P contains no differential
polynomial involving only the variable x1 .
Thus, a characteristic set of P for the considered elimination order is of the form
R1 (x1 , x2 ), R2 (x1 , x2 , x3 ), . . . , Rn−1 (x1 , . . . , xn ), Rn (x1 , . . . , xn , u).
Furthermore, Rn (x1 , . . . , xn , u) is a differential polynomial in P \ (P ∩ F{x1 , . . . , xn }){u}
with a minimal rank in u, that is, we can take M (x, u) = Rn (x, u). Following [21, Lemma
19], we may assume this characteristic set to be irreducible. Then, by [21, Theorem 24],
we have that ord(Ri ) ≤ ord(P) for every 1 ≤ i ≤ n; in particular,
ord(M ) ≤ ord(P).
(3)
The order of the differential prime ideal P can be computed exactly. In order to do
this, we introduce a system of differential polynomials that provides us with an alternative
characterization of the ideal P which enables us to compute its order.
For every j, 1 ≤ j ≤ n, denote Fj := Qj (u)xj − Pj (u) ∈ F{x, u}, and let F :=
F1 , . . . , Fn . Then we have:
Lemma 10 The ideal P is the (unique) minimal differential prime ideal of [F ] which does
not contain the product Q1 . . . Qn . Moreover, P = [F ] : (Q1 . . . Qn )∞ .
Proof. From the definitions of P and F it is clear that [F ] ⊂ P and Q1 (u) . . . Qn (u) ∈
/ P.
Moreover, since F is a characteristic set for the order in F{x, u} given by u < x1 < · · · < xn
and P ∩ F{u} = (0), we conclude that for any polynomial H ∈ P there exists N ∈ N0
such that (Q1 (u) . . . Qn (u))N H ∈ [F ] (observe that Qj is the initial and the separant of
the polynomial Fj for every j). The proposition follows.
The system F we have introduced has the following property that we will use in the
sequel (recall Definition 2):
Lemma 11 The system F is quasi-regular at P.
9
Proof. Let e be the maximum of the orders of the differential polynomials Fj , 1 ≤ j ≤ n.
For every i ∈ N, let Ji be the Jacobian matrix of the polynomials F [i−1] with respect to
the variables (x, u)[i−1+e] . We have that
(
(k)
0
if h 6= j or h = j, k < l
∂Fj
=
(k−l)
(l)
k
if h = j, k ≥ l
∂xh
l Qj
and so, for every i ∈ N, the minor of Ji corresponding to partial derivatives with respect
to the variables x[i−1] is a scalar multiple of (Q1 (u) . . . Qn (u))i , which is not zero modulo
P.
Now, we apply results from [4] in order to compute the order of P.
Proposition 12 The order of the differential ideal P equals e = max{ord(Pj (u)/Qj (u)) :
1 ≤ j ≤ n}.
Proof. Lemma 10 states that the ideal P is an essential prime divisor of [F ], where
F := F1 , . . . , Fn with Fj (x, u) := Qj (u)xj − Pj (u), 1 ≤ j ≤ n, and, as shown in Lemma 11,
the system F is quasi-regular at P. Therefore, taking into account that e is the maximum
of the orders of the polynomials in F , by [4, Theorem 12], the regularity of the HilbertKolchin function of P is at most e − 1. This implies that the order of P can be obtained
from the value of this function at e − 1; more precisely, since the differential dimension of
P equals 1, we have that
ord(P) = trdegF F[x[e−1] , u[e−1] ]/(P ∩ F[x[e−1] , u[e−1] ]) − e.
In order to compute the transcendence degree involved in the above formula, we observe
first that
F[x[e−1] , u[e−1] ]/(P ∩ F[x[e−1] , u[e−1] ]) ≃ F[(Pj /Qj )[e−1] , u[e−1] ].
It is clear that the variables u[e−1] are algebraically independent in this ring. Then,
if L = F(u[e−1] ), the order of the ideal P coincides with the transcendence degree of
L((Pj /Qj )[e−1] , j = 1, . . . , n) over L. Without loss of generality, we may assume that
ord(P1 /Q1 ) = e. Since the variable u(e) appears in P1 /Q1 , we have that L(u(e) )/L(P1 /Q1 )
is algebraic. Similarly, since u(e+1) appears in (P1 /Q1 )′ , it follows that the extension
L(u(e) , u(e+1) )/L((P1 /Q1 ), (P1 /Q1 )′ ) is algebraic. Proceeding in the same way with the
successive derivatives of P1 /Q1 , we conclude that L(u(e) , u(e+1) , . . . , u(2e−1) ) is algebraic
over L((P1 /Q1 )[e−1] ).
Since ord(Pj /Qj ) ≤ e for j = 1, . . . , n, we have that L((Pj /Qj )[e−1] , j = 1, . . . , n) ⊂
L(u(e) , u(e+1) , . . . , u(2e−1) ) and, by the arguments in the previous paragraph, this extension
is algebraic. Therefore,
trdegL L((Pj /Qj )[e−1] , j = 1, . . . , n) = trdegL L(u(e) , u(e+1) , . . . , u(2e−1) ) = e.
Then, by inequality (3) we conclude:
Proposition 13 There is a differential polynomial M ∈ P \ (P ∩ F{x1 , . . . , xn }){u} with
the lowest rank in u such that ord(M ) ≤ e.
10
4.2
Reduction to algebraic polynomial ideals
As stated in Proposition 8, the Lüroth generator of G/F is closely related with a polynomial
M (x1 , . . . , xn , u) ∈ P \ (P ∩ F{x1 , . . . , xn }){u} with the lowest rank in u.
By Proposition 13, such a polynomial M can be found in the algebraic ideal P ∩
F[x[e] , u[e] ] of the polynomial ring F[x[e] , u[e] ]. The following result will enable us to work
with a finitely generated ideal given by known generators; the key point is the estimation
of the P-differentiation index of the system F := F1 , . . . , Fn (see Definition 3):
Lemma 14 The P-differentiation index of F equals e. In particular, we have that
[F ]P ∩ F[x[e] , u[e] ]Pe = (F, Ḟ , . . . , F (e) )P2e ∩ F[x[e] , u[e] ]Pe ,
where Pe := P ∩ F[x[e] , u[e] ] and P2e := P ∩ F[x[2e] , u[2e] ].
Proof. For every k ∈ N, let Jk be the Jacobian submatrix of the polynomials F, . . . , F (k−1)
with respect to the variables (x, u)(e) , . . . , (x, u)(e+k−1) . The P-differentiation index of F
can be obtained as the minimum k such that rank(Jk+1 ) − rank(Jk ) = n holds, where the
ranks are computed over the fraction field of F{x, u}/P (see [4, Section 3.1]).
Now, since the order of the polynomials F in the variables x is zero, no derivative x(l)
with l ≥ e appears in F, Ḟ , . . . , F (e−1) . This implies that the columns of the Jacobian
submatrices Jk of these systems corresponding to partial derivatives with respect to x(l) ,
l = e, . . . , e + k − 1, are null. On the other hand, as e is the order of the system F , we may
suppose that the variable u(e) appears in the polynomial F1 and so, ∂F1 /∂u(e) 6= 0. Thus,
(i)
(i)
∂F1 /∂u(h) 6= 0 for h − i = e and ∂Fj /∂u(h) = 0 for h − i > e; that is, the matrices Jk ,
k = 1, . . . , e, are block, lower triangular matrices of the form
0 ··· 0 ∗
0 ··· 0 ⋆ 0 ··· 0 ∗
Jk = .
.
.
.
.
.
.
.
.. .. · · ·
..
.. .. ..
..
..
0 ···
0 ⋆ 0 ···
0 ⋆ ···
0 ···
0 ∗
where 0 denotes a zero column vector and ∗ a non-zero column vector. Then, rank(Jk ) = k
for k = 1, . . . , e. Moreover,
!
Je
Je+1 =
∂F (e)
··· ··· 0 ··· 0 ∗
∂x(e)
and, by the diagonal structure of
Q1 (u)
0
···
.
0
∂F (e)
Q2 (u) . .
= .
..
..
∂x(e)
..
.
.
0
···
0
0
..
.
0
Qn (u)
,
we see that rank(Je+1 ) = rank(Je ) + n.
It follows that the P-differentiation index of the system equals e.
11
Notation 15 We denote by V ⊂ A(e+1)n × A2e+1 the affine variety defined as the Zariski
closure of the solution set of the polynomial system
Y
F = 0, Ḟ = 0, . . . , F (e) = 0,
Qj 6= 0,
1≤j≤n
where F = F1 , . . . , Fn and Fj (x, u[e] ) = Qj (u[e] )xj − Pj (u[e] ) for every 1 ≤ j ≤ n.
(e)
∞
The
Q algebraic ideal corresponding to the variety V is (F, Ḟ , . . . , F ) : q , where
q := 1≤j≤n Qj . This ideal is prime, since it is the kernel of the map
[e]
F[x[e] , u[2e] ] → F[(Pj /Qj )1≤j≤n , u[2e] ]
(k)
xj
u(i)
(Pj /Qj )(k)
u(i)
7
→
7→
Then, V is an irreducible variety. Moreover, F, Ḟ , . . . , F (e) is a reduced complete intersection in {q 6= 0} and so, the dimension of V is 2e + 1.
Now, the ideal of the variety V enables us to re-interpret the ideal P ∩ F[x[e] , u[e] ]
where the minimal polynomial M lies:
Proposition 16 The following equality of ideals holds:
(F, Ḟ , . . . , F (e) ) : q ∞ ∩ F[x[e] , u[e] ] = P ∩ F[x[e] , u[e] ].
Proof. We start showing that
(F, Ḟ , . . . , F (e) ) : q ∞ ∩ F[x[e] , u[e] ] = (F, Ḟ , . . . , F (e) )P2e ∩ F[x[e] , u[e] ].
First note that (F, Ḟ , . . . , F (e) ) : q ∞ ⊂ (F, Ḟ , . . . , F (e) )P2e since q ∈
/ P. Conversely,
if h ∈ (F, Ḟ , . . . , F (e) )P2e ∩ F[x[e] , u[e] ], there is a polynomial g ∈ F[x[2e] , u[2e] ] such that
g ∈
/ P and gh ∈ (F, Ḟ , . . . , F (e) ); but g ∈
/ (F, Ḟ , . . . , F (e) ) : q ∞ , since otherwise, q N g ∈
(e)
(F, Ḟ , . . . , F ) ⊂ P for some N ∈ N contradicting the fact that q ∈
/ P and g ∈
/ P. Since
(F, Ḟ , . . . , F (e) ) : q ∞ is a prime ideal, it follows that h ∈ (F, Ḟ , . . . , F (e) ) : q ∞ .
Now, Lemma 14 implies that
(F, Ḟ , . . . , F (e) )P2e ∩ F[x[e] , u[e] ] = [F ]P ∩ F[x[e] , u[e] ].
Finally, since [F ]P F{x, u}P = PP F{x, u}P (see [4, Proposition 3]), we conclude that
[F ]P ∩ F[x[e] , u[e] ] = PP ∩ F[x[e] , u[e] ] = P ∩ F[x[e] , u[e] ];
therefore,
(F, Ḟ , . . . , F (e) ) : q ∞ ∩ F[x[e] , u[e] ] = P ∩ F[x[e] , u[e] ].
The previous proposition can be applied in order to effectively compute the polynomial
M (x1 , . . . , xn , u) ∈ P \ (P ∩ F{x1 , . . . , xn }){u} with minimal rank in u, and consequently
a Lüroth generator of the extension G/F (see Propositions 7 and 8), working over a
polynomial ring in finitely many variables:
12
Remark 17 Consider the polynomial ideal (F, Ḟ , . . . , F (e) ) : q ∞ ⊂ F[x[e] , u[2e] ]. Compute
a Gröbner basis G of this ideal for a pure lexicographic order with the variables x[e] smaller
than the variables u[2e] and u < u̇ < · · · < u(2e) . Then, the polynomial M is the smaller
polynomial in G which contains at least one variable in u[2e] .
4.3
Degree bounds
In order to estimate the degree of a minimal polynomial M (x1 , . . . , xn , u) ∈ P as in the
previous section and, therefore, by Proposition 8, also the degree of a Lüroth generator of
G/F, we will relate M to an eliminating polynomial for the algebraic variety V under a
suitable linear projection.
Let k0 ∈ N0 be the order of u in M . By Proposition 13, we have that k0 ≤ e and
so, M ∈ F[x[e] , u[k0 ] ]. Consider the fields K := Frac(F[x[e] ]/(P ∩ F[x[e] ])) and L :=
Frac(F[x[e] , u[e] ]/(P ∩ F[x[e] , u[e] ])). The minimality of the rank in u of M is equivalent
to the fact that {u[k0 −1] } ⊂ L is algebraically independent over K and M is the minimal
polynomial of u(k0 ) ∈ L over K(u[k0 −1] ).
Let Z ⊂ {x[e] } be a transcendence basis of K over F. Then, if we denote U :=
[k
{u 0 −1] } ⊂ L, we have that {Z, U } ⊂ L is algebraically independent over F and {Z, U, u(k0 ) } ⊂
L is algebraically dependent over F and, since L ⊂ F(V), the same holds in F(V).
Let N be the cardinality of {Z, U }. Consider the projection
π : V → AN +1 ,
π(x[e] , u[2e] ) = (Z, U, u(k0 ) ).
(4)
For the construction of Z, U , the dimension of π(V) equals N and so, the Zariski closure
of π(V) is a hypersurface in AN +1 . Let M0 ∈ F[Z, U, u(k0 ) ] be an irreducible polynomial
defining this hypersurface (recall that V is an irreducible variety). From [12, Lemma 2],
we have the inequality
deg M0 ≤ deg V
(5)
Note that M0 ∈ P \ (P ∩ F{x}){u} and ordu (M0 ) = k0 = ordu (M ). However, M0 may
not have the property of minimal rank in u, as the following simple example shows:
Example 1. Let G = Fhu̇, (u̇)2 i. Here:
• e = 1, n = 2
• F1 = x1 − u̇, F2 = x2 − (u̇)2 , q = 1
Following our previous construction,
V = V (F1 , F2 , Ḟ1 , Ḟ2 ) = V (x1 − u̇, x2 − (u̇)2 , ẋ1 − ü, ẍ2 − 2u̇ü)
and we can take Z = {x2 , ẋ2 } and U = {u}. Then, M0 = (u̇)2 − x2 , which has not minimal
rank in u, since u̇ − x1 vanishes over V. In fact, M = u̇ − x1 .
Even though the polynomial M0 is not the minimal rank polynomial M we are looking
for, the following relation between their degrees will be sufficient to obtain a degree upper
bound for a Lüroth generator.
13
Proposition 18 With the previous assumptions and notation, we have that deg(U,u(k0 ) ) (M ) ≤
deg(U,u(k0 ) ) (M0 ). In particular, deg(U,u(k0 ) ) (M ) ≤ deg(V).
Proof. By construction, M is the minimal polynomial of u(k0 ) over K(U ) and M0 is the
minimal polynomial of u(k0 ) over F(Z, U ). Without loss of generality, we may assume that
M and M0 are polynomials with coefficients in F having content 1 in K[U ] and F[Z, U ]
respectively. Since F(Z, U ) ⊂ K(U ), we infer that M divides M0 in K[U ][u(k0 ) ]. The
proposition follows.
Recalling that a Lüroth generator v of G/F can be obtained as the quotient of two
specializations of the variables x1 , . . . , xn and their derivatives in the polynomial M (see
Proposition 8) and that two arbitrary generators are related by an homographic map
with coefficients in F (see [14, §1], [20, Ch. II, §44]), we conclude that the degrees of
the numerator and the denominator of any Lüroth generator of G/F are bounded by the
degree of the variety V.
We can exhibit purely syntactic degree bounds for V in terms of the number n of given
generators for G/F, their maximum order e, and an upper bound d for the degrees of their
numerators and denominators.
First, since the variety V is an irreducible component of the algebraic set defined by the
(e + 1)n polynomials F, Ḟ , . . . , F (e) of total degrees bounded by d + 1 (here F = F1 , . . . , Fn
and Fj (x, u) = Qj (u)xj − Pj (u)), Bézout’s theorem (see for instance [12, Theorem 1])
implies that
deg V ≤ (d + 1)(e+1)n .
An analysis of the particular structure of the system leads to a different upper bound
for deg(V), which is not exponential in n: taking into account that V is an irreducible
variety of dimension 2e + 1, its degree is the number of points in its intersection with a
generic linear variety of codimension 2e + 1, that is,
deg V = #(V ∩ V (L1 , . . . , L2e+1 )),
where, for every 1 ≤ i ≤ 2e + 1, Li is a generic affine linear form in the variables x[e] , u[2e] ,
X
X
(k)
Li (x[e] , u[2e] ) =
aijk xj +
bik u(k) + ci .
(6)
0≤k≤2e
1≤j≤n
0≤k≤e
For every 1 ≤ j ≤ n, the equation Fj (xj , u) = 0 implies that, generic points of V
satisfy xj = Pj (u)/Qj (u). Proceeding inductively, it follows easily that, generically
(k)
xj
=
Pj (u)
Qj (u)
(k)
=
Rjk (u[e+j] )
Qj (u[e] )k+1
with deg(Rjk ) ≤ d(k + 1)
for every 1 ≤ j ≤ n, 0 ≤ k ≤ e. Substituting these formulae into (6) and clearing
denominators, we deduce that the degree of V equals the number of common solutions of
14
the system defined by the 2e + 1 polynomials
P
Y
Pn [e] [2e]
1
[2e]
e+1
Li
Li (u ) :=
Qj
,...,
,u
Q1
Qn
1≤j≤n
Y
Y
X
Y
X
e+1
(k)
Qe+1
Q
+
c
+
b
u
Qe+1
=
aijk Rjk Qje−k
i
ik
j
j
h
1≤j≤n
0≤k≤e
0≤k≤2e
h6=j
1≤j≤n
1≤j≤n
for generic coefficients aijk , bik , ci and the inequality q 6= 0. From the upper bounds for
the degrees of the polynomials Qj , Rjk , it follows that Li is a polynomial of total degree
bounded by nd(e + 1) + 1 for every 1 ≤ i ≤ 2e + 1. Therefore, Bézout’s bound implies that
deg V ≤ (nd(e + 1) + 1)2e+1 .
We conclude that:
Proposition 19 Under the previous assumptions and notation, the degrees of the numerator and the denominator of any Lüroth generator of G/F are bounded by min{(d+1)(e+1)n ,
(nd(e + 1) + 1)2e+1 }.
5
Examples
As before, let F be a differential field of characteristic 0 and u a differentially transcendental element over F.
Example 1. Let G = Fhu/u̇, u + u̇i. In this case, we have:
• e = 1, n = 2,
• F1 = u̇x1 − u, F2 = x2 − u − u̇, q = u̇,
As the ideal (F1 , F2 , Ḟ1 , Ḟ2 ) = (u̇x1 − u, x2 − u − u̇, üx1 + u̇ẋ1 − u̇, ẋ2 − u̇ − ü) is prime and
does not contain u̇, we have that (F1 , F2 , Ḟ1 , Ḟ2 ) : q ∞ = (F1 , F2 , Ḟ1 , Ḟ2 ) and, therefore,
V = V (F1 , F2 , Ḟ1 , Ḟ2 ) = V (u̇x1 − u, x2 − u − u̇, üx1 + u̇ẋ1 − u̇, ẋ2 − u̇ − ü).
The dimension of V equals 3 and {x1 , x2 , ẋ1 } is a transcendence basis of F(V) over
F. Then, k0 = 0 and so, we look for a polynomial M0 (x1 , x2 , ẋ1 , u) ∈ (F1 , F2 , Ḟ1 , Ḟ2 ). We
compute this polynomial by an elimination procedure:
M0 (x1 , x2 , ẋ1 , u) = (x1 + 1) u − x1 x2 .
Since degu (M0 ) = 1, then M = M0 . Finally, specializing (u, u̇, ü) into u1 = (1, 1, 0)
and u2 = (0, 1, 0), we compute specialization points (1, 2, 1) and (0, 1, 1) respectively for
(x1 , x2 , ẋ1 ); hence, we obtain the following Lüroth generator for G/F:
v=
2u − 2
P (u)
=
.
Q(u)
u
15
In the previous example, the polynomial M lies in the polynomial ideal (F1 , F2 ), that
is, no differentiation of the equations is needed in order to compute it and, consequently, a
Lüroth generator can be obtained as an algebraic rational function of the given generators.
However, this is not always the case, as the following example shows.
Example 2. Let G = Fhu̇, u + üi. We have:
• e = 2, n = 2,
• F1 = x1 − u̇, F2 = x2 − u − u(2) , q = 1,
Following our previous arguments, we consider the ideal
(2)
(2)
(F1 , F2 , Ḟ1 , Ḟ2 , F1 , F2 ) =
(2)
(2)
= (x1 − u̇, x2 − u − u(2) , ẋ1 − u(2) , ẋ2 − u̇ − u(3) , x1 − u(3) , x2 − u(2) − u(4) ).
This is a prime ideal of F[x[2] , u[4] ]. The variety V is the zero-set of this ideal and it has
dimension 5. A transcendence basis of F(V) over F including a maximal subset of x[2] is
(2)
(2)
{x1 , x2 , ẋ1 , ẋ2 , x2 } and the minimal polynomial of u over F(x1 , x2 , ẋ1 , ẋ2 , x2 ) is
M0 = u − x2 + ẋ1 .
Again, since degu (M0 ) = 1, then M = M0 . Two specializations of this polynomial lead us
u+a
. We conclude that G = Fhui.
to a Lüroth generator of G/F of the form v =
u+b
References
[1] C. Alonso, J. Gutiérrez, and T. Recio, A rational function decomposition algorithm
by near-separated polynomials. J. Symb. Comp. 19 (1995), 527544.
[2] P. Bürgisser, M. Clausen, M.A. Shokrollahi, Algebraic Complexity Theory,
Grundlehren der Mathematischen Wissenschaften, vol. 315, Springer, Berlin, 1997.
[3] G. Chèze, Nearly Optimal Algorithms for the Decomposition of Multivariate Rational
Functions and the Extended Lüroth’s Theorem, J. Complexity 26 (2010), no. 4, 344–
363.
[4] L. D’Alfonso, G. Jeronimo, G. Massaccesi, P. Solernó, On the index and the order of quasi-regular implicit systems of diffrential equations. Linear Algebra and its
Applications 430 (2009), pp. 2102–2122.
[5] L. D’Alfonso, G. Jeronimo, P. Solernó, On the complexity of the resolvent representation of some prime differential ideals. J. Complexity 22 (2006), no. 3, 396–430.
[6] L. D’Alfonso, G. Jeronimo, F. Ollivier, A. Sedoglavic, P. Solernó, A geometric index
reduction method for implicit systems of differential algebraic equations. J. Symbolic
Computation 46, Issue 10 (2011), 1114–1138
16
[7] M. Fliess, J. Lévine, Ph. Martin and P. Rouchon. A Lie-Bäcklund approach to equivalence and flatness of nonlinear systems. IEEE Trans. Automat. Control, 44(5): 922–
937, 1999.
[8] M. Fliess, Variations sur la notion de contrôlabilité. Quelques aspects de la théorie
du contrôle, 4786, SMF Journ. Annu., 2000, Soc. Math. France, Paris, 2000.
[9] X. Gao, T. Xu, Lüroth’s theorem in differential fields, Journal of Systems Science and
Complexity 15 (2002), no. 4, 376–383.
[10] J. Gutiérrez, R. Rubio, D. Sevilla, On multivariate rational function decomposition.
Computer algebra (London, ON, 2001). J. Symbolic Comput. 33 (2002), no. 5, 545–
562.
[11] J. Gutiérrez, R. Rubio, D. Sevilla, Unirational Fields of Transcendence Degree One
and Functional Decomposition. Proc. of the 2001 Int. Symposium on Symb. and Alg.
Comput. ISSAC’01. ACM Press, New York (2001), 167–174.
[12] J. Heintz, Definability and fast quantifier elimination in algebraically closed fields.
Theoret. Comput. Sci. 24 (1983), no. 3, 239–277.
[13] E.R. Kolchin, Differential Algebra and Algebraic Groups, Academic Press, NewYork,
1973.
[14] E.R. Kolchin, Extensions of differential fields, II. Ann. of Math. (2) 45 (1944), 358–
361.
[15] E.R. Kolchin, Extensions of differential fields, III. Bull. Amer. Math. Soc. 53 (1947).
397–401.
[16] J. Lüroth, Beweis eines Satzes über rationale curven, Math. Ann. , 9 (1876) pp.
163-165
[17] E. Netto, Über einen Lüroth gordaschen staz. Math. Ann. 46 (1895), 310–318.
[18] F. Ollivier, Une réponse négative au problème de Lüroth différentiel en dimension 2.
C.R. Acad. Sci. Paris, Serie I, t. 327, no.10, Série I, 1998, 881–886.
[19] J.F. Ritt, Differential equations from the algebraic standpoint. Amer. Math. Soc.
Colloq. Publ., Vol XIV, New York, 1932.
[20] J.F. Ritt, Differential Algebra. Amer. Math. Soc. Colloq. Publ., Vol. 33, New York,
1950.
[21] B. Sadik, A bound for the order of characteristic set elements of an ordinary prime
differential ideal and some applications, Appl. Algebra Engrg. Comm. Comput. 10,
no. 3, (2000), 251–268.
[22] T.W. Sederberg, Improperly parametrized rational curves, Computer Aided Geometric Design 3 (1986), 67–75.
[23] B. L. van der Waerden, Modern Algebra, Vol. I, Springer-Verlag, 1991.
17
| 0math.AC
|
arXiv:1703.06092v2 [math.GR] 24 May 2017
Some remarks on finitarily approximable groups
Nikolay Nikolov, Jakob Schneider, and Andreas Thom
Abstract. The concept of a C-approximable group, for a class of finite
groups C, is a common generalization of the concepts of a sofic, weakly
sofic, and linear sofic group.
Glebsky raised the question whether all groups are approximable
by finite solvable groups with arbitrary invariant length function. We
answer this question by showing that any non-trivial finitely generated
perfect group does not have this property, generalizing a counterexample
of Howie. On a related note, we prove that any non-trivial group which
can be approximated by finite groups has a non-trivial quotient that can
be approximated by finite special linear groups.
Moreover, we discuss the question which connected Lie groups can
be embedded into a metric ultraproduct of finite groups with invariant
length function. We prove that these are precisely the abelian ones,
providing a negative answer to a question of Doucha. Referring to a
problem of Zilber, we show that a the identity component of a Lie group,
whose topology is generated by an invariant length function and which
is an abstract quotient of a product of finite groups, has to be abelian.
Both of these last two facts give an alternative proof of a result of
Turing. Finally, we solve a conjecture of Pillay by proving that the
identity component of a compactification of a pseudofinite group must
be abelian as well.
All results of this article are applications of theorems on generators
and commutators in finite groups by the first author and Segal. In Section 4 we also use results of Liebeck and Shalev on bounded generation
in finite simple groups.
1. Introduction
Eversince the work of Gromov on Gottschalk’s Surjunctivity Conjecture
[11], the class of sofic groups has attracted much interest in various areas
of mathematics. Major applications of this notion arose in the work Elek
and Szabó on Kaplansky’s Direct Finiteness Conjecture [5], Lück’s Determinant Conjecture [6], and more recently in joint work of the third author
with Klyachko on generalizations of the Kervaire-Laudenbach Conjecture
and Howie’s Conjecture [15].
Despite considerable effort, no non-sofic group has been found so far. In
view of this situation, attempts have been made to provide variations of the
problem that might be more approachable. In the terminology of Holt and
1
2
NIKOLAY NIKOLOV, JAKOB SCHNEIDER, AND ANDREAS THOM
Rees, sofic groups are precisely those groups which can be approximated by
finite symmetric groups with normalized Hamming length (in the sense of
Definition 1.6 from [27]). It is natural to vary the class of finite groups and
also the metrics that are allowed. Note that our terminology differs from
the one used in [19], where similar concepts were studied.
The strongest form of approximation is satisfied by LEF (resp. LEA)
groups. In this case, it is well known that a finitely presented group is
not approximable by finite (resp. amenable) groups with discrete length
function, i.e. it is not LEF (resp. LEA), if and only if it fails to be residually
finite (resp. residually amenable). Examples of sofic groups which fail to be
LEA (and thus also fail to be LEF) are given in [2] and [14] (see also [26]),
answering a question of Gromov [11].
In [27] the third author proved that the so-called Higman group cannot
be approximated by finite groups with commutator-contractive invariant
length function. In [13] Howie presented a group which, by a result of
Glebsky [8], turned out not to be approximable by finite nilpotent groups
with arbitrary invariant length function.
The present article provides four more results of this type (see Sections
3 and 5). However, in our setting we restrict only the classes of finite groups
and do not impose restrictions on the length functions of the approximating
groups other than being invariant (see Definitions 1 and 3).
Recently, Glebsky [9] asked whether all groups can be approximated
by finite solvable groups (in the sense of Definition 1). In Section 3 we
answer this question by establishing that each non-trivial finitely generated
perfect group is a counterexample (see Theorem 1). The key to this result
is a theorem of Segal [22] on generators and commutators in finite solvable
groups.
In Section 4, using results of the first author from [18] and of Liebeck and
Shalev from [16], we prove that any non-trivial group which is approximable
by finite groups has a non-trivial homomorphism into a metric ultraproduct
of finite simple groups of type PSLn (q) with conjugacy length function (see
Theorem 4).
In Section 5 we discuss the approximability of Lie groups by finite groups.
It is easy to see that R as a topological group is not approximable by symmetric groups, i.e. it is not continuously embeddable into a metric ultraproduct
of symmetric groups with arbitrary invariant length function (see Remark
6). Using a much deeper analysis, we show that a connected Lie group is
appoximable by finite groups (in the sense of Definition 3) precisely when it
is abelian (see Theorem 6). In Question 2.11 of [4] Doucha asked for groups
which can be equipped with an invariant length function such that they do
not embed into a metric ultraproduct of finite groups with invariant length
function. Our result implies that any compact, connected, and non-abelian
Lie group is an example of such a group. Thus the simplest example of a
topological group which is not weakly sofic, i.e. not continuously embeddable
into a metric ultraproduct of finite groups with invariant length function,
SOME REMARKS ON FINITARILY APPROXIMABLE GROUPS
3
is SO3 (R). However, we remark that every linear Lie group is an abstract
subgroup of the algebraic ultraproduct of finite groups indexed over N (see
Remark 5).
Furthermore, in the same section we answer the question of Zilber [32] if
there exist a compact simple Lie group which is not a quotient of an algebraic
ultraproduct of finite groups. Indeed, we show that a Lie group which
can be equipped with an invariant length function generating its topology
and which is an abstract quotient of a product of finite groups has abelian
identity component (see Theorem 7). Hence any compact simple Lie group
fails to be approximable by finite groups in the sense of Zilber.
A slight variation of Theorem 7 also answers Question 1.2 Pillay [20].
Moreover, we point out that Theorem 6 and Theorem 7 provide an alternative proof of the main result of Turing [30].
Finally, using the same approach as for the previous two results, we
solve the conjecture of Pillay [20] that the Bohr compactification of any
pseudofinite group is abelian (see Theorem 8).
All results of Section 5 follow from a theorem on generators and commutators in finite groups of the first author and Segal [18].
2. Preliminaries
In this section we recall some basic concepts. We introduce the notion
of C-approximable abstract and topological groups, and present examples.
2.1. Metric groups and length functions. By a metric group we
mean a group equipped with a metric. However, we allow a metric to attain the value infinity (this is needed for Definition 2 to make sense). For a
left-invariant metric dG : G×G → [0, ∞] on the group G we define the corresponding length function (or norm) ℓG : G → [0, ∞] by ℓG (g) := dG (1G , g).
It inherits the following three properties from dG :
(i) ℓG (g) = 0 if and only if g = 1G ;
(ii) ℓG (g) = ℓG (g−1 ) for g ∈ G;
(iii) ℓG (gh) ≤ ℓG (g) + ℓG (h) for g, h ∈ G.
Conversely, to any such function ℓG we associate a left-invariant metric
dG : G × G → [0, ∞] defined by dG (g, h) := ℓG (g−1 h). This gives a oneto-one correspondence between length functions and left-invariant metrics.
We indicate that a length function and a left-invariant metric correspond to
each other by equipping them with the same decoration.
The length function ℓG is called invariant if it is constant on conjugacy
classes. This happens precisely when dG is bi-invariant. In this article all
length functions will be invariant (and all metrics are bi-invariant).
Let us introduce the following types of length functions on a finite group
G, which we shall use in this article: The discrete length function ℓdG is the
simplest one. It is defined by ℓdG (g) := 1 for g ∈ G \ {1G } and corresponds
to the discrete metric ddG on G. The conjugacy (pseudo) length function ℓcG
4
NIKOLAY NIKOLOV, JAKOB SCHNEIDER, AND ANDREAS THOM
is defined by
ℓcG (g) :=
(1)
log|g G |
log|G|
for g ∈ G, where g G is the conjugacy class of g in G. It is only a proper
length function if G has trivial center. The projective rank length function
ℓpr
G is defined if G ≤ PGLn (q) for some n ∈ N and q a prime power;
ℓpr
G (g) :=
1
min{rk(1 − ĝ) | ĝ some lift of g}.
n
Finally, the Cayley length function ℓCay,S
with respect to some subset S ⊆ G
G
is defined by
ℓCay,S
(g) := min{n ∈ N | g = s1 · · · sn for si ∈ S ∪ S −1 } ∪ {∞}.
G
We call a family of length functions (ℓi )i∈I on a sequence of finite groups
(Hi )i∈I Lipschitz continuous with respect to a second family (ℓ′i )i∈I on the
same groups if there is L > 0 such that ℓi ≤ Lℓ′i (i ∈ I).
d
For example, since ℓcG , ℓpr
G ≤ ℓG for any finite group G, the conjugacy
length function and the projective rank length function are Lipschitz continuous with respect to the discrete length function (with L = 1).
If (ℓ′i )i∈I is also Lipschitz continuous with respect to (ℓi )i∈I , we call these
families Lipschitz equivalent.
For example, ℓc and ℓpr are Lipschitz equivalent on the class of nonabelian finite simple groups, which follows from [16] (see the argument at
the end of Section 4).
2.2. On C-approximable abstract groups. Now we can define metric approximation of an abstract group by a class of finite groups. Throughout the article let C be such a class.
Definition 1. An abstract group G is called C-approximable if there is
a function δ• : G \ {1G } → (0, ∞] such that for any finite subset S ⊆ G and
ε > 0 there exist a group H ∈ C, an invariant length function ℓH on H, and
a map ϕ : S → H, such that
(i) if 1G ∈ S, then ϕ(1G ) = 1H ;
(ii) if g, h, gh ∈ S, then dH (ϕ(g)ϕ(h), ϕ(gh)) < ε;
(iii) for g ∈ S \ {1G } we have ℓH (ϕ(g)) ≥ δg .
Note that the above definition differs slightly from Definition 1.6 from
the one in [27] as we impose no restrictions on the invariant length functions.
However, it is equivalent to Definition 6 from [9].
Indeed, we may even require that ℓH ≤ 1 and δ• ≡ 1 in the above definition without changing its essence. Namely, choosing ε > 0 small enough, setting c := ming∈S δg , ℓ′H := min{ℓH /c, 1}, and defining δ′ : G \ {1G } → (0, ∞]
by δ•′ := 1, we can replace δ by δ′ and ℓH by ℓ′H . So, in the sense of [12, p. 3],
if we do not impose restrictions on the length functions on the groups from C,
SOME REMARKS ON FINITARILY APPROXIMABLE GROUPS
5
the terms ‘C-approximation property’, ‘discrete C-approximation property’,
and ‘strong C-approximation property’ coincide.
Moreover, similar to soficity, being C-approximable is a local property.
This is expressed in the following remark.
Remark 1. An abstract group is C-approximable if and only if every
finitely generated subgroup has this property.
Let us now present some examples of C-approximable abstract groups.
Subsequently, denote by Alt (resp. Fin) the class of finite alternating groups
(resp. the class of all finite groups). Indeed, C-approximable abstract groups
(in the above sense) can be seen as a generalization of sofic (resp. weakly
sofic) groups as it is shown in Section 2 of [9]:
Example 1. A group is sofic (resp. weakly sofic) if and only if it is
Alt-approximable (resp. Fin-approximable) as an abstract group.
Groups approximable by certain classes of finite simple groups of Lie
type have been studied in [1] and [28, 29].
Every C-group G is certainly C-approximable, since we can take H := G,
ϕ to be the restriction of the identity on G to S, and ℓH := ℓdH to be the
discrete length function on H in Definition 1. Hence Remark 1 implies:
Example 2. Every locally C-group is C-approximable as an abstract
group.
2.3. Metric ultraproducts of groups. Since there is another common equivalent characterization of C-approximable groups via metric ultraproducts of C-groups with invariant length function, we recall this concept
next (for more details on the algebraic and geometric structure of such ultraproducts see also [25] and [28, 29]).
Definition 2. Let (Hi , ℓi )i∈I be a sequence of finite groups with invariant length function and
Q be U an ultrafilter on the index set I.Q The metric
ultraproduct (H, ℓ) := U (Hi , ℓi ) is defined as the group H := i∈I Hi modulo the normal subgroup NU := {(hi ) ∈ H | limU ℓi (hi ) = 0} of null sequences
equipped with the (invariant) length function ℓ defined by ℓ(h) := limU ℓi (hi ),
where h = (hi ) is a representative.
Here it is important that length functions are [0, ∞]-valued, since otherwise ℓ would not be well-defined. Some authors use
Q a slightly different
definition by restricting H to the sequences (hi ) ∈ i∈I Hi of uniformly
bounded length, i.e. supi∈I ℓi (hi ) < ∞. However, we prefer the above definition since then the ultraproduct is always a quotient of a product of the
finite groups Hi (i ∈ I).
Another thing we mention here is that an ultraproduct as in Definition 2
is always a topological group, i.e. the group operation and taking inverses are
continuous with respect to the topology induced by ℓ. This holds because ℓ
is invariant.
6
NIKOLAY NIKOLOV, JAKOB SCHNEIDER, AND ANDREAS THOM
Lastly, we remark that the algebraic ultraproduct of a family of finite
groups is isomorphic to the metric ultraproduct of these groups equipped
with the discrete length function with respect to the same ultrafilter. In this
sense we can view every algebraic ultraproduct as a metric ultraproduct.
Now we can point out the announced characterization of C-approximable
abstract groups via metric ultraproducts. Let us call the class C trivial if
either C = ∅ or C = {1}. Here is the promised characterization.
Lemma 1. If C is a non-trivial class, every abstract C-approximable
group
G is isomorphic to a discrete subgroup of a metric ultraproduct (H, ℓ) =
Q
U (Hi , ℓi ) of C-groups Hi with invariant length function ℓi (i ∈ I) such that
diam(Hi , ℓi ) = 1 and the distance between the images of any two different
elements of G is one. If G is countable, I can be chosen to be N with the
natural order and U to be some non-principal ultrafilter.
Conversely, any subgroup of a metric ultraproduct of C-groups with invariant length function is C-approximable as an abstract group.
The proof of this result is identical to the corresponding proof in the
sofic case, which is well known. Hence we omit it here.
2.4. On C-approximable topological groups. In view of Lemma 1
it is natural to generalize the notion of a C-approximable group to topological
groups using ultraproducts:
Definition 3. A topological group is called C-approximable if it embeds
continuously into a metric ultraproduct of C-groups with invariant length
functions.
Lemma 1 indicates the following class of examples of C-approximable
topological groups:
Example 3. Every C-approximable abstract group equipped with the
discrete topology is C-approximable as a topological group.
Conversely, a C-approximable topological group is C-approximable as an
abstract group when we ‘forget’ its topology.
To present more classes of examples, we need an auxiliary result. The
following lemma gives a sufficient condition for a metric group to be isomorphic to an ultraproduct of finite metric groups. Its proof is trivial.
Lemma 2. Let (G, ℓG ) be a group with invariant length function, I an
index set, U an ultrafilter on I, (Ki , ℓi )i∈I a sequence of finite groups with
Q
invariant length function, and (K, ℓ) := U (Ki , ℓi ) its metric ultraproduct.
(i) Assume there are mappings ϕi : G → Ki , which are isometric and a
homomorphism in the U -limit, i.e.
lim di (ϕi (g), ϕi (h)) = dG (g, h) and lim di (ϕi (g)ϕi (h), ϕi (gh)) = 0.
U
U
Then there is an isometric embedding ϕ : (G, ℓG ) ֒→ (K, ℓ) in the
ultraproduct defined by ϕ(g) := (ϕi (g)).
SOME REMARKS ON FINITARILY APPROXIMABLE GROUPS
7
(ii) The
Q embedding ϕ is surjective if and only if for every (ki ) ∈ K :=
i∈I Ki there exists g ∈ G such that limU di (ϕi (g), ki ) = 0.
(iii) It surjects onto the subgroup of elements of finite length of (K, ℓ) if the
previous assertion holds for all (ki ) ∈ K with supi∈I ℓi (ki ) < ∞.
Let C P and C SP be the class of finite products of C-groups and the class
subgroups of finite products of C-groups, respectively. Now, we investigate
which profinite groups are C-approximable as topological groups. The standard example is the given by the following lemma:
Lemma
3. Let Hi (i ∈ N>0 ) be C-groups. Then the profinite group
Q
P
:=
P
i∈N Hi is isomorphic to a metric ultraproduct of C -groups and so
P
C -approximable as a topological group.
Proof. We want to apply (i) and (ii) of Lemma 2 to G := P . Equip
G with the invariant length function ℓG (h) := max{1/i | i ∈ N>0 , hi 6=
1Hi } ∪ {0}, where h = (hi ). Let I := N>0 and U be some non-principal
ultrafilter on N. Set Ki := H1 × · · · × Hi ≤ G and let ℓi be the restriction of
ℓG to Ki . Define ϕi : G → Ki in such a way that for every g ∈ G the distance
dG (ϕi (g), g) is minimal. By definition of ℓG we have that dG (ϕi (g), g) < 1/i.
Hence it is easy to verify that condition (i) of Lemma 2 is fulfilled. For (ii)
define g as the U -limit of (ki ) ∈ K (which exists by compactness). Then
limU di (ϕi (g), ki ) ≤ limU dG (ϕi (g), g) + limU dG (g, ki ) = 0. This ends the
proof.
From the previous example we derive the following result.
Lemma 4. For a pro-C SP group P the following are equivalent:
(i) P is C P -approximable as a topological group.
(ii) P is metrizable.
(iii) P is first-countable.
(iv) P is the inverse limit of a countable inverse system of C SP -groups with
all maps surjective.
(v) P is a closed topological subgroup of a countable product of C-groups.
Proof. The implications (i)⇒(ii)⇒(iii) are trivial. (iii)⇒(iv): Let B
be a countable system of open neighborhoods at 1G . For each B ∈ B we can
find an open normal subgroup N ⊆ B such that P/N is a subgroup of a C SP group, so itself a C SP -group (by Proposition 0.3.3(a) and Proposition
1.2.1
T
of [31]). Let N be the collection of these subgroups. Since B = {1P }, as
P is Hausdorff, the same holds for N . Moreover, for M, N ∈ N we have
P/(M ∩N ) ≤ P/M ×P/N , so P/(M ∩N ) is a C SP -group too. Hence we may
assume that N is closed for finite intersections and apply Proposition 1.2.2
of [31] to obtain that P is the inverse limit of the C SP -groups P/N (N ∈ N )
with respect to the natural maps P/M → P/N for M ≤ N (M, N ∈ N ).
(iv)⇒(v): By the standard construction of the inverse limit, it embeds
into a countable product of C SP -groups, which (by definition) embeds into
a countable product of C-groups. For (v)⇒(i) we only need to show that a
8
NIKOLAY NIKOLOV, JAKOB SCHNEIDER, AND ANDREAS THOM
countable product of C-groups is C P -approximable. This is Lemma 3. The
proof is complete.
Remark 2. The previous lemma implies that if a pro-C SP group embeds
continuously into a metric ultraproduct of C P -groups with invariant length
function, then it already embeds into such an ultraproduct of countably
many groups.
We are now able to present the following important example:
Example 4. If P = hx1 , . . . , xr i is a topologically finitely generated
pro-C SP group, then P is C P -approximable as a topological group.
Proof. Indeed, P embeds
continuously into the product of all its conQ
tinuous finite quotients N P/N and finite generation implies that there
are only countably many of these. By Proposition 1.2.1 of [31] we can restrict this map to a product of subgroups of C SP -groups (which are itself
C SP -groups) such that it still is an embedding. But, the latter embeds into
a countable product of C-groups. Hence P is C P -approximable (by Lemma
4).
However, it is also simple to find examples of profinite groups that are
not approximable by finite groups:
Example 5. Uncountable products of (non-trivial) finite groups are not
metrizable and hence not approximable by finite groups.
Now we turn to Lie groups. The following example demonstrates that
connected abelian Lie groups can always be approximated by finite abelian
groups in the sense of Definition 3. Henceforth, let Abd be the class of finite
abelian groups which are a direct sum of at most d cyclic groups.
Lemma 5. Every d-dimenional connected abelian Lie group L = Rm ×
(R/Z)n (m + n = d) equipped with the ‘euclidean’ length function ℓL is isometrically isomorphic to the subgroup of elements of finite length of an ultraproduct of Abd -groups with length function and hence Abd -approximable.
Proof. We wish to apply (i) and (iii) of Lemma 2 to G := L with
euclidean length function ℓG := ℓL . Let I := N and U be some non-principal
ultrafilter on N. For i ∈ N>0 set
n
m
2
1
i2
−i −i2 + 1
×
,
,...,
Z/Z ,
Si :=
i
i
i
i
and Ki := (Z/(4i2 ))m ×(Z/(i))n . Define αi : {−i2 /i, (−i2 +1)/i, . . . , i2 /i}m →
(Z/(4i2 ))m by x 7→ ix, let βi : ( 1i Z/Z)n → (Z/(i))n be the canonical isomorphism, and set γi : Si → Ki to be the map (x, y) 7→ (αi (x), βi (y)). Moreover,
equip Ki with the unique length function that turns γi into an isometry. Let
δi : G → Si be a map such that dG (δi (g), g) is minimal for all g ∈ G. Now
define ϕi := γi ◦ δi . Clearly, dG (ϕi (g), g) tends to zero for all g ∈ G. Hence
condition (i) of Lemma 2 holds. Condition (iii) follows from compactness of
SOME REMARKS ON FINITARILY APPROXIMABLE GROUPS
9
closed balls of finite radius in G by the same argument as at the end of the
proof of Lemma 3. The proof is complete.
We will see in Theorem 6 of Section 5 that connected abelian Lie groups
are the only Fin-approximable connected Lie groups.
3. On Sol-approximable groups
Subsequently, let Sol (resp. Nil) be the class of finite solvable (resp. nilpotent) groups. In this section we establish the following theorem.
Theorem 1. Any non-trivial finitely generated and perfect group is not
Sol-approximable.
As a consequence, a finite group is Sol-approximable if and only if it
is solvable: Indeed, any finite solvable group is Sol-approximable. On the
other hand, a non-solvable finite group contains a non-trivial perfect subgroup and hence cannot be Sol-approximable by Remark 1 and Theorem
1.
Initially, Howie proved in [13] that the group hx, y | x−2 y −3 , x−2 (xy)5 i
is not Nil-approximable. We mimic his proof for any non-trivial finitely
generated perfect group and then extend it by establishing that these groups
are not even Sol-approximable using techniques of Segal [22, 23].
In preparation of the proof of Theorem 1, we need an auxiliary result
from [8]. Recall that the pro-C topology on a group K is the initial topology induced by all homomorphisms to C-groups equipped with the discrete
topology. Hence the closure S of a subset S ⊆ K in this topology is characterized as follows: An element k ∈ K lies in this closure if and only if
ϕ(k) ∈ ϕ(S) for all homomorphism ϕ : K → H, where H is a C-group.
Adapting Theorem 4.3 of [8], one can prove the following theorem relating C-approximable groups to the pro-C topology on a free group of finite
rank:
Theorem 2. Let F/N be a presentation of a group G, where rk(F) < ∞.
Then, if G is C-approximable, for each finite sequence n1 , . . . , nk ∈ N it holds
F
that nF
1 · · · nk ⊆ N (in the pro-C topology on F). The converse holds if C is
closed with respect to finite products and subgroups.
Remark 3. If C is closed with respect to finite products and subgroups,
the previous theorem implies that residually C-groups are C-approximable
as abstract groups, since if G = F/N is a finitely generated such group, for
F
each finite sequence n1 , . . . , nk ∈ N we obtain nF
1 · · · nk ⊆ N = N (in the
pro-C topology on F).
In view of Theorem 2, when C is closed for subgroups, to prove the existence of a non-C-approximable group, it suffices to find a normal subgroup
N E F of a free group of finite rank, an element x ∈ F \ N , and a sequence
n1 , . . . , nk ∈ N such that ϕ(x) ∈ ϕ(n1 )H · · · ϕ(nk )H for any surjective homomorphism ϕ : F → H to a C-group.
10
NIKOLAY NIKOLOV, JAKOB SCHNEIDER, AND ANDREAS THOM
As both classes Nil and Sol are closed with respect to subgroups, we
shall construct a situation as described before.
Subsequently, let F be freely generated by x1 , . . . , xr . Fix a presentation
F/N of some non-trivial perfect group P , and an element x ∈ F \ N . The
assumption that P is perfect is equivalent to the fact that F = F′ N . Hence
we can find n1 , . . . , nr , n ∈ N such that xi ≡ ni (i = 1, . . . , r) and x ≡ n
modulo F′ . Consider a surjective homomorphism ϕ : F → H to some finite
group H (later H will be assumed to be nilpotent resp. solvable). Writing
yi := ϕ(xi ), hi := ϕ(ni ) (i = 1, . . . , r), y := ϕ(x), and h := ϕ(n), the above
translates to yi ≡ hi (i = 1 . . . , r) and y ≡ h modulo H ′ . Clearly, h1 , . . . , hr
generate H modulo H ′ (as ϕ is surjective). Now we need a lemma. To state
it, it becomes necessary to introduce some notation. In a group G define the
commutator of two elements g, h ∈ G by [g, h] := g −1 h−1 gh = g −1 gh , for
S ⊆ G and g ∈ G write [S, g] for the set {[s, g] | s ∈ S}, and for subgroups
K, L ≤ G write [K, L] for the subgroup generated by {[k, l] | k ∈ K, l ∈ L}.
Lemma 6 (Proposition 1.2.5 from [23]). Let L E G be groups, and
suppose that G = G′ hg1 , . . . , gm i. Then
[L, G] = [L, g1 ] · · · [L, gm ][L,l G]
for all l ≥ 1. Here, [L,l G] denotes the subgroup [L, G, . . . , G] of G.
| {z }
l
Proof of Theorem 1, Part 1. We apply the previous lemma to G :=
L := H, m := r, and gi := hi (i = 1, . . . , r). Moreover, we choose l ≥ 1 to be
an integer such that γl (H) = γω (H)
T (here γl (H) is the lth term in the lower
central series of H and γω (H) = {γl (H) | l ∈ N>0 }). Hence there exist
lij , lj ∈ H (i, j = 1 . . . , r) such that yi ≡ hi [li1 , h1 ] · · · [lir , hr ] (i = 1, . . . , r)
and y ≡ h[l1 , h1 ] · · · [lr , hr ] modulo γω (H). Assuming H is nilpotent (so
γω (H) = 1), the last congruence shows that
y = ϕ(x) ∈ ϕ(n′1 )H · · · ϕ(n′kNil )H ,
Nil
where kNil = 2r + 1 and (n′j )kj=1
is a fixed sequence with entries in the set
±1
{n, n±1
1 , · · · , nr }. Thus P cannot be Nil-approximable.
To prove that P is not Sol-approximable, we need the following deeper
result of Segal on finite solvable groups:
Theorem 3 (Theorem 2.1 from [22]). Assume G is a finite solvable
group and γω (G)hg1 , . . . , gm i = G for some m ∈ N. Moreover, assume that
′
G is generated by d elements. Then there is a fixed sequence (ij )m
j=1 of
indices in {1, . . . , m}, whose entries and length m′ only depend on d and m
such that
m′
Y
[γω (G), gij ].
γω (G) =
j=1
SOME REMARKS ON FINITARILY APPROXIMABLE GROUPS
11
Proof of Theorem 1, Part 2. Assume that H is solvable. We want
to apply Theorem 3 to G := H. Since ϕ is surjective, the elements y1 =
ϕ(x1 ), . . . , yr = ϕ(xr ) generate H, so we may set d := r. We still have
to define the elements g1 , . . . , gm ∈ G. From the above congruences we
conclude that the sequence
l11
−1 l1r
−1 lr1
−1 lrr
h1 , . . . , hr , (h−1
1 ) , · · · , (hr ) , · · · , (h1 ) , · · · , (hr )
is a good choice for g1 , . . . , gm . Thus m := r(r + 1) is bounded in terms of
r.
The theorem gives us, similarly as in the nilpotent case, a fixed sequence
′
±1
′′
Sol
with entries in {n, n±1
(nj )kj=1
1 , · · · , nr }, whose length kSol = kNil + 2m
is bounded in terms of r, such that
y = ϕ(x) = ϕ(n′′1 )H · · · ϕ(n′′kSol )H .
Thus P cannot be Sol-approximable.
Note that finite generation is crucial here. Indeed, there exist countably
infinite locally finite-p groups which are perfect and even characteristically
simple [17]. By Example 2, these groups are Nil-approximable (since finite
p-groups are nilpotent), but by definition they are not finitely generated. It
is known that locally finite-solvable groups cannot be non-abelian simple [21,
p. 154], but it seems to be an open problem if there exist Sol-approximable
simple groups.
4. On Fin-approximable groups
Let PSL be the class of simple groups of type PSLn (q), i.e. n ∈ N≥2
and q is a prime power and (n, q) 6= (2, 2), (2, 3), and recall that Fin is the
class of all finite groups. In this section we prove the following result.
Theorem 4. Any non-trivial finitely generated Fin-approximable group
has a non-trivial PSL-approximable quotient. In particular, every simple
Fin-approximable group is PSL-approximable.
To prove Theorem 4 we need some preparation. At first we recall a
classical lemma of Goursat [10]:
Lemma 7 (Goursat’s Lemma). Let G ≤ K × L be a subdirect product,
i.e. the restricted projection maps πK : G → K, πL : G → L are surjective.
Set M := ker(πL ) and N := ker(πK ). Then M E K, N E L, and the image
of G in K/M × L/N is the graph of an isomorphism.
We need the preceding lemma for the following auxiliary result. Recall
that a profinite group is called semisimple if it is the direct product of finite
non-abelian simple groups. Moreover, a finite group G is almost simple if it
has a unique minimal normal subgroup N which is non-abelian simple; in
this case N E G ≤ Aut(N ).
12
NIKOLAY NIKOLOV, JAKOB SCHNEIDER, AND ANDREAS THOM
Q Lemma 8. Let G be a closed subdirect product of a profinite group A =
i∈I Ai , where Ai is almost simple (i ∈ I). Then G contains a closed normal
semisimple subgroup H such that G/H is solvable of derived length at most
three and each simple factor of H is normal in G.
Q
Proof. For J ⊆ I let πJ : A → j∈J Aj be the projection maps. Then
by Proposition 1.2.2 of [31] G is the inverse limit of the groups πJ (G) (J ⊆ I
finite) together with the natural maps πJ (G) → πJ ′ (G) for J ′ ⊆ J.
Using Goursat’s Lemma one can show by induction on |J| that for J ⊆ I
finite there exist r ∈ N and finite non-abelian simple groups S1 , . . . , Sr such
that S1 × · · · × Sr E πJ (G) ≤ Aut(S1 ) × · · · × Aut(Sr ). In this situation, for
j0 ∈ I \ J the projection πJ∪{j0 } (G) → πJ (G) either is an isomorphism or
there exists a finite non-abelian simple group Sr+1 such that S1 ×· · ·×Sr+1 E
πJ∪{j0 } (G) ≤ Aut(S1 ) × · · · × Aut(Sr+1 ) and the restriction of πJ∪{j0 } (G) →
πJ (G) to the socle S1 × · · · Sr+1 of πJ∪{j0 } is the natural projection onto
S1 × · · · × Sr (the socle of πJ (G)).
Now it is clear that G, as the inverse limit of the groups πJ (G) (J ⊆ I
finite) and the maps πJ (G) → πJ ′ (G), contains the inverse limit H of the
socles of these groups together with the restricted maps. It is routine to
check that H has the desired properties. The fact that G/H is solvable of
derived length at most three is implied by Schreier’s conjecture.
Now we can start with the proof of Theorem 4: We will prove that our
group is PSL-approximable where we endow the groups PSLn (q) with the
conjugacy metric – see Equation (1) for a definition.
If the group in the theorem is not perfect, it has a non-trivial cyclic
quotient which clearly has the desired property. So let P = F/N be perb be the
fect, where F is freely generated by x1 , . . . , xr and N E F. Let F
profinite completion of F and M := hhN iiFb be the normal closure of N in
b Identifying F with its image in the profinite completion, it follows from
F.
Theorem 2 that P is Fin-approximable if and only if N = M ∩ F, since for
a sequence n1 , . . . , nk ∈ N we have
b
b
F
F
F
nF
1 · · · nk = F ∩ n1 · · · nk ,
where the closure on the left is taken in F. This is equivalent to saying that
b
b
the map F → F/M
induces an embedding
T of P in F/M .
For a profinite group G set G0 := {O Eo G | G/O is almost simple}.
b 0M .
Claim 1. It holds that F 6≤ F
Proof. Assume the contrary. Then by perfectness of P there are yi ∈ N
such that xi F′ = yi F′ (i = 1, . . . , r). By assumption there are also zi ∈ M
b 0 = zi F
b 0 (i = 1, . . . , r). Set Y := {y ±1 , . . . , yr±1 , z ±1 , . . . , zr±1 }.
such that xi F
1
1
b 0 is closed, by definition, we have that
As F
b 0 hY i = F
b 0 hY i and
b=F
F
b ′ hY i,
b = F′ hY i = F
F
SOME REMARKS ON FINITARILY APPROXIMABLE GROUPS
13
b Hence by Theorem 1.7 of [18] applied
where all closures are taken in F.
b 0 , F]
b ≥ F
b ′ . Since
b and H := F
b 0 we get that M ≥ hhY ii b ≥ [F
to G := F
0
F
b 0 M/M = F
b 0 /(F
b 0 ∩ M ) is abelian by the preceding argument, we cannot
F
b 0 M , since otherwise P would be abelian. Contradiction proving
have F ≤ F
the claim.
b F
b 0M .
Claim 1 implies that P has a non-trivial homomorphism to F/
b F
b 0 as a subdirect product of all almost simple
Apply Lemma 8 to G := F/
b
b 0 be the semisimple group provided by the
quotients of F. Let H = K/F
b
b 0 M , otherwise the image
lemma. As F/K
is solvable, we cannot have K ≤ F
b
b
of P in F/F0 M would be trivial, contradicting Claim 1.
b 0 M )/F
b 0 is a proper normal subgroup of the semisimple
Hence (K ∩ F
Q
b0 =
group H = K/F
i∈I Si , where Si (i ∈ I) are the simple factors, so by
b 0 of
Theorem 5.12 of [18] it is contained in a maximal normal subgroup L/F
the former. By the same result, K/L is isomorphic (as an abstract group) to
a metric ultraproduct of the Si with the conjugacy length function ℓi := ℓcSi
b since ℓi is left
(i ∈ I). Note that in this situation L is even normal in F,
b F
b 0 by Lemma 8 (i ∈ I).
invariant under Aut(Si ) and Si E F/
Claim 2. In this setting F 6≤ LM .
Proof. Otherwise [F, K] ≤ [LM, K] ≤ L[M, K] = L(M ∩ K) = L.
Here the first inclusion holds by assumption, whereas the second follows
from the commutator identity [lm, k] = [l, k][[l, k], m][m, k] for k ∈ K, l ∈ L
and [l, k] ∈ L, since L E K, and [[l, k], m], [m, k] ∈ [K, M ] = [M, K]. The
b 0 , and the last by the choice of L.
second last equality holds as M, K E F
b
Hence F0 [F, K] ≤ L.
b F
b 0 maps continuously on the finite
Let S be a simple factor of H. F/
discrete group Aut(S) via the conjugation action. The image of this map
clearly contains the inner automorphism, since these are induced by S itself.
b F
b 0 , which must
The elements x1 , . . . , xr generate a dense subgroup of F/
induce all inner automorphisms of S by the previous fact.
= |[S, xi0 ]| ≥ |S|1/r for some
As S has trivial center, we have |S/CS (xi0 )| Q
i0 ∈ {1, . . . , r}. Lemma 3.5 of [18] implies that ri=1 [S, xi ][S, xi −1 ] contains
the normal subsets [S, xi ]S ⊆ S for i = 1, . . . , r. Since |[S, xi0 ]S | ≥ |S|1/r , by
Theorem 1.1 of [16] there is e ∈ N only depending on r such that
!∗e
r
Y
−1
[S, xi ][S, xi ]
= S.
i=1
b 0 [F, K], since e is independent of the simple factor
This implies that K ≤ F
S. But then K ≤ L, a contradiction.
From the previous claim we deduce that P still has a non-trivial hob
b
b
momorphism to F/LM
. Since F/KM
is solvable as a quotient of F/K,
14
NIKOLAY NIKOLOV, JAKOB SCHNEIDER, AND ANDREAS THOM
this homomorphism restricts to KM/LM , which is a non-trivial homomorphic image of the metric ultraproduct K/L. Since the latter is simple by
Proposition 3.1 of [25], we are only left to show that K/L, which is a metric
ultraproduct of the sequence (Si )i∈I of finite simple groups from above with
conjugacy length function with respect to some ultrafilter U , embeds into a
metric ultraproduct of groups PSLni (qi ) equipped with the conjugacy length
function ℓci (i ∈ I), since then P would have the same property.
Let us briefly sketch the argument for this: Firstly, if the limit of the
ranks of the groups Si (i ∈ I) is bounded along the ultrafilter U (where the
rank of the alternating group An is defined to be n and the sporadic groups
are also considered as groups of bounded rank) the resulting ultraproduct
will be a simple group of Lie type over a pseudofinite field k or an alternating
group An , respectively. In the first case it clearly embeds into PSLn (k) for
n ∈ N appropriately chosen. However, the latter is a metric ultraproduct of
groups PSLn (qi ) with conjugacy length function ℓci (i ∈ I) for some sequence
(qi )i∈I of prime powers. The second case is similar.
Hence we may assume that our ultraproduct does not involve finite simple groups from families of bounded rank.
We can further assume that it contains no alternating groups as we
can replace any alternating group An by PSLn (q) for q = pe a power of a
prime with p > n. Namely, the natural embedding An ֒→ PSLn (q), where
PSLn (q) is equipped with the projective rank length function ℓpr
n , induces
Cay,{τ }
the Cayley length function ℓn
on An with respect to the conjugacy
class of a transposition of the ambient symmetric group Sn . The latter is
Lipschitz equivalent to the conjugacy class length function by Theorem 2.15
of [25].
Hence we can assume that all groups Si (i ∈ I) are classical Chevalley
or Steinberg groups. But it follows from Lemmas 5.4, 6.4, and the end of
Section 7 and Theorem 1.1 of [16] that the conjugacy length function and
the projective rank function (coming from a natural embedding in some
PSLn (q) ≤ PGLn (q)) on such groups are also Lipschitz equivalent.
Hence we can embed our ultraproduct K/L into an ultraproduct of
groups PSLni (qi ) equipped with the projective length function ℓpr
i (i ∈ I).
But by the former Lipschitz equivalence, ℓpr
can
be
replaced
by
the conjui
c
gacy length function ℓi (i ∈ I). This ends the proof.
5. On the approximability of Lie groups
In this section we utilize the following theorem of the first author and
Segal to deduce two results concerning the approximability of Lie groups by
finite groups and one result on compactifications of pseudofinite groups.
SOME REMARKS ON FINITARILY APPROXIMABLE GROUPS
15
Theorem 5 (Theorem 1.2 of [18]). Let g1 , . . . , gm be a symmetric generating set for the finite group G. If K E G, then
∗e
m
Y
[K, gj ] ,
[K, G] =
j=1
where e only depends on m.
Remark 4. It was remarked in [8] that it was an open problem at the
time of writing to decide whether a finite product of conjugacy classes in a
non-abelian free group is always closed in the profinite topology.
It is a rather straightforward consequence of Theorem 5 that this is not
the case. Indeed, the theorem implies that in F = hx1 , . . . , xm i the profinite
−1
closure of the product of the 2me conjugacy classes of x−1
1 , x1 , . . . , xm , xm
contains the entire commutator subgroup, but it is a well known fact (see
Theorem 3.1.2 of [23]) that the commutator width in this group is infinite
if m > 1.
This implication was first observed by Segal and independently discovered by Gismatullin.
Actually, we shall use the following immediate corollary of Theorem 5:
Corollary 1. Let G be a quotient of a product of finite groups, then
for g, h ∈ G and N ∈ N we have
∗e
[gN , hN ] ∈ [G, g][G, g −1 ][G, h][G, h−1 ]
for some fixed constant e ∈ N.
Recall that Fin denotes the class of all finite groups. At first we prove
the following theorem:
Theorem 6. A connected Lie group is Fin-approximable as a topological
group if and only if it is abelian.
By Lemma 5 we already know that connected abelian Lie groups are
Fin-approximable. So we are only left to prove that a Fin-approximable
connected Lie group is actually abelian. This will be a consequence of the
following auxiliary result:
Q
Lemma 9. Let ϕ, ψ : R → (H, ℓ) = U (Hi , ℓi ) be continuous homomorphisms into a metric ultraproduct of finite groups Hi with invariant length
function ℓi (i ∈ I). Then for all s, t ∈ R it holds that [ϕ(s), ψ(t)] = 1H .
Let us first prove Theorem 6 using Lemma 9.
Proof of Theorem 6. Assume L is a connected Fin-approximable
Q
Lie group. Then there is an embedding ι : L ֒→ (H, ℓ) =
U (Hi , ℓi )
into a metric ultraproduct of finite groups with invariant length function.
If a, b ∈ L are in the image of the exponential map, Lemma 9 implies that
ι(a) and ι(b) commute. So as ι is injective, a and b commute. Hence by
connectedness L = L0 is abelian. This ends the proof.
16
NIKOLAY NIKOLOV, JAKOB SCHNEIDER, AND ANDREAS THOM
We are still left to prove Lemma 9:
Proof of Lemma 9. For ε > 0 by continuity we can choose N ∈ N>0
large enough such that ℓ(ϕ(s/N )), ℓ(ψ(t/N )) < ε. Set G := H, g := ϕ(s/N )
and h := ψ(t/N ) and apply Corollary 1. This gives
∗e
[ϕ(s), ψ(t)] = [gN , hN ] ∈ [H, g][H, g−1 ][H, h][H, h−1 ] ,
whence ℓ([ϕ(s), ψ(t)]) < 8eε by invariance of ℓ and the triangle inequality.
Since ε > 0 was arbitrary, the proof is complete.
Note that Theorem 6 provides an answer to Question 2.11 of Doucha [4]
whether there are groups with invariant length function that do not embed in
a metric ultraproduct of finite groups with invariant length function. Since
every compact Lie group can be equipped with an invariant length function that generates its topology, every such group with non-abelian identity
component is an example of such a group by the previous theorem. (Indeed,
Theorem 6 does even provide topological types of groups which cannot occur
as subgroups of such a metric ultraproduct.)
Before we continue with our next result, let us state the following two
remarks.
Remark 5. In Theorem 6 the topology of the Lie group matters. Indeed,
any linear Lie group is Fin-approximable as an abstract group by Remark
1, since all its finitely generated subgroups are residually finite by Malcev’s
Theorem and hence Fin-approximable by Remark 3.
Thus any linear Lie group L is embeddable (as an abstract group) into a
metric ultraproduct of finite groups with invariant length function indexed
over, say, the partially ordered set of pairs consisting of a finite subset of L
and a positive rational number. We will now show that we can even choose
this index set to be N. Namely,
Q if L ⊆ SLn (C), then L can be embedded into
the algebraic ultraproduct U SLn (pp! ), where U is a non-principal ultrafilter on the set of prime
Indeed, this ultraproduct is isomorphic to
Q numbers.
p!
SLn (k), where k = U GF(p ) is a pseudofinite
Q field. Now it is straightforward to see that k contains the field k0 = U GF(p) together with its
algebraic closure k′ := k0alg . However, k′ is an algebraically closed field of
characteristic zero and cardinality 2ℵ0 (a result due to Shelah [24]) and hence
isomorphic to C. Note that, if we view the above algebraic ultraproduct as
a metric ultraproduct, the induced topology on SLn (C) is discrete.
Since some non-linear Lie groups admit finitely presented subgroups
which are not residually finite [3], it is clear that such embeddings cannot
exist without the assumption of linearity.
Remark 6. When one approximates with symmetric groups, one can
not even embed the real line R in a metric ultraproduct of such groups
with invariant length function. E.g. for the symmetric group Sn it can be
shown that all invariant length functions ℓ on it satisfy ℓ(σ k ) ≤ 3ℓ(σ), for
every k ∈ Z and σ ∈ Sn . Using this identity, it is simple to deduce that
SOME REMARKS ON FINITARILY APPROXIMABLE GROUPS
17
the only continuous homomorphism of R into a metric ultraproduct of finite
symmetric groups with invariant length function is trivial.
Referring to the question of Zilber [32, p. 17] (also Question 1.1 of Pillay
[20]) whether a compact simple Lie group can be a quotient of the algebraic
ultraproduct of finite groups, we present the following second application of
Corollary 1:
Theorem 7. A Lie group equipped with an bi-invariant metric generating its topology that is an abstract quotient of a product of finite groups has
abelian identity component.
The proof of this result is almost identical to the proof of Theorem 6.
Proof. Let (L, ℓL ) be such a Lie group with invariant length function
and a, b ∈ L be in the image of the exponential map. For ε > 0 we find
N ∈ N>0 , g, h ∈ L such that ℓL (g), ℓL (h) < ε and gN = a, hN = b. Then
applying Corollary 1 to G := L yields
∗e
[a, b] = [gN , hN ] ∈ [L, g][L, g −1 ][L, h][L, h−1 ] ,
whence ℓL ([a, b]) < 8eε by the invariance of ℓL and the triangle inequality.
This shows that a and b commute. Hence, as L0 is generated by the image
of the exponential map, it must be abelian.
Theorem 7 implies that any compact simple Lie group, the simplest example being SO3 (R), is not a quotient of a product of finite groups, answering Zilber’s question (and hence also answers Question 1.1 of Pillay [20]).
Moreover, Theorem 7 remains valid if we replace the product of finite
groups by a pseudofinite group, i.e. a group which is a model of the theory of
all finite groups. It then also provides a negative answer to Question 1.2 of
Pillay [20], whether there is a surjective homomorphism from a pseudofinite
group to a compact simple Lie group.
Before we state the last theorem of this section, we digress briefly by
pointing out a further application of Theorems 6 and 7.
Referring to [30], we call a compact group G with compatible invariant
length function ℓG Turing-approximable if for all ε > 0 there is a finite set
Sε , a group Hε , and a bijection γε : Sε → Hε such that for all g ∈ G there
is s ∈ Sε with dG (g, s) < ε and dG (gh, γε−1 (γε (g)γε (h))) < ε for g, h ∈ Sε .
Define for g ∈ Hε
X
dG (γε−1 (f gh), γε−1 (f h)).
ℓε (g) := |Hε |−2
f,h∈Hε
It is routine to check that ℓε is an invariant length function on Hε and that
for all g ∈ Hε we have
ℓε (g) − ℓG (γε−1 (g)) < 3ε.
Set δε : G → Sε such that dG (δε (g), g) is minimal for all g ∈ G.
18
NIKOLAY NIKOLOV, JAKOB SCHNEIDER, AND ANDREAS THOM
In this situation we can apply Lemma 2, setting I := N, U to be a
non-principal ultrafilter on N, Ki := H1/i , and ϕi := γ1/i ◦ δ1/i . Again one
checks easily that we may apply (i) and (ii) of the lemma. Hence a Turingapproximable group is isomorphic to a metric ultraproduct of finite groups
with invariant length function. Thus Theorem 6 as well as Theorem 7 imply
that a Turing-approximable Lie group has abelian identity component. This
is the main result of [30]. By Lemma 3.4 of [7] the latter condition is also
sufficient for a compact Lie group to be Turing-approximable.
Let us now turn to pseudofinite groups. By a compactification of an abstract group G, we mean a compact group C together with a homomorphism
ι : G → C with dense image. Pilay conjectured that the Bohr compactification (i.e. the universal compactification) of a pseudofinite group has abelian
identity component (Conjecture 1.7 in [20]). We answer this conjecture in
the affirmative by the following result:
Theorem 8. Let G be a pseudofinite group. Then the identity component of any compactification C of G is abelian.
The proof is again just an easy application of Corollary 1.
Proof. As G is pseudofinite it satisfies the statement of Corollary 1
(and so does its image in C). An easy compactness argument shows that
C has the same property. Now let ̺i : C → Aut(Vi ) be the irreducible
unitary representations of C and Li the image
Q of ̺i (i ∈ I). By the Peter–
Weyl Theorem, C embeds continuously into i∈I Li , and so C 0 embeds into
Q
0
i∈I Li .
But as Li is a compact quotient of C, Corollary 1 holds in it, and so as
in the proof of Theorem 7 it follows that L0i is abelian (i ∈ I). But then C 0
must be abelian as well, from the above embedding.
Acknowledgements
The second and third author want to thank Alessandro Carderi for interesting discussions. The content of this paper is part of the PhD project
of the second author. This research was supported by ERC Consolidator
Grant No. 681207.
After we finished a first version of this article and circulated it among
some experts, it was pointed out that (independently and slightly earlier)
Lev Glebsky found a solution to Zilber’s problem along the same lines.
References
[1] Goulnara Arzhantseva and Liviu Păunescu, Linear sofic groups and algebras, Transactions of the American Mathematical Society 369 (2017), no. 4, 2285–2310. ↑5
[2] Yves Cornulier, A sofic group away from amenable groups, Mathematische Annalen
350 (2011), no. 2, 269–275. ↑2
[3] Pierre Deligne, Extensions centrales non résiduellement finies de groupes
arithmétiques, CR Acad. Sci. Paris Sér. AB 287 (1978), no. 4, A203–A208. ↑16
SOME REMARKS ON FINITARILY APPROXIMABLE GROUPS
19
[4] Michal Doucha, Metric topological groups: their metric approximation and metric ultraproducts, arXiv:1601.07449 (2016), to appear in Groups, Geometry, and Dynamics.
↑2, 16
[5] Gábor Elek and Endre Szabó, Sofic groups and direct finiteness, Journal of Algebra
280 (2004), no. 2, 426–434. ↑1
[6]
, Hyperlinearity, essentially free actions and L2 -invariants. The sofic property,
Mathematische Annalen 332 (2005), no. 2, 421–441. ↑1
[7] Tsachik Gelander, Limits of finite homogeneous metric spaces, Enseign. Math. (2) 59
(2013), no. 1-2, 195–206. ↑18
[8] Lev Glebsky and Luis Manuel Rivera, Sofic groups and profinite topology on free
groups, Journal of Algebra 320 (2008), no. 9, 3512–3518. ↑2, 9, 15
[9] Lev Glebsky, Approximations of groups, characterizations of sofic groups, and equations over groups, Journal of Algebra (2016). ↑2, 4, 5
[10] Edouard Goursat, Sur les substitutions orthogonales et les divisions régulières de
l’espace, Annales scientifiques de l’École Normale Supérieure, 1889, pp. 9–102. ↑11
[11] Mikhael Gromov, Endomorphisms of symbolic algebraic varieties, Journal of the European Mathematical Society 1 (1999), no. 2, 109–197. ↑1, 2
[12] Derek F. Holt and Sarah Rees, Some closure results for C-approximable groups, arXiv
preprint arXiv:1601.01836 (2016). ↑4
[13] James Howie, The p-adic topology on a free group: A counterexample, Mathematische
Zeitschrift 187 (1984), no. 1, 25–27. ↑2, 9
[14] Aditi Kar and Nikolay Nikolov, A non-LEA sofic group, Proceedings-Mathematical
Sciences (2014), 1–5. ↑2
[15] Anton Klyachko and Andreas Thom, New topological methods to solve equations over
groups, Algebraic & Geometric Topology 17 (2017), no. 1, 331–353. ↑1
[16] Martin W. Liebeck and Aner Shalev, Diameters of finite simple groups: sharp bounds
and applications, Annals of mathematics (2001), 383–406. ↑2, 4, 13, 14
[17] Dermot H. McLain, A characteristically simple group, Mathematical Proceedings of
the Cambridge Philosophical Society, 1954, pp. 641–642. ↑11
[18] Nikolay Nikolov and Dan Segal, Generators and commutators in finite groups; abstract
quotients of compact groups, Inventiones mathematicae 190 (2012), no. 3, 513–602.
↑2, 3, 13, 15
[19] Abderezak Ould Houcine and Françoise Point, Alternatives for pseudofinite groups,
Journal of Group Theory 16 (2013), no. 4, 461–495. ↑2
[20] Anand Pillay, Remarks on compactifications of pseudofinite groups, Fundamenta
Mathematicae 236 (2017), no. 2, 193–200. ↑3, 17, 18
[21] Derek J. S. Robinson, Finiteness conditions and generalized soluble groups. Part 1+2,
Springer-Verlag, New York-Berlin, 1972. Ergebnisse der Mathematik und ihrer Grenzgebiete, Band 62+63. ↑11
[22] Dan Segal, Closed subgroups of profinite groups, Proceedings of the London Mathematical Society 81 (2000), no. 1, 29–54. ↑2, 9, 10
[23]
, Words: notes on verbal width in groups, Vol. 361, Cambridge University
Press, 2009. ↑9, 10, 15
[24] Saharon Shelah, On the cardinality of ultraproduct of finite sets, The Journal of Symbolic Logic 35 (1970), no. 1, 83–84. ↑16
[25] Abel Stolz and Andreas Thom, On the lattice of normal subgroups in ultraproducts of
compact simple groups, Proceedings of the London Mathematical Society 108 (2014),
no. 1, 73–102. ↑5, 14
[26] Andreas Thom, Examples of hyperlinear groups without factorization property,
Groups, Geometry, and Dynamics 4 (2010), no. 1, 195–208. ↑2
[27]
, About the metric approximation of Higman’s group, Journal of Group Theory
15 (2012), no. 2, 301–310. ↑2, 4
20
NIKOLAY NIKOLOV, JAKOB SCHNEIDER, AND ANDREAS THOM
[28] Andreas Thom and John S. Wilson, Metric ultraproducts of finite simple groups,
Comptes Rendus Mathematique 352 (2014), no. 6, 463–466. ↑5
, Some geometric properties of metric ultraproducts of finite simple groups,
[29]
arXiv preprint arXiv:1606.03863 (2016). ↑5
[30] Alan M. Turing, Finite approximations to Lie groups, Annals of Mathematics (1938),
105–111. ↑3, 17, 18
[31] John S. Wilson, Profinite groups, Vol. 19, Clarendon Press, 1998. ↑7, 8, 12
[32] Boris Zilber, Perfect infinities and finite approximation, Infinity and Truth. IMS Lecture Notes Series 25 (2014). ↑3, 17
N. Nikolov, University of Oxford, OX2 6GG Oxford, UK
E-mail address: [email protected]
J. Schneider, TU Dresden, 01062 Dresden, Germany
E-mail address: [email protected]
A. Thom, TU Dresden, 01062 Dresden, Germany
E-mail address: [email protected]
| 4math.GR
|
Temporal Multimodal Fusion
for Video Emotion Classification in the Wild
Valentin Vielzeuf∗
Stéphane Pateux
Frédéric Jurie
Orange Labs
Cesson-Sévigné, France
[email protected]
Orange Labs
Cesson-Sévigné, France
[email protected]
Normandie Univ., UNICAEN,
ENSICAEN, CNRS
Caen, France
[email protected]
arXiv:1709.07200v1 [cs.CV] 21 Sep 2017
ABSTRACT
This paper addresses the question of emotion classification. The
task consists in predicting emotion labels (taken among a set of
possible labels) best describing the emotions contained in short
video clips. Building on a standard framework – lying in describing
videos by audio and visual features used by a supervised classifier
to infer the labels – this paper investigates several novel directions.
First of all, improved face descriptors based on 2D and 3D Convolutional Neural Networks are proposed. Second, the paper explores
several fusion methods, temporal and multimodal, including a novel
hierarchical method combining features and scores. In addition, we
carefully reviewed the different stages of the pipeline and designed
a CNN architecture adapted to the task; this is important as the size
of the training set is small compared to the difficulty of the problem,
making generalization difficult. The so-obtained model ranked 4th
at the 2017 Emotion in the Wild challenge with the accuracy of
58.8 %.
KEYWORDS
Emotion Recognition; Multimodal Fusion; Recurrent Neural Network; Deep Learning;
1
Disg u st
Fear
Hap p y
Sad
Neu t ral
Su rp rise
Figure 1: The 7 emotions of the AFEW dataset: each row represents an emotion with a set of faces sampled across a representative video clip. Please note that if most of the video
clips do contain faces, some of them don’t.
INTRODUCTION AND RELATED WORK
Emotion recognition is a topic of broad and current interest, useful
for many applications such as advertising [27] or psychological
disorders understanding [35]. It is also a topic of importance for
research in other areas e.g., video summarization [37] or face normalization (expression removal). Even if emotion recognition could
appear to be an almost solved problem in laboratory controlled
conditions, there are still many challenging issues in the case of
videos recorded in the wild.
This paper focuses on the task of emotion classification in which
each video clip has to be assigned to one and only one emotion,
based on its audio/video content. The classes are usually the six
basic emotions i.e., anger, disgust, fear, happiness, sadness and surprise, in addition to the neutral class, as in the Audio-video Emotion
Recognition sub-task of the Emotion Recognition in the Wild Challenge [12]. More precisely, this paper presents our methodology,
experiments as well as the results we obtained in the 2017 edition
of the Emotion Recognition in the Wild Challenge [10].
Emotion recognition has received a lot of attention in the scientific literature. One large part of this literature deals with the
possible options for defining and representing emotions. If the use
of discrete classes [31] such as joy, fear, angriness, etc. is the most
∗ Also
An g ry
with Normandie Univ., UNICAEN, ENSICAEN, CNRS.
straightforward way to do it, it can be more interesting to represent
emotions by their degrees of arousal and valence, as proposed in [6].
In the restricted case of facial expressions, action units can also be
used, focusing on the activation of different parts of the face [15].
Links can be made between these two representations: the discrete
classes can be mapped into the arousal valence space [28] and can
be deduced from the action units [24].
Another important part of the literature focuses on the ways to
represent audio/video contents by features that can be subsequently
used by classifiers. Early papers make use of (i) hand-crafted features such as Local Binary Patterns (LBP), Gabor features, discrete
cosine transform for representing images, and Linear Predictive
Coding coefficients (LPC), relative spectral transform - linear perceptual prediction (RASTA-PLP), modulation spectrum (ModSpec)
or Enhanced AutoCorrelation (EAC) for audio, (ii) standard classifiers such as SVN or KNN for classification (see [22] for details).
[38], the winner of EmotiW’15, demonstrated the relevance of Action Units for the recognition of emotions. [3] was among the first
to propose to learn the features instead of using hand-crafted descriptors, relying on Deep Convolutional Networks. More recently,
[18], the winner of EmotiW’16, has introduced the C3D feature
which is an efficient spatio-temporal representation of faces.
The literature on emotion recognition from audio/video contents
also addresses the question of the fusion of the different modalities.
A modality can be seen as one of the signals allowing to perceive the
emotion. Among the recent methods for fusing several modalities,
we can mention the use of two-stream ConvNets [32], ModDrop
[29] or Multiple Kernel Fusion [9]. The most used modalities, in the
context of emotion recognition, are face images and audio/speech,
even if context seems also to be of tremendous importance [5]. For
instance, the general understanding of the scene, even based on simple features describing the whole image, may help to discriminate
between two candidate classes.
As most of the recent methods for emotion recognition are supervised and hence requires some training data, the availability of such
resources is becoming more and more critical. Several challenges
have collected useful data. The AVEC challenge [34] focuses on
the use of several modalities to track arousal and valence in videos
recorded in controlled conditions. The Emotionet challenge [7]
proposes a dataset of one million images annotated with action
units and partially with discrete compound emotion classes. Finally,
the Emotion in the Wild challenge [11] deals with the classification of short video clips into seven discrete classes. The videos are
extracted from movies and TV shows recorded "in the wild". The
ability to work with data recorded in realistic situations, including
occlusions, poor illumination conditions, presence of several people
or even scene breaks is indeed very important.
As aforementioned, this paper deals with our participation to
the Emotion In the Wild 2017 (EmotiW) challenge. We build on
the state-of-the-art pipeline of [18] in which i) audio features are
extracted with the OpenSmile toolkit [16], ii) two video features
are computed, one by the C3D descriptor, the other by the VGG16Face model [30] fine-tuned with FER2013 face emotion database
and introduced into a LSTM network. Each one of these 3 features
is processed by its own classifier, the output of the 3 classifiers
being combined through late fusion. Starting from this pipeline,
we propose to improve it in 3 different ways, which are the main
contributions of our approach.
First, the recent literature suggests that late fusion might not be
the optimal way to combine the different modalities (see e.g., [29]).
This paper investigates different directions, including an original
hierarchical approach allowing to combine scores (late fusion) and
features (early fusion) at different levels. It can be seen as a way
to combine information at its optimal level of description (from
features to scores). This representation addresses an important
issue of fusion, which is to ensure the preservation of unimodal
information while being able to exploit cross-modal information.
Second, we investigate several ways to better use the temporal
information in the visual descriptors. Among several contributions,
we propose a novel descriptor combining C3D and LSTM.
Third, it can be observed that the amount of training data (773
labeled short video clips) is rather small compared to the number of
the parameters of standard deep models, considering the complexity
and diversity of emotions. In this context, supervised methods
are prone to over-fitting. We show in the paper how the effect of
over-fitting can be reduced by carefully choosing the number of
parameters of the model and favoring transfer learning whenever
it is possible.
Figure 2: Comparison of the bounding boxes given by our detection/normalization procedure (color images) with those
provided with the AFEW dataset (gray-scale images), on 4
random faces of AFEW. Our bounding boxes are slightly
larger.
The rest of the paper is organized as follows: a presentation
of the proposed model is done in Section 2, detailing the different modalities and the fusion methods. Then Section 3 presents
the experimental validation as well as the results obtained on the
validation and test sets during the challenge.
2
PRESENTATION OF THE PROPOSED
APPROACH
Figure 3 presents an overview of our approach, which is inspired by
the one of [18]. Modalities we consider are extracted from audio and
video, associated with faces analyzed with two different models (2D
CNN, C3D). The two main contributions are the temporal fusion
and the novel C3D/LSTM descriptor.
On overall, our method works as follows: on the one hand, the
OpenSmile library [16] is used to produce 1582 dimensional features
used by a two-layer perceptron to predict classes as well as compact
descriptors (279-d vectors) from audio. On the other hand, video
classification is based on face analysis. After detecting the faces and
normalizing their appearance, one set of features is computed with
the VGG-16 model [30] while another set of features is obtained by
the C3D model [18]. In both cases, 4096-d features are produced.
Temporal fusion of these so-obtained descriptions is done across
the frames of the sequences, producing per modality scores and
compact descriptors (304 dimensional vectors). The 3 modalities
(audio, VGG-faces and C3D-faces) are then combined using both
the score predictions and the compact representations.
After explaining how the faces are detected and normalized,
the rest of the section gives more details on how each modality is
processed, and how the fusion is performed.
2.1
Face Detection and Alignment
The EmotiW challenge provides face detections for each frame of
each video. However, we preferred not to use these annotations
but to detect the faces ourselves. The motivation is twofold. First,
we want to be able to process any given video and not only those
of EmotiW (e.g., for adding external training data). Second, it is
necessary to master the face alignment process for processing the
2
1582 features
1
Fully
connected
OpenSmile
279 features
4096 features
frame by frame
2
Temporal
fusion
VGG-face
304 features
4096 features
Overlap
of 8
frames
C3D
by window of 16 consecutive
frames
3
Temporal
fusion
No overlap
304 features
4
Temporal
fusion
Softmax score of
size 7
Features vector
297 features
Figure 3: Our model includes audio, VGG-LSTM and C3D-LSTM (with or without overlapping) modalities. Each modality gives
its own feature vectors and scores, which can be fused using different methods. It can be noted that the dimensions of the
features vectors are chosen to have balanced contributions between modalities, making a trade off between the number of
parameters and the performance.
2.2
images of face datasets when pre-training the VGG models (see
Section 2.3 where FER dataset is used to pre-train the VGG model).
For face detection, we use an internal detector provided by Orange Labs. We found out from our observations that this face detector detects more faces (20597 versus 19845 on the validation set)
while having a lower false positive rate (179 false positives versus
908 on the validation set) than the one use to provide EmotiW
annotations.
This detector is applied frame per frame. If one or several faces
are detected, a tracking based on their relative positions allows to
define several face tracks. In a second time, an alignment based on
the landmarks [26] is done. We choose the longest face sequence in
each video and finally apply a temporal smoothing of the positions
of the faces to filter out jittering.
Figure 2 compares one of our normalized faces (after detection /
alignment) with the one provided with the challenge data.
Audio features and classifier
The audio channel of each video is fed into the OpenSmile toolkit [16]1 ,
as most of the EmotiW competitors [11], to get a description vector
of length 1582.
A commonly used approach for audio is then to learn a classifier
on top of the OpenSmile features. Support Vector Machine [18] [38]
seems to be the dominant choice for the classification, even if there
are some other approaches like Random Forests [17].
To be able to control more finely the dimensionality of the description vector (the one used later on during the fusion process),
we learn a two-layer Perceptron with reLu activation on the OpenSmile description, using batch normalisation and dropout. During
inference, we extract for each video a description vector of size 279
– the hidden layer of the perceptron – along with the softmax score.
2.3
Representing Faces with 2D Convolutional
Neural Network
A current popular method (see e.g., [18, 23]) for representing faces
in the context of emotion recognition, especially in the EmotiW
1 We
3
use the emobase2010 configuration file.
challenge, is to fine-tune a pre-trained 2D CNN such as the VGGface model [30] on the images of an emotion images dataset (e.g., the
FER 2013 dataset). Using a pre-trained model is a way to balance
the relatively small size of the EmotiW dataset (AFEW dataset).
The images of the FER 2013 dataset [20] are first processed by
detecting and aligning the faces, following the procedure explained
in Section 2.1. We then fine-tune the VGG-face model on FER 2013
dataset, using both the training and the public test set; during
training we use data augmentation by jittering the scale, flipping
and rotating the faces. The aim is to make the network more robust
to small misalignment of the faces. We also apply a strong dropout
on the last layer of the VGG (keeping only 5% of the nodes) to
prevent over-fitting. We achieve a performance of 71.2% on the
FER private test set, which is slightly higher than the previously
published results [18, 20].
To assess the quality of the description given by this fine-tuned
VGG model to emotion recognition, we first benchmarked it on the
validation set of SFEW [13], which is a dataset containing frames
of the videos of AFEW (those used by the EmotiW challenge). We
achieved a score of 45.2% without retraining the model on SFEW,
while the state-of-the-art result [25] is 52.5%, using a committee of
deep models, and the challenge baseline is of 39.7% [13].
The face sequences detected in AFEW videos are resized to
224x224 and fed into the fine-tuned VGG-face model. We then
extract the 4096 length fc6 layer, following the same pipeline as Fan
et al. [17, 18]. We also compute the softmax score for each frame.
2.4
Overlap of
8 frames
Window of 16 frames
Window of 16 frames
Figure 4: In the case of 8 frames overlap, we can see that the
16-frame windows are sharing half of their faces.
During inference, the face sequences detected in AFEW videos
are resized to 112x112. We then split a video into several windows
of 16 consecutive frames2 , with or without overlapping between
the windows (as shown in Figure 4), and fed it into the weighted
C3D. We then extract the second 4096-d fully connected layer and
the last softmax layer of the C3D for each window of the videos.
The method we propose bears similarities with Multiple Instance
Learning (MIL) [1]. Within the framework of MIL, each video can be
considered as a bag of windows, with one single label. A straightforward way to apply MIL would be to train the C3D on each video as
a bag of windows, and add a final layer for choosing the prediction
as the one with the maximum score among all the scores of the
batch. The loss would be then computed from this prediction. The
weights defined in Eq.(1) play this role by selecting iteratively the
best scoring windows.
Representing Faces with 3D Convolutional
Neural Network
3D convolutional neural networks have been shown to give good
performance in the context of facial expressions recognition in
video [2, 33]. Fan et al. [18] fine-tuned a pre-trained ’sport1m’
model on randomly chosen windows of 16 consecutive faces. During
inference, the model is applied to the central frame of the video.
One limitation of this approach is that, at test time, there is no
guaranty that the best window for capturing the emotion is in the
middle of the video. The same problem occurs during training: a
large part of the windows (randomly) selected for training does
not contain any emotion or does not contain the correct emotion.
Indeed, videos are annotated as a whole but some frames can have
different labels or, sometimes, no expression at all.
We address this limitation in the following way: we first finetune a C3D-sport1m model using all the windows of each video,
optimizing the classification performance until the beginning of
convergence. Then, to be able to learn more from the most meaningful windows than from the others, we weigh each window based
on its scores. More precisely, for the i t h video and the j th window
of this video, at epoch t, the weight w i, j is computed as:
w i, j = e
−s i, j
T (t )
2.5
Per Modality Temporal Fusion
Both VGG and weighted C3D representations are applied to each
frame of the videos, turning the videos into temporal sequences of
visual descriptors. We will name the elements of those sequences
as "descriptors", whether it is the description of a frame or of a
window.
To classify these sequences of descriptors, we investigated several methods. The most straightforward one is to score each descriptor and to take the maximum of the softmax scores as the final
prediction. Similarly, the maximum of the means of the softmax
across time can also be considered.
To better take into account temporal dependencies between
consecutive descriptors, another option is to use Long Short-Term
Memory recurrent neural networks (LSTM) [2, 19]. Unlike [17, 18],
we chose to use a variable length LSTM allowing us to take all the
descriptors as inputs.
To prevent over-fitting, we also applied dropout to the LSTM
cells and weight decay to the final fully connected layer. A random
grid search on hyper-parameters is then applied for each one of
these models.
(1)
where T (t) is a temperature parameter decreasing with epoch t and
si, j , the score of the window j of the video i. We then normalize
Í
the weight to ensure that for each video i, j w i, j = 1. A random
grid search on the hyper-parameters, including the temperature
descent, is made on the validation set.
2 The
sequences with fewer than 16 frames were padded by themselves to reach a
sufficient length.
4
Both VGG-LSTM and C3D-LSTM are used to give one description
vector (output of the final fully connected layer of the LSTM) and
one softmax score for each video.
The final VGG-LSTM architecture has 2230 hidden units for each
LSTM-cell and a final fully connected layer with 297 hidden units.
The maximal length of the input sequence is of 272 frames.
The final C3D-LSTM architecture has 1324 hidden units for each
LSTM-cell and a final fully connected layer of 304 hidden units. The
maximal length of the input sequence is of 34 windows (overlap of
8 frames) or 17 windows (no overlap).
M1
h1
M2
Fully
connected
h2
h3
M3
Hidden
representation
Modalities features
2.6
Fully
connected
Multimodal fusion
Score
Figure 5: Fully connected model with ModDrop. The three
modalities are concatenated and a fully connected with modDrop is applied. The obtained hidden representation is then
fed to a second regular fully connected layer, which will output the scores.
Last but not the least, the different modalities have to be efficiently
combined to maximize the overall performance.
As explained in Section 1, two main fusion strategies can be used
i.e. score fusion (late fusion), which consists in predicting the labels
based on the predictions given by each modality, or features fusion
(early fusion), which consists in taking as input the latent features
vectors given by each modality and learning a classifier on the top
of them.
During the last editions of the challenge, most of the papers
focused on score fusion, using SVM [4], Multiple Kernel Fusion [9]
or weighted means [18]. Differently, several authors tried to train
audio and image modalities together (see e.g., [8]), combining early
features and using soft attention mechanism, but they didn’t achieve
state-of-the-art performance. We propose an approach combining
both.
The rest of the section describes the four different fusion methods
we experimented with, including a novel method (denominated as
score trees).
To be more formal, let n be the number of modalities, W 1 be the
weights matrix of the first layer. It can be divided into n2 weights
block matrices W 1k,l , modeling unimodal and intermodal contributions, with k and l, ranging over the number of modalities n. The
first fully connected equation can be written as :
h1
W 11,1 W 11,2 W 11,3 M 1
© ª ©
ª© ª
h 2 ® = W 12,1 W 12,2 W 12,3 ® M 2 ®
«h 3 ¬ «W 13,1 W 13,2 W 13,3 ¬ «M 3 ¬
Then, the term to add to the loss is simply (with γmd decreasing
through the time):
Õ
γmd
||W 1k,l ||2
k ,l
Setting γ S D to very high values during the first iterations leads
to zeroing non-diagonal block matrices. Lowering it later reintroduces progressively these coefficients. From our observation, this
approach provided better convergence on the considered problem.
Baseline score fusion. We experimented with several standard
score fusion, like majority voting, means of the scores, maximum
of the scores and linear SVM.
Fully connected neural network with modality drop. We also experimented with the ModDrop method of Neverova et al. [29].
It consists in applying dropout by modality, learning the crossmodality correlations while keeping unimodal information. [29]
reports state-of-the-art results on gesture recognition. We apply
this method to our audio, C3D-LSTM and VGG-LSTM features,
as shown in Figure 5. According to [29], this is much better than
simply feeding the concatenation of the modalities features into
a fully connected neural network and letting the network learn a
joint representation. Indeed, the fully connected model would be
unable to preserve unimodal information during cross-modality
learning.
An important step to make convergence possible with ModDrop
is to first learn the fusion without cross-modality. For this reason,
[29] conditioned the weight matrix of the first layer so that the
diagonal blocks are equal to zeros and released this constraint after
a well-chosen number of iterations.
To warranty the preservation of the unimodal information, we
explore an alternative method which turned out to be better: we
apply an adapted weight decay, only on the non-diagonal blocks,
and decreased its contribution to the loss through time.
Score trees. Our motivation is to combine the high-level information coming from the scores with the lower-level information
coming from the features, all together. We did it by building what
we call Score Trees (see Figure 6 for an illustration).
A fully connected classification neural network is applied separately to the features of the different modalities, outputting a vector
of size 7. This vector is then concatenated with the scores of the
two other modalities, to create a vector of size 21. A fully connected
classification neural network is then fed with it and outputs a prediction vector of size 7. The aim is to make predictions with respect
to the predictions coming from other modalities. Finally, these three
new prediction vectors are concatenated and fed into a last fully
connected classifier, which gives the overall scores. This method
can be generalized to any number of modalities.
Weighted Mean. The weighted mean is the approach of the winners of the 2016 edition [18]. It consists in weighting the score of
each modality and sum them up.
The weights are chosen by cross validation on the validation set,
selecting the ones giving the best performance.
We applied it on the VGG-LSTM, C3D-LSTM and audio models.
5
Training
Validation
Test
Angry
133 (17.2 %)
64 (16.7 %)
99 (15.2 %)
Disgust
74 (9.6 %)
40 (10.4 %)
40 (6.1 %)
Fear
81 (10.4 %)
46 (12 %)
70 (10.7 %)
Happy
150 (19.4 %)
63 (16.4 %)
144 (22 %)
Sad
117 (15.1 %)
61 (15.9 %)
80 (12.3 %)
Neutral
144 (18.6 %)
63 (16.4 %)
191 (29.2 %)
Surprise
74 (9.6 %)
46 (12 %)
29 (4.4 %)
Total
773
383
653
Table 1: AFEW 7.0: number of video sequences per class.
Fully connected
Fully
connected
1
2
3
Fully
connected
Fully
connected
1
2
Fully
connected
1
3
Fully
connected
2
the bounding boxes and timestamps are kept. We then extract candidates temporal windows of ten seconds around all of these time
stamps and asked human annotators to select and annotate the most
relevant ones. To ensure the quality of our annotations, we evaluated ourselves (as human beings) on the validation set. We reached
a performance from 60 % to 80 % depending on the annotator, which
is compatible with the figure of 60% observed by [22].
3
Fully
connected
3.2
1
2
3
Figure 6: The Score Tree architecture
3
EXPERIMENTAL VALIDATION AND
RESULTS
After introducing the AFEW dataset (the dataset of the challenge),
this section presents the experimental validation of our method.
We first present experiments done on the modalities taken separately, and then present experiments on their fusion. We finally
introduce the experiments done for the EmotiW’17 challenge and
the performance we obtained.
3.1
Experiments on Single Modalities
Each modality has been evaluated separately on the validation set
of AFEW. The VGG-LSTM and C3D-LSTM modalities performs
better than [11].
Regarding the VGG-LSTM and the C3D-LSTM, both unidirectional and bidirectional LSTM architectures [21] were evaluated,
with one or two layers.
In several recent papers [3, 14], bidirectional LSTM is claimed
to be more efficient than the unidirectional one and could be seen
as a way to augment the data. Nevertheless, in our case, we have
observed that the bidirectional LSTM was prone to over-fitting on
the training set and therefore does not perform well on the validation set. The same observation has been made when increasing the
number of layers. The best performing architecture is in both cases
a one-layer unidirectional LSTM.
3.2.1 VGG-LSTM. The VGG model (without LSTM) has first
been evaluated by taking the maximum of the scores over the
sequences, giving the accuracy of 41.4% on the validation set.
Then the different LSTM architectures were tested and the best
performance for each one is given in Table 2. We note a 3% improvement compared to Fan et al. [18]. It can be explained by the
fact that our model uses the whole sequences, feeding the model
with more information. Data augmentation also helps.
The Acted Facial Emotion in the Wild
dataset
Acted Facial Emotion in the Wild (AFEW) is the dataset used by
the EmotiW challenge. The 2017 version of AFEW is composed
of 773 training videos, 383 validation videos and 653 test videos.
Each video is labeled with one emotion among: ’angry’, ’disgust’,
’fear’, ’happy’, ’sad’, ’neutral’ and ’surprise’. In addition to the video,
cropped and aligned faces extracted by [36, 39] are also provided.
Another important specificity of this dataset is the class distribution of the Train/Val/Test subsets (as shown in Table 1). This
difference can make the performance on the Test set different from
the one of the Validation set, as some classes are more challenging
than others.
3.2.2 C3D-LSTM. We then experimented our method with the
C3D modality alone. The performance is given in Table 3.
We observe that our implementation of C3D trained on random
windows and evaluated on central windows is not as good as Fan
et al. [18]. The C3D trained on central windows performed better
but is not state-of-the-art either.
Our proposed C3D (with LSTM) has been tested with and without
overlapping between windows. To evaluate the weighted C3D, the
prediction of the window with the maximal softmax score among
the video is first taken. It performs better without overlapping,
and we observe a lower difference between training and validation
accuracy. It could be explained by the fact that the number of
3.1.1 External training data. To enlarge the training set, we collected external data by selecting 380 video clips from our personal
DVDs movie collection, after checking that there is no overlap
between the selected movies and the ones of AFEW [12]. These
movies were processed by the following pipeline: faces are first
detected using our face detector (see Section 2.1 for details), and
6
Method
Validation
accuracy
Maximum of the scores
41.4 %
Unidirectional LSTM one layer
48.6 %
Bidirectional LSTM one layer
46.7 %
Unidirectional LSTM two layers
46.2 %
Bidirectional LSTM two layers
45.2 %
Fan et al. [18]
45.42 %
Table 2: VGG-LSTM performance on the validation set of
AFEW.
Fusion method
Validation
Test
accuracy
accuracy
Majority vote
49.3 %
_
Mean
47.8 %
_
ModDrop (sub.3)
52.2 %
56.66 %
Score Tree (sub.4)
50.8 %
54.36 %
Weighted mean (sub.6)
50.6 %
57.58 %
Table 4: Performance of the different fusion methods on the
validation and test sets.
Method
3.4
Validation
accuracy
C3D on central window
38.7 %
C3D on random window
34 %
Weighted C3D (no overlap)
42.1 %
Weighted C3D (8 frames overlap)
40.5 %
Weighted C3D (15 frames overlap)
40.1 %
LSTM C3D (no overlap)
43.2 %
LSTM C3D (8 frames overlap)
41.7 %
Fan et al. [18]
39.7 %
Table 3: C3D and C3D-LSTM performance on the validation
set of AFEW.
We submitted the method presented in this paper to the EmotiW’17
challenge. We submitted 7 runs which performance is given in Table
5).
The difference between the runs are as follows:
• Submission 2: ModDrop fusion of audio, VGG-LSTM and a
LSTM-C3D with an 8-frame overlap.
• Submission 3: addition of another LSTM-C3D, with no overlap, improving the performance on the test set as well as on
the validation set.
• Submission 4: fusion based on Score Trees, did not achieve
a better accuracy on the test set, while observing a slight
improvement on the validation set.
• Submission 5: addition of one VGG-LSTM and two other
LSTM-C3D, one with 8 frames overlap and one without.
These new models were selected among the best results in
our random grid search on hyper-parameters according to
their potential complementarity degree, evaluated by measuring the dissimilarity between their confusion matrices.
The fusion method is ModDrop.
• Submission 6: weighted mean fusion of all the preceding
modalities, giving a gain of 1 % on the test set, while losing
one percent on the validation set, highlighting generalization
issues.
• Submission 7: our best submission, which is the same as
the sixth for the method but with models trained on both
training and validation sets. This improves the accuracy by
1.2 %. This improvement was also observed in the former
editions of the challenge. Surprisingly, adding our own data
didn’t bring significant improvement (gain of less than one
percent on the validation set). This could be explained by
the fact that our annotations are not correlated enough with
the AFEW annotation.
windows is lower if there is no overlap, the choice between the
windows is therefore easier. As a second observation, the use of
LSTM with the weighted C3D leads to the highest scores.
At the end, it can be observed that our C3D descriptor performs
significantly better than the one of [18].
3.2.3 Audio. The audio modality gave a performance of 36.5%,
lower than the state-of-the-art method (39.8%) [17]. The use of a
perceptron classifier (worse than the SVM) nevertheless allowed us
to use high-level audio features during fusion.
3.3
Our participation to the EmotiW’17
challenge
Experiments on Fusion
Table 4 summarizes the different experiments we made on fusion.
The simple baseline fusion strategy (majority vote or means of
the scores) does not perform as well as the VGG-LSTM modality
alone.
The proposed methods (ModDrop and Score Tree) achieved
promising results on the validation set, but are not as good as
the simple weighted mean on the test set. This can be explained by
the largest number of parameters used for the modDrop and the
score tree, and by the fact that some parameters cross validated on
the validation set.
The best performance obtained on the validation set has the
accuracy of 52.2 % , which is significantly higher than the performance of the baseline algorithm provided by the organizers – based
on computing LBPTOP descriptor and using a SVR – giving the
accuracy of 38.81 % on the validation set [10].
The proposed method has been ranked 4th in the competition.
We observed that, this year, the improvement of the top accuracy
compared to the previous editions is small (+1.1%), while from 2015
to 2016 the improvement was of +5.2 %. This might be explained by
the fact that the methods are saturating, converging towards human
performance (which is assumed to be around 60 %). However, the
performance of top human annotators (whose accuracy is higher
than 70 %) means there is still some room for improvement.
7
Submission
Test Accuracy
2
55.28 %
3
56.66 %
4
54.36 %
5
56.51 %
6
57.58 %
7
58.81 %
Table 5: Performance of our submissions on the test set.
Angry
Disgust
Fear
Happy
Neutral
Sad
Surprise
Angry
74,5
0
3,1
3,1
18,4
1
0
Disgust
20
0
5
15
40
20
0
Fear
27,1
0
34,3
1,4
21,4
15,7
0
Happy
6,9
0
0,7
82,6
6,3
3,5
0
Neutral
8,3
0
2,1
5,7
69,9
14
0
Sad
12,5
0
7,5
13,8
25
41,3
0
Surprise
21,4
0
21,4
7,1
35,7
14,3
0
REFERENCES
[1] Saad Ali and Mubarak Shah. 2010. Human action recognition in videos using
kinematic features and multiple instance learning. IEEE transactions on pattern
analysis and machine intelligence 32, 2 (2010), 288–303.
[2] Moez Baccouche, Franck Mamalet, Christian Wolf, Christophe Garcia, and Atilla
Baskurt. 2011. Sequential deep learning for human action recognition. In International Workshop on Human Behavior Understanding. Springer, 29–39.
[3] Moez Baccouche, Franck Mamalet, Christian Wolf, Christophe Garcia, and Atilla
Baskurt. 2012. Spatio-Temporal Convolutional Sparse Auto-Encoder for Sequence
Classification. In BMVC.
[4] Sarah Adel Bargal, Emad Barsoum, Cristian Canton Ferrer, and Cha Zhang. 2016.
Emotion recognition in the wild from videos using images. In Proceedings of the
18th ACM International Conference on Multimodal Interaction. ACM, 433–436.
[5] Lisa Feldman Barrett, Batja Mesquita, and Maria Gendron. 2011. Context in
emotion perception. Current Directions in Psychological Science 20, 5 (2011),
286–290.
[6] Lisa Feldman Barrett and James A Russell. 1999. The structure of current affect:
Controversies and emerging consensus. Current directions in psychological science
8, 1 (1999), 10–14.
[7] C Fabian Benitez-Quiroz, Ramprakash Srinivasan, Qianli Feng, Yan Wang, and
Aleix M Martinez. 2017. EmotioNet Challenge: Recognition of facial expressions
of emotion in the wild. arXiv preprint arXiv:1703.01210 (2017).
[8] Linlin Chao, Jianhua Tao, Minghao Yang, Ya Li, and Zhengqi Wen. 2016. Audio
visual emotion recognition with temporal alignment and perception attention.
arXiv preprint arXiv:1603.08321 (2016).
[9] JunKai Chen, Zenghai Chen, Zheru Chi, and Hong Fu. 2014. Emotion recognition
in the wild with feature fusion and multiple kernel learning. In Proceedings of the
16th International Conference on Multimodal Interaction. ACM, 508–513.
[10] Abhinav Dhall, Roland Goecke, Shreya Ghosh, Jyoti Joshi, Jesse Hoey, and Tom
Gedeon. 2017. From Individual to Group-level Emotion Recognition: EmotiW 5.0.
In Proceedings of the 19th ACM International Conference on Multimodal Interaction.
[11] Abhinav Dhall, Roland Goecke, Jyoti Joshi, Jesse Hoey, and Tom Gedeon. 2016.
Emotiw 2016: Video and group-level emotion recognition challenges. In Proceedings of the 18th ACM International Conference on Multimodal Interaction. ACM,
427–432.
[12] Abhinav Dhall, Roland Goecke, Simon Lucey, and Tom Gedeon. 2012. Collecting Large, Richly Annotated Facial-Expression Databases from Movies. IEEE
MultiMedia (2012).
[13] Abhinav Dhall, OV Ramana Murthy, Roland Goecke, Jyoti Joshi, and Tom Gedeon.
2015. Video and image based emotion recognition challenges in the wild: Emotiw
2015. In Proceedings of the 2015 ACM on International Conference on Multimodal
Interaction. ACM, 423–426.
[14] Yong Du, Wei Wang, and Liang Wang. 2015. Hierarchical recurrent neural network for skeleton based action recognition. In Proceedings of the IEEE conference
on computer vision and pattern recognition. 1110–1118.
[15] Paul Ekman and Wallace V Friesen. 1977. Facial action coding system. (1977).
[16] Florian Eyben, Martin Wöllmer, and Björn Schuller. 2010. Opensmile: the munich
versatile and fast open-source audio feature extractor. In Proceedings of the 18th
ACM international conference on Multimedia. ACM, 1459–1462.
[17] Lijie Fan and Yunjie Ke. 2017. Spatiotemporal Networks for Video Emotion
Recognition. arXiv preprint arXiv:1704.00570 (2017).
[18] Yin Fan, Xiangju Lu, Dian Li, and Yuanliu Liu. 2016. Video-based emotion
recognition using cnn-rnn and c3d hybrid networks. In Proceedings of the 18th
ACM International Conference on Multimodal Interaction. ACM, 445–450.
[19] Felix A Gers, Jürgen Schmidhuber, and Fred Cummins. [n. d.]. Learning to forget:
Continual prediction with LSTM. Technical Report.
[20] Ian J Goodfellow, Dumitru Erhan, Pierre Luc Carrier, Aaron Courville, Mehdi
Mirza, Ben Hamner, Will Cukierski, Yichuan Tang, David Thaler, Dong-Hyun
Lee, et al. 2013. Challenges in representation learning: A report on three machine
learning contests. In International Conference on Neural Information Processing.
Springer, 117–124.
[21] Alex Graves, Santiago Fernández, and Jürgen Schmidhuber. 2005. Bidirectional
LSTM networks for improved phoneme classification and recognition. Artificial
Neural Networks: Formal Models and Their Applications–ICANN 2005 (2005), 753–
753.
[22] Markus Kächele, Martin Schels, Sascha Meudt, Günther Palm, and Friedhelm
Schwenker. 2016. Revisiting the EmotiW challenge: how wild is it really? Journal
on Multimodal User Interfaces 10, 2 (2016), 151–162.
[23] Heysem Kaya, Furkan Gürpınar, and Albert Ali Salah. 2017. Video-based emotion
recognition in the wild using deep transfer learning and score fusion. Image and
Vision Computing (2017).
[24] Pooya Khorrami, Thomas Paine, and Thomas Huang. 2015. Do deep neural networks learn facial action units when doing expression recognition?. In Proceedings
of the IEEE International Conference on Computer Vision Workshops. 19–27.
[25] Bo-Kyeong Kim, Jihyeon Roh, Suh-Yeon Dong, and Soo-Young Lee. 2016. Hierarchical committee of deep convolutional neural networks for robust facial
Figure 7: Confusion matrix obtained with the seventh submission. We can see that ’disgust’ and ’surprise’ classes are
never predicted by our model, while the three dominant
classes (’happy’, ’neutral’ and ’angry’) are well recognized.
The ’neutral’ class has the largest number of false positives.
It underlines the difficulty, even for humans, to draw the
margin between presence and absence of emotion. Rows denote true classes, columns predicted classes.
4
CONCLUSIONS
This paper proposes a multimodal approach for video emotion
classification, combining VGG and C3D models as image descriptors and explores different temporal fusion architectures. Different
multimodal fusion strategies have also been proposed and experimentally compared, both on the validation and on the test set of
AFEW. At the EmotiW’17 challenge, the proposed method ranked
4th with the accuracy of 58.81 %, 1.5 % under the competition
winners. One important observation from this competition is the
discrepancy between the performance obtained on the test set and
the one on the validation set: good performance on the validation
set is not a warranty to good performance on the test set. Reducing
the number of parameters in our models could help to limit overfitting. Using pre-trained fusion models and, moreover, gathering a
larger set of data would also be a good way to face this problem.
Finally, another interesting path for future work would be to add
contextual information such as scene description, voice recognition
or even movie type as an extra modality.
8
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
expression recognition. Journal on Multimodal User Interfaces 10, 2 (2016), 173–
189.
Davis E King. 2009. Dlib-ml: A machine learning toolkit. Journal of Machine
Learning Research 10, Jul (2009), 1755–1758.
Agata Kołakowska, Agnieszka Landowska, Mariusz Szwoch, Wioleta Szwoch,
and Michał R Wróbel. 2013. Emotion recognition and its application in software
engineering. In 2013 The 6th International Conference on Human System Interaction
(HSI). IEEE, 532–539.
Jean Kossaifi, Georgios Tzimiropoulos, Sinisa Todorovic, and Maja Pantic. 2017.
AFEW-VA database for valence and arousal estimation in-the-wild. Image and
Vision Computing (2017).
Natalia Neverova, Christian Wolf, Graham Taylor, and Florian Nebout. 2016.
Moddrop: adaptive multi-modal gesture recognition. IEEE Transactions on Pattern
Analysis and Machine Intelligence 38, 8 (2016), 1692–1706.
Omkar M Parkhi, Andrea Vedaldi, Andrew Zisserman, et al. 2015. Deep Face
Recognition.. In BMVC, Vol. 1. 6.
Robert Plutchik and Henry Kellerman. 2013. Theories of emotion. Vol. 1. Academic
Press.
Karen Simonyan and Andrew Zisserman. 2014. Two-Stream Convolutional
Networks for Action Recognition in Videos.. In NIPS. 568–576.
Du Tran, Lubomir Bourdev, Rob Fergus, Lorenzo Torresani, and Manohar Paluri.
2015. Learning spatiotemporal features with 3d convolutional networks. In
Proceedings of the IEEE international conference on computer vision. 4489–4497.
Michel Valstar, Jonathan Gratch, Björn Schuller, Fabien Ringeval, Dennis Lalanne,
Mercedes Torres Torres, Stefan Scherer, Giota Stratou, Roddy Cowie, and Maja
Pantic. 2016. Avec 2016: Depression, mood, and emotion recognition workshop
and challenge. In Proceedings of the 6th International Workshop on Audio/Visual
Emotion Challenge. ACM, 3–10.
Peter Washington, Catalin Voss, Nick Haber, Serena Tanaka, Jena Daniels, Carl
Feinstein, Terry Winograd, and Dennis Wall. 2016. A wearable social interaction
aid for children with autism. In Proceedings of the 2016 CHI Conference Extended
Abstracts on Human Factors in Computing Systems. ACM, 2348–2354.
Xuehan Xiong and Fernando De la Torre. 2013. Supervised descent method
and its applications to face alignment. In Proceedings of the IEEE conference on
computer vision and pattern recognition. 532–539.
Baohan Xu, Yanwei Fu, Yu-Gang Jiang, Boyang Li, and Leonid Sigal. 2016. Heterogeneous knowledge transfer in video emotion recognition, attribution and
summarization. IEEE Transactions on Affective Computing (2016).
Anbang Yao, Junchao Shao, Ningning Ma, and Yurong Chen. 2015. Capturing
au-aware facial features and their latent relations for emotion recognition in the
wild. In Proceedings of the 2015 ACM on International Conference on Multimodal
Interaction. ACM, 451–458.
Xiangxin Zhu and Deva Ramanan. 2012. Face detection, pose estimation, and
landmark localization in the wild. In Computer Vision and Pattern Recognition
(CVPR), 2012 IEEE Conference on. IEEE, 2879–2886.
9
| 1cs.CV
|
1
Identifiability of generalised Randles circuit models
arXiv:1505.00153v2 [math.OC] 26 May 2016
S.M.Mahdi Alavi, Adam Mahdi, Stephen J. Payne and David A. Howey
Abstract—The Randles circuit (including a parallel
resistor and capacitor in series with another resistor)
and its generalised topology have widely been employed
in electrochemical energy storage systems such as batteries, fuel cells and supercapacitors, also in biomedical
engineering, for example, to model the electrode-tissue
interface in electroencephalography and baroreceptor
dynamics. This paper studies identifiability of generalised Randles circuit models, that is, whether the
model parameters can be estimated uniquely from the
input-output data. It is shown that generalised Randles circuit models are structurally locally identifiable.
The condition that makes the model structure globally
identifiable is then discussed. Finally, the estimation
accuracy is evaluated through extensive simulations.
Index Terms—Randles circuit, Identifiability, System
identification, Parameter estimation.
I. Introduction
Randles proposed an equivalent circuit for the kinetics of
rapid electrode reactions in [1]. Since then, the model has
been developed and has become the basis for the study
of many electrochemical energy storage systems such as
batteries, fuel cells and supercapacitors, [2], [3]. Figure 1
shows a generalised Randles model consisting of an ohmic
resistor, R∞ , in series with a number of parallel resistors
and capacitors, and a capacitor Cw . In electrochemical
applications, the ohmic resistor R∞ represents usually
the conduction of charge carriers through electrolyte and
metallic conductors. The resistors and capacitors in the
parallel pairs represent the charge transfer resistance and
the double layer capacitance, respectively, or are an approximation of a diffusion process, [4], [5]. The number
of parallel R’s and C’s depends on how many of these
pairs are required such that the frequency response of the
generalised Randles model fits with the device impedance
spectra within the frequency range of interests [6]–[8].
For instance, in [8], the number of the parallel pairs was
determined by minimising the error between the model
and measured voltages. The capacitor Cw , also known as
the Warburg term, accounts for a diffusion process, [4], [5];
or in a battery or supercapacitor, it may represent state of
charge [9]. It should be noted that the open-circuit voltage
S.M.M. Alavi was with the Energy and Power Group, Department of Engineering Science, University of Oxford. He is now with
the Brain Stimulation Engineering Laboratory, Duke University,
Durham, NC 27710, USA. Email: [email protected]
A. Mahdi and S.J. Payne are with the Institute of Biomedical Engineering, Department of Engineering Science, University of Oxford,
Old Road Campus Research Building, Oxford, OX3 7DQ, United
Kingdom. Emails: {adam.mahdi, stephen.payne}@eng.ox.ac.uk
D.A. Howey is with the Energy and Power Group, Department of
Engineering Science, University of Oxford, Parks Road, Oxford, OX1
3PJ, United Kingdom. Email: [email protected]
source is not considered in the generalised Randles model
Figure 1 and it is only focused on the impedance model
in this paper.
The generalised Randles circuit models have also been
employed in biomedical engineering. An electric circuit model of the electrode-tissue interface in electroencephalography includes two parallel R-C pairs in series
with two resistors and two voltage sources [10], which is a
special case of the circuit given in Figure 1. It is noted that
Cw can be considered as a parallel R and C with R = ∞.
The viscoelastic analog of the generalised Randles model is
employed in cardiovascular and cerebral haemodynamics
modeling, in describing the viscoelastic properties of the
aortic wall and the coupling of the nerve endings of the
baroreceptor neurons in the carotid sinus and aortic arch
[11], [12]; and in relating the fluctuation of the arterial
blood pressure with the cerebral blood flow velocity [13].
The identification or parameter estimation of the generalised Randles model (with different numbers of parallel
R’s and C’s) is important in condition monitoring, fault
diagnosis and control [3], [9], [14]–[20]. In [14], the authors
showed that the Randles circuit can be used for monitoring
the battery charge transfer overvoltage. In [15], identification tests for parameter estimation of lead-acid batteries
are suggested. In [20], identification through fitting the
impedance spectra in the frequency domain is presented.
The objective of this paper is to study the identifiability
of the generalised Randles model shown in Figure 1,
that is, whether the model parameters can be estimated
uniquely from input-output data. Typically the identifiability problem is divided into two broad areas: parameter
estimation accuracy and structural identifiability. Parameter estimation accuracy considers the practical aspects
of the problem that come with real data such as noise
and bias [21]. In studying structural identifiability, on the
other hand, one assumes that noise-free informative data
is available and therefore it is, in fact, a data-independent
concept. Unidentifiable parameters can be assigned an
infinite number of values yet still lead to identical inputoutput data. Thus, structural identifiability is a necessary
condition for identifiability and parameter estimation. A
number of analytical approaches to structural identifiability have been proposed, including Laplace transform
(transfer function) [22], [23], Taylor series expansion [24],
[25], similarity transformations [26]–[33], and differential
algebra [34], [35]. In linear systems, it has been shown
that controllability and observability properties are closely
related to the concept of structural identifiability, [30]–
[33]. For example, it was shown that single-input singleoutput linear time-invariant systems are structurally identifiable if and only if their observer canonical form is
2
R1
Rn
R2
R∞
+
Cw i(t)
...
C1
C2
Cn
+v1 −
+v2 −
+vn −
+vw −
v(t)
Fig. 1. The generalised Randles equivalent circuit model.
controllable (see Chapter 4 in [33]). However, controllable
and observable systems can still be unidentifiable in the
general case [31].
Recently, there has been a significant interest in the
identifiability analysis of battery models [36]–[43]. In [36],
the structural identifiability of a five-element equivalent
circuit model (ECM) including two capacitors was discussed by comparing the number of unknown parameters
of the Transfer Function (TF) and the circuit. In [37], the
structural identifiability of a more general nonlinear ECM
is analysed based on the observability conditions. It is
shown that cells with serial connections are not observable,
demonstrating that complete estimation of the state-ofcharge and model parameters from lumped measurements
with series cells is not possible trough independent measurements. However, it is shown that lumped models with
parallel connectivities are observable provided that none
of the parallel cells are identical. The identifiability of
battery electrochemical models was discussed in [38]–[41].
In particular, it was shown that some of the electrochemical model parameters are not identifiable given typical
charge-discharge cycles [38]–[40]. In [41], it was shown that
the shape of the charge-discharge cycles plays a crucial
role in the identifiability of battery parameters. It was
also demonstrated that the system identification method
can be employed in monitoring the battery film growth.
The identifiability problem of Randles ECMs has been
studied in [42], [43], where the authors consider models
that include up to two capacitors, and the analysis is
based on the Fisher information matrix (FIM). The FIM
provides some information about the sensitivity of the
measurement to the model parameters by using likelihood
functions, [44]. In [42], a bound of estimation errors was
developed by using the Cramér-Rao theorem. In [43],
a method was proposed to optimally shape the battery
cycles and improve the identifiability.
This paper shows that the generalised Randles model
in Figure 1 is structurally globally identifiable for n =
1, and structurally locally identifiable for any finite n >
1, and becomes globally identifiable assuming an ordering
through the generalised circuit. Finally, the identifiability
of the model is assessed through extensive simulations.
II. The model parameterisation and problem
statement
The state-space and TF parameterised models of the
generalised Randles circuit given in Figure 1 are derived.
Define the electric current as the system input u(t) =
i(t) ∈ R, the terminal voltage as the system output y(t) =
v(t) ∈ R, the voltages across the internal R-C pairs as the
⊤
states x(t) = v1 (t) · · · vn (t) vw (t)
∈ Rn+1 , and
the model parameters as
θ = R∞ R1 · · · Rn C1 · · · Cn Cw , (1)
where θ belongs to some open subset D ⊂ R2n+2 .
A. State-space parametrisation
By using Kirchhoff’s laws, a state-space model structure
of the Randles circuit, parameterised by θ , can be written
as:
d x(t) = A(θθ ) x(t) + B(θθ ) u(t)
(2)
dt
y(t) = C(θθ ) x(t) + D(θθ )u(t)
where A(θθ ) ∈ R(n+1)×(n+1) , B(θθ ) ∈ Rn+1 , C(θθ )⊤ ∈ Rn+1
and D(θθ ) ∈ R are matrices that depend on the parameter
vector θ , and are given by
A(θθ ) =
B(θθ ) =
−a1 (θθ )
0
0
−a2 (θθ )
..
..
.
.
0
0
0
0
b1 (θθ )
b2 (θθ )
..
, C(θθ )⊤
.
bn (θθ )
bw (θθ )
···
···
..
.
···
···
=
0
0
..
.
0
0
..
.
,
−an (θθ ) 0
0
0
1
1
.. , D(θθ ) = d,
.
1
1
with time constants τi = Ri Ci for i = 1, · · · , n and
1
1
1
ai = , b i =
, bw =
, d = R∞ .
τi
Ci
Cw
(3)
(4)
B. Transfer function parametrisation
Denote the model’s TF by T (s, θ ), where s represents
the Laplace operator. Using the formula T (s, θ ) = C(sI −
A)−1 B+D, a parameterised TF of the generalised Randles
circuit can be written as:
n
X
bw (θθ )
bi (θθ )
+
+ D(θθ ).
(5)
T (s, θ ) =
s + ai (θθ )
s
i=1
3
C. Problem statement
Determine the conditions for the model structure (5)
(equivalently in the state-space form (2) and (3)), where θ
is an unknown parameter vector (1), to be locally and/or
globally structurally identifiable.
III. Main results
Following [33] a definition of structural identifiability is
given as follows.
Definition 1: Let M be a model structure with the TF
T (s, θ ), parametrized by θ , where θ belongs to an open
subset DT ⊂ Rm , and consider the equation
∗
T (s, θ ) = T (s, θ )
for almost all s,
(6)
where θ , θ ∗ ∈ DT . Then, the model structure M is said to
be
- globally identifiable if (6) has a unique solution in DT ,
- locally identifiable if (6) has a finite number of solutions in DT ,
- unidentifiabile if (6) has a infinite number of solutions
in DT .
Remark 1: Instead of Definition 1, one can use the
so-called coefficient map defined as follows, [28], [29].
Consider the monic1 TF:
c0 (θθ ) + c1 (θθ )s + · · · + ck1 (θθ )sk1
T (s, θ ) =
,
d0 (θθ ) + d1 (θθ )s + · · · + dk2 −1 (θθ )sk2 −1 + sk2
(7)
and associate with it the following coefficient map CT :
Rm ⊃ DT → Rk1 +k2 +1 defined as
i
h
(8)
CT (θθ ) = c0 (θθ ), . . . , ck1 (θθ ), d0 (θθ ), . . . , dk2 −1 (θθ ) .
The model structure M is globally identifiable if the coefficient map CT is one-to-one (injective); locally identifiable
if CT is many-to-one; and unidentifiable if it is infinitely
many-to-one.
The following lemma will be used in the proof of the
identifiability of the generalised Randles circuit model.
Lemma 1: Let CT (m) be a coefficient map associated
with the TF
m
X
bi
+ d,
T (s, θ ) =
s + ai
i=1
where θ = (a1 , . . . , am , b1 , . . . , bm , d) and ai ∈ R for
i = 1, . . . , m are pairwise different. Then the following
statements hold:
(a) If m = 1, then CT (m) is one-to-one.
(b) If m > 1, then CT (m) is many-to-one.
Proof. Part(a). For m = 1, the identifiability equation
(6) is given by
b∗1
b1
+d=
+ d∗
s + a1
s + a∗1
and has a unique solution (a1 , b1 , d) = (a∗1 , b∗1 , d∗ ), which
proves part (a).
1 In a monic TF, all coefficients are normalised such that the
coefficient of the greatest order in the denominator is 1.
Part(b). For m > 1, the identifiability equation (6) is
given by
m
X
i=1
m
X b∗
bi
i
∗
+d=
∗ +d .
s + ai
s
+
a
i
i=1
(9)
We claim that equation (9) admits only finite (more
precisely, m! = 1 × 2 × · · · × m) number of solutions. To
prove the claim note that (9) is the equality of two rational
functions, which is satisfied provided that
(s + a1 ) × · · · × (s + am ) = (s + a∗1 ) × · · · × (s + a∗m ). (10)
Since m distinct roots uniquely characterise a monic
polynomial of degree m, and there are m! permutations
of n roots of (s + a1 ) × · · · × (s + am ), equation (10)
has m! solutions. Now, let us fix the permutation s :
{1, . . . , m} → {1, . . . , m} and consider an assignment
(a1 , . . . , am ) = (a∗s1 , . . . , a∗sm ). Since ai for i = 1, . . . , m are
assumed to be pairwise distinct, the expressions 1/(s+ai ),
thought of as functions of the variable s, are linearly
independent. Finally, since each side of equation (9) is a
linear combination of linearly independent functions, we
immediately obtain that bj = b∗sj for i = 1, . . . , m. This
concludes the proof of part (b).
Now, we introduce the concept of reparametrisation (see
e.g. [28]), which we will use the proof of our main theorem.
Definition 2: A reparametrisation of the model structure
M with the coefficient map CT is a map R : Rk ⊃ DT →
Rm such that
Im (CT ◦ R) = Im CT ,
(11)
where Im denotes the image of the map. Moreover, the
reparameterisation is identifiable if the map CT ◦ R : Rk ⊃
D → Rk1 +k2 +1 is identifiable.
The main result of this section is the following theorem which describes the identifiability of the generalised
Randles circuit.
Theorem 1: Let MRC (n) denotes the state-space model
structure (2) with the matrices (3) parametrised by (4),
where n is the number of parallel RC elements connected
in series (see Figure 1). Then the following conditions hold:
(a) If n = 1, then the model structure MRC (n) is globally
identifiable.
(b) If n > 1, then the model structure MRC (n) is locally
identifiable.
(c) If n > 1, and there is an ordering through the
generalised circuit as
an < an−1 < · · · < a1 ,
(12)
then the model structure MRC (n) is globally identifiable.
Proof. Consider the model structure MRC (n) and let
T (s, θ ) denote the corresponding TF given by (5), where
the parameter vector θ is given by (1). We write T (s, θ )
as a rational function (7) of degree k1 = k2 = n + 1 and
associate with it the coefficient map CT′ : R2n+2 ⊃ D →
R2n+3 .
4
Part (a). For n = 1, the coefficient map CT′ : R4 ⊃ D →
R can be written explicitly as
h
i
CT′ (θθ ) = c0 (θθ ), c1 (θθ ), c2 (θθ ), d0 (θθ ), d1 (θθ ) ,
A. Generation of informative data set
5
where
c0 (θθ ) =
1
,
R1 C1 Cw
c2 (θθ ) = R∞ ,
R∞ Cw + R1 Cw + R1 C1
,
R1 C1 Cw
1
d1 (θθ ) =
.
R1 C1
c1 (θθ ) =
d0 (θθ ) = 0,
By direct computation, we can check that equation
CT′ (θθ ) = CT′ (θθ ∗ ) admits a unique solution θ = θ ∗ . Thus
the coefficient map is one-to-one, and the model structure
is globally identifiable.
Part (b). For n > 1, the coefficient map CT′ can be
written as the following composition
CT′ = CT ◦ Rc ,
c
2n+2
(13)
2n+2
where the map R : R
⊃ D → R
is the
reparametrisation Rc (θθ ) = a1 , . . . , an , b1 , . . . , bn , bw , d
defined by (4); and CT is the coefficient map associated
with the TF
n
X
bi
bw
+
+ d,
(14)
T (s, θ a,b ) =
s + ai
s
i=1
where θ a,b = (a1 , . . . , an , b1 , . . . , bn , bw , d) ∈ R2n+2 . By
Lemma 1 (for m = n + 1 and an+1 = 0) the map CT is
many-to-one; and Rc is a one-to-one map with an inverse
R∞ = d, Cw =
bi
1
1
, Ri = , Ci = , i = 1, . . . , n.
bw
ai
bi
The map CT′ is many-to-one, since it is a composition of
a one-to-one with many-to-one map. Thus for n > 1, the
model structure MRC (n) is locally identifiable.
Part (c). Finally, the identifiability equation (9) under
the condition (12) admits a unique solution, which concludes part (c).
Remark 2: The same procedure is applicable to the
discrete time model. The Euler’s first order approximation
is the simplest approximation. Its identifiability analysis
is easier because the coefficients of the discrete time TF
equals the number of parameters. However, it might lead
to numerical instability. If higher order approximations are
applied, the challenge remains to prove whether there is
a finite-to-one maps between the discrete time model and
parameters.
IV. Simulations
Consider a 6-element Randles circuit with R∞ , Cw Ri ,
Ci , i = 1, 2. In this section, accuracy of the estimation
in the presence of noise-free and noisy data, subject to
random initial guess of estimations is studied. First the
informative data set used in the simulations and the way
it is generated are described. More details are provided in
references [33], [45]–[47].
A data set is informative if the input is persistently
exciting. A persistently exciting input adequately excites
all modes of the system. In linear systems, the order of
the system determines the order of persistent excitation.
The order of a persistent excitation equals the number of
coefficients of the monic TF that need to be identified, (see
Theorem 13.1. in [33]). The monic TF of the 6-element
Randles circuit is
f 3 s3 + f 2 s2 + f 1 s + f 0
(15)
H(s) = 3
s + g 2 s2 + g 1 s + g 0
with unknown coefficients to be identified. Therefore, the
necessary order of the persistently exciting input is 7. In
the frequency domain, this means that the spectrum of
the excitation input should have at least 7 nonzero points.
This simulation focuses on multi-sine excitation signals
which are widely employed in electrochemical impedance
spectroscopy (EIS) techniques, [3], [4], [48]. The same
procedure can be applied to other inputs. The multi-sine
signal is given by
u(t) =
l
X
mj cos(ωj t + φj ),
(16)
j=1
where l represents the number of sinusoids, and mj , ωj
and φj ∈ [−π, π) denote the magnitude, frequency in
radians per second and phase in radians, respectively. The
spectrum of the multi-sine signal is given by
Φu (ω) = 2π
l
X
m2j
j=1
4
[δ(ω − ωj ) + δ(ω + ωj )],
(17)
where δ(ω) is the delta function or impulse at frequency
ωj . The spectrum of each sinusoid signal contains two
nonzero points, therefore 4 sinusoid signals are enough
to generate the informative data set for the 6-element
Randles circuit model.
The magnitudes mj , frequencies ωj and phases φj are
arbitrary real values. Specific applications might impose
additional constraints. For instance, in EIS techniques, the
magnitude of the input signal may vary from milliampere
to ampere depending on the size of the energy storage
system. For the sake of simplicity, all magnitudes are
assumed equal to mj = 10−3 for j = 1, · · · , 4. The
frequencies could be equally or logarithmically spread over
the frequency band ωmin ≤ ω ≤ ωmax . The values of ωmin
and ωmax depend on the system dynamics. If mj ’s are
equal, the Schroeder phase choice is suggested to reduce
the Crest factor [33], [49].
Remark 3: A multi-sine signal may not exactly be zero
mean. Sometimes a uni-directional current flow is required.
In this case, the multi-sine excitation current needs to be
superimposed on a known constant DC offset current, (see
examples in [3] and [48]). In system identification, the data
are typically pre-filtered to remove these types of offsets.
5
8
×10-3
4
-3
u(t)
×10
0
3
-2
2.5
1.85
1.9
1.95
2
2.05
2
y(t) noisy with σ =1e-4
×10-4
2
0
-2
-4
-6
-8
1.8
2
2.1
Voltage (V)
Current (A)
4
1.8
y(t) noise-free
3.5
2
6
×10-3
1.5
1.85
1.9
1.95
2
2.05
2.1
1
0.5
0
0
-2
-0.5
-4
-1.5
-1
0
20
40
60
80
100
0
20
Time (s)
40
60
80
100
Time (s)
(a) Excitation input u(t).
(b) Associated output y(t).
Fig. 2. The multi-sine input excitation signal and its associated output for R∞ = 0.05 Ω, R1 = 0.2 Ω, C1 = 0.3 F, R2 = 0.4 Ω, C2 = 0.6 F,
and Cw = 300 F. The voltage response, Figure 2(b), is computed using the model (2) in the noise-free and noisy case with standard deviation
σ = 10−4 . The DC offset has been removed to have zero-mean signals.
B. The results discussion
The following operating point is arbitrarily selected [3],
[4]:
R∞ = 0.05 Ω, R1 = 0.2 Ω, C1 = 0.3 F
R2 = 0.4 Ω, C2 = 0.6 F, Cw = 300 F
The multi-sine excitation signal, Figure 2(a), is generated
by using model (16) with l = 4, mj = 10−3 , fmin = 0.2
Hz, fmax = 500 Hz and Schroeder phase with φ1 randomly
chosen at 1.9775. The Crest factor of the signal is 1.9999.
The voltage response, Figure 2(b), has been computed
using the model (2). The DC offset has been removed to
ensure zero-mean signals.
Given the true values, the smallest time constant is
τmin = R1 C1 = 0.06 s. The sampling time should be
several times larger than 1/τmin. In this simulation, the
sampling frequency is chosen at fs = 500 Hz, which is
16.6 times greater than the inverse of the minimum time
constant. The test duration should typically be several
times larger than the maximum time constant, which is
τmax = R∞ Cw = 15 s. In [47], 6 to 8 times τmax is
suggested, however, this might vary in different applications. In this simulation, a test duration of td = 100 s is
applied. The continuous-time TF (15) is identified using
Matlab’s system identification toolbox [50]. The circuit
parameters are calculated directly from the coefficients of
the TF using the formulas shown in Table II and discussed
later. In order to study the consistency of results, each
test is repeated 100 times, every run with a random initial
guess of parameters. The roots of the denominator must
be positive real numbers. Those estimations, which lead to
complex or negative poles for the TF, or to Cw > 1000 or
to Ci > 10, i = 1, 2, are considered outliers and discarded
from the analysis.
The relative mean error, er is defined as follows:
er = 100 ×
true value − mean of estimations
%. (18)
true value
The estimation accuracies from noise-free and noisy
data with a zero-mean noise and standard deviation σ =
10−4 are compared together. The signal to noise ratio is
10−3
10−4 = 10. Table I shows the mean, standard deviation
and relative errors of the estimations. Figure 3 shows the
histograms of the estimations from the noisy data.
Regardless of the random initial condition, in more than
80% of simulations, the noise-free estimations converge
with er less than 10% for Ri , Ci , i = 1, 2 and for Cw .
The largest er is 10.36% for R∞ (Table I).
Figure 3 shows that estimations from noisy data are
more distributed around the true values. However as it is
seen in Table I, the mean values of estimations in both
noise-free and noisy cases remain the same. The relative
mean errors of estimations are again less than 10% for all
parameters except of R∞ , which is again the largest and
10.38%. Also, er ’s increase with noisy data compared to
that of in the noise-free case.
The largest standard deviation is for Cw . This could be
because of the pure integrator associated with Cw , which
appears in the TF, which might require some modifications
of the data set, [51]. For instance, a methodology has
been proposed in [36] that removes the integral
term by
´
modifying the input signal as imodified(t) = i(t)dt.
C. Calculating the coefficients of R − R||C − R||C − C
circuit
Here we show how to compute the parameters of the
6-element Randles circuit. Using (5), the circuit’s TF is:
H(s) =
f 3 s3 + f 2 s2 + f 1 s + f 0
s3 + g 2 s2 + g 1 s + g 0
No. of estimations
6
100
100
80
80
60
60
the following set of equations for X:
1 1
1
f2 − (a1 + a2 )f3
a2 a1 a1 + a2 X =
f 1 − a1 a2 f 3
0 0
a1 a2
f0
40
40
where,
20
20
0
0.045
X=
0
0.05
0.055
0.06
0.065
0
0.1
No. of estimations
R∞
100
100
80
80
60
60
40
40
20
20
0
0
0.1
0.2
No. of estimations
0.3
0.3
0.4
0
0.3
0.4
0.5
100
80
80
60
60
40
40
20
20
b2
bw
⊤
Other parameters of the circuit are subsequently obtained as:
1
τi
1
, Ci = , Ri =
, i = 1, 2.
Cw =
bw
bi
Ci
0.6
V. Conclusions
R2
100
b1
The parameters of different topologies can simply be
calculated using the same approach. Table II provides
formulas for four widely used Randles models.
C1
0
0.2
0.2
R1
We showed that the generalised Randles circuit model
is locally identifiable and the model structure becomes
globally identifiable if an ordering through the circuit is
assumed. The results were confirmed through extensive
simulations. Finally, explicit formulas for the coefficients
of widely used Randles circuits were presented.
0
0.4
0.6
0.8
0
200
C2
400
600
Cw
Fig. 3. Histogram of accepted estimations in 100 runs from noisy
data.
The relationships between the coefficients and the circuit
parameters are given by:
f3 = d, f2 = b1 + b2 + bw + (a1 + a2 )d
f1 = a2 b1 + a1 b2 + (a1 + a2 )bw + a1 a2 d, f0 = a1 a2 bw (19)
g 2 = a1 + a2 , g 1 = a1 a2 , g 0 = 0
where the parameters ai , bi , bw and d are as defined in
(4).
Because the circuit has an integrator, the identification
method should be set up such that a pole of the denominator is fixed at s = 0. The identification software typically
allows to fix a number of poles and zeros at certain values,
[50]. Using the first equation of (19) and (4), R∞ is given
by:
R∞ = f3
The roots of s3 + g2 s2 + g1 s + g0 = 0 are a1 and a2 ,
and the one that has been fixed at s = 0. By using the
condition (12), select the smallest root as a2 , and the
remaining root as a1 . From (4), the circuit’s time constants
are obtained as follows:
1
τi =
for i = 1, 2.
ai
From (19) and (12), b1 , b2 and bw are obtained by solving
Acknowledgements
This work was funded by the University of Oxford
EPSRC Impact Acceleration Account Technology Fund
Awards EP/K503769/1 and EP/K036157/1. The authors
would like to thank the anonymous reviewers and the editor for their fruitful comments that significantly improved
the paper. We would like also to extend our thanks to Ross
Drummond, Stephen Duncan, Xinfan Lin and Shi Zhao for
their feedback on the first version of this work.
References
[1] J. Randles, “Kinetics of rapid electrode reactions,” Discuss.
Faraday Soc., vol. 1, pp. 11–19, 1947.
[2] C. Rahn and C.-Y. Wang, Battery Systems Engineering. John
Wiley Sons, 2013.
[3] S. M. M. Alavi, C. R. Birkl, and D. A. Howey, “Time-domain
fitting of battery electrochemical impedance models,” Journal
of Power Sources, vol. 288, pp. 345–352, 2015.
[4] E. Barsoukov and J. R. Macdonald, Impedance Spectroscopy:
Theory, Experiment, and Applications, 2nd ed. John Wiley &
Sons, 2005.
[5] S. Buller, M. Thele, R. W. A. A. De Doncker, and E. Karden,
“Impedance-based simulation models of supercapacitors and liion batteries for power electronic applications,” IEEE Transactions on Industry Applications, vol. 41, pp. 742–747, 2005.
[6] D. Andre, M. Meiler, K. Steiner, C. Wimmer, T. Soczka-Guth,
and D. U. Sauer, “Characterization of high-power lithium-ion
batteries by electrochemical impedance spectroscopy. I. Experimental investigation,” Journal of Power Sources, vol. 196, pp.
5334–5341, 2011.
[7] Y. Hu, S. Yurkovich, Y. Guezennec, and B. J. Yurkovich,
“Electro-thermal battery model identification for automotive
applications,” Journal of Power Sources, vol. 196, pp. 449–457,
2011.
[8] C. Birkl and D. Howey, “Model identification and parameter
estimation for LiFePO4 batteries,” Hybrid and Electric Vehicles
Conference 2013 (HEVC 2013), pp. 2.1–2.1, 2013.
7
[9] H. Rahimi-Eichi, F. Baronti, and M. Y. Chow, “Online adaptive
parameter identification and state-of-charge coestimation for
lithium-polymer battery cells,” IEEE Transactions on Industrial Electronics, vol. 61, pp. 2053–2061, 2014.
[10] V. Mihajlovic, B. Grundlehner, R. Vullers, and J. Penders,
“Wearable, wireless eeg solutions in daily life applications: What
are we missing?” IEEE Journal of Biomedical and Health Informatics, vol. 19, pp. 6–21, 2015.
[11] S. Bugenhagen, A. Cowley Jr., and D. Beard, “Baroreceptor
dynamics and their relationship to afferent fiber type and hypertension,” Physiological Genomics, vol. 42, pp. 23–41, 2010.
[12] A. Mahdi, J. Sturdy, T. Ottesen, and M. Olufsen, “Modeling
the afferent dynamics of the baroreflex control system,” PLoS
Computational Biology, vol. 9, p. e10033384, 2013.
[13] G. Mader, M. Olufsen, and A. Mahdi, “Modeling cerebral blood
flow velocity during orthostatic stress,” Annals of biomedical
engineering, pp. 1–11, 2014, dOI:10.1007/s10439-014-1220-4.
[14] J. Lee, J. Lee, O. Nam, J. Kim, B. H. Cho, H.-S. Yun, S.-S.
Choi, K. Kim, J. Kim, and S. Jun, “Modeling and Real Time
Estimation of Lumped Equivalent Circuit Model of a Lithium
Ion Battery,” 12th International Power Electronics and Motion
Control Conference, pp. 1536 – 1540, 2006.
[15] N. Moubayed, J. Kouta, A. El-Ali, H. Dernayka, and R. Outbib,
“Parameter identification of the lead-acid battery model,” 2008
33rd IEEE Photovolatic Specialists Conference, pp. 1–6, 2008.
[16] J. Jang and J. Yoo, “Equivalent circuit evaluation method of
lithium polymer battery using bode plot and numerical analysis,” IEEE Transactions on Energy Conversion, vol. 26, pp.
290–298, 2011.
[17] S. Jiang, “A Parameter Identification Method for a Battery
Equivalent Circuit Model,” SAE Technical Paper, 2011.
[18] B. Pattipati, C. Sankavaram, and K. R. Pattipati, “System
identification and estimation framework for pivotal automotive
battery management system characteristics,” IEEE Transactions on Systems, Man and Cybernetics Part C: Applications
and Reviews, vol. 41, pp. 869–884, 2011.
[19] A. Rahmoun and H. Biechl, “Modelling of Li-ion batteries using
equivalent circuit diagrams,” PRZEGLAD ELEKTROTECHNICZNY, vol. 2, pp. 152–156, 2012.
[20] R. Al-Nazer and V. Cattin, “A new optimization algorithm
for a Li-Ion battery equivalent electrical circuit identification,”
9th International Conference of Modeling, Optimization and
Simulation, 2012.
[21] A. Raue, C. Kreutz, T. Maiwald, J. Bachmann, M. Schilling,
U. Klingmüller, and J. Timmer, “Structural and practical identifiability analysis of partially observed dynamical models by
exploiting the profile likelihood,” Bioinformatics, vol. 25, pp.
1923–1929, 2009.
[22] C. Cobelli and J. J. DiStefano, “Parameter and structural
identifiability concepts and ambiguities: a critical review and
analysis.” The American journal of physiology, vol. 239, pp. R7–
R24, 1980.
[23] R. Bellman and K. Å ström, “On structural identifiability,”
Mathematical Biosciences, vol. 7, pp. 329–339, 1970.
[24] H. Pohjanpalo, “System identifiability based on the power series
expansion of the solution,” Mathematical Biosciences, vol. 41,
pp. 21–33, 1978.
[25] M. J. Chappell, K. R. Godfrey, and S. Vajda, “Global identifiability of the parameters of nonlinear systems with specified
inputs: A comparison of methods,” Mathematical Biosciences,
vol. 102, pp. 41–73, 1990.
[26] S. Vajda, K. R. Godfrey, and H. Rabitz, “Similarity transformation approach to identifiability analysis of nonlinear compartmental models.” Mathematical biosciences, vol. 93, pp. 217–248,
1989.
[27] F. Anstett, G. Bloch, G. Millérioux, and L. Denis-Vidal, “Identifiability of discrete-time nonlinear systems: The local state
isomorphism approach,” Automatica, vol. 44, pp. 2884–2889,
2008.
[28] N. Meshkat and S. Sullivant, “Identifiable reparametrizations of
linear compartment models,” Journal of Symbolic Computation,
vol. 63, pp. 46–67, 2014.
[29] A. Mahdi, N. Meshkat, and S. Sullivant, “Structural identifiability of viscoelastic mechanical systems,” PLoS ONE, vol. 9,
2014.
[30] K. Glover and J. Willems, “Parametrizations of linear dynamical
systems: Canonical forms and identifiability,” IEEE Transactions on Automatic Control, vol. AC-19, no. 6, pp. 640 – 646,
1974.
[31] J. Distefano, “On the relationships between structural identifiability and the controllability, observability properties,” IEEE
Transactions on Automatic Control, vol. 22, p. 652, 1977.
[32] J. M. Van Den Hof, “Structural identifiability of linear compartmental systems,” IEEE Transactions on Automatic Control,
vol. 43, pp. 800–818, 1998.
[33] L. Ljung, System Identification Theory for the User.
PTR
Prentice Hall Upper Saddle River NJ, 1987.
[34] L. Ljung and T. Glad, “On global identifiability for arbitrary
model parametrizations,” Automatica, vol. 30, pp. 265–276,
1994.
[35] S. Audoly, G. Bellu, L. D’Angiò, M. P. Saccomani, and C. Cobelli, “Global identifiability of nonlinear models of biological systems,” IEEE Transactions on Biomedical Engineering,
vol. 48, pp. 55–65, 2001.
[36] M. Sitterly, L. Y. Wang, G. G. Yin, and C. Wang, “Enhanced
identification of battery models for real-time battery management,” IEEE Transactions on Sustainable Energy, vol. 2, pp.
300–308, 2011.
[37] M. Rausch, S. Streif, C. Pankiewitz, and R. Findeisen, “Nonlinear observability and identifiability of single cells in battery
packs,” IEEE International Conference on Control Applications
(CCA), pp. 401–406, 2013.
[38] A. P. Schmidt, M. Bitzer, A. W. Imre, and L. Guzzella,
“Experiment-driven electrochemical modeling and systematic
parameterization for a lithium-ion battery cell,” Journal of
Power Sources, vol. 195, pp. 5071–5080, 2010.
[39] J. C. Forman, S. J. Moura, J. L. Stein, and H. K. Fathy, “Genetic
identification and fisher identifiability analysis of the DoyleFuller-Newman model from experimental cycling of a LiFePO
4 cell,” Journal of Power Sources, vol. 210, pp. 263–275, 2012.
[40] S. J. Moura, N. A. Chaturvedi, and M. Krstić, “Adaptive Partial Differential Equation Observer for Battery Stateof-Charge/State-of-Health Estimation Via an Electrochemical
Model,” Journal of Dynamic Systems, Measurement, and Control, vol. 136, p. 011015, 2013.
[41] A. M. D’Amato, J. C. Forman, T. Ersal, A. Ali, J. L. Stein,
H. Peng, and D. S. Bernstein, “Noninvasive battery-health
diagnostics using retrospective-cost identification of inaccessible
subsystems,” ASME 2012 5th Annual Dynamic Systems and
Control Conference Joint with the JSME 2012 11th Motion and
Vibration Conference, pp. 1–9, 2012.
[42] A. Sharma and H. Fathy, “Fisher identifiability analysis for
a periodically-excited equivalent-circuit lithium-ion battery
model,” American Control Conference (ACC), pp. 274–280,
2014.
[43] M. Rothenberger, J. Anstrom, S. Brennan, and H. Fathy,
“Maximizing Parameter Identifiability of an Equivalent-Circuit
Battery Model Using Optimal Periodic Input Shaping,” ASME
2014 Dynamic Systems and Control Conference, pp. 1–10, 2014.
[44] R. L. M. Peeters and B. Hanzon, “Symbolic computation of
Fisher information matrices for parametrized state-space systems,” Automatica, vol. 35, pp. 1059–1071, 1999.
[45] T. Söderström and P. Stoica, System identification. PrenticeHall, 1989.
[46] J. P. Norton, An introduction to identification. Academic Press,
1986.
[47] Y. Zhu, Multivariable System Identification For Process Control. Elsevier, 2001.
[48] D. A. Howey, P. D. Mitcheson, V. Yufit, G. J. Offer, and N. P.
Brandon, “Online measurement of battery impedance using
motor controller excitation,” IEEE Transactions on Vehicular
Technology, vol. 63, pp. 2557–2566, 2014.
[49] M. Schroeder, “Synthesis of low-peak-factor signals and binary
sequences with low autocorrelation,” IEEE Transactions on
Information Theory, vol. 16, pp. 85 – 89, 1970.
[50] L. Ljung, System Identification Toolbox For Use with MATLAB.
The MathWorks, Inc., 1988.
[51] B. D. O. Anderson and J. B. Moore, Optimal Filtering. Dover
Publications, 2005.
8
TABLE I
Estimation results.
Noise free (9 outlier estimates)
Noise σ = 10−4 (11 outlier estimates)
Parameter
True Value
mean
st.d.
er
mean
st.d.
er
R∞
0.05
0.0552
0.0010
10.36
0.0552
0.0012
10.38
R1
0.2
0.1883
0.0393
5.87
0.1847
0.0451
7.63
C1
0.3
0.2919
0.0617
2.68
0.2886
0.0706
3.79
R2
0.4
0.4061
0.0360
1.52
0.4094
0.0415
2.34
C2
0.6
0.5866
0.0734
2.22
0.5803
0.0867
3.28
Cw
300
289.3709
48.3550
3.54
300.9287
87.8931
0.31
TABLE II
The coefficients of four widely used Randles circuit models.
R1
R1
i(t)
R∞
C1
+
R1
Cw
R∞
C1
+
R2
i(t)
R∞
i(t)
C1
+
C2
R1
R2
C1
C2
Cw
R∞
+
v(t)
v(t)
v(t)
v(t)
-
-
-
-
i(t)
Estimated TF:
s+f0
H(s) = f1s+g
0
Estimated TF:
2
+f1 s+f0
H(s) = f2s2s+g
1 s+g0
Set up to identify a pole at s = 0
Estimated TF:
2
+f1 s+f0
H(s) = f2s2s+g
1 s+g0
Estimated TF:
3
+f2 s2 +f1 s+f0
H(s) = f3s3s+g
2
2 s +g1 s+g0
Set up to identify a pole at s = 0
R∞ = f1
R∞ = f2
R∞ = f2
R∞ = f3
a1 = g 0
τ1 =
roots([1
1
a1
g1 g0 ]) ⇒ a1 , 0
τ1 =
roots([1
g1 g0 ]) ⇒ a1 , a2
choose a2 < a1
1
a1
τi =
AX = B
h
i
A=
B=
b 1 = f 0 − a1 f 1
C1 =
R1 =
1
b1
τ1
C1
X=
1
0
h
f1 − a1 f2
f0
b1
bw
C1 =
1
b1
Cw =
1
bw
R1 =
τ1
C1
1
a2
A=
i
⊤
B=
h
b1
1
a1
Ci =
Ri =
τi
Ci ,
b2
1
bi
g0 ]) ⇒ a2 , a1 , 0
a2 < a1
τi =
f1 − (a1 + a2 )f2
f0 − a1 a2 f2
X=
g2 g1
choose
1
ai
AX = B
h
i
1
a1
roots([1
⊤
i = 1, 2
A=
i
1
ai
AX = B
B=
1
a2
0
X=
1
a1
0
1
a1 + a2
a1 a2
f2 − (a1 + a2 )f3
f1 − a1 a2 f3
f0
b1
b2
Ci =
1
bi
Cw =
1
bw
Ri =
τi
Ci ,
bw
⊤
i = 1, 2
| 3cs.SY
|
MARKOV RANDOM FIELDS AND ITERATED TORIC FIBRE PRODUCTS
arXiv:1612.06737v2 [math.AC] 7 Feb 2018
JAN DRAISMA AND FLORIAN M. OOSTERHOF
Abstract. We prove that iterated toric fibre products from a finite collection of
toric varieties are defined by binomials of uniformly bounded degree. This implies
that Markov random fields built up from a finite collection of finite graphs have
uniformly bounded Markov degree.
1. Introduction and main results
The notion of toric fibre product of two toric varieties goes back to [Sul07]. It is of
relevance in algebraic statistics since it captures algebraically the Markov random
field on a graph obtained by glueing two graphs along a common subgraph; see
[RS16] and also below. In [Sul07, RS16, RS14] it is proved that under certain conditions, one can explicitly construct a Markov basis for the large Markov random
field from bases for the components. For related results see [Shi12, EKS14, KR14].
However, these conditions are not always satisfied. Nevertheless, in [RS16, Conjecture 56] the hope was raised that when building larger graphs by glueing copies
from a finite collection of graphs along a common subgraph, there might be a
uniform upper bound on the Markov degree of the models thus constructed, independent of how many copies of each graph are used. A special case of this
conjecture was proved in the same paper [RS16, Theorem 54]. We prove the
conjecture in general, and along the way we link it to recent work [SS17] in representation stability. Indeed, an important point we would like to make, apart from
proving said conjecture, is that algebraic statistics is a natural source of problems
in asymptotic algebra, to which ideas from representation stability apply. Our main
theorems are reminiscent of Sam’s recent stabilisation theorems on equations and
higher syzygies for secant varieties of Veronese embeddings [Sam17a, Sam17b].
Markov random fields. Let G = (N, E) be a finite, undirected, simple graph and
for each node j ∈ N let X j be a random variable taking values in the finite set
[d j ] := {1, . . . , d j }. A joint probability distribution on (X j ) j∈N is said to satisfy the
local Markov properties imposed by the graph if for any two non-neighbours j, k ∈ N
the variables X j and Xk are conditionally independent given {Xl | {j, l} ∈ E}.
On the other hand, a joint probability distribution f on the X j is said Q
to factorise
according to G if for each maximal clique C of G and configuration α ∈ j∈C [d j ] of
C
the random variables labelled by
Q C there exists an interaction parameter θα such
that for each configuration β ∈ j∈N [d j ] of all random variables of G:
Y
f (β) =
θCβ|C
C∈mcl(G)
where mcl(G) is the set of maximal cliques of G, and β|C is the restriction of β to C.
1
2
JAN DRAISMA AND FLORIAN M. OOSTERHOF
These two notions are connected by the Hammersley-Clifford theorem, which says
that a positive joint probability distribution on G factorises according to G if and
only if it satisfies the Markov properties; see [HC71] or [Lau98, Theorem 3.9].
The set of all positive joint probability distributions on G that satisfy the Markov
properties is therefore a subset of the image of the following map:
Y
Q
Q
Q
[d
]
[d
]
C
C
ϕG : C C∈mcl(G) j∈C j → C j∈N j ,
(θα )C,α 7→
θβ|C
C∈mcl(G)
β
It is the ideal IG of polynomials vanishing on im ϕG that is of interest in algebraic
statistics. Since the components of ϕG are monomials, IG is generated by finitely
many
binomials (differences of two monomials) in the standard coordinates on
Q
C j∈N [d j ] , and any finite generating set of binomials can be used to set up a Markov
chain for testing whether given observations of the variables X j are compatible
with the assumption that their joint distribution factorises according to the graph
G [DS98]. The zero locus of IG is often called the graphical model of G.
Now suppose we have graphs G1 , . . . , Gs with node sets N1 , . . . , Ns , that Ni ∩ Nk
equals a fixed set N0 for all i , k in [s], and that the graphSinduced on N0 by each
Gi is equal to a fixed graph H. Moreover, for each j ∈ i Ni fix a number d j of
states. We can then glue copies of the Gi along their common subgraph H, by
which we mean first taking disjoint copies of the Gi and then identifying the nodes
labelled by a fixed j ∈ N0 across all copies. For a1 , . . . , aP
s ∈ Z≥0 , we denote
P the
graph obtained by glueing ai copies of graph Gi , i ∈ [s] by aH1 G1 +H · · · +H aHs Gs :
H
P2
H
H
+H
P1
H
=
Theorem 1. Let G1 , . . . , Gs be graphs with a common subgraph H and a number of states
associated to each node. Then there exists a uniform
bound D ∈PZ≥0 such that for all
P
multiplicities a1 , . . . , as , the ideal IG of G = aH1 G1 +H · · · +H aHs Gs is generated by
binomials of degree at most D.
Our proof shows that one needs only finitely many combinatorial types of binomials, independent of a1 , . . . , as , to generate IG . This result is similar in flavour
to the Independent Set Theorem from [HS12], where the graph is fixed but the d j
vary. Interestingly, the underlying categories responsible for these two stabilisation
phenomena are opposite to each other; see Remark 23.
Example 2. In [RS14] it is proved that the ideal IG for the complete bipartite graph
G = K3,N , with two states for each of the random variables, is generated in degree
at most 12 for all N. The graph G is obtained by glueing N copies of K3,1 along their
common subgraph consisting of 3 nodes without any edges.
We derive Theorem 1 from a general stabilisation result on toric fibre products, which
we introduce next.
MARKOV RANDOM FIELDS AND ITERATED TORIC FIBRE PRODUCTS
3
Toric fibre products. Fix a ground field K, let r be a natural number, and let
U1 , . . . , Ur , V1 , . . . , Vr be finite-dimensional vector spaces over K.
Define a bilinear operation
Y
Y
Y
(1)
Uj ×
Vj →
(U j ⊗ V j ),
j
j
(u, v) 7→ u ∗ v := (u1 ⊗ v1 , . . . , ur ⊗ vr ).
j
Definition 3. The toric fibre product X ∗ Y of Zariski-closed subsets X ⊆
Q
Y ⊆ j V j equals the Zariski-closure of the set {u ∗ v | u ∈ X, v ∈ Y}.
Q
j
U j and
♣
Remark 4. In [Sul07], the toric fibre product is defined at the level of ideals: if
j
j
(xi )i are coordinate functions on U j and (yk )k are coordinate functions on V j , then
j
j
j
(zi,k := xi ⊗ yk )i,k are coordinate functions on U j ⊗ V j . The ring homomorphism of
coordinate rings
Y
Y
Y
j
j
j
K[(zi,k ) j,i,k ] = K (U j ⊗ V j ) → K
Uj ×
V j = K[(xi ) j,i , (yk ) j,k ]
j
j
j
j
j
j
dual to (1) sends zi,k to xi ·yk . If we compose this homomorphism with the projection
modulo the ideal of X × Y, then the kernel of the composition is precisely the toric
fibre product of the ideals of X and Y as introduced in [Sul07]. In that paper,
multigradings play a crucial role for computing toric fibre products of ideals, but
do not affect the definition of toric fibre products.
♣
The product ∗ is associative and commutative up to reordering tensor factors. We
can iterate this construction and form products like X∗2 ∗ Y ∗ Z∗3 , where Z also lives
Q
in a product of r vector spaces W j . This variety lives in j (U⊗2
) ⊗ V j ⊗ (W ⊗3
).
j
j
We will not be taking toric fibre products of general varieties, but rather Hadamardstable ones. For this, we have to choose coordinates on each U j , so that U j = Kd j .
Definition 5. On Kd the Hadamard product is defined as (a1 , . . . , ad ) (b1 , . . . , bd ) =
(a1 b1 , . . . , adQ
bd ). On U := U1 ×· · ·×Ur , where U j = Kd j , it is defined component-wise.
A set X ⊆ j U j is called Hadamard-stable if X contains the all-one vector 1U (the
unit element of ) and if moreover x z ∈ X for all x, z ∈ X.
♣
Remark 6. By [ES96, Remark after Proposition 2.3], X is Hadamard-stable if and
only if its ideal is generated by differences of two monomials.
P
In particular, the Zariski-closure in U of a subtorus of the j d j -dimensional torus
Q
dj
j (K \ {0}) is Hadamard-stable. These are the toric varieties from the abstract.
d0
Suppose that we
V j = K j and a corresponding Hadamard
Q also fix
Q identifications
Q
multiplication j V j × j V j → j V j . Equipping the spaces U j ⊗ V j with the natural coordinates and corresponding Hadamard multiplication, the two operations
∗ (v v0 ) = (u ∗Q
v) (u0 ∗ v0 ) as well as 1U j ⊗V j = 1U j ⊗ 1V j .
just defined satisfy (u u0 )Q
Consequently, if both X ⊆ j U j and Y ⊆ j V j are Zariski-closed and Hadamardstable, then so is their toric fibre product X ∗ Y. We can now formulate our second
main result.
4
JAN DRAISMA AND FLORIAN M. OOSTERHOF
Theorem 7. Let s, r ∈ Z≥0 . Q
For each i ∈ [s] and j ∈ [r] let di j ∈ Z≥0 and set Vi j := Kdi j .
For each i ∈ [s], let Xi ⊆
j Vi j be a Hadamard-stable Zariski-closed subset. Then
there exists a uniform bound
D
∈ Z≥0 such that for any exponents a1 , . . . , as the ideal of
Q Ns
⊗ai
X1∗a1 ∗ · · · ∗ Xs∗as ⊆ rj=1
V
is generated by polynomials of degree at most D.
i=1 i j
Remark 8. A straightforward generalisation of this theorem also holds, where
each Xi is a closed sub-scheme given by some ideal Ji in the coordinate ring of
Q
j Vi j . Hadamard-stable then says that that the pull-back of Ji under the Hadamard
product lies in the ideal of Xi × Xi , and the toric fibre product is as in Remark 4.
Since this generality would slightly obscure our arguments, we have decided to
present explicitly the version with Zariski-closed subsets—see also Remark 22.
Also, the theorem remains valid if we remove the condition that the Xi contain the
all-one vector, but require only that they be closed under Hadamard-multiplication;
see Remark 21.
♣
Organisation of this paper. The remainder of this paper is organised as follows.
In Section 2 we introduce the categories of (affine) Fin-varieties and, dually, Finop algebras. The point is that, as we will see in Section 4, the iterated toric fibre
products together form such a Fin-variety (or rather a Fins -variety, where Fins is
the product category of s copies of Fin).
Indeed, they sit naturally in a Cartesian product of copies of the Fin-variety of
rank-one tensors, which, as we prove in Section 3, is Noetherian (Theorem 12).
This Noetherianity result is of a similar flavour as the recent result from [SS17]
(see also [DK14, Proposition 7.5] which follows the same proof strategy) that any
finitely generated Finop -module is Noetherian; this result played a crucial role in a
proof of the Artinian conjecture. However, our Noetherianity result concerns certain
Finop -algebras rather than modules, and is more complicated. Finally, in Section 4
we first prove Theorem 7 and then derive Theorem 1 as a corollary.
Acknowledgements. Both authors are (partially) supported by Draisma’s Vici
grant Stabilisation in Algebra and Geometry from the Netherlands Organisation for
Scientific Research (NWO). The current paper is partly based on the second author’s Master’s thesis at Eindhoven University of Technology; see [Oos16]. We
thank Johannes Rauh and Seth Sullivant for fruitful discussions at Prague Stochastics, August 2014.
2. Affine Fin-varieties and Finop -algebras
The category Fin has as objects all finite sets and as morphisms all maps. Its
opposite category is denoted Finop . When C is another category whose objects are
called somethings, then a Fin-something is a covariant functor from Fin to C and a
Finop -something is a contravariant functor from Fin to C. The C-homomorphism
associated to a Fin-morphism π is denoted π∗ (the push-forward of π) in the covariant
case and π∗ (the pull-back of π) in the contravariant case.
More generally, we can replace Fin by any category D. The D-somethings themselves form a category, in which morphisms are natural transformations. In our
paper, D is always closely related to Fin or to Fins , the s-fold product of Fin.
Here are three instances of Fin or Finop -somethings crucial to our paper.
MARKOV RANDOM FIELDS AND ITERATED TORIC FIBRE PRODUCTS
5
Example 9. Fix n ∈ Z≥0 . Then the functor S 7→ [n]S is a Finop -set, which to
π ∈ HomFin (S, T) associates the map π∗ : [n]T → [n]S , α 7→ απ, the composition of
α and π.
Building on this example, the functor An : S 7→ K[xα | α ∈ [n]S ], a polynomial
ring in variables labelled by [n]S , is a Finop -K-algebra, which associates to π the
K-algebra homomorphism π∗ : A(T) → A(S), xα 7→ xαπ .
Third, we define an affine Fin-K-vector space Qn by Qn : S 7→ (Kn )⊗S , the space of
n × · · · × n-tensors with factors labelled by S, which sends π ∈ HomFin (S, T) to the
linear morphism π∗ : (Kn )⊗S → (Kn )⊗T determined by
π∗ : ⊗i∈S vi 7→ ⊗ j∈T
i∈π−1 ( j) vi ,
where
is the Hadamard product in Kn . We follow the natural convention that
an empty Hadamard product equals the all-one vector 1 ∈ Kn ; in particular, this
holds in the previous formula for all j ∈ T that are not in the image of π.
The ring An and the space Qn are related as follows: Qn (S) has a basis consisting
of vectors eα := ⊗i∈S eαi , α ∈ [n]S , where e1 , . . . , en is the standard basis of Kn ;
An (S) is the coordinate ring of Qn (S) generated by the dual basis (xα )α∈[n]S ; and
for π ∈ HomFin (S, T) the pullback π∗ : An (T) → An (S) is the homomorphism of
K-algebras dual to the linear map π∗ : Qn (S) → Qn (T). Indeed, this is verified by
the following computation for α ∈ [n]T :
Y
Y
xα (π∗ ⊗i∈S vi ) = xα (⊗ j∈T
=
(vi )απ(i) = π∗ (xα )(⊗i∈S vi ).
i∈π−1 ( j) vi
i∈π−1 ( j) vi ) =
j∈T
αj
i∈S
This is used in Section 3. ♣
In general, by algebra we shall mean an associative, commutative K-algebra with
1, and homomorphisms are required to preserve 1. So a Finop -algebra B assigns to
each finite set S an algebra and to each map π : S → T an algebra homomorphism
π∗ : B(T) → B(S). An ideal in B is a Finop -subset I of B (i.e., I(S) is a subset of B(S) for
each finite set S and π∗ maps I(T) into I(S)) such that each I(S) is an ideal in B(S);
then S 7→ B(S)/I(S) is again a Finop -algebra, the quotient B/I of B by I.
Given a Finop -algebra B, finite sets S j for j in some index set J, and an element
b j ∈ B(S j ) for each j, there is a unique smallest ideal I in B such that each I(S j )
contains b j . This ideal is constructed as:
I(S) = π∗ (b j ) j ∈ J, π ∈ Hom(S, S j )
This is the ideal generated by the b j . A Finop -algebra is called Noetherian if each
ideal I in it is generated by finitely many elements in various I(S j ), i.e., J can be
taken finite.
Example 10. The Finop -algebra A1 is Noetherian. Indeed, A1 (S) is the polynomial
ring K[t] in a single variable t for all S, and the homomorphism A1 (T) → A1 (S)
is the identity K[t] → K[t]. So Noetherianity follows from Noetherianity of the
algebra K[t].
For n ≥ 2 the Finop -algebra An is not Noetherian. For instance, consider the
monomials
u2 := x21 x12 ∈ An ([2]), u3 := x211 x121 x112 ∈ An ([3]), u4 := x2111 x1211 x1121 x1112 ∈ An ([4]),
6
JAN DRAISMA AND FLORIAN M. OOSTERHOF
and so on. For any map π : [k] → [l] with k > l, by the pigeon hole principle
there are two indices i, j ∈ [k] such that π(i) = π( j) =: m ∈ [l]. Then π∗ x1···121···1 ,
where the 2 is in the m-th position, is a variable with at least two indices equal to 2.
Since uk contains no such variable, π∗ ul does not divide uk . So u2 , u3 , . . . generates
a non-finitely generated monomial Finop -ideal in An . (On the other hand, for each
d the piece of An of homogeneous polynomials of degree at most d is Noetherian
as a Finop -module, see [DK14, Proposition 7.5].)
♣
We shall see in the following section that certain interesting quotients of each An
are Noetherian.
3. Rank-one tensors form a Noetherian Fin-variety
Let Q≤1
n (S) be the variety of rank-one tensors, i.e., those of the form ⊗i∈S vi for vectors
vi ∈ Kn . We claim that this defines a Zariski-closed Fin-subvariety Q≤1
n of Qn .
For this, we must verify that for a map π : S → T the map Qn (S) → Qn (T) dual to
≤1
the algebra homomorphism An (T) → An (S) sends Q≤1
n (S) into Qn (T). And indeed,
in Example 9 we have seen that this map sends
⊗i∈S vi 7→ ⊗ j∈T
i∈π−1 ( j) vi .
It is well known that (if K is infinite) the ideal in An (S) of Q≤1
n (S) equals the ideal
In (S) generated by all binomials constructed as follows. Partition S into two parts
S1 , S2 , let αi , βi ∈ [n]Si and write α1 ||α2 for the element of [n]S which equals αi on Si .
Then we have the binomial
(2)
xα1 ||α2 xβ1 ||β2 − xα1 ||β2 xβ1 ||α2 ∈ In (S),
and In (S) is the ideal generated by these for all partitions and all α1 , α2 , β1 , β2 . The
functor S 7→ In (S) is an ideal in the Finop -algebra An ; for infinite K this follows from
the computation above, and for arbitrary K it follows since the binomials above are
mapped to binomials by pull-backs of maps T → S in Fin. Moreover, In is finitely
generated (see also [DK14, Lemma 7.4]):
Lemma 11. The ideal In in the Finop -algebra An is finitely generated.
Proof. In the determinantal equation (2), if there exist distinct j, l ∈ S1 such that
α1 ( j) = α2 (l) and β1 ( j) = β2 (l), then the equation comes from an equation in In (S\{j})
via the map S → S \ {j} that is the identity on S \ {j} and maps j → l. By the pigeon
hole principle this happens when |S1 | > n2 . Similarly for |S2 | > n2 . Hence In is
certainly generated by In ([2n2 − 1]).
The main result in this section is the following.
Theorem 12. For each n ∈ Z≥0 the coordinate ring An /In of the Fin-variety Q≤1
n of
rank-one tensors is a Noetherian Finop -algebra.
Our proof follows the general technique from [SS17], namely, to pass to a suitable
category close to Fin that allows for a Gröbner basis argument. However, the
relevant well-partial-orderedness proved below is new and quite subtle. We use
the category OS from [SS17] (also implicit in [DK14, Section 7]) defined as follows.
MARKOV RANDOM FIELDS AND ITERATED TORIC FIBRE PRODUCTS
7
Definition 13. The objects of the category OS (“ordered-surjective”) are all finite
sets equipped with a linear order and the morphisms π : S → T are all surjective
maps with the additional property that the function T → S, j 7→ min π−1 ( j) is
strictly increasing.
♣
Any Fin-algebra is also an OS-algebra, and OS-Noetherianity implies Fin-Noetherianity. So to prove Theorem 12 we set out to prove the stronger statement that
An /In is, in fact, OS-Noetherian.
We get a more concrete grip on the K-algebra An /In through the following construction. Let Mn denote the (Abelian) Finop -monoid defined by
n
n
X
X
[n]×S
Mn (S) :=
α ∈ Z≥0 | ∀j, l ∈ S :
αi j =
αil
,
i=1
i=1
in which the multiplication is given by addition, and where the pull-back of a map
π : S → T is the map π∗ : Mn (T) → Mn (S) sending (αi j )i∈[n],j∈T to (αiπ(j) )i∈[n],j∈S .
So elements of Mn (S) are matrices with nonnegative integral entries and constant
column sum. Let KMn denote the Fin-algebra sending S to the monoid K-algebra
KMn (S). The following proposition is a reformulation of a well-known fact.
Proposition 14. The Finop -algebra An /In is isomorphic to the Finop -algebra KMn (and
the same is true when both are regarded as OSop -algebras).
Proof. For each finite set S, the K-algebra homomorphism ΦS : An (S) → KMn (S)
that sends xα , α ∈ [n]S to the [n] × S matrix in Mn (S) with a 1 at the positions
(α j , j), j ∈ S and zeroes elsewhere is surjective and has as kernel the ideal In (S).
Moreover, if π : S → T is a morphism in Fin, then we have ΦT π∗ = π∗ ΦS , i.e., the
(ΦS )S define a natural transformation.
Choose any monomial order > on Zn≥0 , i.e., a well-order such that a > b implies
a + c > b + c for every a, b, c ∈ Zn≥0 . Then for each object S in OS we define a
linear order > on Mn (S), as follows: α > β if α , β and the smallest j ∈ S with
α.,j , β., j (i.e., the j-th column of α is not equal to that of β) satisfies α.,j > β., j in
the chosen monomial order on Zn≥0 . A straightforward verification shows that this
is a monomial order on Mn (S) (we call the elements of Mn (S) monomials, even
though KMn (S) is not a polynomial ring). Moreover, for various S, these orders are
interrelated as follows.
Lemma 15. For any π ∈ HomOS (S, T) and α, β ∈ Mn (T), we have α > β ⇒ π∗ α > π∗ β.
Proof. If j ∈ T is the smallest column index where α and β differ, then α0 := π∗ α
and β0 := π∗ β differ in column l := min π−1 ( j), where they equal α.,j and β. j ,
respectively, and the former is larger than the latter. Furthermore, if l0 is the
smallest position where α0 , β0 differ, then α.,π(l0 ) , β.,π(l0 ) and hence π(l0 ) ≥ j and
hence l0 = min π−1 (π(l0 )) ≥ min π−1 ( j) = l. Hence in fact l = l0 and π∗ α > π∗ β.
In addition to the well-order ≤ on each individual Mn (S), we also need the following
partial order | on the union of all of them.
8
JAN DRAISMA AND FLORIAN M. OOSTERHOF
Definition 16. Let S, T be objects in OS. We say that α ∈ Mn (T) divides β ∈ Mn (S) if
there exist a π ∈ HomOS (S, T) and a γ ∈ Mn (S) such that β = γ + π∗ α. In this case,
we write α|β.
♣
The key combinatorial property of the relation just defined is the following.
Proposition 17. The relation | is a well-quasi-order, that is, for any sequence α(1) ∈
Mn (S1 ), α(2) ∈ Mn (S2 ), . . . there exist i < j such that α(i) |α( j) .
Proof. First, to each α ∈ Mn (S) we associate the monomial ideal P(α) in the polynomial ring R := K[z1 , . . . , zn ] (here K is but a place holder) generated by the
monomials zα.,j , j ∈ S. The crucial fact that we will use about monomial ideals
in R is that in any sequence P1 , P2 , . . . of such ideals there exist i < j such that
Pi ⊇ P j —in other words, monomial ideals are well-quasi-ordered with respect to
reverse inclusion [Mac01].
To prove the proposition, suppose, on the contrary, that there exists a sequence as
above with α(i) 6 | α( j) for all i < j. Such a sequence is called bad. Then by basic
properties of well-quasi-orders, some bad sequence exists in which moreover
(3)
P(α(1) ) ⊇ P(α(2) ) ⊇ . . .
Among all bad sequences with this additional property choose one in which, for each
j = 1, 2, . . . , the cardinality |S j | is minimal among all bad sequences starting with
α(1) , . . . , α(j−1) .
Write α(j) = (γ( j) |β(j) ), where β(j) ∈ Zn≥0 is the last column (the one labelled by the
largest element of S j ), and γ( j) is the remainder. By Dickson’s lemma, there exists a
subsequence j1 < j2 < . . . such that β(j1 ) , β( j2 ) , . . . increase weakly in the coordinatewise ordering on Zn≥0 . By restricting to a further subsequence, we may moreover
assume that also
(4)
P(γ(j1 ) ) ⊇ P(γ( j2 ) ) ⊇ . . .
Then consider the new sequence
α(1) , . . . , α( j1 −1) , γ(j1 ) , γ( j2 ) , . . .
By (4) and (3), and since P(α( j) ) ⊇ P(γ(j) ), this sequence also satisfies (3). We claim
that, furthermore, it is bad.
Suppose, for instance, that γ(j1 ) |γ(j2 ) . Set ai := max S ji for i = 1, 2. Then there exists
a π ∈ HomOS (S j2 \ {a2 }, S j1 \ {a1 }) such that γ(j2 ) − π∗ γ( j1 ) ∈ Mn (S j2 \ {a2 }). But then
extend π to an element π of HomOS (S j2 , S j1 ) by setting π(a2 ) := a1 ; since β(j1 ) is
coordinate-wise smaller than β( j2 ) we find that α( j2 ) − π∗ α( j1 ) ∈ Mn (S j2 ), so α( j1 ) |α( j2 ) ,
in contradiction to the badness of the original sequence.
On the other hand, suppose for instance that α(1) |γ( j2 ) and write a2 := max S j2 . Then
there exists a π ∈ HomOS (S j2 \ {a2 }, S1 ) such that γ( j2 ) − π∗ (α(1) ) ∈ Mn (S j2 \ {a2 }).
Now, and this is why we required that (3) holds, since P(α( j2 ) ) ⊆ P(α(1) ), there exists an
element s ∈ S1 such that the column β( j2 ) is coordinatewise at least as large as the
s-th column of α(1) . Extend π to an element of HomOS (S j2 , S1 ) by setting π(a2 ) = s.
Since a2 is the maximal element of S j2 , this does not destroy the property that the
MARKOV RANDOM FIELDS AND ITERATED TORIC FIBRE PRODUCTS
9
function min π−1 (.) be increasing in its argument. Moreover, this π has the property
that α(j2 ) − π∗ α(1) ∈ Mn (S j2 ), again a contradiction.
Since we have found a bad sequence satisfying (3) but with strictly smaller underlying set at the j1 -st position, we have arrived at a contradiction.
Next we use a Gröbner basis argument.
Proof of Theorem 12. We prove the stronger statement that KMn is Noetherian as
an OS-algebra. Let P be any ideal in An /In = KMn . For each object S in OS, let
L(S) ⊆ Mn (S) denote the set of leading terms of nonzero elements of P(S) relative to
the ordering >. Proposition 17 implies that there exists a finite collection S1 , . . . , SN
and α( j) ∈ L(S j ) such that each element of each L(S) is divisible by some α( j) .
Correspondingly, there exist elements f j ∈ P(S j ) with leading monomial α( j) and
leading coefficient 1. To see that the f j generate P, suppose that there exists an S
such that P(S) is not contained in the ideal generated by the f j , and let g ∈ P(S)
have minimal leading term β among all elements of P(S) not in the ideal generated
by the f j ; without loss of generality g has leading coefficient 1. By construction,
there exists some j and some π ∈ HomOS (S, S j ) such that β − π∗ α(j) ∈ Mn (S). But
now, by Lemma 15, we find that the leading monomial of π∗ f j equals π∗ α( j) , hence
subtracting a monomial times π∗ f j from g we obtain an element of P(S) with smaller
leading monomial that is not in the ideal generated by the f j —a contradiction.
Below, we need the following generalisation of Theorem 12.
Theorem 18. For any n1 , . . . , nr ∈ (Z)≥0 the Fin-algebra (or OS-algebra) (An1 /In1 ) ⊗
· · · ⊗ (An /In1 ) is Noetherian.
Proof. This algebra is isomorphic to B := K(Mn1 × · · · × Mnr ). There is a natural
embedding ι : Mn1 × · · · × Mnr → Mn1 +...+ns =: Mn by forming a block matrix; its
image consists of block matrices with constant partial column sums. And while a
subalgebra of a Noetherian algebra is not necessarily Noetherian, this is true in the
current setting.
The crucial point is that if αi ∈ (Mn1 × · · · × Mnr )(Si ) for i = 1, 2, then a priori ι(α1 )|ι(α2 )
only means that ι(α2 ) − π∗ ι(α1 ) ∈ Mn (S2 ); but since both summands have constant
partial column sums, so does their difference, so in fact, the difference lies in the
image of ι. With this observation, the proof above for the case where r = 1 goes
through unaltered for arbitrary r.
Remark 19. Similar arguments for passing to sub-algebras are also used in [HS12]
and [Dra10].
♣
4. Proofs of the main results
In this section we prove Theorems 1 and 7.
Toric fibre products. To prove Theorem 7, we work with a product of s copies of
the category Fin; one for each of the varieties Xi whose iterated fibre products are
under consideration. Let s, r ∈ Z≥0 . For each i ∈ [s] and j ∈ [r] let di j ∈ Z≥0 and set
10
JAN DRAISMA AND FLORIAN M. OOSTERHOF
Vi j := Kdi j . Consider the Fins -variety V that assigns to an s-tuple S = (S1 , . . . , Ss )
the product
r O
s
Y
i
Vi⊗S
j
j=1
i=1
and to a morphism π = (π1 , . . . , πs ) : S → T := (T1 , . . . , Ts ) in Fins the linear map
V(S) → V(T) determined by
,
(5)
⊗i ⊗k∈Si vi jk
7→ ⊗i ⊗l∈Ti
k∈π−1 (l) vi jk
j∈[r]
j∈[r]
i
where the Hadamard product is the one on Vi j . Let Q (S) be the Zariski-closed
subset of V(S) consisting of r-tuples of tensors of rank at most one; thus Q≤1 is a
Fins -subvariety of V.
Qr
For each i ∈ [s] let Xi ⊆
j=1 Vi j be a Hadamard-stable Zariski-closed subset.
≤1
Then for any tuple S = (S1 , . . . , Ss ) in Fins the variety X(S) := X1∗S1 ∗ · · · ∗ Xs∗Ss is a
Zariski-closed subset of V(S).
Lemma 20. The association S 7→ X(S) defines a Fins -closed subvariety of Q≤1 .
Proof. From the definition of ∗ in (1) it is clear that the elements of X(S) are r-tuples
of tensors of rank at most 1. Furthermore, for a morphism S → T in Fins the linear
map V(S) → V(T) from (5) sends X(S) into X(T)—here we use that if (vi, j,k ) j∈[r] ∈ Xi
for each k ∈ π−1 (l), then also ( k∈π−1 (l) vi jk ) j∈[r] ∈ Xi since Xi is Hadamard-stable.
Now Theorem 7 follows once we know that the coordinate ring of Q≤1 is a Noetherian (Fins )op -algebra. For s = 1 and r = 1 this is Theorem 12 with n equal to d11 .
For s = 1 and general r, this is Theorem 18 with n j equal to d1j .
For r = 1 and general s, Theorem 7 follows from a Fins -analogue of Theorem 12,
which is proved as follows. The coordinate ring of Q≤1 (S1 , . . . , Ss ) is the subring
of K(Md11 (S1 ) × · · · × Mds1 (Ss )) spanned by the monomials corresponding to s-tuples
of matrices with the same constant column sum. Using Proposition 17 and the
fact that a finite product of well-quasi-ordered sets is well-quasi-ordered one finds
that the natural Fins -analogue on Md11 × · · · × Mds1 of the division relation | is a
well-quasi-order; and this implies, once again, that the coordinate ring of Q≤1 is a
Noetherian (OSs )op -algebra.
Finally, for general s and general r, the result follows as in the proof of Theorem 18.
This proves the Theorem 7 in full generality.
Remark 21. The only place where we used that the Xi contain the all-one vector is
in the proof of Lemma 20 when π−1 (l) happens to be empty. If we do not require
this, then the conclusion of Theorem 7 still holds, since one can work directly with
the category OSs in which morphisms π are surjective.
Remark 22. If we replace the Xi by Hadamard-stable closed subschemes rather
than subvarieties, then S 7→ X(S) is still a Fins -closed subscheme of Q≤1 , and since
the coordinate ring of the latter is Noetherian, the proof goes through unaltered.
MARKOV RANDOM FIELDS AND ITERATED TORIC FIBRE PRODUCTS
11
Remark 23. In the Independent Set Theorem from [HS12], the graph G = (N, E)
is fixed but the state space sizes d j grow unboundedly for j in an independent set
T ⊆ N and are fixed for j < T. In this case, given a T-tuple of maps (π j : S j → P j ) j∈T
of finite sets, where S j is thought of as the state space of j ∈ T in the smaller model
and P j as the state space in the larger model, we obtain a natural map from the
larger model into the smaller model. Hence then the graphical model is naturally
a (Finop )T -variety and its coordinate ring is a FinT -algebra. Note the reversal of the
roles of these two categories compared to Lemma 20.
Markov random fields. Given a finite (undirected, simple) graph G = (N, E) with a
number d j of states attached to each node j ∈ N, the graphical model is XG := im ϕG ,
where ϕG is the parameterisation
Y
Q
Q
Q
(θCα )C,α 7→
ϕG : C C∈mcl(G) j∈C [d j ] → C j∈N [d j ] ,
θCβ|C .
C∈mcl(G)
β
Lemma 24. For any finite graph G, the graphical model XG is Hadamard-closed.
Proof. The parameterisation ϕ sends the all-one vector in the domain to the all-one
vector 1 in the target space, so 1 ∈ im ϕ. Moreover, if θ, θ0 are two parameter
vectors, then ϕ(θ θ0 ) = ϕ(θ) ϕ(θ0 ), so im ϕ is Hadamard-closed. Then so is its
closure.
Following [Sul07], we relate graph glueing to toric fibre products. We are given
finite graphs G1 , . . . , Gs with node sets N1 , . . . , Ns such that Ni ∩ Nk = N0 for all i , k
in [s]
S and such that each Gi induces the same graph H on N0 . Moreover, for each
j ∈ i Ni we fix a number d j of states.
Q
Q
For each β0 ∈ j∈N0 [d j ] and each i ∈ [s] set Vi,β0 := C j∈Ni \N0 [d j ] , which we interpret
as the ambient space of the part of the probability table of the variables X j , j ∈ Ni
where we have fixed the states of the variables in N0 to β0 —up to scaling, these are
the conditional joint probabilities
for the X j , j ∈ Ni \ N0 given that the X j , j ∈ N0 are
Q
in joint state β0 . For β ∈ j∈Ni [d j ] write β = β0 ||β0 where β0 , β0 are the restrictions of
β to N0 and Ni \N0 , respectively. For each maximal clique
Q C in Gi define C0 = C∩N0
and C0 = C \ N0 . Correspondingly, decompose α ∈ j∈C [d j ] as α = α0 ||α0 , where
α0 , α0 are the restrictions of α to C0 and C0 , respectively.
Then the graphical model XGi := im ϕGi is the closure of the image of the parameterisation
Y
Y
Q
Q
θC(β0 |C ) || (β0 |C0 ) .
ϕi : C C∈mcl(Gi ) j∈C [d j ] →
Vi,β0 ,
(θCα )C,α 7→
0
Q
C∈mcl(G)
β0 ∈
j∈N0 [d j ]
Q
β0 β0
Setting r := j∈N0 d j , we are exactly in the setting of the previous sections: for each
i, k ∈ [s], we have the bilinear map
Y
Y
Y
∗:
Vi,β0 ×
Vk,β0 →
(Vi,β0 ⊗ Vk,β0 ),
((vi,β0 )β0 , (vk,β0 )β0 ) 7→ (vi,β0 ⊗ vk,β0 )β0 ,
β0
β0
β0
and we can takeQiterated products of this type. The space on the right is naturally
isomorphic to C j∈N1 ∪N2 [d j ] , the space of probability tables for the joint distribution
12
JAN DRAISMA AND FLORIAN M. OOSTERHOF
of the variables labelled by the vertices in the glued graph Gi +H Gk . Under this
identification we have the following.
P
P
Proposition 25. For G := aH1 G1 +H · · · +H aHs Gs we have XG = XG∗a11 ∗ · · · ∗ XG∗ass .
Proof. It suffices to prove this for the gluing of two graphs. Note that a clique in
G := G1 +H G2 is contained entirely in either G1 or G2 , or in both but then already
in H. Let θ, η be a parameter vectors in the domains of ϕG1 , ϕG2 , respectively. Then
ϕG1 (θ) ∗ ϕG2 (η)
Y
=
θC(β0 |C ) || (β0 |C0 )
0
C∈mcl(G1 )
Y
=
C∈mcl(G1 )
Y
=
C∈mcl(G1 )
Y
C
∗
η
0| 0 )
)
||
(β
(β
|
0 C0
C
C∈mcl(G )
β0 β0
Q
β0 ∈ j∈N1 \N0 [d j ]
Y
θC(β0 |C
·
) || (β0 |C0 )
0
C∈mcl(G2 )
Y
C
=
µ(β0 |C ) || (β0 |C0 )
0
C∈mcl(G)
2
θC(β0 |C ) || (β0 |C0 )
0
Y
⊗
β0 β0
ηC(β0 |C ) || (β0 |C0 )
0
ηC(β0 |C ) || (β0 |C0 )
0
Q
β0 ∈ j∈(N1 ∪N2 )\N0 [d j ]
Q
C∈mcl(G2 )
Q
β0 ∈ j∈N2 \N0 [d j ]
Q
β0 ∈ j∈(N1 ∪N2 )\N0 [d j ]
= ϕG (µ),
β0
β0
β0
where, for C ∈ mcl(G) and α ∈ j∈C [d j ], the parameter µCα is defined as
θCα
if C ⊆ N1 and C * N0 ,
C
C
µα :=
ηα
if C ⊆ N2 and C * N0 , and
θC ηC if C ⊆ N0 .
α α
This computation proves that XG1 ∗ XG2 ⊆ XG . Conversely, given any parameter
vector µ for G, we can let θ be the restriction of µ to maximal cliques of the first
and third type above, and set ηCα equal to µCα if C is of the second type above and
equal to 1 if it is of the third type. This yields the opposite inclusion.
Proof of Theorem 1. By Proposition 25, the ideal IG is the ideal of the iterated toric
fibre product XG∗a11 ∗ · · · ∗ XG∗ass . By Lemma 24, each of the varieties XGi is Hadamard
closed. Hence Theorem 7 applies, and IG is generated by polynomials of degree
less than some D, which is independent of a1 , . . . , as . Then it is also generated by
the binomials of at most degree D.
References
[DK14]
[Dra10]
[DS98]
Jan Draisma and Jochen Kuttler. Bounded-rank tensors are defined in bounded degree. Duke
Math. J., 163(1):35–63, 2014.
Jan Draisma. Finiteness for the k-factor model and chirality varieties. Adv. Math., 223:243–256,
2010.
Persi Diaconis and Bernd Sturmfels. Algebraic algorithms for sampling from conditional
distributions. Ann. Stat., 26(1):363–397, 1998.
MARKOV RANDOM FIELDS AND ITERATED TORIC FIBRE PRODUCTS
13
[EKS14]
Alexander Engström, Thomas Kahle, and Seth Sullivant. Multigraded commutative algebra
of graph decompositions. J. Algebr. Comb., 39(2):335–372, 2014.
[ES96]
David Eisenbud and Bernd Sturmfels. Binomial ideals. Duke Math. J., 84(1):1–45, 1996.
[HC71] J.M. Hammersley and P. Clifford. Markov fields on finite graphs and lattices. Unpublished,
http://www.statslab.cam.ac.uk/˜grg/books/hammfest/hamm-cliff.pdf, 1971.
[HS12]
Christopher J. Hillar and Seth Sullivant. Finite Gröbner bases in infinite dimensional polynomial rings and applications. Adv. Math., 221:1–25, 2012.
[KR14]
Thomas Kahle and Johannes Rauh. Toric fiber products versus Segre products. Abh. Math.
Semin. Univ. Hamb., 84(2):187–201, 2014.
[Lau98] Steffen L. Lauritzen. Graphical models, volume 17 of Oxford Statistical Science Series. Oxford
Univ. Press., Oxford, 1998.
[Mac01] Diane MacLagan. Antichains of monomial ideals are finite. Proc. Am. Math. Soc., 129(6):1609–
1615, 2001.
[Oos16] Florian M. Oosterhof. Stabilisation of iterated toric fibre products. 2016. Master’s thesis, Eindhoven University of Technology, http://repository.tue.nl/855107.
[RS14]
Johannes
Rauh
and
Seth
Sullivant.
The
Markov
basis
of
k3,N .
\protect\vrule width0pt\protect\href{http://arxiv.org/abs/1406.5936}{arXiv:1406.5936},
2014.
[RS16]
Johannes Rauh and Seth Sullivant. Lifting Markov bases and higher codimension toric fiber
products. J. Symb. Comp, 74:276–307, 2016.
[Sam17a] Steven V. Sam. Ideals of bounded rank symmetric tensors are generated in bounded degree.
Invent. Math., 207(1):1–21, 2017.
[Sam17b] Steven V. Sam. Syzygies of bounded rank symmetric tensors are generated in bounded
degree. Math. Ann., 368(3–4):1095–1108, 2017.
[Shi12]
Takafumi Shibuta. Gröbner bases of contraction ideals. J. Algebr. Comb., 36(1):1–19, 2012.
[SS17]
Steven V. Sam and Andrew Snowden. Gröbner methods for representations of combinatorial
categories. J. Am. Math. Soc., 30(1):159–203, 2017.
[Sul07]
Seth Sullivant. Toric fiber products. J. Algebra, 316(2):560–577, 2007.
(Jan Draisma) Mathematical Institute, University of Bern, Sidlerstrasse 5, 3012 Bern, Switzerland;
and Eindhoven University of Technology, The Netherlands
E-mail address: [email protected]
(Florian M. Oosterhof) Department of Mathematics and Computer Science, Eindhoven University
of Technology, P.O. Box 513, 5600 MB Eindhoven, The Netherlands
E-mail address: [email protected]
| 0math.AC
|
Logical Methods in Computer Science
Vol. 1 (3:2) 2005, pp. 331–353
www.lmcs-online.org
Submitted
Published
Feb. 5, 2005
Dec. 20, 2005
SECURITY POLICIES AS MEMBRANES IN SYSTEMS FOR GLOBAL
COMPUTING
DANIELE GORLA a , MATTHEW HENNESSY b , AND VLADIMIRO SASSONE c
a
Dip. di Informatica, Univ. di Roma “La Sapienza”
e-mail address: [email protected]
b
Dept. of Informatics, Univ. of Sussex
e-mail address: [email protected]
c
Dept. of Informatics, Univ. of Sussex
e-mail address: [email protected]
Abstract. We propose a simple global computing framework, whose main concern is
code migration. Systems are structured in sites, and each site is divided into two parts: a
computing body, and a membrane which regulates the interactions between the computing
body and the external environment. More precisely, membranes are filters which control
access to the associated site, and they also rely on the well-established notion of trust
between sites. We develop a basic theory to express and enforce security policies via
membranes. Initially, these only control the actions incoming agents intend to perform
locally. We then adapt the basic theory to encompass more sophisticated policies, where
the number of actions an agent wants to perform, and also their order, are considered.
1. Introduction
Computing is increasingly characterised by the global scale of applications and the
ubiquity of interactions between mobile components. Among the main features of the forthcoming “global ubiquitous computing” paradigm we list distribution and location awarness,
whereby code located at specific sites acts appropriately to local parameters and circumstances, that is, it is “context-aware”; mobility, whereby code is dispatched from site to site
to increase flexibility and expressivity; openness, reflecting the nature of global networks
and embodying the permeating hypothesis of localised, partial knowledge of the execution
environment. Such systems present enormous difficulties, both technical and conceptual,
and are currently more at the stage of exciting future prospectives than that of established
of engineering practice. Two concerns, however, appear to clearly have a ever-reaching
2000 ACM Subject Classification: F.1.1, F.3.1, D.3.1, D.4.6.
Key words and phrases: Process calculi, Mobile code, Language-based security, Type systems.
a
This work has been mostly carried on while the first author was at the Dept. of Informatics, Univ. of
Sussex, with a Marie Curie Fellowship.
a,b,c
The authors would like to acknowledge the support of the EC Global Computing projects Mikado and
Myths.
l
LOGICAL METHODS
IN COMPUTER SCIENCE
c
DOI:10.2168/LMCS-1 (3:2) 2005
CC
D. Gorla, M. Hennessy, and V. Sassone
Creative Commons
2
D. GORLA, M. HENNESSY, AND V. SASSONE
import: security and mobility control, arising respectively from openness and from massive
code and resource migrations. They are the focus of the present paper.
We aim at classifying mobile components according to their behaviour, and at empowering sites with control capabilities which allow them to deny access to those agents whose
behaviour does not conform to the site’s policy. We see every site of a system
k[[ M |i P ]]
as an entity named k and structured in two layers: a computing body P , where programs
run their code – possibly accessing local resources offered by the site – and a membrane M ,
which regulates the interactions between the computing body and the external environment.
An agent P wishing to enter a site l must be verified by the membrane before it is given a
chance to execute in l. If the preliminary check succeeds, the agent is allowed to execute,
otherwise it is rejected. In other words, a membrane implements the policy each site wants
to enforce locally, by ruling on the requests of access of the incoming agents. This can be
easily expressed by a migration rule of the form:
k[[ M k |i gol.P | Q ]] k l[[ M l |i R ]] → k[[ M k |i Q ]] k l[[ M l |i P | R ]]
if M l ⊢k P
The relevant parts here are P , the agent wishing to migrate from k to l, and l, the receiving
site, which needs to be satisfied that P ’s behaviour complies with its policy. The latter
is expressed by l’s membrane, M l . The judgement M l ⊢k P represents l inspecting the
incoming code to verify that it upholds M l .
Observe that in the formulation above M l ⊢k P represents a runtime check of all
incoming agents. Because of our fundamental assumption of openendedness, such kind of
checks, undesirable as they might be, cannot be avoided. In order to reduce their impact on
systems performance, and to make the runtime semantics as efficient as possible, we adopt
a strategy which allows for efficient agent verification. Precisely, we adopt an elementary
notion of trust, so that from the point of view of each l the set of sites is consistently
partitioned between “good,” “bad,” and “unknown” sites. Then, in a situation like the
one in the rule above, we assume that l will be willing to accept from a trusted site k a
k-certified digest T of P ’s behaviour. We then modify the primitive go and the judgement
⊢k as in the refined migration rule:
k[[ M k |i go T l.P | Q ]] k l[[ M l |i R ]] → k[[ M k |i Q ]] k l[[ M l |i P | R ]]
if M l ⊢kT P
The notable difference is in M l ⊢kT P . Here, l verifies the entire code P against M l only if
it does not trust k, the signer of P ’s certificate T. Otherwise, it suffices for l to match M l
against the digest T carried by go together with P from k, so effectively shifting work from
l to the originator of P .
Our main concern in this paper is to put the focus on the machinery a membrane should
implement to enforce different kinds of policies. We first distill the simplest calculus which
can conceivably convey our ideas and still support a non-trivial study. It is important to
remark that we are abstracting from agents’ local computations. These can be expressed
in any of several well-known models for concurrency, for example CCS [Mil82] or the π–
calculus [Mil99]. We are concerned, instead, with agents’ migration from site to site: our
main language mechanism is go rather than intra-site (i.e. local) communication. Using this
language, we examine four notions of policy and show how they can be enforced by using
membranes. We start with an amusingly simple policy which only lists allowed actions.
We then move to count action occurrences and then to policies expressed by deterministic
finite automata. Note that such policies are only concerned with the behaviour of single
SECURITY POLICIES AS MEMBRANES IN SYSTEMS FOR GLOBAL COMPUTING
3
agents, and do not take into account “coalitional” behaviours, whereby incoming agents –
apparently innocent – join clusters of resident agents – they too apparently innocent – to
perform cooperatively potentially harmful actions, or at least overrule the host site’s policy.
We call resident those policies intended to be applied to the joint, composite behaviour of
the agents contained at a site. We explore resident policies as our fourth and final notion of
policy. In all the cases, the theory adapts smoothly; we only need to refine the information
stored in the membrane and the inspection mechanisms.
Structure of the paper. In Section 2 we define the calculus used in this paper, and start
with the straightforward policy which only prescribes the actions an agent can perform
when running in a site. In Section 3, we enhance the theory to control also how many (and
not only which kind of) actions an agent wants to perform in a site, and their order of
execution. Finally, in Section 4 we extend the theory to control the overall computation
taking place at a site, and not only the behaviour of single agents. The paper concludes in
Section 5 where a comparison with related work is also given. The theoretical results are
proved in Appendix A. With respect to the extended abstract [GHS04], this paper contains
more examples together with complete proofs.
2. A Simple Calculus
In this section we describe a simple calculus for mobile agents, which may migrate
between sites. Each site is guarded by a membrane, whose task is to ensure that every
agent accepted at the site conforms to an entry policy.
2.1. The Syntax.
The syntax is given in Figure 1 and assumes two pairwise disjoint sets: basic agent
actions Act, ranged over by a, b, c, · · · , and localities Loc, ranged over by l, k, h, · · · . Agents
are constructed using the standard action-prefixing, parallel composition and replication
operators from process calculi, [Mil82]. The one novel operator is that for migration,
go T l.P
This agent seeks to migrate to site l in order to execute the code P ; moreover it promises
to conform to the entry policy T. In practical terms this might consist of a certification
that the incoming code P conforms to the policy T, which the site l has to decide whether
or not to accept. In our framework, this certification is a policy that describes the (local)
behaviour of the agent; thus, in go T l.P , T will be called the digest of P .
A system consists of a finite set of sites running in parallel. A site takes the form
l[[ M |i P ]]
where
• l is the site name
• P is the code currently running at l
• M is the membrane which implements the entry policy.
For convenience we assume that site names are unique in systems. Thus, in a given system
we can identify the membrane associated with the site named l by M l . We start with a
very simple kind of policy, which we will then progressively enhance.
4
D. GORLA, M. HENNESSY, AND V. SASSONE
Basic Actions a, b, c, ... ∈ Act
Localities l, h, k, ... ∈ Loc
Agents P, Q, R ::=
|
|
|
|
Systems
N
nil
a.P
go T l.P
P |Q
!P
nil agent
basic action
migration
composition
replication
::= 0
empty system
| l[[ M |i P ]]
site
| N1 k N2
composition
Figure 1: A Simple Calculus
Definition 2.1 (Policies). A policy is a finite subset of Act ∪ Loc. For two policies T1
and T2 , we write
T1 enforces T2
whenever T1 ⊆ T2 .
Intuitively an agent conforms to a policy T at a given site if
• every action it performs at the site is contained in T
• it will only migrate to sites whose names are in T.
For example, conforming to the policy {info, req, home}, where info, req are actions
and home a location, means that the only actions that will be performed are from the
set {info, req} and migration will only occur, if at all, to the site home. With this
interpretation of policies, our definition of the predicate enforces is also intuitive; if some
code P conforms to the policy T1 and T1 enforces T2 then P also automatically conforms
to T2 .
The purpose of membranes is to enforce such policies on incoming agents. In other
words, at a site l[[M |iQ]] wishing to enforce a policy Tin , the membrane M has to decide when
to allow entry to an agent such as go T l.P from another site. There are two possibilities.
• The first is to syntactically check the code P against the policy Tin ; an implementation
would actually expect the agent to arrive with a proof of this fact, and this proof would
be checked.
• The second would be to trust the agent that its code P conforms to the stated T and
therefore only check that this conforms to the entry policy Tin . Assuming that checking
one policy against another is more efficient than the code analysis, this would make entry
formalities much easier.
Deciding on when to apply the second possibility presupposes a trust management framework for systems, which is the topic of much current research. To simplify matters, here
we simply assume that each site contains, as part of its membrane, a record of the level of
trust it has in other sites. Moreover, we assume only three possible levels: bad, unknown
and good. Intuitively, a site is good/bad if it behaves in a reliable/unreliable way, i.e. it
does/doesn’t properly calculate digests. On the other hand, a site tagged as unknown can
behave in a non specified way; thus, for the sake of security, it will be considered as bad.
SECURITY POLICIES AS MEMBRANES IN SYSTEMS FOR GLOBAL COMPUTING
(r-act)
(r-par)
(r-struct)
(r-mig)
l[[ M |i a.P | Q ]]
→
5
l[[ M |i P | Q ]]
N1 → N1′
N1 k N2 → N1′ k N2
N ≡ N1
N1 → N1′
N1′ ≡ N ′
N → N′
k[[ M k |i go T l.P | Q ]] k l[[ M l |i R ]]
k[[ M k
→
|i Q ]] k l[[ M l |i P | R ]]
if M l ⊢kT P
Figure 2: The reduction relation
l[[ M |i P | nil ]] ≡ l[[ M |i P ]]
N k0 ≡ N
l[[ M |i P | Q ]] ≡ l[[ M |i Q | P ]]
N1 k N2 ≡ N2 k N1
l[[ M |i (P | Q) | R ]] ≡ l[[ M |i P | (Q | R) ]]
(N1 k N2 ) k N3 ≡ N1 k (N2 k N3 )
l[[ M |i !P | Q ]] ≡ l[[ M |i P | !P | Q ]]
Figure 3: The structural equivalence
In a more realistic scenario, it would be possible to refine unknown to either good or bad,
upon collection of enough evidence to consider it reliable or not. For the sake of simplicity,
we do not model this framework here.
Definition 2.2 (Membranes). A membrane M is a pair (Mt , Mp ) where
• Mt is a partial function from Loc to {unknown, good, bad}
• Mp is a policy
2.2. The Operational Semantics.
Having defined both policies and membranes, we now give an operational semantics for
the calculus, which formalises the above discussion on how to manage agent migration. This
is given as a binary relation N → N ′ over systems; it is defined to be the least relation which
satisfies the rules in Figure 2. Rule (r-act) says that the agent a.P running in parallel
with other code in site l, such as Q, can perform the action a; note that the semantics does
not record the occurrence of a. (r-par) and (r-struct) are standard. The first allows
reductions within parallel components, while the second says that reductions are relative
to a structural equivalence; the rules defining this equivalence are given in Figure 3. The
interesting reduction rule is the last one, (r-mig), governing migration; the agent goT l.P
can migrate from site k to site l provided the predicate M l ⊢kT P is true. This ‘enabling’
predicate formalises our discussion above on the role of the membrane M l , and requires in
turn a notion of code P satisfying a policy T,
⊢P :T
6
D. GORLA, M. HENNESSY, AND V. SASSONE
(tc-act)
(tc-mig)
⊢ nil : T
⊢P :T
a∈T
⊢ a.P : T
⊢ P : T′
⊢ go T′ l.P : T
(tc-repl)
(tc-par)
⊢P :T
⊢ !P : T
⊢P :T
⊢Q:T
⊢P |Q:T
(tc-empty)
l∈T
Figure 4: Typechecking incoming agents
With such a notion, we can then define M l ⊢kT P to be:
if Mtl (k) = good then (T enforces Mpl ) else ⊢ P : Mpl
(2.1)
In other words, if the target site l trusts the source site k, it trusts that the professed policy
T is a faithful reflection of the behaviour of the incoming agent P , and then entry is gained
provided that T enforces the entry policy Mpl (i.e., in this case, T ⊆ Mpl ). Otherwise, if k
can not be trusted, then the entire incoming code P has to be checked to ensure that it
conforms to the entry policy, as expressed by the predicate ⊢ P : Mpl .
In Figure 4 we describe a simple inference system for checking that agents conform to
policies, i.e. to infer judgements of the form ⊢ P : T. Rule (tc-empty) simply says that
the empty agent nil satisfies all policies. (tc-act) is also straightforward; a.P satisfies a
policy T and if a is allowed by T, and the residual P satisfies T. The rule (tc-par) says
that to check P | Q it is sufficient to check P and Q separately, and similarly for replicated
agents. The most interesting rule is (tc-mig), which checks go T′ l.P . This not only checks
that migration to l is allowed by the policy, that is l ∈ T, but it also checks that the code to
be spawned there, P , conforms to the associated professed policy T′ . In some sense, if the
agent goT′ l.P is allowed entry into a site k, then k assumes responsibility for any promises
that it makes about conformance to policies.
2.3. Safety.
We have just outlined a reduction semantics in which sites seek to enforce policies either
by directly checking the code of incoming agents against entry policies, or more simply by
checking the professed policy of trusted agents. The extent to which this strategy works
depends, not surprisingly, on the quality of a site’s trust management.
Example 2.3. Let home be a site name with the following trust function
Mth : {alice, bob, secure}
7→
good .
Consider the system
△
N = home[[ M h |i P h ]] k bob[[ M b |i P b ]] k alice[[ M a |i P a ]] k secure[[ M s |i P s ]]
in which the entry policy of home, Mph , is {info, req, secure}, and that of secure, Mps ,
is {give, home}. Since Mth (bob) = good, agents migrating from bob to home are trusted
and only their digests are checked against the entry policy Mph . So, if P b contains the agent
goT1 home.(take.Q)
SECURITY POLICIES AS MEMBRANES IN SYSTEMS FOR GLOBAL COMPUTING
7
where T1 enforces Mph , then the entry policy of home will be transgressed.
As another example, suppose alice, again trusted by home, contains the agent
go T1 home.(info.go T2 secure.(take.Q))
where T2 is some policy which enforces the entry policy of secure, Mps . Again because
T1 enforces Mph , the migration is allowed from alice to home, and moreover the incoming
agent conforms to the policy demanded of home. The second migration of the agent is also
successful if secure trusts home: Mts (home) = good and therefore only the digest T2 is
checked against the entry policy of secure. We then have the reduction
N
−
→∗ home[[. . .]] k bob[[. . .]] k alice[[. . .]] k secure[[ M s |i take.Q | P s ]]
in which now the entry policy of secure has been foiled.
The problem in this example is that the trust knowledge of home is faulty; it trusts in
sites which do not properly ensure that professed policies are enforced. Let us divide the
sites into trustworthy and otherwise. This bipartition could be stored in an external record
stating which nodes are trustworthy (i.e. typechecked) and which ones are not. However,
for economy, we prefer to record this information in the membranes, by demanding that
the trust knowledge at trustworthy sites is a proper reflection of this division. This is more
easily defined if we assume the following ordering over trust levels:
unknown <: bad
and
unknown <: good
This reflects the intuitive idea that sites classified as unknown may, perhaps with further
information, be subsequently classified either as good or bad. On the other hand, good or
bad cannot be further refined; sites classified as either, will not be reclassified.
Definition 2.4 (Trustworthy sites and Coherent systems). In a system N , the site k is
trustworthy if Mtk (k) = good. N is coherent if Mtk (l) <: Mtl (l) for every trustworthy site k.
Thus, if a trustworthy site k believes that a site l can be trusted (i.e., Mtk (l) = good),
then l is indeed trustworthy (as represented by Mtl (l) = good). Similarly, if it believes l to
be bad, then l is indeed bad. The only uncertainty is when k classifies l as unknown: then l
may be either good or bad. Of course, in coherent systems we expect sites which have been
classified as trustworthy to act in a trustworthy manner, which amounts to saying that code
running at such a k must have at one time gained entry there by satisfying the entry policy.
Note that by using policies as in Definition 2.1, if P satisfies an entry policy Mpk , then it
continues to satisfy the policy while running at k (cf. Theorem 2.7 below).
This property of coherent systems, which we call well-formedness, can therefore be
checked syntactically. In Figure 5, we give the set of rules for deriving the judgement
⊢ N : ok
of well-formedness of N . There are only two interesting rules. Firstly, (wf-g.site) says that
l[[ M |i P ]] is well-formed whenever l is trustworthy and ⊢ P : Mp . There is a subtlety here;
this not only means that P conforms to the policy Mp , but also that any digests proffered
by agents in P can also be trusted. The second relevant rule is (wf-u.site), for typing
unknown sites: here there is no need to check the resident code, as agents emigrating from
such sites will not be trusted.
Example 2.5. (Example 2.3 continued.) Let us now re-examine the system N in Example 2.3. Suppose home is trustworthy, that is Mth (home) = good. Then, if N is to be
8
D. GORLA, M. HENNESSY, AND V. SASSONE
(wf-g.site)
⊢ 0 : ok
⊢ P : Mp
⊢ l[[ M |i P ]] : ok
(wf-par)
(wf-u.site)
⊢ N1 : ok,
⊢ N2 : ok
⊢ N1 k N2 : ok
⊢ l[[ M |i P ]] : ok
(wf-empty)
l trustworthy
l not trustworthy
Figure 5: Well-formed systems
(lts-act)
a
a.P → P
(lts-repl)
α
(lts-mig)
l
go T l.P → nil
P | !P → P ′
α
!P → P ′
(lts-par)
α
P1 → P1′
α
P1 | P2 →
α
P2 | P1 →
P1′ | P2
P2 | P1′
Figure 6: A Labelled Transition System
coherent, it is necessary for each of the sites bob, alice and secure also to be trustworthy. Consequently, N cannot be well-formed. For example, to derive ⊢ N : ok it would be
necessary to derive
⊢ go T1 home.(take.Q) : Mpb
where Mpb is the entry policy of bob. But this requires the judgement
⊢ take.Q : T1
where T1 enforces Mph . Since take 6∈ Mph , this is not possible.
One can also check that the code running at alice stops the system from being wellformed. Establishing ⊢ N : ok would also require the judgement
⊢ go T1 home.(info.go T2 secure.(take.Q)) : Mpa
which in turn, eventually, requires
⊢ take.Q : T2
for some T2 such that T2 enforces Mps ; this is impossible, again because take is not in Mps .
In well-formed systems we know that entry policies have been respected. So one way of
demonstrating that our reduction strategy correctly enforces these policies is to prove that
• system well-formedness is preserved by reduction
• only legal computations take place within trustworthy sites
The first requirement is straightforward to formalize:
Theorem 2.6 (Subject Reduction). If ⊢ N : ok and N → N ′ , then ⊢ N ′ : ok.
Proof. See Appendix A.1
SECURITY POLICIES AS MEMBRANES IN SYSTEMS FOR GLOBAL COMPUTING
9
To formalise the second requirement we need some notion of the computations of an
agent. With this in mind, we first define a labelled transition system between agents, which
details the immediate actions an agent can perform, and the residual of those actions. The
rules for the judgements
α
P →Q
where we let α to range over Act ∪ Loc, are given in Figure 6, and are all straightforward.
These judgements are then extended to
σ
P →Q
where σ ranges over (Act ∪ Loc)∗ , in the standard manner: σ = α1 , . . . , αk , when there
α
α
exists P0 , . . . , Pk such that P = P0 →1 . . . →k Pk = P ′ . Finally, let act(σ) denote the set of
all elements of Act ∪ Loc occurring in σ.
Theorem 2.7 (Safety). Let N be a well-formed system. Then, for every trustworthy site
σ
l[[ M |i P ]] in N , P → P ′ implies that act(σ) enforces Mp .
Proof. See Appendix A.1
3. Entry Policies
The calculus of the previous section is based on a simple notion of entry policies, namely
finite sets of actions and location names. An agent conforms to such a policy T at a site
if it only executes actions in T before migrating to some location in T. However both the
syntax and the semantics of the calculus are completely parametric on policies. All that is
required of the collection of policies is
• a binary relation T1 enforces T2 between them
• a binary relation ⊢ P : T indicating that the code P conforms to the policy T.
With any collection of policies, endowed with two such relations, we can define the predicate
M ⊢kT P as in (2.1) above, and thereby get a reduction semantics for the calculus. In this
section we investigate two variations on the notion of entry policies and discuss the extent
to which we can prove that the reduction strategy correctly implements them.
3.1. Multisets as Entry Policies. The policies of the previous section only express the
legal actions agents may perform at a site. However in many situations more restrictive
policies are desirable. To clarify this point, consider the following example.
Example 3.1. Let mail serv be the site name of a mail server with the following entry
policy Mpms :
{list, send, retr, del, reset, quit}
The server accepts client agents performing requests for listing mail messages, sending/retrieving/deleting messages, resetting the mailbox and quitting. Now, consider the
system
△
N = mail serv[[ M ms |i P ms ]] k spam[[ M s |i go T mail serv.(!send) ]]
where T = {send}. According to the typechecking of Figure 4, we have that
⊢ ! send : Mpms
10
D. GORLA, M. HENNESSY, AND V. SASSONE
(tc-act)
(tc-mig)
⊢ nil : T
⊢P :T
⊢ a.P : T ∪ {a}
⊢ P : T′
⊢ go T′ l.P : T ∪ {l}
(tc-par)
(tc-repl)
⊢ P : T1
⊢ Q : T2
⊢ P | Q : T1 ∪ T2
⊢P :T
⊢ !P : T′
(tc-empty)
Tω enforces T′
Figure 7: Typechecking with policies as Multisets
However, the agent is a spamming virus and, in practical implementations, should be rejected by mail serv.
In such scenarios it would be more suitable for policies to be able to fix an upper-bound
over the number of messages sent. This can be achieved in our setting by changing policies
from sets of agent actions to multisets of actions. Consequently, predicate enforces is now
multiset inclusion.
First let us fix some notation. We can view a multiset as a set equipped with an
occurrence function, that associates a natural number to each element of the set. To model
permanent resources, we also allow the occurrence function to associate ω to an element
with an infinite number of occurrences in the multiset. Notationally, eω stands for an
element e occurring infinitely many times in a multiset. This notation is extended to sets
and multisets; for any set/multiset E, we let E ω to denote the multiset {eω : e ∈ E}.
Example 3.2. (Example 3.1 continued.) Coming back to Example 3.1, it would be sufficient to define Mpms to be {. . . , sendK , . . .} where K is a reasonable constant. In this way, an
agent can only send at most K messages in each session; if it wants to send more messages,
it has to disconnect from mail serv (i.e. leave it) and then reconnect again (i.e. immigrate
again later on). In practice, this would prevent major spamming attacks, because the time
spent for login/logout operations would radically slow down the spam propagation.
The theory presented in Sections 2.2 and 2.3 can be adapted to the case where policies
are multisets of actions. The judgment ⊢ P : T is redefined in Figure 7, where operator ∪
stands for multiset union. The key rules are (tc-act), (tc-par) and (tc-repl). The first
two properly decrease the type satisfied when typechecking sub-agents. The third one is
needed because recursive agents can be, in general, freely unfolded; hence, the actions they
intend to locally perform can be iterated arbitrarily many times. For instance, agent
△
P = ! send
△
satisfies policy T = {sendω }. Notice that the new policy satisfaction judgement prevents
the spamming virus of Example 3.1 from typechecking against the policy of mail serv
defined in Example 3.2.
The analysis of the previous section can also be repeated here but an appropriate
notion of well-formed system is more difficult to formulate. The basic problem stems from
the difference between entry policies and resident policies. The fact that all agents who
have ever entered a site l respects an entry policy Mp gives no guarantees as to whether the
joint effect with the code currently occupying the site l also satisfies Mp . For instance, in the
SECURITY POLICIES AS MEMBRANES IN SYSTEMS FOR GLOBAL COMPUTING
11
terms of Example 3.2, mail serv ensures that each incoming agent can only send at most K
messages. Nevertheless, two such agents, having gained entry and now running concurrently
at mail serv, can legally send – jointly – up to 2K messages. It is therefore necessary to
formulate well-formedness in terms of the individual threads of the code currently executing
at a site. Let us say P is a thread if it is not of the form P1 | P2 . Note that every agent P can
be written in the form of P1 | . . . |Pn , n ≥ 1, where each Pi is a thread. So the well-formedness
judgment is modified by replacing rule (wf-g.site) in Figure 5 as below.
(wf-g.sitem )
∀i . (Pi a thread and ⊢ Pi : Mp )
⊢ l[[ M |i P1 | . . . |Pn ]] : ok
l trustworthy
Theorem 3.3 (Subject Reduction for multiset policies). If ⊢ N :
⊢ N ′ : ok.
ok
and N → N ′ , then
Proof. Similar to that of Theorem 2.6. The necessary changes are outlined in Appendix A.2.
The statement of safety must be changed to reflect the focus on individual threads
rather than agents. Moreover, we must keep into account also multiple occurrences of
actions in a trace; thus, we let act(σ) return a multiset formed by all the actions occurring
in σ.
Theorem 3.4 (Safety for multiset policies). Let N be a well-formed system. Then, for
σ
every trustworthy site l[[ M |i P1 | . . . |Pn ]] in N , where each Pi is a thread, Pi → Pi′ implies
that act(σ) enforces Mp .
Proof. See Appendix A.2.
3.2. Finite Automata as Entry Policies. A second limitation of the setting presented
in Section 2 is that policies will sometimes need to prescribe a precise order for executing
legal actions. This is very common in client/server interactions, where a precise protocol
(i.e. a pattern of message exchange) must be respected. To this end we define policies as
deterministic finite automata (DFAs, for short).
Example 3.5. Let us consider Example 3.1 again. Usually, mail servers requires a preliminary authentication phase to give access to mail services. To express this fact, we could
implement the entry policy of mail serv, Mpms , to be the automaton associated to the
regular expression below.
usr.pwd.(list + send + retr + del + reset)∗ .quit
The server accepts client requests only upon authentication, via a username/password mechanism. Moreover, the policy imposes that each session is regularly committed by requiring
that each sequence of actions is terminated by quit. This could be needed to save the
status of the transaction and avoid inconsistencies.
We now give the formal definitions needed to adapt the theory developed in Section 2.
We start by defining a DFA, the language associated to it, the enforces predicate between
DFAs and a way for an agent to satisfy a DFA. As usual [HU79], a DFA is a quintuple
△
A = (S, Σ, s0 , F, δ) where
12
D. GORLA, M. HENNESSY, AND V. SASSONE
• S is a finite set of states;
• Σ is the input alphabet;
• s0 ∈ S is a reserved state, called the starting state;
• ∅ ⊂ F ⊆ S is the set of final states (also called accepting states);
• δ : S × Σ → S is the transition relation.
In our framework, the alphabet of the DFAs considered is a finite subset of Act ∪ Loc.
Moreover, for the sake of simplicity, we shall always assume that the DFAs in this paper
are minimal.
Definition 3.6 (DFA Acceptance and Enforcement). Let A be a DFA. Then
• Acps (A) contains all the σ ∈ Σ∗ such that σ leads A from state s to a final state;
• Acp(A) is defined to be Acps0 (A);
• A1 enforces A2 holds true whenever Acp(A1 ) ⊆ Acp(A2 ).
Notice that, as expected, there is an efficient way to extablish A1 enforces A2 , once
given the automata A1 and A2 (see Proposition A.2 in Appendix A.3). We now formally
describe the language associated to an agent by exploiting the notion of concurrent regular
expressions (CRE, for short) introduced in [GR92] to model concurrent processes. For our
purposes, the following subset of CRE suffices:
e
::=
ǫ
| α | e1 .e2
| e1 ⊙ e2
| e⊗
ǫ denotes the empty sequence of characters, α ranges over Act ∪ Loc, ‘.’ denotes concatenation, ⊙ is the interleaving (or shuffle) operator and ⊗ is its closure. Intuitively, if e
represents the language L, then e⊗ represents {ǫ} ∪ L ∪ L⊙L ∪ L⊙L⊙L . . .. Given a CRE
e, the language associated to it, written lang(e), can be easily defined; a formal definition
is recalled in Appendix A.3. Now, given a process P , we easily define a CRE associated to
it. Formally
CRE(nil)
=
△
ǫ
CRE(a.P )
=
△
a.CRE(P )
CRE(go A l.P )
=
△
l
CRE(P1 | P2 )
=
△
CRE(P1 ) ⊙ CRE(P2 )
CRE(!P )
△
CRE(P )⊗
=
Definition 3.7 (DFA Satisfaction). An agent P satisfies the DFA A, written ⊢ P : A, if
lang(CRE(P )) ⊆ Acp(A), and ⊢ Q : A′ holds for every subagent of P of the form go A′ l.Q.
In Proposition A.2, we prove that DFA satisfaction is decidable, although extremely
hard to establish. This substantiate our hypothesis that verifying digests is preferable to
inspecting the full code from the point of view computational complexity. We are now
ready to state the soundness of this variation. It simply consists in finding a proper notion
of well-formed systems. As in Section 3.1, the entry policy can only express properties
of single threads, instead of coalitions of threads hosted at a site. Thus, we modifiy rule
(wf-g.site) from Figure 5 to:
(wf-g.siteA )
∀i . Pi a thread and ∃s ∈ S . lang(CRE(Pi )) ⊆ Acps (Mp )
⊢ l[[ M |i P1 | . . . |Pn ]] : ok
l trustworthy
This essentially requires that the languages associated to each of the threads in l are suffixes
of words accepted by Mp (cf. Theorem 3.9 below). Since this may appear quite weak, it is
SECURITY POLICIES AS MEMBRANES IN SYSTEMS FOR GLOBAL COMPUTING
13
worth remarking that the well-formedness predicate is just a ‘consistency’ check, a way to
express that the agent is in a state from where it will respect the policy of l. The soundness
theorems are reported below and are proved in Appendix A.3.
Theorem 3.8 (Subject Reduction for automata policies). If ⊢ N :
⊢ N ′ : ok.
ok
and N → N ′ , then
Theorem 3.9 (Safety for automata policies). Let N be a well-formed system. Then, for
every trustworthy site l[[M |iP1 | . . . |Pn ]] in N , where each Pi is a thread, σ ∈ lang(CRE(Pi ))
implies that there exists some σ ′ ∈ Acp(Mp ) such that σ ′ = σ ′′ σ, for some σ ′′ .
We conclude this section with two interesting properties enforceable by using automata.
Example 3.10 (Lock/Unlock). We have two actions, lock and unlock, with the constraint
that each lock must be always followed by an unlock. Let Σl = Σ − {lock} and Σu =
Σ−{lock, unlock}. Thus, the desired policy (written using a regular expression formalism)
is
(Σ∗l .(lock.Σ∗u .unlock)∗ )∗
Example 3.11 (Secrecy). Let secret be a secret action; we require that, whenever an
agent performs secret, it cannot migrate anymore (this policy enforces that agents having
performed secret always remain co-located). Let Σs = Σ − {secret} and Σg = Σ − Loc;
thus, the desired policy is
Σ∗s .(ǫ + secret.Σ∗g )
4. Resident Policies
Here we change the intended interpretation of policies. In the previous section a policy
dictated the proposed behaviour of an agent prior to execution in a site, at the point of
entry. This implied that safety in well-formed systems was a thread-wise property (see rules
(wf-g.siteM ) and (wf-g.siteA )). Here we focus on policies which are intended to describe
the permitted (coalitional) behaviour of agents during execution at a site. Nevertheless
these resident policies are still used to determine whether a new agent is allowed access to
the site in question; entry will only be permitted if the addition of this incoming agent to
the code currently executing at the site does not violate the policy.
Let us consider an example to illustrate the difference between entry and resident
policies.
Example 4.1. Let licence serv be the site name of a server that makes available K
licences to download and install a software product. The distribution policy is based on a
queue: the first K agents landing in the site are granted the licence, the following ones are
△
denied. The policy of the server should be Mps = {get licenceK }. However if this policy
is interpreted as an entry policy, applying the theory of Section 3.1, then the system grants
at most K licences to each incoming agent. Moreover this situation continues indefinitely,
effectively handing out licences to all incoming agents.
We wish to re-interpret the policies of the previous section as resident policies and here
we outline two different schemes for enforcing such policies. For simplicity we confine our
attention to one kind of policy, that of multisets.
14
D. GORLA, M. HENNESSY, AND V. SASSONE
4.1. Static membranes.
Our first scheme is conservative in the sense that many of the concepts developed
in Section 3.1 for entry policies can be redeployed. Let us reconsider rule (r-mig) from
Figure 2. There, the membrane M l only takes into consideration the incoming code P , and
its digest T, when deciding on entry, via the predicate M l ⊢kT P . But if the membrane is to
enforce a resident policy, then it must also take into account the contribution of the code
already running in l, namely R. To do so we need a mechanism for joining policies, such as
those of the incoming P and the resident R in rule (r-mig). So let us assume that the set
of policies, with the relation enforces is a partial order in which every pair of elements T1
and T2 has a least upper bound, denoted T1 ⊔ T2 . For multiset policies this is the case as ⊔
is simply multiset union. In addition we need to be able to calculate the (minimal) policy
which a process R satisfies; let us denote this as pol(R). For multiset policies we can adjust
the rules in Figure 7, essentially by eliminating weakening, to perform this calculation; the
resulting rules are given in Figure 8, with judgements of the form P : T.
Lemma 4.2.
• For every P , there is at most one T such that P : T.
• ⊢ P : T implies that there exists some policy T′ such that T′ enforces T and
P : T′ .
Proof. The first statement is proved by structural induction on P ; the second by induction
on the derivation ⊢ P : T.
Definition 4.3. Define the partial function pol(·) by letting pol(P ) be the unique policy
such that P : T, if it exists.
With these extra concepts we can now change rule (r-mig) in Figure 2 to take the
current resident code into account. It is sufficient to change the side condition, from M l ⊢kT
P to M l , R ⊢kT P , where this latter is defined to be
if Mtl (k) = good then (T⊔ pol(R)) enforces Mpl else ⊢ P | R : Mpl
Here if only the digest needs to be checked then we compare T⊔ pol(R), that is the result
of adding the digest to the policy of the resident code R, against the resident policy Mpl .
On the other hand if the source site is untrusted we then need to analyse the incoming
code in parallel with the resident code R. It should be clear that the theory developed in
Section 3.1 is readily adapted to this revised reduction semantics. In particular the Subject
Reduction and Safety theorems remain true; we spare the reader the details. However it
should also be clear that this approach to enforcing resident policies has serious practical
drawbacks. An implementation would need to:
(1) freeze and retrieve the current content of the site, namely the agent R;
(2) calculate the minimal policy satisfied by R to be merged with P ’s digest in order to
check the predicate enforces , or typecheck the composed agent P | R;
(3) reactivate R and, according to the result of the checking phase, activate P .
Even if the language were equipped with a ‘passivation’ operator, as in [SS03], the overall
operation would still be computationally very intensive. Consequently we suggest below
another approach.
SECURITY POLICIES AS MEMBRANES IN SYSTEMS FOR GLOBAL COMPUTING
(ti-act)
(ti-empty)
nil : ∅
(ti-repl)
P :T
a.P : T ∪ {a}
15
(ti-mig)
P : T′
T′ enforces T
go T l.P : {l}
(ti-par)
P :T
!P : Tω
P : T1
Q : T2
P | Q : T1 ∪ T2
Figure 8: Type inference for agents with policies as multisets
4.2. Dynamic membranes.
In the previous approach we have to repeatedly calculate the policy of the current resident code each time a new agent requests entry. Here we allow the policy in the membrane
to “decrease,” in order to reflect the resources already allocated to the resident code. So at
any particular moment in time the policy currently in the membrane records what resources
remain, for any future agents who may wish to enter; with the entry of each agent there
is a corresponding decrease in the membrane’s policy. Formally we need to change the
migration rule rule (r-mig) to one which not only checks incoming code, or digest, against
the membrane’s policy, but also updates the membrane:
(r-mig′ )
k[[ M k |i go T l.P | Q ]] k l[[ M l |i R ]] →
cl |i P | R ]]
k[[ M k |i Q ]] k l[[ M
cl
if M l ⊢kT P ≻ M
cl is defined as
where the judgement M l ⊢kT P ≻ M
T
if Mtl (k) = good
′
let T =
in T′ enforces
pol(P ) otherwise
b l ⊔ T′ ∧ M l = M
cl
Mpl ∧ Mpl = M
t
t
p
First notice that if this migration occurs then the membrane at the target site changes, from
b l . The latter is obtained from the former by eliminating those resources allocated
Mpl to M
p
to the incoming code P . If the source site, k, is deemed to be good this is calculated via
the incoming digest T; otherwise a direct analysis of the code P is required, to calculate
pol(P ).
This revised schema is more reasonable from an implementation point of view, but its
soundness is more difficult to formalise and prove. As a computation proceeds no permanent
record is kept in the system of the original resident policies at the individual sites. Therefore
well-formedness can only be defined relative to an external record of what the resident
policies were, when the system was initiated. For this purpose we use a function Θ, mapping
trustworthy sites to policies; it is sufficient to record the original polices at these sites as we
are not interested in the behaviour elsewhere.
Then we can define the notion of well-formed systems, relative to such a Θ; this is
written as Θ ⊢ N : ok and the formal definition is given in Table 9. The crucial rule is
(wf-g.site), for trustworthy sites. If l is such a site then l[[ M |i P ]] is well-formed relative
to the original record Θ if Mpl ⊔ pol(P ) guarantees the original resident policy at l, namely
Θ(l).
16
D. GORLA, M. HENNESSY, AND V. SASSONE
(wf-g.site)
l trustworthy
(pol(P ) ⊔ Mp ) enforces Θ(l)
Θ ⊢ l[[ M |i P ]] : ok
(wf-u.site)
Θ ⊢ l[[ M |i P ]] : ok
(wf-empty)
Θ ⊢ 0 : ok
(wf-par)
l not trustworthy
Θ ⊢ N1 : ok,
Θ ⊢ N2 : ok
Θ ⊢ N1 k N2 : ok
Figure 9: Well-formed systems under Θ
Theorem 4.4 (Subject Reduction for resident policies). If Θ ⊢ N : ok and N → N ′ , then
Θ ⊢ N ′ : ok.
Proof. Outlined in Appendix A.4.
The introduction of these external records of the original resident policies also enables
us to give a Safety result.
Theorem 4.5 (Safety for resident policies). Let N be a well-formed system w.r.t. Θ. Then,
σ
for every trustworthy site l[[ M |i P ]] in N , P → P ′ implies that act(σ) enforces Θ(l).
Proof. See Appendix A.4.
5. Conclusion and Related Work
We have presented a framework to describe distributed computations of systems involving migrating agents. The activity of agents entering/running in ‘good’ sites is constrained
by a membrane that implements the layer dedicated to the security of the site. We have
described how membranes can enforce several interesting kind of policies. The basic theory
presented for the simpler case has been refined and tuned throughout the paper to increase
the expressiveness of the framework. Clearly, any other kind of behavioural specification of
an agent can be considered a policy. For example, a promising direction could be considering
logical frameworks (by exploiting model checking or proof checkers).
The calculus we have presented is very basic: it is even simpler than CCS [Mil82], as
no synchronization can occur. Clearly, we did not aim at Turing-completeness, but at a
very basic framework in which to focus on the rôle of membranes. We conjecture that, by
suitably advancing the theory presented here, all the ideas can be lifted to more complex
calculi (including, e.g., synchronization, value passing and/or name restriction).
Related Work. In the last decade, several calculi for distributed systems with code
mobility have appeared in literature. In particular, structuring a system as a (flat or
hierarchical) collection of named sites introduced the possibility of dealing with sophisticated
concrete features. For example, sites can be considered as the unity of failure [FG+96,
Ama00], mobility [FG+96, CG00] or access control [HR02, RH03, GP03]. The present
work can be seen as a contribution to the last research line.
As in [GP03], we have presented a scenario where membranes can evolve. However,
the membranes presented in Section 4 only describe ‘what is left’ in the site. On the other
hand, the (dynamically evolving) type of a site in [GP03] always constrains the overall
SECURITY POLICIES AS MEMBRANES IN SYSTEMS FOR GLOBAL COMPUTING
17
behaviour of agents in the site and it is modified upon acquisition/loss of privileges through
computations.
We borrowed from [RH03] the notion of trust between sites, where agents coming from
trusted sites are accepted without any control. Here, we relaxed this choice by examining
the digest of agents coming from trusted sites. Moreover, we have a fixed net of trust; we
believe that, once communication is added to our basic framework, the richer scenario of
[RH03] (where the partial knowledge of a site can evolve during its computation) can be
recovered.
A related paper is [IK01], where authors develop a generic type system that can be
smoothly instantiated to enforce several properties of the π–calculus (dealing with arity
mismatch in communications, deadlock, race control and linearity). They work with one
kind of type, and modify the subtyping relation in order to yield several relevant notions of
safety. The main difference with our approach is that we have different kind of types (and,
thus, different type checking mechanisms) for all the variations we propose. It would be
nice to lift our work to a more general framework closer to theirs; we leave this for future
work.
Our work is also related to [NR05]. Policies are described there as deterministic finite
automata and constrain the access to critical sections in a concurrent functional language.
A type and effect system is provided that guarantees adherence of systems to the policy. In
particular, the sequential behaviour of each thread is guaranteed to respect the policy, and
the interleavings of the threads’ locks to be safe. But unlike our paper [NR05] has no code
migration, and no explicit distribution; thus, only one centralised policy is used.
Membranes as filters between the computing body of a site and the external environment are also considered in [FMP04, Bou04, SS03]. There, membranes are computationally
capable objects, and can be considered as a kind of process. They can evolve and communicate both with the outer and with the inner part of the associated node, in order to
regulate the life of the node. This differs from our conception of membranes as simple tools
for the verification of incoming agents.
To conclude, we remark that our understanding of membranes is radically different from
the concept of policies in [ES99]. Indeed, in loc. cit., security automata control the execution
of agents running in a site by in-lined monitoring. This technique consists of accepting
incoming code unconditionally, but blocking at runtime those actions not abiding the site
policy. Clearly, in order to implement the strategy, the execution of each action must be
filtered by the policy. This contrasts with our approach, where membranes are ‘containers’
that regulate the interactions between sites and their environments. The computation
taking place within the site is out of the control of the membrane, which therefore cannot
rely on in-lined monitoring.
Acknowledgement
The authors wish to acknowledge the reviewers of this paper for their positive attitude
and for their fruitful comments. Joanna Jedrzejowicz kindly answered some questions on
regular languages with interleaving and iterated interleaving.
References
[Ama00] R. Amadio. On modelling mobility. Theoretical Computer Science, 240(1):147–176, 2000.
18
D. GORLA, M. HENNESSY, AND V. SASSONE
[Bou04] G. Boudol. A generic membrane model. In Proc. of Global Computing, volume 3267 of LNCS, pages
208-222. Springer, 2004.
[Bou98] Z. Bouziane. A primitive recursive algorithm for the general Petri net reachability problem. In Proc.
of FOCS’98, pages 130–136. IEEE, 1998.
[CG00] L. Cardelli and A. D. Gordon. Mobile ambients. Theoretical Computer Science, 240(1):177–213,
2000.
[ES99] U. Erlingsson and F. Schneider. SASI Enforcement of Security Policies: A Retrospective. In Proc. of
New Security Paradigms Workshop, pages 87–95. ACM, 1999.
[FMP04] G. Ferrari, E. Moggi, and R. Pugliese. MetaKlaim: a type safe multi-stage language for global
computing. Mathematical Structures in Computer Science, 14(3):367-395, 2004.
[FG+96] C. Fournet, G. Gonthier, J. Lévy, L. Maranget, and D. Rémy. A calculus of mobile agents. In Proc.
of CONCUR’96, volume 1119 of LNCS, pages 406–421. Springer, 1996.
[GR92] V. Garg and M. Raghunath. Concurrent regular expressions and their replationship to Petri nets.
Theoretical Computer Science, 96:285–304, 1992.
[GHS04] D. Gorla and M. Hennessy and V .Sassone. Security Policies as Membranes in Systems for Global
Computing. In Proc. of FGUC’04, ENTCS. Elsevier, 2004.
[GP03] D. Gorla and R. Pugliese. Resource access and mobility control with dynamic privileges acquisition.
In Proc. of ICALP’03, volume 2719 of LNCS, pages 119–132. Springer-Verlag, 2003.
[HR02] M. Hennessy and J. Riely. Resource Access Control in Systems of Mobile Agents. Information and
Computation, 173:82–120, 2002.
[HU79] J. Hopcroft and J. Ullman. Introduction to automata theory, languages and computation. AddisonWesley, 1979.
[IK01] A. Igarashi and N. Kobayashi. A generic type system for the pi-calculus. In Proceedings of POPL
’01, pages 128–141. ACM, 2001.
[May84] E. Mayr. An algorithm for the general Petri net reachability problem. SIAM Journal of Computing,
13(3):441–460, 1984.
[Mil82] R. Milner. A Calculus for Communicating Systems. Springer-Verlag, 1982.
[Mil99] R. Milner. Communicating and Mobile Systems: the π-Calculus. Cambridge University Press, 1999.
[NR05] N. Nguyen and J. Rathke. Typed Static Analysis for Concurrent, Policy-Based, Resource Access
Control. Draft, 2005.
[Pet81] J. Peterson. Petri Net Theory and Modeling of Systems. Prentice Hall, 1981.
[RH03] J. Riely and M. Hennessy. Trust and partial typing in open systems of mobile agents. Journal of
Automated Reasoning, 31:335-370, 2003.
[SS03] A. Schmitt and J. Stefani. The M-calculus: a higher-order distributed process calculus. In Proc. of
POPL’03, pages 50–61. ACM, 2003.
Appendix A. Technical Proofs
We now outline the proofs of the technical results in the paper, section by section.
A.1. Proofs of Section 2.
Lemma A.1 (Subsumption). If ⊢ P : T and T enforces T′ , then ⊢ P : T′ .
Proof. By induction on the derivation of the judgment ⊢ P : T.
SECURITY POLICIES AS MEMBRANES IN SYSTEMS FOR GLOBAL COMPUTING
19
Proof of Theorem 2.6 [Subject Reduction]: The proof is by induction over the inference of N → N ′ . Notice that trustworthiness is invariant under reduction. Therefore
coherence, which is defined in terms of the trustworthiness of sites, is also preserved by
reduction.
We outline the proof when the inference is deduced using rule (r-mig), a typical example. By hypothesis, ⊢ k[[ M k |i go T l.P | Q ]] : ok; this implies that ⊢ k[[ M k |i Q ]] : ok. Thus,
we only need to prove that ⊢ l[[ M l |i R ]] : ok and M l ⊢kT P imply ⊢ l[[ M l |i P | R ]] : ok. We
have two possible situations:
l trustworthy: Judgment ⊢ R : Mpl holds by hypothesis; judgment ⊢ P : Mpl is implied
by M l ⊢kT P . Indeed, because of the coherence hypothesis, Mtl (k) <: Mtk (k). If Mtk (k) 6=
good, then M l ⊢kT P is exactly the required ⊢ P : Mpl . Otherwise, we know that ⊢ go T l.P :
Mpk ; by rule (tc-mig) this implies that ⊢ P : T. Judgment ⊢ P : Mpl is obtained by using
Lemma A.1, since M l ⊢kT P is defined to be T enforces Mpl (see (2.1) in Section 2.2).
Thus, by using (tc-par), we obtain the desired ⊢ P |R : Mpl .
l not trustworthy: This case is simple, because rule (wf-u.site) always allows to derive
⊢ l[[ M l |i P | R ]] : ok.
The case when (r-act) is used is similar, although simpler, and the case when rule (r-par) is
used requires a simple inductive argument. Finally to prove the case when rule (r-struct)
is used, we need to know that coherency of systems is preserved by structual equivalence;
the proof of this fact, which is straightforward, is left to the reader.
σ
Proof of Theorem 2.7 [Safety]: Let l[[ M |i P ]] be a site in N such that P → P ′ . We
have to prove that act(σ) enforces Mp . The statement is proved by induction over the
length of σ. The base case, when σ = ǫ, is trivial since act(ǫ) = ∅.
α
σ′
α
So we may assume σ = ασ ′ and P → P ′′ → P ′ . Let us consider P → P ′′ ; by induction
α
on → , we can prove that α ∈ Mp and that ⊢ l[[ M |i P ′′ ]] : ok. If the transition has been
inferred by using rule (lts-act), then P = a.P ′′ and, by rule (wf-g.site), we have that ⊢
a.P ′′ : Mp ; by definition of rule (tc-act), we have the desired a ∈ Mp and ⊢ P ′′ : Mp . When
(lts-mig) is used the argument is similar, and all other cases follow in a straightforward
manner by induction.
σ′
Thus, we can now apply induction on the number of actions performed in P ′′ → P ′
and obtain that act(σ ′ ) enforces Mp . This sufficies to conclude that act(σ) = (act(σ ′ ) ∪
{α}) enforces Mp .
A.2. Proofs of Section 3.1.
The proofs given in Appendix A.1 can be easily adapted to the setting in which entry
policies are multisets. We outline only the main changes. First recall that enforces
is multiset inclusion, that judgments ⊢ P : T must be now inferred by using the rules in
Figure 7 and that rule (wf-g.siteM ) is used for well-formedness. Then, Lemma A.1 remains
true in this revised setting.
20
D. GORLA, M. HENNESSY, AND V. SASSONE
Proof of Theorem 3.3 [Subject Reduction]: A straightforward adaptation of the corresponding proof in the previous section. The only significant change is to the case when a
replication is unfolded via the rule (r-struct), i.e.
△
N = l[[ M |i !P | Q ]] ≡ l[[ M |i P | !P | Q ]] → N ′′ ≡ N ′
By hypothesis, ⊢ !P : Mp ; therefore, by definition of rule (tc-repl), we have that ⊢ P : T
for some T such that Tω enforces Mp . Since T enforces Tω and because of Lemma A.1,
we have that ⊢ l[[ M |i P | !P | Q ]] : ok. By induction, ⊢ N ′′ : ok. It is easy to prove that
this sufficies to obtain the desired ⊢ N ′ : ok.
Proof of Theorem 3.4 [Safety]: From the rule (wf-g.siteM ) we know that ⊢ Pi : Mp ,
for all i = 1, . . . , n. We now proceed by induction over |σ|. The base case is trivial. For
α
σ′
α
the inductive case, we consider σ = ασ ′ and Pi → Pi′′ → Pi′ . By induction on → , we can
prove that α ∈ Mp and that ⊢ l[[ Mt ; Mp − {α} |i Pi′′ ]]. If the transition has been inferred by
using rule (lts-act), then Pi = a.Pi′′ and, by rule (wf-g.siteM ), we have that ⊢ a.Pi′′ : Mp ;
by definition of rule (tc-act), we have the desired Mp = T ∪ {a} and ⊢ P ′′ : T. When
(lts-mig) is used the case is simpler, and all other cases follow in a straightforward manner
by induction.
Coming back to the main claim, we use the induction and obtain that act(σ ′ ) enforces
Mp − {α}; thus, act(σ) enforces Mp .
A.3. Proofs of Section 3.2.
We start by recalling from [GR92] the formal definition of the language associated to a
CRE, as follows.
lang(ǫ)
=
△
{ǫ}
lang(α)
△
=
{α}
lang(e1 .e2 )
=
△
{x1 x2 : x1 ∈ lang(e1 ) ∧ x2 ∈ lang(e2 )}
lang(e1 ⊙ e2 )
△
=
lang(e⊗ )
=
{x1 y1 · · · xn yn : x1 · · · xn ∈ lang(e1 ) ∧ y1 · · · yn ∈ lang(e2 )}
S
{ǫ}
if i = 0
△
⊗i where L⊗i =
lang(e)
i≥0
L⊗i−1 ⊙ L otherwise
△
Notice that the definition of the lang(e1 ⊙ e2 ) hides a trick: the xi s and the yi s can also be
ǫ. Thus, as expected, we can also consider for interleaving strings of different length.
We start by accounting on the complexity of predicate enforces and the satisfiability
relation when policies are automata. This is stated by the following Proposition.
Proposition A.2.
(1) A1 enforces A2 can be calculated in polynomial time
(2) ⊢ P : A is decidable, but it is super-exponential
SECURITY POLICIES AS MEMBRANES IN SYSTEMS FOR GLOBAL COMPUTING
21
Proof.
(1) Let Ai = (Si , Σ, si0 , Fi , δi ) and let Li = Acp(Ai ). By definition, we have to check whether
L1 ⊆ L2 or not. This is equivalent to check whether L1 ∩ L2 = ∅. The following steps
have been carried out by following [HU79].
(a) calculate the automaton associated to L2 . This can be done in O(|S2 |) and the
resulting automaton has |S2 | states.
(b) calculate the automaton associated to L1 ∩ L2 . This can be done in O(|S1 | × |S2 | ×
|Σ|) and creates an automaton A with |S1 | × |S2 | states.
(c) Checking the emptyness of L1 ∩ L2 can be done by using a breath-first search that
starts from the starting state of (the graph underlying) A and stops whenever a
final state is reached. If no final state is reached, L1 ∩ L2 is empty. This can be
done in O(|S1 | × |S2 | × |Σ|).
Thus, the overall complexity is O(|S1 | × |S2 | × |Σ|).
(2) It has been proved in [GR92] that each CRE e can be represented by a (labelled) Petri
net, in that the language accepted by the Petri net is lang(e). Now, we can easily
construct a DFA accepting the complement of the language accepted by A (see item (a)
of the previous proof). Now, we can construct the product between this DFA (that can
be seen as a Petri net) and the Petri net associated to CRE(P ); this Petri net accepts
lang(CRE(P )) ∩ Acp(A) (see [Pet81]). Now, the emptyness of this language can be
solved with the algorithm for the reachability problem in the corresponding Petri net.
This problem has been proved decidable [May84] and solvable in double-exponential
time [Bou98].
We now prove the subject reduction theorem in the setting where types are DFAs. To
this aim, we need to adapt Lemma A.1 and we need a very simple result on the languages
associated to DFAs and processes.
Lemma A.3. If ⊢ P : A and A enforces A′ , then ⊢ P : A′ .
Proof. By transitivity of subset inclusion.
Lemma A.4.
(1) ασ ∈ Acps (A) if and only if σ ∈ Acpδ(s,α) (A)
(2) If σ ∈ lang(CRE(a.P )) then σ = aσ ′ for σ ′ ∈ lang(CRE(P )). Viceversa, if σ ∈
lang(CRE(P )), then aσ ∈ lang(CRE(a.P )).
Proof. Trivial.
Proof of Theorem 3.3 [Subject Reduction]: Now ⊢ N : ok relies on rule (wf-g.siteA ).
Again, the proof is by induction on the inference of N → N ′ . We only give the base cases,
because inductive steps can be handled with in a standard way. We only consider the cases
of trustworthy sites; the case for non-trustworthy sites is easier. In what follows, we write
⊢s P : A to mean that ⊢ P : A′ , where A′ is the DFA obtained from A by setting s as
starting state.
(r- act) In this case, N = l[[ M |i a.P | Q ]]. By definition of rule (wf-g.siteA ), it holds
that Q = Q1 | . . . |Qk (for Qi threads), ∃s. ⊢s a.P : Mp and ∀i.∃si . ⊢si Qi : Mp .
By definition, we have that lang(CRE(a.P )) ⊆ Acps (Mp ); by Lemma A.4, we have
that lang(CRE(P )) ⊆ Acpδ(s,a) (Mp ). This sufficies to infer the well-formedness of
N ′ = l[[ M |i P | Q ]].
22
D. GORLA, M. HENNESSY, AND V. SASSONE
(r- mig) In this case, N = k[[ M k |i go A l.P | Q ]] k l[[ M l |i R ]] and M l ⊢kA P . We further
identify two sub-cases:
• M l (k) = good. In this case, because of coherence, we know that ⊢ P : A. Moreover,
by definition of M l ⊢kA P , it holds that A enforces Mpl . By Lemma A.3, we have
that ⊢ P : Mpl . This sufficies to conclude.
• M l (k) 6= good. This case is simpler because M l ⊢kA P is defined to be ⊢ P : Mpl .
Proof of Theorem 3.9 [Safety]: The proof is quite easy. Indeed, by rule (wf-g.siteA ),
it holds that ∃si : ⊢si Pi : Mpl . By definition, this implies that every σ ∈ lang(CRE(Pi )) is
in Acpsi (Mpl ). Since the automaton Mpl is minimal, si is a reachable state from the starting
state s0 , say, with a (finite) string σ ′′ . Then, by Definition 3.6 and by Lemma A.4.1, it
holds that σ ′′ σ ∈ Acp(Mpl ). This proves the thesis.
A.4. Proofs of Section 4.
We show here the main things to modify to carry out the proofs given in Appendix A.2.
Obviously, judgment ⊢ P : T must be now replaced everywhere with P : T and, similarly,
⊢ N : ok becomes Θ ⊢ N : ok.
Proof of Theorem 4.4 [Subject Reduction]: The proof is by induction over the inference of N → N ′ . Inductive steps are simple; we only give the base steps.
(r- act) By hypothesis, Θ ⊢ l[[ M |i a.P | Q ]] : ok. If l is not trustworthy, the case is trivial.
Otherwise, we know by hypothesis that (pol(a.P | Q) ⊔ Mp ) enforces Θ(l). Now, by
definition of judgment
(and hence of function pol(·)) we have that pol(a.P | Q) =
pol(P | Q) ∪ {a}. Hence, (pol(P | Q) ⊔ Mp ) enforces Θ(l), as required.
(r- mig) By hypothesis, Θ ⊢ l[[ M l |i R ]] : ok; we only consider the case in which l is
trustworthy. Thus, we know that (pol(R) ⊔ Mpl ) enforces Θ(l). By the premise of rule
cl . We have two possible situations:
(r-mig), it holds that M l ⊢kT P ≻ M
cl is defined to be T enforces Mpl ∧ Mpl =
Mtl (k) = good: In this case, M l ⊢kT P ≻ M
b l ⊔ T ∧ Ml = M
cl is sufficient to preserve coherence.
cl . The fact that M l = M
M
t
t
t
t
p
Moreover, by rule (ti-mig), we know that P : T′ and T′ enforces T. By rule
(ti-par), pol(P |R) = pol(R) ⊔ T′ and (pol(R) ⊔ T′ ) enforces (pol(R) ⊔ T). Then,
b l = (pol(R) ⊔ T′ ⊔ M
b l ) enforces (pol(R) ⊔ T ⊔ M
b l ) = (pol(R) ⊔
pol(P |R) ⊔ M
p
p
p
Mpl ) enforces Θ(l), as required.
Mtl (k) 6= good: In this case, the previous proof should be rephrased by using pol(P )
instead of the digest T.
Proof of Theorem 4.5 [Safety]: We prove a slightly more general result, that easily
implies the claim desired.
Let N be a well-formed system w.r.t. Θ. If l[[M |iP ]] is a trustworthy site of N
σ
such that (pol(P ) ⊔ Mpl ) = T, then P → P ′ implies that act(σ) enforces T.
The proof is by induction over |σ|. The base case is when σ = ǫ and it is trivial. In the
α
σ′
inductive case, we consider σ = ασ ′ and P → P ′′ → P ′ . To start, it is easy to prove that
pol(P ′′ ) ⊔ {α} = pol(P )
(A.1)
SECURITY POLICIES AS MEMBRANES IN SYSTEMS FOR GLOBAL COMPUTING
23
By transitivity of multiset inclusion and by the claim (A.1) above, (pol(P ′′ ) ⊔ Mpl ) = T′ ,
where T = T′ ⊔ {α}. Thus, node l[[ M l |i P ′′ ]] is well-formed (and trustworthy). By induction
we therefore have that act(σ ′ ) enforces T′ . Hence, act(σ) = act(σ ′ ) ⊔ {α} enforces T′ ⊔
{α} = T, as required.
To conclude, the original claim of Theorem 4.5 is obtained from the result just proved
by noticing that, because of well-formedness, T enforces Θ(l).
This work is licensed under the Creative Commons Attribution-NoDerivs License. To view
a copy of this license, visit http://creativecommons.org/licenses/by-nd/2.0/ or send a
letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.
| 6cs.PL
|
1
Real-time Error Control for Surgical Simulation
arXiv:1610.02570v3 [cs.NA] 14 Feb 2017
Huu Phuoc Bui∗† , Satyendra Tomar† , Hadrien Courtecuisse∗ , Stéphane Cotin‡ and Stéphane Bordas†§
∗ University of Strasbourg, CNRS, ICube, F-67000 Strasbourg Fance
† University of Luxembourg, Research Unit of Engineering Science, L-1359 Luxembourg, Luxembourg
‡ Inria Nancy Grand Est, 54603 Villers-les-Nancy, France
§ Cardiff University, School of Engineering, Queens Buildings, The Parade, Cardiff CF24 3AA, Wales, UK
Abstract—Objective: To present the first real-time a posteriori error-driven adaptive finite element approach for realtime simulation and to demonstrate the method on a needle
insertion problem. Methods: We use corotational elasticity and a
frictional needle/tissue interaction model. The problem is solved
using finite elements within SOFA1 . The refinement strategy
relies upon a hexahedron-based finite element method, combined
with a posteriori error estimation driven local h-refinement, for
simulating soft tissue deformation. Results: We control the local
and global error level in the mechanical fields (e.g. displacement
or stresses) during the simulation. We show the convergence
of the algorithm on academic examples, and demonstrate its
practical usability on a percutaneous procedure involving needle
insertion in a liver. For the latter case, we compare the force
displacement curves obtained from the proposed adaptive algorithm with that obtained from a uniform refinement approach.
Conclusions: Error control guarantees that a tolerable error level
is not exceeded during the simulations. Local mesh refinement
accelerates simulations. Significance: Our work provides a first
step to discriminate between discretization error and modeling
error by providing a robust quantification of discretization error
during simulations.
Index Terms—Finite element method, real-time error estimate,
adaptive refinement, constraint-based interaction.
I. I NTRODUCTION
A. Motivation
R
eal-time simulations are becoming increasingly common
for various applications, from geometric design [1], [2]
to medical simulation [3]. Our focus is on real-time simulation
of the interaction of a surgeon or interventional radiologist
with deformable organs. Such simulations are useful to both,
help surgeons train, rehearse complex operations or/and to
guide them during the intervention. In time, reliable simulations could also be central to robotic surgery.
A number of factors are concurrently involved in defining
the “accuracy of surgical simulators: mainly the modeling
error and the discretization error. Most work in the area has
been looking at the above sources of error as a compounded,
lumped, overall error. Little or no work has been done to
discriminate between modeling error (e.g. needle-tissue interaction, choice of constitutive models) and discretization
error (use of approximation methods like FEM). However,
it is impossible to validate the complete surgical simulation
approach and, more importantly, to understand the sources of
error without evaluating both the discretization error and the
modeling error.
1 https://www.sofa-framework.org/
The first ingredient in any mechanical simulation is the
ability to simulate the deformation of the solid of interest. This
deformable solid mechanics problem is usually solved by finite
element method (FEM) [4] or meshless/meshfree methods
[5], which are used to discretize the equilibrium equations.
It is usually uneconomical or prohibitively expensive to use
a fixed mesh for such simulations. Indeed, coarse meshes
are sufficient to reproduce “smooth” behavior, whereas “nonsmooth” behavior such as discontinuities engendered by cuts
or material interfaces, singularities, boundary layers or stress
concentrations require a finer mesh. Adequate approaches are
thus needed to refine the discretization in these areas.
Yet, existing numerical methods used in surgical simulation
use either a fixed discretization (finite element mesh, meshfree
point cloud, reduced order method), or adapt the mesh using
heuristics [6], [7]. To our knowledge, no approach is currently
able to adapt the finite element mesh based on rational a
posteriori error estimates [8].
Our objective is thus to devise a robust and fast approach
to local remeshing for surgical simulations. To ensure that the
approach can be used in clinical practice, the method should
be robust enough to deal, as realistically as possible, with the
interaction of surgical tools with the organ, and fast enough
for real-time simulations. The approach should also lead to
an improved convergence so that an “economical” mesh is
obtained at each time step. The final goal is to achieve optimal
convergence and the most economical mesh, which will be
studied in our future work.
In this paper, we propose and benchmark a local mesh
refinement and coarsening approach which is based on the
estimation of the discretization error incurred by FEM in the
solution of a corotational model representing soft tissues. The
general ideas presented here can be used directly in geometric
design based on deformable models. Our proposed approach
has similitudes with the octree approaches of [9].
B. Error in numerical simulations
It is useful to first review the various sources of error
in numerical simulations. The first error source arises when
a mathematical model is formulated for a given physical
problem: this is known as the modeling error. The second
error arises upon discretization of this mathematical model, for
example using FEM or meshfree methods. Finally, numerical
error is incurred because of the finite precision of computers
and round off errors. In this paper, we focus on the second
2
source of error, namely discretization error. We therefore
assume that the model we use is descriptive of reality, i.e.
we are solving the right problem, and we ask ourselves the
question whether “we are solving the problem right”, in other
words, correctly.
The main difficulty in answering this question comes from
the fact that an exact solution, to which the numerical solution
could be compared, is generally not available. Different approaches exist to address this problem, which are reviewed in
the literature, see e.g., [4], [8], [10]. Simple methods available
in practice to indicate the error distribution can be categorized
into two classes: recovery-based and residual-based.
The first class of indicators assumes that the exact solution
(of stresses) is smooth enough (at least locally). They rely on
the construction of an “improved” numerical solution from the
raw numerical solution, to which the raw numerical solution
can be compared. Where these two solutions are significantly
different (above certain threshold), the error level is high and
the mesh should be refined, and where these two solutions are
close together, the mesh can be kept unchanged or coarsened.
This idea was proposed by Zienkiewicz and Zhu in [11], and
its asymptotic convergence to the exact error is studied in [12],
[13].
The second class of indicators relies on the computation of
the residual of the governing equations within each computational cell, typically each finite element. These “residualbased” error indicators lead to mesh refinement where the
solution leads to large residuals, and keep the mesh constant
or coarsen it where the element residuals are relatively small,
compared to a given tolerance. These estimates were first
proposed by Babuska and Rheinboldt in [14].
Based on these local error estimators, mesh refinement
methodologies can be devised to derive mesh adaptation, see
e.g. [10] for a recent comprehensive presentation. This requires
two key ingredients: a marking strategy that decides which
elements should be refined, and a refinement rule that defines
how the elements are subdivided. For element marking, we
use the maximum strategy, see Section III for details. Other
strategies, such as bulk/equilibration strategy or percentage
strategy, see e.g. [10], can also be used.
C. Simulation of percutaneous operations
Needle-based percutaneous procedures are an important part
of modern clinical interventions such as biopsy, brachytherapy, cryotherapy or regional anesthesia. The success of these
procedures depends on good training and careful planning
to optimize the path to the target, while avoiding critical
structures [15]. In some instances the procedure can also
be assisted by robotic devices. Unfortunately, natural tissue
motion (due to breathing, for instance), and deformation (due
to needle insertion) generally lead to incorrect or inefficient
planning [15]. To address these issues, one must rely on an
accurate simulation of needle insertion. For most problems,
computational speed is also very important, since the simulation is at the core of an optimization algorithm (for the needle
path) or a robotic control loop.
The main works on needle insertion (see the survey by
[16]) propose to model the interaction between the needle
and soft tissues using FEM. In the various methods proposed
in the literature, three main research directions have been
followed: soft tissue model, flexible needle model and needletissue interactions. The needle model is usually not an issue,
both in terms of modeling choice and computational cost.
For instance, in [17], authors report computation times of a
few milliseconds for a FEM needle model composed of 50
serially-linked Timoshenko beam elements. Soft tissue models
are usually based on FEM, and rely on linear or non-linear
constitutive laws [16].
A large body of work covers the modeling and simulation
of soft tissue deformation, even under real-time computation
constraints. But overall, the interaction model between the
needle and tissue remains a major challenge. It combines different physical phenomena, such as puncturing, cutting, sliding
with friction and Poynting’s effect. To capture the essential
characteristics of these interactions, existing methods usually
rely on experimental force data and remeshing techniques
in order to align nodes of the FEM mesh with the needle
path. In [17], a constraint-based approach, avoiding remeshing,
was used to simulate needle-tissue interactions. However, the
simulations did not account for realistic anatomical details. In
addition, Misra et al. [18] showed that needle steering, which
occurs when using asymmetric needle tips, can be modeled
using microscopic observations of needle-tissue interactions.
Unfortunately, if no assumption can be made about the
region of the domain where the needle will be inserted,
simulations involving very detailed meshes become very slow,
which is a real issue in the context presented above. Errorcontrolled real-time simulation of needle insertion is thus an
unsolved problem whose solution requires tackling a number
of difficulties:
•
•
•
•
•
developing needle-tissue models. A review of cutting
simulation is provided in [19]
using these models within discrete approaches like FEM,
mesh-free methods, or others
accelerating the simulation (advanced hardware, model
order reduction)
validating the needle-tissue interaction model combined
with discrete solution (are we solving the right problem?)
verifying the discrete solution, i.e. controlling the discretization error associated with the discrete model (are
we solving the problem right?)
In this paper, we propose to focus on the last point above,
with the aim to model needle-tissue interactions using an
adaptive meshing strategy driven by simple a posteriori error
estimation techniques. Similarly to [17], we do not require
the mesh to conform to the needle path. Mesh subdivision
is only introduced as a means to improve the accuracy of
the needle-tissue interactions. Our mesh refinement method
is guided by the stress/energy error estimate resulting from
the needle-tissue interaction and imposed boundary conditions:
elements of the mesh are subdivided when a numerical error
threshold is reached. The subdivision process is completely
reversible, i.e. refined elements are set back to their initial
topology when refinement is no longer needed. Our refinement
approach does not rely on a usual octree structure (see also
3
[20]), thus allowing a variety of subdivision schemes that are
well suited for needle insertions, as detailed in Section III.
Using this approach, interactive computation times can be
achieved while detailed tissue motion near the needle shaft
or tip can be computed. This opens new possibilities for fast
simulations of flexible needle insertion in soft tissues. We
illustrate the convergence study of the adaptive refinement
scheme and some of the possible scenarios in Section V.
II. M ODEL AND DISCRETIZATION
In this section, we describe the model and the discretization
approach, which are used for needle and soft tissue interaction.
A. Problem statement
During the needle insertion, three types of constraints are
defined, see Fig. 1. Coulomb’s friction law is used to describe
t (see Fig. 1), the needle tip can cut and go through the tissue
or not
λn < µλt +λn0 (stick);
λn ≥ µλt +λn0 (cut and slip). (4)
Finally, needle shaft constraints are defined along the needle
shaft so that the needle shaft is enforced to follow the insertion
trajectory created by the advancing needle tip. Again, the
Coulomb’s friction law is applied to these constraints to
represent the stick and sliding contact between the tissue and
the needle shaft
λn < µλt (stick);
λn = µλt (sliding).
B. Strong form
We model both, the tissue and the needle, as dynamic
deformable objects. Thus, they can be regarded as dynamic
elastic solids, and the governing equations of the model are
formulated as
div σ + b + λ = ρü
in Ω
1
grad u + (grad u)T
=
2
σ = f (, ν)
σ · n = t̄ on Γt ;
u = ū on Γu ,
Fig. 1: Three types of constraints between the needle and
soft tissue: surface puncture (in red), needle tip constraint
(in green) and needle shaft constraints (in blue). A local
coordinate system n-t is defined at each constraint point.
frictional contacts within these three types of constraints. First,
a puncture constraint is defined between the needle tip and
the tissue surface. This constraint satisfies the Kuhn-Tucker
condition in the direction n (normal to the tissue surface)
δn ≥ 0,
λn ≥ 0,
δn · λn = 0,
(2)
the needle can penetrate into the tissue. In the tangent direction
t, Coulomb’s friction law is considered in order to take into
account the stick/slip between the needle tip and tissue surface
λt < µλn
(stick);
λt = µλn
(slip),
(6a)
(6b)
(6c)
(6d)
(6e)
where σ is the Cauchy stress tensor, b is the body force
vector, ρ is the mass density, is the strain tensor, ν =
(ν1 , ν2 , . . . , νn ) is the internal variables, ( ˙ ) denotes the partial
derivative with respect to time, n denotes the outward unit
normal vector on Γt , and λ denotes the contact force between
the needle and the tissue. The object domain and boundary
conditions are shown in Fig. 2a.
(1)
where δn denotes the distance between the needle tip and the
tissue surface in the direction n, and λn denotes the contact
force in that direction. Let λn0 represent the puncture strength
of the tissue. The Kuhn-Tucker condition expresses that the
contact force only exists when the needle tip is in contact
with the tissue surface. When the contact force is higher than
a threshold (puncture strength of the tissue)
λn > λn0 ,
(5)
(3)
where µ denotes the friction parameter.
Second, a needle tip constraint is defined at the tip of the
needle as soon as it penetrates into the tissue. Depending
on the relationship between the contact forces in the normal
direction n (along the needle shaft) and in the tangent direction
Fig. 2: A body Ω subjected to a traction t̄ on its boundary
part Γt , a body force b, and an imposed displacement ū
on boundary part Γu (a); Simplified illustration of FEM
discretization (b).
C. Spatial and temporal discretization
1) Space discretization: The basic idea of FEM is to discretize the domain Ω into finite elements Ωe , e = 1, 2, . . . , Ne ,
by Nn nodes, as depicted in Figure 2b. Based on the discretization concept, see e.g., [21], [22], we obtain the discrete
problem of the element e
Me üe + Ce u̇e + fe (σ) = feext ,
(7)
4
where Me is the element mass matrix, Ke is the element
stiffness matrix, Ce is the damping matrix, feext is the external
force applied to the element e, while the internal force fe (σ)
reads
Z
Z
fe (σ) =
BTe σ dΩ =
BTe EBe ue dΩ
(8)
Ωe
Ωe
= Ke · ue = Ke · (xe − x0e )
where dv = vt+τ − vt .
After solving (12) for dv, the position and velocity are
updated for needle and tissue as
where Be is the strain-displacement matrix, E is the fourthorder stiffness tensor, xe and x0e denote the current and initial
position of the element e, respectively. However, using Eq. (8)
results in inaccuracy for large rotations problems, which is observed by artificially inflated deformation of the elements. To
overcome this, Felippa et al. [23] decomposed the deformation
gradient of the element into the rigid and deformation parts,
and the element nodal internal force becomes
To take into account the needle-tissue interaction when they
are in contact, a constrained dynamic system is solved for the
needle and the tissue. Eq. (12) then becomes
fe = Re Ke (RTe xe − x0e ),
(9)
where R stands for the element rotation matrix of the element
local frame with respect to its initial orientation, being updated
at each time step. Using this corotational formulation results
in no visual artifacts.
The global mass, stiffness and damping matrices of the
system can then be assembled from the element ones, and
Eq. (7) can be rewritten to a global system equation as
Ma = f (x, v),
(10)
where a = ü, x, v = u̇ are the acceleration, position and
velocity vectors, respectively, and f (x, v) = f ext − Ku − Cv
represents the net force (the difference of the external and
internal forces) applied to the object.
In our simulations, a diagonally lumped mass matrix is
employed, and the stiffness matrix K is computed based on the
co-rotational FE formulation described above, which allows
large rotations for both, needle as well as tissue. For higher
accuracy of the computed strain field, the soft tissue domain is
discretized using hexahedral elements. To avoid the complex
issue of generating an exact hexahedral mesh of the domain,
we use a mesh that does not conform to the boundary of the
domain, as in Immersed Boundary Method [24]. The needle,
on the other hand, is modeled using serially-linked beam
elements, as in [17]. In this case, each node of the needle has
6 degrees of freedom (3 translations and 3 rotations), while
the tissue model only uses 3 translational degrees of freedom
per node.
Since the FEM formulation is based on the discretization of
the physical domain, it naturally introduces the discretization
error in the result. To control this error source, in Section III
we present an adaptive refinement scheme.
2) Time discretization: For temporal discretization, we use
an implicit backward Euler scheme [25], which is described
as follows
u̇t+τ = u̇t + τ üt+τ ;
ut+τ = ut + τ u̇t+τ ,
(11)
where τ denotes the time step. Inserting Eq. (11) into Eq. (10)
gives the final discrete system
(M − τ C − τ 2 K) dv = τ f (xt , vt ) + τ 2 Kvt
{z
}
|
{z
}
|
A
b
(12)
vt+τ = dv + vt ;
xt+τ = xt + τ vt+τ .
(13)
D. Constraint enforcement for needle-tissue interaction
Adv = b + Jλ,
(14)
where λ denotes Lagrange multipliers representing the interaction forces between the needle and the tissue, and J
provides the direction of the constraints. Different types of
constraints between needle and tissue are used, and solving
their interaction is detailed in Section IV.
Remark Combining more advanced and clinically relevant
needle-tissue interaction is straightforward in our approach.
III. E RROR ESTIMATE AND ADAPTIVE REFINEMENT
To achieve faster and more accurate FEM simulations, different adaptive techniques have been proposed in the literature.
Octree-based approaches [26] are the most common, but the
refinement procedure is limited to cubic elements which are
recursively subdivided into eight finer elements. To overcome
this limitation, more generic remeshing techniques [27]–[29]
have been proposed. However, they are complex to implement,
and may lead to ill-shaped elements. Our template-based
refinement algorithm is designed to be independent of the
type of element (tetrahedra, hexahedra, others), and produces
a high quality mesh (thanks to the well-shaped elements of
the predefined template).
Starting with an initial, relatively coarse mesh (as required
to achieve real-time simulation), a criterion based on a posteriori error estimate is evaluated to drive the local refinement.
The elements where the stress increases, i.e. dσ/dt > 0, are
considered for refinement, and the elements where the stress
decreases, i.e. dσ/dt < 0, are taken to a lower refinement
(coarsening) level. We define the approximate error of an
element Ωe as
sZ
(h − s )T (σ h − σ s )dΩ,
ηe =
(15)
Ωe
which is the energy norm of the distance between the FEM
solution (denoted by h) and an improved solution (denoted by
s) obtained by the Zienkiewicz-Zhu smoothing procedure [11].
Among the elements with increasing stress, only those elements, where the error exceeds the predefined threshold,
are subdivided (refined). Similarly, among the elements with
decreasing stress, only those elements, where the error is
smaller than the above threshold, are coarsened. Notice that
we are not limited by the regularity of the mesh and can start
from any (reasonable) heterogeneous mesh as a starting point
prior to refinement.
5
A. Zienkiewicz-Zhu error estimate
Using the superconvergent patch recovery (SPR) procedure [11], the smoothed stress field σ s is recovered from
the stresses computed at the element center. The idea of this
technique is based on the fact that the stress and strain at the
superconvergent points (at element center in the case of linear
hexahedral elements) are accurate with higher order than at
the element nodes, and these values are employed to recover
the nodal stress and strain within the least squares sense.
A 2D representation of a patch of 8 hexahedral elements is
shown in Fig. 3. For each component σjh of the FEM solution
σ h , the nodal recovered stresses are computed by defining a
polynomial interpolation within the element patch as
certain threshold, are refined. Let ηM = maxe ηe , where ηe is
defined in Eq. (15). We mark an element for refinement if
ηe ≥ θηM with 0 < θ < 1.
(20)
Other marking strategies, such as bulk/equilibration strategy,
or percentage strategy, see e.g. [10], can also be used. However, the maximum strategy described above is the cheapest
among all, and hence, it is preferred for our use. In the
maximum strategy, a large value of θ leads to small number
of elements marked for refinement, and small value of θ leads
to large number of elements marked for refinement. In our
studies presented in Section V, we set θ = 0.3.
σ̃js = Paj = [1 x y z xy yz zx xyz][a1 a2 a3 a4 a5 a6 a7 a8 ]Tj . (16)
Let Pk ≡ P(xk , yk , zk ). To determine the unknowns aj we
minimize, for 8 sampling points k of an element patch,
Π=
8
X
h
σj (xk , yk , zk ) − Pk ajk .
(17)
k=1
This minimization results in finding aj by
aj = A−1 b
(18)
where
A=
8
X
PTk Pk and b =
k=1
8
X
PTk σjh (xk , yk , zk )
(19)
k=1
Once aj is available, the nodal recovered stress values are
obtained by simply employing Eq. (16) with P evaluated at
the corresponding node. 2
C. Template-based adaptive h-refinement
Once the refinement criterion is satisfied within an element,
the element is replaced by several elements according to a
predefined template. The template is simply a set of nodes
and an associated topology, defined using an isoparametric
formulation. The template nodes are added by using their
natural coordinates. The position xj , in Cartesian coordinates,
of the new node j is defined as xj = xi ξij , where the Einstein
summation convention is applied on the nodes i of the removed
element (i = 1, 2, . . . 8 for hexahedral elements). The shape
function ξij is computed from the barycentric coordinates of
template node j with respect to the node i. The procedure is
summarized below:
1) Remove the element to be refined
2) Add template nodes and then template
elements using the element shape functions
3) Update the topology of the global mesh
4) Compute stiffness matrix of new elements
5) If needed, update the mass and damping
matrices
It is worth mentioning that if, after refinement, a new
element fulfills the refinement criterion, it can be refined again,
using the same predefined template. This results in a multiresolution mesh (see Fig. 4). Conversely, if the coarsening
criterion is satisfied in already refined elements, the coarsening procedure is applied by simply removing respective fine
elements, and updating the associated matrices.
Superconvergent sampling point
(0,1,1)
(0,1,0)
Patch assembly point
Nodal value determined from the patch
Fig. 3: The smoothed gradient is obtained from an element
patch.
η
(0,0,0)
ξ
ζ
(0,0,1)
(1,1,0)
(1,1,1)
(1,0.5,0.67)
(1,0,0)
(1,0,1)
Natural coordinates
B. Element marking strategy
After obtaining error distribution across all the elements,
we employ the maximum strategy to select those elements
which must be refined for the next level mesh. In this strategy,
only those elements, where error (see Eq. (15)) is higher than
2 Similar to the displacements, the recovered stresses σ s can also be
obtained using element shape functions σ s = Nσ̃ s .
y
x
Physical coordinates
z
Fig. 4: Adaptive subdivision process: each element to be
subdivided is topologically transformed in its reference shape,
using a template expressed in natural coordinates. Cartesian
coordinates in the mesh are computed using the element shape
functions. The process can be applied recursively, and is
completely reversible.
6
5
D. T-junction handling
Since elements are refined by using templates, regardless
of their neighboring elements, some T-junctions (incompatible
nodes or hanging nodes) are generated. To avoid discontinuities at the T-junctions during the simulation, these nodes
need to be handled in a special way, in which T-junction
nodes are considered as slave of other independent (master)
degrees of freedom (DOFs). One of the possible options is
to use Lagrange multipliers, but this approach increases the
total number of DOFs (as to solve the unknown Lagrange
multipliers in addition), and usually leads to ill-conditioned
systems. In our approach, we follow the method proposed
by [30], which considers only the reduced system (without Tjunctions) when solving for the new positions. Let T denote
the transformation matrix from the reduced system to the full
one (with T-junctions). The matrix T contains the barycentric
coordinates of the T-junctions (slaves) with respect to their
masters, and contains 1 for all other normal DOFs. The
reduced system matrix Ar is then computed from the full
system matrix Af as
Ar = TT Af T.
(21)
The nodal forces in the reduced space is computed from the
full space as fr = TT ff . The reduced system Ar dvr = fr is
solved to find dvr , the difference of velocity between current
and previous time step. Once dvr is available, the difference of
velocity in the full space are easily deduced as dvf = Tdvr .
The latter is employed to update the new position and velocity
of the object as in Eq. (13).
A heuristic example is shown in Fig. 5 to explicitly illustrate
the method for T-junction handling, especially how the full
and reduced systems are defined, resulting in the computation
of the transformation matrix between them. After subdivision,
node 7 is a T-junction in the full system (see Fig. 5a). Within
this heuristic illustration, considering that each node has only
one DOF and the static condition is applied, the displacement
of the node 7 is expressed from those of node 2 and 3 as
3
0
7
4
5
2
3
6
1
(a) Full system
4
7
2
0
6
1
(b) Reduced system
Fig. 5: Illustration of T-junction handling method on a
schematic example.
Assuming we are using a non-linear constitutive law (e.g.
hyperelastic) or a co-rotational FE formulation, the system
matrix needs to be updated at each time step. Consequently, the
local updating of the topology has a very limited impact on the
computation. The main overhead comes from the T-junction
handling, but it is somewhat compensated by the reduced
dimensions of the linear system to be solved (although the
reduced matrix is denser than the initial one). Our experience
has shown that if we consider that about 10% of the mesh
elements are subdivided, approximately 20% of the nodes in
the resulting mesh are T-junctions. Obviously, the number of
T-junctions depends strongly on the template mesh used by
the refinement, and also on the fact that the elements are
subdivided locally within one or several regions.
IV. N EEDLE - TISSUE INTERACTION ALGORITHM
(23)
To model the interaction of needle and tissue, we consider two different constraints: penetration (puncture) and
sliding [17]. To avoid remeshing when modeling needle-tissue
interaction, we use the same constraints based approached
as described in [17]. However, unlike [17], we solve the
constrained system differently. Before entering the tissue, the
needle-tissue constraint is only created when the needle tip is
in contact with the tissue surface. This penetration constraint
is represented mathematically as P(xn , xt ) ≥ 0, where xn ,
and xt stand for the position of the needle, and tissue,
respectively. Immediately after entering the tissue, sliding
constraint between the needle and tissue is created along
the needle trajectory as S(xn , xt ) = 0. When friction is
considered, both P and S are nonlinear. The constraints P
and S between the tissue (denoted by subscript 1) and needle
(denoted by subscript 2) are expressed through the global
coordinate system using Lagrange multipliers λ as follows
A1 0 JT1
dv1
b1
T
(24)
0 A2 J2 dv2 = b2 ,
λ
0
J1 J2
0
The transformation matrix T for the general 3D case where
each node has three DOFs is built straightforwardly from this
example.
where A1 and A2 are the system matrices for the soft tissue
and needle, respectively; J1 and J2 account for contraint directions between the needle and tissue. In the local coordinate
system attached to the needle, constraints between needle and
tissue are only expressed in two directions orthogonal to the
needle shaft, resulting in a needle-tissue sliding constraint.
The expressions of these constraints in the global coordinate
system J1 and J2 are then built by transforming the local
u7 = 0.5u2 + 0.5u3 .
(22)
Fig. 5b shows the reduced system where the T-junction node
7 is not considered. The displacement fields between these
full and reduced systems are expressed (by taking into account Eq. (22)) through the transformation matrix T as
1
0
u0
0
u1
0
.. =
0
.
0
u7
| {z }
0
0
0
0
0
1
0
0
0
0
1
0
0
0
0
1
0
0
0
0
1
0
0
0
0
0
0
0
0
0
uf
|
0
0.5 0.5 0
{z
T
0 0
0 0
u
0
0 0
u
1
0 0
. .
0 0
..
1 0 u6
| {z }
0 1
ur
0
0
}
7
constraint expressions from the local coordinate system to
the global one. However, formulating the problem as (24)
leads to a non positive definite global matrix, which makes
the system challenging to solve. An alternative approach, as
proposed in [15], [17], is to solve the interaction problem
in three steps: predictive motion (no interaction constraints),
constraint solving, and corrective motion. However, this alternative requires the computation of matrix inverse A−1
and
1
A−1
2 . This approach is time consuming, especially for large
systems. Unlike this method, we solve the constrained problem
iteratively by using the augmented Lagrangian method [31]
λ
k+1
k
= λ − WJdv
k+1
,
(25a)
L/2
L/2
(25b)
where W is the penalty weight matrix with finite values.
The advantage of this method is that the exact solution of
the needle-tissue interaction can be obtained, as compared to
the penalty method (see e.g. [32]), and no additional DOFs
are needed, as compared to the classical Lagrange multiplier
method [33]. A critical feature of this approach is that the
system matrix in (25a) is positive definite, therefore iterative
solvers, such as the conjugate gradient, can be used efficiently.
It is worth stressing that using the augmented Lagrangian
method for solving needle-tissue interaction, combined with
the T-junction handling in the tissue, is straightforward. Indeed, as mentioned above, it is sufficient to solve (25a) in the
reduced space, and dvk+1 is easily computed from the reduced
solution.
V. R ESULTS AND DISCUSSIONS
To demonstrate the efficiency of our method, we present
several numerical studies. We first present the convergence of
the stress error on a typical L-shaped domain. The motivation
for this test is because of its localized nature, i.e. stress is
concentrated at the corner of the domain, which mimics the
localized scenario of needle insertion. To demonstrate the
computational advantage of adaptive refinement over uniform
refinement, we also present the computational time for this
problem. Then, to point out the benefits of a local mesh
refinement in needle insertion simulation, we study a needle
insertion scenario with friction to show the impact of local
refinement on the displacement field around the needle shaft
and also on the needle-tissue interaction force profile. Finally,
a more complicated scenario is simulated i.e. insertion of a
needle into a liver which is undergoing breathing motion.
In our simulations, the needle and soft tissue follow a linear elastic constitutive law, associated to a co-rotational FE
formulation.
A. Convergence study
To show the advantage of error-controlled adaptive refinement scheme, as compared to the uniform mesh refinement, a
convergence study is performed on a 3D L-shaped domain. As
shown in Fig. 6, the L-shaped domain is clamped at the right
boundary, and simply supported in the vertical direction at the
top boundary. The dimension is set to L = 4 and the thickness
of the domain is L/2 = 2. Young’s modulus, and Poisson’s
L/2
L/2
q
Fig. 6: Boundary conditions of the L-shaped domain test.
We define the relative error η as
qP
Ne R
h
s T
h
s
e=1 Ωe ( − ) (σ − σ )dΩ
qP
η=
.
Ne R
h )T σ h dΩ
(
e=1 Ωe
(26)
In Fig. 7, we show the plots of the relative error versus the
number of DOFs for uniform and adaptive refinement. We see
that for the uniform refinement, the relative error η converges
with a slope of 0.21, which corresponds to the theoretical slope
of 2/9 for singular problems in 3D. By comparison with the
uniform refinement, the adaptive refinement converges with a
higher slope (0.31). Clearly, to achieve certain expected error
of the simulation, the adaptive refinement needs fewer DOFs
than the uniform refinement.
1
η
(A + JT WJ)dvk+1 = b − JT λk
ratio of the tested material are 1 × 103 , and 0.3, respectively.
The domain is subjected to a uniformly distributed traction
force on the left surface boundary.
Starting with the mesh having 8×8×4 hexahedral elements
(excluding the 4 × 4 × 4 corner elements), two types of
refinements are performed. The first one, called uniform refinement, consists of subsequently subdividing every hexahedral
element in to 8 smaller elements. In the second approach,
called adaptive refinement, only those elements which satisfy
the marking condition (20) are refined (subdivided in to 8
smaller elements).
Uniform
Adaptive
0.1
0.21
0.31
0.01
1000
1
10000
1
100000
1 × 106
DOFs
Fig. 7: Convergence of the relative error, comparison between
uniform and adaptive refinements.
To demonstrate the performance of adaptive (local) refinement in terms of computational time, as compared to
8
uniform (full) refinement of the mesh, with the same expected
relative error η = 8%, we again studied the L-shaped domain
problem. The result is reported in Table I. The local refinement
decreases the number of DOFs by a factor 5.9 (7473 vs.
44064) associated with a computational speed-up of 16×
(736.41 ms vs. 12140.8 ms).
DOFs
Full refinement
Local refinement
44064
7473
Time
TC
MS
x
12140.8
319.24
417.17
Total
time
12140.8
736.41
TABLE I: Computational time (in 10−3 s). TC: Topological
Changes, MS: System Matrix Solve.
In view of above observations, it is a strong argument to
support the employment of adaptive refinement scheme while
limiting the discretization error in real-time simulations.
B. Impact of local mesh refinement on displacement field
We now present the results of a simulation of needle
insertion into a homogeneous 3D tissue model. For this study,
we consider the Young’s modulus of 108 for the needle, and
103 for the tissue, whereas the Poisson’s ratio is taken as 0.4
for both. The friction coefficient between the needle and the
tissue is set to 0.9. The displacement field due to frictional
interactions with the needle, viewed from the xy plane of the
tissue, is shown in Fig. 8.
It is shown (by the nonlinear variation of the displacement
field in the vicinity of the needle) that when the mesh is
adaptively refined near the needle shaft, the needle-tissue
interaction is captured as good as in the case of full refinement
(see Fig. 8d). Indeed, closer the position is to the needle shaft,
higher the obtained displacement field. Conversely, when a
coarse element is used, and is not refined during the simulation, the above behavior is not reproduced within the element
(Fig. 8a). It is important to point out that the refinement using
anisotropic template, as in Fig. 8b, is very relevant since
it generates fewer DOFs than using the isotropic template
(Fig. 8c), while still catching the nonlinear displacement field.
C. Impact of local mesh refinement on needle-tissue interaction
In order to gain insight into the nonlinear behavior of
the needle-tissue interaction around the needle shaft, and to
exhibit the effect of the adaptive refinement on a trade-off
between computational time and precision, a needle insertion
simulation into a phantom tissue test is carried out, see Fig. 9.
For this study, we consider the Young’s modulus of 50 MPa
for the needle, and 10 MPa for the tissue, whereas the
Poisson’s ratio is taken as 0.4 for the tissue, and 0.3 for the
needle, respectively. Again, a linear elastic model based on
corotational formulation is employed for the needle as well
as the tissue. The dimension of the tissue is 4 × 2 × 2 cm.
The needle length and radius are of 3.2 cm and 0.1 cm,
respectively.
Three meshing schemes are employed: a coarse mesh with
resolution 10 × 5 × 5 nodes, a fine mesh with resolution 20 ×
10 × 10 nodes and an adaptive mesh (starting with the coarse
mesh 10×5×5 nodes and adaptively refining the mesh during
the simulation). Within the adaptive meshing scheme, the mesh
refinement is again piloted by the error estimate described
in Section III.
To investigate the sensitivity of the needle-tissue interaction
parameters (frictional coefficient and puncture strength) on the
resulting mesh adaptation, and thus on computational output,
two scenarios are studied. The first concerns varying the
puncture strength σn0 parameter (0 N, 10 N, and 20 N), while
keeping the same frictional coefficient µ = 0.5 between the
tissue and the needle shaft. The second is dedicated to study
the influence of the frictional coefficient by setting it to 0.1,
0.3 and 0.5, while keeping the puncture strength unchanged
(σn0 = 10 N). Within these two scenarios, the frictional
coefficient on the tissue surface is set to 0.8.
Fig. 10 shows the plots of the integrated interaction force
along the needle shaft versus the displacement of the needle
tip for the first scenario. The second scenario is depicted
in Fig. 11.
It shows that when the contact force between the needle
tip and the tissue surface is higher than the tissue puncture
strength, the needle penetrates into the tissue. Right after this
penetration event, a relaxation phase can be observed that
induces a decreasing force at the needle bases. Thereafter, it
is observed that as the needle moves forward, the interaction
force increases due to the increasing frictional force along the
needle shaft (which is directly proportional to the insertion
distance). Only when the contact force at the needle tip is
greater than the cutting strength of the soft tissue, the needle
cuts the tissue and continues going ahead. Immediately after
this cutting action, the relaxation phase is observed anew. This
behavior is periodically observed during the needle insertion.
These observations are clearly shown in Fig. 12a, which is
obtained by zooming in Fig. 10b. A typical behavior with
distinguished phases is presented in Fig. 12b.
It is observed that under mesh refinement the resulting
global behavior of needle-tissue system is less stiff. This is
explained by the fact that beneath mesh refinement, a greater
displacement field is obtained, which results from the needletissue interaction (as also observed in Section V-B). It is
also shown that using the adaptive refinement scheme, the
interaction needle-tissue behavior is close to those when using
a fine mesh (see Fig. 10). As can be seen in Fig. 13, an
interesting observation is that the number of DOFs in the
adaptive refinement simulation is significantly fewer than that
of using the fine mesh. This obviously results in an important
gain in terms of computational time. Indeed, the simulation
using the adaptive refinement mesh runs at nearly 45 FPS
compared to 4 FPS of that using the uniform fine mesh.
It is seen from Fig. 11 that the smaller the frictional
coefficient is, the more the behavior of the adaptive refinement
scheme differs from that of the simulation using the fine mesh.
It aligns nicely with the fact that smaller friction force does
not lead to mesh refinement around the needle shaft. Indeed,
as seen in Fig. 14, the refinement in the case of frictional
coefficient µ = 0.1 is mostly due to the penetration force at
the tissue surface.
9
(a)
(b)
(c)
(d)
0
0.01
0.02
(e)
0.03
Fig. 8: Variation of tissue displacement resulting from friction during needle insertion, measured along a vertical line located at
the needle tip. (a) The un-refined mesh; (b) adaptive refinement using an anisotropic template 2 × 3 × 3; (c) adaptive refinement
using an isotropic template 3 × 3 × 3; and (d) full refinement. The graph (e) shows the benefits of the anisotropic refinement.
z
y
x
Fig. 9: Schematic representation of needle insertion simulation
into a phantom tissue. The phantom tissue is clamped at the
right surface.
D. Application to liver
The method proposed in this paper is now applied to a liver
model undergoing breathing motion, to mimic a typical case
of radio-frequency ablation of a tumor. The same Young’s
modulus and Poisson’s ratio for the needle and the tissue
as in Section V-C are employed. The frictional coefficient
is set to 0.5 when the needle is inserted and to 0.1 when
it is pulled back. The puncture force at the tissue surface
is set to 10 N. Induced by error estimate (Eq. (20)), the
needle insertion and constraints applied to the liver lead to
refinements in different regions. The initial mesh has 1179
DOFs. When the needle advances into the liver, combining
with the motion of the liver due to breathing effect, the mesh
is progressively refined to accurately take in to account the
interaction of needle and liver. The maximum number of DOFs
when the needle is completely inserted into the liver is 2961.
And, when the needle is steadily pulled back, the mesh is
then progressively coarsened until the needle is completely
outside of the liver. Thereafter, the refinement process is now
only due to the movement of the liver by breathing effect and
imposed boundary conditions. The number of DOFs at this
stage is 1509. By applying this adaptive refinement/coarsening
procedure, it is not only guaranteed that the discretization
error is fully controlled, but the computational cost is also
kept as small as possible. Indeed, without adaptive remeshing
procedure applied on the initial mesh, the simulation runs at
35 FPS while the discretization error is 12%, whereas when
the adaptive refinement is performed, it runs at 22 FPS while
decreasing the discretization error to 6%. Note that these frame
rates result not only from computational resolutions of needle,
tissue and their interactions but also from their visualization
cost.
In order to investigate the benefits of the adaptive refinement
scheme when the needle is inserted and retracted into the liver
phantom, tests with uniform and adaptive refinement schemes
are carried out. Within the uniform refinement case, a coarse
mesh with 723 DOFs and a fine mesh with 3894 DOFs are
used for the liver discretization. Whereas upon the adaptive
refinement scenario, the simulations start with the coarse mesh
723 DOFs and is adaptively refined by two schemata: each
marked element is refined into (i) 2 × 2 × 2 elements, and
(ii) into 3 × 3 × 3 elements. The integrated needle-tissue
interaction force along the needle shaft is plotted versus the
needle tip displacement when the needle is inserted and pulled
back, see Fig. 16.
It is observed that when the needle is outside the tissue,
there is no interaction force between them. This is also detected when the needle is completely retracted from the tissue.
It is clearly shown that the needle-tissue interaction depends
strongly on the mesh used (especially if the mesh is coarse).
The mesh influence reveals a stronger effect on the insertion
stage than the pullback one. This is fully understood by the
fact that the frictional coefficient between the needle shaft and
the tissue is more important during the insertion steps than that
during the pullback ones (0.5 versus 0.1, respectively). Using
the coarse mesh, the puncture force at the tissue surface is
not well captured compared to the case where the fine mesh
or adaptive refined mesh is employed, see Fig. 16. Under
mesh refinement around the needle shaft guided by error
estimate, the needle-tissue interaction converges to the solution
of the fine mesh. However, the maximum number of DOFs
when using the adaptive refinement schemes 2 × 2 × 2 and
3×3×3 is 1071 and 2193 respectively. Therefore, as observed
in Section V-C, using the adaptive refinement scheme results
in significantly fewer DOFs compared to the employment
of uniform fine mesh. All of these lead to the conclusion
that even starting with the coarse mesh but employing the
adaptive refinement scheme, the needle-tissue interaction can
be simulated more precisely compared to the coarse mesh, and
with significantly lower computational cost compared to the
uniform fine mesh.
VI. C ONCLUSION AND PERSPECTIVES
This paper contributes a structured approach to answering
the important but rarely tackled question of accuracy in
10
100
80
60
40
20
0
120
mesh 10x5x5
mesh 20x10x10
adaptive refinement
100
Force [N]
Force [N]
120
mesh 10x5x5
mesh 20x10x10
adaptive refinement
80
80
60
40
60
40
20
0
0.5
1 1.5 2 2.5
Displacement [cm]
3
0
3.5
mesh 10x5x5
mesh 20x10x10
adaptive refinement
100
Force [N]
120
20
0
0.5
(a) λn0 = 0 N
1 1.5 2 2.5
Displacement [cm]
3
0
3.5
0
0.5
(b) λn0 = 10 N
1 1.5 2 2.5
Displacement [cm]
3
3.5
(c) λn0 = 20 N
Fig. 10: Comparison of needle-tissue interaction forces along the needle shaft within two cases: without refinement (with
different mesh resolutions) and with adaptive refinement. The penetration strength is varied while keeping the same frictional
coefficient µ = 0.5 between the needle shaft and the soft tissue.
20
50
15
10
5
0
120
mesh 10x5x5
mesh 20x10x10
adaptive refinement
60
Force [N]
Force [N]
70
mesh 10x5x5
mesh 20x10x10
adaptive refinement
40
80
30
20
60
40
20
10
0
0.5
1 1.5 2 2.5
Displacement [cm]
3
3.5
0
mesh 10x5x5
mesh 20x10x10
adaptive refinement
100
Force [N]
25
0
(a) µ = 0.1
0.5
1 1.5 2 2.5
Displacement [cm]
3
0
3.5
0
0.5
(b) µ = 0.3
1 1.5 2 2.5
Displacement [cm]
3
3.5
(c) µ = 0.5
Fig. 11: Comparison of needle-tissue interaction forces along the needle shaft within two cases: without refinement (with
different mesh resolutions) and with adaptive refinement. The frictional coefficient between the needle shaft is varied while
keeping the same penetration strength (10 N) at the tissue surface.
30
25
(3)
(3)
10
20
15
10
5
0
mesh 20x10x10
12
Force [N]
Force [N]
14
mesh 10x5x5
mesh 20x10x10
adaptive refinement
8
(3)
(2)
6
(1)
(2)
(3)
(2)
4
(2)
(3)
(2)
2
0
0.2
0.6
0.8
0.4
Displacement [cm]
(a)
1
0
0
0.2
0.6
0.8
0.4
Displacement [cm]
1
(b)
Fig. 12: (a) Puncture, cutting and relaxation behaviors are shown by a zoom-in plot from Fig. 10b. (b) The typical behavior is
shown in phases. Phase (1): The needle is puncturing the tissue surface. Phase (2): Just after the penetration event, the relaxation
occurs. Phase (3): The interaction force increases due to the fact that frictional force increases with insertion distance. When
the needle tip has cut the tissue to advance forward, the relaxation occurs again.
11
agreement No. 279578) RealTCut towards real time multiscale
simulation of cutting in non-linear materials with applications
to surgical simulation and computer guided surgery”.
Inria thanks for funding of European project RASimAs (FP7
ICT-2013.5.2 No610425).
Stéphane P.A. Bordas is grateful for many helpful discussions with Dr. Pierre Kerfriden, Prof. Karol Miller, Prof. Christian Duriez, Prof. Michel Audette and Mr. Diyako Ghaffari.
7000
6000
DOFS
5000
4000
mesh 10x5x5
mesh 20x10x10
adaptive refinement
3000
2000
1000
0
0
0.5
1 1.5 2 2.5
Displacement [cm]
3
3.5
Fig. 13: Number of DOFs during the needle insertion of the
simulation in Fig. 10b.
surgical simulation.
The novelty of our paper is to drive local adaptive mesh
refinement during needle insertion by a robust a posteriori
estimate of the discretization error.
This can be seen as a first step to control the error associated
with acceleration methods in needle surgical simulations, and
to separate the modeling (are we solving the right problem?)
and discretization error (are we solving the problem right?).
Verification of the discrete scheme is guaranteed in our
approach because the a posteriori estimate asymptotically
converges to the exact error. As we use an implicit approach,
we also control the error on the equilibrium equations. As
such, assuming a proper material model and kinematics for
the problem, we can guarantee the accuracy of the solution.
This is not the case in explicit time stepping approaches.
Validation of the approach is not considered. We focus
here only on one source of error (discretization). Whilst this
is a limitation, we do believe that quantifying discretization
errors separately to modeling errors is necessary to devise
accurate and clinically-usable surgical simulators and to better
understand the resulting simulation results.
A natural direction for research, building on recent work
on data-driven simulations is to devise error-controlled approaches able to learn from data as it is acquired during the
simulation [34]–[36]. In such a paradigm, the model would
adapt to the real situation, as opposed to being driven by a
continuous indirect comparison, as is the case in this work,
with an unknown exact solution. In turn, such a data-driven
approach would facilitate patient-specific simulations, which
were not considered here. We are currently investigating such
directions through Bayesian inference for parameter identification and model selection [37] and uncertainty quantification
approaches [38].
ACKNOWLEDGEMENTS
The first and last author are supported by the Fellowship of
the last author as part of the University of Strasbourg Institute
for Advanced Study (BPC 14/Arc 10138).
Stéphane P.A. Bordas and Satyendra Tomar also thank partial funding for their time provided by the European Research
Council Starting Independent Research Grant (ERC Stg grant
R EFERENCES
[1] A. Nealen et al., “Physically based deformable models in computer
graphics,” in Computer graphics forum, vol. 25, no. 4, 2006, pp. 809–
836.
[2] Y. Wang et al., “Linear subspace design for real-time shape deformation,” ACM Transactions on Graphics (TOG), vol. 34, no. 4, p. 57, 2015.
[3] H. Courtecuisse et al., “Real-time simulation of contact and cutting of
heterogeneous soft-tissues,” Medical Image Analysis, vol. 18, no. 2, pp.
394 – 410, 2014.
[4] O. Zienkiewicz et al., The finite element method: Its basis and fundamentals. Elsevier, 2013, vol. 1.
[5] V. P. Nguyen et al., “Meshless methods: a review and computer implementation aspects,” Mathematics and computers in simulation, vol. 79,
no. 3, pp. 763–813, 2008.
[6] X. Wu et al., “Adaptive nonlinear finite elements for deformable body
simulation using dynamic progressive meshes,” in Computer Graphics
Forum, vol. 20, no. 3, 2001, pp. 349–358.
[7] M. Müller et al., “Stable real-time deformations,” in Proceedings of the
2002 ACM SIGGRAPH/Eurographics symposium on Computer animation, 2002, pp. 49–54.
[8] M. Ainsworth and J. T. Oden, A posteriori error estimation in finite
element analysis. John Wiley & Sons, 2011, vol. 37.
[9] M. Seiler et al., “Robust interactive cutting based on an adaptive octree
simulation mesh,” The Visual Computer, vol. 27, no. 6-8, pp. 519–529,
2011.
[10] R. Verfürth, A posteriori error estimation techniques for finite element
methods, ser. Numerical Mathematics and Scientific Computation. Oxford University Press, Oxford, 2013.
[11] O. Zienkiewicz and J. Zhu, “The superconvergent patch recovery (spr)
and adaptive finite element refinement,” Computer Methods in Applied
Mechanics and Engineering, vol. 101, no. 1, pp. 207–224, 1992.
[12] C. Carstensen and S. Bartels, “Each averaging technique yields reliable
a posteriori error control in FEM on unstructured grids. I. Low order
conforming, nonconforming, and mixed FEM,” Math. Comp., vol. 71,
no. 239, pp. 945–969 (electronic), 2002.
[13] S. Bartels and C. Carstensen, “Each averaging technique yields reliable
a posteriori error control in FEM on unstructured grids. II. Higher order
FEM,” Math. Comp., vol. 71, no. 239, pp. 971–994 (electronic), 2002.
[14] I. Babuška and W. C. Rheinboldt, “Error estimates for adaptive finite
element computations,” SIAM J. Numer. Anal., vol. 15, no. 4, pp. 736–
754, 1978.
[15] N. Hamzé et al., “Preoperative trajectory planning for percutaneous procedures in deformable environments,” Computerized Medical Imaging
and Graphics, vol. 47, pp. 16–28, 2016.
[16] N. Abolhassani et al., “Needle insertion into soft tissue: A survey,”
Medical Engineering and Physics, vol. 29, pp. 413–431, 2007.
[17] C. Duriez et al., “Interactive simulation of flexible needle insertions
based on constraint models,” in Lecture Notes in Computer Science,
vol. 5762, no. PART 2, 2009, pp. 291–299.
[18] S. Misra et al., “Mechanics of flexible needles robotically steered
through soft tissue,” Int. J. Rob. Res., vol. 29, no. 13, pp. 1640–1660,
Nov. 2010.
[19] J. Wu et al., “Physically-based simulation of cuts in deformable bodies:
A survey.” in Eurographics (State of the Art Reports), 2014, pp. 1–19.
[20] C. Dick et al., “A hexahedral multigrid approach for simulating cuts in
deformable objects,” IEEE Transactions on Visualization and Computer
Graphics, vol. 17, no. 11, pp. 1663–1675, 2011.
[21] G. R. Liu and S. S. Quek, “Chapter 3 - Fundamentals for Finite
Element Method,” in The Finite Element Method (Second Edition),
second edition ed., G. R. Liu et al., Eds.
Oxford: ButterworthHeinemann, 2014, pp. 43–79.
[22] O. Zienkiewicz and R. Taylor, The Finite Element Method: Solid
mechanics, ser. Referex collection.Mecánica y materiales. ButterworthHeinemann, 2000.
12
(a) µ = 0.1
(b) µ = 0.3
(c) µ = 0.5
Fig. 14: Refinement patterns (colored by stress level) of the adaptive scenario while using different frictional coefficients.
(a)
(b)
(c)
Fig. 15: (a) Simulation of needle insertion in a liver; (b) using dynamic mesh refinement scheme driven by error estimate; (c)
visual depiction. The simulation runs at 22 Hz (on a 4GHz processor).
80
uniform mesh 723 dofs
uniform mesh 3894 dofs
adaptive refinement 2x2x2
adaptive refinement 3x3x3
70
60
Force [N]
50
[27]
[28]
40
30
[29]
20
10
[30]
0
[31]
-10
-20
0
0.5
1
1.5 2 2.5 3
Displacement [cm]
3.5
4
4.5
Fig. 16: Needle-liver phantom interaction force during needle
insertion and pullback. The interaction force varies due to
advancing friction and tissue cutting strength, globally increases (with positive values) during the insertion stage. At
4 cm of the needle-tip displacement, the needle is retracted
and the interaction force changes the direction, varies due to
retrograding friction, globally decreases and gets zero when
the needle is completely pulled out. These form a loop profile
for force-displacement curve resulting from needle insertionretraction.
[23] C. Felippa and B. Haugen, “A unified formulation of small-strain
corotational finite elements: I. theory,” Computer Methods in Applied
Mechanics and Engineering, vol. 194, no. 2124, pp. 2285 – 2335, 2005.
[24] A. Pinelli et al., “Immersed boundary method for generalised finite
volume and finite difference navier-stokes solvers,” Journal of Computational Physics, vol. 229, no. 24, pp. 9073–9091, 2010.
[25] D. Baraff and A. Witkin, “Large steps in cloth simulation,” in Proceedings of SIGGRAPH, 1998, pp. 43–54.
[26] D.-Y. Kwak and Y.-T. Im, “Hexahedral mesh generation for remeshing
[32]
[33]
[34]
[35]
[36]
[37]
[38]
in three-dimensional metal forming analyses,” Journal of Materials
Processing Technology, vol. 138, no. 13, pp. 531 – 537, 2003.
D. Koschier et al., “Adaptive Tetrahedral Meshes for Brittle Fracture
Simulation,” in Symposium on Computer Animation, V. Koltun and
E. Sifakis, Eds. The Eurographics Association, 2014.
D. Burkhart et al., “Adaptive and Feature-Preserving Subdivision for
High-Quality Tetrahedral Meshes,” Computer Graphics Forum, vol. 29,
no. 1, pp. 117–127, 2010.
C. Paulus et al., “Virtual cutting of deformable objects based on efficient
topological operations,” The Visual Computer, vol. 31, no. 6-8, pp. 831–
841, 2015.
E. Sifakis et al., “Hybrid simulation of deformable solids,” in Proc.
Symposium on Computer Animation, 2007, pp. 81–90.
H. Uzawa and K. J. Arrow, “Iterative methods for concave programming,” in Preference, production, and capital. Cambridge University
Press, 1989, pp. 135–148.
I. Babuška, “The finite element method with penalty,” Mathematics of
Computation, vol. 27, no. 122, pp. 221–228, 1973.
P. Papadopoulos and J. M. Solberg, “Recent Advances in Contact Mechanics A Lagrange multiplier method for the finite element solution of
frictionless contact problems,” Mathematical and Computer Modelling,
vol. 28, no. 4, pp. 373–384, 1998.
M. Seiler et al., “Enriching coarse interactive elastic objects with
high-resolution data-driven deformations,” in Proceedings of the ACM
SIGGRAPH/Eurographics Symposium on Computer Animation, 2012,
pp. 9–17.
——, “Data-driven simulation of detailed surface deformations for
surgery training simulators,” IEEE Transactions on Visualization and
Computer Graphics, vol. 20, no. 10, pp. 1379–1391, Oct 2014.
M. U. Seiler et al., “Efficient Transfer of Contact-Point Local Deformations for Data-Driven Simulations,” in Workshop on Virtual Reality
Interaction and Physical Simulation. The Eurographics Association,
2014.
H. Rappel et al., “Bayesian inference for the stochastic identification
of elastoplastic material parameters: Introduction, misconceptions
and additional insight,” CoRR, vol. abs/1606.02422, 2016. [Online].
Available: http://arxiv.org/abs/1606.02422
P. Hauseux et al., “Accelerating monte carlo estimation with
derivatives of high-level finite element models,” Computer Methods in
Applied Mechanics and Engineering, pp. –, 2017. [Online]. Available:
http://www.sciencedirect.com/science/article/pii/S0045782516313470
| 5cs.CE
|
arXiv:1407.6513v1 [cs.NE] 24 Jul 2014
Convolutional Neural Associative Memories:
Massive Capacity with Noise Tolerance
Amin Karbasi
E-mail: [email protected]
Computer Science Department
Swiss Federal Institute of Technology Zurich, 8092 Zurich, Switzerland
Amir Hesam Salavati
E-mail: [email protected]
Computer and Communication Sciences Department
Ecole Polytechnique Federale de Lausanne, Lausanne, 1015, Switzerland
Amin Shokrollahi
E-mail: [email protected]
Computer and Communication Sciences Department
Ecole Polytechnique Federale de Lausanne, Lausanne, 1015, Switzerland
July 25, 2014
Abstract
The task of a neural associative memory is to retrieve a set of previously
memorized patterns from their noisy versions using a network of neurons.
An ideal network should have the ability to 1) learn a set of patterns as they
arrive, 2) retrieve the correct patterns from noisy queries, and 3) maximize
the pattern retrieval capacity while maintaining the reliability in responding
to queries. The majority of work on neural associative memories has focused
on designing networks capable of memorizing any set of randomly chosen
patterns at the expense of limiting the retrieval capacity.
In this paper, we show that if we target memorizing only those patterns
that have inherent redundancy (i.e., belong to a subspace), we can obtain all
the aforementioned properties. This is in sharp contrast with the previous
work that could only improve one or two aspects at the expense of the third.
More specifically, we propose framework based on a convolutional neural
network along with an iterative algorithm that learns the redundancy among
the patterns. The resulting network has a retrieval capacity that is exponential in the size of the network. Moreover, the asymptotic error correction
performance of our network is linear in the size of the patterns. We then extend our approach to deal with patterns lie approximately in a subspace. This
extension allows us to memorize datasets containing natural patterns (e.g.,
images). Finally, we report experimental results on both synthetic and real
datasets to support our claims.
1
Introduction
The ability of neuronal networks to memorize a large set of patterns and reliably
retrieve them in the presence of noise, has attracted a large body of research over
the past three decades to design artificial neural associative memories with similar capabilities. Ideally, a perfect neural associative memory should be able to
learn patterns, have a large pattern retrieval capacity and be noise-tolerant. This
problem, called ”associative memory", is in spirit very similar to reliable information transmission faced in communication systems where the goal is to efficiently
decode a set of transmitted patterns over a noisy channel.
Despite this similarity and common methods deployed in both fields (e.g.,
graphical models, iterative algorithms, to name a few), we have witnessed a huge
gap between the efficiency achieved by them. More specifically, by deploying modern coding techniques, it was shown that the number of reliably transmitted patterns
over a noisy channel can be made exponential in n, the length of the patterns. This
was particularly achieved by imposing redundancy among transmitted patterns. In
contrast, the maximum number of patterns that can be reliably memorized by most
current neural networks scales linearly in the size of the patterns. This is due to the
common assumption that a neural network should be able to memorize any subset
of patterns drawn randomly from the set of all possible vectors of length n (see,
for example Hopfield, 1982, Venkatesh and Psaltis, 1989, Jankowski et al., 1996,
Muezzinoglu et al., 2003).
Recently, Kumar et al. (2011) suggested a new formulation of the problem
where only a suitable set of patterns was considered for storing. To enforce the
set of constraints, they formed a bipartite graph (as opposed to a complete graph
considered in the earlier work) where one layer feeds the patterns to the network
and the other takes into account the inherent structure. The role of bipartite graph
is indeed similar to the Tanner graphs used in modern coding techniques (Tanner,
1981). Using this model, Kumar et al. (2011) provided evidence that the resulting
network can memorize an exponential number of patterns at the expense of correcting only a single error during the recall phase. By introducing a multi-layer
2
structure, Salavati and Karbasi (2012) could further improve the error correction
performance to constant number of errors.
In this paper, similar to the model considered by Kumar et al. (2011), we only
consider a set of patterns with weak minor components, i.e., patterns that lie in a
subspace. By making use of this inherent redundancy
• We introduce the first convolutional neural associative network with provably exponential storage capacity.
• We prove that our architecture can correct a linear fraction of errors.
• We develop an online learning algorithm with the ability to learn patterns as
they arrive. This property is specifically useful when the size of the dataset
is massive and patterns can only be learned in a streaming manner.
• We extend our results to the case where patterns lie approximately in a subspace. This extension in particular allows us to efficiently memorize datasets
containing natural patterns.
• We evaluate the performance of our proposed architecture and the learning
algorithm through numerical simulations.
We provide rigorous analysis to support our claims. The storage capacity and error
correction performance of our method is information-theoretically order optimum,
i.e., no other method can significantly improve the results (except for constants).
Our learning algorithm is an extension of the subspace learning method proposed
by Oja and Kohonen (1988), with an additional property of imposing the learned
vectors to be sparse. The sparsity is essential during the noise-elimination phase.
The remainder of this paper is organized as follows. In Section 2 we provide
an overview of the related work in this area. In Section 3 we introduce our notation
and formally state the problems that is the focus of this work, namely, learning
phase, recall phase, and storage capacity. We present our learning algorithm in
Section 4 and our error correction method in Section 5. Section 6 is devoted to the
pattern retrieval capacity. We then report our experimental results on synthetic and
natural datasets in Section 7. Finally, all the proofs are provided in Section 8.
2
Related Work
The famous Hopfield network was among the first auto-associative neural mechanisms capable of learning a set of patterns and recalling them subsequently (Hopfield, 1982). By employing the Hebbian learning rule (Hebb, 1949), Hopfield
3
considered a neural network of size n with binary state neurons. It was shown
by McEliece et al. (1987) that the capacity of a Hopfield network is bounded by
C = (n/2 log(n)). Due to the low capacity of Hopfield networks, extension of
associative memories to non-binary neural models has also been explored, with
the hope of increasing the pattern retrieval capacity. In particular, Jankowski et al.
(1996) investigated a complex-valued neural associative memory where each neuron can be assigned a multivalued state from the set of complex numbers. It was
shown by Muezzinoglu et al. (2003) that the capacity of such networks can be increased to C = n at the cost of a prohibitive weight computation mechanism. To
overcome this drawback, a Modified Gradient Descent learning Rule (MGDR) was
devised by Lee (2006).
Recently, in order to increase the capacity and robustness, a line of work considered exploiting the inherent structure of the patterns. This is done by either
making use of the correlations among the patterns or memorizing only those patterns that have some sort of redundancy. Note that they differ from the previous
work in one important aspect: not any possible set of patterns is considered for
learning, but only those with common structures. By employing neural cliques,
Gripon and Berrou (2011) were among the first to demonstrate that considerable
improvements in the pattern retrieval capacity of Hopfield networks is possible,
albeit still not passing the polynomial boundary on the capacity, i.e., C = O(n2 ).
Similar idea was proposed by Venkatesh (1994) for learning semi-random patterns. This boost to the capacity is achieved by dividing the neural network into
smaller fully interconnected
disjoint blocks. Using this idea, the capacity is in
n/b
creased to Θ b
, where b = ω(ln n) is the size of clusters, Nonetheless, it
was observed that this improvement comes at the price of limited noise tolerance
capabilities.
By deploying higher order neural models, in contrast to the pairwise correlation
considered in Hopfield networks, Peretto and Niez (1986) showed that the storage
capacity can be improved to C = O(np−2 ), where p is the degree of correlation.
In such models, the state of the neurons not only depends on the state of their
neighbors, but also on the correlations among them. However, the main drawback
of this work lies in the prohibitive computational complexity of the learning phase.
Recently, Kumar et al. (2011) introduced a new model based on bipartite graphs
to capture higher order (linear) correlations without the prohibitive computational
complexity in the learning phase. The proposed model was further improved later
(Kumar et al., 2014), Under the assumption that the bipartite graph is fully known,
sparse, and expander, the proposed algorithm by Kumar et al. (2011) increased the
pattern retrieval capacity to C = O(an ), for some a > 1. In addition to those
restrictive assumptions, the performance of the recall phase was still below par.
4
In this paper, we introduce a convolutional neural network, capable of memorizing an exponential number of structured patterns while being able to correct a
linear fraction of noisy neurons. Similar to the model considered by Kumar et al.
(2011), we assume that patterns lie in a low dimensional subspace. Note that a
network of size n, where each neuron can hold a finite number of states, is capable
of memorizing at most an exponential number of patterns in n. Also, correcting a
linear fraction of noisy nodes of the network is the best we can hope for. In addition, and more importantly in practice, we extend our results to the set of patterns
that only approximately belong to a subspace.
It is worth mentioning that learning a set of input patterns with robustness
against noise is not just the focus of neural associative memories. For instance,
Vincent et al. (2008) proposed an interesting approach to extract robust features
in autoencoders. Their approach is based on artificially introducing noise during
the learning phase and let the network learn the mapping between the corrupted
input and the correct version. This way, they shifted the burden from the recall
phase to the learning phase. We, in contrast, consider another form of redundancy
and enforce a suitable pattern structure that helps us design faster algorithms and
derive necessary conditions that help us guarantee to correct a linear fraction of
noise without previously being exposed to.
Although our neural architecture is not technically considered a Deep Belief Network (DBN), it shares some similarities. DBNs are typically used to extract/classify features by the means of several consecutive stages (e.g., pooling,
rectification, etc). Having multiple stages help the network to learn more interesting and complex features. An important class of DBNs are convolutional DBNs.
The input layer (also known as the receptive field) is divided into multiple overlapping patches and the network extracts features from each patch (Jarrett et al.,
2009). Since we divide the input patterns into a few overlapping smaller clusters,
our model is similar to those of convolutional DBNs. Furthermore, we also learn
multiple features (in our case dual vectors) from each patch where the feature extractions differ over different patches. This is indeed very similar to the approach
proposed by Le et al. (2010). In contrast to convolutional DBNs, the focus of this
work is not classification but rather recognition of the exact patterns from their
noisy versions. Moreover, in most DBNs, we not only have to find the proper dictionary for classification, but we also need to calculate the features for each input
pattern. This alone increases the complexity of the whole system, especially if denoising is part of the objective. In our model, however, the dictionary is defined
in terms of dual vectors. Consequently, previously memorized patterns are computationally easy to recognize as they yield the all-zero vector in the output of the
feature extraction stage. In other words, a non-zero output can only happen if the
input pattern is noisy. Another advantage of our model over DBNs is a much faster
5
learning phase. More precisely, by using a single layer with overlapping clusters
in our model the information diffuses gradually in the network. The same criteria
is achieved in DBNs by constructing several stages (Socher et al., 2011).
3
Problem Formulation
In this section, we set our notation and formally define the learning phase, recall
phase, and the storage capacity.
3.1
Learning Phase
Throughout this paper, each pattern is denoted by an integer-valued vector x =
(x1 , x2 , . . . , xn ) of length n where xi ∈ Q = {0, . . . , Q − 1} for i = 1, . . . , n
and Q is a non-negative integer. In words, the set Q could be thought of as the
short term firing rate of neurons. Let {si }ni denote the states of neurons in a neural
network G. Each neuron updates its state based on the states of its neighbors.
P
More precisely, a neuron j first computes a weighted some i∈N (j) wj,i si and
then applies a nonlinear activation function f : R → Q, i.e.,
sj = f
X
wj,i si .
i∈N (j)
Here, wj,i is the weight of the neural connection between neurons j and i, and
N (j) denotes the neighbors of neuron j in G. There are several possible activation functions used in the literature including, but not limited to, linear, threshold,
logistic, and tangent hyperbolic functions.
We denote the dataset of the patterns by the C ×n dimensional matrix X , where
patterns are stored as the rows. Our goal in this work is to memorize patterns with
strong local correlation among the entries. More specifically, we divide the entries
of each pattern x into L overlapping sub-patterns of lengths n1 , . . . , nL , so that
P
ni ≥ n. Note that due to overlaps, an entry in a pattern can be a member of
multiple sub-patterns, as shown in Figure 1. We denote the i-th sub-pattern by
(i)
(i)
x(i) = (x1 , x2 , . . . , x(i)
ni ).
To enforce local correlations, we assume that the sub-patterns x(i) form a subspace
of dimension ki < ni . This is done by imposing linear constraints on each cluster.
These linear constraints are captured during the learning phase in the form of
(i)
(i)
(i)
dual vectors. More specifically, we find a set of non-zero vectors w1 , w2 , . . . , wmi
6
G(1)
y1
Constraint neurons
G(2)
y2
y3
y4
(2)
Pattern neurons
x1
(2)
x2
G(3)
y5
(2)
x3
y6
y7
(2)
x4
Figure 1: Bipartite graph G. In this figure we see three subpatterns x(1) , x(2) , x(3)
along with corresponding clusters G(1) , G(2) , G(2) . The subpattern x(2) has overlaps with both G(1) and G(3) . The weights wi,j are chosen to ensure that W · x = 0
for all patterns x lying in a subspace.
that are orthogonal to the set of sub-patterns x(i) , i.e.,
(i)
(i)
yj = hwj , x(i) i = 0,
∀j ∈ [mi ] ∀i ∈ [L],
(1)
where [q] denotes the set {1, 2, · · · , q} and h·, ·i represents the inner product.
The weight matrix W (i) is constructed by placing all dual vectors next to each
other, i.e.,
(i) (i)
(i) >
W (i) = [w1 |w2 | . . . |wm
] .
i
Equation (1) can be written equivalently as
W (i) · x(i) = 0.
Cluster i represents the bipartite graph G(i) with the connectivity matrix W (i) .
In the next section, we develop an iterative algorithm to learn the weight matrices
W (1) , . . . , W (L) , while encouraging sparsity within each connectivity matrix W (i) .
One can easily map the local constraints imposed by the W (i) ’s into a global
constraint by introducing a global weight matrix W of size m × n. The first m1
rows of the matrix W correspond to the constraints in the first cluster, rows m1 + 1
to m1 +m2 correspond to the constraints in the second cluster, and so forth. Hence,
by inserting zero entries at proper positions, we can construct the global constraint
matrix W . We will use both the local and global connectivity matrices to eliminate
noise in the recall phase.
7
y8
3.2
Recall Phase
In the recall phase a noisy version, say x̂, of an already learned pattern x ∈ X is
given. Here, we assume that the noise is an additive vector of size n, denoted by e,
whose entries assume values independently from {−1, 0, +1}1 with corresponding
probabilities p−1 = p+1 = pe /2 and p0 = 1 − pe . In other words, each entry of the
noise vector is set to ±1 with probability pe . The ±1 values are chosen to simplify
the analysis. Our approach can be easily extended to other integer-valued noise
models.
We denote by e(i) , the realization of noise on the sub-pattern x(i) . In formula,
x̂ = x + e.2 Note that W · x̂ = W · e and W (i) · x̂(i) = W (i) · e(i) . Therefore, the
goal in the recall phase is to remove the noise e and recover the desired pattern x.
This task will be accomplished by exploiting the facts that a) we have chosen the
set of patterns X to satisfy the set of constraints W (i) · x(i) = 0 and b) we opted for
sparse neural graphs G(i) during the learning phase. Based on these two properties,
we develop the first recall algorithm that corrects a linear fraction of noisy entries.
3.3
Capacity
The last issue we look at in this work is the retrieval capacity C of our proposed
method. Retrieval or critical storage capacity is defined as the maximum number
of patterns that a neural network is able to store without having (significant) errors
in returned answers during the recall phase. Hence, the storage capacity C(n) is
usually measured in terms of the network size n. It is well known that the retrieval
capacity is affected by certain considerations about the neural network, including
the range of values or states for the patterns, inherent structure of patterns, and
topology of neural networks. In this work, we show that a careful combination
of patterns’ structure and neural network topology leads to an exponential storage
capacity in the size of the network.
4
The Learning Algorithm
In this section, we develop an algorithm for learning the weight matrix W (`) of
a given cluster `. By our assumptions, the sub-patterns lie in a subspace of dimension k` ≤ n` . Hence we can adopt the iterative algorithm proposed by Oja
1
In our experiments, we have considered larger integer values for noise as well, i.e.,
{−q, . . . , 0, . . . , q}, for some q ∈ N. The ±1 noise model here is considered to simplify the notations and analysis.
2
Note that since entries of x̂ should be between 0 and Q − 1, we cap values below 0 and above
Q − 1 to 0 and Q − 1, respectively.
8
and Karhunen (1985) and Xu et al. (1991) to learn the corresponding null space.
However, in order to ensure the success of the denoising algorithm proposed in
Section 5, we require W (l) to be sparse. To this end, the objective function shown
below has a penalty term to encourage sparsity. Furthermore, we are not seeking
an orthogonal basis as in the approach proposed by Xu et al. (1991). Instead, we
wish to find m` vectors w(`) that are orthogonal to the (sub-) patterns. Hence,
the optimization problem for finding a constraint vector w(`) can be formulated as
follows:
minw(`)
s.t.
X
|hx(`) , w(`) i|2 + ηg(w(`) ),
(2)
x∈X
(`)
kw k2 = 1.
(3)
In the above problem, x(`) is a sub-pattern of x drawn from the training set X , h·, ·i
indicates the inner product, η is a positive constant, and g(·) is the penalty term to
favor sparse results. In this paper, we consider
g(w(`) ) =
n
X
(`)
tanh(σ(wi )2 ).
i=1
(`)
(`)
It is easy to see that for large σ, the function tanh(σ(wi )2 ) approximates |sign(wi )|
(as shown in Figure 2). Therefore, the larger σ gets, the closer g(w(`) ) will be to
k · k0 . Another popular choice, widely used in compressed sensing (see, for example, Donoho, 2006 and Candès and Tao, 2006), is to pick g(w(`) ) = kw(`) k1 . Note
that the optimization problem (2) without the constraint (3) has the trivial solution
w(`) = 0 where 0 is the all-zero vector.
To minimize the objective function shown in (2) subject to the norm constraint
(3) we use stochastic gradient descent and follow a similar approach to that of Xu
et al. (1991). By calculating the derivative of the objective function and considering the updates required for each randomly picked pattern x, we will obtain the
following iterative algorithm:
y (`) (t) = hx(`) (t), w(`) (t)i,
(4)
w̃(`) (t + 1) = w(`) (t) − αt 2y (`) (t)x(`) (t) + ηΓ(w(`) (t)) ,
w(`) (t + 1) =
w̃(`) (t + 1)
.
kw̃(`) (t + 1)k2
(5)
(6)
In the above equations, t is the iteration number, x(`) (t) is the subpattern of a
pattern x(t) drawn at iteration t, αt is a small positive constant, and Γ(w(`) ) =
9
1
tanh(σx)
0.5
0
sign(x)
σ=1
σ = 10
σ = 50
−0.5
−1
−1
−0.8 −0.6 −0.4 −0.2
0
x
0.2
0.4
0.6
0.8
1
Figure 2: Approximation of sign(x) by tanh(σx). As we increase the value of σ
the approximation becomes more accurate.
∇g(w(`) ) is the gradient of the penalty term. The function Γ(w(`) ) encourages
sparsity. To see why, consider the i-th entry of Γ(·), namely,
∂g(z)
∂zi
= 2σzi (1 − tanh2 (σzi2 )).
Γi (zi ) =
Note that Γi ' 2σzi for relatively small values of zi , and Γi ' 0 for larger values
of zi (see Figure 3).
Thus, for proper choices of η and σ, equation (5) suppresses small entries of
w(`) (t) towards zero and favors sparser results. To further simplify the iterative
equations (4), (5), (6) we approximate the function Γ(w(`) (t)) with the following
threshold function (shown in Figure 4):
(
Γi (zi , θt ) =
zi if |zi | ≤ θt ;
0 otherwise.
where θt is a small positive threshold. Following the same approach taken by Oja
and Karhunen (1985) we assume that αt is small enough so that equation (6) can be
(`)
(`)
expanded as powers of αt . Also note that the inner product hw
(t), Γ(w (t), θt )i
is small so in the power expansion we can omit the term αt η hw(`) (t), Γ(w(`) (t), θt )i w(`) (t).
By applying the above approximations we obtain an iterative learning algorithm shown in Algorithm 1. In words, y (`) (t) is the projection of x(`) (t) onto
10
1
Γi (zi )
0.5
0
zi
zi (1 − tanh2 (zi2 ))
zi (1 − tanh2 (10zi2 ))
zi (1 − tanh2 (100zi2 ))
−0.5
−1
−1
−0.8 −0.6 −0.4 −0.2
0
zi
0.2
0.4
0.6
0.8
1
Figure 3: The sparsity penalty Γi (zi ) suppresses small values of zi towards zero.
Note that as σ gets larger, the support of Γi (zi ) gets smaller.
w(`) (t). If for a given data vector x(`) (t) the projection y (`) (t) is non-zero, then
the weight vector will be updated in order to reduce this projection.
4.1
Convergence Analysis
Our main idea for proving the convergence of the learning algorithm is to consider
the learning cost function defined as follows:
E(t) = E(w(`) (t)) =
C
2
1 X
hw(`) (t), xµ i
C µ=1
We show that as we gradually learn patterns from the data set X , the cost function
E(t) goes to zero. In order to establish this result we need to specify the learning
P
rate αt . In what follows, we assume that αt = Ω(1/t) so that t αt → ∞ and
P 2
(`)
t αt < ∞. We first show that the weight vector w (t) never becomes zero, i.e.,
(`)
kw (t)k2 > 0 for all t.
Lemma 1 Assume that kw(`) (0)k2 > 0 and α0 < 1/η. Then for all iterations t,
we have αt < α0 < 1/η and kw(`) (t)k2 > 0.
As mentioned earlier, all the proofs are given in Section 8.
The above lemma ensures that if we reach E(t) = 0 for some iteration t, it is
not the case that w(`) (t) = 0. Next, we prove the convergence of Algorithm 1 to a
minimum ŵ(`) for which E(ŵ(`) ) = 0.
11
0.04
f (x; θ)
0.02
0
−0.02
θ = 0.01
θ = 0.05
−0.04
−0.10 −0.08 −0.06 −0.04 −0.02 0.00
x
0.02
0.04
0.06
0.08
0.10
Figure 4: The soft threshold function f (x, θ) for two different values of θ.
Theorem 2 Under the conditions of Lemma 2, the learning Algorithm 1 converges
to a local minimum ŵ(`) for which E(ŵ(`) ) = 0. Moreover ŵ(`) is orthogonal to
all the patterns in the data set X .
We should note here that a similar convergence result can be proven without introducing the penalty term g(w(`) ). However, our recall algorithm crucially depends
on the sparsity level of learned w(`) ’s. As a consequence we encouraged sparsity by
adding the penalty term g(w(`) ). Our experimental results in Section 7 show that
in fact this strategy works perfectly and the learning algorithm results in sparse
solutions.
In order to find m` constraints required by the learning phase, we need to run
Algorithm 1 at least L times. In practice, we can perform this process in parallel, to speed up the learning phase. It is also more meaningful from a biological
point of view, as each constraint neuron can act independently from the others.
Although running Algorithm 1 in parallel may result in redundant constraints, our
experimental results show that by starting from different random initial points, the
algorithm converges to linearly independent constraints almost surely.
5
Recall Phase
Once the learning phase is finished, the weights of the neural graphs are fixed.
Thus, during the recall phase we assume that the connectivity matrix for each cluster i (denoted by W (i) ) has been learned and satisfies (1).
12
The recall phase of our proposed model consists of two parts: intra-cluster and
inter-cluster. During the intra-cluster part, clusters try to remove noise from their
own sub-patterns. As we will see shortly, each cluster succeeds in correcting a
single error with high probability. Such individual error correction performance is
fairly limited. The inter-cluster part capitalizes on the overlap among clusters to
improve the overall performance of the recall phase. In what follows, we describe
both parts in more details.
5.1
Intra-cluster Recall Algorithm
For the intra-cluster part, shown in Algorithm 2, we exploit the fact that the connectivity matrix of the neural network in each cluster is sparse and orthogonal to
the memorized patterns. As a result we have W (`) (x(`) + e(`) ) = W (`) e(`) where
e(`) is the noise added to the sub-pattern x(`) .
Algorithm 2 performs a series of forward and backward iterations to remove
e(`) . At each iteration, the pattern neurons decide locally whether to update their
current state or not: if the amount of feedback received by a pattern neuron exceeds
a threshold, the neuron updates its state, and remains intact, otherwise.3
In order to state our results, we need to define the degree distribution poly(`)
nomial (from the node perspective). More precisely, let Λi be the fraction of
P (`)
pattern neurons with degree i in cluster G(`) and define Λ(`) (x) = i Λi xi to be
the degree distribution polynomial for the pattern neurons in cluster `. In principle
Λ(`) (x) encapsulates all the information we need to know regarding cluster G(`) ,
namely, the degree distribution. The following theorem provides a lower bound
on the average probability of correcting a single erroneous pattern neuron by each
cluster.
Theorem 3 If we sample the neural graph randomly from Λ(`) (x), and let ϕ → 1,
then Algorithm 2 can correct (at least) a single error in cluster G(`) with probability at least
!!n` −1
d¯`
(`)
(`)
Pc = 1 − Λ
,
m`
where d¯` , n` , and m` are the average degree of pattern neurons, the number of
pattern neurons, and the number of constraint neurons in cluster G(`) , respectively.
3
In order to maintain the current value of a neuron, we can add self-loops to pattern neurons in
Figure 1. the self-loops are not shown in the figure for the sake of clarity).
(`)
(`)
(`)
4
In practice, we usually set yi = sign(hi ) only if |hi | > ψ, where ψ is a small positive
threshold.
13
To gain some intuition we can further simplify the expression in the above theorem
as follows
Pc(`) ≥ 1 −
d¯`
m`
!d(`)
n` −1
min
,
(`)
where dmin is the minimum degree of pattern neurons in cluster ` and we assumed
(`)
that dmin ≥ 1. This shows the significance of having high-degree pattern neurons.
(`)
(`)
In the extreme case of dmin = 0 then we obtain the trivial bound of Pc ≥ (1 −
(`)
(`)
Λ0 )n` −1 , where Λ0 is the fraction of pattern neurons with degree equal to 0. In
(`)
(`)
(`)
(`)
particular, for large n` we obtain Pc ≥ e−D0 , where D0 = Λ0 n` is the total
number of pattern neurons with degree 0. Thus, even if only a single pattern neuron
has a zero degree, probability of correcting a single error drops significantly.
While Theorem 3 provides a lower bound on the probability of correcting a
single error when the connectivity graph is sampled according to the degree distribution polynomial Λ(`) (x), the following lemma shows that under mild conditions
(that depends on the neighborhood relationship among neurons), Algorithm 2 will
correct a single input error with probability 1.
Lemma 4 If no two pattern neurons share the exact same neighborhood in cluster
G(`) , and as ϕ → 1, Algorithm 2 corrects (at least) a single error.
(`)
denote this average
For the remaining of the paper we let Pc = E` Pc
probability of correcting one error averaged over all clusters. Lemma 4 suggests
that nuder mild conditions, and in fact in many practical settings discussed later, Pc
is close to 1. Thus, from now on we pessimistically assume that if there is a single
error in a given cluster, Algorithm 2 corrects it with probability Pc and declares a
failure if there are more than one error.
5.2
Inter-cluster Recall Algorithms
As mentioned earlier, the error correction ability of Algorithm 2 is fairly limited.
As a result, if clusters work independently, they cannot correct more than a few
external errors. However, as clusters overlap their combined performance can potentially be much better. Basically, they can help each other in resolving external
errors: a cluster whose pattern neurons are in their correct states can provide truthful information to neighboring clusters. Figure 5 illustrates this idea.
This property is exploited in the inter-cluster recall approach, formally given
by Algorithm 3. In words, the inter-cluster approach proceeds by applying Algorithm 2 in a round-robin fashion to each cluster. Clusters either eliminate their
14
internal noise in which case they keep their new states and can now help other clusters, or revert back to their original states. Note that by such a scheduling scheme,
neurons can only change their states towards correct values.
The inter-cluster algorithm is in spirit similar to a famous decoding algorithm in
communication systems for erasure channels, called the peeling algorithm (Luby
et al., 2001). To make the connection more concrete, we first need to define a
e we
contracted version of the neural graph G as follows. In the contracted graph G,
(`)
compress all constraint nodes of a cluster G into a single super constraint node
v (`) (see Figure 6). Then, each super constraint node essentially acts as a check
node capable of detecting and correcting any single error among its neighbors (i.e.,
pattern neurons). In contrast, it declares a failure if two or more of its neighbors
are corrupted by noise. Once an error is corrected by a cluster, the number of errors
in overlapping clusters may also reduce which in turn help them to eliminate their
errors.
Through introducing the contracted graph, the similarity to the Peeling Decoder is now evident: in the Peeling Decoder, each constraint (so called checksum)
node is capable of correcting a single erasure among its neighbors. Similarly, if
there are more than one erasure among the neighbors, the checksum node declares
erasure. However, once an erasure is eliminated by a checksum node, it helps other
constraint nodes, namely those connected to the recently-eliminated erased node,
as they will have one less erasure among their neighbors to deal with.
Based on the above similarity, we borrow methods from modern coding theory
to obtain theoretical guarantees on the error rate of our proposed recall algorithm.
More specifically, we use Density Evolution (DE), first developed by Luby et al.
(2001) and generalized by Richardson and Urbanke (2008), to accurately bound
the error correction performance.
e i (resp. ρej ) denote the fraction of edges that are adjacent to pattern (resp.
Let λ
e1, . . . , λ
e L } the pattern degree
constraint) nodes of degree i (resp. j). We call {λ
distribution and {ρe1 , . . . , ρen } the super constraint degree distribution. Similar to
Section 5.1, it is convenient to define the degree distribution polynomials as follows:
e
λ(z)
=
X
ρe(z) =
X
e i z i−1 ,
λ
i
ρi z i−1 .
i
Now consider a given cluster v (`) and a pattern neuron x connected to v (`) . The
decision subgraph of x is defined as the subgraph rooted at x and branched out
from the super constraint nodes, excluding v (`) . If the decision subgraph is a tree
up to a depth of τ (meaning that no node appears more than once), we say that
15
G(1)
G(2)
G(3)
G(1)
G
(2)
G
(3)
(1)
G
G
(c) Step 2: cluster 2 fails.
G(1)
G(2)
G
(2)
G
G(2)
G(3)
(d) Step 3: cluster 3 succeeds.
G(1)
G(3)
(e) Step 4: cluster 1 fails again.
(1)
G(3)
(b) Step 1: cluster 1 fails.
(a) Initial step
(1)
G(2)
G(2)
G(3)
(f) Step 5: cluster 2 succeeds.
G(1)
(3)
G
(g) Step 7: cluster 1 succeeds.
G(2)
G(3)
(h) Step 8: Algorithm finishes successfully.
Figure 5: How overlaps among clusters help the neural network to achieve better
error correction performance. We assume that each cluster can correct one input
error. In other words, if the number of input errors are higher than one the cluster
declares a failure.
16
e corresponding to graph G in Figure 1.
Figure 6: Contraction graph G
the tree assumption holds for τ levels. An example of the decision subgraph is
shown in Figure 7. Finally, we say that the node v (`) is unsatisfied if it is connected
to a noisy pattern node. Recall that Pc denotes the average probability of a super
constraint node correcting a single error among its neighbors.
Theorem 5 Assume that G̃ is chosen randomly according to the degree distribution pair λ̃ and ρ̃. Then, as the number of vertices of G grows large, Algorithm 3 will succeed in correcting all errors with high probability as long as
e (1 − Pc ρe(1 − z)) < z for z ∈ (0, pe ).
pe λ
It is worth to make a few remarks about Theorem 5. First, the condition given in
Theorem 5 can be used to calculate the maximal fraction of errors Algorithm 3
e
can correct. For instance, for the degree distribution pair (λ(z)
= z 2 , ρe(z) = z 5 ),
the threshold is p∗e ≈ 0.429, below which Algorithm 3 corrects all the errors with
high probability. Second, the predicted threshold by Theorem 5 is based on the
pessimistic assumption that a cluster can only correct a single error. Third, for a
e and ρe, as
e constructed randomly according to given degree distributions λ
graph G,
the graph size grows the decision subgraph becomes a tree with probability close
to 1. Hence, it can be shown (see, for example Richardson and Urbanke, 2008)
that the recall performance for any such graphs will be concentrated around the
average case given by Theorem 5.
6
Pattern Retrieval Capacity
Before discussing the the pattern retrieval capacity, we should note that the number of patterns C does not have any effect on the learning or recall algorithm except for its obvious influence on the learning time. More precisely, as long as the
17
Figure 7: The decision subgraph of depth 2 for the third edge (from left) in Figure 6.
(sub)patterns lie on a subspace, the learning Algorithm 1 yields a matrix W that
is orthogonal to all the patterns of the training set. Similarly, in the recall phase,
algorithms 2 and 3 only need to compute W · e for the noise vector e.
Remember that the retrieval capacity is defined as the maximum number of
patterns that a neural of size n is able to store. Hence, in order to show that the
pattern retrieval capacity of our method is exponential in n, we need to demonstrate
that there exists a training set X with C patterns of length n for which C ∝ arn ,
for some a > 1 and 0 < r < 1.
Theorem 6 Let X be a C × n matrix formed by C vectors of length n with entries
from Q. Furthermore, let k = brnc for some 0 < r < 1 and k < min` (n` ).
Then, there exists a set of vectors of size C = Ω(arn ) with some a > 1 such that
rank(X ) = k < n. Moreover, Algorithm 1 can learn this set.
The proof is by construction. This construction can be used to synthetically generate patterns that lie in a subspace.
7
Experimental Results
In this section we evaluate the performance of our proposed algorithms over synthetic and natural datasets 5 .
5
The codes used in this paper are all available online at http://goo.gl/ifR14t.
18
7.1
Synthetic Scenario
A systematic way to generate patterns satisfying a set of linear constraints is outlined in the proof of Theorem 6. This proof is constructive and provides an easy
way to randomly sample patterns with linear constraints. In our simulations, we
consider a neural network in which each pattern neuron is connected to approximately 5 clusters. The number of connections should be neither too small (to ensure
information propagation) nor too big (to adhere to the sparsity requirement).
In the learning phase, Algorithm 1 is performed (in parallel) for each cluster in
order to find the connectivity matrix W . In the recall phase (and at each round),
a pattern x is sampled uniformly at random from the training set. Then, each of
its entries are corrupted with ±1 additive noise independently with probability pe .
Algorithm 3 is subsequently used to denoise the corrupted patterns. We average
out this process over many trials to calculate the error rate and compare it to the
analytic bound derived in Theorem 5.
7.1.1
Learning Results
The left and right panels in Figure 8 illustrate the degree distributions of pattern
and constraint neurons, respectively, over an ensemble of 5 randomly generated
datasets. The network size is n = 400, which is divided into 50 overlapping clusters, each of size around 40, i.e., n` ' 40 for ` = 1, . . . , 50. Each pattern neuron
is connected to 5 clusters, on average. The horizontal axis shows the normalized degree of pattern (resp., constraint) neurons and the vertical axis represents
the fraction of neurons with the given normalized degree. The normalization is
done with respect to the number of pattern (resp., constrain) neurons in the cluster. The parameters for the learning algorithm are αt ∝ 0.95/t, η = 0.75/αt and
θt ∝ 0.05/t.
Figure 9 illustrates the same results for a network of size n = 960, which is
divided into 60 clusters, each with size 80, on average. The learning parameters
are the same as before, i.e., αt ∝ 0.95/t, η = 0.75/αt and θt ∝ 0.05/t, and
each pattern neuron is connected to 5 clusters on average. Note that the overall
normalized degrees are smaller compared to the case of n = 400, which indicates
sparser clusters on average. In almost all cases that we have tried, the learning
phase converges within two learning iterations, i.e., by going over the data set only
twice.
7.1.2
Recall Results
Figure 10 illustrates the performance of the recall algorithm. The horizontal and
vertical axes represent the average fraction of erroneous neurons and the final Pat19
0.3
Degree distribution
Degree distribution
0.3
0.2
0.1
0
0.2
0.1
0
0
0.2 0.4 0.6 0.8
Normalized degree
1
0
(a) Pattern neuron degrees
0.2 0.4 0.6 0.8
Normalized degree
(b) Constraint neuron degrees
Figure 8: Pattern and constraint neuron degree distributions for n = 400, L = 50,
and an average of 20 constraints per cluster. The learning parameters are αt ∝
0.95/t, η = 0.75/αt and θt ∝ 0.05/t.
tern Error Rate (PER), respectively. The performance is compared against the theoretical bound derived in Theorem 5 as well as the the two constructions proposed
by Kumar et al. (2011) and Salavati and Karbasi (2012). The parameters used for
this simulation are n = 400, L = 50 and ϕ = 0.82. For the non-overlapping
clusters approach proposed by Salavati and Karbasi (2012), the network size is
n = 400 with 4 clusters in the first level and one cluster in the second level (identical to their simulations). The convolutional neural network proposed in this paper
clearly outperforms the prior art. Note that for the theoretical estimates used in
Figure 10, we both calculated the probability of correcting a single error by each
cluster Pc (via the lower bound in Theorem 3), and by fixing it to Pc = 1. The
corresponding curves in Figure 10 show that the later estimate is tighter, i.e., when
each cluster can correct a single error with probability close to 1.
Figure 11 shows the final PER for the network with n = 960 and L = 60
clusters. Comparing the PER with that of a network with n = 400 neurons and
L = 50 clusters, we witness a degraded performance. At first glance this might
seem surprising as we increased both the network size and the number of clusters.
However, the key point in determining the performance of Algorithm 3 is not the
number of clusters but rather the size of the clusters and the cluster nodes degree
distribution ρe(x). In the network with n = 960, we have around 80 pattern neurons
per cluster, while in the network with n = 400 we have around n = 40 neurons
20
1
0.3
Degree distribution
Degree distribution
0.3
0.2
0.1
0
0.2
0.1
0
0
0.2 0.4 0.6 0.8
Normalized degree
1
0
(a) Pattern neurons degrees
0.2 0.4 0.6 0.8
Normalized degree
(b) Constraint neurons degrees
Figure 9: Pattern and constraint neuron degree distributions for n = 960, L = 60,
and an average of 40 constraints per cluster. The learning parameters are αt ∝
0.95/t, η = 0.75/αt and θt ∝ 0.05/t.
per cluster. Clearly, by increasing the network size without increasing the number of clusters, the chance of a cluster experiencing more than one error increases
(remember, each cluster can correct a single error). This in turn results in an inferior performance. Hence, increasing the network size helps only if the number of
clusters are increased correspondingly.
7.2
Real Datasets
So far, we have tested our proposed method over synthetic datasets where we generated patterns in such a way that they all belong to a subspace. In many real
datasets (e.g., images and natural sounds), however, patterns rarely form a subspace. Rather, due to their common structures, they come very close to forming
one. The focus of this section is to show how our proposed method can be adapted
to such scenarios.
More specifically, let X denote a dataset of C patterns of length n. Here we
assume that patterns are all vectorized and form the rows of the matrix X . The
eigenvalues of the correlation matrix A = X > X indicate how close the patterns are
to a subspace. Note that A is a positive semidefinite matrix, so all eigenvalues are
non-negative. In particular, if we have an eigenvalue 0 with positive multiplicity,
then the patterns belong to a subspace. Similarly, if we have a set of eigenvalues
21
1
Final pattern error rate
1
0.8
0.6
0.4
No clustering†
Non-overlapping clusters‡
Convolutional-Simulation
Convolutional-Theory
Convolutional-Theory (Pc = 1)
0.2
0
0.00
†:
0.03
0.05
0.07
0.10
pe
0.12
0.15
0.17
0.20
0.22
(Kumar et al., 2011), ‡ : (Salavati and Karbasi, 2012)
Figure 10: Recall error rate along with theoretical bounds for different architectures
of network with n = 400 pattern neurons and L = 50 clusters. We compare the
performance of our method with two other constructions where either no notion of
cluster was considered (Kumar et al., 2011) or no overlaps between clusters was
assumed (Salavati and Karbasi, 2012).
22
Final pattern error rate
1
0.8
0.6
n = 400-Simulation
n = 400-Theory
n = 960-Simulation
n = 960-Theory
0.4
0.2
0
0.00
0.05
0.10
pe
0.15
0.20
0.25
Figure 11: Recall error rate and the theoretical bounds for different architectures
of network with n = 960 and n = 400 pattern neurons and L = 60 and L = 50
clusters, respectively..
all close to zero, then the patterns are close to a subspace of the n-dimensional
space. Figure 12 illustrates the eigenvalue distribution of the correlation matrix for
a dataset of C = 10000 gray-scale images of size 32×32, sampled from 10 classes
of the CIFAR-10 dataset (Krizhevsky and Hinton, 2009). Each image is quantized
to 16 levels. Based on our notation, n = 1024 and Q = 16. As evident from the
figure, almost half of the 1024 eigenvalues are less than 0.001, suggesting that the
patterns are very close to a subspace.
7.2.1
Simulation Scenario
In order to adapt our method to this new scenario where patterns approximately
belong to a subspace, we need to slightly modify the learning and the recall algorithms. We use CIFAR-10 datase as the running example, however, the principles
described below can be easily applied to other datasets.
To start, we first alter the way patterns are represented in such a way that is
makes them easier to learn for our algorithm. More specifically, since the images
are quantized to 16 levels, we can represent a 16-level pixel with 4 bits. As such,
instead of having 1024 integer-valued pattern neurons to represent the patterns in
the dataset, we will have 4096 binary pattern neurons. We adopt this modified
description as it facilitates the learning process.
We then apply Algorithm 1 as before to learn the patterns in the dataset. Obviously, since the patterns do not exactly form a subspace, we cannot expect the
23
101
Eigenvalue
10−1
10−3
10−5
0
100
200
300
400 500 600 700
Eigenvalue’s index
800
900 1,000
Figure 12: The eigenvalues of a dataset with 1000 gray-scale images of size 32 ×
32, uniformly sampled from 10 classes of the CIFAR-10 dataset (Krizhevsky and
Hinton, 2009).
algorithm to finish with a weight vector w that is orthogonal to all the patterns.
Nevertheless, by applying the learning algorithm, we will have a weight vector
whose projection on the patterns is rather small. Following the same procedure
as before, we obtain L neural graphs, W (1) , . . . , W (L) , for each of the L clusters.
Note again that W (i) ’s are approximately (rather than exactly) orthogonal to the
(sub-)patterns.
Our main observation is the following. We can interpret the deviation from
the subspace as noise. Consequently, if we apply the intra-cluster recall method
(Algorithm 2) to the patterns, we can find out what the network has actually learned
in response to original patterns from the dataset X . In other words, Algorithm
2 identifies the projection of original patterns to a subspace X 0 . Hence, all the
learned patterns are orthogonal to the connectivity matrix W . This idea is shown in
figure 13, where we have the original image (left), the quantized version (middle),
and the image learned by the proposed algorithm. It is worth observing that what
the network has learned focuses more on the actual objects rather than unnecessary
details.
For the recall phase, the approach is similar to before: we are given a set of
noisy patterns and the goal is to retrieve the correct versions. In our simulations,
we assume that the noise is added to the learned patterns (see above) but we can
also consider the situation where noise is added to the quantized patterns.
24
(a) Original image
(b) Quantized image
(c) Learned image
Figure 13: Original vs. learned images
7.2.2
Learning Results
Figure 14 illustrates the average cost (defined by E(w(`) (t)) in Section 4.1) for
learning one constraint vector versus the number of iterations. In this example, the
learning parameters are α0 = 0.95/t, η = 1 and θt = 0.01/t. The considered
neural netowrk has n = 4096 pattern neurons and L = 401 clusters of size 100.
The learning process terminates if a) an orthogonal weight vector is found or b)
200 iterations is done.
Figure15 illustrates the required number of iterations of Algorithm 1 so that a
weight vector orthogonal the patterns in the dataset X 0 is obtained. As we see from
the figure, in the majority of the cases, one pass over the dataset is enough. As
before, we have α0 = 0.95/t, η = 1 and θt = 0.01/t.
Furthermore, we have also uploaded a short video clip of the learning algorithm
in action (i.e., iteration by iteration) for a few sample images from the dataset. The
clip is available through the following link: http://goo.gl/evcNOh.
7.2.3
Recall Results
Figures 16 and 17 show the recall error rate as we increase the noise level for the
neural network used in Sec 7.2.2. The update thresholds for the recall algorithm are
set to ϕ = 0.85 and ψ = 0.005. The inter-module recall procedure (Algorithm 3)
is performed at most 80 times and the corresponding error rates are calculated by
evaluating the difference between the final state of pattern neurons (after running
25
Learning cost
0.006
0.004
0.002
0.000
0
3
6
9
12
15
18
21
24
27
t
Number of converged vectors
Figure 14: Average cost versus time for learning a weight vector in a network with
n = 4096 pattern neurons and L = 401 clusters. The size of clusters is set to 100
with (around) 50 constraints in each cluster.
15,000
10,000
5,000
0
0
15
30
45
60
75
Required number of iterations
90
Figure 15: Number of the iterations required for Algortihm 1 to learn a vector
orthogonal to the patterns in the dataset X 0 , in a network with n = 4096 pattern
neurons and L = 401 clusters of size 100 and (around) 50 constraints in each
cluster.
26
105
Final pattern error rate
1
0.8
0.6
0.4
C = 5000
C = 10000
C = 50000
0.2
0
0.000
0.002
0.004
pe
0.006
0.008
Figure 16: Recall error rate for a network with n = 4096 pattern neurons and
L = 401 clusters, with cluster size equal to n` = 100. The proposed recal method
was applied to a dataset of 10000 images sampled from the CIFAR-10 database
Algorithm 3) and the noise-free patterns in the dataset X 0 .
Figure 18 illustrates a few instances of the recalled images. In this figure, we
have the original images (first column), the learned images (second column), the
noisy versions (third column), and the recalled images (forth column). The figure
also shows the input and the output Signal to Noise Ratios (SNR) for each example.
Note that in all examples the SNR increases as we apply our recall algorithm.
For this example we chose ϕ = 0.95 and ψ = 0.025. We have also uploaded a
short video clip of the recall algorithm in action for a few sample images from the
dataset, which can be found on http://goo.gl/EHJfds.
8
Analysis
This section contains the proofs of all theorems and technical lemmas we used in
the paper.
8.1
Proof of Lemma 1
We proceed by induction. To this end, assume kw(`) (t)k2 > 0 and let
!
(`)
(`)
ẁ (t) = w (t) − αt y
(`)
y (`) (t)w(`) (t)
(t) x (t) −
.
kw(`) (t)k22
(`)
27
Symbol error rate
0.100
Input BER
C = 5000-Simul.
C = 10000-Simul.
C = 50000-Simul.
0.050
0.000
0.000
0.020
0.040
0.060
0.080
0.100
0.120
pe
Figure 17: Symbol error rates for a network with n = 4096 pattern neurons and
L = 401 clusters, applied to a dataset of 10000 images sampled from the CIFAR10 database.
Note that
kẁ(`) (t)k22 = kw(`) (t)k22 +αt2 y (`) (t)2 kx(`) (t)−
y (`) (t)w(`) (t) 2
k ≥ kw(`) (t)k22 > 0.
kw(`) (t)k22 2
Now,
kw(`) (t + 1)k22 = kẁ(`) (t)k2 + αt2 η 2 kΓ(w(`) (t), θt )k2 − 2αt ηhΓ(w(`) (t), θt ), ẁ(`) (t)i
≥ kẁ(`) (t)k22 + αt2 η 2 kΓ(w(`) (t), θt )k2 − 2αt ηkΓ(w(`) (t), θt )k2 kẁ(`) (t)k2
=
kẁ(`) (t)k2 − αt ηkΓ(w(`) (t), θt )k2
2
Thus, in order to have kw(`) (t + 1)k2 > 0, we must have that
kẁ(`) (t)k2 − αt ηkΓ(w(`) (t), θt )k2 > 0.
Given that
kΓ(w(`) (t), θt )k2 ≤ kw(t)k2 ≤ kẁ(`) (t)k2 ,
it is sufficient to have αt η < 1 in order to achieve the desired inequality. This
proves the lemma.
8.2
Proof of Theorem 2
Let us define the correlation matrix for the sub-patterns that lie within the domain
of cluster ` as follows
A(`) := E{x(`) (x(`) )T |x ∈ X }.
28
Also, let us define
(`)
At := x(`) (t)(x(`) (t))> .
(`)
Hence, we have A(`) = E(At ). Furthermore, recall the learning cost function
C
2
1 X
hw(`) (t), xµ i .
C µ=1
E(t) = E(w(`) (t)) =
From Alg. 1 we have
(`)
(`)
w (t+1) = w (t)−αt y
(`)
y (`) (t)w(`) (t)
(t) x (t) −
kw(`) (t)k22
!
(`)
!
(`)
+ ηΓ(w (t), θt ) .
Let
Y (`) (t) = Ex (X (`) w(`) (t)),
where Ex (·) is the expectation over the choice of pattern x(t) and X (`) is the matrix
of all the sub-patterns corresponding to cluster ` in the dataset. Thus, we will have
Y (`) (t + 1) = Y (`) (t) 1 + αt
w(`) (t)
Noting that E(t) =
1
(`) (t)k2 ,
2
C kY
E(t + 1) = E(t) 1 + αt
+
>
A(`) w(`) (t)
kw(`) (t)k22
(`) (`) (`)
(`)
(`)
− αt X A w (t) + ηX Γ(w (t), θt ) .
we obtain
>
w(`) (t)
2
A(`) w(`) (t)
kw(`) (t)k22
αt2
kX (`) A(`) w(`) (t) + ηX (`) Γ(w(`) (t), θt )k22
C
w(`) (t)
w(`) (t)
− 2αt 1 + αt
− 2αt 1 + αt
>
>
2
A(`) w(t)
(`)
(`)
(`)
w (t)
A
w (t)
kw(`) (t)k22
>
>
A(`) w(`) (t)
(`)
(`)
(`)
η w (t) A Γ(w (t), θt )
kw(`) (t)k22
29
By omitting all the second order terms O(αt2 ), we obtain
>
w(`) (t)
E(t + 1) ' E(t) 1 + 2αt
− 2αt
w(`) (t)
A(`) w(`) (t)
kw(`) (t)k22
>
A(`)
2
>
w(`) (t) + η w(`) (t)
A(`) Γ(w(`) (t), θt )
>
(`) (t)
(`) w (`) (t)
2
>
w
A
A(`) w(`) (t) −
E(t) − 2αt w(`) (t)
E(t)
2
(`)
kw (t)k2
>
=
A(`) Γ(w(`) (t), θt )
− 2αt η w(`) (t)
(7)
Note that
αt ηk w(`) (t)
>
A(`) Γ(w(`) (t), θt )k2 ≤ αt ηkw(`) (t)k2 kA(`) k2 kΓ(w(`) (t), θt )k2
√
≤ αt ηkw(`) (t)k2 kA(`) k2 ( nθt ).
Since we have θt = Θ(αt ) and that
>
αt ηk w(`) (t)
A(`) Γ(w(`) (t), θt )k2 = O(αt2 )
we can further simplify (7) as follows
E(t + 1) ' E(t) − 2αt w(`) (t)
>
A(`)
2
>
w(`) (t)
w(t) −
A(`) w(`) (t)
kw(`) (t)k22
Thus, in order to show that the algorithm converges, we need to show that
(`)
w (t)
>
A(`)
2
w(`) (t) −
>
w(`) (t)
A(`) w(`) (t)
kw(`) (t)k22
E(t) ≥ 0
which in turn implies E(t + 1) ≤ E(t). By noting that
E(t) = w(`) (t)
>
A(`) w(`) (t),
we must show that
w
(`)
>
A
(`)
2
w
(`)
≥
w
30
(`)
>
(`)
A w
(`)
2
/kw(`) k22 .
E(t) .
The left hand side is kA(`) w(`) k22 . For the right hand side, we have
k w(`)
>
A(`) w(`) k22
≤
kw(`) k22
kw(`) k22 kA(`) w(`) k22
= kA(`) w(`) k22 .
2
(`)
kw k2
The above inequality shows that E(t + 1) ≤ E(t), which readily implies that for
sufficiently large number of iterations, the algorithm converges to a local minimum
ŵ(`) where E(ŵ(`) ) = 0. From Lemma 1 we know that kŵ(`) k2 > 0. Thus, the
only solution for E(ŵ(`) ) = kX (`) ŵ(`) k22 = 0 is for ŵ(`) to be orthogonal to the
patterns in the data set.
8.3
Proof of Theorem 3
In the case of a single error, we can easily show that the noisy pattern neuron will
always be updated towards the correct direction in Algorithm 2. For simplicity,
let’s assume the first pattern neuron of cluster ` is the noisy one. Furthermore, let
z (`) = [1, 0, . . . , 0] be the noise vector. Denoting the ith column of the weight
(`)
matrix by Wi , we will have
(`)
(`)
y (`) = sign(z1 W1 ) = z1 sign(W1 ).
(`)
Hence, in Algorithm 2 we obtain g1 = 1 > ϕ. This means that the noisy node
gets updated towards the correct direction.
Therefore, the only source of error would be a correct pattern neuron getting
(`)
updated mistakenly. Let Pi denote the probability that a correct pattern neuron xi
(`)
gets updated. This happens if |gi | > ϕ. For ϕ → 1, this is equivalent to having
(`)
(`)
(`)
hWi , sign(z1 W1 )i = kWi k0 .
(`)
However, in cases where the neighborhood of xi is different from the neighborhood of x1 among the constraint nodes we have
(`)
(`)
(`)
hWi , sign(W1 )i < kWi k0 .
(`)
(`)
More specifically, let N (xi ) indicate the set of neighbors of xi among constraint
neurons in cluster `. Then in the case where
(`)
(`)
(`)
N (xi ) ∩ N (x1 ) 6= N (xi ),
(`)
(`)
there are non-zero entries in Wi while W1 is zero, and vice-versa. Therefore,
(`)
(`)
(`)
by letting Pi0 to be the probability of N (xi ) ∩ N (x1 ) = N (xi ), we note that
Pi ≤ Pi0 .
31
The above inequality help us obtain an upper bound on Pi , by bound Pi0 . Since
there is only one noisy neuron x1 , we know that, on average, this node is connected
to d¯` constraint neurons which implies that the probability of xi and x1 sharing
exactly the same neighborhood is:
Pi0
=
d¯`
m`
!di
,
where di is the degree of neuron xi . By taking the average over the pattern neurons, we obtain the following bound on the average probability of a correct pattern
neuron being mistakenly updated:
Pe0
X (`)
X (`)
Λdi
Λdi Pi0 =
=
di
di
d¯`
m`
!di
(`)
=Λ
d¯`
m`
!
,
(`) i
i Λi x
is the degree distribution polynomial. Therefore, the
where Λ(`) (x) =
(`)
probability of correcting one noisy input is lower bounded by Pc ≥ (1 − Pe0 )n` −1 ,
i.e.,
!!n` −1
d¯`
(`)
(`)
.
Pc ≥ 1 − Λ
m`
P
This proves the theorem.
8.4
Proof of Lemma 4
Without loss of generality, suppose the first pattern neuron is contaminated by an
external error +1, i.e., z (`) = [1, 0, . . . , 0]. As a result
(`)
y (`) = sign W (`) (x(`) + z (`) ) = sign W x(`) + W z (`) = sign W (`) z (`) = sign W1
(`)
where Wi is the ith column of W (`) . Hence, the feedback transmitted by the
(`)
constraint neurons is sign(W1 ). As a result, decision parameters of pattern neuron
(`)
i, i.e., gi in Algorithm 2, will be
(`)
gi
=
(`)
(`)
(`)
(`)
hsign(W1 ), Wi i
.
hsign(Wi ), Wi i
(`)
(`)
(`)
Note that the denominator is simply kWi k0 = hsign(Wi ), Wi i. By assumption, no two pattern neurons in G(`) share the exact same set of neighbors. Therefore, for all i, j ∈ {1, . . . n` } such that i 6= j, there is at least a non-zero entry, say
(`)
(`)
(`)
(`)
k, in Wj for which Wik = 0. Thus, we have gi = 1 if i = 1 and gi < 1 if
i > 1 As a result, for ϕ → 1, only the first neuron (i.e., the noisy one) will update
its value towards the correct state.
32
,
8.5
Proof of Theorem 5
The proof is, in spirit, similar to Theorem 3.50 of (Richardson and Urbanke, 2008).
Consider a message transmitted over an edge from a given cluster node v (`) to a
given noisy pattern neuron at iteration t of Algorithm 3. This message will be a
failure, indicating that the super constraint node being unable to correct the error,
if
1. the super constraint node v (`) receives at least one error message from its
other neighbors among pattern neurons. This event happens it is connected
to more than one noisy pattern neuron.
2. the super constraint node v (`) does not receive an error message from any of
its other neighbors but is unable to correct the single error in the given noisy
neuron. This event happens with probability 1 − Pc .
Let us denote the probability of the above failure message by π (`) (t) and the average probability that a pattern neuron sends an erroneous message to a neighboring
cluster node by z(t). Then, we have
π (`) (t) = 1 − Pc (1 − z(t))d` −1 ,
e
where de` is the degree of the super constraint neuron v (`) in the contracted graph
e Similarly, let π(t) denote the average probability that a super constraint node
G.
sends a message declaring the violation of at least one of its constraint neurons.
Then we have
π(t) = Ede (π (`) (t)) =
`
X
ρei (1 − Pc (1 − z(t))d` −1 ) = 1 − Pc ρe(1 − z(t)).
e
i
Now consider the message transmitted from a given pattern neuron xi with degree
di to a given super constraint node v (`) in iteration t + 1 of Algorithm 3. This
message will indicate a noisy pattern neuron if the pattern neuron was noisy in the
first place (with probability pe ) and all of its other neighbors among super constraint nodes has sent a violation message in iteration t. Therefore, the probability
of this node being noisy will be z(0)π(t)di −1 where z(0) = pe . Hence, the average
probability that a pattern neuron remains noisy at (t + 1)-th iteration is
z(t + 1) = pe
X
e i π(t)i−1 = pe · λ(π(t))
e
e − Pc ρe(1 − z(t))).
λ
= pe · λ(1
i
Note that the denoising operation will be successful if z(t + 1) < z(t), ∀t. Theree − Pc ρe(1 − z)) < z for
fore, we must look for the maximum pe such that pe λ(1
z ∈ [0, pe ].
33
8.6
Proof of Theorem 6
The proof is based on construction: we build a data set X with the required properties such that it can be memorized by the proposed neural network.
Consider a matrix G ∈ Rk×n with rank k = rn where 0 < r < 1 is chosen
such that k < min` (n` ). Let the entries of G be non-negative integers between 0
and γ − 1. Here we assume that γ ≥ 2.
We start constructing the patterns in the data set as follows. We pick a random
vector u ∈ Rk with integer-valued-entries between 0 and υ − 1 where υ ≥ 2.
We set the pattern x ∈ X to be x = G> u if all the entries of x are between 0
and Q − 1. Since both u and G have only non-negative entries, all entries in x
are non-negative. However, we need to design G such that all entries of G> u be
less than Q. Let gj be the j-th column of G. Then, the j-th entry of x is equal to
xj = hu, gj i. Therefore,
xj = u> gj ≤ dj (γ − 1)(υ − 1)
Let d∗ = minj dj . We can choose γ, υ and d∗ such that
Q − 1 ≥ d∗ (γ − 1)(υ − 1)
which in turn ensures that all entries of x are less than Q. Furthermore, we have
selected k in such a way that k < min` (n` ). As a result we are sure that the
set of sub-patterns of the dataset X form a subspace with dimension k in an n` dimensional space. Since there are υ k vectors u with integer entries between 0 and
υ −1, we have υ k = υ rn patterns forming X . This implies that the storage capacity
C = υ rn is an exponential number in n as long as υ ≥ 2.
9
Conclusions and Final Remarks
In this paper, we proposed the first neural network structure that learns an exponential number of patterns (in the size of the network) and corrects up to a linear
fraction of errors. The main observation we made was that natural patterns seem to
have inherent redundancy and we proposed a framework to captured redundancies
that appear in the form of linear (or close to linear) constraints. Our experimental
results also reveal that our learning algorithm can be seen as a feature extraction
method, tailored for patterns with such constraints. Extending this line of thought
through more sophisticated feature extraction approaches, and in light of recent
developments in deep belief networks (Jarrett et al., 2009; Coates and Ng, 2011;
Le et al., 2010; Vincent et al., 2008; Ngiam et al., 2011), is an interesting future
direction to pursue.
34
References
Emmanuel J. Candès and Terence Tao. Near-optimal signal recovery from random projections: Universal encoding strategies? IEEE Transactions on Information Theory, 52
(12):5406–5425, 2006.
Adam Coates and Andrew Ng. The importance of encoding versus training with sparse
coding and vector quantization. In Lise Getoor and Tobias Scheffer, editors, International Conference on Machine Learning (ICML), pages 921–928, New York, NY, USA,
2011. ACM.
D. L. Donoho. Compressed sensing. IEEE Transactions on Information Theory, 52(4):
1289–1306, 2006.
David L. Donoho, A. Maleki, and A. Montanari. Message-passing algorithms for compressed sensing. Proceedings of the National Academy of Sciences (PNAS), 106(45):
18914–18919, 2009.
Vincent Gripon and Claude Berrou. Sparse neural networks with large learning diversity.
IEEE Transactions on Neural Networks, 22(7):1087–1096, 2011.
Donald O. Hebb. The Organization of Behavior: A Neuropsychological Theory. Wiley &
Sons, New York, 1949.
John J. Hopfield. Neural networks and physical systems with emergent collective computational abilities. Proc. Natl. Acad. Sci. U.S.A., 79(8):2554–2558, 1982.
Stanislaw Jankowski, Andrzej Lozowski, and Jacek M. Zurada. Complex-valued multistate neural associative memory. IEEE Transactions on Neural Networks and Learning
Systems, 7(6):1491–1496, 1996.
Kevin Jarrett, Koray Kavukcuoglu, Marc’Aurelio Ranzato, and Yann LeCun. What is the
best multi-stage architecture for object recognition? In IEEE International Conference
on Computer Vision (ICCV), pages 2146–2153, 2009.
Amin Karbasi, Amir Hesam Salavati, and Amin Shokrollahi. Iterative learning and denoising in convolutional neural associative memories. In International Conference on
Machine Learning (ICML), pages 445–453, 2013.
Alex Krizhevsky and Geoffrey Hinton. Learning multiple layers of features from tiny
images. Master’s thesis, Department of Computer Science, University of Toronto, 2009.
K. Raj Kumar, Amir Hesam Salavati, and Mohammad A. Shokrollah. Exponential pattern
retrieval capacity with non-binary associative memory. In IEEE Information Theory
Workshop (ITW), pages 80–84, 2011.
K. Raj Kumar, Amir Hesam Salavati, and Mohammad A. Shokrollahi. A non-binary associative memory with exponential pattern retrieval capacity and iterative learning. IEEE
Transaction on Neural Networks and Learning systems, 2014. To appear in.
35
Quoc V. Le, Jiquan Ngiam, Zhenghao Chen, Daniel Jin hao Chia, Pang Wei Koh, and
Andrew Y. Ng. Tiled convolutional neural networks. In Advances in Neural Information
Processing Systems (NIPS), pages 1279–1287, 2010.
Donq-Liang Lee. Improvements of complex-valued Hopfield associative memory by using
generalized projection rules. IEEE Transactions on Neural Networks, 17(5):1341–1347,
2006.
Michael Luby, Michael Mitzenmacher, Mohammad Amin Shokrollahi, and Daniel A.
Spielman. Efficient erasure correcting codes. IEEE Transactions on Information Theory, 47(2):569–584, 2001.
Robert J. McEliece, Edward C. Posner, Eugene R. Rodemich, and Santosh S. Venkatesh.
The capacity of the hopfield associative memory. IEEE Transactions on Information
Theory, 33(4):461–482, 1987.
Mehmet Kerem Muezzinoglu, Cuneyt Guzelis, and Jacek M. Zurada. A new design method
for the complex-valued multistate hopfield associative memory. IEEE Transactions on
Neural Networks, 14(4):891–899, 2003.
Jiquan Ngiam, Pang Wei Koh, Zhenghao Chen, Sonia A. Bhaskar, and Andrew Y. Ng.
Sparse filtering. In John Shawe-Taylor, Richard S. Zemel, Peter L. Bartlett, Fernando
C. N. Pereira, and Kilian Q. Weinberger, editors, Advances in Neural Information Processing Systems (NIPS), pages 1125–1133, 2011.
Erkki Oja and Juha Karhunen. On stochastic approximation of the eigenvectors and eigenvalues of the expectation of a random matrix. Math. Analysis and Applications, 106:
69–84, 1985.
Erkki Oja and Teuvo Kohonen. The subspace learning algorithm as a formalism for pattern recognition and neural networks. In IEEE International Conference on Neural
Networks, volume 1, pages 277–284, 1988.
P. Peretto and J. J. Niez. Long term memory storage capacity of multiconnected neural
networks. Biological Cybernetics, 54(1):53–64, 1986.
Tom Richardson and Ruediger Urbanke. Modern Coding Theory. Cambridge University
Press, New York, NY, USA, 2008.
Amir Hesam Salavati. Coding theory and neural associative memories with exponential pattern retrieval capacity. PhD thesis, Ecole Polytechnique federale de Lausanne (EPFL), 2014. URL http://algo.epfl.ch/~amir/PhD_Thesis_
Salavati.pdf.
Amir Hesam Salavati and Amin Karbasi. Multi-level error-resilient neural networks. In
IEEE International Symposium on Information Theory (ISIT), pages 1064–1068, 2012.
36
Richard Socher, Jeffrey Pennington, Eric H Huang, Andrew Y Ng, and Christopher D Manning. Semi-supervised recursive autoencoders for predicting sentiment distributions. In
Proceedings of the Conference on Empirical Methods in Natural Language Processing,
pages 151–161. Association for Computational Linguistics, 2011.
R. Tanner. A recursive approach to low complexity codes. IEEE Transactions on Information Theory, 27(5):533–547, 1981.
Joel A. Tropp and Stephen J. Wright. Computational methods for sparse solution of linear
inverse problems. Proceedings of the IEEE, 98(6):948–958, 2010.
Santosh S Venkatesh. Connectivity versus capacity in the hebb rule. In Theoretical Advances in Neural Computation and Learning, pages 173–240. Springer, 1994.
Santosh S. Venkatesh and Demetri Psaltis. Linear and logarithmic capacities in associative
neural networks. IEEE Transactions on Information Theory, 35(3):558–568, 1989.
Pascal Vincent, Hugo Larochelle, Yoshua Bengio, and Pierre-Antoine Manzagol. Extracting and composing robust features with denoising autoencoders. In International Conference on Machine Learning (ICML), pages 1096–1103, New York, NY, USA, 2008.
ACM.
Lei Xu, Adam Krzyzak, and Erkki Oja. Neural nets for dual subspace pattern recognition
method. International Journal of Neural Systems, 2(3):169–184, 1991.
37
Algorithm 1 Iterative Learning
Input: Dataset X with |X | = C, stopping point ε.
Output: w(`)
1 P
(`)
(`)
2
1: while C
x∈X |hx (t), w (t)i| > ε do
2:
Choose pattern x(t) uniformly at from X .
3:
Compute y (`) (t) = hx(`) (t), w(`) (t)i.
4:
Update w(`) (t) as follows
w(`) (t) = w(`) (t−1)−αt
5:
6:
y (`) (t)w(`) (t − 1)
y (`) (t) x(`) (t) −
kw(`) (t − 1)k22
!
!
+ ηΓ(w(`) (t − 1), θt )
t ← t + 1.
end while
Algorithm 2 Intra-cluster Error Correction
Input: Training set X , threshold ϕ, iteration tmax
(`) (`)
(`)
Output: x1 , x2 , . . . , xn`
1: for t = 1 → tmax do
(`)
2:
Forward iteration:
Calculate the weighted input sum hi
Pn`
(`) (`)
(`)
(`)
(`) 4
j=1 Wij xj , for each neuron yi and set yi = sign(hi ).
3:
(`)
Backward iteration: Each neuron xj computes
(`)
gj
4:
(`) (`)
i=1 Wij yi
.
Pm`
(`)
i=1 |Wij |
Pm`
=
Update the state of each pattern neuron j according to
(`)
(`)
(`)
xj = xj − sign(gj )
(`)
only if |gj | > ϕ.
5:
t←t+1
6: end for
38
=
Algorithm 3 Sequential Peeling Algorithm
e G(1) , G(2) , . . . , G(L) .
Input: G,
Output: x1 , x2 , . . . , xn
1: while There is an unsatisfied v (`) , for ` = 1, . . . , L do
2:
for ` = 1 → L do
3:
If v (`) is unsatisfied, apply Algorithm 2 to cluster G(l) .
4:
If v (`) remained unsatisfied, revert the state of pattern neurons connected
to v (`) to their initial state. Otherwise, keep their current states.
5:
end for
6: end while
7: Declare x1 , x2 , . . . , xn if all v (`) ’s are satisfied. Otherwise, declare failure.
39
Learned (c)
(a)
Original (b)
SNRI : 2.10
image
image
(d) SNRO
2.84
:
(a)
Original (b)
Learned (c)
SNRI : 2.15
image
image
(d) SNRO
2.93
:
(a)
Original (b)
Learned (c)
SNRI : 2.07
image
image
(d) SNRO
3.16
:
(a)
Original (b)
Learned (c)
SNRI : 2.09
image
image
(d) SNRO
2.96
:
(a)
Original (b)
Learned (c)
SNRI : 2.08
image
image
(d) SNRO
2.81
:
Figure 18: Examples of the learning and recall phase for images sampled from
CIFAR-10. Here, SNRI and SNRO denote the input and output SNR’s, respectively.
40
| 9cs.NE
|
1
DNA-GA: A New Approach of Network
Performance Analysis
arXiv:1512.05429v2 [cs.IT] 26 Sep 2017
Ming Ding, Data 61, Australia {[email protected]}
David López Pérez, Bell Labs Alcatel-Lucent, Ireland {[email protected]}
Guoqiang Mao, The University of Technology Sydney and Data 61, Australia {[email protected]}
Zihuai Lin, The University of Sydney, Australia {[email protected]}
Abstract—In this paper, we propose a new approach of
network performance analysis, which is based on our previous
works on the deterministic network analysis using the Gaussian approximation (DNA-GA). First, we extend our previous
works to a signal-to-interference ratio (SIR) analysis, which
makes our DNA-GA analysis a formal microscopic analysis tool.
Second, we show two approaches for upgrading the DNA-GA
analysis to a macroscopic analysis tool. Finally, we perform a
comparison between the proposed DNA-GA analysis and the
existing macroscopic analysis based on stochastic geometry. Our
results show that the DNA-GA analysis possesses a few special
features: (i) shadow fading is naturally considered in the DNAGA analysis; (ii) the DNA-GA analysis can handle non-uniform
user distributions and any type of multi-path fading; (iii) the
shape and/or the size of cell coverage areas in the DNA-GA
analysis can be made arbitrary for the treatment of hotspot
network scenarios. Thus, DNA-GA analysis is very useful for
the network performance analysis of the 5th generation (5G)
systems with general cell deployment and user distribution, both
on a microscopic level and on a macroscopic level. 1
I. I NTRODUCTION
Due to their potential for large performance gains, dense
orthogonal deployments of small cell networks (SCNs) within
the existing macrocell networks2 gained much momentum in
the design of the 4th generation (4G) systems [1], and are
envisaged as the workhorse for capacity enhancement in the
5th generation (5G) systems [2]. In this context, new and
more powerful network performance analysis tools are needed
to better understand the performance implications that these
dense orthogonal SCNs bring about [3-10].
Network performance analysis tools can be broadly classified into two groups, i.e., macroscopic analysis [3,4] and
microscopic analysis [5-10]. The macroscopic analysis usually
assumes that user equipments (UEs) and/or base stations (BSs)
are randomly deployed, often following a homogeneous Poisson distribution to invoke the stochastic geometry theory [3,4].
In essence, the macroscopic analysis investigates network
performance at a high level, such as coverage probability and
signal-to-interference ratio (SIR) distribution, by averaging
over all possible UE and BS deployments [3,4]. Instead, the
microscopic analysis allows for a more detailed analysis and
1 1536-1276 c 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Please find the final version
in IEEE from the link: http://ieeexplore.ieee.org/document/7511618/. Digital
Object Identifier: 10.1109/ICC.2016.7511618
2 Orthogonal deployment means that small cells and macrocells operating
on different frequency spectrum, i.e., Small Cell Scenario #2a defined in [1].
is often conducted assuming that UEs are randomly placed but
that BS locations are known [5-10]. Generally speaking, the
macroscopic analysis predicts the network performance in a
statistical sense, while the microscopic analysis is useful for
a network-specific study and optimization.
Within the microscopic analysis and paying special attention
to uplink (UL), in [5], the authors considered a single UL
interfering cell with a disk-shaped coverage area and presented
closed-form expressions for the UL interference considering
both path loss and shadow fading. In [6], the authors conjectured that the UL interference in a hexagonal grid based
cellular network may follow a lognormal distribution, which
was verified via simulation. In [7] and [8], we went a step
further and analytically derived an upper bound of the error
in approximating the dB-scale UL interference from a single
cell by a Gaussian distribution. Such error was measured by
the Kolmogorov–Smirnov (KS) distance [11] between the real
cumulative density function (CDF) and the approximate CDF,
and it was shown to be small for practical SCNs. On the basis
of this single-cell interference analysis, we further investigated
the approximate distribution of the aggregate UL interference
in a multi-cell scenario as a power lognormal distribution. For
more practical networks, in [9] and [10], we also investigated
the network performance of SCNs in current 4G networks
using system-level simulations.
In this paper, our objective is to extend the previous works
in [7] and [8] to analyze the UL SIR performance, and create
a novel and compelling approach for network performance
analysis that can unify the macroscopic and the microscopic
analyses within a single framework, while overcoming a few
drawbacks of the current tools. To that end, our work is
composed of the following three steps:
1) The extension of the UL interference analysis in [7]
and [8] to the UL SIR analysis, which makes our
analysis a formal microscopic analysis tool.
2) The upgrade of the developed microscopic analysis tool
to a macroscopic analysis tool.
3) The comparison between the proposed macroscopic
analysis tool and the existing macroscopic analysis based
on stochastic geometry.
Since the macroscopic and the microscopic analyses are
unified in our framework based on a deterministic network
analysis (DNA) using the Gaussian approximation (GA) presented in [7] and [8], our framework will be referred to as
2
the DNA-GA analysis hereafter. As a result of our three-step
work, the contributions of this paper are three-fold, and are
summarized as follows:
1) Based on the Gaussian approximation theorem presented
in [7] and [8], the approximate distributions of the UL
signal power and the UL SIR for the interested UE are
derived in tractable expressions using the Gauss-Hermite
numerical integration [12], giving rise to the DNA-GA
analysis.
2) Although the DNA-GA analysis stands alone as a solid
contribution to the family of microscopic analysis, two
approaches for upgrading the DNA-GA analysis to a
macroscopic analysis are further investigated. The first
one is the semi-analytical approach, which directly averages the performance given by many DNA-GA analyses
over many random BS deployments to obtain the performance of the macroscopic analysis. The second one
is the analytical approach, which constructs an idealistic
and deterministic BS deployment, and then conducts the
DNA-GA analysis on such BS deployment to obtain an
upper-bound performance of the macroscopic analysis.
3) Interesting results on the comparison between the DNAGA analysis and the stochastic geometry analysis [4] are
presented. Our results show that the DNA-GA analysis
qualifies as a new network performance analysis tool
with a few special merits over stochastic geometry: (i)
Shadow fading is naturally considered in the DNA-GA
analysis, while stochastic geometry usually cannot; (ii)
Non-uniform UE distributions and any type of multipath fading can be treated in the DNA-GA analysis,
while stochastic geometry usually cannot; (iii) Apart
from the common assumption on the cell coverage areas
as Voronoi cells made by stochastic geometry, the shape
and/or the size of cell coverage areas in the DNA-GA
analysis can be made arbitrary, making it suitable for
the network performance analysis of hotspot SCNs.
The remainder of the paper is structured as follows. In
Section II, the network scenario and the system model are
described. In Section III, the DNA-GA analysis is presented,
followed by its upgrade to a macroscopic analysis tool in
Section IV. Our results are validated and compared with
those of the stochastic geometry analysis via simulations in
Section V. Finally, the conclusions are drawn in Section VI.
II. N ETWORK S CENARIO AND S YSTEM M ODEL
In this paper, we consider UL transmissions, and assume
that each small cell BS only schedules one UE in each
frequency/time resource, i.e., resource block (RB). This is a
reasonable assumption in line with 4G networks, i.e., Long
Term Evolution (LTE) [13] and Worldwide Interoperability
for Microwave Access (WiMAX) [14]. Note that small cell
BSs serving no UE do not contribute to the UL interference,
thereby those BSs are ignored in the analysis.
Regarding the network scenario, we consider a SCN with
multiple small cells operating on the same carrier frequency, as
shown in Fig. 1. In more detail, the SCN consists of B small
cells, each of which is managed by a BS. The network includes
the small cell of interest denoted by C1 and B − 1 interfering
small cells denoted by Cb , b ∈ {2, . . . , B}. We focus on a
particular RB, and denote by Kb the active UE associated
with small cell Cb in such RB. Moreover, we denote by Rb
the coverage area of small cell Cb , in which its associated
UEs are randomly distributed. Note that the coverage areas of
adjacent small cells may overlap due to the arbitrary shapes
and sizes of {Rb } , b ∈ {2, . . . , B}.
Fig. 1. A schematic model of the considered SCN.
The distance (in km) from the BS of Cb to the BS of
C1 , b ∈ {1, . . . , B}, and the distance from UE Kb to the
BS of Cm , b, m ∈ {1, . . . , B}, are denoted by Db and dbm ,
respectively. Since DNA-GA is a microscopic analysis tool,
we consider a deterministic deployment of BSs, i.e., the set
{Db } is known, while each UE Kb is randomly distributed in
Rb with a distribution function fZb (z) , z ∈ Rb . Hence, dbm is
a random variable (RV), whose distribution cannot be readily
expressed in an analytical form due to the arbitrary shape and
size of Rb , and the arbitrary form of fZb (z). Regarding Rb
and fZb (z), we have two remarks in the following.
Remark 1: Unlike the existing works, e.g., [3-6, 9-10], where
only the uniform UE distribution was considered, DNA-GA
can handle any probability density function (PDF) of general
UE distribution, here denoted by fZb (z), where 0 < fZb (z) <
+∞,
z ∈ Rb and its integral over Rb equals to one, i.e.,
´
f
(z) dz = 1.
Z
b
Rb
Remark 2: Even if fZb (z) is constant with z, we can only
say that the UE distribution is uniform within the small
cell coverage area Rb , but we cannot guarantee that the UE
distribution is uniform within the entire scenario, because no
UEs are deployed outside the hotspot areas {Rb }, which may
cause the non-uniformity of UE distribution within the entire
scenario. Instead, in stochastic geometry [3,4], UEs are usually
assumed to be uniformly distributed within the entire scenario,
creating Voronoi cells, which is less general and practical than
our assumption of Rb and fZb (z). Note that in the sequel, the
characterization of UE distribution is meant within Rb .
Next, we present the modeling of path loss, shadow fading,
UL transmission power, multi-path fading and noise.
Based on the definition of dbm , the path loss in dB from
UE Kb to the BS of Cm is modeled as
Lbm = A + α × 10log10 dbm ,
(1)
where A is the path loss in dB at the reference distance of
dbm = 1 and α is the path loss exponent. In practice, A and α
3
are constants obtainable from field tests [15]. Note that Lbm
is a RV due to the randomness of dbm .
The shadow fading in dB from UE Kb to the BS of
Cm is denoted by Sbm , and is usually assumed to follow a
lognormal distribution [15]. Based on this assumption, Sbm
is modeled as an independently and identically distributed
2
(i.i.d.) zero-mean Gaussian
RV with a variance of σShad
, i.e.,
2
Sbm ∼ N 0, σShad .
The UL transmission power in dBm of UE Kb is denoted
by Pb , and is subject to a semi-static power control (PC)
mechanism, e.g., the fractional path loss compensation (FPC)
scheme [15]. Based on this FPC scheme, Pb is modeled as
Pb = P0 + η (Lbb + Sbb ) ,
(2)
where P0 is the target received power in dBm on the considered RB at the BS,
η ∈ (0, 1] is the FPC factor, and Lbb and
2
Sbb ∼ N 0, σShad
have been discussed above.
The multi-path fading channel from UE Kb to the BS of
Cm is denoted by hbm ∈ C, where we assume that each UE
and each BS are equipped with one omni-directional antenna.
It is important to note that we consider a general type of multipath fading by assuming that the effective channel gain in dB
2
associated with hbm is defined as Hbm = 10 log10 |hbm | ,
which follows an i.i.d. distribution with a PDF of fH (h).
2
For example, |hbm | can be characterized by an exponential
distribution or a Gamma distribution in case of Rayleigh
fading or Nakagami fading, respectively [16]. And hence, the
distribution of Hbm can be derived analytically.
Finally, we ignore the additive noise because the 4G and the
5G SCNs generally work in the interference-limited region [2].
III. T HE P ROPOSED DNA-GA A NALYSIS
The proposed DNA-GA analysis consists of three steps, i.e.,
the interference analysis, the signal power analysis, and the
SIR analysis, which are presented in the following.
A. The Interference Analysis
Based on the definition of RVs discussed in Section II, the
UL received interference power in dBm from UE Kb to the
BS of C1 can be written as
(a)
Ib = Pb − Lb1 − Sb1 + Hb1
= P0 + (ηLbb − Lb1 ) + (ηSbb − Sb1 ) + Hb1
4
= (P0 + L + S) + Hb1 ,
4
(1)
= Ib
+ Hb1 ,
(3)
where (2) is plugged into the step (a) of (3), and L and S are
4
4
defined as L = (ηLbb − Lb1 ) and S = (ηSbb − Sb1 ), respectively. Apparently, L and S are independent RVs. Besides, the
(1) 4
first part of Ib is further defined as Ib = (P0 + L + S). Since
Sbb and Sb1 (b ∈ {2, . . . , B}) are i.i.d. zero-mean Gaussian
RVs, it is easy to show that S is also a Gaussian RV, whose
mean and variance (
are
µS = 0
2 .
(4)
σS2 = 1 + η 2 σShad
From the definition of Ib in (3), the aggregate interference
power in mW from all interfering UEs to the BS of C1 can
be formulated as
B
X
1
(5)
I mW =
10 10 Ib .
b=2
In our previous work [8], we show that the distribution of
I mW can be well approximated by a power lognormal distribution. This approximation is summarized in the following.
(1)
1) The Distribution of Ib in (3): First, we analyze the
(1)
distribution of Ib shown in (3). Considering a small approximation error, upper-bounded by the KS distance [11] provided
(1)
in [8], we approximate Ib by a Gaussian RV Gb , whose mean
and variance are (
µGb = P0 + µL + µS
,
(6)
2
2
σG
= σL
+ σS2
b
2
where µL and σL
are respectively the mean and the variance
of L, which can be obtained using numerical integration
involving fZb (z) and Rb [7,8]. Details are omitted for brevity.
2) The Distribution of Ib in (3): Second, we analyze the
(1)
distribution of Ib = Ib + Hb1 shown in (3). Considering
a small approximation error, upper-bounded by the KS distance [11] provided in [8], we approximate Ib by another
Gaussian RV Qb , whose
mean and variance are
(
µQb = µGb + µHb1
.
(7)
2
2
2
+ σH
= σG
σQ
b1
b
b
2
where µHb1 and σH
are respectively the mean and the
b1
variance of Hb1 . We omit the details for brevity.
Note that the upper bound of the total approximation error
of the above two steps is obtained from the summation of the
individual approximation errors of the two steps in closed-form
expressions [8]. And it has been shown in [8] that the total
approximation error is small for practical SCNs, without any
requirement on (i) the uniformity of UE distribution and/or
the type of multi-path fading; and (ii) the shape and/or size
of cell coverage areas. Intuitively speaking, the results in [8]
show that the larger the variance of the Gaussian RV, i.e., S
in (6) or Gb in (7), the better the approximation in (6) or in
(7), due to the increasing dominance of the Gaussian RV.
3) The Distribution of I mW in (5): Third, we invoke the
main results in [17-18], which indicate that the sum of multiple
independent lognormal RVs can be well approximated by a
power lognormal RV. Accordingly, in our case, since each
Ib , b ∈ {2, . . . , B} is approximated by a Gaussian RV Qb ,
1
their sum 10 10 Qb shown in (5) should be well approximated
1
by a power lognormal RV expressed as IˆmW = 10 10 Q , where
the PDF and CDF of Q [17] can be written as (8) shown
on the top of the next page. In (8), Φ (x) is the CDF of the
standard normal distribution, and the
2parameters λ, µQ and
σQ are obtained from {µQb } and σQ
that are computed
b
by (7). The procedure to obtain λ, µQ and σQ is omitted here
for brevity, but interested readers are referred to Appendix B
of [8] for further details. As a result of (8), the PDF and CDF
of IˆmW can be written as (9) shown on the top of the next
page, where ζ = ln1010 is a scalar factor originated from the
variable change from 10 log10 v to ln v.
4
Finally, we approximate the distribution of I mW by that of
mW
ˆ
I
shown in (9) presented on the top of the next page.
Note that in this step, the approximation error depends on
the approximate error introduced by the power lognormal
approximation, which has been shown to be reasonably small
and good enough in practical cases [17-18].
(
1
fG1 (v) = q
2
2πσG
1
(v − µG1 )
exp −
2
2σG
1
= Pr [G1 + H11 ≤ x]
Based on the definition of RVs discussed in Section II, the
UL received signal power in dBm from UE K1 to the BS of
C1 can be written as
= Pr [H11 ≤ x − G1 ]
+∞
ˆ
FH11 (x − v) fG1 (v) dv
=
(a)
−∞
+∞
ˆ
(a)
= P0 + (ηL11 − L11 ) + (ηS11 − S11 ) + H11
4
= P0 + L̄11 + S̄11 + H11 ,
4
(1)
= X1 + H11 ,
FH11 (x − v) q
=
−∞
(10)
where (2) is plugged into the step (a) of (10). Besides, L̄11 and
4
4
S̄11 are defined as L̄11 = (η − 1) L11 and S̄11 = (η − 1) S11 ,
(1) 4
respectively. The first part of X1 is further defined as X1 =
P0 + L̄11 + S̄11 , and it is easy to show that S̄11 is a Gaussian
RV, whose mean and
( variance are
µS̄11 = 0
.
(11)
2 2
σS̄2 11 = (1 − η) σShad
Similar to the discussion in subsection III-A1, we consider a
small approximation error, upper-bounded by the KS distance
(1)
shown in [8], and we approximate X1 by a Gaussian RV
G1 , whose mean(and variance are
µG1 = P0 + µL̄11 + µS̄11
,
(12)
2
2
+ σS̄2 11
σG
= σL̄
1
11
2
are respectively the mean and the
where µL̄11 and σL̄
11
variance of L̄11 . As a result, (10) can be re-formulated as
4
X1 ≈ G1 + H11 = X̂1 .
(13)
Note that unlike the discussion in subsection III-A2, it is not
accurate to further approximate X̂1 by a Gaussian RV, because
the randomness of the Gaussian distributed RV S11 is largely
removed by the UL transmission power control mechanism,
rendering a less dominant role of the Gaussian distribution of
2
G1 compared with the distribution of H11 . In other words, σG
1
is comparable with or even smaller than the variance of H11 ,
making the approximation error large according to our results
in [8]. Therefore, we derive the approximate distribution of
X1 using a different method, presented in Theorem 1.
Theorem 1. The approximate CDF of X1 is derived as
M0
√
1 X
wm FH11 x− 2σG1 am+µG1 ,
FX1(x)≈FX̂1(x)= √
π m=1
(14)
where M0 is the number of terms employed in the GaussHermite numerical integration [12], and the weights {wm }
and the abscissas {am } are tabulated in Table 25.10 of [12].
Proof: Since G1 is a Gaussian RV with the mean and the
variance shown in (12), the PDF of G1 can be written as
.
(15)
Besides, according to the definition of RVs in Section II,
we assume the CDF of H11 to be FH11 (h). Hence, the CDF
of X1 can be approximated by
FX1 (x) ≈ FX̂1 (x)
B. The Signal Power Analysis
X1 = P1 − L11 − S11 + H11
)
2
1
= √
π
(b)
1
2
2πσG
1
(
2
(v − µG1 )
exp −
2
2σG
1
)
dv
+∞
ˆ
√
FH11 x −
2σG1 y + µG1 exp −y 2 dy
−∞
M0
√
1 X
= √
2σG1 am + µG1
+ RM0
wm FH11 x −
π m=1
(c)
M0
√
1 X
≈ √
wm FH11 x −
2σG1 am + µG1 ,
π m=1
(d)
(16)
where the step (a) of (16) is obtained from (15), and the
step (b)
√ of (16) is computed using the variable change
v =
2σG1 y + µG1 . Moreover, the step (c) of (16) is
derived using the Gauss-Hermite numerical integration [12],
+∞
´
PM0
i.e.,
f (y) exp −y 2 dy =
m=1 wm f (am ) + RM0 ,
−∞
where M0 is the number of terms in the approximation,
the weights {wm } and the abscissas {am } are tabulated in
Table 25.10 of [12] and RM0 is a residual error in the order
0!
[12], which decays very fast as M0 increases.
of 2M0M
(2M0 )!
Finally, the step (d) of (16) is obtained by dropping RM0 . Our
proof is thus completed by comparing (14) and (16).
In case of Rayleigh fading [16], we propose Corollary 2 to
compute the approximate expression of FX1 (x).
Corollary 2. In case of Rayleigh fading, the approximate CDF
of X1 can be computed by (14), where
h
FH11 (h) = 1 − exp − exp
,
(17)
ζ
where ζ =
10
ln 10 .
Proof: As discussed in Section II, on condition of
2
Rayleigh fading, the channel gain |h11 | follows an exponential distribution with unitary mean [16]. Then, our proof
is completed by deriving (17) based on the variable change
2
H11 = 10 log10 |h11 | . Details are omitted for brevity.
In case of Nakagami fading [16], we propose Corollary 3
to compute the approximate expression of FX1 (x).
Corollary 3. In case of Nakagami fading, the approximate
CDF of X1 can be computed by
(14), where
1
h
1
FH11 (h) =
γ k, exp
,
(18)
Γ (k)
θ
ζ
5
n
o
(q−µQ )2
Q
1
PDF of Q : fQ (q) = λΦλ−1 q−µ
√
exp
−
2
2
σQ
2σQ
2πσQ
.
CDF of Q : FQ (q) = Φλ q−µQ
σQ
n
o
2
Q)
PDF of IˆmW : fIˆmW (v) = λΦλ−1 ζ lnσv−µQ √ ζ 2 exp − (ζ ln v−µ
2
2σ
Q
v 2πσQ
Q
.
CDF of IˆmW : F ˆmW (v) = Φλ ζ ln v−µQ
I
σQ
where Γ (·) and γ (·, ·) are respectively the gamma and the
incomplete gamma functions [12], k and θ are respectively
the shape and the scale parameters of the Gamma distribution
associated with the channel gain of Nakagami fading [16].
Proof: As discussed in Section II, on condition of Nak2
agami fading, the channel gain |h11 | follows a Gamma
distribution with parameters k and θ [16]. Then, our proof
is completed by deriving (18) based on the variable change
2
H11 = 10 log10 |h11 | Details are omitted for brevity.
C. The SIR Analysis
From (10), we can approximate the UL SIR in dB by
4
Z dB ≈ X1 − Q = Ẑ dB .
(19)
We derive the approximate distribution of Z dB in Theorem 4.
Theorem 4. The approximate CDF of Z dB is derived as
FZ dB (z) ≈ FẐ dB (z)
M0
√
√
λ X
=√
wm Φλ−1 2am FX1 z + 2σQ am + µQ , (20)
π m=1
where M0 is the number of terms employed in the GaussHermite numerical integration [12], and the weights {wm }
and the abscissas {am } are tabulated in Table 25.10 in [12].
Proof: From (19), the approximate CDF of Z dB can be
derived as
FZ dB (z) ≈ FẐ dB (z)
= Pr [X1 − Q ≤ z]
= Pr [X1 ≤ z + Q]
+∞
ˆ
= FX1(z + q) fQ (q) dq
−∞
+∞
ˆ
(a)
≈
−∞
(
)
2
1
(q−µQ )
q−µQ
q
exp −
dq
FX̂1(z + q) λΦλ−1
2
σQ
2σQ
2πσ 2
Q
+∞
ˆ
√
√
(b) 1
= √
FX̂1 z + 2σQ y + µQ λΦλ−1 2y exp −y 2 dy
π
−∞
M0
√
√
1 X
= √
wm FX̂1 z + 2σQ am + µQ λΦλ−1 2am +RM0
π m=1
(c)
M0
√
√
λ X
√
≈
wm Φλ−1 2am FX̂1 z + 2σQ am + µQ ,
π m=1
(d)
(8)
(9)
√
change q = 2σQ y + µQ . Moreover, the step (c) of (21) is
derived using the Gauss-Hermite numerical integration [12].
Finally, the step (d) of (21) is obtained by dropping RM0 . Our
proof is thus completed by comparing (20) and (21).
In case of Rayleigh fading [16], we propose Corollary 5 to
compute the approximate expression of FZ dB (z).
Corollary 5. In case of Rayleigh fading, the approximate CDF
of Z dB can be computed by (20), where (17) is plugged into
(14) to obtain FX̂1 (x) in (20).
Proof: The proof is completed by applying Corollary 2
to Theorem 1 and Theorem 4. Details are omitted for brevity.
In case of Nakagami fading [16], we propose Corollary 6
to compute the approximate expression of FZ dB (z).
Corollary 6. In case of Nakagami fading, the approximate
CDF of Z dB can be computed by (20), where (18) is plugged
into (14) to obtain FX̂1 (x) in (20).
Proof: The proof is completed by applying Corollary 3
to Theorem 1 and Theorem 4. Details are omitted for brevity.
IV. M ACROSCOPIC U PGRADE OF THE DNA-GA A NALYSIS
With Theorem 4, we have crafted a powerful microscopic
analysis tool based on the proposed DNA-GA analysis that
can deal with a wide range of network assumptions and
system parameters. In this section, we further investigate
two approaches for upgrading the DNA-GA analysis from a
microscopic analysis tool to a macroscopic one, putting DNAGA in the same league as, e.g., stochastic geometry.
A. The Semi-Analytical Approach
The microscopic and the macroscopic analyses are closely
related to each other. The average performance of many
microscopic analyses conducted over a large number of random BS deployments converges to the performance of the
macroscopic analysis, given that the examined realizations of
the deterministic BS deployments follow the BS deployment
assumption used in the macroscopic analysis. Therefore, we
can directly average the performance results obtained by
applying DNA-GA, i.e., Theorem 4, over a large number of
random BS deployments to obtain the performance results of
the macroscopic analysis.
(21)
where the step (a) of (21) is calculated using Theorem 1 and
(8), and the step (b) of (21) is computed using the variable
B. The Analytical Approach
Instead of conducting DNA-GA, i.e., Theorem 4, over many
BS deployments and averaging all the results together to obtain
6
the results of the macroscopic analysis, we can construct
an idealistic BS deployment on a hexagonal lattice with the
equivalent BS density, and perform a single DNA-GA analysis
on such BS deployment to extract an upper-bound of the
SIR performance of the macroscopic analysis. The hexagonal
lattice leads to an upper-bound performance because BSs
are evenly distributed in the scenario and thus very strong
interference due to close proximity is avoided [3,4].
V. S IMULATION AND D ISCUSSION
Fig. 2. Illustration of a 3GPP SCN deployment [15].
In this section, we conduct simulations to validate the
proposed DNA-GA analysis, using both the semi-analytical
and the analytical approaches. For the semi-analytical approach, to obtain the results of the macroscopic analysis, we
average the results given by Theorem 4 over 1000 random
BS deployments. For each BS deployment, 10,000 random
experiments are conducted to go through the randomness of
UE positions. And for each BS deployment and each UE
placement, another 10,000 random experiments are conducted
to go through the randomness of shadow fading and multi-path
fading. For the analytical approach, only one BS deployment
in a hexagonal lattice is examined. M0 is set to 30 for
the computation in the DNA-GA analysis to ensure a good
accuracy of the results [12].
With regard to the scenario and parameters, 3rd Generation Partnership Project (3GPP) recommendations have been
considered [15]. For the semi-analytical approach, 19 dummy
macrocell sites are deployed with a 0.5 km inter-site distance
to guide the small cell deployment. Each macrocell site has the
shape of a hexagon, and is equally divided into 3 macrocells.
Each macrocell contains 4 randomly deployed small cells,
resulting in 19 × 3 × 4 = 228 small cells with a density
around 55.43 cells/km2 . For the analytical approach, the 228
small cells are located in a hexagonal lattice with the same cell
density. In both cases, each small cell has a coverage radius of
0.04 km, and the minimum inter-BS distance and the minimum
BS-to-UE distance are 0.04 km, and 0.01 km, respectively.
Moreover, according to [15], A = 145.4, α = 3.75, P0 = −76
dBm, η = 0.8, and σS = 10 dB.
Fig. 2 illustrates an example of a random BS deployment
according to [15], where small cell BSs are represented by xmarkers, while the coverage areas of dummy macrocells and
small cells are marked by dashed and solid lines, respectively.
UEs are randomly distributed in the mentioned small cell
coverage areas, and it is important to note that although some
small cell coverage areas are disk-shaped, the coverage areas
of most small cells are of irregular shape due to overlapping.
For brevity, in the following subsections, we omit the
detailed investigation on the interference analysis and the
signal power analysis, and directly present SIR results given
by the DNA-GA analysis and the simulation.
A. Validation of the DNA-GA Analysis
In this subsection, we validate the accuracy of the DNA-GA
analysis in terms of the SIR performance when assuming two
cases for UE distribution and multi-path fading, i.e.,
•
•
Case 1: Uniform UE distribution + Rayleigh fading
Case 2: Non-uniform UE distribution + Nakagami fading
For Case 1, we obtain the SIR results through the DNA-GA
analysis using Theorem 4 and Corollary 5, while for Case 2,
we invoke Theorem 4 and Corollary 6.
When considering a non-uniform UE distribution, we assume that fZb (z) = W
ρ , z ∈ Rb , where ρ is the radial
coordinate of z in the polar coordinate system, the origin of
which is placed at the position of´ the BS of Cb and W is
a normalization constant to make Rb fZb (z) dz = 1. In the
resulting non-uniform UE distribution, UEs are more likely
to locate in the close vicinity of the BS of Cb than at the
cell-edge3 . When considering Nakagami fading, we assume
that k = 10 and θ = 0.1, which corresponds to a multi-path
fading with a strong line-of-sight (LoS) component [16].
For both cases, the UL SIR performance is evaluated using
the simulation and the semi-analytical approach discussed in
Subsection IV-A. Moreover, the upper bound of the UL SIR
is also investigated using the simulation and the analytical
approach discussed in Subsection IV-B based on a BS deployment in a hexagonal lattice. The results are shown in Fig. 3.
3 Note that the considered f
Zb (z) is just an example of the non-uniformly
distributed UEs in Rb , which reflects a reasonable network planning, where
small cell BSs have been deployed at the center of UE clusters. Other forms
of fZb (z) can be considered in our DNA-GA analysis as well.
7
1
0.8
1
UL SIR (Simulation)
UL SIR (DNA-GA)
Upper-Bound (Simulation)
Upper-Bound (DNA-GA)
0.8
CDF
0.6
CDF
0.6
UL SIR (Simulation [4])
UL SIR (Analysis [4])
UL SIR (Simulation)
UL SIR (DNA-GA)
Upper-Bound (DNA-GA)
Case 1
0.4
Stochastic
Geometry
DNA-GA
(Case 1)
0.4
0.2
0.2
Case 2
0
-30
-20
-10
0
UL SIR [dB]
10
20
30
Fig. 3. UL SIR in dB (DNA-GA vs. Simulation).
As can be seen from Fig. 3, the SIR results of the proposed DNA-GA analysis match those of the simulation very
well, particularly in the head portion. In the semi-analytical
approach, the maximum deviation between the CDFs obtained
by the DNA-GA analysis and the simulation for both investigated cases are around 1.0∼1.7 percentile. In the analytical
approach, the fitness becomes even better, i.e., the maximum
deviation for both cases is within 0.6 percentile.
More importantly, for both cases, the upper-bound SIR
performance given by the analytical approach is shown to be
within 2.0 ∼ 2.5 dB from the exact performance, indicating
its usefulness in characterizing the network performance with
low-complexity computation. To take Case 1 of DNA-GA as
an example, the numerical results to be plugged into Theorem 4 for the hexagonal BS deployment are µG1 = −93.07,
2
2
σG
= 5.97, λ = 202.66, µQ = −137.71 and σQ
= 212.04.
1
Finally, note that the SIR of Case 2 outperforms that of
Case 1, mainly because UEs tend to stay closer to their serving
BSs in Case 2 as discussed above, leading to a larger signal
power and a lower interference power.
B. Comparison Between DNA-GA and Stochastic Geometry
In this section, we compare the UL SIR results of the DNAGA analysis (Case 1) and those of the stochastic geometry
analysis in Fig. 4, with the same average cell density of 55.43
cells/km2 and the same assumption of Rayleigh fading4 .
4 Note that the stochastic geometry analysis in [4] poses some assumptions
on the model for the sake of tractability, e.g., no shadow fading, Rayleigh
fading only, homogeneous Poisson distribution of both UEs and BSs in
the entire scenario. In contrast, the DNA-GA analysis does not need such
assumptions and works with a more realistic model, considering the hotspot
SCN scenario [15] shown in Fig. 2 and discussed in Remark 2 of Section II.
0
-30
-20
-10
0
UL SIR [dB]
10
20
30
Fig. 4. UL SIR in dB (DNA-GA vs. Stochastic Geometry [4]).
In Fig. 4, a few interesting aspects are noteworthy. First,
both our analysis and the analysis in [4] are only able to give
approximate results. However, the approximation error of our
DNA-GA analysis is shown to be smaller than that of [4].
Second, there is a significant performance gap between
our DNA-GA analysis and the stochastic geometry analysis
in [4]. This is because (i) Our DNA-GA analysis considers
the shadow fading on top of the multi-path fading, which
leads to a large variance of SIR, while the analysis in [4] does
not, which gives a small SIR variance; and (ii) The DNA-GA
analysis studies the hotspot SCN scenario recommended by
the 3GPP [15], where UEs are deployed closer to the serving
BSs than those in Voronoi cells considered in [4].
Third, the purpose of Fig. 4 is not to reproduce the results
in [4] based on Voronoi cells, but to analytically investigate a
more practical 3GPP network scenario. If the shadow fading
is required to be ignored, albeit impractical, the Gamma
approximation of the aggregate interference [10] could be
invoked to make our approach of analysis still valid. Besides,
the DNA-GA analysis can also handle the case where the cell
coverage areas are constructed as Voronoi cells [4]. However,
to do so, it would be more practical to consider an alternative
UE association strategy (UAS), where each UE is connected
to the BS with the smallest path loss plus shadow fading.
Note that such UAS will blur the boundaries of Voronoi cells,
because each UE is no longer always connected to its closest
BS, making the analysis more intricate and realistic.
Finally, note that a three-fold integral computation is needed
in [4] to compute the results, while no integration is required
in Theorem 4 of the DNA-GA analysis. However, many BS
deployments are needed in the semi-analytical approach of the
DNA-GA analysis, while only one in the analytical approach.
VI. C ONCLUSION
We proposed a new approach of network performance
analysis, which unifies the microscopic and the macroscopic
analyses within a single framework. Compared with stochastic
geometry, our DNA-GA analysis considers shadow fading,
general UE distribution and any type of multi-path fading, as
well as any shape and/or size of cell coverage areas. Thus,
DNA-GA can analyze more realistic networks and is very
useful for the network performance analysis of the 5G systems
with general cell deployment and UE distribution.
8
R EFERENCES
[1] 3GPP, “TR 36.872, Small cell enhancements for E-UTRA and EUTRAN - Physical layer aspects,” Dec. 2013.
[2] D. López Pérez, M. Ding, H. Claussen, and A. H. Jafari, “Towards
1 Gbps/UE in cellular systems: Understanding ultra-dense small cell
deployments,” IEEE Commun. Surveys and Tutorials, Jun. 2015.
[3] J. G. Andrews, F. Baccelli, and R. K. Ganti, “A tractable approach to
coverage and rate in cellular networks,” IEEE Trans. on Commun., vol.
59, no. 11, pp. 3122-3134, Nov. 2011.
[4] T. D. Novlan, H. S. Dhillon and J. G. Andrews, “Analytical modeling
of uplink cellular networks,” IEEE Trans. on Wireless Commun., vol.
12, no. 6, pp. 2669-2679, Jun. 2013.
[5] Y. Zhu, J. Xu, Z. Hu, J. Wang and Y. Yang, “Distribution of uplink
inter-cell interference in OFDMA networks with power control,” IEEE
ICC 2014, Sydney, Australia, pp. 5729-5734, Jun. 2014.
[6] J. He, Z. Tang, H. Chen, and W. Cheng, “Statistical model of OFDMA
cellular networks uplink interference using lognormal distribution,”
IEEE Wireless Commun. Letters, vol. 2, no. 5, pp. 575-578, Oct. 2013.
[7] M. Ding, D. López-Pérez, G. Mao, and Z. Lin, “Approximation of uplink
inter-cell interference in FDMA small cell networks,” to appear in IEEE
Globecom 2015, arXiv: 1505.01924 [cs.NI], May 2015.
[8] M. Ding, D. López-Pérez, G. Mao, and Z. Lin, “Microscopic analysis
of the uplink interference in FDMA small cell networks,” submitted to
IEEE Trans. on Wireless Commun., arXiv:1508.02808, Aug. 2015.
[9] M. Ding, D. López Pérez, A. V. Vasilakos, and W. Chen, “Dynamic
TDD transmissions in homogeneous small cell networks,” IEEE ICC
2014, Sydney, Australia, pp. 616-621, Jun. 2014.
[10] M. Ding, D. López Pérez, A. V. Vasilakos, and W. Chen, “Analysis
on the SINR performance of dynamic TDD in homogeneous small cell
networks,” IEEE Globecom 2014, pp. 1552-1558, Dec. 2014.
[11] F. J. Massey Jr. “The Kolmogorov-Smirnov test for goodness of fit,”
Journal of the American Statistical Association, vol. 46, no. 253, pp.
68-78, 1951.
[12] M. Abramowitz and I. Stegun, Handbook of mathematical functions with
formulas, graphs, and mathematical tables (Nineth Ed.), Dover, 1972.
[13] 3GPP, “TS 36.213 (V11.2.0): Physical layer procedures,” Feb. 2013.
[14] WiMax Forum, “WiMAX and the IEEE 802.16m Air Interface Standard,” Apr. 2010.
[15] 3GPP, “TR 36.828 (V11.0.0): Further enhancements to LTE Time
Division Duplex (TDD) for Downlink-Uplink (DL-UL) interference
management and traffic adaptation,” Jun. 2012.
[16] J. Proakis, Digital Communications (Third Ed.), New York: McGrawHill, 1995.
[17] Z. Liu, J. Almhana, and R. McGorman, “Approximating lognormal
sum distributions with power lognormal distributions,” IEEE Trans. on
Vehicular Tech., vol. 57, no. 4, pp. 2611-2617, Jul. 2008.
[18] S. S. Szyszkowicz and H. Yanikomeroglu, “Fitting the modified-powerlognormal to the sum of independent lognormals distribution,” IEEE
Globecom 2009, pp. 1-6, Nov. 2009.
| 7cs.IT
|
Classification and Geometry of General Perceptual Manifolds
SueYeon Chung1,2 , Daniel D. Lee2,3 , and Haim Sompolinsky2,4,5
1
arXiv:1710.06487v2 [cond-mat.dis-nn] 26 Feb 2018
Program in Applied Physics, School of Engineering and Applied Sciences,
Harvard University, Cambridge, MA 02138, USA
2
Center for Brain Science, Harvard University, Cambridge, MA 02138, USA
3
School of Engineering and Applied Science, University of Pennysylvania, Philadelphia, PA 19104, USA
4
Racah Institute of Physics, Hebrew University, Jerusalem 91904, Israel
5
Edmond and Lily Safra Center for Brain Sciences, Hebrew University, Jerusalem 91904, Israel
Perceptual manifolds arise when a neural population responds to an ensemble of sensory signals
associated with different physical features (e.g., orientation, pose, scale, location, and intensity) of
the same perceptual object. Object recognition and discrimination require classifying the manifolds
in a manner that is insensitive to variability within a manifold. How neuronal systems give rise
to invariant object classification and recognition is a fundamental problem in brain theory as well
as in machine learning. Here we study the ability of a readout network to classify objects from
their perceptual manifold representations. We develop a statistical mechanical theory for the linear
classification of manifolds with arbitrary geometry revealing a remarkable relation to the mathematics of conic decomposition. We show how special anchor points on the manifolds can be used
to define novel geometrical measures of radius and dimension which can explain the classification
capacity for manifolds of various geometries. The general theory is demonstrated on a number of
representative manifolds, including `2 ellipsoids prototypical of strictly convex manifolds, `1 balls
representing polytopes with finite samples, and ring manifolds exhibiting non-convex continuous
structures that arise from modulating a continuous degree of freedom. The effects of label sparsity
on the classification capacity of general manifolds are elucidated, displaying a universal scaling relation between label sparsity and the manifold radius. Theoretical predictions are corroborated by
numerical simulations using recently developed algorithms to compute maximum margin solutions
for manifold dichotomies. Our theory and its extensions provide a powerful and rich framework
for applying statistical mechanics of linear classification to data arising from perceptual neuronal
responses as well as to artificial deep networks trained for object recognition tasks.
PACS numbers: 87.18.Sn, 87.19.lv, 42.66.Si, 07.05.Mh
I.
INTRODUCTION
A fundamental cognitive task performed by animals and
humans is the invariant perception of objects, requiring the nervous system to discriminate between different objects despite substantial variability in each objects physical features. For example, in vision, the
mammalian brain is able to recognize objects despite
variations in their orientation, position, pose, lighting
and background. Such impressive robustness to physical changes is not limited to vision; other examples include speech processing which requires the detection of
phonemes despite variability in the acoustic signals associated with individual phonemes; and the discrimination
of odors in the presence of variability in odor concentrations. Sensory systems are organized as hierarchies
consisting of multiple layers transforming sensory signals
into a sequence of distinct neural representations. Studies of high level sensory systems, e.g., the inferotemporal cortex (IT) in vision [1], auditory cortex in audition
[2], and piriform cortex in olfaction [3], reveal that even
the late sensory stages exhibit significant sensitivity of
neuronal responses to physical variables. This suggests
that sensory hierarchies generate representations of objects that although not entirely invariant to changes in
physical features, are still readily decoded in an invari-
ant manner by a downstream system. This hypothesis is
formalized by the notion of the untangling of perceptual
manifolds [4–6]. This viewpoint underlies a number of
studies of object recognition in deep neural networks for
artificial intelligence [7–10].
To conceptualize perceptual manifolds, consider a set of
N neurons responding to a specific sensory signal associated with an object as shown in Fig. 1. The neural
population response to that stimulus is a vector in RN .
Changes in the physical parameters of the input stimulus that do not change the object identity modulate the
neural state vector. The set of all state vectors corresponding to responses to all possible stimuli associated
with the same object can be viewed as a manifold in the
neural state space. In this geometrical perspective, object recognition is equivalent to the task of discriminating
manifolds of different objects from each other. Presumably, as signals propagate from one processing stage to
the next in the sensory hierarchy, the geometry of the
manifolds is reformatted so that they become “untangled,” namely they are more easily separated by a biologically plausible decoder [1]. In this paper, we model
the decoder as a simple single layer network (the perceptron) and ask how the geometrical properties of the
perceptual manifolds influence their ability to be separated by a linear classifier.
2
bility of general, finite dimensional manifolds. The summary of our key results is as follows:
Figure 1. Perceptual manifolds in neural state space. (a)
Firing rates of neurons responding to images of a dog shown
at various orientations θ and scales s. The response to a
particular orientation and scale can be characterized by an
N -dimensional population response. (b) The population responses to the images of the dog form a continuous manifold
representing the complete set of invariances in the RN neural activity space. Other object images, such as those corresponding to a cat in various poses, are represented by other
manifolds in this vector space.
Linear separability has previously been studied in the
context of the classification of points by a perceptron, using combinatorics [11] and statistical mechanics [12, 13].
Gardner’s statistical mechanics theory is extremely important as it provides accurate estimates of the perceptron capacity beyond function counting by incorporating
robustness measures. The robustness of a linear classifier
is quantified by the margin, which measures the distance
between the separating hyperplane and the closest point.
Maximizing the margin of a classifier is a critical objective in machine learning, providing Support Vector Machines (SVM) with their good generalization performance
guarantees [14].
The above theories focus on separating a finite set of
points with no underlying geometrical structure and are
not applicable to the problem of manifold classification
which deals with separating infinite number of points geometrically organized as manifolds. This paper addresses
the important question of how to quantify the capacity of the perceptron for dichotomies of input patterns
described by manifolds. In an earlier paper, we have
presented the analysis for classification of manifolds of
extremely simple geometry, namely balls [15]. However,
the previous results have limited applicability as the neural manifolds arising from realistic physical variations of
objects can exhibit much more complicated geometries.
Can statistical mechanics deal with the classification of
manifolds with complex geometry, and what specific geometric properties determine the separability of manifolds?
In this paper, we develop a theory of the linear separa-
• We begin by introducing a mathematical model
of general manifolds for binary classification (Sec.
II). This formalism allows us to generate generic
bounds on the manifold separability capacity from
the limits of small manifold sizes (classification of
isolated points) as that of large sizes (classification
of entire affine subspaces). These bounds highlight
the fact that for large ambient dimension N , the
maximal number P of separable finite-dimensional
manifolds is proportional to N , even though each
consists of infinite number of points, setting the
stage for a statistical mechanical evaluation of the
P
.
maximal α = N
• Using replica theory, we derive mean field equations for the capacity of linear separation of finite
dimensional manifolds (Sec. III) and for the statistical properties of the optimal separating weight
vector. The mean-field solution is given in the form
of self consistent Karush-Kuhn-Tucker (KKT) conditions involving the manifold anchor point. The
anchor point is a representative support vector for
the manifold. The position of the anchor point on
a manifold changes as the orientations of the other
manifolds are varied, and the ensuing statistics of
the distribution of anchor points play a key role in
our theory. The optimal separating plane intersects
a fraction of the manifolds (the supporting manifolds). Our theory categorizes the dimension of the
span of the intersecting sets (e.g., points, edges,
faces, or full manifolds) in relation to the position
of the anchor points in the manifolds’ convex hulls.
• The mean field theory motivates a new definition
of manifold geometry, which is based on the measure induced by the statistics of the anchor points.
In particular, we define the manifold anchor radius
and dimension, RM and DM , respectively. These
quantities are relevant since the capacity of general
manifolds can be well approximated by the capacity
of `2 balls with radii RM and dimensions DM . Interestingly, we show that in the limit of small manifolds, the anchor point statistics are dominated
by points on the boundary of the manifolds which
have minimal overlap with Gaussian random vectors. The resultant Gaussian radius, Rg and dimension, Dg , are related to the well-known Gaussian
mean-width of convex bodies (Sec. IV). Beyond
understanding fundamental limits for classification
capacity, these geometric measures offer new quantitative tools for assessing how perceptual manifolds are reformatted in brain and artificial systems.
• We apply the general theory to three examples,
representing distinct prototypical manifold classes.
3
One class consists of manifolds with strictly smooth
convex hulls, which do not contain facets and are
exemplified by `2 ellipsoids. Another class is that
of convex polytopes, which arise when the manifolds consists of a finite number of data points, and
are exemplified by `1 ellipsoids. Finally, ring manifolds represent an intermediate class: smooth but
nonconvex manifolds. Ring manifolds are continuous nonlinear functions of a single intrinsic variable,
such as object orientation angle. The differences
between these manifold types show up most clearly
in the distinct patterns of the support dimensions.
However, as we show, they share common trends.
As the size of the manifold increases, the capacity and geometrical measures vary smoothly, exhibiting a smooth cross-over from small radius and
dimension with high capacity to large radius and
dimension with low capacity. This crossover occurs as Rg ∝ √1 . Importantly, for many realistic
Dg
cases, when the size is smaller than the crossover
value, the manifold dimensionality is substantially
smaller than that computed from naive second order statistics, highlighting the saliency and significance of our measures for the anchor geometry.
Figure 2. Model of manifolds in affine subspaces. D = 2
manifold embedded in RN . c is the orthogonal translation
vector for the affine space and x0 is the center of the manifold.
As the scale r is varied, the manifold shrinks to the point x0 ,
or expands to fill the entire affine space.
II.
• Finally, we treat the important case of the classification of manifolds with imbalanced (sparse) labels, which commonly arise in problems of object
recognition. It is well known that in highly sparse
labels, the classification capacity of random points
−1
increases dramatically as (f |log f |) , where f 1
is the fraction of the minority labels. Our analysis
of sparsely labeled manifolds highlights the interplay between manifold size and sparsity. In particular, it shows that sparsity enhances the capacity only when f Rg2 1, where Rg is the (Gaussian) manifold radius. Notably, for a large regime
of parameters, sparsely labeled manifolds can approximately be described by a universal capacity
function equivalent to sparsely labeled `2 balls with
radii Rg and dimensions Dg , as demonstrated by
our numerical evaluations (Sec. VI). Conversely,
when f Rg2 1 , the capacity is low and close to
1
D where D is the dimensionality of the manifold
affine subspace, even for extremely small f .
• Our theory provides for the first time, quantitative and qualitative predictions for the perceptron
classification of realistic data structures. However,
application to real data may require further extensions of the theory and are discussed in Section VII.
Together, the theory makes an important contribution to the development of statistical mechanical
theories of neural information processing in realistic conditions.
MODEL OF MANIFOLDS
Manifolds in affine subspaces: We model a set of
P perceptual manifolds corresponding to P perceptual
object. Each manifold M µ for µ = 1, . . . , P consists of a
compact subset of an affine subspace of RN with affine
dimension D with D < N . A point on the manifold
xµ ∈ M µ can be parameterized as:
~ =
xµ (S)
D+1
X
Si uµi ,
(1)
i=1
where the uµi are a set of orthonormal bases of the (D+1)dimensional linear subspace containing M µ . The D + 1
components Si represents the coordinates of the manifold
point within this subspace and are constrained to be in
~ ∈ S. The bold notation for xµ and uµ indicates
the set S
i
~
they are vectors in RN whereas the arrow notation for S
D+1
. The set S defines the
indicates it is a vector in R
shape of the manifolds and encapsulates the affine constraint. For simplicity, we will first assume the manifolds
have the same geometry so that the coordinate set S is
the same for all the manifolds; extensions that consider
heterogeneous geometries are provided in Sec. VI A.
We study the separability of P manifolds into two classes,
denoted by binary labels y µ = ±1, by a linear hyperplane
passing through the origin. A hyperplane is described by
2
a weight vector w ∈ RN , normalized so kwk = N and
the hyperplane correctly separates the manifolds with a
margin κ ≥ 0 if it satisfies,
y µ w · xµ ≥ κ
(2)
4
for all µ and xµ ∈ M µ . Since linear separability is
a convex problem, separating the manifolds is equivalent
to separating o
the convex hulls, conv (M µ ) =
n
~ |S
~ ∈ conv(S) , where
xµ (S)
conv (S) =
(D+1
X
i=1
~i | S
~i ∈ S, αi ≥ 0,
αi S
D+1
X
)
αi = 1 .
i=1
(3)
The position of an affine subspace relative to the origin
can be defined via the translation vector that is closest
to the origin. This orthogonal translation vector cµ is
perpendicular to all the affine displacement vectors in
M µ , so that all the points in the affine subspace have
equal projections on cµ , i.e., ~xµ · cµ = kcµ k for all xµ ∈
M µ (Fig. 2). We will further assume for simplicity that
the P normskcµ k are all the same and normalized to 1.
To investigate the separability properties of manifolds, it
is helpful to consider scaling a manifold M µ by an overall
scale factor r without changing its shape. We define the
~ 0 ∈ S by a scalar r > 0, by
scaling relative to a center S
(D+1
)
X
µ
µ
0
0
~∈S
rM =
S + r Si − S
u |S
(4)
i
i
i
i=1
When P
r → 0, the manifold rM µ converges to a point:
µ
x0 = i Si0 uµi . On the other hand, when r → ∞, the
manifold rM µ spans the entire affine subspace. If the
manifold is symmetric (such as for an ellipsoid), there
is a natural choice for a center. We will later provide
an appropriate definition for the center point for general,
asymmetric manifolds. In general, the translation vector
~ 0 need not coincide as shown in Fig. 2.
~c and center S
However, we will also discuss later the special case of
centered manifolds in which the translation vector and
center do coincide.
Bounds on linear separability of manifolds: For
dichotomies of P input points in RN at zero margin, κ =
0, the number of dichotomies that can be separated by a
linear hyperplane through the origin is given by [11]:
C0 (P, N ) = 2
N
−1
X
k=0
−1
CP
≤ 2P
k
(5)
n!
is the binomial coefficient for n ≥
where Cnk = k!(n−k)!
k, and zero otherwise. This result holds for P input
vectors that obey the mild condition that the vectors
are in general position, namely that all subsets of input
vectors of size p ≤ N are linearly independent.
For large P and N , the probability 21P C0 (P, N ) of a dichotomy being linearly separable depends only upon the
P
and exhibits a sharp transition at the critical
ratio N
value of α0 = 2. We are not aware of a comprehensive extension of Cover’s counting theorem for general
manifolds; nevertheless, we can provide lower and upper
bounds on the number of linearly realizable dichotomies
by considering the limit of r → 0 and r → ∞ under the
following general conditions.
First, in the limit of r → 0, the linear separability of P
manifolds becomes equivalent to the separability of the P
centers. This leads to the requirement that the centers of
the manifolds, xµ0 , are in general position in RN . Second,
we consider the conditions under which the manifolds are
linearly separable when r → ∞ so that the manifolds
span complete affine subspaces. For a weight vector w
to consistently assign the same label to all points on an
affine subspace, it must be orthogonal to all the displacement vectors in the affine subspace. Hence, to realize a
dichotomy of P manifolds when r → ∞, the weight vector w must lie in a null space of dimension N −Dtot where
Dtot is the rank of the union of affine displacement vectors. When the basis vectors uµi are in general position,
then Dtot = min (DP, N ). Then for the affine subspaces
to be separable, P D < N is required and the projections of the P orthogonal translation vectors need also
be separable in the N − Dtot dimensional null space. Under these general conditions, the number of dichotomies
for D-dimensional affine subspaces that can be linearly
separated, CD (P, N ), can be related to the number of
dichotomies for a finite set of points via:
CD (P, N ) = C0 (P, N − P D).
(6)
From this relationship, we conclude that the ability to
linearly separate D-dimensional affine subspaces exhibits
a transition from always being separable to never being
2
P
= 1+2D
for large P and
separable at the critical ratio N
N (see Supplementary Materials, SM, Sec. S1).
For general D-dimensional manifolds with finite size, the
number of dichotomies that are linearly separable will
be lower bounded by CD (P, N ) and upper bounded by
C0 (P, N ). We introduce the notation, αM (κ), to denote
P
the maximal load N
such that randomly labeled manifolds are linearly separable with a margin κ, with high
probability. Therefore, from the above considerations, it
follows that the critical load at zero margin, αM (κ = 0),
is bounded by,
1
1
−1
≤ αM
(κ = 0) ≤ + D.
2
2
(7)
These bounds highlight the fact that in the large N limit,
the maximal number of separable finite-dimensional manifolds is proportional to N , even though each consists of
an infinite number of points. This sets the stage of a
P
statistical mechanical evaluation of the maximal α = N
, where P is the number of manifolds, and is described
in the following Section.
5
III.
STATISTICAL MECHANICAL THEORY
In order to make theoretical progress beyond the bounds
above, we need to make additional statistical assumptions about the manifold spaces and labels. Specifically,
we will assume that the individual components of uµi are
drawn independently and from identical Gaussian distributions with zero mean and variance N1 , and that the
binary labels y µ = ±1 are randomly assigned to each
manifold with equal probabilities. We will study the thermodynamic limit where N, P → ∞, but with a finite load
P
. In addition, the manifold geometries as speciα = N
fied by the set S in RD+1 , and in particular their affine
dimension, D, is held fixed in the thermodynamic limit.
Under these assumptions, the bounds in Eq. (7) can be
extended to the linear separability of general manifolds
with finite margin κ, and characterized by the reciprocal
−1
of the critical load ratio αM
(κ),
−1
α0−1 (κ) ≤ αM
(κ) ≤ α0−1 (κ) + D
(8)
where α0 (κ) is the maximum load for separation of random i.i.d. points with a margin κ given by the Gardner
theory [12],
α0−1 (κ) =
Z
κ
−∞
Dt (t − κ)2
(9)
2
t
√1 e− 2
2π
. For many interwith Gaussian measure Dt =
esting cases, the affine dimension D is large and the gap
in Eq. (8) is overly loose. Hence, it is important to derive an estimate of the capacity for manifolds with finite
sizes and evaluate the dependence of the capacity and
the nature of the solution on the geometrical properties
of the manifolds as shown below.
A.
As shown in Appendix A, we prove that the general form
of the inverse capacity, exact in the thermodynamic limit,
is:
−1
αM
(κ) = hF (T~ )iT~
(11)
2
~ ·S
~ − κ ≥ 0, ∀S
~∈S
~ − T~ | V
where F (T~ ) = minV~
V
and h. . .iT~ is an average over random D + 1 dimensional
vectors T~ whose components are i.i.d. normally distributed Ti ∼ N (0, 1). The components of the vector
~ represent the signed fields induced by the solution
V
vector w on the D + 1 basis vectors of the manifold. The
Gaussian vector T~ represents the part of the variability
~ due to quenched variability in the manifolds basis
in V
vectors and the labels, as will be explained in detail
below.
The inequality constraints in F can be written equivalently, as a constraint on the point on the mani~ . We therefore
fold with minimal projection on V
~
consider
o support function of S, gS (V ) =
n the concave
~ ·S
~|S
~ ∈ S , which can be used to write the
min ~ V
S
constraint for F (T~ ) as
F (T~ ) = min
~
V
~ − T~
V
2
~
| gS (V ) − κ ≥ 0
(12)
~ ) is easily mapped to
Note that this definition of gS (V
the conventional convex support function defined via the
max operation[16].
Karush-Kuhn-Tucker (KKT) conditions: To gain
insight into the nature of the maximum margin solution,
it is useful to consider the KKT conditions of the convex
optimization in Eq. 12 [16]. For each T~ , the KKT condi~ for F (T~ )
tions that characterize the unique solution of V
is given by:
Mean field theory of manifold separation
capacity
~ = T~ + λS̃(T~ )
V
(13)
where
Following Gardner’s framework [12, 13], we compute the
statistical average of log Z, where Z is the volume of the
space of the solutions, which in our case can be written
as:
Z
2
Z = dN wδ kwk − N Πµ,xµ ∈M µ Θ (y µ w · xµ − κ) ,
(10)
Θ (·) is the Heaviside function to enforce the margin constraints in Eq. (2), along with the delta function to en2
sure kwk = N . In the following, we focus on the properties of the maximum margin solution, namely the solution
for the largest load αM for a fixed margin κ, or equivalently, the solution when the margin κ is maximized for
a given αM .
λ≥0
(14)
~)−κ≥0
gS (V
i
~)−κ =0
λ gS (V
h
The vector S̃(T~ ) is
a subgradient of the support function
~ , S̃(T~ ) ∈ ∂gS V
~ [16], i.e., it is a point on the convex
at V
~ . When the suphull of S with minimal overlap with V
~
port function is differentiable, the subgradient ∂gS V
is unique and is equivalent to the gradient of the support
function,
~ ) = arg min V
~ ·S
~
S̃(T~ ) = ∇gS (V
~
S∈S
(15)
6
Since the support function is positively homogeneous,
~ ) = γgS (V
~ ) for all γ > 0; thus, ∇gS (V
~ ) depends
gS (γ V
~ such that
only on the unit vector V̂ . For values of V
~ ) is not differentiable, the subgradient is not unique,
gS (V
but S̃(T~ ) is defined uniquely as the particular subgradient that obeys the KKT conditions, Eq. 13-14. In the
latter case, S̃(T~ ) ∈ conv (S) may not reside in S itself.
From Eq. (13), we see that the capacity can be written
in terms of S̃(T~ ) as,
F (T~ ) = λS̃(T~ )
2
.
(16)
The scale factor λ is either zero or positive, corresponding
~ ) − κ is positive or zero. If gS (V
~ ) − κ is
to whether gS (V
~ = T~ and T~ · S̃(T~ ) −
positive , then λ = 0 meaning that V
~
~
~ 6= T~ . In
κ > 0. If T · S̃(T ) − κ < 0 , then, λ > 0 and V
2
this case, multiplying 13 with S̃(T~ ) yields λ S̃(T~ ) =
T~ · S̃(T~ ) − κ. Thus, λ obeys the self consistent equation,
h
λ=
i
T~ · S̃(T~ ) − κ
+
S̃(T~ )
(17)
2
where the function [x]+ = max(x, 0).
B.
equation, it follows that α−1 =
N
P
=
λ2 S̃
2
which
yields the KKT expression for the capacity, see Eqs. 11
and 16.
The KKT relations above, are self-consistent equations
for the statistics of λµ and S̃ µ . The mean field theory derives the appropriate statistics from self-consistent equations of the fields on a single manifold. To see this,
consider projecting the solution vector w onto the affine
subspace of one of the manifolds, say µ = 1 . We de~ 1 , as V 1 = y 1 w · u1 ,
fine a D + 1 dimensional vector, V
i
i
i = 1, ..., D + 1, which are the signed fields of the solution
on the affine basis vectors of the µ = 1 manifold. Then,
~ 1 = λ1 S̃ 1 + T~ where T~ represents
Eq. (18) reduces to V
the contribution from all the other manifolds and since
their subspaces are randomly oriented, this contribution
is well described as a random Gaussian vector. Finally,
self consistency requires that for fixed T~ , S̃ 1 is such that
~ 1 and represents a point
it has a minimal overlap with V
residing on the margin hyperplane, otherwise it will not
contribute to the max margin solution. Thus Eq. 13
is just the decomposition of the field induced on a specific manifold decomposed into the contribution induced
by that specific manifold along with the contributions
coming from all the other manifolds. The self consistent equations 14 as well as 17 relating λ to the Gaussian
statistics of T~ then naturally follow from the requirement
that S̃ 1 represents a support vector.
Mean field interpretation of the KKT relations
C.
The KKT relations have a nice interpretation within the
framework of the mean field theory. The maximum margin solution vector can always be written as a linear combination of a set of support vectors. Although there are
infinite numbers of input points in each manifold, the solution vector can be decomposed into P vectors, one per
manifold,
w=
P
X
µ=1
λµ y µ x̃µ , λµ ≥ 0
(18)
where x̃µ ∈ conv (M µ ) is a vector in the convex hull of
the µ-th manifold. In the large N limit, these vectors
are uncorrelated with each other. Hence, squaring this
equation yields,
2
kwk = N =
P
X
λ2µ S̃ µ
2
(19)
µ=1
where S̃ µ are the coordinates of x̃µ in the µ-th affine
subspace of the µ-th manifold, see Eq. (1). From this
Anchor points and manifold supports
The vectors x̃µ contributing to the solution, Eq. (18),
play a key role in the theory. We will denote them or
equivalently their affine subspace components, S̃ µ , as the
manifold anchor points. For a particular configuration of
manifolds, the manifolds could be replaced by an equivalent set of P anchor points to yield the same maximum
margin solution. It is important to stress, however, that
an individual anchor point is determined not only by the
configuration of its associated manifold but also by the
random orientations of all the other manifolds. For a
fixed manifold, the location of its anchor point will vary
with the relative configurations of the other manifolds.
This variation is captured in mean field theory by the
dependence of the anchor point S̃ on the random Gaussian vector T~ .
In particular, the position of the anchor point in the convex hull of its manifold reflects the nature of the relation
between that manifold and the margin planes. In general,
a fraction of the manifolds will intersect with the margin
hyperplanes, i.e., they have non-zero λ; these manifolds
are the support manifolds of the system. The nature of
this support varies and can be characterized by the dimension, k, of the span of the intersecting set of conv (S)
7
(a)
(b)
=0
cone(S)
nP
D+1
o
~i | S
~i ∈ S, αi ≥ 0 , see Fig. 3. The shifted
αi S
polar cone of S, denoted Sκ◦ , is defined as the convex set
of points given by,
n
o
~ ∈ RD+1 | U
~ ·S
~ + κ ≤ 0, ∀S
~∈S
Sκ◦ = U
(20)
>0
i=1
cone(S)
S
S
S̃
S̃
S̃
S̃
T~
T~
~c
~
V
S=0
~
V
S>0
~ + λS̃ at (a) zero
Figure 3. Conic decomposition of −T~ = −V
margin κ = 0 and (b) non-zero margin κ > 0. Given a random
~ − T~ is minimized while
~ is found such that V
Gaussian T~ , V
~ being on the polar cone Sκ◦ . λS̃ is in cone(S) and S̃ is
−V
the anchor point, a projection on the convex hull of S.
with the margin planes. Some support manifolds, which
we call touching manifolds, intersect with the margin hyperplane only with their anchor point. They have a support dimension k = 1, and their anchor point S̃ is on the
boundary of S. The other extreme is fully supporting
manifolds which completely reside in the margin hyperplane. They are characterized by k = D + 1. In this case,
~ is parallel to the translation vector ~c of S. Hence, all
V
the points in S are support vectors, and all have the
~ . The anchor point, in this case,
same overlap, κ, with V
is the unique point in the interior of conv(S) which obeys
the self consistent equation, 13, namely that it balances
the contribution from the other manifolds to zero out
~ that are orthogonal to ~c. In the
the components of V
case of smooth convex hulls (i.e., when S is strongly convex), no other manifold support configurations exist. For
other types of manifolds, there are also partially supporting manifolds, whose convex hull intersection with the
margin hyperplanes consist of k dimensional faces with
1 < k < D + 1. The associated anchor points then reside
inside the intersecting face. For instance, k = 2 implies
that S̃ lies on an edge whereas k = 3 implies that S̃ lies
on a planar 2-face of the convex hull. Determining the
dimension of the support structure that arises for various
T~ is explained below.
D.
Conic decomposition
The KKT conditions can also be interpreted in terms of
the conic decomposition of T~ , which generalizes the notion of the decomposition of vectors onto linear subspaces
and their null spaces via Euclidean projection. The convex cone of the manifold S is defined as cone (S) =
and is illustrated for κ = 0 and κ > 0 in Fig. 3. For
κ = 0, Eq. (20) is simply the conventional polar cone
of S [17]. Equation (13) can then be interpreted as
the decomposition of −T~ into the sum of two compo~ , i.e., its Euclidean
nent vectors: one component is −V
projection onto Sκ◦ ; the other component λS̃(T~ ) is located in cone (S). When κ = 0, the Moreau decomposition theorem states
that
the two components are
~
~
perpendicular: V · λS̃(T ) = 0 [18]. For non-zero κ,
the two components
need not be perpendicular but obey
~ · λS̃(T~ ) = κλ.
V
The position of vector T~ in relation to the cones, cone(S)
and Sκ◦ , gives rise to qualitatively different expressions
for F T~ and contributions to the solution weight vector and inverse capacity. These correspond to the different support dimensions mentioned above. In particular,
~ and λ = 0 so the supwhen -T~ lies inside Sκ◦ , T~ = V
port dimension, k = 0. On the other hand, when −T~
~ = κ~c and the manifold is fully
lies inside cone (S), V
supporting, k = D + 1.
E.
Numerical solution of the mean field equations
The solution of the mean field equations consists of two
stages. First, S̃ is computed for a particular T~ and then
the relevant contributions to the inverse capacity are averaged over the Gaussian distribution of T~ . For simple
geometries such as `2 ellipsoids, the first step may be
solved analytically. However, for more complicated geometries, both steps need to be performed numerically.
~ and S̃ for a given T~
The first step involves determining V
by solving the quadratic semi-infinite programming problem (QSIP), Eq. (12), over the manifold S which may
contain infinitely many points. A novel “cutting plane”
method has been developed to efficiently solve the QSIP
problem, see SM (Sec. S4). Expectations are computed
by sampling Gaussian T~ in D + 1 dimensions and taking
the appropriate averages, similar to procedures for other
mean field methods. The relevant quantities corresponding to the capacity are quite concentrated and converge
quickly with relatively few samples.
In following Sections, we will also show how the mean
field theory compares with computer simulations that
numerically solve for the maximum margin solution of
realizations of P manifolds in RN , given by Eq. (2), for
a variety of manifold geometries. Finding the maximum
8
margin solution is challenging as standard methods to
solving SVM problems are limited to a finite number of
input points. We have recently developed an efficient
algorithm for finding the maximum margin solution in
manifold classification and have used this method in the
present work (see [19] and SM (Sec. S5)).
IV.
A.
MANIFOLD GEOMETRY
Longitudinal and intrinsic coordinates
In this section, we address how the capacity to separate a set of manifolds can be related to their geometry, in particular to their shape within the D-dimensional
affine subspace. Since the projections of all points in a
manifold onto the translation vector, cµ , are the same,
~xµ · cµ = kcµ k = 1, it is convenient to parameterize the
D + 1 affine basis vectors such that uµD+1 = cµ . In these
coordinates, the D + 1 dimensional vector representation
~ = (0, 0, . . . , 0, 1). This parameterization is conof cµ is C
venient since it constrains the manifold variability to be
~ while the D +1 coordinate
in the first D components of S
is a longitudinal variable measuring the distance of the
manifold affine subspace from the origin. We can then
write the D + 1 dimensional vectors T~ = (~t, t0 ) where
~ V
~ = (~v , v0 ), S
~ =(~s, 1), S̃ = (s̃, 1) , where
t0 = T~ · C,
lower case vectors denote vectors in RD . We will also refer to the D-dimensional intrinsic vector, s̃, as the anchor
point. In this notation, the capacity, Eq. (16)-(17) can
be written as,
2
Z
Z
−t0 − ~t · s̃(~t, t0 ) + κ +
−1
(21)
αM (κ) = D~t Dt0
2
1 + s̃(~t, t0 )
It is clear from this form that when D = 0, or when all
the vectors in the affine subspace obey s̃(~t, t0 ) = 0 , the
capacity reduces to the Gardner result, Eq. (9). Since
~ · S̃=~v · s̃ + v0 , for all S̃ , g(V
~ ) = g(~v ) + v0 , and the
V
support function can be expressed as,
g(~v ) = min {~v · ~s | ~s ∈ S} .
~
s
ttouch (~t) = −g(~t)
(23)
Non-zero contributions to the capacity only occur outside
this interior regime when g(~t) + t0 − κ < 0, in which case
λ > 0. Thus, for all support dimensions k > 0, the
solution for ~v is active, satisfying the equality condition,
g(~v ) + v0 − κ = 0, so that from Eq. (13):
g(~v ) + t0 − κ − λ = 0,
(24)
outside the interior regime.
Fully supporting manifolds (k = D + 1): When t0
is sufficiently negative, v0 = κ, ~v = 0 and λ = t0 − κ.
The anchor point s̃(T~ ) which obeys the KKT equations
resides in the interior of conv (S),
s̃(~t, t0 ) =
−~t
κ − t0
(25)
For a fixed ~t, t0 must be negative enough, t0 − κ < tfs ,
where
−~t
∈ conv(S)
(26)
tfs (~t) = arg max t0 |
κ − t0
guaranteeing that s̃(~t, t0 ) ∈ conv (S). The contribution
of this regime to the capacity is
(22)
The KKT relations can be written as ~v = ~t +
λ~s where λ = v0 − t0 ≥ 0, g(~v ) ≥ κ − v0 ,
λ [g(~v ) + v0 − κ] = 0, and s̃ minimizes the overlap with ~v . The resultant equation
for λ (or v0 )
2
is λ = −t0 − ~t · s̃(~t, t0 ) + κ / 1 + s̃(~t, t0 )
which
+
agrees with Eq. 17.
B.
in the previous section. To do this, we fix the random
vector ~t and consider the qualitative change in the anchor
point, s̃(~t, t0 ) as t0 decreases from +∞ to −∞.
Interior manifolds (k = 0): For sufficiently positive t0 ,
the manifold is interior to the margin plane, i.e., λ = 0
with corresponding support dimension k = 0. Although
not contributing to the inverse capacity and solution vector, it is useful to associate anchor points to these manifolds defined as the closest point on the manifold to the
margin plane: s̃(~t) = arg min~s∈S ~t ·~s = ∇g(~t) since ~v = ~t.
This definition ensures continuity of the anchor point for
all λ ≥ 0.
This interior regime holds when g(~t) > κ − t0 , or equivalently for t0 − κ > ttouch (~t) where
Types of supports
Using the above coordinates, we can elucidate the conditions for the different types of support manifolds defined
F (T~ ) = ~v − ~t
2
+ (v0 − t0 )2 = ~t
2
+ (κ − t0 )2 , (27)
see Eq. (12). Finally, for values of t0 such that tfs (~t) ≤
t0 − κ ≤ ttouch (~t), the manifolds are partially supporting with support dimension 1 ≤ k ≤ D. Examples of
different supporting regimes are illustrated in Figure 4.
C.
Effects of size and margin
We now discuss the effect of changing manifold size and
the imposed margin on both capacity and geometry. As
9
described by Eq. (4), change in the manifold size corresponds to scaling every s̃ by a scalar r.
Small size: If r → 0, the manifold shrinks to a point
(the center), whose capacity reduces to that of isolated
points. However, in the case where D 1 , the capacity
may be affected by the manifold structure even if r 1,
see section IV F. Nevertheless, the underlying support
structure is simple. When r is small, the manifolds have
only two support configurations. For t0 − κ > 0, the
manifold is interior with: λ = 0 , v0 = t0 and ~v = ~t.
When t0 − κ < 0, the manifold becomes touching with
support dimension k = 1. In that case, because s̃ has a
small magnitude, ~v ≈ ~t, λ ≈ κ − t0 , and v0 ≈ κ. Thus,
in both cases, ~v is close to the Gaussian vector ~t. The
probability of other configurations vanishes.
Large size: In the large size limit r → ∞, separating the manifolds is equivalent to separating the affine
subspaces. As we show in Appendix C, when r 1,
there are two Rmain support structures. With probabil∞
ity H (−κ) = −κ Dt0 the manifolds are fully supporting,
namely the underlying affine subspaces are parallel to the
margin plane. This regime contributes to the inverse capacity an amount H (−κ) D+α0−1 (κ). The other regimes
(touching or partially supporting) are such that the angle between the affine subspace and the margin plane is
almost zero, and contribute an amount H(κ)D to the
inverse capacity. Combining the two contributions, we
−1
obtain for large sizes, αM
= D + α0−1 (κ), consistent with
Eq. (8).
Large margin: For a fixed T~ , Eq. (26) implies that
larger κ increases the probability of being in the supporting regimes. Increasing κ also shrinks the magnitude of s̃
according to Eq. (25). Hence, when κ 1, the capacity
becomes similar to that of P random points and the corresponding capacity is given by αM ≈ κ−2 , independent
of manifold geometry.
Manifold centers: The theory of manifold classification
described in Sec. III does not require the notion of a
manifold center. However, understanding how scaling
the manifold sizes by a parameter r in (4) affects their
capacity, the center points about which the manifolds
are scaled need to be defined. For many geometries, the
center is a point of symmetry such as for an ellipsoid.
For general manifolds, a natural definition would be the
center of mass of the anchor points S̃(T~ ) averaging over
the Gaussian measure of T~ . We will adopt here a simpler
definition for the center provided by the Steiner point for
~ 0 = (~s0 , 1) with
convex bodies [20], S
~s0 = ∇gS (~t)
~
t
(28)
and the expectation is over the Gaussian measure of
~t ∈ RD . This definition coincides with the center of mass
of the anchor points when the manifold size is small. Furthermore, it is natural to define the geometric properties
~v = ~t
(a1)
(a2)
~v
~t
(a3)
~t
~v
Interior (k=0)
(b1)
~v = ~t
s̃
s̃
s̃
~v = 0
Touching (k=1)
(b2)
(b3)
~v
Fully supporting (k=3)
~v
~t
(b4)
~t
~t
s̃
s̃
Interior (k=0)
Touching (k=1)
s̃
s̃
Partially supporting (k=2)
~v = 0
Fully supporting (k=3)
Figure 4. Determining the anchor points of the Gaussian
distributed vector (~t, t0 ) onto the convex hull of the manifold, denoted as s̃(~t, t0 ). Here we show for the same vector
~t, the change in s̃(~t, t0 ) as t0 decreases from +∞ to −∞.
(a) D = 2 strictly convex manifold. For sufficiently negative −t0 the vector −~t obeys the constraint g(~t) − t0 > κ,
hence −~t = −~v and the configuration corresponds to an interior manifold (support dimension k = 0). For intermediate
values where (ttouch > t0 − κ > tfs ), (−~t, −t0 ) violates the
above constraints and s̃ is a point on the boundary of the
manifold that maximizes the projection on the manifold of
a vector (−~v , −v0 ) that is the closest to (−~t, −t0 ) and obeys
g(~v ) + t0 − λ = κ. Finally, for larger values of −t0 , ~v = 0
and s̃ is a point in the interior of the manifold in the direction of −~t (fully supporting with k = 3). (b) D = 2 square
manifold. Here, in both the interior and touching regimes, s̃
is a vertex of the square. In the fully supporting regime, the
anchor point is in the interior and collinear to −~t. There is
also a partially supporting regime when −t0 is slightly below
tfs . In this regime, −~v is perpendicular to one of the edges
and s̃ resides on an edge, corresponding to manifolds whose
intersection with the margin planes are edges (k = 2).
of manifolds in terms of centered manifolds where the
manifolds are shifted within their affine subspace so that
the center and orthogonal translation vector coincide, i.e.
~s0 = ~c with ~s0 = k~ck = 1. This means that all lengths
are defined relative to the distance of the centers from
the origin and the D-dimensional intrinsic vectors ~s give
the offset relative to the manifold center.
D.
Manifold anchor geometry
The capacity equation (21) motivates defining geometrical measures of the manifolds, which we call manifold
anchor geometry. Manifold anchor geometry is based on
the statistics of the anchor points s̃(~t, t0 ) induced by the
Gaussian random vector (~t, t0 ) which are relevant to the
capacity in Eq. (21). These statistics are sufficient for
determining the classification properties and supporting
structures associated with the maximum margin solution.
We accordingly define the manifold anchor radius and dimension as:
Manifold anchor radius: denoted RM , is defined by
the mean squared length of s̃(~t, t0 ),
D
E
2
2
RM
= s̃(~t, t0 )
(29)
t~,t0
10
Manifold anchor dimension: DM , is given by
D
2 E
DM = ~t · ŝ(~t,t0 )
t~,t0
(a)
(30)
where ŝ is a unit vector in the direction of s̃. The anchor
dimension measures the angular spread between ~t and
the corresponding anchor point s̃ in D dimensions.
D 2 E Note
that the manifold dimension obeys DM ≤ ~t
= D.
Whenever there is no ambiguity, we will call RM and DM
the manifold radius and dimension, respectively.
These geometric descriptors offer a rich description of
the manifold properties relevant for classification. Since
~v and s̃ depend in general on t0 − κ, the above quantities
are averaged not only over ~t but also over t0 . For the
same reason, the manifold anchor geometry also depends
upon the imposed margin.
E.
Gaussian geometry
We have seen that for small manifold sizes, ~v ≈ ~t, and the
anchor points s̃ can be approximated by s̃(~t) = ∇gS (t̂).
Under these conditions, the geometry simplifies as shown
in Fig. 5. For each Gaussian vector ~t ∈ RD , s̃(~t) is
the point on the manifold that first touches a hyperplane normal to -~t as it is translated from infinity towards the manifold. Aside from a set of measure zero,
this touching point is a unique point on the boundary of
conv(S). This procedure is similar to that used to define
the well known Gaussian mean-width, which in our notation equals w(S) = −2 gS (~t) ~t[21]. Note that for small
sizes, the touching point does not depend on t0 or κ so its
statistics are determined only by the shape of conv (S)
relative to its center. This motivates defining a simpler
manifold Gaussian geometry denoted by the subscript g,
which highlights its dependence over a D dimensional
Gaussian measure for ~t.
Gaussian radius: denoted by Rg , measures the mean
square amplitude of the Gaussian anchor point, s̃g (~t) =
∇gS (t̂):
D
2E
Rg2 = s̃g ~t
(31)
~
t
where the expectation is over D-dimensional Gaussian ~t.
Gaussian dimension: Dg , is defined by,
D
2 E
Dg = ~t · ŝg ~t
~
t
(32)
where ŝg is the unit vector in the direction of s̃g . While
Rg2 measures the total variance of the manifold, Dg measures the angular spread of the manifold, through the
~
statistics of the angle between
D 2 E t and its Gaussian anchor
point. Note that Dg ≤ ~t
= D.
~t
s̃g (~t)
(b)
~t
s̃g (~t)
(c)
~t
s̃g (~t)
Figure 5. Gaussian anchor points: Mapping from ~t to points
s̃g (~t), showing the relation between −~t and the point on the
manifold that touches a hyperplane orthogonal to ~t . D =
2 manifolds shown: (a) circle; (b) `2 ellipsoid; (c) polytope
manifold. In (c), only for values of ~t of measure zero (when
~t is exactly perpendicular to an edge), s̃g (~t) will lie along the
edge, otherwise it coincides with a vertex of the polytope. In
all cases, s̃g (~t) will be in the interior of the convex hulls only
for ~t = 0. Otherwise, it is restricted to their boundary.
It is important to note that even in this limit, our geometrical definitions are not equivalent to conventional
geometrical measures such as the longest chord or second order statistics induced from a uniform measure over
the boundary of conv (S). For the special
case of Ddimensional `2 balls with radius R, s̃g ~t is the point
on the boundary of the ball in the direction of ~t so that
Rg = R and Dg = D. However, for general manifolds, Dg
can be much smaller than the manifold affine dimension
D as illustrated in some examples later.
We recapitulate the essential difference between the
Gaussian geometry and the full manifold anchor geometry. In the Gaussian case, the radius is an intrinsic property of the shape of the manifold in its affine subspace
and is invariant to changing its distance from the origin. Thus, scaling the manifold by a global scale factor
r as defined in Eq. (4) results in scaling Rg by the factor r. Likewise, the dimensionality Dg is invariant to a
global scaling of the manifold size. In contrast, the anchor geometry does not obey such invariance for larger
manifolds. The reason is that the anchor point depends
on the longitudinal degrees of freedom, namely on the
size of the manifold relative to the distance from the center. Hence, RM need not scale linearly with r, and DM
will also depend on r. Thus, the anchor geometry can
be viewed as describing the general relationship between
the signal (center distance) to noise (manifold variability)
in classification capacity. We also note that the manifold
anchor geometry automatically accounts for the rich support structure described in Section IV D. In particular,
as t0 decreases, the statistics of the anchor points change
from being concentrated on the boundary of conv(S) to
its interior. Additionally for manifolds which are not
strictly convex and intermediate values of t0 , the anchor
statistics become concentrated on k-dimensional facets
of the convex hull corresponding to partially supported
manifolds.
We illustrate the difference between the two geometries
2D Ellipsoid Distribution of S, theta
11
(a)
$% = ', $) = '
(b)
1
Polar-constrained
0.98
Manifold Anchor
(c)
$% = ', $) = ). '
0.2
Gaussian
Gaussian
0.15
$% = ', $) = ). '
0.4
Gaussian
Polar-constrained
0.3
0.96
0.1
0.2
0.02
0.05
0.1
0
0
2.5
!"
5
0
0
2.5
!"
Gaussian
Polar-constrained
5
0
0
10
20
30
40
#
Figure 6. Distribution of ks̃k (norm of manifold anchor vectors) and θ = ∠(−~t, s̃) for D = 2 ellipsoids. (a) Distribution
of s̃ for `2 ball with R = 5. The Gaussian geometry is peaked
at ks̃k = r (blue), while ks̃k < r has non-zero probability for
the manifold anchor geometry (red). (b-c) D = 2 ellipsoids,
with radii R1 = 5 and R2 = 21 R1 . (b) Distribution of ks̃k
for Gaussian geometry (blue) and anchor geometry (red). (c)
Corresponding distribution of θ = ∠(−~t, s̃).
in Fig. 6 with two simple examples: a D = 2 `2 ball and
a D = 2 `2 ellipse. In both cases we consider the distribution of ks̃k and θ = cos−1 −t̂ · ŝ , the angle between
−~t and s̃. For the ball with radius r, the vectors −~t and s̃
are parallel so the angle is always zero. For the manifold
anchor geometry, s̃ may lie inside the ball in the fully
supporting region. Thus the distribution of ks̃k consists
of a mixture of a delta function at r corresponding to
the interior and touching regions and a smoothly varying
distribution corresponding to the fully supporting region.
Fig. 6 also shows the corresponding distributions for a
two dimensional ellipsoid with major and minor radius,
R1 = r and R2 = 21 r. For the Gaussian geometry, the
distribution of ks̃k has finite support between R1 and R2 ,
whereas the manifold anchor geometry has support also
below R2 . Since ~t and s̃ need not be parallel, the distribution of the angle varies between zero and π4 , with
the manifold anchor geometry being more concentrated
near zero due to contributions from the fully supporting
regime. In Section (VI), we will show how the Gaussian geometry becomes relevant even for larger manifolds
when the labels are highly imbalanced, i.e. sparse classification.
F.
Geometry and classification of high dimensional
manifolds
In general, linear classification as expressed in Eq. (21)
depends on high order statistics of the anchor vectors
s̃(~t, t0 ). Surprisingly, our analysis shows that for high dimensional manifolds, the classification capacity can be
described in terms of the statistics of RM and DM alone.
This is particularly relevant as we expect that in many
applications, the affine dimension of the manifolds is
large. More specifically, we define high-dimensional manifolds as manifolds where the manifold dimension is large,
i.e., DM 1 (but still finite in the thermodynamic limit).
In practice we find that DM & 5 is sufficient. Our analysis below elucidates the interplay between size and dimension, namely, how small RM needs to be for high dimensional manifolds to have a substantial classification
capacity.
In the high-dimensional regime, the mean field equations
simplify due to self averaging of terms involving sums
of components ti and s̃i . The two quantity, ~t · s̃, that
appears in the capacity, (21), can be approximated as
−~t · s̃ ≈ κM where
√ we introduce the effective2 manifold
2
,
margin κM = RM DM . Combined with ks̃k ≈ RM
we obtain
αM (κ) ≈ α0
κ + κM
p
2
1 + RM
!
(33)
where α0 is the capacity for P random points, Eq. (9).
To gain insight into this result we note that the effective
margin on the center is its mean distance from the point
closest to the
√ margin plane, s̃, which is roughly the mean
of ~t·s̃ ≈ RM DM . The denominator in Eq. (33) indicates
that
p the margin needs to be scaled by the input norm,
2 . In Appendix B, we show that Eq. (33) can
1 + RM
also be written as
αM (κ) ≈ αBall (κ, RM , DM )
(34)
namely, the classification capacity of a general high dimensional manifold is well approximated by that of `2
balls with dimension DM and radius RM .
Scaling regime: Eq. (33) implies that to obtain a finite capacity in the
√high-dimensional regime, the effective
margin κM = RM DM needs to be of order unity which
requires the
radius
to be small, scaling for large DM as
− 21
RM = O DM . In this scaling regime, the calculation
of the capacity and geometric properties are particularly
simple. As argued above, when the radius is small, the
components of s̃ are small, hence ~v ≈ ~t, and the Gaussian statistics for the geometry suffice. Thus, we can
replace RM and DM in Eqs. (33)- (34) by Rg and Dg ,
respectively. Note that in the scaling regime, the factor
proportional to 1 + Rg2 in Eq. (33) is the next order correction to the overall capacity sincep
Rg is small. Notably,
the margin in this regime, κg = Rg Dg , is equal to half
the Gaussian mean width of convex bodies, κg ≈ 12 w(S)
[22]. As for the support structure, since the manifold size
is small, the only significant contributions arise from the
interior (k = 0) and touching (k = 1) supports.
Beyond the scaling regime: When Rg is not small,
the anchor geometry, RM and DM , cannot be adequately
described by the Gaussian statistics, R
√g and Dg . In this
case, the manifold margin κM = RM DM is large and
Eq. (33) reduces to :
12
αM ≈
−2
RM
1+
DM
(35)
where we have used α0 (κ) ≈ κ−2 for large margins and
assumed that κ κM . For strictly convex high dimensional manifolds with RM = O(1), only the touching
regime (k = 1) contributes significantly to the geometry and hence to the capacity. For manifolds that are
not strictly convex, partially supporting solutions with
k D can also contribute to the capacity.
Finally, when RM is large, fully supporting regimes with
k ≈ D contribute to the geometry, in which case, the
manifold anchor dimension approaches the affine dimen1
,
sion DM → D and Eqs. (33) and (35)reduce to αM ≈ D
as expected.
V.
A.
EXAMPLES
Strictly convex manifolds: `2 ellipsoids
The family of `2 ellipsoids are examples of manifolds
which are strictly convex. Strictly convex manifold have
smooth boundaries that do not contain corners, edges, or
flats (see Appendix B). Thus, the description of the anchor geometry and support structures is relatively simple.
The reason is that the anchor vectors s̃(~t, t0 ) correspond
to either interior (k = 0), touching (k = 1), or fully supporting (k = D+1), while partial support (1 < k < D+1)
is not possible. The `2 ellipsoid geometry can be solved
analytically; nevertheless, because it has less symmetry
than the sphere, it exhibits some salient properties of
manifold geometry such as nontrivial dimensionality and
non-uniform measure of the anchor points.
We assume the ellipsoids are centered relative to their
symmetry centers as described in Sec. IV, and
PDcan be
parameterized by the set of points: M µ = xµ0 + i=1 si uµi
where
(
)
2
D
X
si
S = ~s |
≤1 .
(36)
Ri
i=1
The components of uµi and of the ellipsoid centers x0 µ
are i.i.d. Gaussian distributed with zero mean and variance √1N so that they are orthonormal in the large N
limit. The radii Ri represent the principal radii of the ellipsoids relative to the center. The anchor points s̃(~t, t0 )
can be computed explicitly (details in the Appendix B),
corresponding to three regimes.
Interior (k = 0), occurs when t0 − κ ≥ ttouch (~t) where,
v
uD
uX
ttouch (~t) = t
Ri2 t2i
(37)
i=1
Here λ = 0, resulting in zero contribution to the inverse
capacity.
The touching regime (k = 1) holds when ttouch (~t) > t0 −
κ > tfs (~t) and
v
u D 2
uX ti
~
(38)
tfs (t) = −t
Ri
i=1
Finally, the fully supporting regime (k = D + 1) occurs
when tfs (~t) > t0 − κ. The full expression for the capacity
for `2 ellipsoids is given in Appendix, Section B. Below,
we focus on the interesting cases of ellipsoids with D 1.
High-dimensional ellipsoids: It is instructive to apply the general analysis of high dimensional manifolds to
ellipsoids with D 1. We will distinguish between different size regimes by assuming that all the radii of the
ellipsoid are scaled by a global factor r. In the high dimensional regime, due to self-averaging, the boundaries
of the touching and fully supporting transitions can be
approximated by,
v
uD
uX
Ri2
(39)
ttouch = t
i=1
v
uD
uX
tfs = −t
Ri−2
(40)
i=1
√
both independent of ~t. Then as long as Ri D are not
large (see below), tfs → −∞, and the probability of fully
supporting vanishes. Discounting the fully supporting
regime, the anchor vectors s̃(~t, t0 ) are given by,
s̃i = −λi ti
λi =
(41)
Ri2
Z(1 + Ri2 )
(42)
PD
R2
where the normalization factor Z 2 = i=1 (1+Ri 2 )2 (see
i
Appendix B) . The capacity for high-dimensional ellipsoids, is determined via Eq. (33) with manifold anchor
radius,
2
RM
=
D
X
λ2i
(43)
i=1
and anchor dimension,
P
DM =
D
i=1
PD
i=1
λi
2
λ2i
(44)
13
Scaling regime: In the scaling regime where the radii
are small, the radius and dimension are equivalent to the
Gaussian geometry:
PD
Rg2
=
Ri4
i=1
PD
i=1
Ri2
R)
0.8
2
Ellipso
1.5
0.6
1
0.4
0.5
0.2
0
50
100
150
(c)
0
200
Dimension
100
R
r
101
102
0
% = 200
0
RR "
/R/$
0.8
M
100
0
10-1
1
150
50
10-2
(d)
200
%*
0.6
0.4
0.2
0
10-2 10-1
100
101
10
102
-2
10
(e2)
r=0.01
R0=1.00e-02
0.6
10
2
r
(e3)
r=1
R =1.00e+00
r=100
R =1.00e+02
0
1
0
R0
r
(e1)
(45)
(b)
1
M
The anchor covariance matrix: We can also compute
the covariance matrix of the anchor points. This matrix
is diagonal in the principal directions of the ellipsoid, and
its eigenvalues are λ2i . It is interesting to compare DM
with a well known measure of an effective dimension of a
covariance matrix, the participation ratio [23, 24]. Given
a spectrum of eigenvalues of the covariance matrix, in our
notation λ2i , we can define a generalized participation
P
2
( D λqi )
The conventional
ratio as P Rq = Pi=1
2q , q > 0.
D
i=1 λi
participation ratio uses q = 2, whereas DM uses q = 1 .
r=1
(a)
D
Note that RM /r and DM are not invariant to scaling the
ellipsoid by a global factor r, reflecting the role of the
fixed centers.
0
1
0.4
0.5
0.5
0.2
P
Dg =
D
i=1
Ri2
PD
2
Ri4
i=1
0
κg =
!1/2
Ri2
(47)
i=1
R
As can be seen, Dg and rg are invariant to scaling all the
radii by r, as expected. It is interesting to compare the
above Gaussian geometric parameters with the statistics
induced by a uniform measure on the surface of the ellipsoid. In this case, the covariance matrix has eigenvalues
P
λ2i = Ri2 and the total variance is equal to i Ri2 . In
contrast, in the Gaussian geometry, the eigenvalues of
the covariance matrix, λ2i , are proportional to Ri4 . This
and the corresponding expression (45) for the squared
radius is the result of a non-uniform induced measure on
the surface of the ellipse in the anchor geometry, even in
its Gaussian limit.
Beyond the scaling regime: When Ri = O(1), the
high dimensional ellipsoids all become touching manifolds
since ttouch → −∞ and tfs → ∞. The capacity is small
because κM 1, and is given by Eq. (35) with Eqs.
(43)-(44). Finally, when all Ri 1, we have,
2
RM
= PD
D
−2
i=1 Ri
=
1
hRi−2 ii
1
D+1
0
0
1
D+1
0
0
1
D+1
(46)
and the effective margin is given as,
D
X
0
(48)
Here RM scales with the global scaling factor, r, DM = D,
and α−1 = D. Although the manifolds are touching,
their angle relative to the margin plane is near zero.
Figure 7. Bimodal `2 ellipsoids. (a) Ellipsoidal radii Ri with
r = 1 (b) Classification capacity as a function of scaling factor
r: (blue lines) full mean field theory capacity, (black dashed)
approximation of the capacity given by equivalent ball with
RM and DM , (circles) simulation capacity, averaged over 5
repetitions, measured with 50 dichotomies per each repetition. (c) Manifold dimension DM as a function of r. (d)
Manifold radius RM relative to r. (e) Fraction of manifolds
with support dimension k for different values of r: k = 0 (interior), k = 1 (touching), k = D + 1 (fully supporting). (e1)
Small r = 0.01, where most manifolds are interior or touching
(e2) r = 1, where most manifolds are in the touching regime
(e3) r = 100, where the fraction of fully
qPsupporting manifolds
−2
is 0.085, predicted by H(−tfs ) = H(
i Ri ) (Eq. 40).
√
When Ri ≈ D or larger, the fully supporting transition tfs becomes order one and the probability of fully
supporting is significant.
In Fig. 7 we illustrate the behavior of high D-dimensional
ellipsoids, using ellipsoids with a bimodal distribution of
their principal radii, Ri : Ri = r, for 1 ≤ i ≤ 10 and
Ri = 0.1r, for 11 ≤ i ≤ 200 (Fig. 7(a)). Their properties are shown as a function of the overall scale r. Fig.
7(b) shows numerical simulations of the capacity, the full
mean field solution as well as the spherical high dimensional approximation (with RM and DM ). These calculations are all in good agreement, showing the accuracy
of the mean field theory and spherical approximation.
As seen in (b)-(d), the system is in the scaling regime
for r < 0.3. In this regime, the manifold dimension is
constant and equals Dg ≈ 14, as predicted by the par-
14
(a)
(b)
r=1
0
1
10
Ri
10
10-1
0
10
10
-2
-1
10
200 400 600 800 1000
(c)
M
750
! = 1023
RM/r
1000
D
(d)
Dimension
500
250
0
!'
10-2
100
r
102
12
10
8
6
4
2
0
10-3 10-2 10-1 100 101 102
r
-3
-2
-1
10 10 10
0
1
2
10 10 10
r
Figure 8. Ellipsoids with radii computed from realistic image
data. (a) SVD spectrum, Ri , taken from the readout layer of
GoogLeNet from a class of ImageNet images with N = 1024
and D = 1023. The radii are scaled by a factor r: Ri0 = rRi
for (b) Classification capacity as a function of r. (blue lines)
full mean field theory capacity, (black dashed) approximation
of the capacity as that of a ball with RM and DM from the
theory for ellipsoids, (circles) simulation capacity, averaged
over 5 repetitions, measured with 50 random dichotomies per
each repetition. (c) Manifold dimension as a function of r.
(d) Manifold radius relative to the scaling factor r, RM /r as
a function of r.
ticipation ratio, Eq. (46), and the manifold radius Rg
is linear with r, as expected from Eq. (45). The ratio
Rg
r ≈ 0.9 is close to unity, indicating that in the scaling
regime, the system is dominated by the largest radii. For
r > 0.3 the effective margin is larger than unity and the
system becomes increasingly affected by the full affine
dimensionality of the ellipsoid, as seen by the marked increase in dimension as well as a corresponding decrease
−1
= D.
in RrM . For larger r, DM approaches D and αM
Fig. 7(e1)-(e3) shows the distributions of the support
dimension 0 ≤ k ≤ D + 1. In the scaling regime, the
interior and touching regimes each have probability close
to 12 and the fully supporting regime is negligible. As
r increases beyond the scaling regime, the interior probability decreases and the solution is almost exclusively
in the touching regime. For very high values of r, the
fully supporting solution gains a substantial probability.
1
Note that the capacity decreases to approximately D
for
a value of r below where a substantial fraction of solutions
are fully supporting. In this case, the touching ellipsoids
all have very small angle with the margin plane.
Until now, we have assumed that the manifold affine subspace dimension D is finite in the limit of large ambient
dimension, N . In realistic data, it is likely that the data
manifolds are technically full rank, i.e. D+1 = N , raising
the question whether our mean field theory is still valid in
such cases. We investigate this scenario by computing the
capacity on ellipsoids containing a realistic distribution
of radii. We have taken as examples, a class of images
from the ImageNet dataset [25], and analyzed the SVD
spectrum of the representations of these images in the
last layer of a deep convolutional network, GoogLeNet
[26]. The computed radii are shown in Fig. 8(a) and
yield a value D = N − 1 = 1023. In order to explore the
properties of such manifolds, we have scaled all the radii
by an overall factor r in our analysis. Because of the decay in the distribution of radii, the Gaussian dimension
for the ellipsoid is only about Dg ≈ 15, much smaller
than D or N , implying that for small r the manifolds
are effectively low dimensional and the geometry is dominated by a small number of radii. As r increases above
r & 0.03, κM becomes larger than 1 and the solution
leaves the scaling regime, resulting in a rapid increase
in DM and a rapid falloff in capacity as shown in Fig.
−1
8(b-c). Finally, for r > 10, we have αM
≈ DM ≈ D
approaching the lower bound for capacity as expected.
The agreement between the numerical simulations and
the mean field estimates of the capacity illustrates the
relevance of the theory for realistic data manifolds that
can be full rank.
B.
Convex polytopes: `1 ellipsoids
The family of `2 ellipsoids represent manifolds that are
smooth and strictly convex. On the other hand, there
are other types of manifolds whose convex hulls are
not strictly convex. In this section, we consider a Ddimensional `1 ellipsoids. They are prototypical of convex
polytopes formed by the convex hulls of finite numbers of
points in RN . The D-dimensional `1 ellipsoid, is parameterized by radii {Ri } and specified by the convex set
PD
M µ = xµ0 + i=1 si uµi , with:
)
D
X
si
≤1 .
~s |
Ri
i=1
(
S=
(49)
Each manifold M µ ∈ RN is centered at xµ0 and consists
of a convex polytope with a finite number (2D) of vertices: {xµ0 ± Rk uµk , k = 1, ..., D}. The vectors uµi specify
the principal axes of the `1 ellipsoids. For simplicity, we
consider the case of `1 balls when all the radii are equal:
Ri = R. We will concentrate on the cases when `1 balls
are high-dimensional; the case for `1 balls with D = 2
was briefly described in [15]. The analytical expression
of the capacity is complex due to the presence of contributions from all types of supports, 1 ≤ k ≤ D + 1.
We address important aspects of the high dimensional
solution below.
15
L1 balls (new) – (d1) can be R=1e-2
High-dimensional `1 balls, R = O(1): When the radius R is small as in the scaling regime, the only contributing solution is the touching solution (k = 1). When
R increases, solutions with all values of k, 1 ≤ k ≤ D + 1
occur, and the support can be any face of the convex
polytope with dimension k. As R increases, the probability distribution p(k) over k of the solution shifts to larger
values. Finally, for large R, only two regimes dominate:
fully supporting (k = D+1) with probability H (−κ) and
partially supporting with k = D with probability H(κ).
We illustrate the behavior of `1 balls with radius r and
affine dimension D = 100. In Fig. 9, (a) shows the
linear classification capacity as a function of r. When
r → 0, the manifold approaches the capacity for isolated
1
points, αM ≈ 2, and when r → ∞, αM ≈ D
= 0.01.
The numerical simulations demonstrate that despite the
different geometry, the capacity of the `1 polytope is similar to that of a `2 ball with radius RM and dimension
DM . In (b), for the scaling regime when r < 0.1 = √1D ,
we see RM ≈ r, but when r 1, RM is much smaller
than r, despite the fact that all Ri of the polytope are
equal. This is because when r is not small, the various
faces and eventually interior of the polytope contribute
to the anchor geometry. In (c), we see DM ≈ 2 log D in
the scaling regime, while DM → D as r → ∞. In terms
of the support structures, when r = 0.001 in the scaling
regime (d1), most manifolds are either interior or touching. For intermediate sizes (d2), the support dimension
is peaked at an intermediate value, and finally for very
large manifolds (d3), most polytope manifolds are nearly
fully supporting.
1
0.4
0.5
0.2
0
0
10-2
100
!
0.6
DM
/R
7R8M/&
M
1.5
102
10
10
L
ℓ(1 balls,
*+,,-,R=1.00e-03
& = (0 − 2
0
10
0
2
10-2
100
(d2)
102
R
&
&
R
&
*+,,-,
& = 3. 5
L 1ℓ(balls,
R=2.50e+00
(d3)
Lℓ(balls,
R=1.00e+02
*+,,-,
& = (66
1
0.08
0.4
0.2
Fraction
(d1)
50
2#$%!
-2
r
(50)
In other words, s̃(~t) is a vertex of the polytope corresponding to the component of ~t with the largest magnitude, see Fig. 5(c). The components of ~t are i.i.d.
Gaussian random variables, and for large D, √
its maximum component, tmax , is concentrated around 2 log D.
Hence, Dg = h(ŝ · ~t)2 i = ht2max i = 2 log D which is
much smaller than D. This result is consistent with the
fact that the Gaussian
√ mean width of a D-dimensional
`1 ball scales with log D and not with D [22]. Since
all the points have norm R, we have Rg = √R, and
the effective margin is then given by κg = R 2 log D
, which is order unity in the scaling regime. In this
regime,
the√capacity
√ given by simple relation αM =
is
α0 κ + R 2 log D / 1 + R2 .
100
0.8
Fraction
R sign (ti ) , |ti | > |tj | ∀j 6= i
0
otherwise
(c)
(b)
2
Fraction
s̃i (~t) =
(a)
,
High-dimensional `1 balls, scaling regime: In the
scaling regime, we have ~v ≈ ~t. In this case, we can write
the solution for the subgradient as:
0.06
0.04
0.2
0.1
0.02
0
-1
0
1
2
3
Embedding
dimension
Support
dimension
(:)
0
0
10
20
30
40
Embedding
dimension
Support dimension
(:)
0
90
95
100
Embedding
dimension
Supporting
dimension
Support
dimension
(:)
Figure 9. Separability of `1 balls. (a) Linear classification
capacity of `1 balls as function of radius r with D = 100
and N = 200: (blue) MFT solution, (black dashed) spherical
approximation, (circle) full numerical simulations. (Inset) Illustration of `1 ball. (b) Manifold radius RM relative to the
actual radius r. (c) Manifold dimension DM as a function of r.
In small r limit, DM is approximately 2 log D , while in large
r, DM is close to D, showing how the solution is orthogonal to
the manifolds when their sizes are large. (d1-d3) Distribution
of support dimensions: (d1) r = 0.001, where most manifolds are either interior or touching, (d2) r = 2.5, where the
support dimension has a peaked distribution, (d3) r = 100,
where most manifolds are close to being fully supporting.
C.
Smooth nonconvex manifolds: Ring manifolds
Many neuroscience experiments measure the responses of
neuronal populations to a continuously varying stimulus,
with one or a small number of degrees of freedom. A prototypical example is the response of neurons in visual cortical areas to the orientation (or direction of movement)
of an object. When a population of neurons respond both
to an object identity as well as to a continuous physical
variation, the result is a set of smooth manifolds each
parameterized by a single variable, denoted θ, describing
continuous curves in RN . Since in general the neural responses are not linear in θ, the curve spans more than one
linear dimension. This smooth curve is not convex, and
is endowed with a complex non-smooth convex hull. It is
thus interesting to consider the consequences of our theory on the separability of smooth but non-convex curves.
The simplest example, considered here is the case where θ
corresponds to a periodic angular variable such as orientation of an image, and we call the resulting non-convex
curve a ring manifold. We model the neuronal responses
as smooth periodic functions of θ, which can be parameterized by decomposing the neuronal responsesP
in Fourier
D
modes. Here, for each object, M µ = xµ0 + i=1 si uµi
µ
where x0 represents the mean (over θ) of the population response to the object. The different D components
correspond to the different Fourier components of the an-
16
(a)
The parameters θµi are the preferred orientation angles
for the corresponding neurons and are assumed to be
evenly distributed between −π ≤ θiµ ≤ π (for simplicity,
we assume that the orientation tuning of the neurons are
all of the same shape and are symmetric around the preferred angle). The statistical assumptions of our analysis
assume that the different manifolds are randomly positioned and oriented with respect to the others. For the
ring manifold model, this implies that the mean responses
xµ0 are independent random Gaussian vectors and also
that the preferred orientation θµi angles are uncorrelated.
With this definition, all the vectors ~s ∈ S obey the norP D2
2
malization k~sk = r where r2 =
n=1 Rn . Thus, for
each object the ring manifold is a closed non-intersecting
smooth curve residing on the surface of a D-dimensional
sphere with radius r .
For the simplest case with D = 2, the ring manifold
is equivalent to a circle in two dimensions. However,
for larger D, the manifold is not convex and its convex
hull is composed of faces with varying dimensions. In
Fig. 10, we investigate the geometrical properties of these
manifolds relevant for classification as a function of the
overall scale factor r, where for simplicity we have chosen
Rn = r for all n. The most striking feature is the small
dimension in the scaling regime, scaling roughly as Dg ≈
2 log D. This logarithmic dependence is similar to that of
the `1 ball polytopes. Then, as r increases, DM increases
dramatically from 2 log D to D.
The similarity of the ring manifold to a convex polytope is also seen in the support dimension k of the manifolds. Support faces of dimension k 6= 0, 1, D + 1 are
seen, implying the presence of partially supporting solutions. Interestingly, D
2 < k ≤ D are excluded, indicating
that the maximal face dimension of the convex hull is D
2.
Each face is the convex hull of a set of k ≤ D
points
2
where each point resides in the 2D subspace spanned by
a pair of (real and imaginary) Fourier harmonics. The
ring manifolds are closely related to the trigonometric
moment curve, whose convex hull geometrical properties
have been extensively studied [27, 28].
In conclusion, the smoothness of the convex hulls becomes apparent in the distinct patterns of the support
1.5
15
DM
20
1
0
5
0
10-2 10-1 100 101 102
r
(c)
(d)
1
12
0.8
10-2 10-1 100 101 102
r
10
0.6
0.4
8
6
0.2
0
%
10
0.5
M
where Rn is the magnitude of the n-th Fourier component
for 1 ≤ n ≤ D
2 . The neural responses in Eq. (1) are
determined by projecting onto the basis:
√
uµi
2 cos(nθµi )
(52)
2n =
√
µi
µi
u2n−1 = 2 sin(nθ )
(b)
2
,
(51)
R /r
Rn
s2n (θ) = √ cos(nθ)
2
R
n
s2n−1 (θ) = √ sin(nθ)
2
D=20, Uniform Rn
DM
gular response, so that
6
10-2 10-1 100 101 102
8
10
2log(D)
2!"# $
r
(e1)
&R==(.
(*
0.01
0.4
0.2
0
0
10
20
k
Support dimension
(k)
(e2)
&=
= 20.00
+(
R
(e3)
0.3
0.2
+((
R& ==200.00
0.6
0.4
0.1
0.2
0
0
0
10
20
k
Support dimension
(k)
12
0
10
20
k
Support dimension
(k)
Figure 10. Linear classification
q of D-dimensional ring mani2
folds, with uniform Rn =
r. (a) Classification capacity
D
for D = 20 as function of r with m = 200 test samples (details of numerical simulations in SM, Sec. S9): (blue) mean
field theory, (black dashed) spherical approximation, (black
circles) numerical simulations. (Inset) Illustration of a ring
manifold. (b) Manifold dimension DM , which shows DM ∼ D
in the large r limit, showing the orthogonality of the solution.
(c) Manifold radius relative to the scaling factor r, RrM , as
a function of r. Fact that RrM becomes small implies that
the manifolds are “fully supporting” to the hyperplane, showing the small radius structure. (d) Manifold dimension grows
with affine dimension, D , as 2 log D for small r = 2√2 1log D
in the scaling regime.(e1-e3) Distribution of support dimensions. (d1) r = 0.01, where most manifolds are either interior
or touching, (d2) r = 20, where the support dimension has
(d3) r = 200, where
a peaked distribution, truncated at D
2
most support dimensions are D
or fully supporting at D + 1.
2
dimensions (compare Figs. 8(d) and 10(e)). However,
we see that all manifolds with Dg ∼ 5 or larger share
common trends. As the size of the manifold increases,
the capacity, and geometry vary smoothly, exhibiting a
smooth cross-over from high capacity with low radius and
dimension, to low capacity with large radius
√ and dimension. This crossover occurs as Rg ∝ 1/ Dg . Also, our
examples demonstrate, in many cases when the size is
smaller than the crossover value, the manifold dimensionality is substantially smaller than that expected from
naive second order statistics, highlighting the saliency
17
and significance of our anchor geometry.
VI.
MANIFOLDS WITH SPARSE LABELS
So far, we have assumed that the number of manifolds
with positive labels is approximately equal to the number of manifolds with negative labels. In this section, we
consider the case where the two classes are unbalanced
such that the number of positively-labeled manifolds is
far less than the negatively-labeled manifolds (the opposite scenario is equivalent). This is a special case of the
problem of classification of manifolds with heterogenous
statistics, where manifolds have different geometries or
label statistics. We begin by addressing the capacity of
mixtures of manifolds and then focus on sparsely labeled
manifolds.
A.
Mixtures of manifold geometries
Our theory of manifold classification is readily extended
to heterogeneous ensemble of manifolds, consisting of L
distinct classes. In the replica theory, the shape of the
manifolds appear only in the free energy term, G1 (see
Appendix, Eq. (A13)). For a mixture statistics, the combined free energy is given by simply averaging the individual free energy terms over each class l. Recall that this
free energy term determines the capacity for each shape,
giving an individual inverse critical load αl−1 . The inverse
capacity of the heterogeneous mixture is then,
α−1 = αl−1
l
(53)
where the average is over the fractional proportions of
the different manifold classes. This remarkably simple
but generic theoretical result enables analyzing diverse
manifold classification problems, consisting of mixtures
of manifolds with varying dimensions, shapes and sizes.
Eq. (53) is adequate for classes that differ in their geometry independent of the assigned labels. In general, classes
may differ in the label statistics (as in the sparse case
studied below) or in geometry that is correlated with labels. For instance, the positively labelled manifolds may
consist of one geometry and the negatively labelled manifolds may have a different geometry. How do structural
differences between the two classes affect the capacity of
the linear classification? A linear classifier can take advantage of these correlations by adding a non-zero bias.
Previously, it was assumed that the optimal separating
hyperplane passes through the origin; this is reasonable
when the two classes are statistically the same. However, when there are statistical differences between the
label assignments of the two classes, Eq. (2) should be
replaced by y µ (w · xµ − b) ≥ κ where the bias b is chosen
to maximize the mixture capacity, 53. The effect of optimizing the bias is discussed in detail in the next section
for the sparse labels and in other scenarios in SM (Sec.
S3).
B.
Manifolds with sparse labels
We define the sparsity parameter f as the fraction of
positively-labeled manifolds so that f = 0.5 corresponds
to having balanced labels. From the theory of the classification of a finite set of random points, it is known
that having sparse labels with f 0.5 can drastically
increase the capacity [12]. In this section, we investigate
how the sparsity of manifold labels improves the manifold
classification capacity.
If the separating hyperplane is constrained to go through
origin and the distribution of inputs is symmetric around
the origin, the labeling y µ is immaterial to the capacity.
Thus, the effect of sparse labels is closely tied to having a
non-zero bias. We thus consider inequality constraints of
the form y µ (w·xµ −b) ≥ κ, and define the bias-dependent
capacity of general manifolds with label sparsity f , margin κ and bias b, as αM (κ, f, b). Next, we observe that
the bias acts as a positive contribution to the margin
for the positively-labeled population and as a negative
contribution to the negatively-labeled population. Thus,
the dependence of αM (κ, f, b) on both f and b can be
expressed as,
−1
−1
−1
(κ − b) (54)
(κ + b) + (1 − f )αM
(κ, f, b) ≡ f αM
αM
where αM (x) is the classification capacity with zero bias
(and hence equivalent to the capacity with f = 0.5) for
the same manifolds. Note that Eq. (54) is similar to Eq.
(53) for mixtures of manifolds. The actual capacity with
sparse labels is given by optimizing the above expression
with respect to b, i.e.,
αM (κ, f ) = maxb αM (κ, f, b)
(55)
In the following, we consider for simplicity the effect of
sparsity for zero margin, κ = 0.
Importantly, if D is not large, the effect of the manifold geometry in sparsely labeled manifolds can be much
larger than that for non-sparse labels. For non-sparse labels, the capacity ranges between 2 and (D+0.5)−1 , while
for sparse manifolds the upper bound can be much larger.
Indeed, small-sized manifolds are expected to have capacity that increases upon decreasing f as αM (0, f ) ∝
1
f |log f | , similar to P uncorrelated points [12]. This potential increase in capacity of sparse labels is however
strongly constrained by the manifold size, since when the
manifolds are large, the solution has to be orthogonal to
1
the manifold directions so that αM (0, f ) ≈ D
. Thus,
18
the geometry of the manifolds plays an important role in
controlling the effect of sparse labels on capacity. These
aspects are already seen in the case of sparsely labeled `2
balls (Appendix E). Here we summarize the main results
for general manifolds.
Sparsity and size: There is a complex interplay between label sparsity and manifold size. Our analysis
yields three qualitatively different regimes:
Low Rg : When the Gaussian radius of the manifolds are
small, i.e., Rg < 1, the extent of the manifolds is noticeable only when the dimension is high. Similar to our
previous analysis of high dimensional manifolds, we find
here that the sparse capacity is equivalent to the capacity of sparsely labeled
p random points with an effective
margin given by Rg Dg ,
p
(56)
αM (f ) ≈ α0 (f, κ = Rg Dg )
where α0 (κ, f ) = maxb α0 (κ, f, b) from the Gardner theory. It should be noted that κg in the above equation has
a noticeable effect only for moderate sparsity. It has a
negligible effect when f → 0, since the bias is large and
dominates over the margin.
Moderate sizes, Rg > 2: In this case, the equivalence to
the capacity of points breaks down. Remarkably we find
that the capacity of general manifolds with substantial
size is well approximated by that of equivalent `2 balls
with the same sparsity f and with dimension and radius
equal to the Gaussian dimension and radius of the manifolds, namely
αM (f ) ≈ αBall (f, Rg , Dg )
(57)
Surprisingly, unlike the nonsparse approximation, where
the equivalence of general manifold to balls, Eq 34, is
valid only for high dimensional manifolds, in the sparse
limit, the spherical approximation is not restricted to
large D. Another interesting result is that the relevant
statistics are given by the Gaussian geometry, Rg and Dg ,
even when Rg is not small. The reason is that for small
f , the bias is large. In that case, the positively labeled
manifolds have large positive margin b and are fully supporting giving a contribution to the inverse capacity of
b2 regardless of their detailed geometry. On the other
hand, the negatively labeled manifolds have large negative margin, implying that most of them are far from
the separating plane (interior) and a small fraction have
touching support. The fully supporting configurations
have negligible probability, hence the overall geometry
is well approximated by the Gaussian quantities Dg and
Rg .
Scaling relationship between sparsity and size: A
further analysis of the capacity of balls with sparse labels
shows it retains a simple form α(f¯, D) (see Appendix E
Eq. E10) which depends on R and f only through the
scaled sparsity f¯ = f R2 . The reason for the scaling of
f with R2 is as follows. When the labels are sparse, the
dominant contribution to the inverse capacity comes from
−1
the minority class, and so the capacity is αBall
≈ f b2
for large b. On the other hand, the optimal value of b
depends on the balance between the contributions from
both classes and scales linearly with R, as it needs to
overcome the local fields from the spheres. Thus, α−1 ∝
f R2 .
Combining Eq. E10 with Eq. 57 yields for general
sparsely labeled manifolds,
−1
αM
= f¯b̄2 +
Z
b̄
∞
dtχDg (t)(t − b̄)2
(58)
where scaled sparsity is f¯ = f (1 + Rg2 ) . 1 .
Note we have defined the scaled sparsity f¯ = f (1 + Rg2 )
rather than f R2 to yield a smoother cross-over to the
small Rg regime.
q Similarly, we define the optimal scaled
bias as b̄ = b 1 + Rg2 1. Qualitatively, the function
α is roughly proportional to f¯−1 with a proportionality
constant that depends on Dg . In the extreme limit of
−1
log f¯ Dg , we obtain the sparse limit α ∝ f¯ log f¯ .
Note that if f is sufficiently small, the gain in capacity
due to sparsity occurs even for large manifolds as long as
f¯ < 1.
Large Rg regime: f¯ > 1: Finally, when Rg is sufficiently
large such that f¯ increases above 1, b̄ is of order 1 or
smaller, and the capacity is small with a value that depends on the detailed geometry of the manifold. In particular, when f¯ 1, the capacity of the manifold ap1
proaches αM (f ) → D
, not D1g .
To demonstrate these remarkable predictions, Eq. (57),
we present in Fig. 11 the capacity of three classes of
sparsely labeled manifolds:`2 balls, `1 ellipsoids and ring
manifolds. In all cases, we show the results of numerical
simulations of the capacity, the full mean field solution,
and the spherical approximation, 57, across several orders
of magnitude of sparsity and size as a function of the
scaled sparsity f¯ = f (1 = r2 ). In each example, there
is a good agreement between the three calculations for
the range of f¯ < 1. Furthermore, the drop in α with
increasing f¯ is similar in all cases, except for an overall
vertical shift which is due to the different Dg , similar to
the effect of dimension in `2 balls (a). In the regime of
moderate radii, results for different f and r all fall on a
universal curve which depends only on f¯, as predicted by
the theory. For small r, the capacity deviates from this
scaling as it is dominated by f alone, similar to sparsely
labeled points. When f¯ > 1, the curves deviate from the
spherical approximation. The true capacity (as revealed
by simulations and full mean field) rapidly decreases with
1
f¯ and saturates at D
, rather than to the D1g limit of the
19
( = 10)+
101
'
( = 10),
0
10
'
( = 10)-
D=10
D=100
10-2
-4
10
10
-2
0
10
!̅
2
10
( = 10),
102
( = 10)-
0
10
-1
/1)-
10-2
/ )-
10
10-2
Ring Manifolds
103 ( = 10)*
( = 10)+
100
!̅(
̅
102
104
1
( = 10)+
( = 10),
10
f=$%&$
(a)
f=1e-04
f=1e-03
f=1e-02
f=1e-01
f=$%&'
(b)
0.8
0.1
( = 10)-
Majority
Minority
0.6
0
10
0.05
-1
10
10-3 10-2 10-1 100 101
!(̅
Figure 11. (a-b) Classification of `2 balls with sparse labels:
(a) Capacity of `2 balls as a function of f¯ = f (1 + r2 ), for
D = 100 (red) and D = 10 (blue): (solid lines) mean field theory, (dotted lines) is an approximation interpolating between
Eqs. 56 and 58 (details in SM, Sec. S9). (b–c) Classification
of general manifolds with sparse labels: (b) Capacity of `1
ellipsoids with D = 100, where the first 10 components are
equal to r, and the remaining 90 components are 12 r, as a
function of f¯ = (1 + Rg2 ). r is varied from 10−3 to 103 : (circles) numerical simulations, (lines) mean field theory, (dotted
lines) spherical approximation. (c) Capacity of ring manifolds
with a Gaussian fall-off spectrum with σ = 0.1 and D = 100
(; details in SM). Fig. 11(c) shows the capacity of ring manifolds whose Fourier components
have a Gaussian fall-off, i.e.
Rn = A exp − 12 (2π(n − 1)σ)2 .
spherical approximation. Finally, we note that our choice
of parameters in (c) (SM Section 7) were such that Rg
(entering in the scaled sparsity) was significantly different
from simply an average radius. Thus, the agreement with
the theory illustrates the important role of the Gaussian
geometry in the sparse case.
As discussed above, in the (high and moderate) sparse
regimes, a large bias alters the geometry of the two classes
in different ways. To illustrate this important aspect, we
show in Fig. 12, the effect of sparsity and bias on the
geometry of the `1 ellipsoids studied in Fig. 11(c). Here
we show the evolution of RM and DM for the majority
and minority classes as f¯ increases. Note that despite the
fact that the shape of the manifolds is the same for all
f, their manifold anchor geometry depends on both class
membership and sparsity levels because these measures
depend on the margin. When f¯ is small, the minority
class has DM = D as seen in Fig. 12(c), i.e., the minority
class manifolds are close to be fully supporting due to
the large positive margin. This can also be seen in the
distributions of support dimension shown in Fig.12(a)(b). On the other hand, the majority class has DM ≈
Dg = 2logD1 D, and these manifolds are mostly in the
interior regime. As f increases, the geometrical statistics
for the two classes become more similar. This is seen in
Fig.12(c)-(d) where DM and RM for both majority and
minority classes converge
to the zero margin value for
large f¯ = f 1 + Rg2 .
0
0.4
Majority
20
Minority
40
0
60
Support dimension (")
(c)
0.2
0
5
95
100
Support dimension (")
(d)
1
100
50
Minor
Major
0
10-5 10-4 10-3 10-2 10-1 100
2
f(1+R
f̅ g)
R
RM
/r0
)/R
2
10
(c)
ℓ1 Ellipsoids
2
10
DM
(b)
ℓ2 balls
( = 10)*
'0
(a)
0.5
Minor
Major
0
-5
-4
-3
-2
-1
0
10 10 10 10 10 10
2
f(1+R
f̅ )
g
Figure 12. Manifold configurations and geometries for classification of `1 ellipsoids with sparse labels, analyzed separately
in terms of the majority and minority classes. The radii for
`1 ellipsoids are Ri = r for 1 ≤ i ≤ 10 and Ri = 12 r for
11 ≤ i ≤ 100 with r = 10. (a) Histogram of support dimensions for moderate sparsity f = 0.1: (blue) minority and
(red) majority manifolds. (b) Histogram of support dimensions for high sparsity f = 10−3 : (blue) minority and (red)
majority manifolds. (c) Manifold dimension as a function of
f¯ = f (1 + Rg2 ) as f is varied: (blue) minority and (red) majority manifolds. (d) Manifold radius relative to the scaling
factor r as a function of f¯: (blue) minority and (red) majority
manifolds.
VII.
SUMMARY AND DISCUSSION
Summary: We have developed a statistical mechanical
theory for linear classification of inputs organized in perceptual manifolds, where all points in a manifold share
the same label. The notion of perceptual manifolds is
critical in a variety of contexts in computational neuroscience modeling and in signal processing. Our theory is
not restricted to manifolds with smooth or regular geometries; it applies to any compact subset of a D-dimensional
affine subspace. Thus, the theory is applicable to manifolds arising from any variation in neuronal responses
with a continuously varying physical variable, or from
any sampled set arising from experimental measurements
on a limited number of stimuli.
The theory describes the capacity of a linear classifier
to separate a dichotomy of general manifolds (with a
given margin) by a universal set of mean field equations.
These equations may be solved analytically for simple geometries, but for more complex geometries, we have developed iterative algorithms to solve the self-consistent
equations. The algorithms are efficient and converge fast
as they involve only solving for O(D) variables of a single manifold, rather than invoking simulations of a full
20
system of P manifolds embedded in RN .
Our theory provides for the first time, quantitative and
qualitative predictions for the binary classification of realistic data structures. However, application to real data
may require further extensions of the theory as presented
here. The most important ones (currently the subject of
on going work) include:
Correlations: In the present work we have assumed
that the directions of the affine subspaces of the different manifolds are uncorrelated. In realistic situations
we expect to see correlations in the manifold geometries,
mainly of two types: One is center-center correlations.
Such correlations can be harmful for linear separability [29, 30]. Another is correlated variability in which
the directions of the affine subspaces are correlated but
not the centers. Positive correlations of the latter form
are beneficial for separability. In the extreme case when
the manifolds share a common affine subspace, the rank
of the union of the subspaces is Dtot = D rather than
Dtot = P D, and the solution weight vector need only lie
in the null space of this smaller subspace. Further work is
needed to extend the present theory to incorporate more
general correlations.
Generalization performance: We have studied the
separability of manifolds with known geometries. In
many realistic problems, this information is not readily
available and only samples reflecting the natural variability of input patterns are provided. These samples can be
used to estimate the underlying manifold model (using
manifold learning techniques [31, 32]) and/or to train a
classifier based upon a finite training set. Generalization
error describes how well a classifier trained on a finite
number of samples would perform on other test points
drawn from the manifolds [33]. It would be important
to extend our theory to calculate the expected generalization error achieved by the maximum margin solution
trained on point cloud manifolds, as a function of the size
of the training set and the geometry of the underlying full
manifolds.
Unrealizable classification: Throughout the present
work, we have assumed that the manifolds are separable by a linear classifier. In realistic problems, the
load may be above the capacity for linear separation,
i.e. α > αM (κ = 0). Alternatively, neural noise may
cause the manifolds to be unbounded in extent, with the
tails of their distribution overlapping so that they are
not separable with zero error. There are several ways to
handle this issue in supervised learning problems. One
possibility is to nonlinearly map the unrealizable inputs
to a higher dimensional feature space, via a multi-layer
network or nonlinear kernel function, where the classification can be performed with zero error. The design of
multilayer networks could be facilitated using manifold
processing principles uncovered by our theory.
Another possibility is to introduce an optimization prob-
lem allowing a small training error, for example, using
an SVM with complementary slack variables [14]. These
procedures raise interesting theoretical challenges, including understanding how the geometry of manifolds
change as they undergo nonlinear transformations, as
well as investigating by statistical mechanics, the performance of a linear classifier of manifolds with slack variables [34].
Concluding remarks: The statistical mechanical theory of perceptron learning has long provided a basis for
understanding the performance and fundamental limitations of single layer neural architectures and their kernel
extensions. However, the previous theory only considered a finite number of random points with no underlying geometric structure, and could not explain the performance of linear classifiers on large, possibly infinite
number of inputs organized as distinct manifolds by the
variability due to changes in physical parameters of objects. The statistical mechanical theory presented in this
work can explain the capacity and limitations of linear
classification of general manifolds, and be used to elucidate changes in neural representations across hierarchical sensory systems. We believe the application of this
theory and its corollary extensions will precipitate novel
insights into how perceptual systems, biological or artificial, can efficiently code and process sensory information.
We would like to thank Uri Cohen, Ryan Adams, Leslie
Valiant, David Cox, Jim DiCarlo, Doris Tsao, and Yoram
Burak for helpful discussions. The work is partially supported by the Gatsby Charitable Foundation, the Swartz
Foundation, the Simons Foundation (SCGB Grant No.
325207), the NIH, and the Human Frontier Science Program (Project RGP0015/2013). D. D. Lee also acknowledges the support of the US National Science Foundation,
Army Research Laboratory, Office of Naval Research, Air
Force Office of Scientific Research, and Department of
Transportation.
Appendix A: Replica Theory of Manifold Capacity
In this section, we outline the derivation of the mean
field replica theory summarized in Eqs. (11)-12. We
define the capacity of linear classification of manifolds,
P
, for which with
αM (κ), as the maximal load, α = N
µ
high probability a solution to y w · xµ ≥ κ exists for
a given κ. Here xµ are points on the P manifolds M µ ,
Eq. (1), and we assume that all N P (D + 1) components
of {uµi } are drawn independently from a Gaussian distribution with zero mean and variance N1 , and that the
binary labels y µ = ±1 are randomly assigned to each
manifold with equal probabilities. We consider the therP
modynamic limit where N, P → ∞ but α = N
, and D
are finite.
Note that the geometric margin, κ0 , defined as the dis-
21
µ
µ
tance from the
√ solution hyperplane is given by y w·x ≥
0
0
κ kwk = κ N . However, this distance depends on the
scale of the input vectors xµ . The correct scaling of the
kxk
margin in the thermodynamic limit is κ0 = √
κ. Since
N
µ
we adopted the normalization of kx k = O(1), the correct scaling of the margin is y µ w · xµ ≥ κ .
Evaluation of solution volume: Following Gardner’s
replica framework, we first consider the volume Z of the
solution space for α < αM (κ) . We define the signed projections of the the
vector uµi on the solution
√ ith µdirection
µ
µ
weight as Hi = N y w · ui , where i = 1, ..., D + 1 and
µ = 1, ..., PP
. Then, the separability constraints can be
D+1
written as i=1 Si Hiµ ≥ κ . Hence the volume can be
written as
Z
Z=
~µ
dN wδ(w2 − N ) ΠP
µ=1 Θµ gS (H ) − κ
variance
1
N)
yields,
+
*
D+1
N
XX
X
µα
µ
iĤi (−y µ
exp
wαj ui,j )
i=1 µα
j=1
(A5)
µ
uµ
i ,y
1X
X µα µβ
qαβ
Ĥi Ĥi
= exp −
2
iµ
αβ
PN
where, qαβ = N1 j=1 wαj wβj . Thus, integrating the variables Ĥiµα yields
hZ n i =
Z Y
n
α=1
2
dwα δ(wα
− N)
T
· δ N qαβ − wα
wβ
(A1)
Z
dqαβ Παβ
(A6)
P
(D + 1)
logdetq X
exp −
2
where
where Θ(x) is a Heaviside step function. gS is the
~
support
n function of oS defined for Eq. 12 as gS (V ) =
~ ·S
~|S
~∈S .
min ~ V
X=
S
The volume defined above depends on the the quenched
random variables uµi and y µ through Hiµ . It is well known
that in order to obtain the typical behavior in the thermodynamic limit, we need to average log Z, which we carry
n
out using the replica trick, hlog Zi = limn→0 hZ ni−1 ,
where hi refers to the average over uµi and y µ . For natural
n, we need to evaluate,
Z Y
n
hZ n i =
α
D+1
Y
h
√
2
dwα δ(wα
− N)
2πδ(Hiµα
i
−y
µ
P Z
Y
~ µα
DH
(A2)
Using Fourier representation of the delta functions, we
obtain
hZ i =
Z Y
n
D+1
YZ
i=1
α
2
dwα δ(wα
− N)
and we have used the fact that all manifolds contribute
the same factor.
We proceed by making the replica symmetric ansatz on
the order parameter qαβ at its saddle point, qαβ = (1 −
q)δαβ + q, from which one obtains in the n → 0 limit:
q−1
αβ =
P Z
Y
~ µα
DH
1
q
δαβ −
1−q
(1 − q)2
(A4)
µ
n
oE
dĤiµα D
T µ
√
exp iĤiµα (Hiµα − y µ wα
ui )
µ
uµ
2π
i ,y
Performing the average over the Gaussian distribution
of uµi (each of the N components has zero mean and
(A8)
and
wαT uµi )iuµi ,yµ
(A3)
(A7)
i,α,β
logdetq = n log(1 − q) +
where we have used the notation,
n
α
µ
dHi
~ = ΠD+1 √
~ −κ
DH
Θ gS (H)
i=1
2π
X
1
~ α exp −
Hiα (q−1 )αβ Hiβ
DH
2
Z Y
nq
1−q
(A9)
Thus the exponential term in X can be written as
!2
√ X
α 2
X
X
q
1
(Hi )
1
exp −
+
H α (A10)
2 αi 1 − q
2 i
1−q α i
Using the Hubbard–Stratonovich transformation, we obtain
"Z
(
)#n
Z
√
~2
q
H
1
~ · T~
~ exp −
+
H
X = DT~
DH
21−q 1−q
(A11)
2
T
dT
i
i
where DT~ = Πi √2π exp − 2 .
Completing the
R
square in the exponential and using
DT~ An =
R
~
exp n
the n → 0 limit, we obtain, X =
DT log A in
R
nq(D+1)
exp 2(1−q) + n DT~ log z(T~ ) with
z(T~ ) =
Z
~
DH exp −
1
~ − √q T~ ||2
||H
2(1 − q)
(A12)
22
Combining these terms, we write the last factor in Eq.
(A6) as exp nP G1 where,
Z
G1 =
(D + 1)
log(1 − q)
DT~ log z(T~ ) −
2
(A13)
q
1
ln(1 − q) +
2
2(1 − q)
(A14)
and represents the constraints on the volume of wα due
to normalization and the order parameter q. Combining
the G0 and G1 contributions, we have
hZ n it0 ,t = eN n[G0 (q)+αG1 (q)]
(A15)
The classification constraints contribute αG1 , with Eq.
(A13), and
!
Z
~2
dYi
Y
D+1
~
(A16)
z(T ) = Πi=1 p
exp −
2(1 − q)
2π(1 − q)
√
~)−κ
Θ gS ( q T~ + Y
where, we have written the fields Hi as
√
Hi = qTi + Yi
(A17)
√
Note that qTi represents the quenched random component due to the randomness in the uµi , and Yi is the
“thermal” component due to the variability within the
solution space. The order parameter q is calculated via
∂G1
0
0 = ∂G
∂q + α ∂q .
Capacity: In the limit where α → αM (κ) , the overlap between the solutions become unity and the volume
q
shrinks to zero. It is convenient to define Q = 1−q
and
study the limit of Q → ∞. In this limit the leading order
is
i
Qh
1 − αhF (T~ )iT~
(A18)
hlog Zi =
2
where the first term is the contribution from G0 → Q
2.
Q
~
The second term comes from G1 → − 2 αhF (T )iT~ , where
the average is over the Gaussian distribution of the D + 1
dimensional vector T~ , and
F (T~ ) → −
2
log z(T~ )
Q
(A19)
is independent of Q and is given by replacing the integrals
in Eq. (A16) by their saddle point, which yields
2
~
~
~
~
F (T ) = min V − T | gS V − κ ≥ 0
(A20)
~
V
−1
αM
(κ) = hF (T~ )iT~
~ − T~
F (T~ ) = min V
~
V
The first factors in hZ n i, Eq. (A6), can be written as
exp nN G0 , where as in the Gardner theory, the entropic
term in the thermodynamic limit is
G0 (q) =
At the capacity, log Z vanishes, the capacity of a general
manifold with margin κ, is given by,
(A21)
2
~)−κ≥0
| gS (V
(A22)
Finally, we note that the mean squared ’annealed’ variability in the fields due to the entropy of solutions vanishes at the capacity limit, as 1/Q , see Eq. (A16) . Thus,
2
~ − T~ in the above equation represents
the quantity V
the annealed variability times Q which remains finite in
the limit of Q → ∞.
Appendix B: Strictly Convex Manifolds
B.1. General
Here we evaluate the capacity of strictly convex manifolds, starting from the expression for general manifolds,
Eq. 21. In a strictly convex manifold, S , any point in
the line segment connecting two points ~x and ~y , ~x, ~y ∈ S
, other than ~x and ~y , belongs to the interior of S . Thus,
the boundary of the manifold does not contain edges or
flats with spanning dimension k > 1 except of the entire manifold, k = D + 1 . Therefore, there are exactly
contributions to the inverse capacity. When t0 obeys
ttouch (~t) > t0 − κ > tfs (~t), the integrand of Eq. 21 con2
~ ~
0 +κ)
tributes (−t·s̃(T )−t
, When t0 < κ + tfs (~t), the man2
~
1+ks̃(T )k
ifold is fully embedded. In this case, ~v = 0, and the
integrand reduces to Eq. 27. In summary, the capacity
for convex manifolds can be written as
α−1 (κ) =
κ+ttouch (~
t)
(−~t · s̃(~t, t0 ) − t0 + κ)2
2
κ+tfs (~
t)
1 + s̃(~t, t0 )
(B1)
Z
Z κ+tfs (~t)
h
i
2
2
+ D~t
Dt0 (t0 − κ) + ~t
Z
D~t
Z
Dt0
−∞
where ttouch (~t) and tfs (~t) are given by Eqs. 23 and 26,
respectively, and s̃(~t, t0 ) = arg min~s (~v · ~s), with ~v = ~t +
(v0 − t0 )s̃.
B.2. `2 Balls
In the case of `2 balls with D and radius R, g(~v ) =
−R k~v k . Hence, ttouch (~t) = R ~t and tfs (~t) = −R−1 ~t
23
. Thus, Eq. B1 reduces to hat the capacity of balls is
−1
αBall
=
∞
Z
Z
Dt0
κ−tR−1
0
∞
Z
+
κ+tR
dtχD (t)
Z
~
ttouch (~t) = ~t ◦ R
κ−tR−1
dtχD (t)
−∞
0
(−t0 + tR + κ)2
(1 + R2 )
obeying the inequality t0 − κ ≥ ttouch (~t) with Eq. 23,
yielding
Dt0 (t0 − κ)2 + t2 (B2)
where,
(B6)
Touching regime: Here the anchor point is given by Eq.
B4 where ~v = ~t + λs̃. Substituting ti + λs˜i for vi in the
numerator of that equation, and g(~v ) = κ−v0 = κ−t0 −λ
, yields,
D
21− 2 D−1 − 1 t2
χD (t) =
t
e 2 , t≥0
Γ( D
2)
(B3)
is the D-dimensional Chi probability density function,
reproducing the results of [15]. Furthermore, Eq. B2 can
be approximated
√ by the capacity of points with a2 margin
D, i.e. αBall (κ, RM , DM ) ≈ (1+R )α0 (κ+
increase
of
R
√
R D) (details in [15]).
s̃touch,i (~t, t0 ) = −
ti Ri2
,
λ(1 + Ri2 ) + (−t0 + κ)
(B7)
where the parameter λ is determined by the ellipsoidal
constraint,
1=
D
X
t2i Ri2
i=1
[λ(1 + Ri2 ) + (−t0 + κ)]
2.
(B8)
B.2. `2 Ellipsoids
a.
Anchor points and support regimes
With ellipsoids, Eq. 36, the support function in Eq. 15
~ =
can be computed explicitly as follows. For a vector V
(~v , v0 ), with non zero ~v , the support function g(~v ) is
minimized by a vector ~s which occurs on the boundary of
the ellipsoid, i.e. it obeys the equality constraint f (~s) = 0
PD 2
with ρ(~s) = i=1 Rsii − 1 , Eq. (36). To evaluate g,
PD
we differentiate − i=1 si~vi + ρf (~s) with respect to ~si ,
where ρ is a Lagrange multiplier enforcing the constraint,
yielding
s̃i = −
vi Ri2
g(~v )
(B4)
and
In this regime, the contribution to the capacity is given
by Eq. 16-17 with s̃ in Eq. (B7).
The touching regime holds for ttouch > t0 − κ > tfs ,
where λ → κ − t0 , ~v vanishes, and the anchor point is
the point on the boundary of the ellipsoid antiparallel to
~t . Substituting this value of λ in Eq. B8 , yields,
v
u
uX ti 2
(B9)
tfs (~t) = −t
Ri
i
Fully supporting regime: When t0 − κ < tfs , we have
~v = 0, v0 = κ, and λ = t0 − κ, implying that the center
as well as the entire ellipsoid is fully supporting the max
margin solution. In this case, the anchor point is antiparallel to ~t at the interior point, 25, and its contribution to
the capacity is as in Eq. 27.
Appendix C: Limit of Large Manifolds
~
g(~v ) = − ~v ◦ R
(B5)
~ is the D dimensional vector of the ellipsoid prinwhere R
cipal radii, and we denote ◦refers to pointwise product of
~ i = vi Ri . For a given (~t, t0 ), the vector
vectors, (~v ◦ R)
(~v , v0 ) is determined by Eq. (13) and the analytic solution above can be used to derive explicit expressions for
s̃(~t, t0 ) in the different regimes as follows.
Interior regime:
In the interior regime λ = 0 , ~v = ~t, resulting in zero
contribution to the inverse capacity. The anchor point
is given by the following boundary point on the ellipse,
given by Eq. B4 with ~v = ~t. This regime holds for t0
In the large size limit, ks̃k → ∞ , linear separation
of manifolds reduces to linear separation of P random
D-dimensional affine subspaces. When separating subspaces, all of them must be fully embedded in the margin plane, otherwise they would intersect it and violate
the classification constraints. However, the way large size
manifolds approach this limit is subtle. To analyze this
limit, we note that when ks̃k is large, g(~v ) < ks̃k k~v k and
from the condition that g(~v ) ≥ (−v0 + κ), we have k~v k ≤
−1
(−v0 +κ)
, i.e., k~v k is O(ks̃k ). A small k~v k implies that
ks̃k
the affine basis vectors, except the center direction, are all
either exactly or almost orthogonal to the solution weight
vector. Since λs̃ = −~t+~v ≈ −~t, it follows that s̃ is almost
antiparallel to the gaussian vector ~t, hence DM → D, see
24
Eq. 30. To elucidate the manifold support structure,
we note first that by Eq. 23 ttouch ∝ −||~t||||s̃|| → −∞
hence the fractional volume of the interior regime is negligible, and the statistics is dominated by the embedded regimes. In fact, the fully embedded transition is
given by tembed ≈ −κ , see Eq.26, so that the fractional
R ∞ volume of the fully embedded regime is H(−κ) =
Dt0 and its contribution to inverse capacity is there−κ
i
h
R∞
2
fore −κ Dt0 h ~t i + (t0 + κ)2 = H(−κ)D + α0−1 (κ) .
The remaining summed probability of the touching and
partially embedded regimes (k ≥ 1) is therefore H(κ).
2
2
2
In these regimes, λ2 ks̃k ≈ λ2 ks̃k ≈ ~t , so that this
R −κ
2
regime contributes a factor of −∞ Dt0 h ~t i = H(κ)D.
Combining these two contributions, we obtain for large
−1
sizes, αM
= D + α0−1 (κ), consistent with Eq. (8).
Appendix D: High Dimensional Manifolds
D.1. High Dimensional `2 ball
Before we discuss general manifolds in high dimension,
we focus on the simple case of high dimensional balls,
the capacity of which is given by Eq. √
B2. When D 1
D. Substituting
, χD (t) , B3, is
centered
around
t
=
√
χD (t) ≈ δ(t − D) yields
As stated above, Eq, D3 implies
√ a finite capacity only in
the scaling
regime,
where
R
D = O(1). If, on the other
√
hand, R D 1, Eq. (D2) implies
−1
αBall
=
R2 D
1 + R2
(D4)
(where we have used the asymptote α0−1 (x) → x2 for
large x), reducing to α−1 = D for large R.
The analysis above also highlights the support
structure
√
of the balls at large D. As long as R D the
fraction of balls that lie fully in the margin plane,
√ is negligible, as implied by the fact that tsf ≈ − D/R
√→
−∞.The overall fraction of interior balls is H(κ + R D)
whereas the √
fraction that touch the margin planes is
1 − H(κ + R D) . Despite the fact that there are no
fully supporting balls, the touching balls are almost parallel to the margin planes if R 1 hence the capacity
reaches its lower bound.
Finally, the large manifold √
limit discussed in Appendix
C is realized for as R D . Here, tsf = −κ and
the system is either touching or fully supporting with
probabilities H(κ) and H(−κ), respectively.
D.2. General manifolds.
To analyze the limit of large dimensional general manifolds we utilize the self averaging of terms in Eq. (21),
(R D + κ −
−1
involving
sums of the D components of ~t and s̃, i.e.,
(κ, R, D) =
αBall
Dt0
+
Dt
([t0 −κ]2 +D)
0
√
R2 + 1
−∞
κ− RD
p
~t · s̃ ≈ h||s̃||ih~t · ŝi ≈ RM DM = κM
(D1)
√
As long as R D , the second term in Eq. (D1)
(D5)
vanishes and yields
Z
−1
αBall
(κ, R, D)
√
√
κ+R D
Z
√
κ+R D
=
−∞
√
t)20
Z
κ−
D
R
√
(R D + κ − t0 )2
Dt0
(D2)
R2 + 1
Here we note that the t0 term in the numerator is significant only if R = O(D−1/2 ) or smaller, in which case the
denominator is just 1 . When R is of order 1 the term
t0 in the integrand is negligible. Hence, in both cases we
can write,
−1
αBall
(κ, R, D) ≈ α0−1
√ !
κ+R D
√
1 + R2
Also, ttouch ≈ ~t · s̃ ≈ κM , hence, we obtain for the capacity,
−1
αM
(κ) ≈
−1
≈ αBall
(κ, RM , DM )
(D6)
where the average is wrt the gaussian t0 . Evaluating RM
and DM involves calculations of the self consistent statistics of the anchor points. This calculation is simplified
in high dimension. In particular, λ, Eq. 17 , reduces to
(D3)
√
In this form, the intuition beyond the factor 1 + R2
is clear, stemming from the fact that the distance of a
point from the margin plane scales with its norm, hence
the margin entering the capacity should factor out this
norm.
h[κM + κ − t0 ]2+ it0
2 +1
RM
λ≈
h[κM + κ − t0 ]+ it0
2
1 + RM
(D7)
hence it is approximately constant, independent of T~ .
In deriving the above approximations we used selfaveraging in summations involving the D intrinsic coordinates. The full dependence on the longitudinal gaussian
25
t0 should remain. Thus, RM and DM should in fact be
substituting by RM (t0 ) and DM (t0 ) denoting 29-30 with
averaging only over ~t. This would yield a more complicated expressions than Eq.D6- D7.
The reason why we can replace them by average quantities is the following: the potential dependence of the
anchor radius and dimension on t0 is via λ(t0 ). However,
inspecting Eq. D7 we note two scenarios: One in which
RM is small and κM of order 1 . In this case, because
the manifold radius is small the contribution λs̃ is small
and can be neglected. This is the same argument why in
this case, the geometry can be replaced by the Gaussian
geometry which does not depend on t0 or κ . The second
scenario is that RM is of order 1 and κM 1, in which
case the order 1 contribution from t0 is negligible.
with sparsity f (Eq. (54) and Eq. B2) is given by,
Z ∞
−1
αBall
=f
dtχD (t)x
0
"Z
κ+tR+b
(−t0 + tR + b + κ)2
Dt0
(1 + R2 )
κ−tR−1 +b
#
Z b+κ−tR−1
2
2
+
Dt0 ((t0 − b − κ) + t )
−∞
∞
Z
+ (1 − f )
"Z
κ+tR−b
Dt0
κ−tR−1 −b
Z
+
−b+κ−tR−1
−∞
Appendix E: Capacity of `2 Balls with Sparse Labels
We begin by writing the capacity of random points with
sparse labels [12], as α0 (f, κ) = maxb α0 (f, κ, b), where
Z
+ (1 − f )
Dt(−t + κ + b)2
Z
−∞
Dt(−t + κ − b)2
b+κ
0=f
−∞
#
2
2
Dt0 ((t0 − κ + b) + t )
(E4)
√
(−t0 + R D + b)2
(1 + R2 )
−∞
√
√
Z R D−b
(−t0 + R D + b)2
+ (1 − f )
Dt0
(1 + R2 )
−∞
Z
√
R D+b
=f
Dt0
κ−b
(E1)
(E5)
Optimizing b yields the following equation for b,
Z
−1
αBall
κ+b
−∞
(−t0 + tR + κ − b)2
(1 + R2 )
and the optimal bias b is given by ∂αB /∂b = 0. Here we
analyze these equations in various size regimes assuming
κ = 0.
Small R: For balls with small radius, the capacity is
that of points, unless
√ the dimensionality is high. Thus,
if D is large but R D . 1,
First, we note that the capacity of sparsely labeled points
is α0 (f, κ) = maxb α0 (f, κ, b), where
α0−1 (f, κ, b) = f
dtχD (t)x
0
Dt(−t + κ + b) + (1 − f )
Z
that is,
√
αBall (f, R, D) ≈ α0 (f, κ = R D)
b−κ
−∞
Dt(−t + κ − b)
(E2)
In the limit of f → 0, b 1 . The first equation reduces
to
α0−1 ≈ f b2 + exp −b2 /2
(E3)
p
yielding for the optimal b ≈ 2| log f | . With this b, the
inverse capacity is dominated by the first term which is
α0−1 ≈ 2f | log f | .
The capacity for `2 balls of radius R with sparse labels
(E6)
As noted above when f → 0 the optimal bias diverges, hence the presence of order 1 the induced√margin is noticeable only for moderate f such that R D =
O(| log f |).
Small f and large R: Here we analyze the above equations in the limit of small f and large R. We assume that
f is sufficiently small so that the optimal bias b is large.
The contribution of the minority class to the inverse ca−1
pacity αB
is dominated by
Z
f
0
∞
Z
b
dtχD (t)
−∞
Dt0 ((−t0 + b)2 + t2 ) ≈ f b2
(E7)
−1
The dominant contribution of the majority class to αB
is,
26
(1 − f )
Z
∞
dtχD (t)
Dt0
−b−Rt−1
0
≈ (1 − f )
−b+tR
Z
Z
b̄
∞
(−t0 + tR − b)2
(1 + R2 )
(E8)
dtχD (t)(t − b̄)2
(E9)
where b̄ = b/R . In deriving the last equation we used
(−t0 +tR−b)2
→ (t−b̄)2 as R, b → ∞ . Second, the integrals
(1+R2 )
are of substantial value only if t ≥ b̄ in which case the
Rb
integral of t0 is −R(b̄−t) Dt0 ≈ 1 and the integral over
t is from b̄ to ∞. Combining the two results yields the
following simple expression for the inverse capacity,
−1
αBall
= f¯b̄2 +
Z
∞
dtχD (t)(t − b̄)2
[7]
[8]
[9]
[10]
(E10)
[11]
where scaled sparsity is f¯ = f R2 . The optimal scaled
bias is given by,
[12]
f¯b̄ =
Z
b̄
∞
b̄
dtχD (t)(t − b̄)
(E11)
Note that R and f affect the capacity only through the
scaled sparsity. When f¯ → 0, capacity is proportional
to (f¯| log f¯|)−1 . In a realistic regime of small f¯ (between
10−4 to 1) capacity decreases with f¯ roughly as 1/f¯ with
a proportionality constant which depends on D, as shown
in the examples of Fig. 12 (a). Finally, when R is sufficiently large that f¯ > 1, b̄ is order 1 or smaller. In this
case, the second term in Eq. E10 dominates and contributes ht2 i = D yielding a capacity that saturates as
D−1 as shown in Fig. 11(a). It should be noted however, that when b is not large, the approximations Eq.
E10-E11 don’t hold anymore.
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[1] James J DiCarlo and David D Cox. Untangling invariant object recognition. Trends in cognitive sciences,
11(8):333–341, 2007.
[2] Jennifer K Bizley and Yale E Cohen. The what, where
and how of auditory-object perception. Nature Reviews
Neuroscience, 14(10):693–707, 2013.
[3] Kevin A Bolding and Kevin M Franks. Complementary
codes for odor identity and intensity in olfactory cortex.
eLife, 6:e22630, 2017.
[4] H Sebastian Seung and Daniel D Lee. The manifold ways
of perception. Science, 290(5500):2268–2269, 2000.
[5] James J DiCarlo, Davide Zoccolan, and Nicole C Rust.
How does the brain solve visual object recognition? Neuron, 73(3):415–434, 2012.
[6] Ben Poole, Subhaneil Lahiri, Maithreyi Raghu, Jascha
Sohl-Dickstein, and Surya Ganguli. Exponential expressivity in deep neural networks through transient chaos.
[22]
[23]
[24]
[25]
In Advances In Neural Information Processing Systems,
pages 3360–3368, 2016.
Marc Aurelio Ranzato, Fu Jie Huang, Y-Lan Boureau,
and Yann LeCun. Unsupervised learning of invariant
feature hierarchies with applications to object recognition. In Computer Vision and Pattern Recognition, 2007.
CVPR’07. IEEE Conference on, pages 1–8. IEEE, 2007.
Yoshua Bengio. Learning deep architectures for ai. Foundations and trends R in Machine Learning, 2(1):1–127,
2009.
Ian Goodfellow, Honglak Lee, Quoc V Le, Andrew Saxe,
and Andrew Y Ng. Measuring invariances in deep networks. In Advances in neural information processing systems, pages 646–654, 2009.
Charles F Cadieu, Ha Hong, Daniel LK Yamins, Nicolas
Pinto, Diego Ardila, Ethan A Solomon, Najib J Majaj,
and James J DiCarlo. Deep neural networks rival the
representation of primate it cortex for core visual object
recognition. PLoS Comput Biol, 10(12):e1003963, 2014.
Thomas M Cover. Geometrical and statistical properties
of systems of linear inequalities with applications in pattern recognition. IEEE transactions on electronic computers, (3):326–334, 1965.
Elizabeth Gardner. The space of interactions in neural
network models. Journal of physics A: Mathematical and
general, 21(1):257, 1988.
E. Gardner. Maximum storage capacity in neural networks. EPL (Europhysics Letters), 4(4):481, 1987.
Vladimir Vapnik. Statistical learning theory. Wiley New
York, 1998.
SueYeon Chung, Daniel D Lee, and Haim Sompolinsky.
Linear readout of object manifolds. Physical Review E,
93(6):060301, 2016.
Stephen Boyd and Lieven Vandenberghe. Convex optimization. Cambridge university press, 2004.
Ralph Tyrell Rockafellar. Convex analysis. Princeton
university press, 2015.
Jean-Jacques Moreau. Décomposition orthogonale d’un
espace hilbertien selon deux cônes mutuellement polaires.
CR Acad. Sci. Paris, 225:238–240, 1962.
SueYeon Chung, Uri Cohen, Haim Sompolinsky, and
Daniel D Lee. Learning data manifolds with a cutting
plane method. Neural Computation (Accepted), 2018.
Branko Grünbaum and Geoffrey C Shephard. Convex
polytopes. Bulletin of the London Mathematical Society,
1(3):257–300, 1969.
AA Giannopoulos, VD Milman, and M Rudelson. Convex
bodies with minimal mean width. In Geometric aspects
of functional analysis, pages 81–93. Springer, 2000.
Roman Vershynin. Estimation in high dimensions: a geometric perspective. In Sampling theory, a renaissance,
pages 3–66. Springer, 2015.
Kanaka Rajan, LF Abbott, and Haim Sompolinsky.
Stimulus-dependent suppression of chaos in recurrent
neural networks. Physical Review E, 82(1):011903, 2010.
Ashok Litwin-Kumar, Kameron Decker Harris, Richard
Axel, Haim Sompolinsky, and LF Abbott. Optimal degrees of synaptic connectivity. Neuron, 93(5):1153–1164,
2017.
Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li,
and Li Fei-Fei. Imagenet: A large-scale hierarchical image database. In Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on, pages
248–255. IEEE, 2009.
27
[26] Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. Going
deeper with convolutions. In Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition, pages 1–9, 2015.
[27] Seung-Hyeok Kye. Faces for two qubit separable states
and the convex hulls of trigonometric moment curves.
arXiv preprint arXiv:1302.2226, 2013.
[28] Zeev Smilansky. Convex hulls of generalized moment
curves. Israel Journal of Mathematics, 52(1):115–128,
1985.
[29] Rémi Monasson. Properties of neural networks storing spatially correlated patterns. Journal of Physics A:
Mathematical and General, 25(13):3701, 1992.
[30] B Lopez, M Schroder, and M Opper. Storage of corre-
[31]
[32]
[33]
[34]
lated patterns in a perceptron. Journal of Physics A:
Mathematical and General, 28(16):L447, 1995.
Sam T Roweis and Lawrence K Saul. Nonlinear dimensionality reduction by locally linear embedding. Science,
290(5500):2323–2326, 2000.
Joshua B Tenenbaum, Vin De Silva, and John C Langford. A global geometric framework for nonlinear dimensionality reduction. science, 290(5500):2319–2323, 2000.
Shun-ichi Amari, Naotake Fujita, and Shigeru Shinomoto. Four types of learning curves. Neural Computation, 4(4):605–618, 1992.
Sebastian Risau-Gusman and Mirta B Gordon. Statistical mechanics of learning with soft margin classifiers.
Physical Review E, 64(3):031907, 2001.
| 9cs.NE
|
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
1
An End-to-End Deep Learning Histochemical
Scoring System for Breast Cancer Tissue
Microarray
arXiv:1801.06288v1 [cs.CV] 19 Jan 2018
Jingxin Liu, Bolei Xu, Chi Zheng, Yuanhao Gong, Jon Garibaldi, Daniele Soria, Andew Green, Ian O. Ellis,
Wenbin Zou, Guoping Qiu
Abstract—One of the methods for stratifying different molecular classes of breast cancer is the Nottingham Prognostic Index Plus
(NPI+) which uses breast cancer relevant biomarkers to stain tumour tissues prepared on tissue microarray (TMA). To determine the
molecular class of the tumour, pathologists will have to manually mark the nuclei activity biomarkers through a microscope and use a
semi-quantitative assessment method to assign a histochemical score (H-Score) to each TMA core. However, manually marking
positively stained nuclei is a time consuming, imprecise and subjective process which will lead to inter-observer and intra-observer
discrepancies. In this paper, we present an end-to-end deep learning system which directly predicts the H-Score automatically. The
innovative characteristics of our method is that it is inspired by the H-Scoring process of the pathologists where they count the total
number of cells, the number of tumour cells, and categorise the cells based on the intensity of their positive stains. Our system imitates
the pathologists’ decision process and uses one fully convolutional network (FCN) to extract all nuclei region (tumour and non-tumour),
a second FCN to extract tumour nuclei region, and a multi-column convolutional neural network which takes the outputs of the first two
FCNs and the stain intensity description image as input and acts as the high-level decision making mechanism to directly output the
H-Score of the input TMA image. In additional to developing the deep learning framework, we also present methods for constructing
positive stain intensity description image and for handling discrete scores with numerical gaps. Whilst deep learning has been widely
applied in digital pathology image analysis, to the best of our knowledge, this is the first end-to-end system that takes a TMA image as
input and directly outputs a clinical score. We will present experimental results which demonstrate that the H-Scores predicted by our
model have very high and statistically significant correlation with experienced pathologists’ scores and that the H-Scoring discrepancy
between our algorithm and the pathologits is on par with that between the pathologists. Although it is still a long way from clinical use,
this work demonstrates the possibility of using deep learning techniques to automatically and directly predicting the clinical scores of
digital pathology images.
Index Terms—H-Score, Immunohistochemistry, Diaminobenzidine, Convolutional Neural Network, Breast Cancer
F
1
I NTRODUCTION
Breast cancer (BC) is a heterogeneous group of tumours
with varied genotype and phenotype features [1]. Recent
research of Gene Expression Profiling (GEP) suggests that
BC can be divided into distinct molecular tumour groups
[2], [3]. Personalised BC management often utilizes robust
commonplace technology such as immunohistochemistry
(IHC) for tumour molecular profiling [4], [5].
Diaminobenzidine (DAB) based IHC techniques stain
the target antigens (detected by biomarkers) with brown
colouration (positive) against a blue colouration (negative)
counter-stained by Hematoxylin (see Fig.1 for some example images). To determine the biological class of the tumour, pathologists will mark the nuclei activity biomarkers
through a microscope and give a score based on a semi•
•
•
•
•
•
•
J. Liu, B. Xu, W. Zou, and G. Qiu are with the College of Information
Engineering, Shenzhen University, China; G. Qiu is also with School of
Computer Science, The University of Nottingham, UK
C. Zheng is with Ningbo Yongxin Optics Co., LTD, Zhejiang, China
Y. Gong is with Computer Vision Laboratory , ETH Zurich, Switzerland
J. Garibaldi is with School of Computer Science, The University of
Nottingham, UK
D. Soria is with Department of Computer Science, The University of
Westerminster, UK
A. Green and I. O. Ellis are with Faculty of Medicine & Health Sciences,
The University of Nottingham, United Kingdom.
G. Qiu is the corresponding author, E-mail:[email protected]
quantitative assessment method called the modified histochemical scoring (H-Score) [6], [7]. The H-Scores of tissue
samples stained with different biomarkers are combined
together to determine the biological class of a case. Clinical decision making is to choose an appropriate treatment
from a number of available treatment options according
to the biological class of the tumour. For instance, one of
the methods for stratifying different molecular classes is
the Nottingham Prognosis Index Plus (NPI +) [1] which
uses 10 breast cancer relevant biomarkers to stain tumour
tissues prepared on tissue microarray (TMA). Tissue samples stained by each of these 10 biomarkers are given a
histochemical score (H-Score) and these 10 scores together
will determine the biological class of the case.
Therefore, H-Score is one of the most important pieces of
information for molecular tumour classification. When the
tumour region occupies more than 15% of the TMA section,
a H-Score is calculated based on a linear combination of the
percentage of strongly stained nuclei (SSN ), the percentage
of moderately stained nuclei (M SN ) and the percentage of
weakly stained nuclei (W SN ) according to equation (1):
H − Score = 1 × WSN + 2 × MSN + 3 × SSN
(1)
The final score has a numerical value ranges from 0 to
300. Thus, the histochemical assessment of the TMA’s is
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
2
Fig. 1: Top: Example images extracted from digital TMA slides. Each red circle contains one TMA core stained by
Diaminobenzidine-Hematoxylin (DAB-H). The brown colours indicate positive and the blue colours indicate negative.
Bottom: A schematic illustration of the traditional manual H-Scoring procedure: It needs to first count the total number of
nuclei, then the number of strongly stained, moderately stained and weakly stained tumour nuclei, respectively. The final
H-Score is then calculated according Eq.1.
based on the following semi-quantitative information: the
total number of cells, the number of tumour cells and
the stain intensity distributions within the tumour cells.
In clinical practice, diagnosis requires averaging two experienced pathologists’ assessments. Manually marking the
positively stained nuclei is obviously a time consuming
process. As visual assessment of the TMA’s is subjective,
there is the problem of inter-observer discrepancy and the
issue of repeatability. The semi-quantitative nature of the
method (strongly stained, moderately stained and weakly
stained, the definitions of strong, moderate and weak cannot
be precise and subjective), makes it even more difficult to
ensure inter-subject as well as intra-subject consistency.
With the increasing application of clinicopathologic
prognosis, Computer Aided Diagnosis (CAD) systems have
been proposed to support the pathologists’ decision making.
The key parameters in tissue image assessment include the
number of tumour cells, the positive staining intensities
within these cells and the total number of all cells in the
image. To classify the positively stained pixels and their
stain intensity, methods such as colour deconvolution that
perform mathematical transformation of the RGB image [8]
[9] are widely used to separate positive stains from negative
stains. Numerous computer-assisted approaches have been
proposed for cell or nuclei detection and segmentation [10].
Most literature on histopathology image analysis perform
various low-level quantification steps, there is still little
attempt to perform end-to-end assessment of the image
directly.
In this paper, we ask this question: is it possible to
develop a CAD model that would directly give a highlevel assessment of a digital pathological image, just like
an experienced pathologist would, for example, to give out
a H-Score directly? In an attempt to answer this question,
we propose an end-to-end deep learning system for directly
predicting the H-Scores of breast cancer TMA images, see
Fig. 6. Instead of pushing the raw digital images into the
neural network directly, we follow a similar process that
pathologists use for H-Score estimation. We first construct
a stain intensity nuclei image (SINI) which only contains
nuclei pixels and their corresponding stain intensity information, and a stain intensity tumour image (SITI) which
only contains tumour nuclei pixels and their corresponding
stain intensity information. The SINI and SITI block irrelevant background pixels while only retain useful information
for calculating the H-Score. These two H-Score relevant images are then fed into a dual-channel convolutional neural
network with two input pipelines, which are finally merged
into one pipeline to give an output (H-Score). To the best
of our knowledge, this is a first work that attempts to
develop deep learning based TMA processing model that
directly outputs the histochemical scores. We will present
experimental results which demonstrate that the H-Scores
predicted by our model have high and statistically significant correlation with experienced pathologists’ scores and
that the H-Scoring discrepancy between our algorithm and
the pathologists is on par with that between the pathologists. Although it is still perhaps a long way from clinical
use, this work nevertheless demonstrates the possibility of
automatically scoring cancer TMA’s based on deep learning.
2
R ELATED W ORKS
Researchers have proposed various computer-assisted analysis methods for histopathological images [11]. For pixellevel positive stain segmentation, Pham [12] adapted Yellow
channel in CMYK model, which is believed to have strong
correlation with the DAB stain; Ruifrok [8] presented the
brown image calculated based on mathematical transformation of the RGB image. Yao [13] employed Hough forest for
mitotic cell detection, which is a combination of generalized
Hough transform and random decision trees. Shu et al. [14]
proposed utilizing morphological filtering and seeded watershed for overlapping nuclei segmentation. Object-based
CAD systems have also been developed for tubule detection
in breast cancer [15], glandular structure segmentation [16],
and etc.
With the development of deep learning techniques, various deep neural network based CAD models have been
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
3
published. Deep convolutional networks with deeper architectures can be used to build more complex models which
will result in more powerful solutions. Li [17] used a 88layer residual network for human epithelial type 2 (HEp-2)
cell segmentation and classification. AggNet with a novel
aggregation layer is proposed for mitosis detection in breast
cancer histology images [18]. Google brain presented a multi
scale CNN model to aid breast cancer metastasis detection
in lymph nodes [19]. A deep learning-based system is
proposed for the detection of metastatic cancer from whole
slide images, which won the Camelyon Grand Challenge
2016 [20]. Shah et al. [21] presented the first completely
data-driven model integrated numerous biologically salient
classifiers for invasive breast cancer prognosis. A symmetric
fully convolutional network is proposed by Ronneberger for
microscopy image segmentation [22].
Digital pathology is relative new compared with other
type of medical imaging such as X-ray, MRI, and CT. Deep
learning as one of the most powerful machine learning
techniques emerged in recent years has seen widespread
applications in many areas. Yap et al. [23] investigated three
deep learning models for breast ultrasound lesion detection.
Moeskops [24] introduced a single CNN model with triplanar input patches for segmenting three different types of
medical images, brain MRI, breast MRI and cardiac CTA. A
combination of multi-channel image representation and unsupervised candidate proposals is proposed for automatic
lesion detection in breast MRI [25].
Most existing high-level CAD frameworks directly follow the assessment criteria by extracting quantitative information from the digital images. Masmoudi et al. [26] proposed an automatic Human Epidermal Growth Factor Receptor 2 (HER2) assessment method, which is an assemble
algorithm of colour pixel classification, nuclei segmentation
and cell membrane modelling. Gaussian-based bar filter was
used for membrane isolation after colour decomposition in
[27]. Trahearn et al. [28] established a two-stage registration
process for IHC stained WSI scoring. Thresholds were defined for DAB stain intensity groups, and tumour region and
nuclei were detected by two different detectors. Recently,
Zhu [29] proposed to train an aggregation model based
on deep convolutional network for patient survival status
prediction.
3
P ROBLEM AND M ETHOD
An immunohistochemical assessment can be formulated as
a model F that maps the input images from the input space
I to the a label space L. Given an input image I ∈ I , its label
l ∈ L is assigned according to the quantitative information
of positive staining intensity Ps , the number of tumour cells
Nt and total number of cells Ne in the image x:
l = F(I|Ps , Nt , Ne ),
(2)
Traditional assessment methods have at least three unsolved issues for both the pathologists and the CAD systems. Firstly, the positive staining intensity needs to be
categorized into four classes: unstained, weak, moderate, and
strong. However, there is no standard quantitative criterion
for classifying the DAB stain intensity. Thus, two pathologists often classify the same staining intensity into two
(a)
(b)
(c)
Fig. 2: Examples of challenging cases of quantitative measurement of biomarkers based on visual assessment. (a) A
variety of stain intensities; (b) unclear staining and overlapping of nucleus; (c) Size differences between different type
of nucleus.
different categories or two different intensities into the same
category. Furthermore, the human visual system may pay
more attention to strongly stained regions but they are often
surrounded by a variety of staining intensities [28], which
may also affect the assessment results. Secondly, cell/nuclei
instance counting is a very important parameter in the
assessment. Nevertheless, both human and computer still
cannot deal with the difficulty of counting overlapping
cells very well. Moreover, variability in the appearance of
different types of nucleus, heterogeneous staining, and the
complex tissue architectures make individually segmenting
cell/nuclei a very challenging problem. Thirdly, the apparent size differences between tumour nuclei and normal
nuclei will affect the quantitative judgement of tumour
nuclei assessment. Examples of these challenging cases are
illustrated in Fig. 2.
To tackle the problem mentioned above, we propose
to develop a convolutional neural network (CNN) based
CAD framework for biomarker assessment of TMA images.
Instead of using CNN as a feature extractor or for low
level processing such as cell segmentation only, we have
developed an end-to-end system which directly predicts the
biomarker score (H-Score). The innovative characteristic of
our method is that it is inspired by the H-Scoring process
of the pathologists where they count the total number of
nuclei and the number of tumour nuclei and categorise
tumour nucleus based on the intensity of their positive
stains. In the complete system, as illustrated in Fig. 6, one
fully convolutional network (FCN) is used to extract all
nuclei region which acts as the step of counting all nucleus
and capture all foreground information, another FCN is
used to extract tumour nuclei region which acts as the step
of counting all tumour nucleus. To mimic the process of
categorising tumour nuclei based on their positive stain
intensities, we derive a stain intensity image which together
with the outputs of the two FCNs are presented to another
deep learning network which acts as the high-level decision
making mechanism to directly output the H-Score of the
input TMA image.
3.1
Stain Intensity Description
Although various DAB stain separation methods have been
proposed [9], [30], few work studied the stain intensity
description and grouping. Since there is no formal definitions for the boundaries between stain intensity groups
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
Original image
4
DAB channel image
Stain intensity discription
image
Fig. 3: A comparison of different images generated during the process of stain intensity description. The highlighted
subimage contains strongly stained nuclei.
(e.g, strong, moderate, weak), previous works used manually
defined thresholds for pixel-wise classification to segment
positive stains into each stain group [28].
Most previous works set a single threshold on IDAB
to separate positively stained tissues. However, as shown
in Fig.3, the deeply stained positive nuclei can have dark
and light pixel values on the DAB channel image, since the
strongly stained pixels will have significantly broader hue
spectrum. Furthermore, as illustrated in Fig.4, the same DAB
channel value can correspond to different pixel colours.
Also, from Fig.4, it is clear that in order to separate the
positive stain (brown colour) from the negative stain (blue
colour), the DAB channel thresholds should be set based on
the luminance values. In this paper, we use the Luminance
Adaptive Multi-Thresholding (LAMT) method developed
by the authors [32] to classify positively stained pixels.
Specifically, the transformed pixel IDAB (m, n) is divided
into K equal intervals according to the luminance:
k
k
IDAB
(m, n) = {IDAB
(m, n) ∈ IDAB )|ξ k < Il (m, n) ≤ ζ k }
Fig. 4: Visualization of pixel colours of the DAB-H images
along the luminance axis and the colour deconvolution DAB
axis.
In this work, we propose to directly use the luminance
values of the image to describe the staining intensity instead of setting artificial intensity category boundaries. The
original RGB image I is first transformed into three-channel
stain component image (IDAB−H = [IDAB , IH , IOther ]) using
colour deconvolution [9]:
IDAB−H = M −1 IOD ,
(3)
where M is the stain matrix composed of staining colours
equal to
0.268 0.570 0.776
0.650 0.704 0.286
(4)
0.0
0.0
0.0
for DAB-H stained images, and IOD is Optical Density
converted image calculated according Lambert-Beers law:
IOD = −log(
I
),
I0
(5)
I0 = [255, 255, 255] is the spectral radiation intensity for a
typical 8bit RGB camera [31].
Only the DAB channel image IDAB from the three colour
deconvolution output channels is used, which describes the
DAB stain according the chroma difference.
(6)
where k = 1, 2, ..., K ; ξi and ζi are lower and upper
boundary respectively of k th luminance interval. Il is the
luminance image of the original RGB image calculated
according to Rec. 601 [33]:
Il = 0.299 × IR + 0.587 × IG + 0.114 × IB .
(7)
The transformed pixels are thresholded with different values according to its luminance instead of a single threshold,
the threshold tk is assigned as follows:
k
tk = argmax P (c|IDAB
(m, n))
(8)
c∈C
where C = {cDAB , cH } is the stain label.
Once we have separated the positive stain from the
negative stain, we need to find a way to describe the stain
intensity. As we have already seen in Fig.3 and Fig.4, the
pixel values of IDAB can not describe the biomarker stain
intensity. We propose to use a scheme described in Eq.9 to
assign stain intensity values to pixels:
Ila (m, n) =
(
Il (m, n)
255 + (255 − Il (m, n))
if IDAB (m, n) is positive
(9)
if IDAB (m, n) is negative
where Ila (m, n) is the stain intensity description image.
The idea is that for the positive stain pixels, Ila (m, n) is
the same as the luminance component of the original image
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
in order to preserve the morphology of the positive nuclei;
for the negative stain pixels, Ila (m, n) will have a higher
value for strongly stained pixels (darker blue colour) and a
lower value for weakly stained pixels (lighter blue colour).
In order to separate the positive and negative pixel values
clearly, we add an offset of 255 to the negatively stained
pixels (most negative stain pixels will have a high Il (m, n)
and positive stain pixels will have a low Il (m, n), the value
of positive and negative pixels will be clearly separated in
Ila (m, n)). Therefore, the larger Ila (m, n) is, the weaker is
the stain, the smaller Ila (m, n) is, the stronger is the stain.
When Ila (m, n) is below or equal to 255, it is a positive
stain pixel. In this way, we have obtained an image which
gives a continuous description of the stain intensity of the
image. Instead of setting artificial boundaries to separate
the different degrees of stain intensity, we have now a
continuous description of the stain intensity (see Fig.5). Note
that the pixel values of final image are normalized to the
range from 0 to 1.
3.2
Nuclei and Tumour Maps
As discussed above, the important information pathologists
use to come up with the H-Score is the number of nuclei
and the number of tumour nuclei in the TMA image. We
therefore need to extract these two pieces of information and
we use two separate FCNs, one for segmenting all nucleus
and the other for segmenting tumour nucleus only.
To segment the tumour region, we use our own manually pixel-wise labelled tumour TMA images to train the
FCN. While for segmenting general nuclei which detects
both tumour and non-tumour nuclei, we utilize a transfer
learning strategy to train another FCN. For general nuclei
detection, the training data is obtained from three different datasets: immunofluorescence (IIF) stained HEp-2 cell
dataset [34], Warwick hematoxylin and eosin (H&E) stained
colon cancer dataset [35], and our own DAB-H TMA images.
Since these three image sets are stained with different types
of biomarker, we transform the colour image into grayscale
for training. Training on a mixed image set could help to
reduce overfitting on limited medical dataset and further
boost the performance and robustness [36].
For both the general nuclei detection network and the
tumour nuclei detection network, we use the symmetric U
shape network architecture (U-Net) [22] with skip connection. The high resolution features from the contracting path
are combined with the output from the upsampling path,
which allows the network to learn the high resolution contextual information. The loss function is designed according
the Dice coefficient as:
P
2 m,n ωτ
P
Lmask = −log P
,
(10)
2
2
m,n ω +
m,n τ
where ω is the predicted pixel and τ is the ground truth.
5
3.3
The H-Score Prediction Framework
The overview of the H-Score prediction framework is illustrated in Fig.6. It consists of three stages: 1) Nuclei segmentation, tumour segmentation, and stain intensity description; 2) Constructing the Stain Intensity Nuclei Image (SINI)
and the Stain Intensity Tumour Image (SITI); 3) Predicting
the final histochemical score (H-Score) by the Region Attention Multi-column Convolutional Neural Network (RAMCNN). The rationale of this architecture is as follows: as
only the number of nuclei, the number of tumour nuclei
and the stain intensity of the tumour nuclei are the useful
information for predicting H-Score, we therefore first extract
these information. Rather than setting artificial boundaries
for the categories of stain intensity, we retain a continuous
description of the stain intensity. Only the information useful for predicting the H-Score is presented to a deep CNN to
estimate the H-Score of the input image. This is in contrast
to many work in the literature where the whole image is
thrown to the CNN regardless if a region is useful or not for
the purpose.
The detail of the first stage have been described in
Section 3.1 and 3.2. As illustrated in Fig.6, an input TMA
image I(m, n) is processed by the tumour detection network
which will output a binary image mask, T (m, n), marking
all the tumour nuclei, where T (m, n) = 1 if I(m, n) is a
part of a tumour nuclei and T (m, n) = 0 otherwise; by the
general nuclei detection network which will output another
binary image mask, G(m, n), marking all tumour and nontumour nuclei, where G(m, n) = 1 if I(m, n) is a part of
a nuclei and G(m, n) = 0 otherwise; and by the colour
deconvolution and stain intensity labelling operation of
Equation (8) to produce the stain intensity description image
Ila (m, n). In the second stage, we construct SINI and SITI
by multiplying the nuclei mask image G(m, n) and tumour
mask image T (m, n) with the stain intensity description
image Ila (m, n), i.e. SIN I = Ila (m, n) × G(m, n), and
SIT I = Ila (m, n) × T (m, n). Hence, all background pixels
are zero, while only region of interests (ROI) are retained
in SINI and SITI. All necessary information is preserved
for histochemical assessment. Removing the background
and only retaining ROI will enable the RAM-CNN convolutional layers to focus on foreground objects [37] which
will significantly reduce computational costs and improve
performance.
The proposed RAM-CNN is a deep regression model
with dual input channels. The architecture of RAM-CNN
is shown in Table 1. Two inputs correspond to SINI and SITI
respectively, and the input size is 512 × 512. The parameters
of the two individual branches are updated independently
for extracting cell and tumour features respectively, without
interfering with each other. The two pipelines are merged
into one after two convolutional layers for H-Score prediction. The loss function for H-Score prediction is defined as:
Fig. 5: An illustration of the value of lla and its corresponding stain intensity. The red dot lines are the thresholds of stain
intensity groups [28].
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
6
Fig. 6: The overview of our proposed H-Score prediction framework. An input TMA image is first processed by two
FCNs to extract tumour cells and all cells (tumour and non-tumour) to produce two mask images. The input image is
also processed by colour deconvolution and positive stain classification to output a stain intensity description image. The
two mask images are used to filter out irrelevant information in the stain intensity description image and only the useful
information is fed to a deep convolutional neural network for the prediction of H-Score of the input TMA.
6
Image Number
5
4
3
2
1
Augmented Image Number
0
0
15
30
45
60
75
90
0
15
30
45
60
75
90
105
120
135
150
165
180
195
210
225
240
255
270
285
300
40
35
30
25
20
10
15
5
0
105
120
135
150
165
180
195
210
225
240
255
270
285
300
H-Score
Fig. 7: The top graph is the original dataset label histogram; The bottom is the augmented label histogram.
Layer
Input
Conv1
MaxPooling
Conv2
MaxPooling
Conv3
MaxPooling
Conv4
MaxPooling
FC1
FC2
Input / Filter Dimensions
512 × 512 × 1 512 × 512 × 1
8×7×7
8×7×7
2×2
2×2
16 × 5 × 5
16 × 5 × 5
2×2
2×2
64 × 3 × 3
2×2
64 × 3 × 3
2×2
2048
1024
4
4.1
TABLE 1: The architecture of Region Attention Multichannel Convolutional Neural Network (RAM-CNN).
Lscore =
N
1 X
kF
(SIN Ii , SIT Ii ) − li k2 ,
N i=1 RAM
(11)
where FRAM (SIN Ii , SIT Ii ) is the estimated score generated by RAM-CNN. li is the ground truth H-Score.
E XPERIMENTS AND R ESULTS
dataset
The H-Score dataset used in our experiment contains 105
TMA images of breast adenocarcinomas from the NPI+
set [1]. Each image contains one whole TMA core. The
tissues are cropped from a sample of one patient which are
stained with three different nuclei activity biomarkers: ER,
p53, and PgR. The original images are captured at a high
resolution of 40× optical magnification, and then resized to
1024×1024 pixels. The dataset is manually marked by two
experienced pathologists with H-Score based on common
practice. For each TMA core, the pathologists give the
percentage of nuclei of different stain intensity levels, and
then calculate the H-Score using Eq.1. The final label (HScore) is determined by averaging two pathologists’ scores,
if the difference between two pathologists is smaller than
20. The dataset is available from the authors on request.
For training the general nuclei detection network, we
transform Warwick H&E colon adenocarcinoma [35] and
NPI+ images to grayscale; the green channel was extracted
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
7
Fig. 8: Examples of intermediate images in the automatics H-Score prediction pipeline. From left to right: the original RGB
image, luminance labelled stain intensity image, nuclei mask image, and tumour mask image respectively.
from HEp-2 cell dataset [34]. As HEp-2 cell images are IIF
stained, the gray value should be inversed.
4.2
Data and Label Augmentation
As in typical medical imaging applications, the dataset sizes
are relatively small. In developing deep learning based
solutions, it is a common practice to augment the training
dataset for training. The training images for general nuclei
detection network and tumour detection network are augmented by randomly cropping sub-images as input samples.
For the H-Score dataset, rotation with random angles and
randomly shifting the image horizontally and vertically
within 5% of image height and width are performed to
augment the training set.
As shown in the top row of Fig.7, the distribution of
the label (H-Score) in the original dataset is unbalanced,
some labels (H-Scores) have far more samples than others.
Furthermore, one of the biggest problems is that because
we have only limited number of samples, the H-Score
values are discrete and discontinuous. There are many gaps
between two H-Scores that has no data. Also, the values
of the TMA image score given by the pathologists have a
quantitative step-size of 5. Therefore, if an image has a score
of 125, it means it has a value of around 125, the values in
the vicinity of 125, i.e., 126 or 124 should also be suitable for
labelling that image. In order to solve the ambiguity issue,
we introduce Distributed Label Augmentation (DLA) which
was inspired by the work of [38], [39].
In the traditional regression method, a given dataset
{(I1 , l1 ), (I2 , l2 ), · · · , (ID , lD )} pairs the instance Id for 1 ≤
d ≤ D with
one single ld from the finite class label
space L = l0 , l1 , · · · , lC , where C is the label size (e.g.,
C = 301 for H-Score). In this paper, the label is augmented so that one instance is associated with a num-
ber of labels. Formally, the dataset can be described as
{(I1 , Y1 ), (I2 , Y2 ), · · · , (ID , YD )}, and Yd ⊆ Y is a set of
(1) (2)
(S)
labels {yd , yd , · · · , yd }, where S is the augmented label
(s)
number for Id . yd is sampled repeatedly from L based
on a probability density function of following Gaussian
distribution:
(lc − µ)2
1
√ exp(−
)
(12)
2σ 2
σ 2π
where µ is the mean which equal to ld and σ is stanPS
(s)
dard deviation. Thus,
s=1 p(yd ) = 1 for each original
TMA image. Consequentially, for an image xi from the
augmented training set, its ground truth labels are assigned
by repeatedly sampling from L according to Eq.12. The
augmented label histogram is shown at the bottom row of
Fig.7.
(s)
p(yd = lc ) =
4.3
Implementation Details
The network architecture for both the tumour nuclei detection and general nuclei detection models is the same as
the U-Net [22] with a input size of 224 × 224. The filter
size of tumour detection net is half narrower than that of
general cell detection net. All networks use rectified linear
unit (ReLU) activation function for the convolutional layer.
The final cell and tumour region maps are predicted using
sliding window.
A leave 5 out cross validation strategy is used for RAMCNN model training, which means that in each round of
testing, we randomly sample 5 TMAs as testing and the
other 100 TMAs as training images. As explained previously,
the training set is augmented via rotation and shift. The images are firstly resized to 512×512 before fed into the RAMCNN. We set σ = 0.9 to generate the H-Score distribution
for ground truth label augmentation. We also add dropout
8
300
300
250
250
200
200
Predicted Score
Predicted Score
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
150
150
100
100
50
50
0
0
50
100
150
200
250
0
300
0
50
100
Pathologist's Score
(a) NAP
200
300
250
250
250
200
200
200
Predicted Score
300
150
150
100
100
50
50
50
0
50
100
150
200
Pathologist's Score
(c) RGB-CNN
250
300
0
0
300
150
100
0
250
(b) NNP
300
Predicted Score
Predicted Score
150
Pathologist's Score
50
100
150
200
250
300
0
0
50
100
Pathologist's Score
150
200
250
300
Pathologist's Score
(d) RA-CNN
(e) RAM-CNN
Fig. 9: Scatter plots of the predicted scores of different models vs the pathologists’ manual scores.
4.4.1 Experimental Results
Fig.8 shows some examples of the intermediate images in
the automatic H-Score prediction pipeline. It is seen that
the luminance labelled stain intensity image marks a sharp
distinction between positive and negative stains. This shows
that our maximum a posteriori (MAP) classifier based Luminance Adaptive Multi-Thresholding (LAMT) method [32]
can reliably separate positive DAB stains for a variety of images. It also shows that our stain intensity labelling strategy
can preserve the morphology of the nuclei, separate positive
and negative stains while retaining a continuous description
of the positive stain intensity.
Fig.10 shows the training curves of the Dice coefficient
for the general nuclei detection network and the tumour
nuclei detection network respectively. Both networks converged after 170 epochs respectively. The nuclei mask images (see Fig.8) show that the deep convolutional network
trained with mixed datasets using transfer learning can
successfully detect the nuclei in our H-Score dataset. The
tumour segmentation network is able to identify tumour region from normal tissues. It is worth noting that the ground
truth masks for the two detection networks are different. All
nucleus in Warwick colon cancer images are labelled with
circular masks with a uniform size, while tumour region
masks are pixel level labelled. Therefore, the final predicted
maps generated by the two networks for the same nucleus
are different. In addition, it is found that the mask dilation
become evident with the increase of DAB stain intensity.
0.9
0.9
Results and Discussions
0.85
0.8
0.8
Dice coefficient
4.4
One possible reason is that the strong homogeneous stain
makes the nuclei texture and edge feature difficult to extract.
Dice coefficient
layers after two fully connected layers with the rates of 0.3
and 0.5 respectively. The regression network is optimized by
Adam [40] with an initial learning rate of 0.001.
0.7
0.75
0.6
0.7
0.65
0.5
0.6
0.55
0.4
training
test
0.3
0
25
50
75
100
Epoch
(a)
125
150
175
training
test
0.5
200
0.45
0
25
50
75
100
Epoch
125
150
175
200
(b)
Fig. 10: Training results for general nuclei detection network
(a) and tumour nuclei detection network (b).
To evaluate the performance of our proposed RAMCNN and the two H-Score relevant images SINI and SITI,
we compare our model with two traditional single input
pipeline CNNs: RGB-CNN and RA-CNN (i.e., region attention CNN). The RGB-CNN takes the original RGB TMA
image with the shape of 512 × 512 × 3 as input, and output
the H-Score prediction. To investigate the effect of multicolumn architecture, we combine SINI and SITI as a two
channel image of 512 × 512 × 2 for the input of RA-CNN.
The architectures of RGB-CNN and RA-CNN are the same
as a single pipeline RAM-CNN (see Table.1).
We also calculate the H-Score using Eq.1 based on the
nuclei area percentage (NAP) and nuclei number percentage
(NNP). Specifically, the luminance labelled stain intensity
description image Ila is first calculated according to the
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
(a) 0-49
(b) 50-99
(c) 100-149
9
(d) 150-199
(e) 200-249
(f) 250-300
Fig. 11: Example TMA images extracted from different H-Score groups.
description in Section 3.1. The pre-defined thresholds [28]
are utilized for categorizing the pixels into different DAB-H
stain intensity groups. For the NAP method, the predicted
H-Score is calculated according to the percentages of area
in different stain intensity groups. NNP employs the NIH
ImageJ tool [41] with a multi-stage cell segmentation technique [14] for cell detection. The detected cells are classified
into unstained, weak, moderate, and strong groups using the
pre-defined thresholds for H-Score calculation .
Model
NAP
NNP
RGB-CNN
RA-CNN
RAM-CNN
Human
MAE
47.09
46.48
32.01
27.22
21.33
20.63
SD
46.03
55.18
44.46
35.72
29.14
30.55
CC
0.87
0.82
0.87
0.92
0.95
0.95
P value
< 0.001
< 0.001
< 0.001
< 0.001
< 0.001
< 0.001
TABLE 2: Performance comparison with different regression
models. The last line (Human) are difference between the HScores given by the two pathologists.
pathologists (MAE = 20.63, SD = 30.55, CC = 0.95). While the
MAE between the RAM-CNN and humans is slightly higher
than that between humans, the SD between humans is
higher than that between RAM-CNN and humans. The CC
between humans and machine and that between humans
are the same.
Fig. 9 illustrates the scatter plots between the model
predicted scores and the pathologists’ scores. Most of the
predicted scores of NAP are lower than the ground truth.
At the lower end, NNP predicted scores are lower than the
ground truth while at the higher end the predicted scores
are higher than the ground truth. These two methods are
affected by several low-level processing components including the pre-defined stain intensity thresholds and the nuclei segmentation accuracy. Our proposed framework gives
more accurate prediction results compared to traditional
single pipeline CNN, further demonstrating that imitating
the pathologists’ H-Scoring process by only keeping useful
information is an effective approach.
4.4.2
In this paper, Mean Absolute Error (MAE), Standard
Deviation (SD) and the correlation coefficient (CC) between
the predicted H-Score and the average H-Score of the two
pathologists are used as the evaluation metrics. As a reference, we also calculate the MAE, SD and CC between the HScores given by the two pathologists of all original diagnosis
data. Results are shown in Table.2.
As can be seen, the NAP based prediction gives the highest MAE with large deviations in the cross validation, which
is followed by NNP. Our RAM-CNN framework achieves
the lowest prediction error (21.33); a traditional CNN setting
with the proposed SINI and SITI as input gives the second
lowest prediction error (27.22). This verifies the effectiveness
of our proposed approach to filtering out irrelevant pixels
and only retain H-Score relevant information in SINI and
SITI. All deep learning based methods outperform NAP
and NNP by a large margin. To investigate the statistical
significance of automatically predicted H-Scores, the correlation of the predicted and those of the pathologists scores
and its P value are also calculated. The correlation between
pathologists scores and those predicted by RAM-CNN is
0.95 with a P value of < 0.001 which means there is strong
evidence against the null hypothesis [42].
It is interesting to observe that the difference between
our RAM-CNN predicted H-Scores and the average of the
two pathologists H-Scores (MAE = 21.33, SD = 29.14, CC
= 0.95) are on par with the difference between the two
Discussions
In this paper, we introduced an end-to-end system to predicted H-Score. To investigate the reason for scoring discrepancy between the proposed algorithm and the pathologists, we firstly compare the H-Score prediction results
for different biomarkers as shown in Table.3. The proposed
framework gives the best accuracy in all three biomarker
images. The performances are slightly different for different
biomarkers. This is to be expected because different markers
will stain the tissues differently. Although the difference
is not large, whether it will be useful to train a separate
network for different biomarkers is something worth investigating in the future.
Biomarker
No. of TMA
NAP
NNP
RGB-CNN
RA-CNN
RAM-CNN
ER
32
42.02
43.53
24.90
25.43
21.01
P53
33
50.68
46.72
31.57
23.39
16.66
PgR
40
48.17
48.92
38.19
31.82
25.44
TABLE 3: Comparing MAE of different methods on three
different biomarkers.
To see how the algorithms perform differently across the
dataset, we divide the TMA images into 6 groups according
to their pathologists’ scores. Example TMA images of each
group are illustrated in Fig.11. For each group, we count
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
30
25
20
15
10
5
0
30
25
20
15
10
5
0
30
25
20
15
10
5
0
30
25
20
15
10
5
0
30
NAP
10
AE >= 30
10 <= AE < 30
AE < 10
NNP
RGB-CNN
(a)
RA-CNN
RAM-CNN
25
20
15
10
5
0
0-49
50-99
100-149
150-199
200-249
250-300
Fig. 12: Comparison of performances of different methods
in different H-Score groups.
the number of TMAs with absolute error (AE) smaller than
10, between 10 and 30, and larger than 30 respectively. The
results of different methods are shown in Fig.12. It is seen
that in the low H-Score group of 0-49, traditional methods
of NAP and NNP give more accurate predicted scores than
CNN based methods. It is found that most low score TMAs
are unstained or weakly stained as shown in Fig.11(a). The
accurate predictions from NAP and NNP indicate that the
predefined threshold for separating unstained and weak (see
Fig. 5) is compatible with pathologists’ criteria. The deep
learning based methods do not set stain intensity thresholds
explicitly and their performances across the six groups are
relatively even.
The accuracies of NAP and NNP decrease rapidly with
the increase of the H-Score. As shown in Fig.11, the stain
intensity and image complexity increase with the H-Score
which directly affect the performance of traditional methods. The result also indicates that the pre-defined stain
intensity thresholds for moderate and strong classes (see
Fig. 5) are less compatible with the pathologists’ criteria.
Furthermore, the large coefficients of moderate and strong
stain (see Eq.1) would magnify the errors of area and nuclei
segmentation in NAP and NNP respectively.
Three deep learning based methods give worse results
on the groups with fewer images (i.e., group 50-99 and 250300), which indicates the importance of a large training data
size. In addition, the uneven distribution of original dataset
may also affect the predicted accuracy.
We further analyse the TMAs individually to investigate
the effect of image quality on the proposed algorithm. We
found that for those TMAs where the tissues are clearly
stained, and the cellular structure is clear without severe
overlap (see Fig.13), our algorithm can give very accurate
prediction. On the other hand, poor image quality causes
errors. In the images that are most easily mis-scored by
(b)
Fig. 13: Examples of accurately scored TMAs by proposed
algorithm. The absolute errors generated by RAM-CNN of
both (a) and (b) are smaller than 2.
our algorithms, we found three significant characteristics as
shown in Fig.14.
The TMA core in Fig.14(a) contains large out-of-focus
regions, which happens more commonly on strongly stained
tissues. The blur regions directly affect the performance of
nuclei segmentation, as well as the nuclei and tumour detection accuracy. They also hinder the final regression network
from extracting topological and morphological information.
Tissue folds (see Fig.14(b)) occurs when a thin tissue slice
folds on itself, and it can happen easily during slide preparation especially in TMA slides. Tissue-fold would cause outof-focus during slide scanning. Furthermore, a tissue fold
in a lightly stained image can be similar in appearance to
a tumour region in a darkly stained image [43]. Hence, the
segmentation accuracy of colour deconvolution would be
greatly affected in tissue-fold regions.
Heterogeneity and overlapping as shown in Fig.14(c)
also affect the automatic scoring performance. The stain
heterogeneity gives rise to a large discrepancy of stain
intensity in a single nucleus, and nuclei overlapping adds
to the difficulty.
These three difficulties directly affect the predicted results of the proposed method, and we found that most large
mis-scored TMAs contain one or more of these characteristics. We found that there were 9 low image quality TMAs
in our dataset and if we exclude these 9 lowest-quality
TMA images, the average MAE of our RAM-CNN is 18.79.
Therefore, future works need to overcome these issues in
order to achieve a high prediction performance. To solve
the problem of out-of-focus, heterogeneity and overlapping,
adding corresponding images in the training set to promote
robustness is one potential quality assurance methods. In
addition, the deep learning based scoring system can be
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
(a)
11
(b)
(c)
Fig. 14: Examples of sources of big scoring discrepancy between algorithm and pathologist. (a) out of focus; (b) tissue folds;
(c) heterogeneity and overlapping.
developed to add nuclei number estimation function for accurate assessment. It is also necessary to add the function of
automated detection and elimination of tissue-fold regions
before H-Score assessment.
[6]
[7]
5
C ONCLUDING R EMARKS
In this paper, we have developed a deep learning framework for automatic end-to-end H-Score assessment for
breast cancer TMAs. Experimental results show that automatic assessment for TMA H-Score is feasible. The H-Scores
predicted by our model have a high correlation with HScores given by experienced pathologists. We show that
the discrepancies between our deep learning model and the
pathologits are on par with those between the pathologists.
We have identified image out of focus, tissue fold and overlapping nuclei as the three major sources of error. We also
found that the major discrepancies between pathologists
and machine predictions occurred in images that will have
a high H-Score value. These findings have suggested future
research directions for improving accuracy.
R EFERENCES
[1]
[2]
[3]
[4]
[5]
E. Rakha, D. Soria, A. R. Green, C. Lemetre, D. G. Powe, C. C.
Nolan, J. M. Garibaldi, G. Ball, and I. O. Ellis, “Nottingham
prognostic index plus (npi+): a modern clinical decision making
tool in breast cancer,” British journal of cancer, vol. 110, no. 7, pp.
1688–1697, 2014.
C. M. Perou, S. S. Jeffrey, M. Van De Rijn, C. A. Rees, M. B.
Eisen, D. T. Ross, A. Pergamenschikov, C. F. Williams, S. X. Zhu,
J. C. Lee et al., “Distinctive gene expression patterns in human
mammary epithelial cells and breast cancers,” Proceedings of the
National Academy of Sciences, vol. 96, no. 16, pp. 9212–9217, 1999.
T. O. Nielsen, J. S. Parker, S. Leung, D. Voduc, M. Ebbert, T. Vickery, S. R. Davies, J. Snider, I. J. Stijleman, J. Reed et al., “A comparison of pam50 intrinsic subtyping with immunohistochemistry and
clinical prognostic factors in tamoxifen-treated estrogen receptor–
positive breast cancer,” Clinical cancer research, pp. 1078–0432, 2010.
D. Soria, J. M. Garibaldi, F. Ambrogi, A. R. Green, D. Powe,
E. Rakha, R. D. Macmillan, R. W. Blamey, G. Ball, P. J. Lisboa et al.,
“A methodology to identify consensus classes from clustering algorithms applied to immunohistochemical data from breast cancer
patients,” Computers in biology and medicine, vol. 40, no. 3, pp. 318–
330, 2010.
A. Green, D. Powe, E. Rakha, D. Soria, C. Lemetre, C. Nolan,
F. Barros, R. Macmillan, J. Garibaldi, G. Ball et al., “Identification
of key clinical phenotypes of breast cancer using a reduced panel
of protein biomarkers,” British journal of cancer, vol. 109, no. 7, p.
1886, 2013.
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
K. McCarty Jr, L. Miller, E. Cox, J. Konrath, and K. McCarty Sr,
“Estrogen receptor analyses. correlation of biochemical and immunohistochemical methods using monoclonal antireceptor antibodies.” Archives of pathology & laboratory medicine, vol. 109, no. 8,
pp. 716–721, 1985.
H. Goulding, S. Pinder, P. Cannon, D. Pearson, R. Nicholson,
D. Snead, J. Bell, C. Elston, J. Robertson, R. Blamey et al., “A new
immunohistochemical antibody for the assessment of estrogen
receptor status on routine formalin-fixed tissue samples,” Human
pathology, vol. 26, no. 3, pp. 291–294, 1995.
A. C. Ruifrok, “Quantification of immunohistochemical staining
by color translation and automated thresholding.” Analytical and
quantitative cytology and histology/the International Academy of Cytology [and] American Society of Cytology, vol. 19, no. 2, pp. 107–113,
1997.
A. C. Ruifrok, D. A. Johnston et al., “Quantification of histochemical staining by color deconvolution,” Analytical and quantitative
cytology and histology, vol. 23, no. 4, pp. 291–299, 2001.
H. Irshad, A. Veillard, L. Roux, and D. Racoceanu, “Methods
for nuclei detection, segmentation, and classification in digital
histopathology: a review current status and future potential,” IEEE
reviews in biomedical engineering, vol. 7, pp. 97–114, 2014.
S. Kothari, J. H. Phan, T. H. Stokes, and M. D. Wang, “Pathology
imaging informatics for quantitative analysis of whole-slide images,” Journal of the American Medical Informatics Association, vol. 20,
no. 6, pp. 1099–1108, 2013.
N.-A. Pham, A. Morrison, J. Schwock, S. Aviel-Ronen, V. Iakovlev,
M.-S. Tsao, J. Ho, and D. W. Hedley, “Quantitative image analysis of immunohistochemical stains using a cmyk color model,”
Diagnostic pathology, vol. 2, no. 1, p. 8, 2007.
A. Yao, J. Gall, C. Leistner, and L. Van Gool, “Interactive object
detection,” in Computer Vision and Pattern Recognition (CVPR), 2012
IEEE Conference on. IEEE, 2012, pp. 3242–3249.
J. Shu, H. Fu, G. Qiu, P. Kaye, and M. Ilyas, “Segmenting overlapping cell nuclei in digital histopathology images,” in Engineering in
Medicine and Biology Society (EMBC), 2013 35th Annual International
Conference of the IEEE. IEEE, 2013, pp. 5445–5448.
A. Basavanhally, E. Yu, J. Xu, S. Ganesan, M. Feldman,
J. Tomaszewski, and A. Madabhushi, “Incorporating domain
knowledge for tubule detection in breast histopathology using
ocallaghan neighborhoods,” in SPIE Medical Imaging, vol. 7963,
no. 1. International Society for Optics and Photonics, 2011, p.
796310.
H. Fu, G. Qiu, J. Shu, and M. Ilyas, “A novel polar space random field model for the detection of glandular structures,” IEEE
transactions on medical imaging, vol. 33, no. 3, pp. 764–776, 2014.
Y. Li, L. Shen, and S. Yu, “Hep-2 specimen image segmentation
and classification using very deep fully convolutional network,”
IEEE Transactions on Medical Imaging, 2017.
S. Albarqouni, C. Baur, F. Achilles, V. Belagiannis, S. Demirci,
and N. Navab, “Aggnet: deep learning from crowds for mitosis
detection in breast cancer histology images,” IEEE transactions on
medical imaging, vol. 35, no. 5, pp. 1313–1321, 2016.
Y. Liu, K. Gadepalli, M. Norouzi, G. E. Dahl, T. Kohlberger,
A. Boyko, S. Venugopalan, A. Timofeev, P. Q. Nelson, G. S. Corrado et al., “Detecting cancer metastases on gigapixel pathology
images,” arXiv preprint arXiv:1703.02442, 2017.
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
[20] D. Wang, A. Khosla, R. Gargeya, H. Irshad, and A. H. Beck, “Deep
learning for identifying metastatic breast cancer,” arXiv preprint
arXiv:1606.05718, 2016.
[21] M. Shah, C. Rubadue, D. Suster, and D. Wang, “Deep learning
assessment of tumor proliferation in breast cancer histological
images,” arXiv preprint arXiv:1610.03467, 2016.
[22] O. Ronneberger, P. Fischer, and T. Brox, “U-net: Convolutional
networks for biomedical image segmentation,” in International
Conference on Medical Image Computing and Computer-Assisted Intervention. Springer, 2015, pp. 234–241.
[23] M. H. Yap, G. Pons, J. Martı́, S. Ganau, M. Sentı́s, R. Zwiggelaar,
A. K. Davison, and R. Martı́, “Automated breast ultrasound lesions detection using convolutional neural networks,” IEEE journal of biomedical and health informatics, 2017.
[24] P. Moeskops, J. M. Wolterink, B. H. van der Velden, K. G. Gilhuijs,
T. Leiner, M. A. Viergever, and I. Išgum, “Deep learning for
multi-task medical image segmentation in multiple modalities,” in
International Conference on Medical Image Computing and ComputerAssisted Intervention. Springer, 2016, pp. 478–486.
[25] G. Amit, O. Hadad, S. Alpert, T. Tlusty, Y. Gur, R. Ben-Ari, and
S. Hashoul, “Hybrid mass detection in breast mri combining
unsupervised saliency analysis and deep learning,” in International
Conference on Medical Image Computing and Computer-Assisted Intervention. Springer, 2017, pp. 594–602.
[26] H. Masmoudi, S. M. Hewitt, N. Petrick, K. J. Myers, and M. A.
Gavrielides, “Automated quantitative assessment of her-2/neu
immunohistochemical expression in breast cancer,” IEEE transactions on medical imaging, vol. 28, no. 6, pp. 916–925, 2009.
[27] B. H. Hall, M. Ianosi-Irimie, P. Javidian, W. Chen, S. Ganesan,
and D. J. Foran, “Computer-assisted assessment of the human
epidermal growth factor receptor 2 immunohistochemical assay
in imaged histologic sections using a membrane isolation algorithm and quantitative analysis of positive controls,” BMC Medical
Imaging, vol. 8, no. 1, p. 11, 2008.
[28] N. Trahearn, Y. W. Tsang, I. A. Cree, D. Snead, D. Epstein, and
N. Rajpoot, “Simultaneous automatic scoring and co-registration
of hormone receptors in tumor areas in whole slide images of
breast cancer tissue slides,” Cytometry Part A, 2016.
[29] Z. Xinliang, Y. Jiawen, Z. Feiyun, and H. Junzhou, “Wsisa: Making
survival prediction from whole slide pathology images,” in CVPR,
2017.
[30] E. M. Brey, Z. Lalani, C. Johnston, M. Wong, L. V. McIntire,
P. J. Duke, and C. W. Patrick Jr, “Automated selection of dablabeled tissue for immunohistochemical quantification,” Journal of
Histochemistry & Cytochemistry, vol. 51, no. 5, pp. 575–584, 2003.
[31] P. Haub and T. Meckel, “A model based survey of colour deconvolution in diagnostic brightfield microscopy: Error estimation and
spectral consideration,” Scientific reports, vol. 5, 2015.
[32] J. Liu, G. Qiu, and L. Shen, “Luminance adaptive biomarker
detection in digital pathology images,” Procedia Computer Science,
vol. 90, pp. 113–118, 2016.
[33] I. REC, “Bt. 601-5: Studio encoding parameters of digital television
for standard 4: 3 and wide-screen 16: 9 aspect ratios,” 1995.
[34] P. Hobson, B. C. Lovell, G. Percannella, A. Saggese, M. Vento, and
A. Wiliem, “Hep-2 staining pattern recognition at cell and specimen levels: datasets, algorithms and results,” Pattern Recognition
Letters, vol. 82, pp. 12–22, 2016.
[35] K. Sirinukunwattana, S. E. A. Raza, Y.-W. Tsang, D. R. Snead,
I. A. Cree, and N. M. Rajpoot, “Locality sensitive deep learning
for detection and classification of nuclei in routine colon cancer
histology images,” IEEE transactions on medical imaging, vol. 35,
no. 5, pp. 1196–1206, 2016.
[36] H. Chen, X. Qi, L. Yu, and P.-A. Heng, “Dcan: Deep contour-aware
networks for accurate gland segmentation,” in Proceedings of the
IEEE conference on Computer Vision and Pattern Recognition, 2016,
pp. 2487–2496.
[37] X. Li, Z. Liu, P. Luo, C. C. Loy, and X. Tang, “Not all pixels
are equal: Difficulty-aware semantic segmentation via deep layer
cascade,” 2017.
[38] B.-B. Gao, C. Xing, C.-W. Xie, J. Wu, and X. Geng, “Deep label
distribution learning with label ambiguity,” IEEE Transactions on
Image Processing, 2017.
[39] Z.-H. Zhou, M.-L. Zhang, S.-J. Huang, and Y.-F. Li, “Multi-instance
multi-label learning,” Artificial Intelligence, vol. 176, no. 1, pp. 2291–
2320, 2012.
[40] D. Kingma and J. Ba, “Adam: A method for stochastic optimization,” arXiv preprint arXiv:1412.6980, 2014.
12
[41] C. A. Schneider, W. S. Rasband, and K. W. Eliceiri, “Nih image to
imagej: 25 years of image analysis,” Nature methods, vol. 9, no. 7,
pp. 671–675, 2012.
[42] R. L. Wasserstein and N. A. Lazar, “The asa’s statement on pvalues: context, process, and purpose,” 2016.
[43] S. Kothari, J. H. Phan, and M. D. Wang, “Eliminating tissue-fold
artifacts in histopathological whole-slide images for improved
image-based prediction of cancer grade,” Journal of pathology informatics, vol. 4, 2013.
| 1cs.CV
|
1
Construction of Capacity-Achieving Lattice
Codes: Polar Lattices
arXiv:1411.0187v4 [cs.IT] 25 Dec 2017
Yanfei Yan, Ling Liu, Cong Ling, Member, IEEE and Xiaofu Wu, Member, IEEE
Abstract
In this paper, we propose a new class of lattices constructed from polar codes, namely polar lattices, to achieve the
capacity
1
2
log(1 + SNR) of the additive white Gaussian-noise (AWGN) channel for any signal-to-noise ratio (SNR).
Our construction follows the multilevel approach of Forney et al., where we construct a capacity-achieving polar code
on each level. The component polar codes are shown to be naturally nested, thereby fulfilling the requirement of the
multilevel lattice construction. We prove that polar lattices are AWGN-good, in the sense that the error probability (for
infinite lattice decoding) vanishes for any fixed volume-to-noise ratio (VNR) greater than 2πe. Furthermore, using
the technique of source polarization, we propose discrete Gaussian shaping over the polar lattice to satisfy the power
constraint. The proposed polar lattices permit low-complexity multistage successive cancellation decoding. Both the
construction and shaping are explicit, and the overall complexity of encoding and decoding is O(N log N ) for any
fixed target error probability.
Index Terms
AWGN-good lattices, discrete Gaussian shaping, lattice codes, multilevel construction, polar codes.
I. I NTRODUCTION
A fast-decodable, structured code achieving the capacity of the power-constrained additive white Gaussian-noise
(AWGN) channel is the dream goal of coding theory. Polar codes, proposed by Arıkan in [1], can provably achieve
the capacity of binary memoryless symmetric (BMS) channels. There are considerable efforts to extend polar codes
to general discrete memoryless channels, to nonbinary polar codes, and to asymmetric channels [2]–[7]. A largely
theoretical attempt to construct polar codes for the AWGN channel was given in [8], [9], based on nonbinary polar
codes or on the technique for the multi-access channel. However, it is still an open problem to construct practical
polar codes to achieve the capacity of the AWGN channel. In this paper, we propose polar lattices to fulfil this
goal, based on a combination of binary polar codes and lattice codes.
This work was presented in part at the IEEE Inform. Theory Workshop (ITW) 2012, Laussane, Switzerland, September, 2012, and in part
at the IEEE Int. Symp. Inform. Theory (ISIT), Istanbul, Turkey, July, 2013. The work of Yanfei Yan and Ling Liu is supported by the China
Scholarship Council. The work of Xiaofu Wu is supported by the National Science Foundation of China.
Yanfei Yan, Ling Liu and Cong Ling are with the Department of Electrical and Electronic Engineering, Imperial College London, London,
UK (e-mails: y.yan10, [email protected], [email protected]).
Xiaofu Wu is with the Nanjing University of Posts and Telecommunications, Nanjing 210003, China (e-mail: [email protected]).
December 27, 2017
DRAFT
2
Lattice codes are the counterpart of linear codes in the Euclidean space. The existence of lattice codes achieving
the Gaussian channel capacity has been established using the random coding argument [10], [11]. The rich structures
of lattice codes represent a significant advantage in multiterminal communications, such as information-theoretical
security [12], compute-and-forward [13], and distributed source coding [14] (see [15] for an overview). It is well
known that the design of a lattice code consists of two essentially separate problems: AWGN coding and shaping.
AWGN coding is addressed by the notion of AWGN-good lattices [10], [16]. Informally, AWGN-goodness means
that if the fundamental volume of the lattice is slightly greater than that of the “noise sphere”, the error probability
of infinite lattice decoding could be made arbitrarily small. Recently, several new lattice constructions with good
performance have been introduced [17]–[20]. On the other hand, shaping takes care of the finite power constraint
of the Gaussian channel. Capacity-achieving shaping techniques include Voronoi shaping [10] and lattice Gaussian
shaping [11], [21], [22]. Despite these significant progresses, an explicit construction of lattice codes achieving the
capacity of the Gaussian channel is still open (since this paper was submitted, we have become aware of the work
[23] which shows LDA lattices achieve capacity when the signal-to-noise ratio (SNR) > 1).
A. Contributions
In this paper, we settle this open problem by employing the powerful tool of polarization in lattice construction.
The novel technical contribution of this paper is two-fold:
•
The construction of polar lattices and the proof of their AWGN-goodness. We follow the multilevel construction
of Forney, Trott and Chung [24], where for each level we build a polar code to achieve its capacity. A salient
feature of the proposed method is that it naturally leads to a set of nested polar codes, as required by the
multilevel construction. This compares favorably with existing multilevel constructions [17], where extra efforts
are needed to nest the component codes.
•
The Gaussian shaping technique for polar lattices in the power-constrained AWGN channel. This is based
on source polarization. We are able to achieve the capacity
1
2
log(1 + SNR) with low-complexity multistage
successive cancellation (SC) decoding for any given SNR. It is worth mentioning that our proposed shaping
scheme is not only a practical implementation of lattice Gaussian shaping, but also an improvement in the
sense that we successfully remove the restriction SNR > e in [11, Theorem 3].
Both source and channel polarization are employed in the construction, resulting in an integrated approach in the
sense that error correction and shaping are performed by one single polar code on each level. Further, it is worth
pointing out that each aspect may also be of independent interest. AWGN-good lattices have many applications in
network information theory (e.g., the aforementioned compute-and-forward and Wyner-Ziv coding), while lattice
Gaussian shaping, i.e., generating a Gaussian distribution over a lattice, is useful in lattice-based cryptography as
well [25]. Both theoretical and practical aspects of polar lattices are addressed in this paper. We not only prove the
theoretical goodness of polar lattices, but also give practical rules for designing these lattices.
December 27, 2017
DRAFT
3
B. Relation to Prior Works
This paper is built on the basis of our prior attempt to build lattices from polar codes [26], [27], and significantly
extends it by employing Gaussian shaping. We are aware of the contemporary and independent work on polar-coded
modulation [28], which follows the multilevel coding approach of [29]. It is known that Forney et al.’s multilevel
construction is closely related to multilevel coding [24], [29]. The main conceptual difference between lattice coding
and coded modulation is that lattices are infinite and linear in the Euclidean space. The linear structure of lattices
is much desired in many emerging applications, e.g., in network information theory for the purpose of coordination
[13], [14].
This paper may be viewed as an explicit construction of the lattice Gaussian coding scheme proposed in [11],
where it was shown that Gaussian shaping over an AWGN-good lattice is capacity-achieving. Our approach is
different from the standard Voronoi shaping which involves a quantization-good lattice [10]. The proposed Gaussian
shaping does not require such a quantization-good lattice any more.
The sparse superposition code [30], [31] also achieves the Gaussian channel capacity with polynomial complexity.
However, its decoding complexity is considerably higher than that of the polar lattice; moreover, it requires a
random dictionary shared by the encoder and decoder, which incurs substantial storage complexity. In comparison,
the construction of polar lattices is as explicit as that of polar codes themselves, and the complexity is quasilinear:
O(N log2 N ) for a sub-exponentially vanishing error probability and O(N log N ) for a fixed error probability,
respectively.
Following the multilevel approach, it is also possible to obtain a low-complexity capacity-achieving code by
modifying the work of [8], [9]. However, to the best of our knowledge, this has not been reported in literature; the
resultant code would not possess the many useful structures of a lattice code.
C. Organization and Notation
The rest of this paper is organized as follows. Section II presents the background of lattice codes. In Section
III, we construct polar latices based on Forney et al.’s approach and prove their AWGN-goodness. In Section IV,
we propose Gaussian shaping over the polar lattice to achieve the capacity. Section V gives design examples and
simulation results.
All random variables (RVs) will be denoted by capital letters. Let PX denote the probability distribution of a
RV X taking values x in a set X and let H(X) denote its entropy. For multilevel coding, we denote by Xℓ a RV
X at level ℓ. The i-th realization of Xℓ is denoted by xiℓ . We also use the notation xi:j
ℓ as a shorthand for a vector
(xiℓ , ..., xjℓ ), which is a realization of RVs Xℓi:j = (Xℓi , ..., Xℓj ). Similarly, xiℓ: will denote the realization of the i-th
i
RV from level ℓ to level , i.e., of Xℓ:
= (Xℓi , ..., Xi ). For a set I, I c denotes its complement, and |I| represents
its cardinality. For an integer N , [N ] denotes the set of all integers from 1 to N . Following the notation of [1],
we denote N independent uses of channel W by W N . By channel combining and splitting, we get the combined
(i)
channel WN and the i-th subchannel WN . 1(·) denotes an indicator function. Throughout this paper, we use the
binary logarithm, denoted by log, and information is measured in bits.
December 27, 2017
DRAFT
4
II. BACKGROUND
ON
L ATTICE C ODING
A. Definitions
A lattice is a discrete subgroup of Rn which can be described by
Λ = {λ = Bx : x ∈ Zn },
where we assume the generator matrix B has full rank.
For a vector x ∈ Rn , the nearest-neighbor quantizer associated with Λ is QΛ (x) = arg minλ∈Λ kλ − xk, where
ties are resolved arbitrarily. We define the modulo lattice operation by x mod Λ , x − QΛ (x). The Voronoi region
of Λ, defined by V(Λ) = {x : QΛ (x) = 0}, specifies the nearest-neighbor decoding region. The Voronoi cell is
one example of fundamental region of the lattice. A measurable set R(Λ) ⊂ Rn is a fundamental region of the
lattice Λ if ∪λ∈Λ (R(Λ) + λ) = Rn and if (R(Λ) + λ) ∩ (R(Λ) + λ′ ) = ∅ for any λ 6= λ′ in Λ. The volume
of a fundamental region is equal to that of the Voronoi region V(Λ), which is given by V (Λ) = |det(B)|. More
generally, the mod-R(Λ) operation is defined by x 7→ x̌ where x̌ is the unique element of R(Λ) such that x̌−x ∈ Λ.
Obviously, the usual mod-Λ operation corresponds to the case where R(Λ) = V(Λ).
The theta series of Λ (see, e.g., [32, p.70]) is defined as
ΘΛ (τ ) =
X
2
e−πτ kλk ,
τ > 0.
λ∈Λ
In this paper, we are mostly concerned with the block error probability Pe (Λ, σ 2 ) of lattice decoding. It is the
probability P{x ∈
/ V(Λ)} that an n-dimensional independent and identically distributed (i.i.d.) Gaussian noise vector
x with zero mean and variance σ 2 per dimension falls outside the Voronoi region V(Λ). For an n-dimensional lattice
Λ, define the VNR by
2
V (Λ) n
.
γΛ (σ) ,
σ2
Then we introduce the notion of lattices which are good for the AWGN channel without power constraint.
Definition 1 (AWGN-good lattices): A sequence of lattices Λ(n) of increasing dimension n is AWGN-good if,
for any fixed Pe (Λ(n) , σ 2 ) ∈ (0, 1),
lim γΛ(n) (σ) = 2πe.
n→∞
and if, for a fixed VNR greater than 2πe, Pe (Λ(n) , σ 2 ) goes to 0 as n → ∞.
It is worth mentioning here that we do not insist on exponentially vanishing error probabilities, unlike Poltyrev’s
original treatment of good lattices for coding over the AWGN channel [16]. This is because a sub-exponential or
polynomial decay of the error probability is often good enough.
B. Flatness Factor and Lattice Gaussian Distribution
For σ > 0 and c ∈ Rn , the Gaussian distribution of mean c and variance σ 2 is defined as
kx−ck2
1
e− 2σ2 ,
fσ,c (x) = √
( 2πσ)n
December 27, 2017
DRAFT
5
for all x ∈ Rn . For convenience, let fσ (x) = fσ,0 (x).
Given lattice Λ, we define the Λ-periodic function
fσ,Λ (x) =
for x ∈ Rn .
X − kx−λk2
1
e 2σ2 ,
fσ,λ (x) = √
n
(
2πσ)
λ∈Λ
λ∈Λ
X
Note that fσ,Λ (x) is a probability density if x is restricted to a fundamental region R(Λ). It is actually the
probability density function (PDF) of the Λ-aliased Gaussian noise, i.e., the Gaussian noise after the mod-R(Λ)
operation [24]. When σ is small, the effect of aliasing becomes insignificant and the Λ-aliased Gaussian density
fσ,Λ (x) approaches a Gaussian distribution. When σ is large, fσ,Λ (x) approaches a uniform distribution.
This phenomenon is characterized by the flatness factor, which is defined for a lattice Λ as [12]
ǫΛ (σ) , max |V (Λ)fσ,Λ (x) − 1| .
x∈R(Λ)
It can be interpreted as the maximum variation of fσ,Λ (x) from the uniform distribution over R(Λ). The flatness
factor can be calculated using the theta series [12]:
n
1
γΛ (σ) 2
ǫΛ (σ) =
ΘΛ
− 1.
2π
2πσ 2
We define the discrete Gaussian distribution over Λ centered at c ∈ Rn as the following discrete distribution
taking values in λ ∈ Λ:
DΛ,σ,c (λ) =
where fσ,c (Λ) ,
P
λ∈Λ
fσ,c (λ)
,
fσ,c (Λ)
∀λ ∈ Λ,
fσ,c (λ) = fσ,Λ (c). Again for convenience, we write DΛ,σ = DΛ,σ,0 . Fig. 1 illustrates the
discrete Gaussian distribution over Z2 . As can be seen, it resembles a continuous Gaussian distribution, but is only
defined over a lattice. In fact, discrete and continuous Gaussian distributions share similar properties, if the flatness
factor is small. The discrete Gaussian distribution can also be sampled from a shifted lattice Λ − c. Note the relation
DΛ−c,σ (λ − c) = DΛ,σ,c (λ), namely, they are a shifted version of each other.
The following duality relation holds: the Fourier transform of the Λ-aliased Gaussian distribution fσ,Λ (x) is a
discrete Gaussian distribution on the dual lattice Λ∗ [24]. In fact, this relation can be used to derive the flatness
factor [12].
If the flatness factor is negligible, the discrete Gaussian distribution over a lattice preserves the capacity of the
AWGN channel.
Theorem 1 (Mutual information of discrete Gaussian distribution [11]): Consider an AWGN channel Y = X +E
where the input constellation X has a discrete Gaussian distribution DΛ−c,σs for arbitrary c ∈ Rn , and where the
variance of the noise E is σ 2 . Let the average signal power be P so that SNR = P/σ 2 , and let σ̃ , √ σ2s σ
σs +σ2
Then, if ε = ǫΛ (σ̃) <
December 27, 2017
1
2
and
.
πεt
1−ǫt
≤ ε where
q
π
ǫΛ σs /
t ≥ 1/e
π−t ,
q
εt ,
π
(t−4 + 1)ǫ σ /
s
Λ
π−t , 0 < t < 1/e
DRAFT
6
0.015
DZ2,σ(λ)
0.01
0.005
0
10
5
10
5
0
0
−5
λ2
−5
−10
−10
λ1
Fig. 1. Discrete Gaussian distribution over Z2 .
the discrete Gaussian constellation results in mutual information
ID ≥
5ε
1
log (1 + SNR) −
2
n
(1)
per channel use.
The statement of Theorem 1 is non-asymptotical, i.e., it can hold even if n = 1. A lattice Λ or its coset Λ − c with
a discrete Gaussian distribution is referred to as a good constellation for the AWGN channel if ǫΛ (σ̃) is negligible
[11].
It is further proved in [11] that the channel capacity is achieved with Gaussian shaping over an AWGN-good
lattice and MMSE lattice decoding. To this aim, we use a codebook L − c, where L is an AWGN-good lattice
and c is a proper shift. The encoder maps the information bits to points in L − c, which obey the lattice Gaussian
distribution DL−c,σs . Since the lattice points are not equally probable a priori in the lattice Gaussian coding, we
apply maximum-a-posteriori (MAP) decoding. It is proved in [11] that MAP decoding is equivalent to MMSE
lattice decoding
x̂ = QL−c (αy)
where α =
σs2
σs2 +σ2
is asymptotically equal to the MMSE coefficient
(2)
P
P +σ2
and QL−c denotes the minimum
Euclidean-distance decoder for shifted lattice L − c.
C. Construction D
A sublattice Λ′ ⊂ Λ induces a partition (denoted by Λ/Λ′ ) of Λ into equivalence classes modulo Λ′ . The order
of the partition is denoted by |Λ/Λ′ |, which is equal to the number of cosets. If |Λ/Λ′ | = 2, we call this a binary
partition. Let Λ/Λ1 / · · · /Λr−1 /Λ′ for r ≥ 1 be an n-dimensional lattice partition chain. For each partition Λℓ−1 /Λℓ
(1 ≤ ℓ ≤ r with convention Λ0 = Λ and Λr = Λ′ ) a code Cℓ over Λℓ−1 /Λℓ selects a sequence of representatives
aℓ for the cosets of Λℓ . Consequently, if each partition is a binary partition, the codes Cℓ are binary codes.
December 27, 2017
DRAFT
7
Construction D1 requires a set of nested linear binary codes C1 ⊆ C2 · ·· ⊆ Cr [24]. Suppose Cℓ has block length
N and the number of information bits kℓ for 1 ≤ ℓ ≤ r. Choose a basis g1 , g2 , · · · , gN such that g1 , · · · gkℓ span
Cℓ . When n = 1, the lattice L admits the form [24]
)
( r
kℓ
X
X
i
r N
i
ℓ−1
uℓ gi + 2 Z | uℓ ∈ {0, 1}
L=
2
ℓ=1
(3)
i=1
where the addition is carried out in RN . The fundamental volume of a lattice obtained from this construction is
given by
V (L) = 2−N RC V (Λ′ )N ,
where RC =
Pr
ℓ=1
Rℓ =
1
N
Pr
ℓ=1 kℓ
denotes the sum rate of component codes. For convenience, we will often be
concerned with the one-dimensional lattice partition chain Z/2Z/ · · · /2r Z in this paper.
The following is an example of Construction D: Barnes-Wall lattices constructed from Reed-Muller codes [34]2 .
Reed-Muller codes RM(N, k, d) are a class of linear block codes over GF(2), where N is the length of the codeword,
k is the length of the information block and d is the minimum Hamming distance. Conventionally, Reed-Muller
codes are denoted by RM(r′ , m) (0 ≤ r′ ≤ m) with following relation between N , k and d:
m
m
′
+ ···+
, d = 2m−r .
N = 2m , k = 1 +
′
1
r
The m-th member of the family of Barnes-Wall lattices is a N = 2m dimensional complex lattice or 2N
dimensional real lattice. For example, the code formula of the 1024-dimensional Barnes-Wall lattice is:
BW1024 = RM(1, 10) + 2RM(3, 10) + · · · + 25 Z1024 .
III. C ONSTRUCTION
OF
(4)
P OLAR L ATTICES
As reviewed in the preceding section, achieving the channel capacity involves an AWGN-good lattice. Forney
et al. gave single and multilevel constructions of AWGN-good lattices in [24]. We now follow their multilevel
approach to construct polar lattices. Bear in mind that, in order to achieve the capacity of the AWGN channel with
the noise variance σ 2 , the concerned noise variance for the AWGN-good lattice is in fact σ̃ 2 (recall σ̃ , √ σ2s σ
σs +σ2
),
which is the variance of the equivalent noise after MMSE rescaling [11]. This methodology can also be justified
by the equivalence lemma in the next section (see Lemma 10).
A. Forney et al.’s Construction Revisited
A mod-Λ Gaussian channel is a Gaussian channel with an input in V(Λ) and with a mod-V(Λ) operator at the
receiver front end [24]. The capacity of the mod-Λ channel for noise variance σ 2 is
C(Λ, σ 2 ) = log V (Λ) − h(Λ, σ 2 ),
1 The
(5)
case of multi-dimensional lattice partition is also known as “Construction E”, for which the lattice L is of the dimension nL = nN .
In this paper, we refer to both one and multi-dimensional cases generally as Construction D. See also [32, Chap. 5] [33].
2 We
give the example of Barnes-Wall lattices as a benchmark particularly because of the connection between Reed-Muller codes and polar
codes [1]. The advantage of polar codes over Reed-Muller codes will translate into the advantage of polar lattices over Barnes-Wall lattices.
December 27, 2017
DRAFT
8
where h(Λ, σ 2 ) is the differential entropy of the Λ-aliased noise over V(Λ):
Z
fσ,Λ (x) log fσ,Λ (x)dx.
h(Λ, σ 2 ) = −
V(Λ)
Given lattice partition Λ/Λ′ , the Λ/Λ′ channel is a mod-Λ′ channel whose input is restricted to discrete lattice
points in (Λ + a) ∩ R(Λ′ ) for some translate a. The capacity of the Λ/Λ′ channel is given by [24]
C(Λ/Λ′ , σ 2 ) = C(Λ′ , σ 2 ) − C(Λ, σ 2 )
(6)
= h(Λ, σ 2 ) − h(Λ′ , σ 2 ) + log V (Λ′ )/V (Λ).
Further, if Λ/Λ1 / · · · /Λr−1 /Λ′ is a lattice partition chain, then
C(Λ/Λ′ , σ 2 ) = C(Λ/Λ1 , σ 2 ) + · · · + C(Λr−1 /Λ′ , σ 2 ).
(7)
The key idea of [24] is to use a good component code Cℓ to achieve the capacity C(Λℓ−1 /Λℓ , σ 2 ) for each level
ℓ = 1, 2, . . . , r in Construction D. For such a construction, the total decoding error probability with multistage
decoding is bounded by
Pe (L, σ 2 ) ≤
r
X
Pe (Cℓ , σ 2 ) + Pe ((Λ′ )N , σ 2 ).
(8)
ℓ=1
To achieve a vanishing error probability, i.e., to make Pe (L, σ 2 ) → 0, we need to choose the lattice Λ′ such that
Pe ((Λ′ )N , σ 2 ) → 0 and the codes Cℓ for the Λℓ−1 /Λℓ channels whose error probabilities also tend to zero.
Since V (L) = 2−N RC V (Λ′ )N , the logarithmic VNR of L satisfies
2
V (L) nN
γL (σ)
= log
log
2πe
2πeσ 2
2
2
2− n RC V (Λ′ ) n
2πeσ 2
2
2
= − RC + log V (Λ′ ) − log 2πeσ 2 .
n
n
= log
Define
where h(σ 2 ) =
n
2
2
ǫ1 = C(Λ, σ )
ǫ2 = h(σ 2 ) − h(Λ′ , σ 2 )
ǫ = C(Λ/Λ′ , σ 2 ) − R = Pr C(Λ /Λ , σ 2 ) − R ,
3
C
ℓ−1
ℓ
ℓ
ℓ=1
(9)
(10)
log 2πeσ 2 is the differential entropy of the Gaussian noise. We note that, ǫ1 ≥ 0 represents the
capacity of the mod-Λ1 channel, ǫ2 ≥ 0 (due to the data processing theorem) is the difference between the entropy
of the Gaussian noise and that of the mod-Λr Gaussian noise, and ǫ3 ≥ 0 is the total capacity loss of component
codes.
Then we have
log
γL (σ)
2πe
Since ǫ2 ≥ 0, we obtain the upper bound3
log
3 It
=
2
(ǫ1 − ǫ2 + ǫ3 ).
n
≤
γL (σ)
2πe
2
(ǫ1 + ǫ3 ).
n
(11)
was shown in [24] that ǫ2 ≈ πPe (Λ′ , σ2 ), which is negligible compared to the other two terms.
December 27, 2017
DRAFT
9
Since log
γL (σ)
2πe
= 0 represents the Poltyrev capacity, the right hand side of (11) gives an upper bound on the gap
to the Poltyrev capacity. The bound is equal to
6.02
n (ǫ1
+ ǫ3 ) decibels (dB), by conversion of the binary logarithm
into the base-10 logarithm.
To approach the Poltyrev capacity, we would like to have log
γL (σ)
2πe
→ 0 while Pe (L, σ 2 ) → 0. Thus, from
(11), we need that both ǫ1 and ǫ3 are negligible. In Appendix A, we prove the following lemma.
Lemma 1: The capacity of the mod-Λ channel is bounded by
C(Λ, σ 2 ) ≤ log (1 + ǫΛ (σ)) ≤ log(e) · ǫΛ (σ).
(12)
Thus, we have the following design criteria:
•
•
•
The top lattice Λ has a negligible flatness factor ǫΛ (σ).
The bottom lattice Λ′ has a small error probability Pe (Λ′ , σ 2 ).
Each component code Cℓ is a capacity-approaching code for the Λℓ−1 /Λℓ channel.
These conditions are essentially the same as those of Forney et al. [24], except that we impose a slightly stronger
condition on the top lattice. In [24], the top lattice satisfies C(Λ, σ 2 ) ≈ 0. The reason why we require negligible
ǫΛ (σ) is to achieve the capacity of the power-constrained Gaussian channel. This will become clear in the next
section.
Asymptotically, the error probability of a polar code of length N decreases as e−O(
√
N)
[35] and we may desire
the same for the error probability of a polar lattice. In (8), we can let Pe ((Λ′ )N , σ 2 ) decrease exponentially. The
next lemma shows that the first two criteria can be satisfied by r growing with log N (see Appendix B for a proof).
Lemma 2: Consider a partition chain Λ/Λ1 / · · · /Λr−1 /Λ′ . A number of levels r = Θ(log N ) is sufficient to
achieve ǫΛ (σ) = e−Θ(N ) and Pe (Λ′ , σ 2 ) = e−Θ(N ) .
This lemma is mostly of theoretical interest. In practical designs, if the target error probability is fixed, e.g.,
Pe (L, σ 2 ) = 10−5 , a small number of levels will suffice.
B. Polar Lattices
It is shown in [24] that the Λℓ−1 /Λℓ channel is symmetric, and that the optimum input distribution is uniform.
Since we use a binary partition Λℓ−1 /Λℓ , the input Xℓ is binary for ℓ ∈ 1, 2, . . . , r. Associate Xℓ with representative
aℓ of the coset in the quotient group Λℓ−1 /Λℓ . The fact that the Λℓ−1 /Λℓ channel is a BMS channel allows a polar
code to achieve its capacity.
Let Y denote the output of the AWGN channel. Given x1:ℓ−1 , let Aℓ (x1:ℓ ) denote the coset chosen by xℓ , i.e.,
Aℓ (x1:ℓ ) = a1 + · · · + aℓ + Λℓ . Assuming a uniform input distribution for all Xℓ , the conditional PDF of this
Λℓ−1 /Λℓ channel with input xℓ and output ȳℓ = y mod Λℓ is given by [29, (5)]
PȲℓ |Xℓ ,X1:ℓ−1 (ȳℓ |xℓ , x1:ℓ−1 ) =
=
fσ,Λℓ (ȳℓ − a1 − · · · − aℓ )
X
kȳℓ − ak2
1
√
exp −
.
2σ 2
2πσ
(13)
a∈Aℓ (x1:ℓ )
In [24], this conditional PDF is written in a somewhat different from. Namely, the conditional PDF is fσ,Λℓ (ȳℓ −
a−aℓ) with an offset a. Nevertheless, the two forms are equivalent because we can let the offset a = a1 +· · ·+aℓ−1 .
December 27, 2017
DRAFT
10
The regularity (symmetry) and capacity separability [24, Th. 4 and Th. 5] of the Λ/Λ′ channel hold for any offset
on its input. In fact, the offset due to previous input bits x1:ℓ−1 would be removed by the multistage decoder at
level ℓ, which means that the code for level ℓ can be designed according to (13) with x1:ℓ−1 = 0. For this reason,
we will fix x1:ℓ−1 = 0 to prove channel degradation in the following lemma. The reason why we use the form (13)
is for consistency with the case of non-uniform input x1:ℓ−1 in Sect. IV, where one cannot always let x1:ℓ−1 = 0.
Definition 2: (Degradation [36]): Consider two channels W1 : X → Y1 and W2 : X → Y2 . W1 is said to be
(stochastically) degraded with respect to W2 if there exists a distribution Q : Y2 → Y1 such that
X
W1 (y1 |x) =
W2 (y2 |x)Q(y1 |y2 ).
y2 ∈Y2
The proof of the following lemma4 is given in Appendix C.
Lemma 3: Consider a self-similar binary lattice partition chain Λ/Λ1 / · · · /Λr−1 /Λ′ , in which we have Λℓ = T ℓ Λ
for all ℓ, with T = αV for some scale factor α > 1 and orthogonal matrix V . Then, the Λℓ−1 /Λℓ channel is degraded
with respect to the Λℓ /Λℓ+1 channel for 1 ≤ ℓ ≤ r − 1.
Now, we recall some basics of polar codes. Let W̃ (y|x) be a BMS channel with input alphabet X = {0, 1}
and output alphabet Y ⊆ R. Polar codes are block codes of length N = 2m with input bits u1:N . Let I(W̃ )
be the capacity of W̃ . Given the rate R < I(W̃ ), the information bits are indexed by a set of RN rows of the
generator matrix GN = [ 11 01 ]
⊗m
, where ⊗ denotes the Kronecker product. This gives an N -dimensional channel
W̃N (y 1:N |u1:N ). The channel seen by each bit [1] is given by
X
1
(i)
W̃N (y 1:N |u1:N ).
W̃N (y 1:N , u1:i−1 |ui ) =
N −1
2
i+1:N
N −i
∈X
u
Arıkan proved that as N grows,
(i)
W̃N
approaches either an error-free channel or a completely noisy channel. The
set of completely noisy (resp. error-free) subchannels is called the frozen set F (resp. information set I). One sets
ui = 0 for i ∈ F and only sends information bits within I.
The rule of SC decoding is defined as
0 i ∈ F or
i
û =
1 otherwise.
(i)
W̃N (y 1:N , û1:i−1 |0)
(i)
W̃N (y 1:N , û1:i−1 |1)
≥ 1 when i ∈ I,
Definition 3 (Bhattacharyya Parameter for Symmetric Channel [1]): Given a BMS channel W̃ with transition
probability PY |X , the Bhattacharyya parameter Z̃ ∈ [0, 1] is defined as
Pp
PY |X (y|0)PY |X (y|1).
Z̃(W̃ ) ,
y
(i)
Let PB denote the block error probability of a binary polar code. PB can be upper-bounded as PB ≤ Σi∈I Z̃(W̃N ).
It was shown in [35], [37] that for any β < 12 ,
β
1
(i)
{i : Z(W̃N ) < 2−N }
m→∞ N
β
1
(i)
{i : I(W̃N ) > 1 − 2−N }
lim
m→∞ N
lim
4 This
=
I(W̃ )
=
I(W̃ ).
version of the lemma is suggested by an anonymous reviewer.
December 27, 2017
DRAFT
11
This means that the fraction of good channels is about I(W̃ ) as m → ∞. Therefore, constructing polar codes is
equivalent to choosing the good indices. However, the complexity of the exact computation for a BMS channel with
a continuous output alphabet appears to be exponential in the block length. A quantization method was proposed in
[38] which transforms a BMS channel with a continuous output alphabet to that with a finite output alphabet. Also,
[39] proposed an approximation method to construct polar codes efficiently over any discrete-output BMS channel
(13). We combine these two methods together in order to construct polar codes for the Λℓ−1 /Λℓ channel (see [27]
for more details). It was shown in [38], [39] that with a sufficient number of quantization levels, the approximation
error is negligible while the computational complexity is still O(N logN ).
With component polar codes P(N, kℓ ) for all the Λℓ−1 /Λℓ channels (1 ≤ ℓ ≤ r), we stack them as in Construction
D to build the polar lattice. The following lemma shows that these component codes are nested, which is to guarantee
that the multilevel construction creates a lattice [24]. We consider two rules to determine the component codes, for
theoretical and practical purposes, respectively. One is the capacity rule [24], [29], where we select the channel
indices according to a threshold on the mutual information. The other is the equal-error-probability rule [29],
namely, the same error probability for each level, where we select the channel indices according to a threshold on
the Bhattacharyya parameter. The advantage of the equal-error-probability rule based on the Bhattacharyya parameter
is that it leads to an upper bound on the error probability. For this reason, we use the equal-error-probability rule
in the practical design. It is well known that these two rules will converge as the block length goes to infinity [1].
This nesting relation is a consequence of [37, Lemma 4.7].
Lemma 4: For either the capacity rule or the equal-error-probability rule, the component polar codes built in the
multilevel construction are nested, i.e., P(N, k1 ) ⊆ P(N, k2 ) ⊆ · · · ⊆ P(N, kr ).
Proof. Firstly, consider the equal-error-probability rule. By [37, Lemma 4.7], if a BMS channel Ṽ is a degraded
(i)
(i)
(i)
(i)
version of W̃ , then the subchannel ṼN is also degraded with respect to W̃N and Z̃(ṼN ) ≥ Z̃(W̃N ). Let the
β
threshold be 2−N for some β < 1/2. The codewords are generated by x1:N = uI GI , where GI is the submatrix
of G whose rows are indexed by information set I. The information sets for these two channels are respectively
given by
IW̃
(i)
I
Ṽ
(i)
β
={i : Z̃(W̃N ) < 2−N },
(i)
β
={i : Z̃(ṼN ) < 2−N }.
(i)
Due to the fact that Z̃(ṼN ) ≥ Z̃(W̃N ), we have IṼ ⊆ IW̃ . If we construct polar codes P(N, |IW̃ |) over W̃ and
P(N, |IṼ |) over Ṽ , GIṼ is a submatrix of GIW̃ . Therefore P(N, |IṼ |) ⊆ P(N, |IW̃ |).
From Lemma 3, the channel of the ℓ-th level is always degraded with respect to the channel of the (ℓ + 1)-th
level, and consequently, P(N, kℓ ) ⊆ P(N, kℓ+1 ).
Then, consider the capacity rule. The nesting relation still holds if we select the channel indices according to a
(i)
(i)
threshold on the mutual information. This is because, by [37, Lemma 4.7], I(ṼN ) ≤ I(W̃N ) if a BMS channel
Ṽ is a degraded version of W̃ .
December 27, 2017
DRAFT
12
C. AWGN Goodness
For a threshold 2−N
β
of the Bhattacharyya parameter, the block error probability of the polar code with SC
β
decoding is upper-bounded by N 2−N . It can be made arbitrarily small by increasing the block length N . Also,
the capacity loss ǫ3 diminishes as N → ∞. Therefore, we have the following theorem:
Theorem 2: Suppose ǫΛ (σ) is negligible. Construct polar lattice L from the n-dimensional binary lattice partition
chain Λ/Λ1 / · · · /Λr−1 /Λ′ and r nested polar codes with block length N , where r = O(log N ). Then, the error
probability of L under multistage decoding is bounded by
2
Pe (L, σ ) ≤ rN 2
−N β
+N
1−
Z
!
fσ2 (x)dx ,
V(Λ′ )
(14)
with the logarithmic VNR bounded by (11). As N → ∞, L can achieve the Poltyrev capacity, i.e., L is AWGN-good
L (σ)
→ 0 for any fixed Pe (L, σ 2 ).
in the sense that log γ2πe
Remark 1: It is worth pointing out that Theorem 2 only requires mild conditions. The condition ǫΛ (σ) → 0 is
easily satisfied by properly scaling the top lattice Λ. In practice, if the target error probability is fixed (e.g., 10−5 ),
r can be a small constant, namely, r does not have to scale as log N . Thus, the essential condition is N → ∞.
For finite N , however, the capacity loss ǫ3 is not negligible. We investigate the finite-length performance of polar
lattices in the following.
The finite-length analysis of polar codes was given in [40]–[42]. It was proved that polar codes need a polynomial
1
block length with respect to the gap to capacity ǫloss = I(W̃ ) − R = O(N − µ ) [40], [41], where µ is known as
the scaling exponent. The lower bound of the gap is ǫloss ≥ βN
1
−µ
, where β is a constant that depends only on
1
I(W̃ ) and µ = 3.55 [40]. The upper bound of the gap is ǫloss ≤ β̄N − µ̄ , where β̄ is a constant that depends only
on the block error probability PB and µ̄ = 7 was given in [40]. Later this scaling factor µ̄ has been improved to
5.77 [42].
Thus, the gap to the Poltyrev capacity of finite-dimensional polar lattices is
1
2
γL (σ)
≤
ǫ1 + rβ̄N − µ̄
log
2πe
n
with the corresponding block error probability
Pe (L, σ 2 ) ≤ rPB + Pe (Λ′N , σ 2 ),
where the constant β̄ depends only on PB (assuming equal error probabilities for the component polar codes).
Since n ≪ N is fixed, the gap to the Poltyrev capacity of polar lattices also scales polynomially in the dimension
nL = nN .
In comparison, the optimal bound for finite-dimensional lattices is given by [43]
r
1
1
γL (σ)
2 −1
=
.
Q (Pe (L, σ 2 )) −
log nL + O
log
2πe opt
nL
nL
nL
(15)
At finite dimensions, this is more precise than the exponential error bound for lattices constructed from random
linear codes given in [24]. Thus, given Pe (L, σ 2 ), the scaling exponent of optimum random lattices is 2 which
is smaller than that of polar lattices µ̄. The result is consistent with the fact that polar codes require larger block
length than random codes to achieve the same rate and error probability.
December 27, 2017
DRAFT
13
IV. P OLARIZATION -BASED G AUSSIAN S HAPING
To achieve the capacity of the power-constrained Gaussian channel, we can apply Gaussian shaping over the
polar lattice L. However, it appears difficult to do so directly. In this section, we will apply Gaussian shaping to the
top lattice Λ instead, which is more friendly for implementation. This is motivated by Theorem 1, which implies
that one may construct a capacity-achieving lattice code from a good constellation. More precisely, one may choose
a low-dimensional top lattice such as Z and Z2 whose mutual information has a negligible gap to the channel
capacity as bounded in Theorem 1, and then construct a multilevel code to achieve the capacity. We will show that
this strategy is equivalent to implementing Gaussian shaping over the AWGN-good polar lattice. For this purpose,
we will employ the recently introduced polar codes for asymmetric channels [6], [7].
A. Asymmetric Channels in Multilevel Lattice Coding
By Theorem 1, we choose a good constellation DΛ,σs such that the flatness factor ǫΛ (σ̃) is negligible. Let
the binary partition chain Λ/Λ1 / · · · /Λr−1 /Λ′ / · · · be labelled by bits X1 , · · · , Xr , · · · . Then, DΛ,σs induces a
distribution PX1:r whose limit corresponds to DΛ,σs as r → ∞. An example for DZ,σs for σs = 3 is shown in
Fig. 2. In this case, a shaping constellation with M = 32 points are actually sufficient, since the total probability
of these points is rather close to 1.
0.14
DZ,σ =3
s
0.12
N(0,σs=3)
Probability
0.1
0.08
0.06
0.04
0.02
0
−20
−10
0
Z
10
20
(a) DZ,σs for σs = 3
(b) Bit labelling
Fig. 2. Lattice Gaussian distribution DZ,σs and the associated labelling. A probability P (X1 , X2 , ..., Xi ) in (b) is given by that of the coset
P
indexed by bits X1 , X2 , ..., Xi ; for example, P (X1 = 1, X2 = 0) = λ∈4Z+1 Pr{λ}.
By the chain rule of mutual information
I(Y ; X1:r ) =
r
X
ℓ=1
December 27, 2017
I(Y ; Xℓ |X1:ℓ−1 ),
(16)
DRAFT
14
we obtain r binary-input channels Wℓ for 1 ≤ ℓ ≤ r. Given x1:ℓ−1 , denote again by Aℓ (x1:ℓ ) the coset of Λℓ
indexed by x1:ℓ−1 and xℓ . According to [29, (5)], the channel transition PDF of the ℓ-th channel Wℓ is given by
PY |Xℓ ,X1:ℓ−1 (y|xℓ , x1:ℓ−1 )
=
1
P {Aℓ (x1:ℓ )}
X
a∈Aℓ (x1:ℓ )
1
=
fσs (Aℓ (x1:ℓ ))
= exp −
P (a)PY |A (y|a)
X
a∈Aℓ (x1:ℓ )
kyk2
2(σs2 + σ 2 )
1
ky − ak2
kak2
exp −
−
2πσσs
2σ 2
2σs2
(17)
σs2 + σ 2
2σs2 σ 2
σs2
y−a
σs2 + σ 2
a∈Aℓ (x1:ℓ )
X
kαy − ak2
1
1
kyk2
exp
−
.
= exp −
2(σs2 + σ 2 ) fσs (Aℓ (x1:ℓ )) 2πσσs
2σ̃ 2
1
1
fσs (Aℓ (x1:ℓ )) 2πσσs
X
exp −
!
2
a∈Aℓ (x1:ℓ )
where we recall the MMSE coefficient α =
distribution PXℓ |X1:ℓ−1 , unless
σs2
σs2 +σ2
, and σ̃ = √ σ2s σ
. In general, Wℓ is asymmetric with the input
σs +σ2
fσs (Aℓ (x1:ℓ ))/fσs (Aℓ−1 (x1:ℓ−1 )) ≈ 12
which means that ǫΛℓ (σs ) is negligible.
For a finite power, the number of levels does not need to be large. The following lemma determines how large
r should be in order to achieve the channel capacity. The proof can be found in Appendix D.
Lemma 5: If r = O(log log N ), the mutual information of the bottom level I(Y ; Xr |X1:r−1 ) → 0 as N → ∞.
P
Moreover, using the first r levels only incurs a capacity loss ℓ>r I(Y ; Xℓ |X1:ℓ−1 ) ≤ O( N1 ).
Remark 2: The condition r = O(log log N ) is again theoretical. In practice, r can be a small constant so that
the different between I(Y ; X1:r ) and capacity is negligible, as we will see from the example in the next section.
B. Polar Codes for Asymmetric Channels
Since the component channels are asymmetric, we need polar codes for asymmetric channels to achieve their
capacity. Fortunately, polar codes for the binary memoryless asymmetric (BMA) channels have been introduced in
[6], [7] recently.
Definition 4 (Bhattacharyya Parameter for BMA Channel [6], [44]): Let W be a BMA channel with input
X ∈ X = {0, 1} and output Y ∈ Y, and let PX and PY |X denote the input distribution and channel transition
probability, respectively. The Bhattacharyya parameter Z for channel W is the defined as
q
X
Z(X|Y ) = 2
PY (y) PX|Y (0|y)PX|Y (1|y)
y
=
Xq
PX,Y (0, y)PX,Y (1, y).
2
y
Note that Definition 4 is the same as Definition 3 when PX is uniform.
The following lemma shows that adding an observable at the output of W will not increase Z.
Lemma 6 (Conditioning reduces Bhattacharyya parameter Z): Let (X, Y, Y ′ ) ∼ PX,Y,Y ′ , X ∈ X = {0, 1}, Y ∈
Y, Y ′ ∈ Y ′ , we have
Z(X|Y, Y ′ ) ≤ Z(X|Y ).
December 27, 2017
DRAFT
15
Proof.
Z(X|Y, Y ′ )
Xq
PX,Y,Y ′ (0, y, y ′ )PX,Y,Y ′ (1, y, y ′ )
=
2
=
q
XXq
2
PX,Y,Y ′ (0, y, y ′ ) PX,Y,Y ′ (1, y, y ′ )
y,y ′
y
(a)
y′
X sX
sX
′ (0, y, y ′ )
≤
2
=
Xq
PX,Y (0, y)PX,Y (0, y)
2
y
y′
PX,Y,Y
PX,Y,Y ′ (1, y, y ′ )
y′
y
where (a) follows from Cauchy-Schwartz inequality.
Let X 1:N and Y 1:N be the input and output vector after N independent uses of W . For simplicity, denote the
distribution of (X i , Y i ) by PXY = PX PY |X for i ∈ [N ]. The following property of the polarized random variables
U 1:N = X 1:N GN is well known.
Theorem 3 (Polarization of Random Variables [6]): For any β ∈ (0, 0.5),
o
1 n
i
1:i−1
−N β
lim
= H(X),
i
:
Z(U
|U
)
≥
1
−
2
N →∞ N
o
1 n
i
1:i−1
−N β
lim
i
:
Z(U
|U
)
≤
2
= 1 − H(X),
N →∞ N
o
β
1 n
i : Z(U i |U 1:i−1 , Y 1:N ) ≥ 1 − 2−N
lim
= H(X|Y ),
N →∞ N
o
β
1 n
lim
= 1 − H(X|Y ),
i : Z(U i |U 1:i−1 , Y 1:N ) ≤ 2−N
N →∞ N
(18)
and
o
β
β
1 n
= I(X; Y ),
i : Z(U i |U 1:i−1 , Y 1:N ) ≤ 2−N and Z(U i |U 1:i−1 ) ≥ 1 − 2−N
N →∞ N
o
β
β
1 n
lim
= 1 − I(X; Y ).
i : Z(U i |U 1:i−1 , Y 1:N ) ≥ 2−N or Z(U i |U 1:i−1 ) ≤ 1 − 2−N
N →∞ N
lim
(19)
The Bhattacharyya parameter for asymmetric models was originally defined for distributed source coding in [44].
By the duality between channel coding and source coding, it can be also used to construct capacity-achieving polar
codes for BMA channels [6]. Actually, Z(U i |U 1:i−1 ) is the Bhattacharyya parameter for a single source X (without
side information).
The Bhattacharyya parameter of a BMA channel can be related to that of a symmetrized channel. To this aim,
we use a symmetrization technique which creates a binary-input symmetrized channel W̃ from the BMA channel
W . The following lemma was implicit in [6]; here we make it explicit.
Lemma 7 (Symmetrization): Let W̃ be a binary-input channel with input X̃ ∈ X = {0, 1} and output Ỹ ∈ {Y, X },
built from the asymmetric channel W as shown in Fig. 3. Suppose the input of W̃ is uniformly distributed, i.e.,
PX̃ (x̃ = 0) = PX̃ (x̃ = 1) = 12 . Then it holds for the symmetrized channel W̃ that PỸ |X̃ (y, x⊕ x̃|x̃) = PY,X (y, x). 5
5 Note
that the definition of a symmetrized channel is slightly different from that of a conventional symmetric channel [1], since a condition
on the input distribution is imposed here.
December 27, 2017
DRAFT
16
ܺ
ܺ෨
ܻ
ܹ
ْ
෩
ܹ
ܺ ْ ܺ෨
Fig. 3. The relationship between the asymmetric channel W and the symmetrized channel W̃ .
Proof.
PỸ |X̃ (y, x ⊕ x̃|x̃)
=
(a)
=
(b)
=
(c)
=
P
PỸ ,X̃ (y, x ⊕ x̃, x̃)
=
P
PX̃ (x̃)
P
PX̃ (x̃)
x′ ∈X
′
x′ ∈X
PỸ ,X,X̃ (y, x ⊕ x̃, x′ , x̃)
PX̃ (x̃)
PY |X (y|x )PX⊕X̃,X,X̃ (x ⊕ x̃, x′ , x̃)
′
′
′
x′ ∈X PY |X (y|x )PX⊕X̃|X,X̃ (x ⊕ x̃|x , x̃)PX (x )PX̃ (x̃)
PX̃ (x̃)
PY,X (y, x).
The equalities (a)-(c) follow from (a) Y is only dependent on X, (b) X and X̃ are independent to each other and
(c) PX⊕X̃|X,X̃ (x ⊕ x̃|x′ , x̃) = 1(x′ = x).
The following theorem connects the Bhattacharyya Parameter of a BMA channel W and that of the symmetrized
channel W̃ . Denote by WN and W̃N the combining channels of N uses of W and W̃ , respectively.
Theorem 4 (Connection Between Bhattacharyya Parameters [6]): Let X̃ 1:N and Ỹ 1:N = X 1:N ⊕ X̃ 1:N , Y 1:N
be the uniform input and output vectors of W̃ , respectively, and let U 1:N =X 1:N GN and Ũ 1:N =X̃ 1:N GN . The
Bhattacharyya parameter of each subchannel of WN is equal to that of each subchannel of W̃N , i.e.,
Z(U i |U 1:i−1 , Y 1:N ) = Z̃(Ũ i |Ũ 1:i−1 , X 1:N ⊕ X̃ 1:N , Y 1:N ).
Now, we are in a position to construct polar codes for the BMA channel. Define the frozen set F̃ and information
set Ĩ of the symmetric polar codes as follows:
β
frozen set: F̃ = {i ∈ [N ] : Z(U i |U 1:i−1 , Y 1:N ) > 2−N }
information set: Ĩ = {i ∈ [N ] : Z(U i |U 1:i−1 , Y 1:N ) ≤ 2−N β }.
(20)
By Theorem 4, the Bhattacharyya parameters of the symmetrized channel W̃ and the asymmetric channel W are
the same. However, the channel capacity of W̃ is I(X̃; X ⊕ X̃) + I(X̃; Y |X ⊕ X̃) = 1 − H(X) + I(X; Y ), which
is 1 − H(X) more than the capacity of W . To obtain the real capacity I(X; Y ) of W , the input distribution of
W needs to be adjusted to PX . By polar lossless source coding, the indices with very small Z(U i |U 1:i−1 ) should
be removed from the information set Ĩ of the symmetrized channel, and the proportion of this part is 1 − H(X)
as N → ∞. We name the remaining set as the information set I of the asymmetric channel W . Further, there are
some bits which are uniformly distributed and can be made independent from the information bits; we name this
set as the frozen set F . In order to generate the desired input distribution PX , the remaining bits are determined
December 27, 2017
DRAFT
17
Fig. 4. Polarization for symmetric and asymmetric channels.
from the bits in F ∪ I; we call it the shaping set S. This process is depicted in Fig. 4. We formally define the
three sets as follows:
β
frozen set: F = {i ∈ [N ] : Z(U i |U 1:i−1 , Y 1:N ) ≥ 1 − 2−N }
β
β
information set: I = {i ∈ [N ] : Z(U i |U 1:i−1 , Y 1:N ) ≤ 2−N and Z(U i |U 1:i−1 ) ≥ 1 − 2−N }
shaping set: S = (F ∪ I)c .
(21)
To find these sets, one can use Theorem 4 to calculate Z(U i |U 1:i−1 , Y 1:N ) with the known technique for
symmetric polar codes [38], [45]. We note that Z(U i |U 1:i−1 ) can be computed in a similar way: one constructs a
symmetrized channel between X̃ and X ⊕ X̃, which is actually a binary symmetric channel with cross probability
PX (x = 1). The above construction is equivalent to implementing shaping over the polar code for the symmetrized
channel W̃ .
Besides the construction, the decoding can also be converted to that of the symmetric polar code. If X 1:N ⊕
X̃ 1:N = 0, we have U 1:N = Ũ 1:N , which means the decoding result of U 1:N equals to that of Ũ 1:N . Thus, decoding
of the polar code for W can be treated as decoding of the polar code for W̃ given that X ⊕ X̃ = 0. Clearly, the SC
decoding complexity for asymmetric channel is also O(N log N ). We summarize this observation as the following
lemma.
Lemma 8 (Decoding for Asymmetric Channel [6]): Let y 1:N be a realization of Y 1:N and û1:i−1 be the previous
i − 1 estimates of u1:N . The likelihood ratio of ui is given by
(i)
(i)
PU i |U 1:i−1 ,Y 1:N (0|û1:i−1 , y 1:N )
W̃N ((y 1:N , 01:N ), û1:i−1 |0)
,
=
(i)
PU i |U 1:i−1 ,Y 1:N (1|û1:i−1 , y 1:N )
W̃N ((y 1:N , 01:N ), û1:i−1 |1)
(22)
where W̃N denotes the transition probability of the i-th subchannel of W̃N .
In [6], the bits in F ∪ S are all chosen according to PU i |U 1:i−1 (ui |u1:i−1 ), which can also be calculated using
(22) (treating Y as an independent variable and remove it). However, in order to be compatible with polar lattices,
we modify the scheme such that the bits in F are uniformly distributed over {0, 1} while the bits in S are still
December 27, 2017
DRAFT
18
chosen according to PU i |U 1:i−1 (ui |u1:i−1 ). The expectation of the decoding error probability still vanishes with
N . The following theorem is an extension of the result in [6, Theorem 3]. We give the proof in Appendix E for
completeness.
Theorem 5: Consider a polar code with the following encoding and decoding strategies for a BMA channel.
•
Encoding: Before sending the codeword x1:N = u1:N GN , the index set [N ] are divided into three parts:
the frozen set F , the information set I and the shaping set S which are defined in (21). The encoder places
uniformly distributed information bits in I, and fills F with a uniform random {0, 1} sequence which is shared
between the encoder and the decoder. The bits in S are generated by a mapping φS , {φi }i∈S in the family
•
of randomized mappings ΦS , which yields the following distribution:
0 with probability PU i |U 1:i−1 (0|u1:i−1 ),
i
u =
1 with probability PU i |U 1:i−1 (1|u1:i−1 ).
Decoding: The decoder receives y 1:N and estimates û1:N of u1:N according to the rule
ui ,
if i ∈ F
.
ûi = φi (û1:i−1 ),
if i ∈ S
argmax PU i |U 1:i−1 ,Y 1:N (u|û1:i−1 , y 1:N ), if i ∈ I.
u
With the above encoding and decoding, the message rate can be arbitrarily close to I(Y ; X) and the expectation of
the decoding error probability over the randomized mappings satisfies EΦS [Pe (φS )] ≤ N 2−N
β′
for β ′ < β < 0.5.
β′
Consequently, there exists a deterministic mapping φS such that Pe (φS ) ≤ N 2−N .
In practice, to share the mapping φS between the encoder and the decoder, we can let them have access to the
same source of randomness, e.g., using the same seed for the pseudorandom number generators.
C. Multilevel Polar Codes
Next, our task is to construct polar codes to achieve the mutual information I(Y ; Xℓ |X1:ℓ−1 ) for all levels.
The construction of the preceding subsection is readily applicable to the construction for the first level W1 . To
demonstrate the construction for other levels, we take the channel of the second level W2 as an example. This is
also a BMA channel with input X2 ∈ X = {0, 1}, output Y ∈ Y and side information X1 . Its channel transition
probability is shown in (17). To construct a polar code for the second level, we propose the following two-step
procedure.
Step 1: Construct a polar code for the BMS channel with input vector X̃21:N = [X̃21 , X̃22 , ···, X̃2N ] and output vector
Ỹ 1:N = X21:N ⊕ X̃21:N , Y 1:N , X11:N where X̃2i ∈ X = {0, 1} is uniformly distributed. At this step X1 is
P
regarded as the output. Then the distribution of X2 becomes the marginal distribution x1 ,x3:r PX1:r (x1:r ).
Consider polarized random variables U21:N = X21:N GN and Ũ21:N = X̃21:N GN . According to Theorem 3,
December 27, 2017
DRAFT
19
Fig. 5. The first step of polarization in the construction for the second level.
the polarization gives us the three sets F2 , I2′ and S2′ as shown in Fig. 5. Similarly, we can prove that
|I2′ |
N
→ I(Y, X1 ; X2 ) and
|F2 ∪S2′ |
N
→ 1 − I(Y, X1; X2 ) as N → ∞. These three sets are defined as follows:
β
frozen set: F2 = {i ∈ [N ] : Z(U2i |U21:i−1 , Y 1:N , X11:N ) ≥ 1 − 2−N }
β
β
information set: I2′ = {i ∈ [N ] : Z(U2i |U21:i−1 , Y 1:N , X11:N ) ≤ 2−N and Z(U2i |U21:i−1 ) ≥ 1 − 2−N } (23)
c
shaping set: S2′ = (F2 ∪ I2′ ) .
Step 2: Treat X11:N as the side information for the encoder. Given X11:N , the choices of X21:N are further restricted
since X1 and X2 are generally correlated, i.e., PX1 ,X2 (x1 , x2 ) = fσs (A(x1 , x2 ))/fσs (Λ) (cf. Fig. 2). By
removing from I2′ the bits which are almost deterministic given U21:i−1 and X11:N , we obtain the information
set I2 for W2 . Then the distribution of the input X2 becomes the conditional distribution PX2 |X1 (x2 |x1 ).
The process is shown in Fig. 6. More precisely, the indices are divided into three portions as follows:
1
=
1 − I(X̃2 ; X̃2 ⊕ X2 , X1 , Y ) +I(X̃2 ; X̃2 ⊕ X2 , X1 , Y )
{z
}
|
F2
Step1
=
1 − I(X̃2 ; X̃2 ⊕ X2 , X1 , Y ) + I(X̃2 ; X̃2 ⊕ X2 ) + I(X̃2 ; X1 , Y |X̃2 ⊕ X2 )
|
{z
} |
{z
} |
{z
}
S2′
F2
Step2
=
1 − I(X̃2 ; X̃2 ⊕ X2 , X1 , Y ) + I(X̃2 ; X̃2 ⊕ X2 ) + I(X̃2 ; X1 |X̃2 ⊕ X2 ) + I(X̃2 ; Y |X1 , X̃2 ⊕ X2 )
|
{z
} |
{z
} |
{z
} |
{z
}
S2′
F2
=
SX1
I2
1 − I(X̃2 ; X̃2 ⊕ X2 , X1 , Y ) + 1 − H(X2 ) + I(X2 ; X1 ) + I(X2 ; Y |X1 )
{z
} | {z } | {z } |
{z
}
|
S2′
F2
=
I2′
SX1
I2
1 − I(X̃2 ; X̃2 ⊕ X2 , X1 , Y ) + 1 − H(X2 |X1 ) + I(X2 ; Y |X1 )
|
{z
} |
{z
} |
{z
}
F2
S2
I2
We give the formal statement of this procedure in the following lemma.
Lemma 9: After the first step of polarization, we obtain the three sets F2 , I2′ and S2′ in (23). Let SX1 denote the
β
set of indices whose Bhattacharyya parameters satisfy Z(U2i |U21:i−1 , Y 1:N , X11:N ) ≤ 2−N , Z(U2i |U21:i−1 , X11:N ) ≤
β
β
1 − 2−N and Z(U2i |U21:i−1 ) ≥ 1 − 2−N . The proportion of SX1 is asymptotically given by limN →∞
December 27, 2017
|SX1 |
N
=
DRAFT
20
Fig. 6. The second step of polarization in the construction for the second level.
I(X2 ; X1 ). Then by removing SX1 from I2′ , we obtain the true information set I2 for W2 . Formally, the three sets
are obtained as follows:
β
1:i−1
i
, Y 1:N , X11:N ) ≥ 1 − 2−N }
frozen set: F2 = {i ∈ [N ] : Z(U2 |U2
β
β
information set: I2 = {i ∈ [N ] : Z(U2i |U21:i−1 , Y 1:N , X11:N ) ≤ 2−N and Z(U2i |U21:i−1 , X11:N ) ≥ 1 − 2−N }
c
shaping set: S2 = (F2 ∪ I2 ) .
(24)
Proof. Firstly, we show the proportion of set SX1 goes to I(X1 ; X2 ) as N → ∞. Here we define a slightly
β
β
′
different set SX
= {i ∈ [N ] : Z(U2i |U21:i−1 , X11:N ) ≤ 2−N and Z(U2i |U21:i−1 ) ≥ 1 − 2−N }. Suppose we are
1
constructing an asymmetric polar code for the channel from X1 to X2 ; it is not difficult to find that limN →∞
I(X2 ; X1 ) by Theorem 5. Furthermore, by Lemma 6, if
β
Z(U2i |U21:i−1 , X11:N )
≤2
−N β
′
|
|SX
1
N
=
, we can immediately have
′
Z(U2i |U21:i−1 , X11:N , Y 1:N ) ≤ 2−N . Therefore, the difference between the definitions of SX1 and SX
only lies
1
β
β
on Z(U2i |U21:i−1 , X11:N ). Denoting by P̄X1 the unpolarized set with 2−N ≤ Z(U2i |U21:i−1 , X11:N ) ≤ 1 − 2−N , we
have
′
|
|SX1 | |SX
|P̄X1 |
1
−
≤ lim
= 0.
N →∞ N
N →∞ N
N
lim
As a result, limN →∞
|SX1 |
N
= limN →∞
′
|
|SX
1
N
Secondly, we show that SX1 ∪ I2 =
β
I2′ .
(25)
= I(X2 ; X1 ).
β
Again, by Lemma 6, if Z(U2i |U21:i−1 , X11:N ) ≥ 1 − 2−N , we get
Z(U2i |U21:i−1 ) ≥ 1−2−N and the difference between the definitions of SX1 and I2′ only lies on Z(U2i |U21:i−1 , X11:N ).
Observe that the union SX1 ∪ I2 would remove the condition on Z(U2i |U21:i−1 , X11:N ), and accordingly we have
SX1 ∪ I2 = I2′ . It can be also found that the proportion of I2 goes to I(X2 ; Y |X1 ) as N → ∞.
We summarize our main results in the following theorem:
December 27, 2017
DRAFT
21
Theorem 6 (Coding Theorem for Multilevel Polar Codes): Consider a polar code with the following encoding and
decoding strategies for the channel of the second level W2 with the channel transition probability PY |X2 ,X1 (y|x2 , x1 )
shown in (17).
•
Encoding: Before sending the codeword x1:N
= u1:N
2
2 GN , the index set [N ] are divided into three parts:
the frozen set F2 , information set I2 , and shaping set S2 . The encoder first places uniformly distributed
information bits in I2 . Then the frozen set F2 is filled with a uniform random sequence which are shared
between the encoder and the decoder. The bits in S2 are generated by a mapping φS2 , {φi }i∈S2 form a
family of randomized mappings ΦS2 , which yields the following distribution:
0 with probability P i 1:i−1 1:N (0|u1:i−1 , x1:N ),
1
2
U2 |U2
,X1
ui2 =
1 with probability P i 1:i−1 1:N (1|u1:i−1 , x1:N ).
1
2
U |U
,X
2
•
Decoding: The decoder receives y
to the rule
1:N
and estimates
2
û21:N
(26)
1
based on the previously recovered x1:N
according
1
ui2 ,
if i ∈ F2
ûi2 = φi (û1:i−1
),
if i ∈ S2
2
1:N
argmax PU i |U 1:i−1 ,X 1:N ,Y 1:N (u|û1:i−1
, x1:N
), if i ∈ I2
1 ,y
2
u
2
2
.
1
1:N
Note that probability PU i |U 1:i−1 ,X 1:N ,Y 1:N (u|û1:i−1
) can be calculated by (22) efficiently, treating Y
, x1:N
1 ,y
2
2
2
1
and X1 (already decoded by the SC decoder at level 1) as the outputs of the asymmetric channel. With the
above encoding and decoding, the message rate can be arbitrarily close to I(Y ; X2 |X1 ) and the expectation of the
decoding error probability over the randomized mappings satisfies EΦS2 [Pe (φS2 )] ≤ N 2−N
β′
for any β ′ < β < 0.5.
β′
Consequently, there exists a deterministic mapping φS2 such that Pe (φS2 ) ≤ N 2−N .
The proof of this theorem is given in Appendix F.
Obviously, Theorem 6 can be generalized to the construction of a polar code for the channel of the ℓ-th level
1:N
. As a result, we can construct
Wℓ . The only difference is that the side information changes from X11:N to X1:ℓ−1
a polar code which achieves a rate arbitrarily close to I(Y ; Xℓ |X1:ℓ ) with vanishing error probability. We omit the
proof for the sake of brevity.
D. Achieving Channel Capacity
So far, we have constructed polar codes to achieve the capacity of the induced asymmetric channels for all levels.
Since the sum capacity of the component channels nearly equals the mutual information I(Y ; X), and since we
choose a good constellation such that I(Y ; X) ≈
1
2
log(1 + SNR), we have constructed a lattice code to achieve
the capacity of the Gaussian channel. We summarize the construction in the following theorem:
Theorem 7: Choose a good constellation with negligible flatness factor ǫΛ (σ̃) and negligible ǫt as in Theorem
1, and construct a multilevel polar code with r = O(log log N ) as above. Then, for any SNR, the message rate
approaches
1
2
log(1 + SNR), while the error probability under multistage decoding is bounded by
β′
Pe ≤ rN 2−N ,
December 27, 2017
0 < β ′ < 0.5
(27)
DRAFT
22
as N → ∞.
Remark 3: It is simple to generate a transmitted codeword of the proposed scheme. For n = 1, let
#
"
r
X
X
X
X
ℓ−1
i
i
i
χ=
2
u ℓ gi +
u ℓ gi +
u ℓ gi .
ℓ=1
i∈Iℓ
i∈Sℓ
(28)
i∈Fℓ
The transmitted codeword x is drawn from D2r ZN +χ , σs . From the proof of Lemma 5, we know that the probability
of choosing a point outside of the interval [−2r−1 , 2r−1 ] is negligible if r is sufficiently large, which implies there
exists only one point in this interval with probability close to 1. Therefore, one may simply transmit x = χ mod 2r ,
where the modulo operation is applied component-wise with range (−2r−1 , 2r−1 ].
Next, we show that such a multilevel polar coding scheme is equivalent to Gaussian shaping over a coset
L + c′ of a polar lattice L for some translate c′ . In fact, the polar lattice L is exactly constructed from the
corresponding symmetrized channels W̃ℓ . Recall that the ℓ-th channel Wℓ is a BMA channel with the input
distribution P (Xℓ |X1:ℓ−1 ) (1 ≤ ℓ ≤ r). It is clear that PX1:ℓ (x1:ℓ ) = fσs (Aℓ (x1:ℓ ))/fσs (Λ). By Lemma 7 and
(17), the transition probability of the symmetrized channel W̃ℓ is
PW̃ℓ ((y, x1:ℓ−1 , xℓ ⊕ x̃ℓ )|x̃ℓ ) = PY,X1:ℓ (y, x1:ℓ )
= PX1:ℓ (x1:ℓ )PY |Xℓ ,X1:ℓ−1 (y|xℓ , x1:ℓ−1 )
X
1
1
kyk2
= exp −
2
2
2(σs + σ ) fσs (Λ) 2πσσs
a∈Aℓ (x1:ℓ )
(29)
kαy − ak2
exp −
.
2σ̃ 2
Note that the difference between the asymmetric channel (17) and symmetrized channel (29) is the a priori
probability PX1:ℓ (x1:ℓ ) = fσs (Aℓ (x1:ℓ ))/fσs (Λ). Comparing with the Λℓ−1 /Λℓ channel (13), we see that the
symmetrized channel (29) is equivalent to a Λℓ−1 /Λℓ channel, since the common terms in front of the sum will
be completely cancelled out in the calculation of the likelihood ratio6 . We summarize the foregoing analysis in the
following lemma:
Lemma 10 (Equivalence lemma): Consider a multilevel lattice code constructed from constellation DΛ,σs for a
Gaussian channel with noise variance σ 2 . The ℓ-th symmetrized channel W̃ℓ (1 ≤ ℓ ≤ r) which is derived from
the asymmetric channel Wℓ is equivalent to the MMSE-scaled Λℓ−1 /Λℓ channel with noise variance σ̃ 2 .
Thus, the resultant polar codes for the symmetrized channels are nested, and the polar lattice is AWGN-good
for noise variance σ̃ 2 ; also, the multistage decoding is performed on the MMSE-scaled signal αy (cf. Lemma 8).
Since the frozen sets of the polar codes are filled with random bits (rather than all zeros), we actually obtain a
coset L + c′ of the polar lattice, where the shift c′ accounts for the effects of all random frozen bits. Finally, since
we start from DΛ,σs , we would obtain DΛN ,σs without coding; since L + c′ ⊂ ΛN by construction, we obtain a
discrete Gaussian distribution DL+c′ ,σs over L + c′ .
Remark 4: This analysis shows that our proposed scheme is an explicit construction of lattice Gaussian coding
introduced in [11], which applies Gaussian shaping to an AWGN-good lattice (or its coset). Note that the condition
6 Even
if y ∈ Rn in (29), the sum over Aℓ (x1:ℓ ) is Λℓ -periodic. Hence, the likelihood ratio will be the same if one takes ȳ = y mod Λℓ
and uses (13).
December 27, 2017
DRAFT
23
Fig. 7. Channel capacity for partition chain Z/2Z/ · · · /2r Z. The curve for the ℓ-th partition channel is a translate of the curve for the (ℓ − 1)-th
by 6 dB. The discrete BMS approximation is based on the method of [38], [39] with 64 quantization levels.
of negligible ǫΛ (σ̃) in Theorem 7 is the same as the condition on Λ imposed in the construction of polar lattice
in Section III (cf. Theorem 2). Again, it is always possible to scale down the top lattice Λ such that both ǫΛ (σ̃)
and ǫt become negligible in Theorem 1. Thus, Theorem 7 holds for any SNR, meaning that we have removed the
condition SNR > e required by [11, Theorem 3]7 . Moreover, if a good constellation of the form DΛ−c,σs for some
shift c is used in practice (e.g., a constellation taking values in {±1, ±3, . . .}), the proposed construction holds
verbatim.
Remark 5: By [11, Lemma 1], the power P of a discrete Gaussian distribution DL+c′ ,σs is never greater than
σs2 .
Remark 6: A shaping method was proposed in [11, Section IV], where Gaussian shaping is only performed on
the bottom lattice. However, it requires negligible ǫΛ′ (σs ), which does not hold in general.
V. D ESIGN E XAMPLES
In this section, we give design examples of polar lattices based on the one partition chain, with and without the
power constraint. The design follows the equal-error-probability rule. Multistage SC decoding is applied. Since the
complexity of SC decoding is O(N log N ), the overall decoding complexity is O(rN log N ).
A. Design Examples Without Power Constraint
Consider the one-dimensional lattice partition Z/2Z/ · · · /2r Z. To construct a multilevel lattice, one needs to
determine the number of levels of lattice partitions and the actual rates according to the the target error probability
7 The
reason of the condition SNR > e in [11] is that a more stringent condition is imposed on the flatness factor of L, namely, ǫL
√
2
σs
2 +σ 2
σs
is negligible.
December 27, 2017
DRAFT
24
Fig. 8. A polar lattice with two levels, where σ1 = σ.
for a given noise variance. By the guidelines given in Section II-C, the effective levels are those which can achieve
the target error probability with an actual rate not too close to either 0 or 1. Therefore, one can determine the
number of effective levels with the help of capacity curves in Fig. 7. For example, at the given noise variance
indicated by the straight line in Fig. 7, one may choose partition Z/2Z/4Z, i.e., two levels of component codes,
which was indeed suggested in [24].
The multilevel construction and the multistage decoding are shown in Fig. 8. For the ℓ-th level, g1 , g2 , · · · , gkℓ
are a set of code generators chosen from the matrix GN , and σℓ is the standard deviation of the noise.
Now, we give an example for length N = 1024 and target error probability Pe (L, σ 2 ) = 10−5 . Since the bottom
level is a ZN lattice decoder, σ3 ≈ 0.0845 for target error probability
1
3
· 10−5 . For the middle level, σ2 = 2 · σ3 =
0.1690. From Fig. 7, the channel capacity of the middle level is C(Z/2Z, σ22 ) = C(2Z/4Z, σ12 ) = 0.9874. For
the top level, σ = σ1 = 0.3380 and the capacity is 0.5145. Our goal is to find two polar codes approaching the
respective capacities at block error probabilities ≤
1
3
· 10−5 over these binary-input mod-2 channels.
For N = 1024, we found the first polar code with
code with
k2
N
= 0.9 for Pe (C2 , σ22 ) ≈
1
3
k1
N
= 0.23 for Pe (C1 , σ12 ) ≈
1
3
· 10−5 , and the second polar
· 10−5 . Thus, the sum rate of component polar codes RC = 0.23 + 0.9,
implying a capacity loss ǫ3 = 0.3719. Meanwhile, the factor ǫ1 = C(Z, 0.33802 ) = 0.0160. Therefore, the rate
losses at each level are 0.016, 0.285, and 0.087. From (11), the logarithmic VNR is given by
γL (σ)
log
≤ 2 (ǫ1 + ǫ3 ) = 0.7758,
2πe
(30)
which is 2.34 dB. Fig. 9 shows the simulation results for this example. It is seen that the estimate 2.34 dB is very
close to the actual gap at Pe (L, σ12 ) ≈ 10−5 . This simulation indicates that the performance of the component codes
is very important to the multilevel lattice. The gap to the Poltyrev capacity is largely due to the capacity losses of
component codes. Recall that the channel in the first level is degraded with respect to the one at the second level
according to Lemma 3, and the two polar codes in this construction turn out to be nested.
P
(i)
Thanks to density evolution [45], the upper bound i∈A (Z̃(W̃N )) on the block error probability of a polar
December 27, 2017
DRAFT
25
Fig. 9. Block error probabilities of polar lattices of length N = 1024 with multistage decoding. A comparison between polar lattices and
Barnes-Wall (BW) lattices is also presented. The BW lattices are constructed from Reed-Muller codes at each partition level. By changing the
Barnes-Wall rule (base on the Hamming weight) to the capacity rule after channel polarization, it can be seen that the performance of polar
lattices is significantly improved.
0
10
LDPC Lattice−1000
Polar Lattice−1024
LDLC−1000
LDA−1000
Finite−length Bound
−1
10
−2
SER
10
−3
10
−4
10
−5
10
−6
10
0
0.5
1
1.5
VNR/(2πe) (dB)
2
2.5
Fig. 10. SER of lattices with dimension around 1000.
code with finite length can be calculated numerically. According to (27), we plot the upper bound on the block
error probability Pe (L, σ 2 ) of the polar lattice in Fig. 9, which is quite tight.
The performance comparison of competing lattices approaching the Poltyrev capacity with dimension around
1000 is shown in Fig. 10 in terms of the symbol error rate (SER)8 . The simulation curves of other lattices are
8 SER
is defined as the average error probability of the coordinates of the lattice codeword λ, which is commonly used in literature. The
curve for the LDPC lattice was plotted with the normalized block error probability [17].
December 27, 2017
DRAFT
26
obtained from their corresponding papers. We note that the theoretical minimum gap to the Poltyrev capacity is
about 1 dB for dimension 1000 [43]. Among the four types of lattices compared, the LDPC lattice [17] has the
weakest performance, while all other three have similar performance at this dimension (the difference is within 0.5
dB). In contrast to the polar lattice and LDA lattice [18], [19], analytic results of the LDLC [20] are not available;
therefore, they are less understood in theory. The LDA lattice has slightly better performance than the polar lattice at
the expense of higher decoding complexity (O(p2 N log N )) if p-ary LDPC codes are employed. Assuming p ≈ 2r ,
it would rquire complexity O(22r N log N ).
B. Design Examples With Power Constraint
To satisfy the power constraint, we use discrete lattice distribution DZ,σs for shaping. The mutual information
I(Y ; Xℓ |X1:ℓ−1 ) at each level for different SNRs is shown in Fig. 11. We can see that for partition Z/2Z/..., five
levels are enough to achieve the AWGN channel capacity for SNR ranging from −5 dB to 20 dB. Note that this
is more than the number of levels required in the design of the AWGN-good lattice itself.
3.5
AWGN Capacity
3
I(Y;X1)
Mutual Information
I(Y;X2|X1)
2.5
2
I(Y;X3|X1:2)
I(Y;X |X
4
)
1:3
I(Y;X5|X1:4)
1.5
I(Y;X1:5)
1
0.5
0
−5
0
5
10
SNR (dB)
15
20
Fig. 11. Channel capacity for each level as a function of SNR.
December 27, 2017
DRAFT
27
Shaping set
Information set
Frozen set
Level Index
1
2
3
4
5
0
0.2
0.4
0.6
Set Proportion
0.8
1
Fig. 12. The proportions of the shaping set, information set, and frozen set on each level when N = 216 and SNR = 15 dB.
3.5
Lower bound of rate (Bit/dim)
AWGN Capacity
3
10
Bound for N=2
12
Bound for N=2
2.5
14
Bound for N=2
16
2
Bound for N=2
18
Bound for N=2
1.5
20
Bound for N=2
1
0.5
0
−5
0
5
10
15
20
SNR (dB)
Fig. 13. Lower bounds on the rates achieved by polar lattices with block error probability 5 × 10−5 for block lengths 210 , 212 , ..., 220 .
For each level, we estimate a lower bound on the code rate for block error probability PBℓ = 1 × 10−5 . The
is done by calculating an upper bound on the block error probability of the polar code, using the Bhattacharyya
parameter. With this target error probability, the assignments of bits to the information, shaping and frozen sets
on different levels are shown in Fig. 12 for SNR = 15 dB and N = 216 . In fact, X1 and X2 are nearly uniform
such that there is no need for shaping on the first two levels (these levels actually correspond to the AWGN-good
December 27, 2017
DRAFT
28
lattice). The third level is very good, and most bits are information bits. In contrast, the fifth level is mostly for
shaping; since its message rate is already small, adding another level clearly would not contribute to the overall
rate of the lattice code. Finally, lower bounds on the rates achieved by polar lattices with various block lengths are
shown in Fig. 13. We note that the gap to the channel capacity diminishes as N increases, and it is only about 0.1
bits/dimension when N = 220 .
VI. C ONCLUSIONS
In this paper, we have constructed polar lattices to approach the capacity of the power-constrained Gaussian
channel. The construction is based on a combination of channel polarization and source polarization. Without
shaping, the constructed polar lattices are AWGN-good. The Gaussian shaping on a polar lattice deals with the
power constraint but is technically more involved. The overall scheme is explicit and efficient, featuring quasi-linear
complexity.
ACKNOWLEDGMENTS
The authors would like to thank the Associate Editor and anonymous reviewers for helpful comments.
A PPENDIX A
P ROOF
OF
L EMMA 1
Proof. By the definition of the flatness factor, we have
fσ,Λ (x) ≤
1 + ǫΛ (σ)
.
V (Λ)
Thus, the differential entropy of the mod-Λ Gaussian noise is bounded by
Z
fσ,Λ (x) log fσ,Λ (x)dx
h(Λ, σ 2 ) = −
V(Λ1 )
≥−
Z
fσ,Λ (x) log
V(Λ1 )
= − log
1 + ǫΛ (σ)
dx
V (Λ)
1 + ǫΛ (σ)
V (Λ)
= log V (Λ) − log (1 + ǫΛ (σ)).
Therefore, from (5), C(Λ, σ 2 ) is bounded by log (1 + ǫΛ (σ)). The second inequality in (12) follows from the fact
log(1 + x) = log2 (e) · loge (1 + x) ≤ log(e) · x for x > 0.
A PPENDIX B
P ROOF
OF
L EMMA 2
Proof. For this purpose, we assume Λ = aZn and Λ′ = bZn where a, b are scaling parameters to be estimated.
We note that for all partition chains in [24], this is always possible: if the bottom lattice does not take the form of
bZn , one may simply further extend the partition chain (which will lead to an upper bound on r).
December 27, 2017
DRAFT
29
We firstly note that the flatness factor ǫΛ (σ) can be made arbitrarily small by scaling down the top lattice Λ.
To see this, we recall that ǫΛ (σe ) ≤ [1 + ǫΛ0 (σe )]n − 1 [11, Lemma 3] where Λ0 = aZ for the afore-mentioned
scaling factor a. Let Λ∗0 = a1 Z be the dual lattice of Λ0 . By [12, Corollary 1], we have
ǫΛ0 (σ) = ΘΛ∗0 (2πσ 2 ) − 1
X
exp(−2π 2 σ 2 |λ|2 ) − 1
=
λ∈Λ∗
0
=2
X
1
λ∈ a
N
exp(−2π 2 σ 2 |λ|2 )
(31)
2 exp(−2π 2 σ 2 a12 )
1 − exp(−2π 2 σ 2 a32 )
1
≤ 4 exp(−2π 2 σ 2 2 ) for sufficiently small a.
a
≤
Let
1
a
√
= Θ( N ), we have ǫΛ0 (σ) = e−Θ(N ) and hence ǫΛ (σ) = e−Θ(N ) for fixed n.
Secondly, by the union bound, the error probability of the bottom lattice Λ′ is upper-bounded by
b2
b
Pe (Λ′ , σ 2 ) ≤ nQ
≤ ne− 8σ2
2σ
where we apply the Chernoff bound on the Q-function. We want
Pe (Λ′ , σ 2 ) = e−Θ(N ) ,
√
which leads to b = Θ( N ) for fixed n.
For a binary lattice partition, we have (b/a)n = 2r . Thus, we conclude that
b
r = n log
= n log Θ(N ) = Θ(log N ).
a
A PPENDIX C
P ROOF
OF
L EMMA 3
Proof. By the self-similarity of the lattice partition chain, we can scale a Λℓ−1 /Λℓ channel to a Λℓ /Λℓ+1 channel by
multiplying the output of a Λℓ−1 /Λℓ channel with T . Since T = αV for some scaling factor α > 1 and orthogonal
matrix V , the Gaussian noise for each dimension is still independent of each other and the noise variance per
dimension is increased after the scaling. Therefore, a Λℓ−1 /Λℓ channel is stochastically equivalent to a Λℓ /Λℓ+1
channel with a larger noise variance. For our design examples, a Z/2Z channel with Gaussian noise variance σ 2
is equivalent to a 2Z/4Z channel with Gaussian noise variance 4σ 2 , and a Z2 /RZ2 channel with noise variance
σ 2 per dimension is equivalent to a RZ2 /2Z2 channel with noise variance 2σ 2 per dimension. Then our task is to
prove that a Λℓ /Λℓ+1 channel with noise variance σ22 is degraded with respect to a Λℓ /Λℓ+1 channel with noise
variance σ12 if σ12 ≤ σ22 .
To see this, we construct an intermediate channel with an input in R(Λℓ+1 ) and a mod-Λℓ+1 operation at the
receiver’s front end, as depicted in Fig. 14. The noise variance of this mod-Λℓ+1 channel is given by σ22 − σ12 per
December 27, 2017
DRAFT
30
h
i
dimension. By the property [X + Y ] mod Λℓ+1 = X mod Λℓ+1 + Y mod Λℓ+1 , we find that the concatenated
channel consisting of a Λℓ /Λℓ+1 channel with noise variance σ12 followed by the afore-mentioned intermediate
channel is stochastically equivalent to a Λℓ /Λℓ+1 channel with noise variance σ22 . The proof is completed according
to Definition 2.
%#
(a)
&
Mod
%#
(b)
!"#
%'
&
Mod
%#
(c)
&
$
!"#
$(
%'
Mod
Mod
!"#
!"#
$(
intermediate channel
Fig. 14. Relationship between the channels regarding degradation. X ∈ R(Λℓ+1 ) denotes the channel input, while N1 and N2 denote
independent additive Gaussian noises with variances σ12 and σ22 − σ12 , respectively. Clearly, the two Λℓ /Λℓ+1 channels with noise variances
σ12 and σ22 can be described by channel (a) and (b), respectively. By the property of modulo operation, channel (b) is equivalent to channel (c),
which is a concatenated channel consisting of channel (a) and an intermediate mod-Λℓ+1 channel.
A PPENDIX D
P ROOF
OF
L EMMA 5
Proof. For convenience we consider a one-dimensional partition chain Z/2Z/ · · · . The proof can be extended to
the multi-dimensional case by sandwiching the partition in Zn /2Zn / · · · , which reduces to the one-dimensional
case.
For level r, the selected coset Ar can be written as x1 + · · ·2r−1 xr + 2r Z. Clearly, Ar is a subset of Ar−1 .
Let λ1 and λ2 denote the two lattice points with smallest norm in set Ar−1 . Without loss of generality, we assume
λ1 ≤ 0 ≤ λ2 and |λ1 | ≤ |λ2 |. Observe that λ2 − λ1 = 2r−1 . For a Gaussian distribution with variance σs2 , we can
find a positive integer T , making the probability
Z T σs
x2
1
√
exp(− 2 )dx → 1.
2σs
2πσs
−T σs
Actually, this T does not need to be very large. For instance, when T = 6, the above probability is larger than
1 − 2e−9 . Now we assume 2r−1 = 3T σs , and T = δN for some constant δ, then λ1 and λ2 cannot be in the
December 27, 2017
DRAFT
31
interval [−T σs , T σs ] simultaneously. If the two points are both outside of [−T σs , T σs ], then we have
P
(x+λ1 )2
√ 1
exp(−
2σs2 )
2πσs
fσs (Ar−1 (x1:r−1 ))
x∈2r−1 Z
<
P (Ar−1 ) =
√ 1
fσs (Z)
2πσs
≤2
≤2
X
exp(−
x∈2r−1 Z−
(x + λ1 )2
)
2σs2
λ2
2
exp(− 2σ12 )
1 − exp(−
s
(2r−1 )2
2σs2
)
≤2
exp(− T2 )
2
1 − exp(− 9T2 )
,
where Z− represents all non-positive integers. This means the probability of choosing Ar−1 goes to zero when T
(or N ) is large. Therefore, we have that the point λ1 is in the interval [−T σs , T σs ] and λ2 lies outside. Without
loss of generality, we assume that the two cosets corresponding to xr = 0 and xr = 1 are λ1 + 2r Z and λ2 + 2r Z,
respectively. Then we have
P
2
1)
exp(− (x+λ
2σ2 )
P (xr = 0|x1:r−1 )
= P
2
2)
P (xr = 1|x1:r−1 )
exp(− (x+λ
2σ2 )
x∈2r Z
s
s
x∈2r Z
≥
exp(−
2
P
x∈2r Z+
≥
λ21
2σs2
)
2
2)
exp(− (x+λ
2σs2 )
λ2
exp(− 2σ12 )
s
λ2
2 · exp(− 2σ22 )
s
22r
1 − exp − 2
,
2σs
where Z+ represents all non-negative integers. Since λ2 − λ1 = 2r−1 = 3T σs and λ2 + λ1 ≥ T σs , for any T > 1,
we can obtain
P (xr = 0|x1:r−1 )
1
3 2
≥ exp
T (1 − exp(−18T 2))
P (xr = 1|x1:r−1 )
2
2
1
3 2
3 2 2
1
≥ exp
T
δ N .
= exp
4
2
4
2
Assume that
1
4
exp( 23 δ 2 N 2 ) = M , we can get P (xr = 0|x1:r−1 ) ≥
M
M+1
and P (xr = 1|x1:r−1 ) ≤
1
M+1 .
Then we
have,
I(Y ; Xr |X1:r−1 ) ≤ H(Xr |X1:r−1 ) ≤ h2
1
M +1
,
1
where h2 (p) = plog( p1 ) + (1 − p)log( 1−p
) denotes the binary entropy function. By the relationship ln(x) ≤
when x ≥ 1, we finally have
I(Y ; Xr |X1:r−1 ) ≤ log(e)
1
1
√ +
M
M
= log(e)
2
4
+
2r
exp(δ1 2 ) exp(δ2 22r )
x−1
√
x
,
where δ1 and δ2 are two positive constants. Therefore, when r = O(log log N ), we have I(Y ; Xr |X1:r−1 ) → 0,
P
and ℓ≥r I(Y ; Xℓ |X1:ℓ−1 ) ≤ O( N1 ).
December 27, 2017
DRAFT
32
A PPENDIX E
P ROOF
OF
T HEOREM 5
Proof. Let Ei denote the set of pairs of u1:N and y 1:N such that decoding error occurs at the i-th bit, then the block
S
decoding error event is given by E ≡ i∈I Ei . According to our encoding scheme, each codeword u1:N appears
with probability
2−(|I|+|F |)
Y
PU i |U 1:i−1 (ui |u1:i−1 ).
i∈S
Then the expectation of decoding error probability over all random mapping is expressed as
Y
X
2−(|I|+|F |)(
E[Pe ] =
PU i |U 1:i−1 (ui |u1:i−1 ))
u1:N ,y 1:N
i∈S
· PY 1:N |U 1:N (y 1:N |u1:N )1[(u1:N , y 1:N ) ∈ E].
Now we define the probability distribution QU 1:N ,Y 1:N as
QU 1:N ,Y 1:N (u1:N , y 1:N ) = 2−(|I|+|F |)(
Y
i∈S
PU i |U 1:i−1 (ui |u1:i−1 ))PY 1:N |U 1:N (y 1:N |u1:N ).
Then the variational distance between QU 1:N ,Y 1:N and PU 1:N ,Y 1:N can be bounded as
X
|Q(u1:N , y 1:N ) − P (u1:N , y 1:N )|
2kQU 1:N ,Y 1:N − PU 1:N ,Y 1:N k =
u1:N ,y 1:N
(a)
=
X
u1:N ,y 1:N
≤
=
X
i∈I∪F
X
i∈I∪F
(b)
≤
|
X
i
X
(Q(ui |u1:i−1 ) − P (ui |u1:i−1 ))(
u1:N ,y 1:N
X
u1:i−1
X
X
i∈I∪F u1:i−1
i−1
Y
j=1
|Q(ui |u1:i−1 ) − P (ui |u1:i−1 )|(
N
Y
P (ui |u1:i−1 ))(
i−1
Y
j=1
j=i+1
P (ui |u1:i−1 ))(
N
Y
Q(ui |u1:i−1 ))Q(y 1:N |u1:N )|
j=i+1
Q(ui |u1:i−1 ))Q(y 1:N |u1:N )
2P (u1:i−1 )kQU i |U 1:i−1 =u1:i−1 − PU i |U 1:i−1 =u1:i−1 k
q
P (u1:i−1 ) 2ln2D(PU i |U 1:i−1 =u1:i−1 kQU i |U 1:i−1 =u1:i−1 )
(32)
X s
X
≤
P (u1:i−1 )D(PU i |U 1:i−1 =u1:i−1 kQU i |U 1:i−1 =u1:i−1 )
2ln2
i∈I∪F
u1;i−1
X q
≤
2ln2D(PU i |U 1:i−1 ||QU i |U 1:i−1 )
i∈I∪F
≤
Xp
Xp
2ln2(1 − H(U i |U 1:i−1 )) +
2ln2(1 − H(U i |U 1:i−1 ))
i∈I
i∈F
Xp
Xq
≤
2ln2(1 − Z(U i |U 1:i−1 )2 ) +
2ln2(1 − Z(U i |U 1:i−1 , Y 1:N )2 )
i∈I
i∈F
p
≤ 2N 4ln2 · 2−N β ,
December 27, 2017
DRAFT
33
where equality (a) follows from [6, Equation (56)] and Q(y 1:N |u1:N ) = P (y 1:N |u1:N ). D(·||·) in the inequality
(b) is the relative entropy, and this inequality holds because of the Pinsker’s inequality. Then we have
E[Pe ] = QU 1:N ,Y 1N (E)
≤ kQU 1:N ,Y 1:N − PU 1:N ,Y 1:N k + PU 1:N ,Y 1:N (E)
X
≤ kQU 1:N ,Y 1:N − PU 1:N ,Y 1:N k +
PU 1:N ,Y 1:N (Ei ),
(33)
i∈I
where
PU 1:N ,Y 1:N (Ei ) ≤
≤
X
P (u1;i−1 , y 1:N )P (ui |u1:i−1 , y 1:N ) · 1[P (ui |u1:i−1 , y 1:N ) ≤ P (ui ⊕ 1|u1:i−1 , y 1:N )]
X
P (u1;i−1 , y 1:N )P (ui |u1:i−1 , y 1:N )
u1:N ,y 1:N
u1:N ,y 1:N
s
P (ui ⊕ 1|u1:i−1 , y 1:N )
P (ui |u1:i−1 , y 1:N )
β
= Z(U i |U 1:i−1 , Y 1:N ) ≤ 2−N .
√
β
β′
From (32) and (33), we have E[Pe ] ≤ 2N 4ln2 · 2−N β + N 2−N = N 2−N for any β ′ < β < 0.5.
A PPENDIX F
P ROOF
OF
T HEOREM 6
1:N
Proof. Let Ei denote the set of triples of u1:N
and y 1:N such that decoding error occurs at the i-th bit, then
2 , x1
S
the block decoding error event is given by E ≡ i∈I Ei . According to our encoding scheme, each codeword u1:N
2
appears with probability
2−(|I2 |+|F2 |)
Y
i∈S2
PU i |U 1:i−1 ,X 1:N (ui2 |u1:i−1
, x1:N
1 ).
2
2
2
1
Then the expectation of decoding error probability over all random mapping is expressed as
Y
X
2−(|I2 |+|F2 |) (
E[Pe ] =
PU i |U 1:i−1 ,X 1:N (ui2 |u1:i−1
, x1:N
1 ))
2
2
u1:N
,x1:N
,y 1:N
2
1
2
1
i∈S2
1:N
1:N
1:N
1:N
·PY 1:N ,X11:N |U21:N (y 1:N , x1:N
) ∈ E].
1 |u2 )1[(u2 , x1 , y
Now we define the probability distribution QU21:N ,X11:N ,Y 1:N as
1:N
1:N
QU21:N ,X11:N ,Y 1:N (u1:N
) =2−(|I2 |+|F2 |) · QX11:N (x1:N
2 , x1 , y
1 )
Y
1:N 1:N
(
PU i |U 1:i−1 ,X 1:N (ui2 |u1:i−1
, x1:N
|u2 , x1:N
1 )) · PY 1:N |X11:N ,U21:N (y
1 ).
2
2
2
1
i∈S2
Then the variational distance between QU21:N ,X11:N ,Y 1:N and PU21:N ,X11:N ,Y 1:N can be bounded as
X
1:N
1:N
1:N
|Q(u1:N
) − P (u21:N , x1:N
)|
2kQU21:N ,X11:N ,Y 1:N − PU21:N ,X11:N ,Y 1:N k =
2 , x1 , y
1 ,y
u1:N
,x1:N
,y 1:N
2
1
X
=
u1:N
,x1:N
,y 1:N
2
1
(a)
≤
+
X
1:N
1:N
1:N 1:N
1:N 1:N
1:N
1:N 1:N
|Q(u1:N
|u2 , x1:N
|u2 , x1:N
2 |x1 )Q(x1 )Q(y
1 ) − P (u2 |x1 )P (x1 )P (y
1 )|
u1:N
,x1:N
,y 1:N
2
1
X
u1:N
,x1:N
,y 1:N
2
1
December 27, 2017
1:N
1:N 1:N
1:N
1:N 1:N
|Q(u1:N
|u2 , x1:N
2 |x1 ) − P (u2 |x1 )|P (x1 )P (y
1 )
1:N
1:N 1:N
1:N 1:N
|Q(x1:N
|u2 , x1:N
1 ) − P (x1 )|Q(u2 |x1 )P (y
1 )
DRAFT
34
1:N
1:N 1:N
where inequation (a) follows from [6, Equation (56)], Q(y 1:N |u1:N
|u2 , x1:N
2 , x1 ) = P (y
1 ). For the first
summation, following the same fashion as the proof of Theorem 5, we can prove
X
u1:N
,x1:N
,y 1:N
2
1
1:N 1:N
1:N
1:N 1:N
1:N
|Q(u1:N
|u2 , x11:N ) ≤ 2N
2 |x1 ) − P (u2 |x1 )|P (x1 )P (y
p
4ln2 · 2−N β .
According to the result of the coding scheme for level 1, we already have
p
2kQU11:N ,Y 1:N − PU11:N ,Y 1:N k ≤ 2N 4ln2 · 2−N β .
(34)
Since we have PY 1:N |U11:N = QY 1:N |U11:N , we can write
2kQU11:N − PU11:N k ≤ 2N
p
4ln2 · 2−N β .
(35)
Clearly, there is a one to one mapping between U11:N and X11:N , then we immediately have 2kQX11:N − PX11:N k ≤
√
2N 4ln2 · 2−N β . Therefore, for the second summation,
X
1:N
1:N 1:N
1:N 1:N
|Q(x1:N
|u2 , x1:N
1 ) − P (x1 )|Q(u2 |x1 )P (y
1 )
u1:N
,x1:N
,y 1:N
2
1
=
X
x1:N
1
1:N
|Q(x1:N
1 ) − P (x1 )| ≤ 2N
√
Then we have ||QU 1:N ,X 1:N ,Y 1N − PU 1:N ,X 1:N ,Y 1N || ≤ 4N 4ln2 · 2−N β , and
2
1
2
p
4ln2 · 2−N β .
(36)
1
E[Pe ] = QU 1:N ,X 1:N ,Y 1N (E)
2
1
≤ kQU 1:N ,X 1:N ,Y 1N − PU 1:N ,X 1:N ,Y 1N k + PU 1:N ,X 1:N ,Y 1N (E)
2
1
2
1
2
1
X
≤ kQU 1:N ,X 1:N ,Y 1N − PU 1:N ,X 1:N ,Y 1N k +
PU 1:N ,X 1:N ,Y 1N (Ei ),
2
1
2
1
2
(37)
1
i∈I
The rest part of the proof follows the same fashion of the proof of Theorem 5. Finally we have E[Pe ] ≤ N 2−N
β′
for any β ′ < β < 0.5.
R EFERENCES
[1] E. Arıkan, “Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels,”
IEEE Trans. Inform. Theory, vol. 55, no. 7, pp. 3051–3073, July 2009.
[2] E. Şaşoğlu, E. Telatar, and E. Arıkan, “Polarization for arbitrary discrete memoryless channels,” in Proc. IEEE Inform. Theory Workshop
(ITW), Taormina, Italy, Oct. 2009, pp. 144–148.
[3] A. Sahebi and S. Pradhan, “Multilevel channel polarization for arbitrary discrete memoryless channels,” IEEE Trans. Inform. Theory,,
vol. 59, no. 12, pp. 7839–7857, Dec. 2013.
[4] W. Park and A. Barg, “Polar codes for q-ary channels, q = 2r ,” IEEE Trans. Inform. Theory,, vol. 59, no. 2, pp. 955–969, Feb. 2013.
[5] R. Mori and T. Tanaka, “Non-binary polar codes using Reed-Solomon codes and algebraic geometry codes,” in Proc. IEEE Inform. Theory
Workshop (ITW), Dublin, Ireland, Aug. 2010, pp. 1–5.
[6] J. Honda and H. Yamamoto, “Polar coding without alphabet extension for asymmetric models,” IEEE Trans. Inform. Theory, vol. 59,
no. 12, pp. 7829–7838, Dec. 2013.
[7] M. Mondelli, S. H. Hassani, and R. L. Urbanke, “How to achieve the capacity of asymmetric channels,” CoRR, vol. abs/1406.7373, 2014.
[Online]. Available: http://arxiv.org/abs/1406.7373
[8] E. Abbe and E. Telatar, “Polar codes for the m-user multiple access channel,” IEEE Trans. Inform. Theory, vol. 58, no. 8, pp. 5437–5448,
Aug. 2012.
December 27, 2017
DRAFT
35
[9] E. Abbe and A. Barron, “Polar coding schemes for the AWGN channel,” in Proc. IEEE Int. Symp. Inform. Theory (ISIT), Saint-Petersburg,
Russia, July 2011, pp. 194–198.
[10] U. Erez and R. Zamir, “Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding,” IEEE Trans. Inform.
Theory, vol. 50, no. 10, pp. 2293–2314, Oct. 2004.
[11] C. Ling and J.-C. Belfiore, “Achieiving AWGN channel capacity with lattice Gaussian coding,” IEEE Trans. Inform. Theory, vol. 60,
no. 10, pp. 5918–5929, Oct. 2014.
[12] C. Ling, L. Luzzi, J.-C. Belfiore, and D. Stehlé, “Semantically secure lattice codes for the Gaussian wiretap channel,” IEEE Trans. Inform.
Theory, vol. 60, no. 10, pp. 6399–6416, Oct. 2014.
[13] B. Nazer and M. Gastpar, “Compute-and-forward: Harnessing interference through structured codes,” IEEE Trans. Inform. Theory, vol. 57,
no. 10, pp. 6463–6486, Oct. 2011.
[14] R. Zamir, S. Shamai, and U. Erez, “Nested linear/lattice codes for structured multiterminal binning,” IEEE Trans. Inform. Theory, vol. 48,
no. 6, pp. 1250–1276, June 2002.
[15] R. Zamir, Lattice Coding for Signals and Networks.
Cambridge, UK: Cambridge University Press, 2014.
[16] G. Poltyrev, “On coding without restictions for the AWGN channel,” IEEE Trans. Inform. Theory, vol. 40, pp. 409–417, Mar. 1994.
[17] M.-R. Sadeghi, A. Banihashemi, and D. Panario, “Low-density parity-check lattices: Construction and decoding analysis,” IEEE Trans.
Inform. Theory, vol. 52, no. 10, pp. 4481–4495, Oct. 2006.
[18] N. Di Pietro, J. J. Boutros, G. Zémor, and L. Brunel, “Integer low-density lattices based on Construction A,” in Proc. IEEE Inform. Theory
Workshop (ITW), Lausanne, Switzerland, Sept. 2012, pp. 422–426.
[19] N. di Pietro, G. Zémor, and J. J. Boutros, “New results on Construction A lattices based on very sparse parity-check matrices,” in Proc.
IEEE Int. Symp. Inform. Theory (ISIT), Istanbul, Turkey, July 2013, pp. 1675–1679.
[20] N. Sommer, M. Feder, and O. Shalvi, “Low-density lattice codes,” IEEE Trans. Inform. Theory, vol. 54, no. 4, pp. 1561–1585, Apr. 2008.
[21] G. Forney and L.-F. Wei, “Multidimensional constellations–Part I: Introduction, figures of merit, and generalized cross constellations,”
IEEE J. Sel. Areas Commun., vol. 7, no. 6, pp. 877–892, Aug 1989.
[22] F. R. Kschischang and S. Pasupathy, “Optimal nonuniform signaling for Gaussian channels,” IEEE Trans. Inform. Theory, vol. 39, no. 3,
pp. 913–929, May 1993.
[23] N. di Pietro, G. Zémor, and J. J. Boutros, “LDA lattices without dithering achieve capacity on the gaussian channel,” CoRR, vol.
abs/1603.02863, 2016. [Online]. Available: http://arxiv.org/abs/1603.02863
[24] G. D. Forney Jr., M. Trott, and S.-Y. Chung, “Sphere-bound-achieving coset codes and multilevel coset codes,” IEEE Trans. Inform. Theory,
vol. 46, no. 3, pp. 820–850, May 2000.
[25] D. Micciancio and O. Regev, “Worst-case to average-case reductions based on Gaussian measures,” in Proc. Ann. Symp. Found. Computer
Science, Oct. 2004, pp. 372–381.
[26] Y. Yan and C. Ling, “A construction of lattices from polar codes,” in Proc. IEEE Inform. Theory Workshop (ITW), Lausanne, Switzerland,
Sept. 2012, pp. 124–128.
[27] Y. Yan, C. Ling, and X. Wu, “Polar lattices: Where Arıkan meets Forney,” in Proc. IEEE Int. Symp. Inform. Theory (ISIT), Istanbul,
Turkey, 2013, pp. 1292–1296.
[28] M. Seidl, A. Schenk, C. Stierstorfer, and J. B. Huber, “Multilevel polar-coded modulation,” IEEE Trans. Commun., vol. 61, no. 10, pp.
4108–4119, Oct. 2013.
[29] U. Wachsmann, R. Fischer, and J. Huber, “Multilevel codes: Theoretical concepts and practical design rules,” IEEE Trans. Inform. Theory,
vol. 45, no. 5, pp. 1361–1391, July 1999.
[30] A. Joseph and A. Barron, “Least squares superposition codes of moderate dictionary size are reliable at rates up to capacity,” IEEE Trans.
Inform. Theory, vol. 58, no. 5, pp. 2541–2557, May 2012.
[31] ——, “Fast sparse superposition codes have near exponential error probability for R < C,” IEEE Trans. Inform. Theory, vol. 60, no. 2,
pp. 919–942, Feb. 2014.
[32] J. H. Conway and N. J. A. Sloane, Sphere Packings, Lattices, and Groups, Second Edition, 1993, Springer-Verlag, New York.
[33] W. Kositwattanarerk and F. Oggier, “On Construction D and related constructions of lattices from linear codes,” in Int. Workshop on
Coding and Cryptography (WCC), 2013.
[34] G. D. Forney Jr., “Coset codes-Part I: Introduction and geometrical classification,” IEEE Trans. Inform. Theory, vol. 34, no. 5, pp. 1123–
1151, Sept. 1988.
December 27, 2017
DRAFT
36
[35] E. Arıkan and E. Telatar, “On the rate of channel polarization,” in IEEE Int. Symp. Inform. Theory (ISIT), Seoul, Korea, July 2009, pp.
1493–1495.
[36] T. M. Cover and J. A. Thomas, Elements of Information Theory.
New York: Wiley, 1991.
[37] S. B. Korada, “Polar codes for channel and source coding,” Ph.D. dissertation, Ecole Polytechnique Fédérale de Lausanne, 2009.
[38] I. Tal and A. Vardy, “How to construct polar codes,” IEEE Trans. Inform. Theory, vol. 59, no. 10, pp. 6562–6582, Oct. 2013.
[39] R. Pedarsani, S. Hassani, I. Tal, and E. Telatar, “On the construction of polar codes,” in Proc. IEEE Int. Symp. Inform. Theory (ISIT),
Saint-Petersburg, Russia, July 2011, pp. 11–15.
[40] S. H. Hassani, K. Alishahi, and R. Urbanke, “Finite-length scaling for polar codes,” IEEE Trans. Inform. Theory, vol. 60, no. 10, pp.
5875–5898, Oct. 2014.
[41] V. Guruswami and P. Xia, “Polar codes: Speed of polarization and polynomial gap to capacity,” in IEEE 54th Annual Symp. Foundations
of Computer Science (FOCS), Oct. 2013, pp. 310–319.
[42] D. Goldin and D. Burshtein, “Improved bounds on the finite length scaling of polar codes,” IEEE Trans. Inform. Theory, vol. 60, no. 11,
pp. 6966–6978, Nov. 2014.
[43] A. Ingber, R. Zamir, and M. Feder, “Finite dimensional infinite constellations,” IEEE Trans. Inform. Theory, vol. 59, no. 3, pp. 1630–1656,
Mar. 2013.
[44] E. Arıkan, “Source polarization,” in Proc. IEEE Int. Symp. Inform. Theory (ISIT), Austin, USA, July 2010, pp. 899–903.
[45] R. Mori and T. Tanaka, “Performance of polar codes with the construction using density evolution,” IEEE Comm. Lett., vol. 13, no. 7, pp.
519–521, July 2009.
December 27, 2017
DRAFT
| 7cs.IT
|
Approximate Correlation Clustering Using
Same-Cluster Queries
Nir Ailon⋆1 , Anup Bhattacharya⋆⋆2 , and Ragesh Jaiswal⋆ ⋆ ⋆2
arXiv:1712.06865v1 [cs.DS] 19 Dec 2017
1
2
Technion, Haifa, Israel.†
Department of Computer Science and Engineering,
Indian Institute of Technology Delhi.‡
Abstract. Ashtiani et al. (NIPS 2016) introduced a semi-supervised
framework for clustering (SSAC) where a learner is allowed to make samecluster queries. More specifically, in their model, there is a query oracle
that answers queries of the form “given any two vertices, do they belong
to the same optimal cluster?”. In many clustering contexts, this kind of
oracle queries are feasible. Ashtiani et al. showed the usefulness of such a
query framework by giving a polynomial time algorithm for the k-means
clustering problem where the input dataset satisfies some separation
condition. Ailon et al. extended the above work to the approximation
setting by giving an efficient (1+ε)-approximation algorithm for k-means
for any small ε > 0 and any dataset within the SSAC framework. In
this work, we extend this line of study to the correlation clustering
problem. Correlation clustering is a graph clustering problem where
pairwise similarity (or dissimilarity) information is given for every pair
of vertices and the objective is to partition the vertices into clusters that
minimise the disagreement (or maximises agreement) with the pairwise
information given as input. These problems are popularly known as
MinDisAgree and MaxAgree problems, and MinDisAgree[k] and MaxAgree[k]
are versions of these problems where the number of optimal clusters is at
most k. There exist Polynomial Time Approximation Schemes (PTAS)
for MinDisAgree[k] and MaxAgree[k] where the approximation guarantee
is (1 + ε) for any small ε and the running time is polynomial in the input
parameters but exponential in k and 1/ε. We get a significant running
time improvement within the SSAC framework at the cost of making a
small number of same-cluster queries. We obtain an (1+ε)-approximation
algorithm for any small ε with running time that is polynomial in the
input parameters and also in k and 1/ε. We also give non-trivial upper
and lower bounds on the number of same-cluster queries, the lower bound
being based on the Exponential Time Hypothesis (ETH). Note that the
existence of an efficient algorithm for MinDisAgree[k] in the SSAC setting
exhibits the power of same-cluster queries since such polynomial time
algorithm (polynomial even in k and 1/ε) is not possible in the classical
⋆
⋆⋆
⋆⋆⋆
†
‡
Nir Ailon acknowledges the generous support of ISF grant number 2021408
Anup Bhattacharya acknowledges the support of TCS fellowship at IIT Delhi.
Ragesh Jaiswal acknowledges the support of ISF-UGC India-Israel Grant 2014.
Email address: [email protected]
Email addresses: {anupb, rjaiswal}@cse.iitd.ac.in
(non-query) setting due to our conditional lower bounds. Our conditional
lower bound is particularly interesting as it not only establishes a lower
bound on the number of same cluster queries in the SSAC framework
but also establishes a conditional lower bound on the running time of
any (1 + ε)-approximation algorithm for MinDisAgree[k].
1
Introduction
Correlation clustering is a graph clustering problem where we are given similarity
or dissimilarity information for pairs of vertices. The input is a graph G on n
vertices. Edges of G are labeled as similar (positive) or dissimilar (negative).
The clustering objective is to partition the vertices into clusters such that edges
labeled ‘positive’ remain within clusters and ‘negative’ edges go across clusters.
However, this similarity/dissimilarity information may be inconsistent with this
objective. For example, there may exist vertices u, v, w such that edges (u, v)
and (u, w) are labeled ‘positive’ whereas edge (v, w) is labeled ‘negative’. In this
case, it is not possible to come up with a clustering of these 3 vertices that would
agree with all the edge labels. The objective of correlation clustering is to come up
with a clustering that minimises disagreement or maximises agreement with the
edge labels given as input. The minimisation version of the problem, known as
MinDisAgree, minimises the sum of the number of negative edges present inside
clusters and the number of positive edges going across clusters. Similarly, the
maximisation version is known as MaxAgree where the objective is to maximise
the sum of the number of positive edges present inside clusters and the number
of negative edges going across clusters. Unlike k-means or k-median clustering,
in correlation clustering, there is no restriction on the number of clusters formed
by the optimal clustering. When the number of optimal clusters is given to
be at most k, these problems are known as MinDisAgree[k] and MaxAgree[k]
respectively.
Bansal et al. [8] gave a constant approximation algorithm for MinDisAgree and
a PTAS for MaxAgree. Subsequently, Charikar et al. [9] improved approximation
guarantee for MinDisAgree to 4, and showed that MinDisAgree is APX-hard.
These results are for correlation clustering on complete graphs as it is known for
general graphs, it is at least as hard as minimum multi-cut problem [9]. Since
MinDisAgree is APX-hard [9], additional assumptions were introduced for better
results. For example [17,15] studied MinDisAgree where the input is noisy and
comes from a semi-random model. When k is given as part of the input, Giotis
and Guruswami [12] gave a PTAS for MinDisAgree[k].
Recently there have been some works [2,7] with a beyond-worst case flavour
where polynomial time algorithms for NP-hard problems have been designed
under some stability assumptions. Ashtiani et al. [3] considered one such stability
assumption called γ-margin. They introduced a semi-supervised active learning
(SSAC) framework and within this framework, gave a probabilistic polynomial
time algorithm for k-means on datasets that satisfy the γ-margin property.
More specifically, their SSAC framework involves a query oracle that answers
queries of the form “given any two vertices, do they belong to the same optimal
cluster?”. The query oracle responds with a Yes/No answer where these answers
are assumed to be consistent with some fixed optimal solution. In this framework,
they studied the query complexity for polynomial time algorithms for k-means
on datasets satisfying the γ-margin property. Ailon et al. [1] extended this work
to study query complexity bounds for (1+ε)-approximation for k-means in SSAC
framework for any small ε > 0 without any stability assumption on the dataset.
They gave almost matching upper and lower bounds on the number of queries
for (1 + ε)-approximation of k-means problem in SSAC framework.
In this work, we study MinDisAgree[k] in the SSAC framework, where the
optimal clustering has at most k clusters and give upper and lower bounds on
the number of same-cluster queries for (1 + ε)-approximation for correlation
clustering for any ε > 0. We also give upper bounds for MaxAgree[k]. Our
algorithm is based on the PTAS by Giotis and Guruswami [12] for MinDisAgree[k].
The algorithm by Giotis and Guruswami involves random sampling a subset
S of vertices and considers all possible ways of partitioning S into k clusters
S = {S1 , . . . , Sk }, and for every such k-partitioning, clusters the rest of the
vertices greedily. Every vertex v ∈ V \ S is assigned a cluster Sj that maximizes
its agreement with the edge labels. Their main result was the following.
Theorem 1 (Giotis and Guruswami [12]). For every k ≥ 2, there is a PTAS
k
2
for MinDisAgree[k] with running time nO(9 /ε ) log n.
Since Giotis and Guruswami considered all possible ways of partitioning
subset S into k clusters, their running time has exponential dependence on k.
Here, we make the simple observation that within the SSAC framework we can
overcome this exponential dependence on k by making same-cluster queries to
the oracle. The basic idea is to randomly sample a subset S of vertices as before
and partition it optimally into k clusters by making same-cluster queries to the
oracle. Note that by making at most k|S| same-cluster queries, one can partition
S optimally into k clusters. Once we have subset S partitioned as in the optimal
clustering (a key step needed in the analysis of Giotis and Guruswami) we follow
their algorithm and analysis for (1 + ε)-approximation for MinDisAgree[k]. Here
is our main result for MinDisAgree[k] in the SSAC framework. We obtain similar
results for MaxAgree[k].
Theorem 2 (Main result: Upper bound). Let ε > 0 and k ≥ 2. There is
a (randomized)
that uses
algorithm in the SSAC framework for MinDisAgree[k]
14
nk14 log k log n
k log k log n
same-cluster queries, runs in time O(
) and outputs
O
ε6
ε6
a (1 + ε)-approximate solution with high probability.
We complement our upper bound result by providing a lower bound on the
number of queries in the SSAC framework for any efficient (1 +ε)-approximation
algorithm for MinDisAgree for any ε > 0. Our lower bound result is conditioned
on the Exponential Time Hypothesis (ETH hypothesis) [13,14]. Our lower bound
result implies that the number of queries is depended on the number of optimal
clusters k. Our main result with respect to query lower bound is given as follows.
Theorem 3 (Main result: Lower bound). Given that Exponential Time
Hypothesis (ETH) holds, there exists a constant δ > 0 such that any (1 + δ)approximation algorithm for MinDisAgree[k] in the SSAC framework that runs
in polynomial time makes Ω( polyklog k ) same-cluster queries.
Exponential Time Hypothesis is the following statement regarding the hardness
of the 3-SAT problem.
Exponential Time Hypothesis (ETH)[13,14]: There does not exist an
algorithm that can decide whether any 3-SAT formula with m clauses is
satisfiable with running time 2o(m) .
Note that our query lower bound result is a simple corollary of the following
theorem that we prove.
Theorem 4. If the Exponential Time Hypothesis (ETH) holds, then there exists
a constant δ > 0 such that any (1+δ)-approximation algorithm for MinDisAgree[k]
k
requires 2Ω( poly log k ) time.
The above lower bound statement may be of independent interest. It was
already known that MinDisAgree is APX-hard. Our result is a non-trivial addition
to the understanding of the hardness of the correlation clustering problem. Given
that our query upper bound result is through making simple observations in the
algorithms of Giotis and Guruswami, our lower bound results may be regarded
as the primary contribution of this work. So, we first give our lower bound results
in the next section and the upper bound results in Section 3. However, before
we start discussing our results, here is a brief discussion on the related works.
Related Works There have been numerous works on clustering problems in semisupervised settings. Balcan and Blum [5] proposed an interactive framework for
clustering which use ‘split/merge’ queries. In this framework, given any abritrary
clustering C = {C1 , C2 , . . . , } as query, oracle specifies some cluster Cl should be
split or clusters Ci and Cj should be merged. Awasthi et al. [4] developed a local
clustering algorithm which uses these split/merge queries. One versus all queries
for clustering were studied by Voevodski et al. [20]. The oracle, on a query s ∈ X,
returns distances from s to all points in X. The authors provided a clustering,
close to optimal k-median clustering, with only O(k) such queries on instances
satisfying (c, ε)-approximation stability property [6]. Fomin et al. [11] gave a
conditional lower bound for the cluster editing problem which can also be stated
as a decision version of the correlation clustering problem. In the p-cluster editing
problem, given a graph G and a budget B, and an integer p, the objective is to
decide whether G can be transformed into a union of p clusters (disjoint cliques)
using at most B edge additions and deletions. Assuming ETH, they showed that
there exists p = Θ(k ω )√for some 0 ≤ ω ≤ 1 such that there is no algorithm
that decides in time 2o( pB) · nO(1) whether G can be transformed into a union
of p cliques using at most B adjustments (edge additions and deletions). It is
not clear whether their exact reduction can be modified into an approximation
preserving reduction to obtain results similar to what we have here. Mazumdar
and Saha [18] studied correlation clustering problem in a similar setting where
edge similarity and dissimilarity information are assumed to be coming from two
distributions. Given such an input, they studied the cluster recovery problem in
SSAC framework, and gave upper and lower bounds on the query complexity.
Their lower bound results are information theoretic in nature. We are, however,
interested in the approximate solutions for the correlation clustering problem.
2
Query Lower Bounds
In this section, we obtain a lower bound on the number of same-cluster queries
that any FPTAS within the SSAC framework needs to make for the problem
MinDisAgree[k]. We derive a conditional lower bound for the minimum number
of queries under the Exponential Time Hypothesis (ETH) assumption. Some
such conditional lower bound results based on ETH can be found in [16]. We
prove the following main theorem in this section.
Theorem 5. If the Exponential Time Hypothesis (ETH) holds, then there exists
a constant δ > 0 such that any (1+δ)-approximation algorithm for MinDisAgree[k]
k
requires 2Ω( poly log k ) time.
The above theorem gives a proof of Theorem 3.
Proof (Proof of Theorem 3). Let us assume that there exists a query-FPTAS that
makes only o( polyklog k ) same-cluster queries. Then, by considering all possible
answers for these queries and picking the best solution, one can solve the problem
k
in 2o( poly log k ) time which contradicts Theorem 5.
In the remaining section, we give the proof of Theorem 5. First, we state the
ETH hypothesis. Our lower bound results are derived assuming this hypothesis.
Hypothesis 1 (Exponential Time Hypothesis (ETH)[13,14]): There does
not exist an algorithm that decides whether any 3-SAT formula with m
clauses is satisfiable with running time 2o(m) .
Since we would like to obtain lower bounds in the approximation domain, we
will need a gap version of the above ETH hypothesis. The following version of
the PCP theorem would be very useful in obtaining a gap version of ETH.
Theorem 6 (Dinur’s PCP Theorem [10]). For some constants ε, d > 0,
there exists a polynomial-time reduction that takes a 3-SAT formula ψ with m
clauses as input and produces one E3-SAT3 formula φ with m′ = O(mpoly log m)
clauses such that
– if ψ is satisfiable, then φ is satisfiable, and
3
Every clause in an E3-SAT formula has exactly 3 literals.
– if ψ is unsatisfiable, then val(φ) ≤ 1 − ε, and
– each variable in φ appears in at most d clauses.
where val(φ) is the maximum fraction of clauses of φ which are satisfiable by any
assignment.
The hypothesis below follows from ETH and the above Theorem 6, and will
be useful for our analysis.
Hypothesis 2: There exists constants ε, d > 0 such that the following
holds: There does not exist an algorithm that, given a E3-SAT formula
ψ with m clauses and each variable appearing in at most d clauses,
distinguishes whether ψ is satisfiable or val(ψ) ≤ (1 − ε), and runs in
m
time better than 2Ω ( poly log m ) .
The lemma given below trivially follows from Dinur’s PCP Theorem 6.
Lemma 1. If Hypothesis 1 holds, then so does Hypothesis 2.
We now give a reduction from the gap version of the E3-SAT problem to the
gap version of the NAE3-SAT problem. A problem instance of NAE3-SAT consists
of a set of clauses (each containing exactly 3 literals) and a clause is said to be
satisfied by an assignment iff at least one and at most two literals in the clause
is true (NAE stands for “Not All Equal"). For any instance φ, we define val′ (φ)
to be the maximum fraction of clauses that can be satisfied in the “not all equal"
sense by an assignment. Note that this is different from val(φ) which is equal to
the maximum fraction of clauses that can be satisfied (in the usual sense). First,
we reduce E3-SAT to NAE6-SAT and then NAE6-SAT to NAE3-SAT.
Lemma 2. Let 0 < ε < 1 and d > 1. There is a polynomial time reduction that
given an instance ψ of E3-SAT with m clauses with each variable appearing in at
most d clauses, produces an instance φ of NAE6-SAT with 4m clauses such that
1. If val(ψ) = 1, then val′ (φ) = 1, and
2. If val(ψ) ≤ (1 − ε), then val′ (φ) ≤ (1 − ε/4), and
3. Each variable in φ appears in at most 4d clauses.
Proof. We construct φ in the following manner: for every variable xi in ψ, we
introduce two variables yi and zi . We will use xi = 1 iff yi 6= zi for every i in our
reduction. For every clause (li , lj , lk ) (with li , lj , lk being literals), we introduce
the following four NAE clauses in φ:
(pi , qi , pj , qj , pk , qk ), (pi , qi , pj , qj , p̄k , q̄k ), (pi , qi , p̄j , q̄j , pk , qk ), (pi , qi , p̄j , q̄j , p̄k , q̄k )
For any index (say i), if li = xi (that is, the variable is in the positive form), then
pi = yi and qi = zi . On the other hand, if li = x̄i , then pi = yi and qi = z̄i . So
for example, for the clause (x2 , x̄7 , x9 ) in ψ, we have the following four clauses:
(y2 , z2 , y7 , z̄7 , y9 , z9 ), (y2 , z2 , y7 , z̄7 , ȳ9 , z̄9 ), (y2 , z2 , ȳ7 , z7 , y9 , z9 ), (y2 , z2 , ȳ7 , z7 , ȳ9 , z̄9 )
Note that property (3) of the lemma holds due to our construction. For property
(1), we argue that for any satisfying assignment for ψ, the assignment of variables
in φ as per the rule xi = 1 iff yi 6= zi is a satisfying assignment of ψ (in the NAE
sense). This is because for every literal l that makes a clause in ψ true, the two
corresponding copies p and q satisfies all the four clauses (in the NAE sense). For
property (2), we prove the contrapositive. Suppose there is an assignment to the
y, z variables in φ that satisfies at least (1 − ε/4) fraction of the clauses. We will
argue that the assignment to the variables of ψ as per the rule xi = 1 iff yi 6= zi
satisfies at least (1 − ε) fraction of clauses of ψ. First, note that for every set of
4 clauses in φ created from a single clause of ψ, either 3 of them are satisfied or
all four are satisfied (whatever the assignment of the variable be). Let m1 be the
number of these 4-sets where all 4 clauses are satisfied and let m2 be the number
of these 4-sets where 3 clauses are satisfied, where m = m1 + m2 . Then we have
4m1 + 3m2 ≥ (1 − ε/4) · (4m) which implies that m1 ≥ (1 − ε)m. Note that for
any of the 4-sets where all 4 clauses are satisfied, the corresponding clause in ψ
is satisfied with respect to the assignment as per rule xi = 1 iff yi 6= zi (since at
least one the p, q pairs will have opposite values). So, the fraction of the clauses
1
satisfied in ψ is at least m
m ≥ (1 − ε).
Lemma 3. Let 0 < ε < 1 and d > 1. There is a polynomial time reduction
that given an instance ψ of NAE6-SAT with m clauses and with each variable
appearing in at most d clauses, produces an instance φ of NAE3-SAT with 4m
clauses such that:
1. If val′ (ψ) = 1, then val′ (φ) = 1, and
2. If val′ (ψ) ≤ (1 − ε), then val′ (φ) ≤ (1 − ε/4).
3. Each variable in φ appears in at most max (d, 2) clauses.
Proof. For every clause Ci = (ai , bi , ci , di , ei , fi ) in ψ, we construct the following
four clauses in φ (let us call it a 4-set): (ai , bi , xi ), (x̄i , ci , yi ), (ȳi , di , zi ), (z̄i , ei , fi ),
introducing new variables xi , yi , zi . Property (3) trivially holds for this construction.
For every satisfying assignment for ψ, there is a way to set the clause variables
xi , yi , zi for every i such that all four clauses in the 4-set corresponding to
clause Ci are satisfied. So, property (1) holds. We show property (2) using
contraposition. Consider any assignment of φ that satisfies at least (1 − ε/4)
fraction of the clauses. Let mj denote the number of 4-sets such that as per
P4
this assignment j out of 4 clauses are satisfied. Then, we have j=0 j · mj ≥
P3
(1 − ε/4) · (4m). This implies that: 3 · j=0 mj + 4m4 ≥ (1 − ε/4) · (4m) which
implies that m4 ≥ (1−ε)m. Now, note that for any 4-set such that all four clauses
are satisfied, the corresponding clause in ψ is satisfied by the same assignment
to the variables. This implies that there is an assignment that makes at least
(1 − ε) fraction of clauses true in ψ.
We come up with the following hypothesis which holds given that Hypothesis
2 holds, and is crucial for our analysis.
Hypothesis 3: There exists constants ε, d > 0 such that the following
holds: There does not exist an algorithm that, given a NAE3-SAT formula
ψ with m clauses with each variable appearing in at most d clauses,
distinguishes whether val′ (ψ) = 1 or val′ (ψ) ≤ (1 − ε), and runs in time
m
better than 2Ω ( poly log m ) .
The lemma given below follows easily from the Lemmas 2 and 3 above.
Lemma 4. If Hypothesis 2 holds, then so does Hypothesis 3.
We now give a reduction from the gap version of NAE3-SAT to the gap version
of monotone NAE3-SAT that has no negative variables. Note that because of the
NAE (not all equal) property, setting all variables to 1 does not necessarily
satisfy the formula.
Lemma 5. Let 0 < ε < 1 and d > 1. There is a polynomial time reduction
that given an instance ψ of NAE3-SAT with m clauses and with each variable
appearing in at most d clauses, produces an instance φ of monotone NAE3-SAT
with O(m) clauses such that:
1. If val′ (ψ) = 1, then val′ (φ) = 1, and
ε
).
2. If val′ (ψ) ≤ (1 − ε), then val′ (φ) ≤ (1 − 1+12d
3. Each variable in φ appears in at most 4d clauses.
Proof. We construct φ in the following manner: Substitute all positive literals
of the variable xi with yi and all negative literals with zi for new variables yi , zi .
Also, for every variable xi , add the following 4d clauses:
{(yi , zi , tji ), (yi , zi , uji ), (yi , zi , vij ), (tji , uji , vij )}dj=1
where tji , uji , vij for 1 ≤ j ≤ d are new variables. Note that the only way to
satisfy all the above clauses is to have yi 6= zi . Let m′ denote the total number
of clauses in φ. So, m′ = m + 4dn. Also, from the construction, each variable in
φ appears in at most 4d clauses. This proves property (3). Property (1) follows
from the fact that for any satisfying assignment for ψ, there is a way to extend
this assignment to variables in φ such that all clauses are satisfied. For all i,
yi = xi and zi = x̄i . All the new variables t, u, v can be set so as to make all the
new clauses satisfied.
We argue property (2) using contraposition. Suppose there is an assignment
to variables in φ that makes at least (1 − ε/(1 + 12d)) fraction of clauses satisfied.
First, note that there is also an assignment that makes at least (1 − ε/(1 + 12d))
fraction of the clauses satisfied and in which for all i, yi 6= zi . This is because 3d
out of 4d of the following clauses can be satisfied when yi = zi :
{(yi , zi , tji ), (yi , zi , uji ), (yi , zi , vij ), (tji , uji , vij )}dj=1
However, if we flip one of yi , zi , then the number of above clauses satisfied can
be 4d and we might lose out on at most d clauses since a variable appears in
at most d clauses in ψ. Let m′ be the number of clauses corresponding to the
original clauses that are satisfied with this assignment. So, we have m′ + 4nd >
ε
(1 − (1+12d)
)(m + 4nd) which gives:
m′ > (1 − ε)m +
4ndε
12mdε
−
≥ (1 − ε)m
1 + 12d 1 + 12d
(since 3m ≥ n)
This completes the proof of the lemma.
We come up with the following hypothesis which holds given that Hypothesis
3 holds.
Hypothesis 4: There exists constants ε, d > 0 such that the following
holds: There does not exist an algorithm that, given a monotone NAE3SAT formula ψ with m clauses with each variable appearing in at most
d clauses, distinguishes whether val′ (ψ) = 1 or val′ (ψ) ≤ (1 − ε), and
m
runs in time better than 2Ω ( poly log m ) .
The lemma below follows easily from Lemma 5 mentioned in above.
Lemma 6. If Hypothesis 3 holds, then so does Hypothesis 4.
We provide a reduction from the gap version of monotone NAE3-SAT to a
gap version of 2-colorability of 3-uniform bounded degree hypergraph.
Lemma 7. Let 0 < ε < 1 and d > 1. There exists a polynomial time reduction
that given a monotone NAE3-SAT instance ψ with m clauses and with every
variable appearing in at most d clauses, outputs an instance H of 3-uniform
hypergraph with O(m) vertices and hyperedges and with bounded degree d such
that if ψ is satisfiable, then H is 2-colorable, and if at most (1 − ε)-fraction
of clauses of ψ are satisfiable, then any 2-coloring of H would have at most
(1 − ε)-fraction of edges that are bichromatic.
Proof. The reduction constructs a hypergraph H(V, E) as follows. The set of
vertices V correspond to the set of variables (all of them positive literals) of the
monotone NAE3-SAT instance ψ. The set of edges E correspond to the set of
clauses all of which have 3 literals, and therefore every hyperedge is of size 3.
The resulting hypergraph is 3-uniform, and since every variable appears in at
most d clauses, the hypergraph H is of bounded degree d, and |V | = O(m) and
|E| = O(m). If there exists a satisfying assignment for ψ, then every edge in H
is bichromatic and the hypergraph would be 2-colorable, and if at most (1 − ε)fraction of clauses are satisfiable by any assignment, then at most (1−ε)-fraction
of edges of H are bichromatic.
We come up with the following hypothesis which holds given that Hypothesis
4 holds.
Hypothesis 5: There exists constants ε, d > 0 such that the following
holds: There does not exist an algorithm that, given a 3-uniform hypergraph
H with m vertices and where every vertex has degree at most d, distinguishes
whether H is bichromatic or at most (1−ε)-fraction of edges are bichromatic,
m
and runs in time better than 2Ω ( poly log m ) .
The lemma below follows easily from Lemma 7 above.
Lemma 8. If Hypothesis 4 holds, then so does Hypothesis 5.
We now give a reduction from 2-colorability in 3-uniform hypergraph H with
constant bounded degree to a correlation clustering instance on a complete graph
G. We use the reduction as given in [9] for our purposes.
Lemma 9 ([9]). Let ε, d > 0. There is a polynomial-time reduction that given a
3-uniform hypergraph H(V, E) with m vertices and where each vertex appears in
at most d hyperedges, outputs an instance of the correlation clustering problem
where the graph G(V ′ , E ′ ) has N = O(m) vertices and M = 2N edges with edges
in E ′ are labeled as ‘positive’ and all the other edges in the complete graph on
V ′ vertices are labeled as ‘negative’ such that the following holds:
1. If H is 2-colorable, then the cost of the optimal correlation clustering is
M − N , and
2. If at most (1 − ε)-fraction of hyperedges of H are bi-chromatic, then the
optimal cost of correlation clustering is at least M − (1 − δ)N , where δ is
some constant.
We come up with the following hypothesis which holds given that Hypothesis
5 holds.
Hypothesis 6: There exists constants ε > 0 such that the following
holds: There does not exist a (1 + ε)-factor approximation algorithm
for the MinDisAgree[k] problem that runs in time better than poly(n) ·
k
2Ω( poly log k ) .
The lemma below follows easily from Lemma 9 given above.
Lemma 10. If Hypothesis 5 holds, then so does Hypothesis 6.
Finally, the proof of Theorem 5 follows from chaining together lemmas 1, 4,
6, 8, and 10.
3
Algorithms for MaxAgree[k] and MinDisAgree[k] in
SSAC Framework
In this section, we give (1 + ε)-approximation algorithms for the MaxAgree[k]
and MinDisAgree[k] problems within the SSAC framework for any ε > 0.
3.1
MaxAgree[k]
In this section, we will discuss a query algorithm that gives (1+ε)-approximation
to the MaxAgree[k] problem. The algorithm that we will discuss is closely related
to the non-query algorithm for MaxAgree[k] by Giotis and Guruswami. See
Algorithm MaxAg(k, ε) in [12]. In fact, except for a few changes, this section
will look extremely similar to Section 3 in [12]. Given this, it will help if we
mention the high-level idea of the Giotis-Guruswami algorithm and point out
the changes that can be made within the SSAC framework to obtain the desired
result. The algorithm of Giotis and Guruswami proceeds in m iterations, where
m = O(1/ε). The given dataset V is partitioned into m equal parts V 1 , . . . , V m ,
and in the ith iteration, points in V i are assigned to one of the k clusters. In order
to cluster V i in the ith iteration, the algorithm samples a set of data points S i ,
and for all possible k-partitions of S i , it checks the agreement of a point v ∈ V i
with the k clusters of S i . Suppose for a particular clustering S1i , . . . , Ski of S i , the
agreement of vertices in V i is maximised. Then the vertices in V i are clustered
by placing them into the cluster that maximises their agreement with respect to
S1i , . . . , Ski . Trying out all possible k-partitions of S i is an expensive operation
i
in the Giotis-Guruswami algorithm (since the running time becomes Ω(k |S | )).
This is where the same-cluster queries help. Instead of trying out all possible
k-partitions of S i , we can make use of the same-cluster queries to find a single
appropriate k-partition of S i in the ith iteration. This is the clustering that
matches the “hybrid” clustering of Giotis and Guruswami. So, the running time
i
of the ith iteration improves from O(k |S | ) to O(k · |S i |). Moreover, the number
th
of same-cluster queries made in the i iteration is k · |S i |, thus making the total
number of same-cluster queries to be O( kε · |S i |). The theorem is given below.
The details of the proof of this theorem is not given since it trivially follows from
Giotis and Guruswami (see Theorem 3.2 in [12]).
Theorem 7. There is a query algorithm QueryMaxAg that behaves as follows:
On input ε, δ and a labelling L of the edges of a complete graph G with n vertices,
with probability at least (1 − δ), algorithm QueryMaxAg outputs a k clustering
of the graph such that the number of agreements induced by this k-clustering is
at least OP T − εn2 /2, where OP T is the optimal number of agreements induced
k
by any k-clustering of G. The running time of the algorithm is O nk
ε3 log ε2 δ .
Moreover, the number of same-cluster queries made by QueryMaxAg is O εk3 log εk2 δ .
Using the simple observation that OP T ≥ n2 /16 (see proof of Theorem 3.1
in [12]), we get that the above query algorithm gives (1 + ε)-approximation
guarantee in the SSAC framework.
3.2
MinDisAgree[k]
In this section, we provide a (1+ε)-approximation algorithm for the MinDisAgree[k]
for any small ε > 0. Giotis and Guruswami [12] provided a (1+ε)-approximation
algorithm for MinDisAgree[k]. In this work, we extend their algorithm to make it
work in the SSAC framework with the aid of same-cluster queries, and thereby
improve the running time of the algorithm considerably. Our query algorithm
will be closely based on the non-query algorithm of Giotis and Guruswami. In
fact, except for a small (but crucial) change, the algorithms are the same. So,
we begin by discussing the main ideas and the result by Giotis and Guruswami.
Lemma 11 (Theorem 4.7 in [12]). For every k ≥ 2 and ε > 0, there is a (1 +
k
2
ε)-approximation algorithm for MinDisAgree[k] with running time nO(9 /ε ) log n.
The algorithm by Giotis and Guruswami builds on the following ideas. First,
from the discussion in the previous section, we know that there is a FPTAS
within SSAC framework for MaxAgree[k]. Therefore, unless OP T , the optimal
value for MinDisAgree[k] is small (OPT= γn2 , for some small γ > 0), the
complement solution for MaxAgree[k] would give a valid (1 + ε)-approximate
solution for MinDisAgree[k]. Since OP T is small, this implies that the optimal
value for MaxAgree[k] is large which means that for any random vertex v in graph
G = (V, E), a lot of edges incident on v agree to the optimal clustering. Suppose
we are given a random subset S ⊆ V of vertices that are optimally clustered
S = {S1 , . . . , Sk }, and let us assume that S is sufficiently large. Since most of
the edges in E are in agreement with the optimal clustering, we would be able
to assign vertices in V \ S to their respective clusters greedily. For any arbitrary
v ∈ V \ S, assign v to Si for which the number of edges that agree is maximized.
Giotis and Guruswami observed that clustering vertices in V \ S in this manner
would work with high probability when these vertices belong to large clusters.
For vertices in small clusters, we may not be able to decide assignments with
high probability. They carry out this greedy assignment of vertices in V \ S
into clusters S1 , . . . , Sk , and filter out clusters that are sufficiently large and
recursively run the same procedure on the union of small clusters.
For any randomly sampled subset S ⊆ V of vertices, Giotis and Guruswami
try out all possible ways of partitioning S into k clusters in order to partition
S optimally into k clusters S1 , . . . , Sk . This ensures that at least one of the
partitions matches the optimal partition. However, this exhaustive way of partitioning
imposes huge burden on the running time of the algorithm. In fact, their algorithm
k
2
runs in nO(9 /ε ) log n time. Using access to the same-cluster query oracle, we
can obtain a significant reduction in the running time of the algorithm. We query
the oracle with pairs of vertices in S and since query answers are assumed to be
consistent with some unique optimal solution, optimal k clustering of vertices
in S is accomplished using at most k|S| same-cluster queries. Once we have a kpartitioning of sample S that is consistent with the optimal k-clusters, we follow
the remaining steps of [12]. The same approximation analysis as in [12] follows
for the query algorithm. For completeness we give the modified algorithm in
Figure 3.1. Let oracle A take any two vertices u and v as input and return ‘Yes’
if they belong to the same cluster in optimal clustering, and ‘No’ otherwise.
Here is the main theorem giving approximation guarantee of the above algorithm.
As stated earlier, the proof follows from the proof of a similar theorem (Theorem
4.7 in [12]) by Giotis and Guruswami.
Theorem 8. Let 0 < ε ≤ 1/2. For any input labelling, QueryMinDisAgree(k, ε/4)
returns a k-clustering with the number of disagreements within a factor of (1 + ε)
of the optimal. 4
4
Readers familiar with [12] will realise that the statement of the theorem is slightly
different from statement of the similar theorem (Theorem 13) in [12]. More
QueryMinDisAgree(k, α)
n
Input: Labeling L :
2
A : n2 → {Yes,No}.
Output: A k-clustering of G
1
Constants: c1 = 20
→
{+, −} of edges of graph G(V, E), Oracle
(1) If k = 1, return 1-clustering.
α2 c2
(2) Run QueryMaxAg on input L with accuracy 32k41 to obtain k-clustering ClusM ax.
5 log n
c1 α
independently and uniformly at
(3) Set β = 16k
2 . Pick sample S ⊆ V of size
β2
random with replacement from V .
(4) Optimally cluster S = {S1 , . . . , Sk } by making same-cluster queries to oracle A.
(5) Let Cj = Sj for 1 ≤ j ≤ k.
(6) For each u ∈ V \ S
(6.1) ∀i = 1, . . . , k: Let liu be the number of edges which agree between u and
nodes in Si .
(6.2) Let ju = arg maxi liu be the index of the cluster which maximizes the above
quantity.
(6.3) Cju = Cju ∪ {u}.
n
(7) Let the set of large and small clusters be Large = {j : 1 ≤ j ≤ k, |Sj | ≥ 2k
} and
Small = [k] \ Large.
(8) Let l = |Large|, and s = k − l.
(9) Cluster W = ∪j∈Small Sj into s clusters {W1 , . . . , Ws } using recursive calls to
QueryMinDisAgree(s, α).
(10) Let ClusM in be clustering obtained by k clusters {Sj }j∈Large and {Wt }{1≤t≤s} .
(11) Return the better of ClusM in and ClusM ax
Algorithm 3.1: Query version of the algorithm by Giotis and Guruswami.
Even though the approximation analysis of the query algorithm remains
the same as the non-query algorithm of Giotis and Guruswami, the running
time analysis changes significantly. Let us write a recurrence relation for the
running time of our recursive algorithm. Let T (k) denote the running time of
the algorithm when n node graph is supposed to be clustered into k clusters with
a given precision parameter α. Using the results of the previous subsection, the
13
running time of step (2) is O( nk α6log k ). The running time for partitioning the set
S is given by k|S| which is O( k
is
5
n
O( nk αlog
).
2
5
log n
α2 ).
Steps (6-8) would cost O(nk|S|) time which
So, the recurrence relation for the running time may be written
13
14
k log n
k log n
as T (k) = T (k − 1) + O( nk log
). This simplifies to O( nk log
). As
α6
α6
far as the same-cluster queries are concerned, we can write a similar recurrence
14
13
relation. Q(k) = Q(k − 1) + O( k logα6k log n ) which simplifies to O( k logα6k log n ).
This completes the proof of Theorem 2.
4
Conclusion and Open Problems
In this work, we give upper and lower bounds on the number of same-cluster
queries to obtain an efficient (1 + ε)-approximation for correlation clustering
on complete graphs in the SSAC framework of Ashtiani et al. Our lower bound
results are based on the Exponential Time Hypothesis (ETH). It is an interesting
open problem to give unconditional lower bounds for these problems. Another
interesting open problem is to design query based algorithms with faulty oracles.
This setting is more practical since in many contexts it may not be known
whether any two vertices belong to the same optimal cluster with high confidence.
Mitzenmacher and Tsourakakis [19] designed a query based algorithm for clustering
where query oracle, similar to our model, answers whether any two vertices
belong to the same optimal cluster or otherwise but these answers may be wrong
with some probability less than 12 . For k = 2, we can use their algorithm to
obtain (1 + ε)-approximation for MinDisAgree[k] with faulty oracle. However, for
k > 2 they needed stronger query model to obtain good clusterings. Designing
an efficient (1+ε)-approximation algorithm for MinDisAgree[k] with faulty oracle
is an interesting open problem.
References
1. Nir Ailon, Anup Bhattacharya, Ragesh Jaiswal, and Amit Kumar. Approximate
clustering with same-cluster queries. CoRR, abs/1704.01862, 2017.
2. Haris Angelidakis, Konstantin Makarychev, and Yury Makarychev. Algorithms
for stable and perturbation-resilient problems. In ACM SIGACT Symposium on
Theory of Computing, pages 438–451, 2017.
specifically, the claim is about the function call with ε/4 as a parameter rather than
ε. This is done to allow the recursive call in step (9) to be made with same value
of precision parameter as the initial call. This does not change the approximation
analysis but is crucial for our running time analysis.
3. Hassan Ashtiani, Shrinu Kushagra, and Shai Ben-David. Clustering with samecluster queries. In NIPS, pages 3216–3224, 2016.
4. Pranjal Awasthi, Maria-Florina Balcan, and Konstantin Voevodski.
Local
algorithms for interactive clustering. In ICML, pages 550–558, 2014.
5. Maria-Florina Balcan and Avrim Blum. Clustering with interactive feedback. In
International Conference on Algorithmic Learning Theory, pages 316–328, 2008.
6. Maria-Florina Balcan, Avrim Blum, and Anupam Gupta. Clustering under
approximation stability. Journal of the ACM (JACM), 60(2):8, 2013.
7. Maria Florina Balcan and Yingyu Liang. Clustering under perturbation resilience.
SIAM Journal on Computing, 45(1):102–155, 2016.
8. Nikhil Bansal, Avrim Blum, and Shuchi Chawla. Correlation clustering. Machine
Learning, 56(1-3):89–113, 2004.
9. Moses Charikar, Venkatesan Guruswami, and Anthony Wirth. Clustering with
qualitative information. Journal of Computer and System Sciences, 71(3):360–383,
2005.
10. Irit Dinur. The PCP theorem by gap amplification. J. ACM, 54(3):12, 2007.
11. Fedor V Fomin, Stefan Kratsch, Marcin Pilipczuk, Michał Pilipczuk, and Yngve
Villanger. Tight bounds for parameterized complexity of cluster editing with a
small number of clusters. Journal of Computer and System Sciences, 80(7):1430–
1447, 2014.
12. Ioannis Giotis and Venkatesan Guruswami. Correlation clustering with a fixed
number of clusters. In ACM-SIAM symposium on Discrete algorithm, pages 1167–
1176, 2006.
13. Russell Impagliazzo and Ramamohan Paturi. On the complexity of k-sat. Journal
of Computer and System Sciences, 62(2):367 – 375, 2001.
14. Russell Impagliazzo, Ramamohan Paturi, and Francis Zane. Which problems
have strongly exponential complexity? Journal of Computer and System Sciences,
63(4):512 – 530, 2001.
15. Konstantin Makarychev, Yury Makarychev, and Aravindan Vijayaraghavan.
Correlation clustering with noisy partial information. In COLT, pages 1321–1342,
2015.
16. Pasin Manurangsi. Almost-polynomial ratio eth-hardness of approximating densest
$k$-subgraph. CoRR, abs/1611.05991, 2016.
17. Claire Mathieu and Warren Schudy. Correlation clustering with noisy input. In
ACM-SIAM Symposium on Discrete Algorithms, pages 712–728, 2010.
18. Arya Mazumdar and Barna Saha. Query complexity of clustering with side
information. arXiv preprint arXiv:1706.07719, 2017.
19. Michael Mitzenmacher and Charalampos E Tsourakakis. Predicting signed edges
with o(n1+o(1) log n) queries. arXiv preprint arXiv:1609.00750, 2016.
20. Konstantin Voevodski, Maria-Florina Balcan, Heiko Röglin, Shang-Hua Teng, and
Yu Xia. Efficient clustering with limited distance information. In Conference on
Uncertainty in Artificial Intelligence, pages 632–640, 2010.
| 8cs.DS
|
Architecture of Environmental Risk Modelling: for a faster
and more robust response to natural disasters
Dario Rodriguez-Aseretto
a,1 ,
Christian Schaerer b , Daniele de Rigo
a,c
a
b
European Commission, Joint Research Centre, Institute for Environment and
Sustainability, Ispra (VA), Italy.
Polytechnic School, National University of Asuncion, San Lorenzo, Central, Paraguay.
c Politecnico di Milano, Dipartimento di Elettronica, Informazione e Bioingegneria,
Milano, Italy.
arXiv:1409.7966v1 [cs.CE] 28 Sep 2014
Abstract
Demands on the disaster response capacity of the European Union are likely
to increase, as the impacts of disasters continue to grow both in size and
frequency. This has resulted in intensive research on issues concerning
spatially-explicit information and modelling and their multiple sources of
uncertainty. Geospatial support is one of the forms of assistance frequently
required by emergency response centres along with hazard forecast and event
management assessment. Robust modelling of natural hazards requires dynamic simulations under an array of multiple inputs from different sources.
Uncertainty is associated with meteorological forecast and calibration of the
model parameters. Software uncertainty also derives from the data transformation models (D-TM) needed for predicting hazard behaviour and its
consequences. On the other hand, social contributions have recently been
recognized as valuable in raw-data collection and mapping efforts traditionally dominated by professional organizations. Here an architecture overview
is proposed for adaptive and robust modelling of natural hazards, following
the Semantic Array Programming paradigm to also include the distributed
array of social contributors called Citizen Sensor in a semantically-enhanced
strategy for D-TM modelling. The modelling architecture proposes a multicriteria approach for assessing the array of potential impacts with qualitative rapid assessment methods based on a Partial Open Loop Feedback
Control (POLFC) schema and complementing more traditional and accurate a-posteriori assessment. We discuss the computational aspect of environmental risk modelling using array-based parallel paradigms on High
Performance Computing (HPC) platforms, in order for the implications of
urgency to be introduced into the systems (Urgent-HPC).
Keywords: Geospatial, Integrated Natural Resources Modelling and Management,
Semantic Array Programming, Warning System, Remote Sensing, Parallel Application, High Performance Computing, Partial Open Loop Feedback Control
1
E-mail Corresponding Author: [email protected]
1
Cite as:
Rodriguez-Aseretto, D., Schaerer, C., de Rigo, D., 2014. Architecture of Environmental
Risk Modelling: for a faster and more robust response to natural disasters.
3rd Conference of Computational Interdisciplinary Sciences, Asunción, Paraguay
Rodriguez-Aseretto, D., Schaerer, C., de Rigo, D., 2014. Architecture of Environmental Risk
Modelling: for a faster and more robust response to natural disasters. CCIS 2014
1. INTRODUCTION: CONTEXT, PITFALLS AND THE SCIENCEPOLICY INTERFACE
Europe experienced a series of particularly severe disasters in the recent years
[1, 2], with worrying potential impacts of similar disasters under future projected
scenarios of economy, society and climate change [3, 4]. They range from flash
floods [5, 6, 7] and severe storms in Western Europe with an expected increasing
intensity trend [8], large-scale floods in Central Europe [9], volcanic ash clouds
[10, 11, 12] (e.g. after the Eyjafjallajkull eruption), large forest fires in Portugal and
Mediterranean countries [13, 14]. Biological invasions such as emerging plant pests
and diseases have the potential to further interact e.g. with wildfires [15] and to
impact on ecosystem services [16] and economy with substantial uncertainties [17].
It should be underlined that these recent highlights are set in the context of
systemic changes in key sectors [18, 19, 20] which overall may be expected to at
least persist in the next decades. As a general trend, demands on the EU’s resilience in preparedness and disaster response capacity are likely to increase, as
the impacts of disasters continue to grow both in size and frequency, even considering only the growing exposure (societal factors) [21, 22]. The aforementioned
examples of disturbances are often characterised by non-local system feedbacks
and off-site impacts which may connect multiple natural resources (system of systems) [23, 24, 25]. In this particular multifaceted context [26, 27, 28], landscape
[29] and ecosystem dynamics show intense interactions with disturbances [30].
As a consequence, classical disciplinary and domain-specific approaches which
might be perfectly suitable at local-scale may easily result in unacceptable simplifications within a broader context. A broad perspective is also vital for investigating future natural-hazard patterns at regional/continental scale and adapting preparedness planning [31, 32, 33]. The complexity and uncertainty associated with
these interactions – along with the severity and variety of the involved impacts [34]
– urge robust, holistic coordinated [35] and transparent approaches [36, 37]. At
the same time, the very complexity itself of the control-system problems involved
[38, 39, 40] may force the analysis to enter into the region of deep-uncertainty [41].
The mathematization of systems in this context as a formal control problem
should be able to establish an effective science-policy interface, which is not a trivial aspect. This is easily recognised even just considering the peculiarities – which
have been well known for a long time – of geospatially-aware environmental data
[42] and decision support systems [43, 44, 45], their entanglement with growingly
complex ICT aspects [46, 47] and their not infrequent cross-sectoral characterisation. Several pitfalls may degrade the real-world usefulness of the mathematization/implementation process. While it is relatively intuitive how a poor mathematization with a too simplistic approach might result in a failure, subtle pitfalls
may lie even where an “appropriately advanced” theoretical approach is proposed.
2
Rodriguez-Aseretto, D., Schaerer, C., de Rigo, D., 2014. Architecture of Environmental Risk
Modelling: for a faster and more robust response to natural disasters. CCIS 2014
Mathematization should resist silo thinking [48, 49] temptations such as academic
solution-driven pressures [37, 50] to force the problem into fashionable “hot topics”
of control theory: robust approximations of the real-world broad complexity may
serve egregiously instead of state-of-art solutions of oversimplified problems.
Other long-lasting academic claims are “towards” fully automated scientific
workflows in computational science, maybe including self-healing and self-adapting
capabilities of the computational models implementing the mathematization. These
kinds of claims might easily prompt some irony [51] among experienced practitioners in wide-scale transdisciplinary modelling for environment (WSTMe, [52]) as a
never-ending research Pandora’s box with doubtful net advantages [53]. Complex,
highly uncertain and sensitive problems for policy and society, as WSTMe problems typically are, will possibly never be suitable for full automation: even in this
family of problems, “humans will always be part of the computational process”
[54] also for vital accountability aspects [55].
While a certain level of autonomic computing [56] capabilities might be essential for the evolvability and robustness of WSTMe (in particular, perhaps, a higher
level of semantic awareness in computational models and a self-adapting ability
to scale up to the multiple dimensions of the arrays of data/parameters; see next
section), here the potential pitfall is the illusion of fully automating WSTMe. The
domain of applicability of this puristic academic silo – although promising for relatively simple, well-defined (and not too policy-sensitive) case studies – might be
intrinsically too narrow for climbing up to deal with the wicked problems typical
of complex environmental systems [57, 58, 59].
The discussed pitfalls might deserve a brief summary. First, perhaps, is the risk
of “solving the wrong problem precisely” [60] by neglecting key sources of uncertainty – e.g. unsuitable to be modelled within the “warmly supported” solution
of a given research group. During emergency operations, the risks of providing
a “myopic decision support” should be emphasised; i.e. suggesting inappropriate
actions [61] – e.g. inaction or missing precaution – due to the potential overwhelming lack of information [62] or the oversimplification/underestimation of potential
chains of impacts due to the lack of computational resources for a decent (perhaps
even qualitative and approximate) rapid assessment of them.
Overcoming these pitfalls is still an open issue. Here, we would like to contribute to the debate by proposing the integrated use of some mitigation approaches. We focus on some general aspects of the modelling architecture for the
computational science support, in order for emergency-operators, decision-makers,
stakeholders and citizens to be involved in a participatory [63] information and decision support system which assimilates uncertainty and precaution [64, 57]. Since
no silver bullet seems to be available for mitigating the intrinsic wide-extent of complexity and uncertainty in environmental risk modelling, an array of approaches is
3
Rodriguez-Aseretto, D., Schaerer, C., de Rigo, D., 2014. Architecture of Environmental Risk
Modelling: for a faster and more robust response to natural disasters. CCIS 2014
integrated and the computational aspects are explicitly connected with the supervision and distributed interaction of human expertise. This follows the idea that
the boundary between classical control-theory management strategies for natural
resources and hazards (driven by automatic control problem formulations – “minimize the risk score function”) and scenario modelling under deep-uncertainty (by
e.g. merely supporting emergency-operators, decision-makers and risk-assessors
with understandable information – “sorry, no such thing as a risk score function
can be precisely defined”) is fuzzy. Both modelling and management aspects may
be computationally intensive and their integration is a transdisciplinary problem
(integrated natural resources modelling and management, INRMM [65]).
2. ENVIRONMENTAL RISK MODELLING - ARCHITECTURE
Figure 1 illustrates a general modelling conceptualization where the interactions
among natural hazard behaviour, related transdisciplinary impacts, risk management and control strategies are taken into account. The special focus on the many
sources of uncertainty [36] leads to a robust semantically-enhanced modelling architecture based on the paradigm of Semantic Array Programming (SemAP) [66, 67],
with an emphasis on the array of input, intermediate and output data/parameters
and the array of data-transformation modules (D-TM) dealing with them.
ζ
Arrays of hazard models hjf (·), dynamic information forecasts X ζX (i.e. meteorology) and static parametrisation θ ζθ (i.e. spatial distribution of land cover)
are considered. Their multiplicity derives from the many sources on uncertainty
ζ = {ζf , ζX , ζθ } which affect their estimation (or implementation, for the D-TM
ζ
ζ
software modules fi f (·) which are the building blocks of the hazard models hjf (·)).
Furthermore, during emergency modelling support the lack of timely and accurate monitoring systems over large spatial extents (e.g. at the continental scale)
may imply a noticeable level of uncertainty to affect possibly even the location
of natural hazards (geoparsing [68] uncertainty). This peculiar information gap
may be mitigated by integrating remote sensing (e.g. satellite imagery) with a
distributed array of social contributors (Citizen Sensor [69, 70, 71]), exploiting
mobile applications (Apps) and online social networks [72]. Remote sensing and
the Citizen Sensor are here designed to cooperate by complementing accurate (but
often less timely) geospatial information with distributed alert notifications from
citizens, which might be timely but not necessarily accurate. Their safe integration
implies the supervision of human expertise, even if the task may be supported by
automatic tools [73]. Assessing the evolution in the timespan U t = [tbegin , tend ] of a
certain hazard event for the associated array of impacts C k,t may be also complex
(e.g. [41, 74, 75]). In particular, the array of impacts is often irreducible to a
unidimensional quantity (e.g. monetary cost) [76, 77].
4
Rodriguez-Aseretto, D., Schaerer, C., de Rigo, D., 2014. Architecture of Environmental Risk
Modelling: for a faster and more robust response to natural disasters. CCIS 2014
Figure 1 - Modular architecture for environmental risk modelling. Based on
Urgent HPC, it follows the Semantic Array Programming paradigm (image adapted
from [36, 52]) integrating as inputs remote sensing, meteo data and the Citizen Sensor.
The analysis of non-trivial systems subject to environmental risk and natural resources management may naturally lead to multi-objective (multi criteria) control
problems, which might benefit from advanced machine learning techniques for
5
Rodriguez-Aseretto, D., Schaerer, C., de Rigo, D., 2014. Architecture of Environmental Risk
Modelling: for a faster and more robust response to natural disasters. CCIS 2014
mitigating the involved huge computational costs [78]. Indeed, the multiplicity
of modelling dimensions (states; controls; uncertainty-driven arrays of parameters and scenarios; arrays of D-TM modules to account for software uncertainty)
may easily lead to an exponential increase of the required computational processes
(the so called “curse of dimensionality”). A viable mitigation strategy might be
offered by HPC tools (such as Urgent HPC [79, 80, 81]) in order to sample highdimensional modelling space with a proper method.
Box 1 – In a nutshell.
Context Demands on the EU’s resilience in preparedness and disaster response capacity
are likely to increase, as the impacts of disasters continue to grow.
• Classical disciplinary and domain-specific approaches which might be perfectly suitable at local-scale may result in unacceptable simplifications in a broader context.
Pitfalls Mathematization of systems in this contex as a formal control problem should be
able to establish an effective science-policy interface. Academic silo thinking should
stop advertising solution-driven oversimplification to fit control theory “hot topics”.
• Although in this family of problems “humans will always be part of the computational process” (despite any academic potential illusion of fashionable full automation),
• evolvability (for adapting models to new emerging needs and knowledge) and robustness (for supporting uncertainty-aware decision processes) would still need
. a higher level of semantic awareness in computational models and
. a self-adapting ability to scale up to the multiple dimensions of the arrays of
data/parameters.
Multiplicity: uncertainty and complexity In this context, the boundary between classical control-theory management strategies for natural resources and hazards and scenario modelling under deep-uncertainty is fuzzy (INRMM).
• A key aspect of soundness relies on explicitly considering the multiple dimensions
of the problem and the array of uncertainties involved.
• As no silver bullet seems to be available for reliably attacking this amount of
uncertainty and complexity, an integration of methods is proposed.
Mitigating with an integrated approach Array programming is well-suited for easily
managing a multiplicity of arrays of hazard models, dynamic input information, static
parametrisation and the distribute array of social contributions (Citizen Sensor).
• Array-based abstract – thus better scalable – modularisation of the data-transformations (D-TM), and a semantically-enhanced design of the D-TM structure and
interactions (Semantic Array Programming) is proposed to consider also the array
of uncertainties (data, modelling, geoparsing, software uncertainty) and the array of
criteria to assess the potential impacts associated with the hazard scenarios.
• The unevenly available information during an emergency event may be efficiently
exploited by means of a POLFC schema.
• Its demanding computations may become affordable during an emergency event
with an appropriate array-based parallelisation strategy within Urgent-HPC.
6
Rodriguez-Aseretto, D., Schaerer, C., de Rigo, D., 2014. Architecture of Environmental Risk
Modelling: for a faster and more robust response to natural disasters. CCIS 2014
SemAP can simplify WSTMe modelling of nontrivial static [82, 83] and dynamic
[41, 75, 84] geospatial quantities. Under the SemAP paradigm, the generic i-th
D-TM module Yi = fi (θi , Xi ) is subject to the semantic checks sem i as pre-, postconditions and invariants on the inputs θi , Xi , outputs Yi and the D-TM itself fi (·).
The control problem is associated with the unevenly available dynamic updates of
field measurements and other data related to an on-going hazard emergency. An
Emergency Manager may thus be interested in assessing the best control strategy
ut (·) given a set of impacts and their associated costs as they can be approximately
estimated (rapid assessment) with the currently available data. This data-driven
approach can be implemented as Partial Open Loop Feedback Control (POLFC)
approach [85] for minimizing the overall costs associated with the natural hazard
event, from the time t ∈ U t onwards:
1, t 2, t
C C · · · C k, t · · · C n, t
(1)
ut (·) = arg minu ∈ Utu, t
end
where the k-th cost C k, t is linked to the corresponding impact assessment criterion. This POLFC schema within the SemAP paradigm may be considered a
semantically-enhanced dynamic data-driven application system (DDDAS) [41, 75,
84]. Finally, the Emergency Manager may communicate the updated scenarios
of the emergency evolution (by means of geospatial maps and other executive
summary information) in order for decision-makers and stakeholders to be able to
assess the updated multi-criteria pattern of costs and the preferred control options.
This critical communication constitutes the science-policy interface and must be as
supportive as possible. It is designed to exploit web map services (WMS) [86, 87]
(on top of the underpinning free software for WSTMe, e.g. [88]) which may be
accessed in a normal browser or with specific Apps for smart-phones [73].
3. CONCLUDING REMARKS
NSF Cyberinfrastructure Council report reads: While hardware performance has
been growing exponentially - with gate density doubling every 18 months, storage capacity every 12 months, and network capability every 9 months - it has
become clear that increasingly capable hardware is not the only requirement for
computation-enabled discovery. Sophisticated software, visualization tools, middleware and scientific applications created and used by interdisciplinary teams are
critical to turning flops, bytes and bits into scientific breakthroughs [89]. Transdisciplinary environmental problems such as the ones dealing with complexity
and deep-uncertainty in supporting natural-hazard emergency might appear as
seemingly intractable [90]. Nevertheless, approximate rapid-assessment based on
computationally intensive modelling may offer a new perspective at least able
to support emergency operations and decision-making with qualitative or semi7
Rodriguez-Aseretto, D., Schaerer, C., de Rigo, D., 2014. Architecture of Environmental Risk
Modelling: for a faster and more robust response to natural disasters. CCIS 2014
quantitative scenarios. Even a partial approximate but timely investigation on
the potential interactions of the many sources of uncertainty might help emergency
managers and decision-makers to base control strategies on the best available –
although typically incomplete – sound scientific information. In this context, a
key aspect of soundness relies on explicitly considering the multiple dimensions
of the problem and the array of uncertainties involved. As no silver bullet seems
to be available for reliably attacking this amount of uncertainty and complexity,
an integration of methods is proposed, inspired by their promising synergy. Array
programming is perfectly suited for easily managing a multiplicity of arrays of hazard models, dynamic input information, static parametrisation and the distribute
array of social contributions (Citizen Sensor). The transdisciplinary nature of
complex natural hazards – their need for an unpredictably broad and multifaceted
readiness to robust scalability – may benefit (1) from a disciplined abstract modularisation of the data-transformations which compose the models (D-TM), and
(2) from a semantically-enhanced design of the D-TM structure and interactions.
These two aspects define the Semantic Array Programming (SemAP, [66, 67])
paradigm whose application – extended to geospatial aspects [52] – is proposed to
consider also the array of uncertainties (data, modelling, geoparsing, software uncertainty) and the array of criteria to assess the potential impacts associated with
the hazard scenarios. The unevenly available information during an emergency
event may be efficiently exploited by means of a partial open loop feedback control (POLFC, [85]) schema, already successfully tested in this integrated approach
[41, 75, 84] as a promising evolution of adaptive data-driven strategies [91]. Its
demanding computations may become affordable during an emergency event with
an appropriate array-based parallelisation strategy within Urgent-HPC.
References
[1] SIPPEL, S., OTTO, F.E.L., 2014. Beyond climatological extremes - assessing how the odds
of hydrometeorological extreme events in South-East Europe change in a warming climate.
Climatic Change: 1-18.
[2] CIRELLA, G.T., et al, 2014. Natural hazard risk assessment and management methodologies review: Europe. In: Linkov, I. (Ed.), Sustainable Cities and Military Installations.
NATO Science for Peace and Security Series C: Environmental Security. Springer Netherlands, pp. 329-358.
[3] CISCAR, J. C., et al, 2013. Climate impacts in Europe: an integrated economic assessment.
In: Impacts World 2013 - International Conference on Climate Change Effects. Potsdam
Institute for Climate Impact Research (PIK) e. V., pp. 87-96.
[4] CISCAR, J. C., et al, 2014. Climate Impacts in Europe - The JRC PESETA II project.
Vol. 26586 of EUR - Scientific and Technical Research. Publ. Off. Eur. Union, 155 pp.
[5] DANKERS, R., FEYEN, L., 2008. Climate change impact on flood hazard in Europe: An assessment based on high-resolution climate simulations. J.Geophys.Res.113(D19):D19105+.
[6] GAUME, E., et al, 2009. A compilation of data on European flash floods. Journal of
Hydrology 367(1-2): 70-78.
8
Rodriguez-Aseretto, D., Schaerer, C., de Rigo, D., 2014. Architecture of Environmental Risk
Modelling: for a faster and more robust response to natural disasters. CCIS 2014
[7] MARCHI, L., et al, 2010. Characterisation of selected extreme flash floods in Europe and
implications for flood risk management. Journal of Hydrology 394(1-2): 118-133.
[8] FESER, F., et al, 2014. Storminess over the North Atlantic and Northwestern Europe - a
review. Quarterly Journal of the Royal Meteorological Society.
[9] JONGMAN, B., et al, 2014. Increasing stress on disaster-risk finance due to large floods.
Nature Climate Change 4 (4): 264-268.
[10] SELF, S., 2006. The effects and consequences of very large explosive volcanic eruptions.
Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering
Sciences 364(1845): 2073-2097.
[11] SWINDLES, G. T., et al, 2011. A 7000 yr perspective on volcanic ash clouds affecting
northern Europe. Geology 39(9): 887-890.
[12] GRAMLING, C., 2014. As volcano rumbles, scientists plan for aviation alerts. Science
345(6200): 990.
[13] ALLARD, G., et al, 2013. State of Mediterranean forests 2013. FAO, 177 pp.
[14] SCHMUCK, G., et al, 2014. Forest Fires in Europe, Middle East and North Africa 2013.
Publications Office of the European Union. 107 pp.
[15] NIJHUIS, M., 2012. Forest fires: Burn out. Nature 489 (7416), 352-354.
[16] BOYD, I.L., et al, 2013. The consequence of tree pests and diseases for ecosystem services.
Science 342 (6160): 1235773+.
[17] VENETTE, R.C., et al, 2012. Summary of the international pest risk mapping workgroup
meeting sponsored by the cooperative research program on biological resource management
for sustainable agricultural systems. In: 6th International Pest Risk Mapping Workgroup
Meeting: ”Advancing risk assessment models for invasive alien species in the food chain:
contending with climate change, economics and uncertainty”. Organisation for Economic
Co-operation and Development (OECD), pp. 1-2.
[18] MAES, J., et al, 2013. Mapping and Assessment of Ecosystems and their Services - An
analytical framework for ecosystem assessments under action 5 of the EU biodiversity
strategy to 2020. Publications office of the European Union, 57 pp.
[19] EUROPEAN COMMISSION, 2013. Communication from the commission to the European
Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions - A new EU forest strategy: for forests and the forest-based sector.
No. COM(2013) 659 final. Communication from the Commission to the Council and the
European Parliament.
[20] EUROPEAN COMMISSION, 2013. Commission staff working document accompanying the
document: Communication from the commission to the European Parliament, the Council,
the European Economic and Social Committee and the Committee of the Regions - a
new EU forest strategy: for forests and the forest-based sector. Commission Staff Working
Document 2013 (SWD/2013/0342 final), 98pp.
[21] BARREDO, J. I., 2007. Major flood disasters in Europe: 1950-2005. Natural Hazards 42(1):
125-148.
[22] BARREDO, J. I., 2010. No upward trend in normalised windstorm losses in Europe: 19702008. Natural Hazards and Earth System Science 10(1): 97-104.
[23] EVANS, M. R., et al, 2012. Predictive ecology: systems approaches. Philosophical transactions of the Royal Society of London. Series B, Biological sciences 367(1586): 163-169.
[24] PHILLIS, Y. A., KOUIKOGLOU, V. S., 2012. System-of-Systems hierarchy of biodiversity
conservation problems. Ecological Modelling 235-236: 36-48.
[25] LANGMANN, B., 2014. On the role of climate forcing by volcanic sulphate and volcanic
ash. Advances in Meteorology 2014: 1-17.
[26] GOTTRET, M. V., WHITE, D., 2001. Assessing the impact of integrated natural resource
management: Challenges and experiences. Ecology and Society 5 (2): 17+
9
Rodriguez-Aseretto, D., Schaerer, C., de Rigo, D., 2014. Architecture of Environmental Risk
Modelling: for a faster and more robust response to natural disasters. CCIS 2014
[27] HAGMANN, J., et al, 2001. Success factors in integrated natural resource management
R&D: Lessons from practice. Ecology and Society 5 (2), 29+.
[28] ZHANG, X., et al, 2004. Scaling issues in environmental modelling. In: Wainwright, J.,
Mulligan, M. (Eds.), Environmental modelling : finding simplicity in complexity. Wiley.
[29] ESTREGUIL, C., et al, 2013. Forest landscape in Europe: Pattern, fragmentation and
connectivity. EUR - Scientific and Technical Research 25717 (JRC 77295), 18 pp.
[30] TURNER, R., 2010, Disturbance and landscape dynamics in a changing world. Ecology,
91 10: 2833-2849.
[31] Van WESTEN, C.J., 2013. Remote sensing and GIS for natural hazards assessment and
disaster risk management. In: Bishop, M. P. (Ed.), Remote Sensing and GIScience in
Geomorphology. Vol. 3 of Treatise on Geomorphology. Elsevier, pp. 259-298.
[32] URBAN, M.C., et al, 2012. A crucial step toward realism: responses to climate change
from an evolving metacommunity perspective. Evolutionary Applications 5 (2): 154-167.
[33] BAKLANOV, A., 2007. Environmental risk and assessment modelling - scientific needs
and expected advancements. In: Ebel, A., Davitashvili, T. (Eds.), Air, Water and Soil
Quality Modelling for Risk and Impact Assessment. NATO Security Through Science Series.
Springer Netherlands, pp. 29-44.
[34] STEFFEN, W., et al, 2011. The anthropocene: From global change to planetary stewardship. AMBIO 40 (7): 739-761.
[35] WHITE, C., et al, 2012. The value of coordinated management of interacting ecosystem
services. Ecology Letters 15 (6): 509-519.
[36] de RIGO, D., 2013, Software Uncertainty in Integrated Environmental Modelling: the role
of Semantics and Open Science. Geophys. Res. Abstr. 15: 13292+.
[37] de RIGO, D., (exp.) 2014. Behind the horizon of reproducible integrated environmental
modelling at European scale: ethics and practice of scientific knowledge freedom. F1000
Research, submitted.
[38] LEMPERT, R. J., May 2002. A new decision sciences for complex systems. Proceedings of
the National Academy of Sciences 99 (suppl 3): 7309-7313.
[39] RAMMEL, C., et al, 2007. Managing complex adaptive systems - a co-evolutionary perspective on natural resource management. Ecological Economics 63 (1): 9-21.
[40] van der SLUIJS 2012, J. P., 2012. Uncertainty and dissent in climate risk assessment: A
Post-Normal perspective. Nature and Culture 7 (2): 174-195.
[41] de RIGO, D., et al, 2013. An architecture for adaptive robust modelling of wildfire behaviour
under deep uncertainty. IFIP Adv. Inf. Commun. Technol. 413: 367-380.
[42] GUARISO, G., et al, 2000. A map-based web server for the collection and distribution of
environmental data. In: Kosmatin Fras, M., Mussio, L., Crosilla, F., Podobnikar, T. (Eds.),
Bridging the gap: ISPRS WG VI/3 and IV/3 Workshop, Ljubljana, February 2-5, 2000 :
Collection of Abstracts. Ljubljana.
[43] GUARISO, G., WERTHNER, H., 1989. Environmental decision support systems. E. Horwood; Halsted Press.
[44] GUARISO, G., et al, 1985. Decision support systems for water management: The lake
Como case study. European Journal of Operational Research 21(3): 295-306.
[45] SONCINI-SESSA, R., et al, 2007. Integrated and participatory water resources
management theory. Elsevier.
[46] GUARISO, G., PAGE, B. (Eds), 1994. Computer support for environmental impact
assessment: proceedings of the IFIP TC5/WG5.11 Working Conference on Computer
Support for Environmental Impact Assessment, CSEIA 93, Como, Italy, 6-8 October, 1993.
North-Holland.
[47] CASAGRANDI, R., GUARISO, G., 2009. Impact of ICT in environmental sciences: A
citation analysis 1990-2007. Environmental Modelling & Software 24 (7): 865-871.
10
Rodriguez-Aseretto, D., Schaerer, C., de Rigo, D., 2014. Architecture of Environmental Risk
Modelling: for a faster and more robust response to natural disasters. CCIS 2014
[48] COLE, J., 2010. Interoperability in a crisis 2: Human factors and organisational processes.
Tech. rep., Royal United Services Institute.
[49] STERMAN, J.D., 2002. All models are wrong: reflections on becoming a systems scientist.
System Dynamics Review 18 (4): 501-531.
[50] WEICHSELGARTNER, J., KASPERSON, R., 2010. Barriers in the science-policy-practice
interface: Toward a knowledge-action-system in global environmental change research.
Global Environmental Change 20 (2): 266-277.
[51] BAINBRIDGE, L., 1983. Ironies of automation. Automatica 19(6): 775-779.
[52] de RIGO, D., et al, 2013. Toward open science at the European scale: Geospatial
Semantic Array Programming for integrated environmental modelling. Geophysical
Research Abstracts 15: 13245+.
[53] STENSSON, P., JANSSON, A., 2013. Autonomous technology - sources of confusion: a
model for explanation and prediction of conceptual shifts. Ergonomics 57 (3): 455-470.
[54] RUSSELL, D. M., et al, 2003. Dealing with ghosts: Managing the user experience of
autonomic computing. IBM Systems Journal 42 (1): 177-188.
[55] ANDERSON, S., et al, 2003. Making autonomic computing systems accountable: the problem of human computer interaction. In: Database and Expert Systems Applications, 2003.
Proceedings. 14th International Workshop on. IEEE, pp. 718-724.
[56] KEPHART, J. O., CHESS, D. M. 2003. The vision of autonomic computing. Computer 36
(1): 41-50.
[57] van der SLUIJS, J.P., 2005. Uncertainty as a monster in the science-policy interface: four
coping strategies. Water Science & Technology 52 (6): 87-92.
[58] FRAME, B., 2008. ’Wicked’, ’messy’, and ’clumsy’: long-term frameworks for sustainability. Environment and Planning C: Government and Policy 26 (6): 1113-1128.
[59] MCGUIRE, M., SILVIA, C., 2010. The effect of problem severity, managerial and organizational capacity, and agency structure on intergovernmental collaboration: Evidence from
local emergency management. Public Administration Review 70(2): 279-288.
[60] BEA, R., et al, 2009. A new approach to risk: The implications of e3. Risk Management
11 (1): 30-43.
[61] ADAMS, K.M., HESTER, P.T., 2012. Errors in systems approaches. International Journal
of System of Systems Engineering 3 (3/4): 233+.
[62] LARSSON, A., et al, 2010. Decision evaluation of response strategies in emergency management using imprecise assessments. Journal of Homeland Security and Emergency Management 7 (1).
[63] INNOCENTI, D., ALBRITO, P., 2011. Reducing the risks posed by natural hazards and
climate change: the need for a participatory dialogue between the scientific community and
policy makers. Environmental Science & Policy 14 (7): 730-733.
[64] RAVETZ, J., 2004. The post-normal science of precaution. Futures 36 (3): 347-357.
[65] de RIGO, D., 2012. Integrated Natural Resources Modelling and Management: minimal
redefinition of a known challenge for environmental modelling. Excerpt from the Call for a
shared research agenda toward scientific knowledge freedom, Maieutike Research Initiative
[66] de RIGO, D., 2012, Semantic Array Programming for Environmental Modelling:
Application of the Mastrave Library. Int. Congress on Environmental Modelling and
Software. Managing Resources of a Limited Plant, 1167-1176.
[67] de RIGO, D., 2012. Semantic Array Programming with Mastrave - Introduction to Semantic
Computational Modelling.
[68] CORTI, P., et al, 2012. Fire news management in the context of the european forest fire
information system (EFFIS). In: proceedings of ”Quinta conferenza italiana sul software
geografico e sui dati geografici liberi” (GFOSS DAY 2012).
[69] SHETH, A., 2009. Citizen sensing, social signals, and enriching human experience. Internet
Computing, IEEE 13 (4): 87-92.
11
Rodriguez-Aseretto, D., Schaerer, C., de Rigo, D., 2014. Architecture of Environmental Risk
Modelling: for a faster and more robust response to natural disasters. CCIS 2014
[70] ZHANG, D., et al, 2011. The emergence of social and community intelligence. Computer
44 (7): 21-28.
[71] ADAM, N.R., et al, 2012. Spatial computing and social media in the context of disaster
management. Intelligent Systems, IEEE 27 (6): 90-96.
[72] FRATERNALI, P., et al, 2012. Putting humans in the loop: Social computing for water
resources management. Environmental Modelling & Software 37: 68-77.
[73] RODRIGUEZ-ASERETTO, D., et al, (exp.) 2014. Image geometry correction of daily
forest fire progression map using MODIS active fire observation and Citizens sensor. IEEE
Earthzine 7(2). Submitted.
[74] BOSCO, C., et al, 2013. Multi-Scale Robust Modelling of Landslide Susceptibility: Regional
Rapid Assessment and Catchment Robust Fuzzy Ensemble. IFIP Adv. Inf. Commun.
Technol. 413: 321-335.
[75] DI LEO, M., et al, 2013. Dynamic data driven ensemble for wildfire behaviour assessment:
a case study. IFIP Adv. Inf. Commun. Technol. 413: 11-22.
[76] ACKERMAN, F., HEINZERLING, L., 2002. Pricing the priceless: Cost-Benefit analysis
of environmental protection. University of Pennsylvania Law Review 150 (5): 1553-1584.
[77] GASPARATOS, A., 2010. Embedded value systems in sustainability assessment tools and
their implications. Journal of Environmental Management 91 (8): 1613-1622.
[78] de RIGO, D., et al, 2001. Neuro-dynamic programming for the efficient management of
reservoir networks. In: Proceedings of MODSIM 2001, International Congress on Modelling
and Simulation. Vol. 4. Model. Simul. Soc. Australia and New Zealand, pp. 1949-1954.
[79] RODRIGUEZ-ASERETTO, D., et al, 2009. Injecting dynamic Real-Time data into a
DDDAS for forest fire behavior prediction. Lecture Notes in Computer Science 5545: 489499.
[80] CENCERRADO, A., et al, 2009. Support for urgent computing based on resource virtualization. Lecture Notes in Computer Science 5544: 227-236.
[81] JOSHIMOTO, K, K, et al, 2012. Implementations of Urgent Computing on Production
HPC Systems. Procedia Computer Science 9: 1687-1693.
[82] de RIGO, D., BOSCO, C., 2011. Architecture of a Pan-European framework for integrated
soil water erosion assessment. IFIP Adv. Inf. Commun. Technol. 359: 310-318.
[83] de RIGO, D., et al, 2013. Continental-Scale Living Forest Biomass and Carbon Stock: A
Robust Fuzzy Ensemble of IPCC Tier 1 Maps for Europe. IFIP Adv. Inf. Commun. Technol.
359: 271-284.
[84] RODRIGUEZ-ASERETTO, D., et al, 2013. A data-driven model for large wildfire
behaviour prediction in Europe. Procedia Computer Science 18: 1861-1870.
[85] CASTELLETTI, A., et al, On-Line design of water reservoir policies based on inflow
prediction. IFAC-PapersOnLine 17: 14540-14545.
[86] MCINERNEY, D., et al, 2012. Developing a forest data portal to support Multi-Scale
decision making. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 5(6): 1692-1699.
[87] BASTIN, et al, 2012. Web services for forest data, analysis and monitoring: Developments
from EuroGEOSS. IEEE Earthzine 5(2): 389531+.
[88] RODRIGUEZ-ASERETTO, D., et al, 2013. Free and open source software underpinning
the European Forest Data Centre. Geophysical Research Abstracts 15: 12101+.
[89] NATIONAL SCIENCE FOUNDATION, CYBERINFRASTRUCTURE COUNCIL, 2007.
Cyberinfrastructure vision for 21st century discovery. Tech. Rep. NSF 07-28, National
Science Foundation.
[90] ALTAY, N., GREEN, W.G., 2006. OR/MS research in disaster operations management.
European Journal of Operational Research 175 (1): 475-493.
[91] RODRIGUEZ-ASERETTO, D., et al, 2008. An adaptive system for forest fire behavior
prediction. In: Computational Science and Engineering, 2008. CSE ’08. 11th IEEE International Conference on. IEEE, pp. 275-282.
12
| 5cs.CE
|
Emergent failures and cascades in power grids: a statistical physics perspective
Tommaso Nesti and Bert Zwart
CWI, Amsterdam
Alessandro Zocca
arXiv:1709.10166v1 [physics.soc-ph] 28 Sep 2017
California Institute of Technology
We consider complex networks where line failures occur indirectly as line flows are influenced
by fluctuating input at nodes, a prime example being a power grid where power is generated by
renewable sources. We examine the propagation of such emergent failures in the small noise regime,
combining concepts from statistical physics and the physics of power flow. In particular we characterize rigorously and explicitly the configuration of inputs responsible for failures and cascades, and
analyze the propagation of failures, which often is not of nearest-neighbor type.
Cascading failures in complex networks received a lot
of attention in recent years [1–3, 10, 11, 13, 16–19, 26, 29–
32]. Despite proposing different mechanisms for the cascade evolution, a common feature of all these works is
that the cascade is assumed to be triggered by some external initiating event or contingency. This initial contingency, or attack, is chosen either (i) deliberately, e.g. targeting the most vulnerable or crucial network component,
thus aiming for a worst-case analysis, or (ii) uniformly at
random, in order to understand the average reliability
of a network. This distinction led to the insight that
complex networks are resilient to random attacks, but
vulnerable to targeted attacks [8, 9, 19]. All attacks, random or deterministic, lead to direct failure of the target
network line or node.
regime where ε → 0. The parallel with statistical physics
allows us to determine the most likely configuration of
power injections that leads to failures and possibly cascades. Our results are explicit, and yield fundamental
insights into the way cascades occur. Though we focus
on a power grid, our approach is applicable to any network where fluctuations of the node inputs can trigger
line failures.
We now give a detailed model description. Our network is represented by a connected graph G with n nodes
representing the buses and m directed edges modeling the
transmission lines. The stochastic fluctuations of the net
power injections around their nominal values µ ∈ Rn are
modeled as a multivariate n-dimensional Gaussian random vector with mean µ
In the present work, we look at networks where line failures occur indirectly, by small fluctuations at the nodes.
Our inspiration is drawn from the power grid [5, 12], and
its potential vulnerability to fluctuations of renewable energy sources. Specifically, we look at the power grid as a
static noise-perturbed system, where nodes are attacked
globally but indirectly in the form of small fluctuations in
the power injections. Due to the interplay between network structure, correlations in the power injections, and
power flow physics, these fluctuations may cumulate so
that line failures emerge, possibly triggering cascades.
p ∼ Nn (µ, εΣp ),
This is highly relevant due to the increasing penetration of renewable energy sources in modern power grids
and their susceptibility to weather conditions. This development poses several challenges to the design and control of such networks: intermittent and highly correlated
power generation causes random fluctuations in the line
power flows, possibly yielding outages and cascading failures. It is then of crucial importance to develop appropriate physical models that give fundamental insight.
The emerging nature of failures challenges the analysis.
To tackle this, we use ideas from statistical physics and
large deviations theory. We consider a stochastic model
for the network power injections similar to that proposed
in [28], introduce a positive real parameter ε describing
the magnitude of the noise and focus on the small-noise
(1)
with the convention that pi is the net power injected at
node i. Differently for the usual assumption of the fluctuations being independent and identically distributed, we
can allow for heterogeneous standard deviations of the
power injections at the various nodes as well as for dependencies between of the fluctuations in different nodes
by choosing a non-trivial covariance matrix Σp . This is
instrumental, for instance, to model positive correlations
due to geographical proximity of wind turbines and solar panels. Gaussianity is consistent with atmospheric
physics [6, Section 1.7] and wind turbine statistics [4].
Assuming the mean power injection vector µ has zero
sum and using the DC approximation [5, Chapter 4], the
line power flows f are
f = V p,
(2)
where V is a m×n matrix that encodes the power network
topology and weights (modeling susceptances).
The assumption that the mean power injection vector
µ has zero sum does not guarantee
that the total net
Pn
power injected in the network i=1 pi is equal to zero as
p is a random vector. This minor technical issue can be
easily resolved by assuming that the total power injection
mismatch is distributed uniformly among all the nodes
2
(we account for this in the matrix V , for details see the
Supplemental Material).
In view of assumptions (1) and (2), the line power
flows f also follow a multivariate Gaussian distribution,
namely f ∼ Nm (ν, εΣf ). The vector ν = V µ ∈ Rm describes the average line flows, while the covariance matrix
Σf = V Σp V T describes the correlations between line
flows taking in account both by the correlations of the
power injections (encoded by the matrix Σp ) and those
created by the network topology due to the physics of
the power flows (Kirchhoff’s laws) via the matrix V .
A line overloads if the absolute amount of power flowing in it exceeds a given line threshold. We assume that
such an overload immediately leads to the outage of the
corresponding line, to which we will henceforth refer simply as line failure. The failure of a line cause a global
redistribution of the line power flows according to Kirchhoff’s laws, which could trigger further failures and cascades.
Without loss of generality, we assume that the matrix
V also contains information about the line thresholds, so
that f is the vector of normalized line power flows and
the failure of line ℓ is described by the event {|fℓ | ≥ 1}.
We consider a scenario where the power grid operates
on average safely within the limits by assuming that
maxℓ=1,...,m |νℓ | < 1 so that only large fluctuations of
line flows lead to failures, which correspondingly become
rare events as ε → 0. To assess how much a network is
“robust” against initiating failure and identify its most
vulnerable lines, we derive the exponential decay of probabilities of single line failure events, namely {|fℓ | ≥ 1} for
ℓ = 1, . . . , m. The theory of large deviations [27] is concerned precisely with calculating the exponential decay
of rare events probabilities, which are usually referred to
as rate functions or entropy functions. Since line flows
have been normalized, we are interested in evaluating the
rate function describing the failure event of any line ℓ in
a single point, i.e. 1, and we refer to the corresponding
value Iℓ as failure decay rate. Thanks to the fact that the
line power flow are Gaussian, we can explicitly calculate
Iℓ , see [27, Example 3.1], as
(1 − |νℓ |)2
,
2σℓ2
Iℓ = − lim ε log Pε (|fℓ | ≥ 1) =
ε→0
(3)
where σℓ2 = (Σf )ℓ,ℓ is the variance of the line flow fℓ .
Thus, for small ε, we can approximate the probability of
the emergent failure of line ℓ as
P(|fℓ | ≥ 1) ≈ exp(−Iℓ /ε),
(4)
and that of the first emergent failure as
how large the variance σℓ2 is. Note that σℓ2 accounts for
the power injections variability and correlations as well
as for how much the network possibly amplifies or mitigates them. Decay rates can be used to identify lines that
are most susceptible to the system’s noise, as illustrated
by Figure 1.
FIG. 1: Failure decay rates {Iℓ }ℓ=1,...,m heat-map for the
IEEE 118-bus test system. The likelihood of line failures is
visualized using a color gradient in which the red lines are the
most vulnerable ones.
Large deviations theory provides further analytic tools
that give valuable insight in understanding the way a specific rare event occurs. Conditionally on the failure of line
ℓ, the power injections configuration exhibits a sensible
(“large”) deviation from its mean that is characterized by
p(ℓ) =
1
(p − µ)T Σ−1
p (p − µ).
2
p|≥1
arg inf
p∈Rn
: |eT
V
ℓ
(6)
Provided that νℓ 6= 0, the solution is unique and reads
p(ℓ) = µ +
(sign(νℓ ) − νℓ ) p
Σp V T e ℓ ∈ Rn ,
σℓ2
(7)
where sign(a) = 1 if a ≥ 0 and −1 otherwise, while eℓ ∈
Rm is the vector with the ℓ-th entry equal to 1 and zeros
elsewhere (details in the Supplemental Material).
A key finding is that an emergent line failure does not
occur due to large deviations in the power injections of
the neighboring nodes, but as a cumulative effect of small
unusual fluctuations of the power injections in the entire
network “summed up” by power flow physics, see Figure 2.
Our approach allows to differentiate between different
types of line failures: by calculating the line power flow
profile f (ℓ) := V p(ℓ) corresponding to the most likely
power injections configuration leading to the failure of
line ℓ, we can assess whether the most likely way for failure of line ℓ to occur is as
(ℓ)
(5)
• an isolated failure, if |fk | < 1 for any line k 6= ℓ,
or
The decay rate Iℓ depends on how close the (normalized) average power flow νℓ is to the threshold 1 and
• a joint failure of multiple lines together, if there
(ℓ)
exists some other line k 6= ℓ such that |fk | ≥ 1.
P(max |fℓ | ≥ 1) ≈ exp(− min Iℓ /ε).
ℓ
ℓ
3
FIG. 2: Representation of the most likely power injections
configuration of the IEEE 118-bus test system leading to the
failure of the green line. Nodes size is adjusted proportionally
to their deviations from their mean, while their color describes
whether these deviations are positive (blue) or negative (red)
flow on the unique remaining path in the opposite direction. This observation can be made rigorous by showing
(ℓ)
that the redistribution coefficients are φk = −1 for every k 6= ℓ. It is intuitive that neighboring lines have
positive correlated power flows, while distant lines have
negative correlations as power flows must sum to zero by
Kirchhoff’s law. Hence, the most likely power injections
configuration that makes the power flow in line ℓ exceeding the line threshold (say by becoming larger than 1)
also makes the power flows in the antipodal half of the
network negative. These will then go beyond the line
threshold (by becoming smaller than −1) after the power
flow redistributes, see Figure 3.
-13/35-1
-13/35
-3/7
The resulting non-standard power injections configurae (ℓ) (a
tion p(ℓ) redistributes across an altered network G
subgraph of the original graph G) in which line ℓ (and
possible other lines, in case of a joint failure) has been
removed, possibly increasing the stress on the remaining
e(ℓ) is
lines. The way this redistribution happens on G
governed by the power flow physics and we assume that
it occurs instantaneously, without any transient effects.
The power flow redistribution amounts to compute a new
matrix Ve linking the power injections and the new power
e(ℓ)
flows. The most likely power flow configuration on G
(ℓ)
(ℓ)
after redistribution is then fe = Ve p .
In the special case of an isolated failure (say of line ℓ) it
is enough to calculate only a vector φ(ℓ) ∈ Rm−1 of redistribution coefficients, known as line overload distribution
factors (LODF) in power system engineering. Indeed,
e (ℓ) after rethe most likely power flow configuration on G
(ℓ)
(ℓ)
(ℓ)
e
distribution is equal to f = (fk )k6=ℓ ± φ , where the
sign of the second term depends to the direction in which
the power flowed on line ℓ when the overload occurred.
The power flow configuration fe(ℓ) can be efficiently
used to determine which lines will fail with high probability as a consequence of the original (possibly joint) failure,
(ℓ)
by checking for which line indices k we have |fek | ≥ 1, see
the Supplemental Material for more details.
A rigorous probabilistic theory of emergent cascading
failures can be developed by combining these two ingredients, the statistical physics results describing the most
likely power injections configuration leading to the first
failure and the power flow redistribution in the network
afterwards. In particular, this approach explains several
qualitative features of cascades in power grids that have
been observed empirically, the most prominent one being
the non-local propagation of failures.
We now illustrate how our framework can transparently explain this phenomenon using a ring network, in
which there are exactly two paths along which the power
can flow between any two nodes. Upon the failure of
line ℓ, the power originally flowing on line ℓ must now
-3/7
-1/7
-1/7
1/7-1
1/7
-19/35-1
-19/35
-5/7
1/7
-13/35
1
5/7
1/7
3/7
-5/7
1/7
-13/35-1
failed
5/7
1/7-1
3/7
FIG. 3: On the left, the most likely power injections p(ℓ) leading to the failure in black and power flows f (ℓ) in blue. On the
right, the situation after the power flow redistribution with
(ℓ)
three subsequent failures and the values of fe(ℓ) = (fk −1)k6=ℓ
in blue
Non-local failure propagation thus emerges from the interplay between the power flow configuration just before
the line failure and the network structure, which determines the alternative paths along which power could flow
after the line failure. Figure 4 shows an example of nonlocal failure propagation on a IEEE test system.
FIG. 4: The power injection configuration for the IEEE 118bus test system that most likely causes the failure of green
line after the power redistribution causes the red line to fail.
The most likely power injection configuration leading
to the emergent failure of a given line can be used in
combination with power flow redistribution routines to
generate the failures triggered by that initial scenario.
By repeating this procedure for all lines, one can obtain
4
Graph % joint failures E(F1ec )
IEEE14
65.0%
4.40
IEEE30
97.6%
3.73
IEEE39
80.4%
4.78
88.5%
8.00
IEEE57
IEEE96
72.2%
6.70
IEEE118
91.6%
10.40
87.0%
18.13
IEEE300
E(F2ec )
8.40
9.88
11.39
19.00
21.47
24.53
39.19
E(F2cc )
4.95
4.95
4.85
10.44
7.31
7.56
7.42
built using our large deviations approach. The cliques
of the influence graph (i.e. its maximal fully connected
subgraphs) can then be used to identify clusters of cosusceptable lines [34], which are the lines that statistically
fail often in the same cascade event.
Table I: Percentage of joint failures in emergent cascades and
average number of failed lines F1 up to stage 1 and F2 up to
stage 2 for emergent cascades (ec) and classical cascades (cc)
for some IEEE test systems.
insightful statistics of the first two stages of emergent
cascading failures (ec) and compare them with those of
classical cascading failures (cc), obtained using nominal
power injection values rather than the most likely ones
and deterministic removal of the initial failing line. For
these numerical experiments, line thresholds are taken to
be proportional to the average absolute power flow on the
corresponding lines, i.e. Cℓ = (1 + α)|νℓ | with α = 0.25,
and Σp to be the identity matrix.
As shown in Table I, emergent cascades have a very
high percentage of joint failures and an average number
of failures in the first cascade stage much larger than one
(in classical cascades only one line is removed in the first
cascade stage). Furthermore, the expected total number
of failed lines up to the second cascade stage is significantly larger for emergent cascades than for classical cascades. Lastly, failures propagate in emergent cascades on
average a bit less far than in classical cascades, as illustrated by the statistics of the failure jumping distance in
Table II.
Graph E(Dec )
IEEE14 0.388
IEEE30 0.754
IEEE39 0.898
IEEE57 1.210
IEEE96 1.450
IEEE118 0.679
IEEE300 1.408
E(Dcc )
0.987
1.198
1.633
2.507
1.781
1.638
2.580
cv (Dec )
0.600
0.879
0.891
0.863
0.879
0.745
0.806
cv (Dcc )
1.050
1.115
1.149
1.415
0.946
1.169
1.081
Table II: Average and coefficient of variation of the failure
jumping distance D in stage 2 both for emergent cascades
(ec) and classical cascades (cc). The distance between two
lines is measured as the shortest path between any of their
endpoints.
Our approach also gives a constructive way to build
the so-called “influence graph” [14, 15, 22], in which a directed edge connects lines ℓ and ℓ′ if the failure of the line
ℓ triggers (simultaneously or after redistribution) that of
line ℓ′ . Figure 5 shows an example of influence graph
FIG. 5: The influence graph of the IEEE 118-bus test system (in black) built using the first two stages of all cascade
realizations has a deeply different structure than the original
network (in blue)
The proposed viewpoint on endogenous cascade failures can have important practical implications in terms
of power system reliability: the most likely power injection configurations leading to (possibly joint) failures can
be leveraged to improve the current N −1 safety criterion
which uses nominal values of power injection configurations.
[1] R. Albert, I. Albert, and G. Nakarado. Structural vulnerability of the North American power grid. Physical
Review E, 69(2):025103, feb 2004.
[2] R. Albert and A.-L. Barabási. Statistical mechanics of
complex networks. Reviews of Modern Physics, 74(1):47–
97, 2002.
[3] R. Albert, H. Jeong, and A.-L. Barabási.
Error
and attack tolerance of complex networks. Nature,
406(6794):378–382, jul 2000.
[4] J. Berg, A. Natarajan, J. Mann, and E. Patton. Gaussian vs non-Gaussian turbulence: impact on wind turbine
loads. Wind Energy, 19(11):1975–1989, 2016.
[5] D. Bienstock. Electrical Transmission System Cascades
and Vulnerability. SIAM, Philadelphia, dec 2015.
[6] D. Bienstock, M. Chertkov, and S. Harnett. ChanceConstrained Optimal Power Flow: Risk-Aware Network
Control under Uncertainty. SIAM Review, 56(3):461–495,
2014.
[7] H. Cetinay, F. Kuipers, and P. Van Mieghem. A Topological Investigation of Power Flow. IEEE Systems Journal,
pages 1–9, 2016.
[8] R. Cohen, K. Erez, D. Ben-Avraham, and S. Havlin. Resilience of the Internet to random breakdowns. Physical
Review Letters, 85(21):4626–4628, 2000.
[9] R. Cohen, K. Erez, D. Ben-Avraham, and S. Havlin.
Breakdown of the Internet under Intentional Attack.
5
Physical Review Letters, 86(16):3682–3685, apr 2001.
[10] P. Crucitti, V. Latora, and M. Marchiori. Model for cascading failures in complex networks. Physical Review E,
69(4):045104, apr 2004.
[11] P. Crucitti, V. Latora, M. Marchiori, and A. Rapisarda.
Efficiency of scale-free networks: error and attack tolerance. Physica A: Statistical Mechanics and its Applications, 320:622–642, mar 2003.
[12] I. Dobson, B. Carreras, V. Lynch, and D. Newman.
Complex systems analysis of series of blackouts: Cascading failure, critical points, and self-organization.
Chaos: An Interdisciplinary Journal of Nonlinear Science, 17(2):026103, jun 2007.
[13] D. Heide, M. Schäfer, and M. Greiner. Robustness of
networks against fluctuation-induced cascading failures.
Physical Review E, 77(5):056103, may 2008.
[14] P. Hines, I. Dobson, E. Cotilla-Sanchez, and M. Eppstein. ”Dual Graph” and ”Random Chemistry” Methods
for Cascading Failure Analysis. In 2013 46th Hawaii International Conference on System Sciences, pages 2141–
2150. IEEE, jan 2013.
[15] P. Hines, I. Dobson, and P. Rezaei. Cascading Power
Outages Propagate Locally in an Influence Graph that
is not the Actual Grid Topology. IEEE Transactions on
Power Systems, 32(2):1–1, 2016.
[16] R. Kinney, P. Crucitti, R. Albert, and V. Latora. Modeling cascading failures in the North American power grid.
European Physical Journal B, 46(1):101–107, 2005.
[17] B. Mirzasoleiman, M. Babaei, M. Jalili, and M. Safari.
Cascaded failures in weighted networks. Physical Review
E, 84(4):046114, oct 2011.
[18] A. Motter. Cascade control and defense in complex networks. Physical Review Letters, 93(9):1–4, 2004.
[19] A. Motter and Y.-C. Lai. Cascade-based attacks on complex networks. Physical Review E, 66(6):065102, 2002.
[20] L. Powell. Power system load flow analysis. McGraw Hill,
2004.
[21] K. Purchala, L. Meeus, D. Van Dommelen, and R. Belmans. Usefulness of DC power flow for active power flow
analysis. In IEEE Power Engineering Society General
Meeting, pages 2457–2462. IEEE, 2005.
[22] J. Qi, K. Sun, and S. Mei. An Interaction Model for Simulation and Mitigation of Cascading Failures. IEEE Transactions on Power Systems, 30(2):804–819, mar 2015.
[23] M. Schaub, J. Lehmann, S. Yaliraki, and M. Barahona.
Structure of complex networks: Quantifying edge-to-edge
relations by failure-induced flow redistribution. Network
Science, 2(01):66–89, apr 2014.
[24] S. Soltan, D. Mazauric, and G. Zussman. Analysis of
Failures in Power Grids. IEEE Transactions on Control
of Network Systems, 4(2):288–300, jun 2017.
[25] B. Stott, J. Jardim, and O. Alsac. DC Power Flow Revisited. IEEE Transactions on Power Systems, 24(3):1290–
1300, 2009.
[26] S. Sun, Z. Liu, Z. Chen, and Z. Yuan. Error and attack
tolerance of evolving networks with local preferential attachment. Physica A: Statistical Mechanics and its Applications, 373:851–860, jan 2007.
[27] H. Touchette. The large deviation approach to statistical
mechanics. Physics Reports, 478(1-3):1–69, jul 2009.
[28] Z. Wang, A. Scaglione, and R. Thomas. A MarkovTransition Model for Cascading Failures in Power Grids.
In 2012 45th Hawaii International Conference on System
Sciences, pages 2115–2124. IEEE, jan 2012.
[29] D. Watts. A simple model of global cascades on random
networks. Proceedings of the National Academy of Sciences, 99(9):5766–5771, apr 2002.
[30] D. Witthaut, M. Rohden, X. Zhang, S. Hallerberg, and
M. Timme. Critical Links and Nonlocal Rerouting in
Complex Supply Networks. Physical Review Letters,
116(13):138701, mar 2016.
[31] D. Witthaut and M. Timme. Nonlocal failures in complex
supply networks by single link additions. The European
Physical Journal B, 86(9):377, sep 2013.
[32] D. Witthaut and M. Timme. Nonlocal effects and countermeasures in cascading failures. Physical Review E,
92(3):032809, sep 2015.
[33] A. Wood, B. Wollenberg, and G. Sheble. Power generation, operation, and control. John Wiley & Sons, 3rd
edition, 2014.
[34] Y. Yang, T. Nishikawa, and A. Motter. Vulnerability and
Cosusceptibility Determine the Size of Network Cascades.
Physical Review Letters, 118(4):048301, 2017.
SUPPLEMENTAL MATERIAL
Power grid model and DC approximation
We model the power grid network as a connected
weighted graph G with n nodes, modeling buses, and m
edges, representing the transmission lines. Choosing an
arbitrary but fixed orientation of the transmission lines,
the network structure is described by the edge-vertex incidence matrix B ∈ Rm×n definite entry-wise as
if ℓ = (i, j),
1
(8)
Bℓ,i = −1 if ℓ = (j, i),
0
otherwise.
Denote by βℓ = βi,j = βj,i > 0 the weight of edge
ℓ = (i, j), corresponding to the susceptance of that transmission line. By convention, we set βi,j = βj,i = 0 if there
is no transmission line between i and j. Denote by W the
m×m diagonal matrix defined as W := diag(β1 , . . . , βm ).
The network topology and weights are simultaneously encoded in the weighted Laplacian matrix of the graph G,
defined as L := B T W B or entry-wise as
(
−βi,j
if i 6= j,
Li,j = P
(9)
if i = j.
k6=j βi,k
Denote by J ∈ Rn×n the matrix with all entries equal
to one. The relation between any vector of power injections p ∈ Rn and the phase angles θ ∈ Rn they induce in
the network nodes can be written in matrix form as
θ = L+ Sp,
(10)
where L+ ∈ Rn×n is the Moore-Penrose pseudo-inverse of
L and the matrix S := I − n1 J ∈ Rn×n acts as a “global
slack”, ensuring that the net power injection is always
6
identically zero. Exploiting the eigenspace structure of
L, L+ can be calculated as
1 −1 1
(11)
− J,
L+ = L + J
n
n
In the literature, instead of L+ it is commonly used
another matrix L̂, calculated using the inverse of the
(n − 1) × (n − 1) sub-matrix obtained from L deleting the
first row and first column the matrix L. In our method
we are implicitly choosing an average value of zero as a
reference for the nodes voltage phase angles, while in the
classical one the first node is used as reference by setting
is phase angle equal to zero. We remark that these two
procedure are equivalent if one is interested in the line
power flows, as these latter depend only on the phase
angle differences.
We make use of the DC approximation, which is commonly used in high-voltage transmission system analysis [20, 21, 25, 33], according to which the real power
flows fˆ are related with the phase angles θ via the linear
relation fˆ = Bθ. In view of (10), the line power flow fˆ
can be written as a linear transformation of the power
injections p, i.e.
fˆ = W BL+ Sp.
(12)
It is convenient to look at the normalized line power flow
vector f ∈ Rm , defined component-wise as fℓ := fˆℓ /Cℓ
for every ℓ = 1, . . . , m, where Cℓ is the line threshold,
which we define using the nominal average power injection vector µ and choosing a tolerance parameter α > 0
as
Cℓ = (1 + α)|(W BL+ Sµ)ℓ |,
ℓ = 1, . . . , m.
(13)
The relation between line power flows and normalized
power flows can be rewritten as f = C fˆ, where C is the
−1
m×m diagonal matrix C := diag(C1−1 , . . . , Cm
). In view
of (12), the normalized power flows f can be expressed
in terms of the power injections p as
f = V p,
(14)
where V := CW BL+ S ∈ Rm×n .
The most likely power injection configuration p(ℓ) ∈ Rn
given the event {|(fε )ℓ | ≥ 1} is the solution of the variational problem
p(ℓ) =
1
(p − µ)T Σ−1
p (p − µ).
p∈Rn : |eT V p|≥1 2
arg inf
which, when νℓ 6= 0, can be explicitly computed as
p(ℓ) = µ +
(sign(νℓ ) − νℓ ) p
Σp V T e ℓ .
σℓ2
f (ℓ) = V p(ℓ) = ν +
(sign(νℓ ) − νℓ )
V Σp V T eℓ ∈ Rm . (18)
σℓ2
The vector f (ℓ) can be also seen as the conditional expectation of random line power flow vector fε conditional on
the failure event {fℓ = sign(νℓ )}, namely
f (ℓ) = E[fε | (fε )ℓ = sign(νℓ )],
(19)
and thus, in particular, for every k = 1, . . . , m
(ℓ)
fk = νk + (sign(νℓ ) − νℓ )
Cov(fℓ , fk )
.
Var(fℓ )
(20)
Note that the case νℓ = 0 has been excluded only for
compactness. Indeed, in that case the variational problem (16) has two solutions, p(ℓ,+) and p(ℓ,−) . This is easily
explained as if the power flow on line ℓ has mean νℓ = 0,
then it is equally likely for the overload event {|fℓ | ≥ 1}
to occur as {fℓ ≥ 1} or as {fℓ ≤ −1} and the most likely
power injection configurations that trigger them can be
different.
The previous proposition immediately yields the large
deviation principle also for the first line failure event
{kfε k∞ ≥ 1}, which reads
ε→0
In the following statement we write fε to stress the
dependence of the line power flows on the noise parameter
ε.
(17)
The line power flows corresponding to the power injection configuration p(ℓ) can be calculated as
(1 − |νℓ |)2
.
ℓ=1,...,m
2σℓ2
lim ε log P(||fε ||∞ ≥ 1) = − min
Large deviation principles for failure events
(16)
ℓ
(21)
Indeed, the decay rate for the event that at least one
line fails is equal to the minimum of the decay rates for
the failure of each line. The most likely power injections
configuration that leads to the event {kfε k∞ ≥ 1} is
2
∗
ℓ |)
.
p(ℓ ) with ℓ∗ = arg minℓ=1,...,m (1−|ν
2σ2
ℓ
Proposition 1 Assume that maxj=1,...,m |νk | < 1.
Then, for every ℓ = 1, . . . , m, the sequence of line power
flows (fε )ε>0 satisfies the large deviations principle
lim ε log P(|(fε )ℓ | ≥ 1) = −
ε→0
(1 − |νℓ |)2
.
2σℓ2
(15)
Proof of Proposition 1.
Let (Z (i) )i∈N be a sequence of i.i.d. multivariate
Pn normal
vectors Z (i) ∼ Nm (ν, Σ), and let Sn := n1 i=1 Z (i) be
the sequence of the partial sums. By setting ε = n1 , it
d
immediately follows that that fε = Sn . Denote g(p) :=
7
1
T −1
2 (p − µ) Σp (p − µ).
Following [27, Section 3.D], we get
1
log P((Sn )ℓ ≥ 1) =
n
(1 − νℓ )2
=−
inf
g(p) = −
,
(22)
2σℓ2
p∈Rn : eT
V p≥1
ℓ
1
log P((Sn )ℓ ≤ −1) =
lim ε log P((fε )ℓ ≤ −1) = lim
n→∞ n
ε→0
(−1 − νℓ )2
=−
inf
g(p) = −
.
(23)
2σℓ2
p∈Rn : eT
V p≤−1
ℓ
lim ε log P((fε )ℓ ≥ 1) = lim
n→∞
ε→0
The optimizers of problems (22) and (23) are easily computed respectively as as
p(ℓ,+)
p(ℓ,−)
1 − νℓ p
Σp V T e ℓ ,
=µ+
σℓ2
−1 − νℓ p
=µ+
Σp V T e ℓ .
σℓ2
inf
= min
n
g(p) =
inf
p∈Rn : eT
V p≥1
ℓ
g(p),
inf
p∈Rn : eT
V p≤−1
ℓ
Cℓ Ra,j − Ra,i + Rb,i − Rb,j
·
,
Ck
2(1 − βℓ Ri,j )
(26)
It is easy to prove that in a ring network with homogeneous line thresholds and susceptances φℓ,k = −1 for
every ℓ 6= k.
More in general (hence also in the case of joint failures), the most likely power flow configuration fe(ℓ) after
redistribution in general can be written as
φℓ,k = φ(i,j),(a,b) := βk ·
fe(ℓ) = Ve p(ℓ) ,
(27)
where the (m−j(ℓ))×n matrix Ve can be constructed analogously to V , but considering the altered graph G(ℓ) instead of G. The next proposition shows that it is enough
to look at the vector fe(ℓ) to determine whether a line
that survived at the first cascade stage (i.e. that did not
fail jointly with ℓ) will fail with high probability or not
after the power redistribution (e.g. at the second cascade
stage).
Note that trivially
p∈Rn : |eT
V p|≥1
ℓ
where if ℓ = (i, j) and k = (a, b) the coefficient φℓ,k ∈ R
can be computed as
o
g(p) ,
(ℓ)
and thus identities (15) and (16) immediately follow.
Proposition 2 For any δ ∈ (0, 1), define Qδ := {y ∈
Rm−j(ℓ) : |yi | ≤ 1 − δ}. The following statement hold:
(ℓ)
i) If |fek | < 1 for any k 6∈ J(ℓ), then
Power flow redistribution
(ℓ)
lim ε log P(feε ∈
/ Q̊0
|(fε )ℓ | ≥ 1) < 0;
ε→0
For every line ℓ define J (ℓ) to be the collection of lines
that fail jointly with ℓ as
(ℓ)
J (ℓ) := {k : |fk | ≥ 1}.
(24)
(ℓ)
fek = fk + φℓ,k sign(νℓ ),
for every k 6= ℓ,
(ℓ)
ii) If there exists k 6∈ J(ℓ) such that |fek | ≥ 1, then
(ℓ)
lim ε log P(feε ∈ Qδ |(fε )ℓ | ≥ 1) < 0.
ε→0
Let j(ℓ) = |J (ℓ)| its cardinality and note that j(ℓ) ≥ 1
e (ℓ) the
as trivially ℓ always belongs to J (ℓ). Denote by G
graph obtained from G by removing all the lines in J (ℓ).
Let us focus first on the case of the isolated failure of line ℓ, that is when J (ℓ) = {ℓ}. In this case
e (ℓ) = G(V, E \ {ℓ}) is the graph obtained from G after
G
removing the line ℓ = (i, j). Provided that the power injections remain unchanged, the power flows redistribute
among the remaining lines. Using the concept of resistance matrix R ∈ Rm×m and under the DC approximation, in [7, 23, 24] it is proven that alternative paths for
e(ℓ) is still
the power to flow from node i to j exists (i.e. G
connected) if and only if βi,j Ri,j 6= 1. In other words,
βi,j Ri,j = 1 can only occur in the scenario where line
ℓ = (i, j) is a bridge, i.e. its removal results in the disconnection of the original graph G in two components.
e(ℓ) is still a connected graph, the power flows after
If G
redistribution fe(ℓ) ∈ Rm−1 are related with the original
line flows f ∈ Rm in the network G by the relation
(25)
(28)
(29)
Proof of Proposition 2. i) We have
P(fε ∈
/ Q̊(k) (fε )ℓ ≥ 1) =
P(fε ∈
/ Q̊(k) , (fε )ℓ ≥ 1)
,
P((fε )ℓ ≥ 1)
Denote g(p) := 21 (p − µ)T Σ−1
p (p − µ). From large deviations theory it readily follows that
lim ε log P((fε )ℓ ≥ 1) = −
ε→0
inf
p∈Rn : eT
V p≥1
ℓ
g(p)
(ℓ)
lim ε log P(feε ∈
/ Q̊0 , (fε )ℓ ≥ 1) =
(30)
ε→0
=−
inf
g(p).
p∈Rn : eT
ℓ V p≥1,
(31)
e
∃ k6∈J (ℓ) : |eT
k V p|≥1
Define the corresponding decay rates as
Iℓ :=
inf
p∈Rn : eT
V p≥1
ℓ
g(p),
Jℓ :=
inf
p∈Rn : eT
ℓ V p≥1,
e
∃ k6∈J (ℓ) : |eT
k V p|≥1
g(p).
(32)
8
Then we can rewrite
lim ε log P(feε ∈
/ Q̊(k) (fε )ℓ ≥ 1) = −Jℓ + Iℓ .
ε→0
(33)
and, therefore,
lim ε log P(feε ∈
/ Q̊(k) (fε )ℓ ≥ 1) = 0 ⇐⇒ Jℓ = Iℓ .
ε→0
(34)
Notice that the feasible set of the minimization problem
(31) is strictly contained in that of the problem (30), implying that Jℓ ≥ Iℓ .
Recall that we denoted by p(ℓ) the unique optimal solution of (30) and the corresponding line power flow vector
fe(ℓ) = Ve p(ℓ) . Let p̂(ℓ) be an optimal solution of (31) and
define fˆ(ℓ) := Ve p̂(ℓ) . Clearly p̂(ℓ) is feasible also for problem (30). If it was the case that Jℓ = Iℓ , then p̂(ℓ) would
be an optimal solution also for (30), and thus by uniqueness (g(p) is strictly convex) p̂(ℓ) = p(ℓ) and fˆ(ℓ) = fe(ℓ) .
But this leads to a contradiction, since by assumption
(ℓ)
|fek | < 1 for all k 6∈ J (ℓ), while fˆ(ℓ) is by construc(ℓ)
tion such that there exists k 6∈ J (ℓ) such that |fˆk | ≥ 1.
Hence Jℓ > Iℓ and we conclude that
lim ε log P(feε ∈
/ Q̊(k) (fε )ℓ ≥ 1) < 0.
ε→0
(35)
The proof in the case (fε )ℓ ≤ −1 is analogous and so is
that of statement (ii).
| 3cs.SY
|
arXiv:1705.10735v1 [math.ST] 30 May 2017
Submitted to the Annals of Statistics
arXiv: arXiv:0000.0000
THE TWO-TO-INFINITY NORM AND SINGULAR
SUBSPACE GEOMETRY WITH APPLICATIONS TO
HIGH-DIMENSIONAL STATISTICS∗
By Joshua Cape, Minh Tang, and Carey E. Priebe
Johns Hopkins University
The singular value matrix decomposition plays a ubiquitous role
throughout statistics and related fields. Myriad applications including
clustering, classification, and dimensionality reduction involve studying and exploiting the geometric structure of singular values and singular vectors.
This paper contributes to the literature by providing a novel collection of technical and theoretical tools for studying the geometry
of singular subspaces using the 2 → ∞ norm. Motivated by preliminary deterministic Procrustes analysis, we consider a general matrix
perturbation setting in which we derive a new Procrustean matrix
decomposition. Together with flexible machinery developed for the
2 → ∞ norm, this allows us to conduct a refined analysis of the induced perturbation geometry with respect to the underlying singular
vectors even in the presence of singular value multiplicity. Our analysis yields perturbation bounds for a range of popular matrix noise
models, each of which has a meaningful associated statistical inference task. We discuss how the 2 → ∞ norm is arguably the preferred
norm in certain statistical settings. Specific applications discussed
in this paper include the problem of covariance matrix estimation,
singular subspace recovery, and multiple graph inference.
Both our novel Procrustean matrix decomposition and the technical machinery developed for the 2 → ∞ norm may be of independent
interest.
1. Introduction.
1.1. Background. The geometry of singular subspaces is of fundamental
importance throughout a wide range of fields including statistics, machine
∗
This work is partially supported by the XDATA program of the Defense Advanced
Research Projects Agency (DARPA) administered through Air Force Research Laboratory (AFRL) contract FA8750-12-2-0303 and by the DARPA D3M program administered
through AFRL contract FA8750-17-2-0112. This work is also supported by the Acheson J.
Duncan Fund for the Advancement of Research in Statistics at Johns Hopkins University.
MSC 2010 subject classifications: Primary 62H12, 62H25; secondary 62H30
Keywords and phrases: singular value decomposition, perturbation theory, spectral
methods, Procrustes analysis, high-dimensional statistics
1
2
J. CAPE, M. TANG, AND C. E. PRIEBE
learning, computer science, applied mathematics, and network science. Singular vectors (or eigenvectors) together with their corresponding subspaces
and singular values (or eigenvalues) appear throughout various statistical
applications including principal component analysis [2, 5, 22] covariance
matrix estimation [15, 16, 17], spectral clustering [24, 34, 42], and graph
inference [39, 40, 41] to name a few.
Singular subspaces and their geometry are also studied in the random
matrix theory literature which has come to have a profound influence on
the development of high-dimensional statistical theory [1, 31, 45]. Of interest there is the behavior of random matrices themselves, such as the
phenomenon of eigenvector delocalization [35], as well as the spectral behavior of non-random (in particular, low-rank) matrices undergoing random
perturbation [29]. For an overview of recent work on the spectral properties
of random matrices, in particular the behavior of eigenvectors of random
matrices, see the recent survey [30]. For further discussion of how random
matrix theory has come to impact statistics, see the recent survey [31].
From a computational perspective, optimization algorithms are often concerned with the behavior of singular vectors and subspaces in applications
to signal processing and compressed sensing [14]. The study of algorithmic
performance on manifolds and manifold learning, especially the Grassmann
and Stiefel manifolds, motivates related interest in a collection of Procrustestype problems [4, 13]. Indeed, Procrustes analysis occupies an established
area within the theoretical study of statistics on manifolds [9] and arises in
applications including diffusion tensor imaging [11] and shape analysis [12].
See [19] for an extended treatment of both theoretical and numerical aspects
of Procrustes-type problems.
Foundational results from the matrix theory literature concerning the
perturbation of singular values, singular vectors, and singular subspaces date
back to the original work of Weyl [44], Davis and Kahan [10], and Wedin
[43], among others. Indeed, these results form the backbone for much of the
linear algebraic machinery that has since been developed for the purposes of
statistical application and inference. See the classical references [3, 21, 36]
for further treatment of these foundational results and related historical
developments.
1.2. Overview. This paper contributes to the literature by providing a
novel collection of technical and theoretical tools for studying the geometry of singular subspaces with respect to the 2 → ∞ subordinate vector
norm on matrices (described below). We focus on the alignment of singular
subspaces in terms of geometric distance measures between collections of
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY
3
singular vectors (or eigenvectors), especially the classical sin Θ distance. We
prove singular vector perturbation theorems for both low rank and arbitrary
rank matrix settings. We present our main theoretical results quite generally followed by concrete consequences thereof to facilitate direct statistical
applications, specifically to covariance matrix estimation, singular subspace
recovery, and multiple graph inference. Among the advantages of our methods is that we allow singular value multiplicity and require only a population
gap in the spirit of Theorem 2 in [47].
As a special case of our general framework, we recover a strengthened
version of recent results in [17] wherein the authors obtain an ℓ∞ norm
perturbation bound on singular vectors for low rank matrices exhibiting
specific coherence structure. In this way, beyond the stated theorems in this
paper, our results immediately yield analogous applications to, for example,
robust covariance estimation involving heavy-tailed random variables as in
[17].
Our Procrustes analysis complements the recent study of rate-optimal
perturbation bounds for singular subspaces in [6]. When considered in tandem, we demonstrate a setting in which one recovers nearly rate-matching
bounds for a particular Procrustes-type problem.
Yet another consequence of this work is that we extend and complement
current spectral methodology for graph inference and embedding [28, 39].
To the best of our knowledge, we obtain among the first-ever estimation
bounds for multiple graph inference in the presence of edge correlation.
1.3. Setting. More precisely, this paper formulates and analyzes a general matrix decomposition for the aligned difference between real matrices
U and Û consisting of r orthonormal columns (i.e. partial isometries; Stiefel
matrices; orthogonal r-frames) given by
(1.1)
Û − U W,
where W denotes an r × r orthogonal matrix. We focus on (but are not limited to) a particular “nice” choice of W which corresponds to an “optimal”
Procrustes rotation in a sense that will be made precise later. As such, our
results have implications for a class of related Procrustes-type problems.
Along with our matrix decomposition, we develop technical machinery for
the 2 → ∞ subordinate vector norm on matrices, defined for A ∈ Rp1 ×p2 by
(1.2)
kAk2→∞ := max kAxk∞ .
kxk2 =1
Together, these results allow us to obtain a suite of singular vector perturbation bounds for rectangular matrices corresponding to U, Û , and W via
an additive perturbation framework of the singular value decomposition.
4
J. CAPE, M. TANG, AND C. E. PRIEBE
The 2 → ∞ norm provides finer uniform control on the entries of a matrix
than the more commonly encountered spectral or Frobenius norm. As such,
in the presence of additional underlying matrix and/or perturbation structure, the 2 → ∞ norm may well be of greater operational significance and
the preferred norm to consider. In the compressed sensing and optimization
literature, for example, matrices exhibiting the so-called bounded coherence
property in the sense of [7] form a popular and widely-encountered class of
matrices for which the 2 → ∞ norm can be shown to be the “right” choice.
The 2 → ∞ norm is encountered from time to time but is by no means
as pervasive as either the spectral or Frobenius matrix norm. Recently, it
has appeared in the study of random matrices when a fraction of the matrix
entries are modified [33]. Another recent use of the 2 → ∞ norm was in [28]
wherein clustering certain stochastic block model graphs according to the
adjacency spectral embedding is shown to be strongly universally consistent
under mean-squared error. Among the aims of this paper is to advocate for
the more widespread consideration of the 2 → ∞ norm.
1.4. Sample application: covariance matrix estimation. Before proceeding further, we briefly pause to present an application of our work and
methods to estimating the top singular vectors of a structured covariance
matrix. Another result with applications to covariance matrix estimation
will be presented in Section 4.1 (Theorem 4.4).
Denote a random vector Y by its coordinates Y := (Y (1) , Y (2) , . . . , Y (d) )⊤ ∈
d
R and let Y, Y1 , Y2 , . . . , Yn be independent, identically distributed, mean
zero multivariate normal random (column) vectors in Rd with positive semidefinite covariance matrix Γ ∈ Rd×d . Denote the spectral decomposition
of Γ by Γ = U ΣU ⊤ + U⊥ Σ⊥ U⊥⊤ where [U |U⊥ ] ≡ [u1 |u2 | . . . |ud ] ∈ Rd×d is a
unitary matrix and the singular values of Γ are indexed in non-increasing order, σ1 (Γ) ≥ σ2 (Γ) ≥ · · · ≥ σd (Γ), with Σ := diag(σ1 (Γ), σ2 (Γ), . . . , σr (Γ)) ∈
Rr×r and Σ⊥ := diag(σr+1 (Γ), σr+2 (Γ), . . . , σd (Γ)) ∈ Rd−r×d−r where δr (Γ) :=
σr (Γ) − σr+1 (Γ) > 0. Here Σ may be thought of as representing the “signal”
(or “spike”) singular values of Γ while Σ⊥ contains the “noise” (or “bulk”)
singular values. Note that the largest singular values of Γ are not assumed
to be distinct; rather, the assumption δr (Γ) > 0 simply requires a singular
value “population gap” between Σ and Σ⊥ .
n×d let Γ̂
For the matrix of row observations Υ := [Y1 |Y2 | . . . |Yn ]⊤ ∈ R
n
1 Pn
1 ⊤
denote the classical sample covariance matrix Γ̂n := n Υ Υ ≡ n k=1 Yk Yk⊤
with spectral decomposition given by Γ̂n ≡ Û Σ̂Û ⊤ + Û⊥ Σ̂⊥ Û⊥⊤ . Define En :=
Γ̂n −Γ to be the difference between the true and sample covariance matrices.
Further suppose that Γ exhibits bounded coherence in the sense that
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY
5
pr
kU k2→∞ = O
d where O(·) denotes conventional big-O notation. Similarly let Θ(·) and Ω(·) denote conventional big-Theta and big-Omega notation, respectively.
Let WU denote the (random) orthogonal matrix corresponding to the
optimal Frobenius norm Procrustes alignment of U and Û (for further discussion see Section 2.3). Then we have the following performance guarantee
when estimating U , the matrix of top singular vectors of Γ.
Theorem 1.1.
Consider the covariance
of Section 1.4
matrixqsetting
along with
where d ≫ r. Suppose that σr (Γ) = Ω max σ1 (Γ) log(d)
n ,1
p
σ1 (Γ) = Θ(σr (Γ)) and σr+1 (Γ) = O(1). Let ν(Y ) := max1≤i≤d Var(Y (i) ).
Then there exists a constant C > 0 such that with probability at least 1−d−2 ,
!
r
log(d)
ν(Y )r
kÛ − U WU k2→∞ ≤ C p
(1.3)
.
n
σr (Γ)
Similar results hold more generally when the random vector Y is instead
assumed to have a sub-Gaussian distribution.
Remark
p
p1.2. In the setting of Theorem 1.1 one often has ν(Y ) =
O( σ1 (Γ) dr ), in which case the above bound can be written in the simplified form
!
r
r 3 log(d)
kÛ − U WU k2→∞ ≤ C
(1.4)
.
nd
Remark 1.3. Although Theorem 1.1 is stated with respect to the r
largest singular values of the covariance matrix Γ, analogous results may be
formulated for collections of sequential singular values σs (Γ), σs+1 (Γ), . . . , σt (Γ)
that are well-separated from the remainder of the singular values in Σ⊥ , i.e.
when δgap := min(σs−1 (Γ) − σs (Γ), σt (Γ) − σt+1 (Γ)) ≫ 0. To this end, see
Theorem 3.1 and Theorem 7.9.
1.5. Organization. The rest of this paper is organized as follows. Section
2 establishes notation, motivates the use of the 2 → ∞ norm in the context
of Procrustes problems, and presents the perturbation model considered in
this paper. Section 3 collects our general main results which fall under two
categories: matrix decompositions and matrix perturbation theorems. Section 4 demonstrates how this paper improves upon and complements existing
work in the literature by way of considering three statistical applications,
6
J. CAPE, M. TANG, AND C. E. PRIEBE
specifically covariance matrix estimation, singular subspace recovery, and
multiple graph inference. In Section 5 we offer some concluding remarks.
Sections 6 and 7 contain the technical machinery developed for this paper
as well as additional proofs of our main theorems.
2. Preliminaries.
2.1. Notation. In this paper all vectors and matrices are assumed to be
real-valued for simplicity. The symbols := and ≡ are used to assign definitions and denote formal equivalence. The quantity Cα denotes a general
constant depending only on α (either a parameter or an index) which may
change from line to line unless otherwise specified. For any positive integer n,
let [n] := {1, 2, . . . , n}. Additionally, let O(·) denote standard big-O notation
and o(·) denote little-O notation, possibly with an underlying probabilistic
qualifying statement. Similarly let Θ(·) and Ω(·) denote conventional bigTheta and big-Omega notation, respectively.
For (column) vectors x, y ∈ Rp1 where x ≡ (x1 , . . . , xp1 )⊤ , the standard
Euclidean inner product between x and y is denoted by hx, yi. The classical
P
1/p
ℓp vector norms are denoted by kxkp := ( pi=1 |xi |p )
for 1 ≤ p < ∞ and
kxk∞ := maxi |xi |.
Let Op,r denote the set of all p×r real matrices with orthonormal columns
where Op ≡ Op,p denotes the set of orthogonal matrices in Rp×p . For the
rectangular matrix A ∈ Rp1 ×p2 , denote its singular value decomposition
(SVD) by A = U ΣV ⊤ , where the singular values of A are arranged in nonincreasing order and given by Σ = diag(σ1 (A), σ2 (A), . . . ).
This paper makes use of several standard consistent (i.e. sub-multiplicative)
matrix norms,
qP namely kAk2 := σ1 (A) denotes the spectral normPof A,
2
|ai,j |
kAkF :=
i σi (A) denotes the Frobenius norm of A, kAk1 := maxj
P i
denotes the maximum absolute column sum of A, and kAk∞ := maxi j |ai,j |
denotes the maximum absolute row sum of A. We also consider the matrix
norm (more precisely, non-consistent vector norm on matrices) given by
kAkmax := maxi,j |ai,j |.
2.2. Norm relations. A central focus of this paper is on the vector norm
on matrices defined by kAk2→∞ := maxkxk2 =1 kAxk∞ . Proposition 7.1 establishes the elementary fact that this norm corresponds to the maximum
Euclidean row norm of the matrix A. Propositions 7.3 and 7.5 further catalog the relationship between k·k2→∞ and several of the aforementioned more
commonly encountered matrix norms. These propositions, though straightforward, contribute to the machinery for obtaining the main results in this
paper.
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY
7
The 2 → ∞ norm is an attractive quantity due in part to being easily
interpretable and straightforward to compute. Qualitatively speaking, small
values of k · k2→∞ capture “global” (over all rows) and “uniform” (within
each row) matrix behavior in much the same way as do small values of
k · kmax and k · k∞ . This stands in contrast to the matrix norms k · k2 and
k·kF which capture “global” but not necessarily “uniform” matrix behavior.
√
For example, given A := {1/ p2 }p1 ×p2 , observe that kAk2→∞ = 1 while
√
kAk2 = kAkF = p1 .
For A ∈ Rp1 ×p2 , the standard relations between the ℓp norms for p ∈
{1, 2, ∞} permit quantitative comparison of k · k2→∞ to the relative magnitudes of k · kmax and k · k∞ . In particular, the relations between these
quantities depend upon the underlying matrix column dimension, namely.
1
√
kAk2→∞ ≤ kAkmax ≤ kAk2→∞ ≤ kAk∞ ≤ p2 kAk2→∞ .
√
p2
In contrast, the relationship between k · k2→∞ and k · k2 depends on the
matrix row dimension (Proposition 7.3), namely
kAk2→∞ ≤ kAk2 ≤
√
p1 kAk2→∞ .
The consideration of such dimensionality relations plays an important
role in motivating our approach to prove new matrix perturbation results. In
particular, it may be the case that kAk2→∞ ≪ kAk2 when the row dimension
of A is large, as the above example demonstrates, and so bounding kAk2→∞
may be preferred to bounding kAk2 , or, for that matter, to bounding the
larger quantity kAkF .
Given our discussion of matrix norm relations, we also recall the wellknown rank-based relation between the matrix norms k · k2 and k · kF which
allows us to interface the Frobenius and 2 → ∞ norms. In particular, for
any matrix A,
p
kAk2 ≤ kAkF ≤ rank(A)kAk2 .
We pause to note that the 2 → ∞ norm is not in general sub-multiplicative
for matrices. In particular, the “constrained” sub-multiplicative behavior of
k · k2→∞ (Proposition 7.5) together with the non-commutativity of matrix
multiplication and standard properties of common matrix norms—especially
the spectral and Frobenius matrix norms—imply a substantial amount of
flexibility when bounding matrix products and passing between norms. For
this reason, a host of matrix norm bounds follow naturally from our matrix decomposition results in Section 3.1, and the relative strength of these
bounds will depend upon underlying matrix model assumptions.
8
J. CAPE, M. TANG, AND C. E. PRIEBE
2.3. Singular subspaces and Procrustes. Let U and Û denote the corresponding subspaces for which the columns of U, Û ∈ Op,r form orthonormal
bases, respectively. From the classical C-S matrix decomposition, a natural
measure of distance between these subspaces (corresp. matrices) is given via
the canonical (principal) angles between U and Û ([3], Section 7.1). More
specifically, for the singular values of U ⊤ Û , denoted {σi (U ⊤ Û )}ri=1 and indexed in non-increasing order, the canonical angles are given by the main
diagonal elements of the r × r diagonal matrix
Θ(Û , U ) := diag(cos−1 (σ1 (U ⊤ Û )), cos−1 (σ2 (U ⊤ Û )), . . . , cos−1 (σr (U ⊤ Û ))).
For an in-depth review of the C-S decomposition and canonical angles, see
for example [3, 36]. An extensive summary of relationships between sin Θ
distances, specifically k sin Θ(Û , U )k2 and k sin Θ(Û , U )kF , as well as various
other distance measures is provided in the appendix of [6]. This paper focuses
on the sin Θ distance and related Procrustes-type distance measures.
Geometrically, the notion of distance between U and Û corresponds to
discerning the extent of rotational (angular) alignment between these matrices and their corresponding subspaces. As such, Procrustes-type analysis
lends itself to establishing distance measures. More generally, given two matrices A and B together with a set of matrices S and a norm k · k, a general
version of the Procrustes problem is given by the optimization problem
inf kA − BSk.
(2.1)
S∈S
For U, Û ∈ Op1 ,r , this paper considers the two specific instances
(2.2)
inf kÛ − U W k2→∞ and inf kÛ − U W k2 ,
W ∈Or
W ∈Or
with emphasis on the former motivated by insight with respect to the latter.
In each case, the infimum is achieved over Or by the compactness of
Or together with the continuity of the the specified norms. Therefore, let
Wν⋆ ∈ Or denote a Procrustes solution under k · kν for ν ∈ {2 → ∞, 2}
where dependence upon the underlying matrices U and Û is implicit from
context. Unfortunately, neither of the above Procrustes problems admits an
analytically tractable minimizer in general. In contrast, by instead switching
to the Frobenius norm, one arrives at the classical orthogonal Procrustes
problem which does admit an analytically tractable minimizer and which
we denote by WU . Namely, WU achieves
(2.3)
inf kÛ − U W kF .
W ∈Or
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY
9
For the singular value decomposition of U ⊤ Û ∈ Rr×r denoted U ⊤ Û ≡
UU ΣU VU⊤ , the solution WU is given explicitly by WU ≡ UU VU⊤ . Given these
observations, it is therefore natural to study the surrogate quantities
(2.4)
kÛ − U WU k2→∞ and kÛ − U WU k2 .
Towards this end, the sin Θ distance and Procrustes problems are related
in the sense that (e.g. [6], Lemma 1)
√
k sin Θ(Û , U )kF ≤ kÛ − U WU kF ≤ 2k sin Θ(Û , U )kF
and
k sin Θ(Û , U )k2 ≤ kÛ − U W2⋆ k2 ≤ kÛ − U WU k2 ≤
√
2k sin Θ(Û , U )k2 .
Alternatively, as detailed in Lemma 7.8, one can bound kÛ − U WU k2 via
k sin Θ(Û , U )k2 in a manner providing a clearer demonstration that the performance of WU is “close” to the performance of W2⋆ under k · k2 , namely
k sin Θ(Û , U )k2 ≤ kÛ − U W2⋆ k2
≤ kÛ − U WU k2 ≤ k sin Θ(Û , U )k2 + k sin Θ(Û , U )k22 .
Loosely speaking, this says that the relative fluctuation between WU and
W2⋆ in the spectral Procrustes problem are at most O(k sin Θ(Û , U )k22 ).
By simply considering the naı̈ve relationship between k · k2→∞ and k · k2 ,
we similarly observe that
1
⋆
k2→∞
√ k sin Θ(Û , U )k2 ≤ kÛ − U W2→∞
p1
≤ kÛ − U WU k2→∞ ≤ k sin Θ(Û , U )k2 + k sin Θ(Û , U )k22 ,
whereby the lower bound suggests that careful analysis may yield a tighter
upper bound on kÛ − U WU k2→∞ in meaningful settings wherein kÛ −
U WU k2→∞ ≪ kÛ − U WU k2 .
We proceed to link U and Û via the perturbation framework to be established in Section 2.4 so that subsequently Û has the added interpretation of
being viewed as a perturbation of U . In that structured setting, we formulate
a Procrustean matrix decomposition (Section 3.1) by further decomposing
the underlying matrices corresponding to the quantities k sin Θ(Û , U )k2 and
k sin Θ(Û , U )k22 above. Together with machinery for the 2 → ∞ norm and
careful model-based analysis, we subsequently derive a collection of operationally significant perturbation bounds (Sections 3.2, 4.1, 4.2, and 4.3)
which improve upon existing results throughout the statistics literature.
10
J. CAPE, M. TANG, AND C. E. PRIEBE
2.4. Perturbation framework for the singular value decomposition. For
rectangular matrices X̂, X, E ∈ Rp1×p2 , the matrix X shall denote a true,
unobserved underlying matrix, whereas X̂ := X + E represents an observed
perturbation of X under the unobserved additive error E. For X and X̂,
consider their respective partitioned singular value decompositions given in
block matrix form by
⊤
Σ 0
V
(2.5)
X = U U⊥ ·
·
V⊥⊤
0 Σ⊥
and
(2.6)
X̂ := X + E = Û
Û⊥
⊤
Σ̂ 0
V̂
·
.
·
0 Σ̂⊥
V̂⊥⊤
Here U ∈ Op1,r , V ∈ Op2 ,r , [U |U⊥ ] ∈ Op1 , and [V |V⊥ ] ∈ Op2 . The matrices
Σ and Σ⊥ contain the singular values of X where Σ = diag(σ1 (X), . . . , σr (X)) ∈
Rr×r and Σ⊥ ∈ Rp1−r×p2 −r has the remaining singular values σr+1 (X), . . .
on its main diagonal, possibly padded with additional zeros, where σ1 (X) ≥
· · · ≥ σr (X) ≥ σr+1 (X) ≥ · · · ≥ 0. The use of the character ⊥ in Σ⊥ is
a simplifying abuse of notation employed for notational consistency. The
quantities Û , Û⊥ , V̂ , V̂⊥ , Σ̂, and Σ̂⊥ are defined analogously.
We note that this framework can be employed more generally when, for
example, Σ contains a collection of (sequential) singular values of interest
which are separated from the remaining singular values in Σ⊥ .
3. Main results.
3.1. A Procrustean matrix decomposition and its variants. In this section
we present our matrix decomposition and its variants. The procedure for
deriving the matrix decomposition is based on a geometric viewpoint and is
explained in Section 6.1.
Theorem 3.1. In the general rectangular matrix setting of Sections 2.3
and 2.4, the matrix (Û − U WU ) ∈ Rp1 ×r admits the decomposition
(3.1)
Û − U WU = (I − U U ⊤ )EV WV Σ̂−1
+ (I − U U ⊤ )E(V̂ − V WV )Σ̂−1
+ (I − U U ⊤ )X(V̂ − V V ⊤ V̂ )Σ̂−1
+ U (U ⊤ Û − WU ).
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY 11
Moreover, the decomposition still holds when replacing the r × r orthogonal matrices WU and WV with any real r × r matrices T1 and T2 , respectively. The analogous decomposition for V̂ − V WV is given by replacing
U, Û , V, V̂ , E, X, WU , and WV above with V, V̂ , U, Û , E ⊤ , X ⊤ , WV , and WU ,
respectively.
For ease of reference we state the symmetric case of Theorem 3.1 as a
corollary. In the absence of a positive semi-definiteness assumption, the diagonal entries of Σ, Σ⊥ , Σ̂, and Σ̂⊥ then correspond to the eigenvalues of X
and X̂.
Corollary 3.2. In the special case when p1 = p2 = p and X, E ∈ Rp×p
are symmetric matrices, Theorem 3.1 becomes
(3.2)
Û − U WU = (I − U U ⊤ )EU WU Σ̂−1
+ (I − U U ⊤ )E(Û − U WU )Σ̂−1
+ (I − U U ⊤ )X(Û − U U ⊤ Û )Σ̂−1
+ U (U ⊤ Û − WU ).
Remark 3.3. To reiterate, note that by construction the orthogonal
matrix WU depends upon the perturbed quantity Û which depends upon
the error E. Consequently, WU is unknown (resp., random) when E is assumed unknown (resp., random). Since we make no distinct singular value
(or distinct eigenvalue) assumption in this paper, in general the quantity
Û cannot hope to recover U in the presence of singular value multiplicity.
Indeed, Û can only be viewed as an estimate of U up to an orthogonal transformation, and our specific choice of WU is natural given the aforementioned
Procrustes-based motivation.
Statistical inference and applications are often either invariant under or
equivalent modulo orthogonal transformations given the presence of nonidentifiability. For example, clustering the rows of U is equivalent to clustering the rows of the matrix U WU . As such, the consideration of WU does
not weaken the strength or applicability of our results in practice.
It will also prove convenient to work with the following modified versions
of Theorem 3.1 stated below as corollaries.
12
J. CAPE, M. TANG, AND C. E. PRIEBE
Corollary 3.4.
(3.3)
The decomposition in Theorem 3.1 can be rewritten as
Û − U WU = (I − U U ⊤ )(E + X)(V̂ − V WV )Σ̂−1
+ (I − U U ⊤ )E(V V ⊤ )V WV Σ̂−1
+ U (U ⊤ Û − WU ).
Corollary 3.5.
(3.4)
Corollary 3.4 can be equivalently expressed as
Û − U WU = (U⊥ U⊥⊤ )E(V⊥ V⊥⊤ )(V̂ − V V ⊤ V̂ )Σ̂−1
+ (U⊥ U⊥⊤ )E(V V ⊤ )V (V ⊤ V̂ − WV )Σ̂−1
+ (U⊥ U⊥⊤ )X(V⊥ V⊥⊤ )(V̂ − V V ⊤ V̂ )Σ̂−1
+ (U⊥ U⊥⊤ )E(V V ⊤ )V WV Σ̂−1
+ U (U ⊤ Û − WU ).
3.2. General perturbation theorems. We are now in a position to obtain a
wide class of perturbation theorems via a unified methodology by employing
Theorem 3.1, its variants, the 2 → ∞ norm machinery in Section 7.1, and
the geometric observations in Section 7.2. The remainder of this section is
devoted to presenting several such general perturbation theorems. Section 4
subsequently discusses several specialized perturbation theorems tailored to
applications in high–dimensional statistics.
Let X, X̂, E ∈ Rp1 ×p2 and WU ∈ Or be defined as in Section 2.4. Let
CX,U and CX,V denote upper bounds on k(U⊥ U⊥⊤ )Xk∞ and k(V⊥ V⊥⊤ )X ⊤ k∞ ,
respectively, and define CE,U , CE,V analogously.
Theorem 3.6 (Baseline 2 → ∞ norm Procrustes perturbation bound).
Suppose σr (X) > σr+1 (X) ≥ 0 and that σr (X) > 2kEk2 . Then
k(U⊥ U⊥⊤ )E(V V ⊤ )k2→∞
(3.5) kÛ − U WU k2→∞ ≤ 2
σr (X)
⊤
k(U⊥ U⊥ )E(V⊥ V⊥⊤ )k2→∞
+2
k sin Θ(V̂ , V )k2
σr (X)
k(U⊥ U⊥⊤ )X(V⊥ V⊥⊤ )k2→∞
+2
k sin Θ(V̂ , V )k2
σr (X)
+ k sin Θ(Û , U )k22 kU k2→∞ .
The following theorem provides a uniform perturbation bound for the
quantities kÛ −U WU k2→∞ and kV̂ −V WV k2→∞ . Corollary 3.8 subsequently
yields a bound in response to Theorem 1 in [17].
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY 13
Theorem 3.7 (General perturbation theorem for rectangular matrices).
Suppose σr (X) > σr+1 (X) > 0 and that
σr (X) > max{2kEk2 , (2/α)CE,U , (2/α′ )CE,V , (2/β)CX,U , (2/β ′ )CX,V }
for some constants 0 < α, α′ , β, β ′ < 1 such that δ := (α + β)(α′ + β ′ ) < 1.
Then,
k(U⊥ U⊥⊤ )E(V V ⊤ )k2→∞
(3.6)
(1 − δ)kÛ − U WU k2→∞ ≤ 2
σr (X)
⊤
k(V⊥ V⊥ )E ⊤ U U ⊤ k2→∞
+2
σr (X)
+ k sin Θ(Û , U )k22 kU k2→∞
+ k sin Θ(V̂ , V )k22 kV k2→∞ .
If instead rank(X) = r so σr+1 (X) = 0 and provided
σr (X) > max{2kEk2 , (2/α)CE,U , (2/α′ )CE,V }
for some constants 0 < α, α′ < 1 such that δ := α × α′ < 1, then the above
bound still holds.
Corollary 3.8 (Uniform perturbation bound for rectangular matrices).
Suppose σr (X) > σr+1 (X) = 0 and that
σr (X) > max{2kEk2 , (2/α)CE,U , (2/α′ )CE,V }
for some constants 0 < α, α′ < 1 such that δ := α × α′ < 1. Then
(3.7)
kEk∞ kEk1
,
×max {kU k2→∞ , kV k2→∞ } .
(1−δ)kÛ −U WU k2→∞ ≤ 12×max
σr (X) σr (X)
4. Applications. This section presents several applications of our matrix decomposition perturbation theorems and 2 → ∞ norm machinery to
three statistical settings corresponding to, among others, the recent work in
[17], [6], and [28], respectively. We emphasize that for each statistical application, our Theorems 4.4, 4.5, and 4.9 (as well as Theorem 1.1) are obtained
via individualized, problem-specific analysis within the broader context of
a unified methodology for deriving perturbation bounds. This is made clear
in the proofs of the theorems.
In each statistical application considered in this paper, we demonstrate
how our results strengthen, complement, and extend existing work. In preparation for doing so, first consider the following structural matrix property
introduced in [7] within the context of low-rank matrix recovery.
14
J. CAPE, M. TANG, AND C. E. PRIEBE
Definition 4.1 ([7], Definition 1.2). Let U be a subspace of Rp of dimension r, and let PU be the orthogonal projection onto U . Then the coherence
of U (vis-à-vis the standard basis {ei }) is defined to be
p
maxkPU ei k22 .
(4.1)
µ(U ) :=
r i∈[p]
For U ∈ Op,r , the columns of U span a subspace of dimension r in Rp ,
so it is natural to abuse notation and interchange U with its underlying
subspace U . In this case PU = U U ⊤ , and so Propositions 7.1 and 7.6 allow
us to equivalently write
p
µ(U ) :=
kU k22→∞ .
r
Observe that 1 ≤ µ(U ) ≤ p/r, where the upper and lower bounds are
achieved for U consisting of all standard basis vectors or of vectors all with
√
magnitude 1/ p, respectively. Since the (orthonormal) columns of U each
have unit Euclidean norm (“mass”), the magnitude of µ(U ) can be viewed
as describing the coordinate-wise accumulation of mass for a collection of
orthonormal singular (or eigen) vectors.
For our purposes, the assumption of bounded coherence (equiv. incoherence) as discussed in [7] corresponds to the existence of a positive constant
Cµ such that
r
r
(4.2)
kU k2→∞ ≤ Cµ
.
p
This property arises naturally in, for example, the random orthogonal (matrix) model in [7] and corresponds to the recoverability of a low rank matrix
via nuclear norm minimization when sampling only a subset of the matrix entries. In the study of random matrices, bounded coherence is closely related
to the delocalization phenomenon of eigenvectors [35]. Further examples of
matrices whose row and column spaces exhibit bounded coherence can be
found in the study of networks. Specifically, it is not difficult to check that
this property holds for the top eigenvectors of the (non-random) low-rank
edge probability matrices corresponding to the Erdős-Rényi model and the
balanced k-block stochastic block model, among others.
Remark 4.2. We emphasize that throughout the formulation of our general results in Section 3 we never assumed the matrix X to have bounded
coherence in either of its factors U or V . Rather, by working with the
2 → ∞ norm in a Procrustes setting, our results are consequently particularly strong and interpretable when combined with this additional structural
matrix property.
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY 15
4.1. Singular vector perturbation bounds: ℓ∞ and k·k2→∞ norms. In [17],
the authors specifically consider low rank matrices with distinct singular
values (or eigenvalues) whose unitary factors exhibit bounded coherence.
For such matrices, Theorems 1.1 and 2.1 in [17] provide singular vector
(eigenvector) perturbation bounds in the ℓ∞ vector norm which explicitly
depend upon the underlying matrix dimension within the singular value
perturbation setting of Section 2.4.
In this paper Corollary 3.8 formulates a straightforward perturbation
bound that is, upon further inspection, operationally in the same spirit as
Theorem 1.1 of [17]. Moreover, note that our bound on the quantity kÛ −
U WU k2→∞ immediately yields a bound on the quantities kÛ − U WU kmax
and infW ∈Or kÛ − U W kmax , thereby providing ℓ∞ -type bounds for the perturbed singular vectors up to orthogonal transformation, the analogue of sign
flips in [17] for well-separated, distinct singular values (similarly for V , V̂ ,
and WV ). Also observe that controlling the dependence of kÛ − U WU k2→∞
and kV̂ − V WV k2→∞ on one another follows from the “union bound-type”
assumptions implicitly depending upon the underlying matrix dimensions.
Again, note that our perturbation bounds hold for a wider range of model
settings which includes those exhibiting singular value (eigenvalue) multiplicity.
For symmetric matrices, we likewise improve upon [17] (Theorem 2.1).
We now make this explicit in accordance with our notation.
Theorem 4.3 ([17], Theorem 2.1). Let X, E ∈ Rp×p be symmetric matrices with rank(X) = r such that X has the spectral decomposition X =
U ΛU ⊤ where Λ = diag(λ1 , λ2 , . . . , λr ) and the eigenvalues satisfy |λ1 | ≥
|λ2 | ≥ · · · ≥ |λr | > 0. Define γ := min{|λi |−|λi+1 | : 1 ≤ i ≤ r−1}∧min{|λi | :
1 ≤ i ≤ r}.
√
• Suppose that γ > 5p(kEk∞ + 2r pkEU kmax )kU k22→∞ . Then there exists an orthogonal matrix W ∈ Or such that
(4.3)
kÛ − U W kmax ≤ 45r
2
kEk∞
γ
+
√
pkEU kmax
γ
(kU k2→∞ + pkU k32→∞ ).
• Suppose
that there exists a positive constant Cµ such that kU k2→∞ ≤
q
√
r
Cµ p and that γ > 5Cµ2 r(1 + Cµ r)kEk∞ . Then there exists an
orthogonal matrix W ∈ Or such that
(4.4)
kÛ − U W kmax
√
√
kEk∞
2
5
≤ 45Cµ r (1 + Cµ r)(1 + Cµ r)
.
√
γ p
16
J. CAPE, M. TANG, AND C. E. PRIEBE
Theorem 4.4 (Improvement of [17], Theorem 2.1). Consider the setting
of Theorem 4.3 but now where γ = 0 is permitted i.e. we allow repeated
eigenvalues.
• Suppose that |λr | > 4kEk∞ . Then there exists an orthogonal matrix
W ∈ Or such that
(4.5)
kÛ − U W kmax ≤ 14
kEk∞
|λr |
kU k2→∞ .
• Suppose
that there exists a positive constant Cµ such that kU k2→∞ ≤
q
r
Cµ p and that |λr | > 4kEk∞ . Then there exists an orthogonal matrix
W ∈ Or such that
(4.6)
√
kÛ − U W kmax ≤ 14Cµ r
kEk∞
√
|λr | p
.
Theorems 4.3 and 4.4 demonstrate that our refined analysis yields superior
bounds with respect to absolute constant factors, rank-dependent factors,
and eigengap magnitude/multiplicity assumptions.
4.2. Singular subspace perturbation and random matrices. In this section
we provide an example which interfaces our results with the recent rateoptimal singular subspace perturbation bounds obtained in [6].
Consider the setting wherein X ∈ Rp1 ×p2 is a fixed rank-r matrix with
√
r ≤ p1 ≪ p2 and σr (X) = Ω(p2 / p1 ) where E ∈ Rp1 ×p2 is a random matrix
with independent standard normal entries. Theorems 1, 2, and 3 in [6] imply
that in this setting, with high probability, the following bounds hold for the
left and right singular vectors, respectively.
√
√
p1
p2
(4.7) k sin Θ(Û , U )k2 = Θ
and k sin Θ(V̂ , V )k2 = Θ
σr (X)
σr (X)
Observe that the bound is stronger for k sin Θ(Û , U )k2 than for k sin Θ(V̂ , V )k2
with the latter quantity being more difficult to control in general. With an
eye towards the latter quantity, the following theorem demonstrates how our
analysis of kV̂ − V WV k2→∞ allows us to recover upper and lower bounds
for kV̂ − V WV kp
2→∞ in terms of k sin Θ(V̂ , V )k2 that differ
p by a factor of
√
at most Cmax{ r log(p2 ), p1 } in general and at most C r log(p2 ) under
the additional assumption of bounded coherence.
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY 17
Theorem 4.5. Let X, E ∈ Rp1 ×p2 be as in Section 2.4 such that rank(X) =
√
3/2
r and r ≤ p1 ≪ p2 where σr (X) = Ω(p2 / p1 ) and p2 = Ω(p1 ). Suppose
that the entries of E are independent standard normal random variables.
Then there exists a constant C > 0 such that with probability at least 1−p−2
2 ,
!
p
√
max{ r log(p2 ), p1 }
k sin Θ(V̂ , V )k2 .
(4.8) kV̂ − V WV k2→∞ ≤ C
√
p2
If in addition kV k2→∞ = O
(4.9)
q
−2
r
p2 , then with probability at least 1 − p2 ,
kV̂ − V WV k2→∞ ≤ C
p
r log(p2 )
√
p2
!
k sin Θ(V̂ , V )k2 .
Note that the lower bound √1p2 k sin Θ(V̂ , V )k2 ≤ kV̂ − V WV k2→∞ always
holds by Proposition 7.3 and Lemma 7.7.
4.3. Statistical inference for random graphs. In the study of networks,
community detection and clustering are tasks of central interest. A network
(or, alternatively a graph G := (V, E) consisting of a vertex set V and edge
set E) may be represented, for example, by its adjacency matrix A ≡ AG
which captures the edge connectivity of the nodes in the network. For inhomogeneous independent edge random graph models, the adjacency matrix
can be viewed as a random perturbation of an underlying (often low rank)
edge probability matrix P where P = E[A] holds on the off-diagonal. In the
notation of Section 2.4, the matrix P corresponds to X, the matrix A − P
corresponds to E, and the matrix A corresponds to X̂. By viewing Û (the
matrix containing the top eigenvectors of A) as an estimate of U (the matrix
of top eigenvectors of P ), our Section 3 theorems immediately apply.
Spectral-based methods and related optimization problems for random
graphs employ the spectral decomposition of the adjacency matrix (or matrixvalued functions thereof, e.g. the Laplacian matrix and its variants). For
example, the recent paper [23] presents a general spectral-based, dimensionreduction community detection framework which incorporates the (spectral
norm) distance between the leading eigenvectors of A and P . Taken in the
context of this recent work and indeed the wider network analysis literature,
our paper complements existing efforts and paves the way for expanding the
toolkit of network analysts to include more Procrustean and 2 → ∞ norm
machinery.
Much of the existing literature for networks and graph models concerns
the popular stochastic block model (SBM) [20] and its variants. The related
18
J. CAPE, M. TANG, AND C. E. PRIEBE
random dot product graph (RDPG) model first introduced in [46] has subsequently been developed in a series of papers as both a tractable and flexible
random graph model amenable to spectral methods [18, 28, 37, 38, 39, 40,
41]. In the RDPG model, the graph eigenvalues and eigenvectors are closely
related to the model’s generating latent positions; in particular, the top
eigenvectors of the adjacency matrix scaled by its largest eigenvalues form
an estimator of the latent positions (up to orthogonal transformation).
Given the existing RDPG literature, the results in this paper extend both
the treatment of the 2 → ∞ norm in [28] and Procrustes matching for
graphs in [39]. Specifically, our 2 → ∞ bounds in Section 3 imply a version
of Lemma 5 in [28] for the (unscaled) eigenvectors that does not require the
matrix-valued model parameter P to have distinct eigenvalues. Our Procrustes analysis also suggests a refinement of the test statistic formulation
in the two-sample graph inference hypothesis testing framework of [39].
It is also worth noting that our level of generality allows for the consideration of random graph (matrix) models which allow edge dependence
structure, such as the (C, c, γ) property in [29] (see below). Indeed, moving
beyond independent edge models represents an important direction for future work in network science and in the development of statistical inference
for graph data.
Definition 4.6 ([29]). A p1 ×p2 random matrix M is said to be (C, c, γ)concentrated if, given a trio of positive constants (C, c, γ), for all unit vectors
u ∈ Rp1 , v ∈ Rp2 , and for every t > 0,
(4.10)
P [|hM v, ui| > t] ≤ C exp(−ctγ ).
Remark 4.7. The proofs of our main theorems demonstrate the importance of bounding the quantities kEV k2→∞ and kU ⊤ EV k2 in the perturbation framework of Section 2.4. Note that when E satisfies the (C, c, γ)concentrated property in Definition 4.6, then the above quantities can be
easily controlled by, for example, naı̈ve union bounds. For further discussion
of the (C, c, γ)-concentrated property and how it holds for a large class of
random matrix models, see [29].
In the network literature, current active research directions include the
development of random graph models exhibiting edge correlation and the
development of inference methodology for multiple graphs. For the purposes
of this paper, we shall consider the ρ-correlated stochastic block model introduced in [26] and the omnibus embedding matrix for multiple graphs introduced in [32] and subsequently employed in [8, 27]. The ρ-correlated stochastic block model provides a simple yet easily interpretable and tractable
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY 19
model for dependent random graphs [26] while the omnibus embedding
matrix provides a framework for performing spectral analysis on multiple
graphs by leveraging graph dissimilarities [27, 32] or similarities [8].
Definition 4.8 ([26], Definition 1). Let G n denote the set of labeled, nvertex, simple, undirected graphs. Two n-vertex random graphs (G1 , G2 ) ∈
→
G 1 × G 2 are said to be ρ-correlated SBM(κ, n, b, Λ) graphs (abbreviated ρSBM) if
→
1. G1 := (V, E(G1 )) and G2 := (V, E(G2 )) are marginally SBM(κ, n, b, Λ)
random graphs; i.e. for each i = 1, 2,
(a) The vertex set V is the union of κ blocks V1 , V2 , . . . , Vκ , which
are disjoint sets with respective cardinalities n1 , n2 , . . . , nκ ;
(b) The block membership function b : V 7→ [κ] is such that for each
v ∈ V, b(v) denotes the block of v; i.e., v ∈ Vb(V ) ;
(c) The block adjacency probabilities are given by the symmetric
matrix Λ ∈ [0, 1]κ×κ ; i.e., for each pair of vertices {j, l} ∈ V2 ,
the adjacency of j and l is an independent Bernoulli trial with
probability of success Λb(j),b(l) .
2. The random variables
{I[{j, k} ∈ E(Gi )]}i=1,2;{j,k}∈(V )
2
are collectively independent except that for each {j, k} ∈ V2 , the
correlation between I[{j, k} ∈ E(G1 )] and I[{j, k} ∈ E(G2 )] is ρ ≥ 0.
The following theorem provides a guarantee for estimating the eigenvectors corresponding to the largest eigenvalues of a multiple graph omnibus
matrix when the graphs are not independent. To the best of our knowledge,
Theorem 4.9 is the first of its kind.
→
Theorem 4.9. Let (G1 , G2 ) be a pair of ρ-correlated SBM(κ, n, b, Λ)
graphs as in Definition 4.8 with the corresponding pair of n × n (symmetric,
binary) adjacency matrices (A1 , A2 ). Let the model omnibus matrix O and
adjacency omnibus matrix Ô be given by
"
#
A1 +A2
1
1 1
A
2
O :=
⊗ ZΛZ ⊤ ; Ô := A1 +A2
2
1 1
A
2
where ⊗ denotes the matrix Kronecker product and Z is the n × κ matrix
of vertex-to-block assignments such that P := ZΛZ ⊤ ∈ [0, 1]n×n denotes the
edge probability matrix.
20
J. CAPE, M. TANG, AND C. E. PRIEBE
Let r := rank(Λ) and therefore rank(O) = r. Suppose that the maximum
expected degree of Gi , i = 1, 2, denoted ∆, satisfies ∆ ≫ log4 (n) and that
σr (O) = Ω(∆). As in Section 2.4, let U, Û ∈ O2n,r denote the matrices
whose columns are the normalized eigenvectors corresponding to the largest
eigenvalues of O and Ô, respectively, given by the diagonal matrices Σ and
Σ̂, respectively. Then with probability 1 − o(1) i.e. asymptotically almost
surely in n, one has
!
p
r log(n)
kÛ − U WU k2→∞ = O
.
∆
Remark 4.10. The implicit dependence upon the correlation factor ρ in
Theorem 4.9 can be made explicit by a more careful analysis of the constant
factor and probability statement. This is not our present concern.
5. Discussion. In summary, this paper develops a flexible Procrustean
matrix decomposition and its variants together with machinery for the 2 →
∞ norm in order to study the perturbation of singular subspaces and their
geometry. We have demonstrated the widespread applicability of our framework and results to a host of popular matrix models, namely matrices with
•
•
•
•
independent, identically distributed entries (Section 4.2),
independent, identically distributed rows (Section 1.4 and 4.1),
independent, not-necessarily-identically-distributed entries (Section 4.3),
neither independent nor identically distributed entries (Section 4.3).
We emphasize that in each application discussed in this paper, the underlying problem setting demands model-specific analysis both in terms of
which formulation of the Procrustean matrix decomposition to use and how
to transition between norms. For example, using the rectangular matrix notation in this paper, recall how the assumption of bounded coherence led to
the importance of the product term kEk∞ kV k2→∞ in Section 4.1 whereas in
the case of i.i.d. normal matrices in Section 4.2 the central term of interest is
kEV k2→∞ . Similarly, in the context of covariance matrix estimation (Theorem 1.1 as well as Theorem 4.4), note how discrepancies in model specificity
and assumptions inspired different approaches in deriving the stated bounds.
Moreover, the study of k·k2→∞ directly translates to k·kmax via the relation
(5.1)
inf kÛ − U W kmax ≤ inf kÛ − U W k2→∞ ≤ kÛ − U WU k2→∞ .
W ∈Or
W ∈Or
Ample open problems and applications exist for which it is and will be
productive to consider the 2 → ∞ norm in the future. This paper details
three specific applications, namely
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY 21
• singular vector estimation under perturbation (Section 4.1),
• singular subspace recovery under perturbation (Section 4.2),
• statistical estimation and inference for graphs (Section 4.3).
It is our hope that the level of generality and flexibility presented in this
paper will facilitate the more widespread use of the 2 → ∞ norm in the
statistics literature. To this end, we further invite the reader to apply and
adapt our Procrustean matrix decomposition for their own purposes.
6. Proofs.
6.1. Proof of the Procrustean matrix decomposition. Here we explain the
derivation of the matrix decomposition for Û −U WU as presented in Theorem
3.1.
Proof of Theorem 3.1. First observe that the matrices Û and U WU
are equivalently written as X̂ V̂ Σ̂−1 and XV Σ−1 WU , respectively, given the
block matrix formulation in Section 2.4. Next, the explicit correspondence
between WU and U ⊤ Û resulting from Eqn. (2.3) along with subsequent leftmultiplication by the matrix U motivates the introduction of the projected
quantity ±U U ⊤ Û and to write
Û − U WU = (Û − U U ⊤ Û ) + (U U ⊤ Û − U WU )
= (I − U U ⊤ )X̂ V̂ Σ̂−1 + U (U ⊤ Û − WU ).
The matrix U (U ⊤ Û − WU ) is shown to be small in both spectral and
2 → ∞ norm by Lemma 7.8 and via Proposition 7.5. Ignoring U for the
moment, the matrix U ⊤ Û − WU represents a geometric residual measure of
closeness between the matrix U ⊤ Û and the Frobenius-optimal orthogonal
matrix WU .
It is not immediately clear how to control the quantity (I − U U ⊤ )X̂ V̂ Σ̂−1
given the dependence on the perturbed quantity X̂. If instead we replace
X̂ with X and consider the matrix (I − U U ⊤ )X V̂ Σ̂−1 , then by the block
matrix form in Section 2.4 one can check that (I − U U ⊤ )X = X(I − V V ⊤ ).
Together with the fact that (I −U U ⊤ ) is an orthogonal projection and hence
is idempotent, it follows that
(I − U U ⊤ )X V̂ Σ̂−1 = (I − U U ⊤ )X(V̂ − V V ⊤ V̂ )Σ̂−1
So, introducing the quantity ±(I − U U ⊤ )X V̂ Σ̂−1 yields
(I − U U ⊤ )X̂ V̂ Σ̂−1 = (I − U U ⊤ )E V̂ Σ̂−1 + (I − U U ⊤ )X(V̂ − V V ⊤ V̂ )Σ̂−1 .
22
J. CAPE, M. TANG, AND C. E. PRIEBE
Note that by Lemma 7.7 and Proposition 7.5, all of the terms comprising
the matrix product (I − U U ⊤ )X(V̂ − V V ⊤ V̂ )Σ̂−1 can be controlled (submultiplicatively). In certain settings it shall be useful to further decompose
(I − U U ⊤ )X(V̂ − V V ⊤ V̂ )Σ̂−1 into two matrices as
(I − U U ⊤ )X(V̂ − V WV )Σ̂−1 + (I − U U ⊤ )XV (WV − V ⊤ V̂ )Σ̂−1 .
Note that the second matrix above vanishes given that X ≡ U ΣV ⊤ +
U⊥ Σ⊥ V⊥⊤ .
As for the earlier matrix (I − U U ⊤ )E V̂ Σ̂−1 , we do not assume additional
control over the quantity V̂ , so we rewrite the above matrix product in terms
of V and a corresponding residual quantity. A natural choice is therefore
to incorporate the orthogonal factor WV . Specifically, introducing ±(I −
U U ⊤ )EV WV Σ̂−1 produces
(I − U U ⊤ )E V̂ Σ̂−1 = (I − U U ⊤ )E(V̂ − V WV )Σ̂−1 + (I − U U ⊤ )EV WV Σ̂−1 .
Moving forward, the matrix (I −U U ⊤ )EV WV Σ̂−1 becomes the leading term
of interest. Gathering all the terms on the right-hand sides of the above
equations yields Theorem 3.1. Corollaries 3.2 and 3.4 are evident given that
U ⊤ U and V ⊤ V are both simply the identity matrix.
6.2. Proofs of general perturbation theorems.
6.2.1. Theorem 3.6.
Proof of Theorem 3.6. The assumption σr (X) > 2kEk2 implies that
σr (X̂) ≥ 12 σr (X) since by Weyl’s inequality for singular values, σr (X̂) ≥
σr (X) − kEk2 ≥ 12 σr (X). The theorem then follows from Corollary 3.5 together with Proposition 7.5 and Lemma 7.7.
6.2.2. Theorem 3.7.
Proof of Theorem 3.7. By Corollary 3.4, consider the decomposition
Û − U WU = (I − U U ⊤ )(E + X)(V̂ − V WV )Σ̂−1
+ (I − U U ⊤ )E(V V ⊤ )V WV Σ̂−1
+ U (U ⊤ Û − WU ).
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY 23
Subsequently applying Proposition 7.5 and Lemma 7.7 yields
!
CE,U + CX,U
kV̂ − V WV k2→∞
kÛ − U WU k2→∞ ≤
σr (X̂)
!
1
+
k(I − U U ⊤ )EV V ⊤ k2→∞
σr (X̂)
+ k sin Θ(Û , U )k22 kU k2→∞
and similarly
kV̂ − V WV k2→∞ ≤
+
CE,V + CX,V
1
σr (X̂)
!
σr (X̂)
!
kÛ − U WU k2→∞
k(I − V V ⊤ )E ⊤ U U ⊤ k2→∞
+ k sin Θ(V̂ , V )k22 kV k2→∞
By assumption
σr (X) > max{2kEk2 , (2/α)CE,U , (2/α′ )CE,V , (2/β)CX,U , (2/β ′ )CX,V }
for constants 0 < α, α′ , β, β ′ < 1 such that δ := (α + β)(α′ + β ′ ) < 1. Note
that the assumption σr (X) > 2kEk2 implies that σr (X̂) ≥ σr (X) − kEk2 ≥
1
2 σr (X) by Weyl’s inequality for singular values. Thus, combining the above
observations, bounds, and rearranging terms yields
2
(1 − δ)kÛ − U WU k2→∞ ≤
k(I − U U ⊤ )EV V ⊤ k2→∞
σr (X)
2(α + β)
+
k(I − V V ⊤ )E ⊤ U U ⊤ k2→∞
σr (X)
+ k sin Θ(Û , U )k22 kU k2→∞
+ (α + β) k sin Θ(V̂ , V )k22 kV k2→∞ ,
whereby the first claim follows since (α + β) < 1.
When rank(X) = r, the matrix (I − U U ⊤ )X vanishes since Σ⊥ is identically zero. Corollary 3.2 therefore becomes
Û − U WU = (I − U U ⊤ )E(V̂ − V WV )Σ̂−1
+ (I − U U ⊤ )E(V V ⊤ )V WV Σ̂−1
+ U (U ⊤ Û − WU )
and similarly for V̂ − V WV , which removes the need for assumptions on
σr (X) with respect to the terms CX,U and CX,V . Hence the bound holds.
24
J. CAPE, M. TANG, AND C. E. PRIEBE
6.2.3. Corollary 3.8.
Proof of Corollary 3.8. By Theorem 3.7, we have the bound
2
(1 − δ)kÛ − U WU k2→∞ ≤
k(I − U U ⊤ )E(V V ⊤ )k2→∞
σr (X)
2
+
k(I − V V ⊤ )E ⊤ (U U ⊤ )k2→∞
σr (X)
+ k sin Θ(Û , U )k22 kU k2→∞
+ k sin Θ(V̂ , V )k22 kV k2→∞ .
Next, by Wedin’s sin Θ theorem together with the general matrix fact that
kEk2 ≤ max{kEk∞ , kEk1 } and the assumption σr (X) > 2kEk2 , we have
that
o
n
2 × max{kEk∞ , kEk1 }
max k sin Θ(Û , U )k2 , k sin Θ(V̂ , V )k2 ≤ min
,1 .
σr (X)
Using properties of the 2 → ∞ norm, we therefore have
k(I − U U ⊤ )E(V V ⊤ )k2→∞ ≤ kEV V ⊤ k2→∞ + k(U U ⊤ )E(V V ⊤ )k2→∞
≤ kEV k2→∞ + kU k2→∞ kU ⊤ EV k2
≤ kEk∞ kV k2→∞ + kU k2→∞ max{kEk∞ , kEk1 }
≤ 2 × max {kEk∞ , kEk1 } × max {kU k2→∞ , kV k2→∞ } .
Similarly,
k(I − V V ⊤ )E ⊤ (U U ⊤ )k2→∞ ≤ kEk1 kU k2→∞ + kV k2→∞ max{kEk∞ , kEk1 }
≤ 2 × max {kEk∞ , kEk1 } × max {kU k2→∞ , kV k2→∞ } .
Combining these observations yields the stated bound.
6.3. Proof of Theorem 1.1.
Proof of Theorem 1.1. In what follows the constant C > 0 may change
from line to line. First, adapting the proof of Theorem 3.6 for symmetric
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY 25
positive semi-definite matrices yields the bound
kÛ − U WU k2→∞ ≤
k(U⊥ U⊥⊤ )En (U U ⊤ )k2→∞
σr (Γ̂n )
!
+
k(U⊥ U⊥⊤ )En (U⊥ U⊥⊤ )k2→∞
+
k(U⊥ U⊥⊤ )Γ(U⊥ U⊥⊤ )k2→∞
σr (Γ̂n )
σr (Γ̂n )
!
!
k sin Θ(Û , U )k2
k sin Θ(Û , U )k2
+ k sin Θ(Û , U )k22 kU k2→∞ .
Next we collect several observations.
• k(U⊥ U⊥⊤ )En (U U ⊤ )k2→∞ ≤ kU⊥ U⊥⊤ k∞ kEn U k2→∞ by Proposition 7.5,
• k(U⊥ U⊥⊤ )Γ(U⊥ U⊥⊤ )k2→∞ ≤ k(U⊥ U⊥⊤ )Γ(U⊥ U⊥⊤ )k2 = kU⊥ Σ⊥ U⊥⊤ k2 =
σr+1 (Γ),
• k sin Θ(Û , U )k2 ≤ 2kEn k2 /δr (Γ) by Theorem 7.9,
• The assumption σr (Γ) > 2kEn k implies that σr (Γ̂n ) ≥ 21 σr (Γ),
p
• The bounded coherence assumption on U yields kU k2→∞ ≤ C dr
√
together with kU⊥ U⊥⊤ k∞ ≤ (1 + C) r for some positive constant C.
By Theorems 1 and 2 in [22] applied to the random vectors Yk with covariq
ance matrix Γ, there exists a constant C > 0 such that kEn k ≤ Cσ1 (Γ) log(d)
n
with probability at least 1 − 13 d−2 . Similarly, by applying these theorems
matrix U⊥ Σ⊥ U⊥⊤ , we have
to the random vectors U⊥⊤ Yk with covariance
q
that k(U⊥ U⊥⊤ )En (U⊥ U⊥⊤ )k2 ≤ Cσr+1 (Γ) log(d)
with probability at least
n
1 −2
1 − 3 d . Combining these observations yields that with probability at least
1 − 23 d−2 ,
kÛ − U WU k2→∞
√
C rkEn U k2→∞
Cσ1 (Γ)σr+1 (Γ) log(d)
≤
+
σr (Γ)
δr (Γ)σr (Γ)
n
!
r
Cσ1 (Γ)σr+1 (Γ) log(d)
+
δr (Γ)σr (Γ)
n
r
2
Cσ1 (Γ) r log(d)
+
.
δr2 (Γ)
d n
As for the matrix (En U ) ∈ Rd×r , consider the bound
√
√
kEn U k2→∞ ≤ rkEn U kmax = r maxi∈[d],j∈[r]|hEn⊤ ei , uj i|
26
J. CAPE, M. TANG, AND C. E. PRIEBE
where for each (i, j) ∈ [d] × [r],
n
n h
i 1X
i
1 Xh ⊤
(i)
⊤
⊤
⊤
(uj Yk )(Yk ei ) − uj Γei =
hYk , uj iYk − hΓei , uj i .
hEn ei , uj i =
n
n
k=1
k=1
Denote the sub-gaussian random variable and vector Orlicz ψ2 norms by
√
kY (i) kψ2 := sup p(E[|Y (i) |p ])1/p and kY kψ2 := sup khY, xikψ2 .
p≥1
kxk2 =1
The product of (sub-)Gaussian random variables has a sub-exponential dis(i)
tribution, and in particular the term {hYk , uj iYk − hΓei , uj i} is a centered
sub-exponential random variable which is independent and identically distributed for each 1 ≤ k ≤ n when i and j are fixed. An upper bound for the
sub-exponential Orlicz ψ1 norm of this random variable is given in terms of
the sub-gaussian Orlicz ψ2 norm, ([14], Remark 5.18) namely
(i)
(i)
khYk , uj iYk − hΓei , uj ikψ1 ≤ 2khYk , uj iYk kψ1 ≤ 2khY, uj ikψ2 kY (i) kψ2 .
The random vectors Yk are mean zero multivariate normal, therefore
q
kY (i) kψ2 ≤ Cmax1≤i≤d Var(Y (i) ) := Cν(Y ).
Together with the observation that Var(hY, uj i) = u⊤
j Γuj = σj (Γ) for all
j ∈ [r], then
p
khY, uj ikψ2 ≤ C σ1 (Γ).
By Bernstein’s inequality ([14], Proposition 5.16), it follows that
"
#
r
p
r log(d)
1
P kEn U k2→∞ ≥ C σ1 (Γ)ν(Y )
≤ d−2 .
n
3
Combining this observation with the hypotheses σr+1 (Γ) = O(1) and σ1 (Γ) =
Θ(σr (Γ)) yields that with probability at least 1 − d−2 ,
!
r
C log(d)
Cν(Y )r log(d)
+
kÛ − U WU k2→∞ ≤ p
n
σr (Γ) n
σr (Γ)
!
r
log(d)
C
+
σr (Γ)
n
r
r log(d)
+ C
.
d n
q
log(d)
ν(Y )r
with probability at least
Hence, kÛ − U WU k2→∞ ≤ C √
n
σr (Γ)
1−
d−2 .
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY 27
6.4. Proof of Theorem 4.4.
Proof of Theorem 4.4. Specializing Corollary 3.4 for the symmetric
case when rank(X) = r yields the decomposition
Û − U WU = (I − U U ⊤ )E(Û − U WU )Λ̂−1 + (I − U U ⊤ )E(U U ⊤ )U WU Λ̂−1
+ U (U ⊤ Û − WU ).
Rewriting the above decomposition yields
Û − U WU = E(Û − U WU )Λ̂−1 + (U U ⊤ )E(Û − U WU )Λ̂−1
+ EU WU Λ̂−1
+ (U U ⊤ )EU WU Λ̂−1
+ U (U ⊤ Û − WU ).
Applying the technical results in Sections 7.1 and 7.2 yields the term-wise
bounds
kE(Û − U WU )Λ̂−1 k2→∞ ≤ kEk∞ kÛ − U WU k2→∞ |λ̂r |−1 ,
k(U U ⊤ )E(Û − U WU )Λ̂−1 k2→∞ ≤ kU k2→∞ kEk2 kÛ − U WU k2 |λ̂r |−1 ,
kEU WU Λ̂−1 k2→∞ ≤ kEk∞ kU k2→∞ |λ̂r |−1 ,
k(U U ⊤ )EU WU Λ̂−1 k2→∞ ≤ kU k2→∞ kEk2 ||λ̂r |−1 ,
kU (U ⊤ Û − WU )k2→∞ ≤ kU k2→∞ kU ⊤ Û − WU k2 .
By assumption E√ is symmetric, therefore kEk2 ≤ kEk∞ . Furthermore,
kÛ − U WU k2 ≤ 2k sin Θ(Û , U )k2 by Lemma 7.8, and k sin Θ(Û , U )k2 ≤
2kEk2 |λr |−1 by Theorem 7.9. Therefore,
kE(Û − U WU )Λ̂−1 k2→∞ ≤ kEk∞ kÛ − U WU k2→∞ |λ̂r |−1 ,
k(U U ⊤ )E(Û − U WU )Λ̂−1 k2→∞ ≤ 4kEk2∞ kU k2→∞ |λ̂r |−1 |λr |−1 ,
kEU WU Λ̂−1 k2→∞ ≤ kEk∞ kU k2→∞ |λ̂r |−1 ,
k(U U ⊤ )EU WU Λ̂−1 k2→∞ ≤ kEk∞ kU k2→∞ |λ̂r |−1 ,
kU (U ⊤ Û − WU )k2→∞ ≤ 4kEk2∞ kU k2→∞ |λr |−2 .
By assumption |λr | > 4kEk∞ , so |λˆr | ≥ 12 |λr | and kEk∞ |λ̂r |−1 ≤ 2kEk∞ |λr |−1 ≤
28
1
2.
J. CAPE, M. TANG, AND C. E. PRIEBE
Therefore,
1
kÛ − U WU k2→∞ ,
2
≤ 2kEk∞ kU k2→∞ |λr |−1 ,
kE(Û − U WU )Λ̂−1 k2→∞ ≤
k(U U ⊤ )E(Û − U WU )Λ̂−1 k2→∞
kEU WU Λ̂−1 k2→∞ ≤ 2kEk∞ kU k2→∞ |λr |−1 ,
k(U U ⊤ )EU WU Λ̂−1 k2→∞ ≤ 2kEk∞ kU k2→∞ |λr |−1 ,
kU (U ⊤ Û − WU )k2→∞ ≤ kEk∞ kU k2→∞ |λr |−1 .
∞
Hence, kÛ − U WU k2→∞ ≤ 14 kEk
kU k2→∞ .
|λr |
6.5. Proof of Theorem 4.5.
Proof of Theorem 4.5. Note that rank(X) = r implies that the matrix (I − V V ⊤ )X ⊤ vanishes. Therefore, rewriting Corollary 3.4 yields the
decomposition
V̂ − V WV = (I − V V ⊤ )E ⊤ U WU Σ̂−1 + (I − V V ⊤ )E ⊤ (Û − U WU )Σ̂−1
+ V (V ⊤ V̂ − WV ).
Observe that (I − V V ⊤ ) = V⊥ V⊥⊤ and
k(V⊥ V⊥⊤ )E ⊤ U WU Σ̂−1 k2→∞ ≤ k(V⊥ V⊥⊤ )E ⊤ U k2→∞ σr−1 (X̂).
By Proposition 7.5 and Lemma 7.8,
k(V⊥ V⊥⊤ )E ⊤ (Û − U WU )Σ̂−1 k2→∞ ≤ k(V⊥ V⊥⊤ )E ⊤ k2→∞ kÛ − U WU k2 kΣ̂−1 k2
√
≤ 2k(V⊥ V⊥⊤ )E ⊤ k2→∞ k sin Θ(Û , U )k2 σr−1 (X̂).
Furthermore, Proposition 7.5 and Lemma 7.7 yield
kV (V ⊤ V̂ − WV )k2→∞ ≤ k sin Θ(V̂ , V )k22 kV k2→∞ .
Now consider the matrix (V⊥ V⊥⊤ )E ⊤ ∈ Rp2×p1 , and observe that its
columns are centered, multivariate normal random vectors with covariance
matrix (V⊥ V⊥⊤ ). It follows that row i of the matrix (V⊥ V⊥⊤ )E ⊤ is a centered, multivariate normal random vector with covariance matrix σi2 I where
σi2 := (V⊥ V⊥⊤ )i,i ≤ 1 and I ∈ Rp1 ×p1 denotes the identity matrix. By Gaussian concentration and applying a union
p2 ≫ p1 ,
p
p bound with the hypothesis
⊤
⊤
we have that k(V⊥ V⊥ )E k2→∞ = O( p1 log(p1 p2 )) = O( p1 log(p2 )) with
probability at least 1 − 31 p−2
2 .
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY 29
As for the matrix (V⊥ V⊥⊤ )E ⊤ U ∈ Rp2×r , the above argument implies
that entry (i, j) is N (0, σi2 ). Hence
as above, we
p
p by the same arguments
have k(V⊥ V⊥⊤ )E ⊤ U k2→∞ = O( r log(rp2 )) = O( r log(p2 )) with probability at least 1 − 13 p−2
2 .
√
√
By hypothesis r ≤ p1 ≪ p2 and σr (X) ≥ Cp2 / p1 where kEk2 = O( p2 )
holds with probability at least 1 − 13 p−2
2 , hence σr (X) ≥ CkEk2 . For this
setting the rate optimal bounds in [6] are given by
√
√
p1
p2
k sin Θ(Û , U )k2 = Θ
and k sin Θ(V̂ , V )k2 = Θ
.
σr (X)
σr (X)
Combining these observations yields
!
k(V⊥ V⊥⊤ )E ⊤ U k2→∞
!
r log(p2 )
≤C
;
σr (X)
σr (X̂)
!
!
p
p1 log(p2 )
k(V⊥ V⊥⊤ )E ⊤ k2→∞
k sin Θ(Û , U )k2 ≤ C
≤C
σr2 (X)
σr (X̂)
√
p1
k sin Θ(V̂ , V )k22 kV k2→∞ ≤ C
kV k2→∞ .
σr (X)
p
3/2 p
p1
log(p2 )
p2 σr (X)
3/2
By assumption p2 = Ω(p1 ), so in the absence of a bounded coherence
assumption √1p2 k sin Θ(V̂ , V )k2 ≤ kV̂ − V WV k2→∞ and
kV̂ − V WV k2→∞ ≤ C
≤C
!
p
√
max{ r log(p2 ), p1 }
σr (X)
!
p
√
max{ r log(p2 ), p1 }
k sin Θ(V̂ , V )k2 .
√
p2
On the other hand, provided kV k2→∞ = O
tion of bounded coherence, then
√
r log(p2 )
√
k sin Θ(V̂ , V )k2 .
C
p2
√1 k sin Θ(V̂
p2
q
r
p2
under the assump-
, V )k2 ≤ kV̂ − V WV k2→∞ ≤
6.6. Proof of Theorem 4.9.
Proof of Theorem 4.9. Again we wish to bound kÛ − U WU k2→∞ .
Observe that the matrix (I − U U ⊤ )O vanishes since rank(O) = r. This fact
!
;
30
J. CAPE, M. TANG, AND C. E. PRIEBE
together with Corollary 3.2 implies the bound
kÛ − U WU k2→∞ ≤ k(I − U U ⊤ )(Ô − O)U WU Σ̂−1 k2→∞
+ k(I − U U ⊤ )(Ô − O)(Û − U WU )Σ̂−1 k2→∞
+ kU k2→∞ kU ⊤ Û − WU k2 .
The above bound can be further weakened to yield
kÛ − U WU k2→∞ ≤ k(Ô − O)U k2→∞ kΣ̂−1 k2
+ kU k2→∞ kU ⊤ (Ô − O)U k2 kΣ̂−1 k2
+ kÔ − Ok2 kÛ − U WU k2 kΣ̂−1 k2
+ kU k2→∞ kU ⊤ Û − WU k2 .
We proceed to bound all of the terms on the right hand side of the above
inequality. To this end, a straightforward calculation reveals that
kÔ − Ok2 ≤ 3 × max{kA1 − P k2 , kA2 − P k2 }.
√
For i = 1, 2, then kAi −P k2 = O( ∆) asymptotically almost surely when the
maximum expected degree of Gi , denoted ∆, satisfies ∆ ≫ log4 (n) [25] as in
the hypothesis. Furthermore, the assumption σr (O) = Ω(∆) implies σr (Ô) =
Ω(∆) asymptotically almost surely in n. Combining these observations with
the proof of Lemma 7.8 and the result of Theorem 7.9 yields the relations
CkÔ − Ok2
1
kÛ − U WU k2 ≤ Ck sin Θ(Û , U )k2 ≤
=O √
.
σr (O)
∆
It is worth noting that the above relations provide a naı̈ve bound for the
underlying quantity of interest, kÛ − U WU k2→∞ .
Next, for the matrix, (Ô − O)U ∈ R2n×r , consider the bound
√
k(Ô − O)U k2→∞ ≤ r maxi∈[2n],j∈[r]|h(Ô − O)uj , ei i|.
Note that Uk+n,j = Uk,j for all 1 ≤ k ≤ n. Now for each 1 ≤ i ≤ n and
1 ≤ j ≤ r,
h(Ô − O)uj , ei i = e⊤
i (Ô − O)uj
n
2n
X
X
1 1
Ai,k−n + A2i,k−n − 2Pi,k−n Uk,j
(A1i,k − Pi,k )Uk,j +
2
k=1
k=n+1
n
X
3 1
1
=
Ai,k + A2i,k − 2Pi,k Uk,j .
2
2
=
k=1
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY 31
Observe that for n + 1 ≤ i ≤ 2n, the roles of A1 and A2 are interchanged.
For any 1 ≤ i ≤ n, the above expansion is a sum of independent (in
k), bounded, mean zero random variables taking values in [−2Uk,j , 2Uk,j ].
Hence by Hoeffding’s inequality, with probability tending to one in n,
p
k(Ô − O)U k2→∞ = O( r log(n)).
Similarly, for the matrix U ⊤ (Ô − O)U ∈ Rr×r ,
√
kU ⊤ (Ô − O)U k2 ≤ rkU ⊤ (Ô − O)U k2→∞
≤ r maxi∈[r],j∈[r]|h(Ô − O)uj , ui i|.
In particular for 1 ≤ i, j ≤ r, then
h(Ô − O)uj , ui i =
u⊤
i (Ô −
n X
n
X
O)uj =
(2A1l,k + 2A2l,k − 4Pl,k )Uk,j Ul,i
l=1 k=1
=
X
1≤l<k≤n
4(A1l,k + A2l,k − 2Pl,k )Uk,j Ul,i
This is a sum of independent, mean zero, bounded random variables taking values in [−8Uk,j Ul,i , 8Uk,j Ul,i ]. By another application of Hoeffding’s
inequality, with probability almost one,
p
kU ⊤ (Ô − O)U k2 = O(r log(r)).
Note that kU k2→∞ ≤ 1 always holds (here we do not assume bounded
coherence) and that our hypotheses imply kΣ̂−1 k2 = O(1/∆). Lemma 7.7
behaves as O(1/∆). Hence
bounds kU ⊤ Û − WU k2 by k sin Θ(Û , U )k22 which
√
r log(n)
with probability
our analysis yields that kÛ − U WU k2→∞ = O
∆
1 − o(1) as n → ∞.
32
J. CAPE, M. TANG, AND C. E. PRIEBE
References.
[1] Zhidong Bai and Jack W. Silverstein, Spectral analysis of large dimensional random
matrices, vol. 20, Springer, 2010.
[2] Konstantinos Benidis, Ying Sun, Prabhu Babu, and Daniel P. Palomar, Orthogonal
sparse eigenvectors: A Procrustes problem, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2016), 4683–4686.
[3] Rajendra Bhatia, Matrix analysis, GTM, Springer-Verlag, New York, 1997.
[4] Adam W. Bojanczyk and Adam Lutoborski, The Procrustes problem for orthogonal
stiefel matrices, SIAM Journal on Scientific Computing 21 (1999), no. 4, 1291–1304.
[5] T. Tony Cai, Zongming Ma, and Yihong Wu, Sparse PCA: Optimal rates and adaptive
estimation, The Annals of Statistics 41 (2013), no. 6, 3074–3110.
[6] T. Tony Cai and Anru Zhang, Rate-optimal perturbation bounds for singular subspaces with applications to high-dimensional statistics, preprint arXiv:1605.00353v1,
to appear in The Annals of Statistics (2016).
[7] Emmanuel J. Candès and Benjamin Recht, Exact matrix completion via convex optimization, Foundations of Computational Mathematics 9 (2009), no. 6, 717–772.
[8] Li Chen, Joshua T. Vogelstein, Vince Lyzinski, and Carey E. Priebe, A joint graph
inference case study: The C. elegans chemical and electrical connectomes, Worm 5
(2016), no. 2.
[9] Yasuko Chikuse, Statistics on special manifolds, vol. 174, Springer Science & Business
Media, 2012.
[10] Chandler Davis and William Morton Kahan, The rotation of eigenvectors by a perturbation. iii, SIAM Journal on Numerical Analysis 7 (1970), no. 1, 1–46.
[11] Ian L. Dryden, Alexey Koloydenko, and Diwei Zhou, Non-euclidean statistics for
covariance matrices with applications to diffusion tensor imaging, The Annals of
Applied Statistics 3 (2009), no. 3, 1102–1123.
[12] Ian L. Dryden and Kanti V. Mardia, Statistical shape analysis with applications in
R, John Wiley & Sons, 2016.
[13] Alan Edelman, Tomás A. Arias, and Steven T. Smith, The geometry of algorithms
with orthogonality constraints, SIAM Journal on Matrix Analysis and Applications
20 (1998), no. 2, 303–353.
[14] Yonina C Eldar and Gitta Kutyniok, Compressed sensing: theory and applications,
Cambridge University Press, 2012.
[15] Jianqing Fan, Yuan Liao, and Martina Mincheva, Large covariance estimation by
thresholding principal orthogonal complements, Journal of the Royal Statistical Society: Series B (Statistical Methodology) 75 (2013), no. 4, 603–680.
[16] Jianqing Fan, Philippe Rigollet, and Weichen Wang, Estimation of functionals of
sparse covariance matrices, The Annals of Statistics 43 (2015), no. 6, 2706–2737.
[17] Jianqing Fan, Weichen Wang, and Yiqiao Zhong, An eigenvector perturbation bound
and its application to robust covariance estimation, arXiv:1603.03516v1 (2016).
[18] Donniell E. Fishkind, Daniel L. Sussman, Minh Tang, Joshua T. Vogelstein, and
Carey E. Priebe, Consistent adjacency-spectral partitioning for the stochastic block
model when the model parameters are unknown, SIAM Journal on Matrix Analysis
and Applications 34 (2013), no. 1, 23–39.
[19] John C. Gower and Garmt B. Dijksterhuis, Procrustes problems, no. 30, Oxford University Press, 2004.
[20] Paul W. Holland, Kathryn Blackmond Laskey, and Samuel Leinhardt, Stochastic
blockmodels: First steps, Social networks 5 (1983), no. 2, 109–137.
[21] Roger A. Horn and Charles R. Johnson, Matrix analysis, Cambridge University Press,
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY 33
2012.
[22] Vladimir Koltchinskii and Karim Lounici, New asymptotic results in principal component analysis, preprint arXiv:1601.01457 (2016).
[23] Can M. Le, Elizaveta Levina, and Roman Vershynin, Optimization via low-rank approximation for community detection in networks, The Annals of Statistics 44 (2016),
no. 1, 373–400.
[24] Jing Lei and Alessandro Rinaldo, Consistency of spectral clustering in stochastic block
models, The Annals of Statistics 43 (2015), no. 1, 215–237.
[25] Linyuan Lu and Xing Peng, Spectra of edge-independent random graphs, The Electronic Journal of Combinatorics 20 (2013), no. 4, P27.
[26] Vince Lyzinski, Information recovery in shuffled graphs via graph matching, preprint
arXiv:1605.02315 (2016).
[27] Vince Lyzinski, Youngser Park, Carey E. Priebe, and Michael W. Trosset, Fast embedding for jofc using the raw stress criterion, to appear in The Journal of Computational
and Graphical Statistics (2016).
[28] Vince Lyzinski, Daniel L. Sussman, Minh Tang, Avanti Athreya, and Carey E. Priebe,
Perfect clustering for stochastic blockmodel graphs via adjacency spectral embedding,
Electronic Journal of Statistics 8 (2014), no. 2, 2905–2922.
[29] Sean O’Rourke, Van Vu, and Ke Wang, Random perturbation of low rank matrices:
Improving classical bounds, preprint arXiv:1311.2657.
[30]
, Eigenvectors of random matrices: A survey, Journal of Combinatorial Theory, Series A 144 (2016), 361–442.
[31] Debashis Paul and Alexander Aue, Random matrix theory in statistics: A review,
Journal of Statistical Planning and Inference 150 (2014), 1 – 29.
[32] Carey E. Priebe, David J. Marchette, Zhiliang Ma, and Sancar Adali, Manifold matching: Joint optimization of fidelity and commensurability, Brazilian Journal of Probability and Statistics (2013), 377–400.
[33] Elizaveta Rebrova and Roman Vershynin, Norms of random matrices: local and global
problems, preprint arXiv:1608.06953v1.
[34] Karl Rohe, Sourav Chatterjee, and Bin Yu, Spectral clustering and the highdimensional stochastic blockmodel, The Annals of Statistics (2011), 1878–1915.
[35] Mark Rudelson and Roman Vershynin, Delocalization of eigenvectors of random matrices with independent entries, Duke Mathematical Journal 164 (2015), no. 13, 2507–
2538.
[36] G. W. Stewart and Ji-guang Sun, Matrix perturbation theory, Academic Press, 1990.
[37] Daniel L. Sussman, Minh Tang, Donniell E. Fishkind, and Carey E. Priebe, A consistent adjacency spectral embedding for stochastic blockmodel graphs, Journal of the
American Statistical Association 107 (2012), no. 499, 1119–1128.
[38] Daniel L. Sussman, Minh Tang, and Carey E. Priebe, Consistent latent position estimation and vertex classification for random dot product graphs, IEEE Transactions
on Pattern Analysis and Machine Intelligence 36 (2014), no. 1, 48–57.
[39] Minh Tang, Avanti Athreya, Daniel L. Sussman, Vince Lyzinski, Youngser Park, and
Carey E. Priebe, A semiparametric two-sample hypothesis testing problem for random
graphs, Journal of Computational and Graphical Statistics (2016).
[40] Minh Tang, Avanti Athreya, Daniel L. Sussman, Vince Lyzinski, and Carey E.
Priebe, A nonparametric two-sample hypothesis testing problem for random dot product graphs, to appear in Bernoulli (2014).
[41] Minh Tang and Carey E. Priebe, Limit theorems for eigenvectors of the normalized
laplacian for random graphs, preprint arXiv:1607.08601v1.
[42] Ulrike Von Luxburg, A tutorial on spectral clustering, Statistics and Computing 17
34
J. CAPE, M. TANG, AND C. E. PRIEBE
(2007), no. 4, 395–416.
[43] Per-Åke Wedin, Perturbation bounds in connection with singular value decomposition,
BIT Numerical Mathematics 12 (1972), no. 1, 99–111.
[44] Hermann Weyl, Das asymptotische verteilungsgesetz der eigenwerte linearer partieller
differentialgleichungen (mit einer anwendung auf die theorie der hohlraumstrahlung),
Mathematische Annalen 71 (1912), no. 4, 441–479.
[45] Jianfeng Yao, Zhidong Bai, and Shurong Zheng, Large sample covariance matrices
and high-dimensional data analysis, no. 39, Cambridge University Press, 2015.
[46] Stephen J. Young and Edward R. Scheinerman, Random dot product graph models
for social networks, International Workshop on Algorithms and Models for the WebGraph (2007), 138–149.
[47] Yi Yu, Tengyao Wang, and Richard J. Samworth, A useful variant of the Davis–
Kahan theorem for statisticians, Biometrika 102 (2015), no. 2, 315–323.
7. Supplement A. In this supplementary material, we provide technical proofs pertaining to the 2 → ∞ norm, singular subspace geometry, and
a modification of Theorem 2 in [47]. The material here plays an essential
role in the proofs of our main theorems.
7.1. Technical tools for the 2 → ∞ norm. For A ∈ Rp1×p2 , consider the
vector norm on matrices k · k2→∞ defined by
kAk2→∞ := max kAxk∞
(7.1)
kxk2 =1
Let Ai ∈ Rp2 denote the i-th row of A. The following proposition shows that
kAk2→∞ corresponds to the maximum Euclidean norm on the rows of A.
Proposition 7.1.
For A ∈ Rp1×p2 , then kAk2→∞ = max kAi k2 .
i∈[p1 ]
Proof. The definition of k · k2→∞ and the Cauchy-Schwarz inequality
together yield that kAk2→∞ ≤ max kAi k2 , since
i∈[p1 ]
(7.2)
kAk2→∞ := max kAxk∞ = max max |hAx, ei i| ≤ max kAi k2 .
kxk2 =1
kxk2 =1i∈[p1 ]
i∈[p1 ]
Barring the trivial case A ≡ 0, let e⋆ denote the standard basis vector in Rp1
with index given by arg maxi∈[p1 ] kAi k2 > 0, noting that for each i ∈ [p1 ],
−1 ⊤
⊤
Ai = e⊤
i A. Now define the unit-Euclidean norm vector x⋆ := ke⋆ Ak2 (e⋆ A).
Then
(7.3)
kAk2→∞ = max max |hAx, ei i| ≥ |hAx⋆ , e⋆ i| = ke⊤
⋆ Ak2 = max kAi k2 .
kxk2 =1i∈[p1 ]
This establishes the desired equivalence.
i∈[p1 ]
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY 35
Remark 7.2. The norm k · k2→∞ is said to be subordinate with respect
to the vector norms k · k2 and k · k∞ , since for any x ∈ Rp2 , kAxk∞ ≤
kAk2→∞ kxk2 . Note, however, that k · k2→∞ is not submultiplicative for matrices in general. For example,
1 1
1 2
A=B=
and AB =
, but
0 1
0 1
√
√
kABk2→∞ = 5 > 4 = kAk2→∞ kBk2→∞ .
Proposition 7.3.
(7.4)
For A ∈ Rp1×p2 , then
√
√
kAk2→∞ ≤ kAk2 ≤ min{ p1 kAk2→∞ , p2 kA⊤ k2→∞ }
Proof. The first inequality is obvious since
kAk2→∞ = max max |hAx, ei i| ≤ max max |hAx, yi| = kAk2 .
kxk2 =1i∈[p1 ]
kxk2 =1kyk2 =1
The second inequality holds by an application of the Cauchy-Schwarz in√
equality together with the vector norm relationship kxk2 ≤ p1 kxk∞ for
x ∈ Rp1 . In particular,
kAk2 = max max |hAx, yi| ≤ max kAxk2 ≤
kxk2 =1kyk2 =1
kxk2 =1
√
p1 max kAxk∞ =
kxk2 =1
√
p1 kAk2→∞ .
By the transpose-invariance of the spectral norm we further have by symmetry that
√
kAk2 = kA⊤ k2 ≤ p2 kA⊤ k2→∞ .
Remark 7.4. The relationship in Proposition 7.3 is sharp. Indeed, for
√
the second inequality, take A := {1/ p2 }p1 ×p2 . Then kAk2→∞ = 1 and
p
√
kA⊤ k2→∞ = p1 /p2 while kAk2 = p1 . In particular, for “tall” rectangular
matrices, the spectral norm can be much larger than the 2 → ∞ norm.
Proposition 7.5.
then
For all A ∈ Rp1×p2 , B ∈ Rp2 ×p3 , and C ∈ Rp4 ×p1 ,
(7.5)
kABk2→∞ ≤ kAk2→∞ kBk2
and
(7.6)
kCAk2→∞ ≤ kCk∞ kAk2→∞ .
36
J. CAPE, M. TANG, AND C. E. PRIEBE
Proof. The subordinate property of k · k2→∞ yields that for all x ∈ Rp3 ,
kABxk∞ ≤ kAk2→∞ kBxk2 , hence maximizing over all unit vectors x yields
Equation (7.5).
In contrast, Eqn. (7.6) follows from Hölder’s inequality coupled with the
fact that the vector norms k·k1 and k·k∞ are dual to one another. Explicitly,
kCAk2→∞ = max max |hCAx, ei i| ≤ max max kC ⊤ ei k1 kAxk∞
kxk2 =1i∈[p1 ]
kxk2 =1i∈[p1 ]
⊤
max kAxk∞ = kC ⊤ k1 kAk2→∞
≤ max kC yk1
kxk2 =1
kyk1 =1
= kCk∞ kAk2→∞ .
Proposition 7.6.
(7.7)
(7.8)
For A ∈ Rr×s , U ∈ Op1 ,r , and V ∈ Op2 ,s , then
kAk2 = kU Ak2 = kAV ⊤ k2 = kU AV ⊤ k2 ,
kAk2→∞ = kAV ⊤ k2→∞ .
Moreover, kU Ak2→∞ need not equal kAk2→∞ .
Proof. The statement follows from Proposition 7.5 and the submultiplicativity of k · k2 together with the observation that U ⊤ U = Ir and
V ⊤ V = Is . In contrast, the matrices
√
√
√ √
2
1/√2 1/ √2
1 1
1/√2
(7.9)
U :=
, A :=
, UA =
0 1
1/ 2 −1/ 2
1/ 2 0
exhibit kU Ak2→∞ =
p
5/2 >
√
2 = kAk2→∞ .
7.2. Singular subspace geometric bounds.
7.3. Technical (deterministic) lemmas. Let U, Û ∈ Op×r and WU ∈ Or
denote the corresponding Frobenius-optimal Procrustes solution from Section 2.3. In what follows, we use the fact that k sin Θ(Û , U )k2 = kU⊥⊤ Û k2 =
k(I − U U ⊤ )Û Û ⊤ k2 ([3], Chapter 7).
Lemma 7.7. Let T ∈ Rr×r be arbitrary. The following relations hold with
respect to U, Û , WU , and T in terms of k · k2 and sin Θ distance.
(7.10)
(7.11)
k sin Θ(Û , U )k2 = kÛ − U U ⊤ Û k2 ≤ kÛ − U T k2 ,
1
k sin Θ(Û , U )k22 ≤ kU ⊤ Û − WU k2 ≤ k sin Θ(Û , U )k22 .
2
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY 37
Proof. The matrix (Û − U U ⊤ Û ) ∈ Rp×r represents the residual of Û
after orthogonally projecting onto the subspace spanned by the columns of
U . Note that kAk22 = maxkxk2 =1 hA⊤ Ax, xi, and so several intermediate steps
of computation yield that for any T ∈ Rr×r ,
kÛ − U U ⊤ Û k22 = maxkxk2 =1 h(Û − U U ⊤ Û )⊤ (Û − U U ⊤ Û )x, xi
= maxkxk2 =1 h(I − Û ⊤ U U ⊤ Û )x, xi
≤ maxkxk2 =1 h(I − Û ⊤ U U ⊤ Û )x, xi + k(T − U ⊤ Û )xk22
= maxkxk2 =1 h(Û − U T )⊤ (Û − U T )x, xi
= kÛ − U T k22 .
On the other hand, by Proposition 7.6 it follows that
kÛ −U U ⊤ Û k2 = kÛ Û ⊤ −U U ⊤ Û Û ⊤ k2 = k(I−U U ⊤ )Û Û ⊤ k2 = k sin Θ(Û , U )k2 .
The second matrix (U ⊤ Û − WU ) ∈ Rr×r may be viewed as a residual measure of the extent to which U ⊤ Û is “almost” the optimal rotation matrix
WU , where “optimal” is with respect to the Frobenius norm Procrustes
problem as before. The unitary invariance of k · k2 together with the interpretation of canonical angles between Û and U , denoted {θi }i where
cos(θi ) = σi (U ⊤ Û ) ∈ [0, 1] yields
kU ⊤ Û − WU k2 = kUU ΣU VU⊤ − UU VU⊤ k2 = kΣU − Ir k2 = 1 − mini cos(θi ).
Thus, both
kU ⊤ Û − WU k2 ≤ 1 − mini cos2 (θi ) = maxi sin2 (θi ) = k sin Θ(Û , U )k22
and
1
1
1
kU ⊤ Û − WU k2 ≥ (1 − mini cos2 (θi )) = maxi sin2 (θi ) = k sin Θ(Û , U )k22 .
2
2
2
Lemma 7.8.
(7.12)
The quantity kÛ − U WU k2 can be bounded as follows.
k sin Θ(Û , U )k2 ≤ kÛ − U W2⋆ k2 ≤ kÛ − U WU k2
and
(7.13)
kÛ − U WU k2 ≤ k sin Θ(Û , U )k2 + k sin Θ(Û , U )k22 .
Moreover, together with Lemma 1 in [6],
(7.14)
√
kÛ − U WU k2 ≤ min{1 + k sin Θ(Û , U )k2 , 2}k sin Θ(Û , U )k2 .
38
J. CAPE, M. TANG, AND C. E. PRIEBE
Proof. The lower bound follows from setting T = W2⋆ in Lemma 7.7
together with the definition of W2⋆ . Again by Lemma 7.7 and together with
the triangle inequality,
kÛ − U WU k2 ≤ kÛ − U U ⊤ Û k2 + kU (U ⊤ Û − WU )k2
≤ k sin Θ(Û , U )k2 + k sin Θ(Û , U )k22
The proof of Lemma 1 in [6] establishes that
inf kÛ − U W k2 ≤ kÛ − U WU k2 ≤
W ∈Or
√
2k sin Θ(Û , U )k2 .
This completes the proof.
7.4. Modification of Theorem 2 in [47]. Below we prove a modified version of Theorem 2 in [47] stated in terms of k sin Θ(V̂ , V )k2 rather than
k sin Θ(V̂ , V )kF . Although the original theorem implies a bound on the
quantity k sin Θ(V̂ , V )k2 , here we are able to remove a multiplicative factor depending on the rank of V . Our proof approach combines the original
argument together with classical results in [36]. The statement of the theorem and its proof below interface the notation in Section 2 with the notation
in Section 2 of [47].
Theorem 7.9 (Modification of [47], Theorem 2). Let X, X̂ ∈ Rp×p be
symmetric matrices with eigenvalues λ1 ≥ · · · ≥ λp and λ̂1 ≥ · · · ≥ λ̂p ,
respectively. Write E := X̂ − X and fix 1 ≤ r ≤ s ≤ p. Assume that
δgap := min(λr−1 − λr , λs − λs+1 ) > 0 where λ0 := ∞ and λp+1 := −∞. Let
d = s−r+1 and let V := [vr |vr+1 | . . . |vs ] ∈ Rp×d and V̂ := [v̂r |v̂r+1 | . . . |v̂s ] ∈
Rp×d have orthonormal columns satisfying Xvj = λj vj and X̂ v̂j = λ̂j v̂j for
j = r, r + 1, . . . , s. Then
2kEk2
.
(7.15)
k sin Θ(V̂ , V )k2 ≤
δgap
Proof. Let Λ, Λ̂ ∈ Rd×d be the diagonal matrices defined as Λ :=
diag(λr , λr+1 , . . . , λs ) and Λ̂ := diag(λ̂r , λ̂r+1 , . . . , λ̂s ). Also define Λ⊥ :=
diag(λ1 , . . . , λr−1 , λs+1 , . . . , λp ) and let V⊥ ∈ Op,p−d be such that P :=
[V |V⊥ ] ∈ Op and P ⊤ XP = diag(Λ, Λ⊥ ). Observe that X̂ V̂ − V̂ Λ̂ since
Λ̂ = V̂ ⊤ X̂ V̂ . Then
0 = X̂ V̂ − V̂ Λ̂ = (X V̂ − V̂ Λ) + (X̂ − X)V̂ − V̂ (Λ̂ − Λ).
THE TWO-TO-INFINITY NORM AND SINGULAR SUBSPACE GEOMETRY 39
By an inequality due to Weyl ([36], Corollary IV.4.9) and properties of the
spectral norm, then
kX V̂ − V̂ Λk2 ≤ k(X̂ − X)V̂ k2 + kV̂ (Λ̂ − Λ)k2
≤ kX̂ − Xk2 + kΛ̂ − Λk2
≤ 2kX̂ − Xk2 = 2kEk2 .
In summary,
kX V̂ − V̂ Λk2 ≤ 2kEk2 .
Finally, by an application of Theorem 3.6 in [36], it follows that
!
kX V̂ − V̂ Λk2
.
k sin Θ(V̂ , V )k2 ≤
δgap
Combining the above two inequalities yields the result.
Department of Applied Mathematics and Statistics
Johns Hopkins University
3400 N. Charles Street
Baltimore, Maryland 21218
USA
E-mail: [email protected]
[email protected]
[email protected]
| 10math.ST
|
A Study of Language Usage Evolution in Open Source
Software
Siim Karus
Harald Gall
University of Tartu, Estonia
University of Zurich, Switzerland
University of Zurich
Switzerland
[email protected]
[email protected]
ABSTRACT
The use of programming languages such as Java and C in Open
Source Software (OSS) has been well studied. However, many
other popular languages such as XSL or XML have received minor
attention. In this paper, we discuss some trends in OSS
development that we observed when considering multiple
programming language evolution of OSS. Based on the revision
data of 22 OSS projects, we tracked the evolution of language usage
and other artefacts such as documentation files, binaries and
graphics files. In these systems several different languages and
artefact types including C/C++, Java, XML, XSL, Makefile,
Groovy, HTML, Shell scripts, CSS, Graphics files, JavaScript, JSP,
Ruby, Phyton, XQuery, OpenDocument files, PHP, etc. have been
used. We found that the amount of code written in different
languages differs substantially. Some of our findings can be
summarized as follows: (1) JavaScript and CSS files most often coevolve with XSL; (2) Most Java developers but only every second
C/C++ developer work with XML; (3) and more generally, we
observed a significant increase of usage of XML and XSL during
recent years and found that Java or C are hardly ever the only
language used by a developer. In fact, a developer works with more
than 5 different artefact types (or 4 different languages) in a project
on average.
Categories and Subject Descriptors
D.2.7 [Software Engineering]: Distribution, Maintenance, and
Enhancement – Restructuring, reverse engineering, and
reengineering, version control; D.3.2 [Programming Languages]:
Language Classifications – object-oriented languages, extensible
language; K.2 [Computing Milieux] History of Computing –
Software, People
1. INTRODUCTION
There has been a lot of effort put into studying the use of procedural
languages such as C and object-oriented languages such as Java.
Even less common languages such as Perl, Python, or Ruby have
received their fair share of attention. However, when looking at the
statistics of most used languages, a language far more common than
any of the ones mentioned earlier, strikes out. According to
ohloh.net 1 which tracks more than 400,000 open source software
(OSS) repositories, about 15% of actively developed OSS projects
contain XML while less than 10% contain HTML, and other
languages are present in less than 8 % of projects. Even more, XML
is also the language with the most lines of code changed per month.
The use of XML in OSS projects, however, has not received
considerable attention so far.
As XML is a mark-up language, having only little meaning on its
own, it would be interesting to understand, what other language it is
being used with. Looking at co-evolving file types, we could
investigate that issue. Even more general, the question of which
languages and file types are used together and, therefore, are coevolving in OSS projects can be formulated.
To address this research question, we studied 22 OSS software
repositories over 12 years. Our study focused on two levels of file
type couplings: developer and commit level. On the developer level,
developers in the projects were studied regarding their language
experience in the projects. For that, we addressed the following
questions:
General Terms
Management,
Measurement,
Documentation,
Experimentation, Human Factors, Languages.
Which languages and artefacts are commonly used in OSS
development and in what proportions?
How many file types does a developer typically work with
and are there some usage patterns for file types?
How has the language usage and, as a consequence, the
language expertise requirements for developers changed
during the observation period?
Design,
Keywords
Programming language, Open source software, evolution, software
archives.
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that
copies bear this notice and the full citation on the first page. To copy
otherwise, or republish, to post on servers or to redistribute to lists,
requires prior specific permission and/or a fee.
Conference’10, Month 1–2, 2010, City, State, Country.
Copyright 2010 ACM 1-58113-000-0/00/0010…$10.00.
At the commit level, co-changing files appearing together in
commits were studied. For that, we addressed the following
questions:
Which co-evolution patterns can be observed in OSS
projects (e.g., are there distinct dependencies between
languages or artefact types commonly edited together)?
How have the dependencies between file types used in the
projects changed during the observation period?
Additionally, on a more general level of OSS projects studied, we
were interested in what are the most common languages or artefact
1
http://www.ohloh.net
TABLE 1.
OVERVIEW OF OSS PROJECTS USED IN THE STUDY.
Project Name
Type
Period Studied
cocoon
business
2003 - 2003
18
22
99
3575
commons
business
2007 - 2009
45
31
2981
6029
esb
business
2007 - 2009
28
23
1419
922
httpd
business
1996 - 1997
10
6
99
79
Zope
business
1996 - 1997
3
3
100
26
wsas
business
2007 - 2009
37
16
1517
1356
wsf
business
2007 - 2009
37
27
3642
4836
bibliographic
desktop
2003 - 2008
4
7
477
155
bizdev
desktop
2003 - 2009
6
6
129
9
dia
desktop
1997 - 2009
152
12
4196
3042
docbook
desktop
2000 - 2009
30
26
7540
6612
docbook2X
desktop
1999 - 2007
2
16
1082
304
exist
desktop
2002 - 2009
39
30
7116
4651
fbug-read-only
desktop
2007 - 2007
2
12
23
291
feedparser-read-only
desktop
2004 - 2009
5
10
263
4651
gnome-doc-utils
desktop
1999 - 2009
127
11
1032
328
gnucash
desktop
1997 - 2009
21
21
11757
3855
groovy
desktop
2003 - 2009
61
28
8339
5583
nltk-read-only
desktop
2001 - 2001
3
8
98
83
subversion
desktop
2000 - 2000
3
6
99
52
tei
desktop
2001 - 2009
14
26
5772
3832
valgrind
desktop
2002 - 2009
21
15
6857
3339
types in the 22 OSS projects. Our observations clearly show some
trends: (1) JavaScript and CSS files most often co-evolve with
XSL; (2) almost every Java developer but only every second C
developer works with XML; (3) over the years a significant
increase of XSL and XML usage can be observed showing
technological shifts due to framework development.
The paper is organized as follows. In section 2, the OSS projects
used in the study are introduced and described. Section 3 details the
findings about developers and Section 4 discusses our findings
about co-evolution of different types of language usage in OSS
projects. Threats to validity are outlined in Section 5 and related
work is discussed in Section 6. We conclude with our results and
give a brief outlook onto future work.
2. Dataset
To study development patterns, a dataset of 22 OSS projects was
used. The projects were split into desktop type and business (server)
type projects by their nature. That is, projects offering business
functionality such as web services were considered to be business
type projects and projects mainly used in desktop environments
were considered to be of type desktop. Table 1 shows the periods
studied, number of developers (Devs), number of different artefact
types (Art.Types) used, number of commits/revisions (Revs) and
files for each of the projects used in this study. The number of files
stated in the table includes all files including those that were deleted
Dev.-s
Art. Types
Rev.-s
Files
during the course of the projects and are not present in the latest
revision of the corresponding project.
The projects were chosen so that they would represent a wide
spectrum of development projects in terms of type, duration,
development team size, and usage scenario. Whilst business type
projects commons, esb, wsas, and wsf belong to a larger complex
super-project called WSO2 and bizdev and bibliographic are
utilities for OpenOffice, the rest of the projects were mostly
independent from each other. Docbook, docbook2X, and gnomedoc-utils represent documentation development tools. Exist [1],
feedparser-read-only, groovy, tei, subversion, nltk-read-only
(natural language toolkit), fbug-read-only (firebug) and valgrind are
projects for software project development aids or libraries. httpd,
Zope, and cocoon are application development platforms. Gnucash
is an accounting application, and dia is a diagramming solution.
To better understand, how well the dataset represents the
population, the dataset was compared with graphs publicly available
from ohloh.net. In both cases the usage of C/C++ displayed steep
decrease in its usage share and Java presented sudden emergence
and strong yet no longer growing presence. The share of commits to
XML files was increasing and had reached the highest share of file
types used. The main difference between the dataset used and
ohloh.net data was the lower usage of HTML in our dataset. The
dataset used in the study accordingly exhibited higher share of
XML and Java compared to ohloh.net data. The distribution of
Figure 1. Distribution of major file types worked on in projects per year.
project configuration or by the build tools (e.g. ant or
Maven) to store project build configuration. The
distribution of these subtypes is shown in Figure 3.
major artefacts worked on in the projects in out dataset during
different years is shown on Figure 1.
We identified and classified 45 major file types of the most
common file extensions in our repository: Archive, Audio, awk,
Binary, C, C#, C++, Command Script, CSS, Data, DTD, Graphics,
Groovy, HTML, Java, JavaScript, jsp, Makefile, Manifest, MS
Office, No extension, OpenDocument, OpenXML, Patch and Diff,
PDF, Perl, PHP, Plaintext, PostScript, Project, Properties, Python,
Resources, Rich Text, Ruby, sed, Shell Script, SQL, SQML, TeX,
WSDL, XML, XML Schema, XQuery, and XSL. Other languages
were present with only very few files.
Most of the files were classified by their extensions; however, there
were some exceptions:
The category plaintext includes files with the extensions
.txt, .readme, .changes, .install and files named
“README”, “INSTALL”, “TODO”, “COPYING”,
“COPYRIGHT”,
“AUTHORS”,
“LICENSE”,
“ACKNOWLEDGEMENTS”,
“NEWS”,
“NOTES”,
“ChangeLog”, and “CHANGES”. These files contain
project documentation in plain text format.
The category Project contains XML files with root element
“project”. These files are mostly used by IDEs to store
The category Manifest contains files with the extension
“.manifest” and files named “manifest.xml”.
The category Properties contains files with extension
“properties” and XML files with root element “properties”.
These files are used in Java projects to store application
configuration.
The category “Perl” additionally contains extensionless
text files which begin with “#!/usr/bin/perl”.
The category “Shell Scripts” additionally contains
extensionless text files which begin with “#!/bin/sh”, “#!
/bin/sh”, or “#!/bin/bash”.
The category “SGML” additionally includes “catalog”
files.
Every file can belong only to one category at once. For example,
XSL, XAML, XHTML, etc. files were not counted as XML files,
neither are files that are included in other categories due to
exceptions (e.g. files named “manifest.xml”, which belong to
category Manifest). Another special general group is “files without
Figure 2. Proportion of developers generating different types of artefacts during different years.
TABLE 2.
MOST ABUNDANT FILE TYPES USED TOGETHER BY DEVELOPERS.
extensions”, which includes folders due to the differences in how
the repositories present their data.
The data was gathered in May 2009 and contains revision
information from February 1996 to April 2009 (12 years).
3. Developers
To study the habits of developers and find language usage sets
commonly present in the projects, we extracted developer
information from revision data in the revision control systems (CVS
and SVN). We then listed the file types used by each developer and
analyzed the data.
3.1 Languages Used
identified as plaintext files. Files without extensions (mostly
changes to directory structure) were edited by 37% of developer.
Makefiles and XML were used by 34% of the developers, making
these artefact types share the third and the fourth position. Java files
were edited by 26% of developers, followed by the popularity of
project files (21%) and HTML files (19%). Surprisingly, C/C++
files were used by fewer developers (14%) than XSL files (15%).
Considering that XSL has gained popularity while C/C++ has lost
its, it can be said that in the more recent years there are more active
XSL developers than there have been C/C++ developers. The ratio
of developers using different file types throughout the study period
is shown in Figure 2. Note that year 2009 figures only account for
the first quarter of the year (data collection point).
The most popular artefact type used by 64% of developers was
Figure 3. Distribution of project file subtypes in the dataset and the last years (ns marks revisions with explicit namespace).
Figure 4. Additional languages used in at least 20% of commits by C developers.
Table 2 displays the most common artefacts commonly used by the
same developer. The most common combination of file types used
by a developer was Java and XML. This can be explained by both
of these languages being in the top four artefact types encountered.
Among language pairs used by more than 10% of developers,
Plaintext and XML were the most popular second languages.
Interestingly, only 85% of XSL developers modified XML files.
This could be caused by XSL applied on either XML files with
extensions other than “xml” or by XSL being used to transform
documents created by the runtime or received from third party.
XML Schema editors were also active in XML development in 98%
of cases (followed by WSDL, Archive file, Properties file,
JavaScript and CSS developers). XSL was commonly seen together
with languages used in web development (i.e. HTML, XML
Schema, CSS, JavaScript and graphics files).
One should keep in mind that making commits to certain type of
files does not necessarily mean that the developer has expertise in
the responding field. The commits could be deferred from other
developers or be just necessities solved with the help of other
developers. The identification of expertise is a complex task studied
in other works like [2] and [3].
These sets of commonly co-appearing languages along with the
popularity of languages allow us to identify major classes of
developers by the languages they use. The three major classes
defined by the most popular languages are C/C++ developers, Java
developers and XML developers.
3.1.1 C/C++ Developers.
C/C++ developers were frequent users of plaintext files (used by
85% of C/C++ developers) and Makefiles (82%). This is expected
as plaintext files were commonly used to document C/C++ projects
while Makefiles were the chosen technology to control the C/C++
build process. Files without extensions were modified by 79% of
C/C++ developers, which can be explained by a decent folder
structure. The fourth most common language used by C developers
was Shell scripts (58% of C developers) followed closely by XML
(52% of C developers).. Further details about most abundant file
types used by developers can be seen in Table 2. The matrix shows
for developers using file type specified in rows the percentage of
developers also using file type specified by column (e.g. 42% of
developers of archive files also worked with XSL files).
During the late 1990s, most developers had worked with C, written
Makefiles and created some other types of artefacts. Since then, less
than half of the developers have written C or C++ code (after
dropping to 9% in 2005, the percentage of developers using C or
C++ has climbed steadily to 16% in 2009) and Makefiles have been
continuously become less popular dropping from 63% in 2002 to
19% in 2009 (see Figure 2).
The most commonly used language by C developers (apart from C
itself) has almost always been Makefiles and most commonly used
file type “plaintext” (see Figure 4). Nevertheless, the popularity of
plaintext files is slowly decreasing among C developers. Use of
XML has made a strong impression since its adoption in 1998 and
has reached more than 60% of C developers in 2005. This could be
related to more widespread adoption of XML standards and XML
replacing Makefile based building environments.
3.1.2 Java Developers.
A total of 79% of Java developers also worked on XML files,
making XML the most popular language used together with Java.
The second most popular language used together with Java was
Project files, which was used by 72% of Java developers. The top
three also includes files without extensions (directory structure
modifications), which were used by 71% of Java developers. The
next popular file types were used significantly less (see Table 2).
Usage of Java has been on the rise with more than 30% of
developers having used it in the last study period. As shown in
Figure 5, Java developers use more different types of artefacts than
C/C++ developers. The graph also displays that Java developers are
writing XSL by themselves less frequently than they used to. As
XSL has become more popular in general, it can be explained by
XSL being written by developers more focused on XSL and less on
Java
It is wrong to assume that the popularity of XML in Java projects is
mainly due to project build files. In fact, more than half of the .xml
files found in Java projects were of project-specific types. Also, the
use of binary files (including .class and .jar files) by Java
developers has dropped below 20%. This could be a result of using
separate library repositories instead of having all files in revision
control repository.
Figure 5. Additional languages used in at least 20% of commits by Java developers.
3.1.3 XML Developers.
Knowledge of developing XML files has also been on a steady rise
with more than 40% of the developers having used it in the period
2008-2009.
XML developers come from different areas and work with variety
of different artefacts. This is shown by the fact that only there are
lots of different artefact types used in more than 20% of commits by
XML developers (Figure 6). The most popular file type modified by
XML developers is “files without extensions” (used by more than
60% of XML developers), which has been slowly losing its
popularity among XML developers since 2002.
It is a good practice for .xml files to have explicitly defined
namespace(s), which can be used to verify the files. However, 31%
of .xml files did not specify their namespace. The most often
encountered namespaces were http://www.tei-c.org/ns/1.0 (29%)
and http://docbook.org/ns/docbook (17%), showing that XML is
often used for project or domain specific languages. This is
confirmed by the most popular root elements: <refentry> (either in
http://docbook.org/ns/docbook namespace or no namespace
specified, 27% of all root elements) and <elementSpec> (in
http://www.tei-c.org/ns/1.0 namespace, 21% of all root elements).
The most common root element in XML files used with Java was
<project> (8% of XML files). These files were classified into
“Project” category which mostly contained files without explicit
namespace (see Figure 3).
XSL, which is commonly accompanied by XML, has been used by
a steady 10% of developers since its introduction in 2000 with
another 10% gain since 2007.
3.2 The First Commit
While commits in general tell us about the file types used in the
projects, the first commit made by a developer tells a lot about the
initial experience and start-out of developers. We can expect
developers to prefer file types and languages they are more familiar
with when joining the development team.
The first commit also shows the patterns of how developers get
involved or build up their contribution. It is expected that a
developer using more different languages in its first commit needs
to understand the project’s architecture and build practices better
than a developer who starts by just changing a few lines in a single
file.
The number of different types of files in the developers’ first
Figure 6. Additional languages used in at least 20% of commits by XML developers.
commit was usually less than four with almost half being commits
of a single file type. There is also a trend of using fewer files and
file types in the first commit towards the end of the study period
(see Figure 7).
In the 1990s C and Makefile were the most popular choices as the
first commit language, but in the later years XML and Java have
taken the lead. The number of different file types present in the first
commit and the number of files in developers’ first commit are
lower in 2008-2009 than in the 1990s. In 2008-2009 75% of first
commits were of files of single type whilst only 15% of commits
made in 1990-s were of single file type.
The analysis of the most common file type combinations shows that
12% of first commits included both Makefiles and files without
extensions (3% contained no other file types). Most common single
file type commits were for files without extension (8%), Java (8%),
and XML (7%).
When considering all commits, 21% contained both Makefiles and
files without extensions (only 2% contained only these two and 2%
contained also C files). Java and XML files were encountered in 4%
of all commits (1% contained only these). The most common single
type commit file types were Java, XML, HTML and XSL (all
accounted for only 1% of commits). This shows that developers
expand their competences by learning and deploying new languages
during the project; however, these languages will be tightly coupled
causing files of different file types to be changed at a time.
Most developers started with XML (16%), Makefiles (17%) or Java
(15%), but rarely used only one language in their first commit.
4. Co-Changes
To find out, which file types or languages have been used together
and which files are co-changed, the file types for each commit were
analyzed. The common file types committed together were
identified for both project types business and desktop separately.
4.1 Business Type Projects
The most commonly encountered combination present in business
projects was a combination of Java and XML. About 15% of all
commits made to Java files were accompanied by changes to XML
files and 32% of changes to .xml files co-occurred with changes to
Java files.
The strongest bidirectional relation was found to be between
JavaScript and XSL files. More than 40% files of these types were
co-changed. Also, in 42% of cases, a change to a CSS file was
accompanied by a change to an XSL file. Other co-occurrences
were much less frequent even in case of web file types (e.g. changes
to CSS files were accompanied with changes to Javascript files in
only 36% of the cases). One reason for that could be that in the
projects studied XSL was mainly used for generating reports and
data presentations in web applications. This usually results in XSL
being used in place of writing HTML directly and thus gets changed
often during user interface development and testing. On the other
hand, co-change rate of less than 45% with other presentation type
artefacts (Javascript, CSS or graphics files) indicates that business
type projects in the dataset used XML for business document
transformations about as often as they used these for generating
presentations.
Commits, which contained multiple files of the same type were
most frequently commits of files of type graphics (53% of all
graphics commits), C (52% of all C commits), XML Schema
(50%), PHP (48%), Java (47%) and binary and XSL (both 43%).
That is, 53% of commits of graphics files contained more than one
graphics file. XML Schema files were more often changed along
with Java or XML files than any other XML Schema file. Similarly
WSDL files were changed with XML or Java files more often than
with any other WSDL file. Web file types such as CSS and
JavaScript were more often committed with XSL files than with any
other of the same kind. This means that graphics developers,
C/C++, and XML Schema developers are more likely to work in
patches than other developers.
We also found that changes to binary files (e.g. .class, .o and .dll
files) were on average accompanied by changes to files in almost
four other file types while commits to Java files were accompanied
by the average of 0.57 artefacts of other types. This could be caused
by developers committing compiled files along with source code.
Frequently co-changing file types also include XML Schema (3.7
other file types), and WSDL (2.4 file types). Files usually not cochanging were of types PHP (0.1 other file types), C (0.4 other file
types), and Java (0.6 other file types).
The most commonly encountered file types in multiple file type
commits are in order of frequency: Java (on average, present in
27% of commits with files of other type), Project (15% of commits
Figure 7. Number of file types in developer first commit by year.
TABLE 3.
ARTEFACT TYPES COMMIT TOGETHER IN BUSINESS TYPE PROJECTS.
with files of other type), XML (13%), and XSL (11%), and files
without extensions (11%). The details of co-changes in business
type projects can be seen in Table 3. The table shows, how many
commits containing artefacts of the type listed in row header
contained artefacts of the type listed in columns.
Co-change trends. In summary, we have observed the following
language usage trends in our dataset: (1) Java and XML files coevolve most often compared to the other file and language types,
whereas C files rarely co-evolve with any other file type; (2) Binary
files co-evolve with XML and Java files in most of the cases; (3)
WSDL files often co-change with Java and XML files; (4)
JavaScript files co-evolve with XSL files; (5) XML Schema files
co-changes with WSDL, XML and Java files; and (6) XSL files
basically only co-change with JavaScript files.
4.2 Desktop Type Projects
In desktop projects, C was historically the most common language
in our dataset. As such, files representing languages and file types
related to C development were commonly changed together. For
example, changes to C files were accompanied by changes to files
without extensions (e.g. folders, Linux executables) in 32% of the
cases and with changes to Makefiles in 14% of the cases. A similar
observation was made with graphics files, which were committed
together with Makefiles in 29% of the cases and with changes to
files having no extensions in 40% of the cases. As opposed to
business type projects, changes to Java files were accompanied by
changes to XML files only in 3% of the cases. Details of these cooccurrences can be seen in Table 4. The most common co-change
pattern was observed for Groovy files, which were co-changed with
Java files in about half of the cases.
Graphics commits had the most diversity of co-changed artefacts
(2.6 other file types were committed with graphic files on average),
followed by command scripts (2.2 file types), JavaScript (1.9 file
types), and Binary files (1.9 file types). Binary files were committed
together with Java or XML files in more than third of the cases. The
most independent file types were Java (co-changed with 0.4 file
types on average) and XSL (co-changed with 0.4 file types on
average).
Multiple file type commits most often contained files without
extensions, XML, Java, XSL and C files. Multiple graphics files
were co-committed in 62% of the cases (i.e. 62% of commits with
graphics files contained more than one graphics file). Other file
types often changed in a bulk (i.e. with multiple files in a commit)
were C (48% of all C commits), Binary (47%), PHP (46%), and
Java (42%) files.
Co-change trends. In summary, we have observed the following
language co-change trends: (1) Binary files co-change with Java
and XML files; (2) C files with Makefiles; (3) Command Scripts
with Makefiles, Shell Script and XML files; (4) CSS files with
XML; (5) Groovy with Java files; (6) JavaScript with CSS and XSL
files; and (7) Ruby files co-change with XSL.
One of the major differences to business (server) type projects is
that in desktop OSS projects we observed much lower co-evolution
of Java and XML files (in either direction the co-change was half as
likely as in business type projects). On the other hand, CSS files cochanged with XML files twice as often in desktop projects. Other
trends are similar for both OSS project types investigated.
5. Threats to validity
Threats to the validity of our work are confounding and selection
(bias and generalisability).
TABLE 4.
ARTEFACT TYPES COMMIT TOGETHER IN DESKTOP TYPE PROJECTS.
Confounding is an internal threat to the explanations given to some
observations. That is, there might be some event in the society that
have changed the characteristics of developers or languages used
(e.g. companies campaigns to push their technologies), that we can
not directly relate to the dataset, which makes these relationships
difficult or impossible to identify. The impact of these events might
end up attributed to some other change we could find correlation
with. This threat cannot be avoided.
Weißgerber et al. have built a plug-in for Eclipse to show how
likely different files are to be changed together [6]. Their tool does
not exclude any files. However, they aim to visualise patterns
emerging in specific projects regarding the co-evolution of files.
They do not try to describe co-evolution on file type or artefact type
level. As such their tool is useful for monitoring software
development processes. In contrast, our paper explains more
general patterns spanning through OSS software projects.
Selection threat is both internal (bias) and external
(generalisability). It is internal as the selection might be biased
towards certain projects (e.g. by motivation). We do accept that the
dataset studied has somewhat elite collection of projects as there
were no single developer projects, which account to about a half of
the population of all OSS projects [4]. We have validated the
representativeness of our dataset against the data provided by
ohloh.net and found the general characteristics of these datasets to
be similar despite the threat of bias. We found no differences in the
artefact popularity rankings and the biggest difference observed was
the popularity of HTML code. This similarity gives high confidence
to the generalisability and representativeness of the results of this
study.
Dattero et al. conducted a survey during 2000-2001 and looked into
differences by the developer gender [7]. They discovered that
female developers are more likely to work with deprecated
technologies. They also found that female developers tend to be less
experienced and are familiar with only 2.53 languages as opposed
to 3.25 languages male developers were familiar with. These
numbers are similar to our findings, however, we also saw that the
average number of different file types (usually representing
different technologies) used by developers has decreased during the
period studied.
6. Related Work
The idea of studying cross-file co-changes has been addressed by
some research so far. However, these studies have been often
language specific and they rarely look at different file types. Even
studies encompassing multiple file types have been limited to
specific file types. For example, Zimmerman et al. studied how
lines of different files evolve in a project [5]. Their study is limited
to textual files and focused more on visualisation and clustering of
files based on their change history.
The different patterns of evolution of OSS have been outlined by
Nakakoji et al. [8]. They determined that there are three main types
of OSS: exploration-oriented, utility-oriented, and service-oriented.
These types determine how the software evolves and how the
developers behave. The projects studied here spanned over all these
types – business projects being largely exploration-oriented,
gnucash, bibliographic being utility-oriented and eXist, feedparserread-only service-oriented (as in providing stable services not to be
confused with SOA). The study also shows that projects have a
development speed cycle, along which the projects transform from
one type to another. This can be used to explain the fluctuations in
the language and file type shares over time as seen in this study.
Open-source software repositories have been used for studying
various aspects of software development like developer role
identification (core or associate) [9], framework hotspot detection
[10] and other. These works are complementary and help
developing a better understanding of sotware development process
and open-source software. It has also been shown that the number
and size of open-source projects are growing exponentially and
open-source projects are becoming more diverse by expanding into
new domains [11].
7. Conclusions and Future Work
We investigated the revision data of 22 OSS projects and tracked
the evolution of multiple programming language usage. Our
findings can be summarized from a language and a developer
perspective.
First, as for multiple programming language usage, our study
confirmed the ohloh.net data that the most popular (i.e. widely
used) language in OSS software projects is XML followed by Java
and C. XML has increased its popularity steadily over the last
decade while C has lost its high share to various other languages of
which Java has been among the more popular ones. Despite
becoming popular in just a few years, Java has not been able to
grow its share significantly during the last years. XSL has
maintained its share for the last years.
The most commonly co-evolving files are usually of the same type.
These are, ranked in order of co-evolution intensity: Java and XML;
C and plaintext files; and C and Makefiles. The most co-dependent
pair of file types in the business type projects studied was
JavaScript and XSL with a co-change rate (measured in common
commits) of more than 40% of the cases. Java and XML files
(especially those of project specific types) are more likely to be
edited by the same person than Java files and project definition
files.
Based on the projects analyzed, we found that XSL is important for
both generating user interfaces and for document transformations.
similar characteristics to the data available from ohloh.net (e.g.
more HTML code), which has currently the biggest analysed listing
of open source projects and as such is closest to representing the
population. It is not feasible to incorporate all projects listed by
ohloh.net as the data that would need to be analysed would exceed
our capabilities of processing it in timely fashion.
8. Acknowledgments
This research was conducted during a visit of the first author to the
software evolution and architecture lab at the University of Zurich.
We thank the members of the lab for their valuable advice. The
work is also partially funded by ERDF via the Estonian Centre of
Excellence in Computer Science.
9. References
[1] W. Meier, "eXist: An Open Source Native XML Database," in WEB,
WEB-SERVICES, AND DATABASE SYSTEMS, vol. 2593, ERFURT,
GERMANY, 2003, pp. 169-183, 2nd Annual International Workshop
on Web Databases, ERFURT, GERMANY, OCT 07-10, 2002.
[2] O. Alonso, P. T. Devanbu, and M. Gertz, "Expertise identification and
visualization from CVS," in MSR '08: Proceedings of the 2008
international working conference on Mining software repositories,
Leipzig, Germany, 2008, pp. 125-128.
[3] J. Brunnert, O. Alonso, and D. Riehle, "Enterprise People and Skill
Discovery Using Tolerant Retrieval and Visualization," in Advances in
Information Retrieval, 29th European Conference on IR Research,
ECIR 2007, vol. 4425, Rome, Italy, 2007, pp. 674-677.
[4] A. Capiluppi, P. Lago, and M. Morisio, "Characteristics of open source
projects," in Software Maintenance and Reengineering, 2003.
Proceedings. Seventh European Conference on, Benevento, Italy,
2003, pp. 317-327.
[5] T. Zimmermann, S. Kim, A. Zeller, and J. E. J. Whitehead, "Mining
version archives for co-changed lines," in MSR '06: Proceedings of the
2006 international workshop on Mining software repositories,
Shanghai, China, 2006, pp. 72-75.
Second, as for developers, we found that fewer file types are used
by new developers in their first commits, even though most
developers began with experience with multiple file types. Most
developers worked with at least five different file types during the
period studied. 80% of Java developers worked with XML files
while only 40% of C developers did so (60% in the later years).
[6] P. Weißgerber, L. von Klenze, M. Burch, and S. Diehl, "Exploring
evolutionary coupling in Eclipse," in eclipse '05: Proceedings of the
2005 OOPSLA workshop on Eclipse technology eXchange, San Diego,
California, 2005, pp. 31-34.
The study of languages used by developers from 1997 to 2009
showed the decreasing importance of Makefiles and plaintext files
for C developers while the importance of XML increased with
almost any other language. Whilst document type definition
language was being deprecated, XML Schema did not seem to
replace it (neither did any other language), implying that
standardised schemas are being preferred over project specific ones.
[8] K. Nakakoji, Y. Yamamoto, Y. Nishinaka, K. Kishida, and Y. Ye,
"Evolution patterns of open-source software systems and
communities," in IWPSE '02: Proceedings of the International
Workshop on Principles of Software Evolution, Orlando, Florida, 2002,
pp. 76-85.
From the characteristics of developer language usage, we saw that
not just knowing multiple languages is required from the
developers, but developers must also understand different coding
paradigms (e.g. procedural and object-oriented languages are often
used side-by-side with rule and template based extensible
languages). While in the 1990s they needed to know how to code in
C and write Makefiles, the increased variety of languages used in
newer projects and lack of distinct leaders in languages introduced
the need to be familiar with multi-language development.
Future work will address to better describe the population by
including newer/future projects. The ideal dataset would have more
[7] R. Dattero and S. D. Galup, "Programming languages and gender,"
Communications of the ACM, vol. 47, no. 1, pp. 99-102, January 2004.
[9] L. Yu and S. Ramaswamy, "Mining CVS Repositories to Understand
Open-Source Project Developer Roles," in Mining Software
Repositories, 2007. ICSE Workshops MSR '07. Fourth International
Workshop on, Minneapolis, MN, USA, 2007, p. 8.
[10] S. Thummalapenta and T. Xie, "SpotWeb: detecting framework
hotspots via mining open source repositories on the web," in
Proceedings of the 2008 international working conference on Mining
software repositories, Leipzig, Germany, 2008, pp. 109-112.
[11] A. Deshpande and D. Riehle, "The Total Growth of Open Source,"
Open Source Development, Communities And Quality In International
Federation For Information Processing, vol. 275, pp. 197-209, 2008.
| 6cs.PL
|
Real-time deep hair matting on mobile devices
arXiv:1712.07168v2 [cs.CV] 10 Jan 2018
Alex Levinshtein∗ , Cheng Chang∗ , Edmund Phung∗ , Irina Kezele∗ , Wenzhangzhi Guo∗ , Parham Aarabi∗†
∗ ModiFace Inc.
† University of Toronto
Abstract—Augmented reality is an emerging technology in
many application domains. Among them is the beauty industry,
where live virtual try-on of beauty products is of great
importance. In this paper, we address the problem of live
hair color augmentation. To achieve this goal, hair needs to be
segmented quickly and accurately. We show how a modified
MobileNet CNN architecture can be used to segment the hair in
real-time. Instead of training this network using large amounts
of accurate segmentation data, which is difficult to obtain, we
use crowd sourced hair segmentation data. While such data
is much simpler to obtain, the segmentations there are noisy
and coarse. Despite this, we show how our system can produce
accurate and fine-detailed hair mattes, while running at over
30 fps on an iPad Pro tablet.
Keywords-hair segmentation; matting;augmented reality;
deep learning; neural networks
I. I NTRODUCTION
Real-time image segmentation is an important problem in
computer vision with a multitude of applications. Among
them is the segmentation of hair for live color augmentation
in beauty applications (Fig. 1). This use case, however,
presents additional challenges. First, unlike many objects
with simple shape, hair has a very complex structure. For realistic color augmentation, a coarse hair segmentation mask
is insufficient. One needs a hair matte instead. Secondly,
many beauty applications run on mobile devices or in web
browsers, where powerful computing resources are not available. This makes it more challenging to achieve real-time
performance. This paper addresses both these challenges and
introduces a system that can accurately segment hair at over
30 fps on a mobile device.
In line with recent success of convolutional neural networks (CNNs) for semantic segmentation, our hair segmentation methods is based on CNNs. We make two main
contributions. First, most modern CNNs cannot run in realtime even on powerful GPUs and may occupy a large amount
of memory. Our target is real-time performance on a mobile
device. In our first contribution we show how to adapt
the recently proposed MobileNets [1] architecture for hair
segmentation, which is both fast and compact enough to be
used on a mobile device.
In the absence of detailed hair segmentation ground truth,
we train our network on noisy and coarse crowd-sourced
data. A coarse segmentation result, however, is insufficient
for hair color augmentation purposes. For realistic color
augmentation, an accurate hair matte is needed. In our
(a)
(b)
(c)
Figure 1. Automatic hair matting and coloring. (a) Input image. (b) Output
hair matte produced by our method. (c) Recolored hair.
second contribution, we propose a method for obtaining
accurate hair mattes in real-time without the need for accurate hair matte training data. First, we show how to modify
our baseline network architecture to have the capacity for
capturing fine-level details. Next, by adding a secondary
loss function that promotes perceptually appealing matting
results, we show that the network can be trained to yield
detailed hair mattes using only coarse hair segmentation
training data. We compare this approach to simple Guided
Filter [2] post-processing and show that it yields more
accurate and sharper results.
We evaluate our method, showing that it achieves stateof-the-art accuracy while running in real-time on a mobile
device. In the remainder of the paper, we discuss related
work in Sec. II, describe our approach in Sec. III, evaluate
our method Sec. IV, and conclude in Sec. V.
II. R ELATED WORK
Similar to work on general image segmentation, hair
segmentation work can be divided into two categories. The
first category of approaches uses hand-crafted features for
segmentation. Yacoob et al. [3] employ simple pixel-wise
color models to classify hair. Analogous method is employed
by Aarabi [4], while also making use of facial feature
locations and skin information. Khan et al. [5] use more
advanced features with random forests for classification.
Such approaches, however, prove to be insufficiently robust
for real-world applications.
For more spatially consistent segmentation results, a popular method is to formulate segmentation as random field
inference. Lee’s et al. [6] build a Markov Random Field
Figure 2.
Fully Convolutional MobileNet Architecture for Hair Segmentation
over image pixels, while Huang et al. [7] build their model
over superpixels instead. Wang has an alternative method
[8], [9] where overlapping image patches are first segmented
independently and then combined.
Recently, given the success of deep neural networks
(DNNs) in many areas, including semantic segmentation,
DNN-based hair segmentation methods have emerged. Guo
and Aarabi [10] use a heuristic method to mine highconfidence positive and negative hair patches from each
image, and train a separate DNN per image, which is then
used to classify the remaining pixels. Inspired by recent
success of fully convolutional networks (FCN) for semantic
segmentation [11], Chai et al. [12] and Qin et al. [13] employ
FCNs for hair segmentation. Due to the coarseness of raw
FCN segmentation results, similar to [14], both methods post
process the results using dense CRFs [15]. Additionally,
[13] have an extra matting step to obtain high-detail hair
mattes. Finally, Xu et al. [16] propose an end-to-end CNN
architecture for generic image matting yielding state-of-theart results.
Our approach follows this trend, while addressing several
issues. All the aforementioned methods [12], [13], [16] build
upon the VGG16 architecture [17]. A single forward pass
in VGG16 takes around 100ms even on a powerful GPU,
and much longer on a mobile device. Adding dense CRF
inference and matting futher increases the run-time. Moreover, VGG16 occupies approximately 500MB of memory,
which is too much for mobile applications. Instead, we show
how to adapt the recently proposed compact MobileNets
architecture [1] for segmentation and yield real-time matting
results without expensive post processing methods. Finally,
while it may be possible to obtain detailed hair matting data
using semi-automatic labeling techniques [16], we show how
to train our network without the need for such data.
III. A PPROACH
This section describes our contributions in detail. Firstly,
we describe our modifications to the original MobileNet [1]
architecture and the challenges of obtaining training data for
hair segmentation. Secondly, we illustrate our method for
real-time hair matting without the use of matting training
data.
A. Fully Convolutional MobileNet for Hair Segmentation
Inspired by [12], [13], we first tried to use a modified
VGG16 network [17] for hair segmentation, however a forward pass through the network took more than 2 seconds per
frame and the network occupied about 500MB of memory.
This was incompatible with our real-time mobile use case
and therefore we use MobileNets [1] instead, which are
faster and more compact.
We modified the original MobileNet architecture into a
fully convolutional network for segmentation, which we
name HairSegNet. First, we remove the last three layers:
Avg Pool, FC, and Softmax (refer to Table 1 in [1]). Next,
similar to [12], [14], to preserve fine details we increase the
output feature resolution by changing the step size of the
last two layers with step size of 2 to 1. Due to our use of
pre-trained weights on ImageNet, we dilate all the kernels
for the layers with updated resolution by their scale factor
w.r.t. their original resolution. Namely, kernels for layers that
increased by a factor of 2 are dilated by 2 and kernels for
images are still needed. We crowd-source such data using
a hair coloring app where users have to manually mark
their hair. While getting this data is cheap, the resulting
hair segmentation labels are very noisy and coarse. Fig. 3
illustrates this issue. Note that in the 2nd image hair was
labeled very sparsely, while in the 3rd image a photograph
of a pet was submitted. We manually clean this data by only
keeping the images of human faces with sufficiently good
hair masks. This is considerably faster than marking the hair
from scratch or fixing incorrect segmentations.
Figure 3. Crowd-sourced training data for hair segmentation. Top: images.
Bottom: masks. The data is noisy and coarse, with some images having poor
masks (2nd) and some non-face images (3rd).
layers that increased by a factor of 4 are dilated by 4. This
yields a final resolution of 28 × 28.
Next, we build a decoder that takes the above CNN
features as input and upsamples them to a hair mask at the
original 224 × 224 resolution. We tried upsampling using
transposed convolution layers, but saw gridding artifacts in
the resulting masks. Therefore, upsampling is performed by
a simplified version of an inverted MobileNet architecture.
At each stage, we upsample the previous layer by a factor
of 2 by replicating each pixel in a 2 × 2 neighborhood.
Then, we apply separable depthwise convolution, followed
by pointwise 1 × 1 convolutions with 64 filters, followed
by ReLu. The number of filters does not have a large effect
on accuracy, with 64 filters yielding a slightly better performance based on our experiments (see Sec. IV). The previous
block is repeated three times, yielding a 224 × 224 × 64
output. We conclude by adding a 1 × 1 convolution with
softmax activation and 2 output channels for hair / nonhair. The network is trained by minimizing the binary cross
entropy loss LM between predicted and ground truth masks.
The full architecture is illustrated in Fig. 2.
The resulting architecture is considerably more compact
than VGG16, occupying only 15MB. More importantly, a
forward pass takes 300ms when implemented in Tensorflow
on iPad Pro. Using the recently released optimized CoreML
library [18] from Apple, this time can be further reduced to
60ms per frame.
Training deep neural networks requires a large amount
of data. While there are large datasets for general semantic segmentation, these datasets are much less popular
for hair segmentation. Moreover, unlike some objects like
cars, which have a relatively simple shape, hair shape is
very complex. Therefore, obtaining precise ground truth
segmentation for hair is even more challenging.
To cope with this challenge we use a pre-trained network
on ImageNet and fine-tune the entire network on hair segmentation data. Nevertheless, several thousands of training
B. Hair matting
In our second contribution we show how to obtain accurate hair matting results. We solve the matting problem
using a CNN, which we name HairMatteNet, in an end-toend manner. Such an approach faces two challenges. First,
we need an architecture with the capacity to learn high
resolution matting details. The network in Sec. III-A may not
be suitable since the results are still generated by incremental
upsampling of relatively low-res layer (28 × 28). Secondly,
our CNN needs to learn hair matting using only coarse
segmentation training data.
We address the first issue by adding skip connections
between layers in the encoder and corresponding layers in
the decoder, similar to many modern network architectures
[11]. This way, shallower layers in the encoder, which
contain high-res but weak features are combined with lowres but powerful features from deeper layers. The layers
are combined by first applying a 1 × 1 convolution to
the incoming encoder layers to make the output depth
compatible with the incoming decoder layers (64 for the
three outer skip connections and 1024 for the inner skip
connection) and then merging the layers using addition. For
each resolution, the deepest encoder layer at that resolution
is taken for skip connection.
The second issue is addressed by adding a loss function
that promotes perceptually accurate matting output. Motivated by the alpha matting evaluation work of Rhemann
et al. [19], our secondary loss measures the consistency
between image and mask edges. It is minimized when the
two agree. Specifically, we define our mask-image gradient
consistency loss to be:
P
2
Mmag 1 − (Ix Mx + Iy My )
P
,
(1)
LC =
Mmag
where (Ix , Iy ) and (Mx , My ) are the normalized image
and mask gradients respectively, and Mmag is the mask
gradient magnitude. This loss is added to the original binary
cross entropy loss with a weight w, making the overall
loss L = LM + wLC . The combination of the two losses
maintains the balance between being true to training masks
while generating masks that adhere to image edges. Fig. 4
illustrates our new architecture and the combination of the
two loss functions.
Figure 4. Fully Convolutional MobileNet Architecture for Hair Matting. Skip connections are added to increase the network capacity for capturing high
resolution detail. Mask-image gradient consistency loss is added alongside with standard binary cross entropy loss to promote detailed matting results.
We compare HairMatteNet to simple post-processing of
our coarse segmentation mask (HairSegNet) with a Guided
Filter [2]. Qin et al. [13] used a similar approach but
employed a more advanced matting method that is not fast
enough for real-time applications on mobile devices. Guided
Filter is an edge-preserving filter and has a linear runtime complexity w.r.t. the image size. It takes only 5ms to
process a 224 × 224 image on iPad Pro. Fig. 5 compares
the masks with (c) and without (b) the filter. The former is
clearly capturing more details, with individual hair strands
becoming apparent. However, the filter adds detail only
locally near the edges of the mask from CNN. Moreover, the
edges of the refined masks have a visible halo around them,
which becomes even more apparent when the hair color has
lower contrast with its surroundings. This halo causes color
bleeding during hair recoloring. HairMatteNet yields sharper
edges (Fig. 5d) and captures longer hair strands, without the
unwanted halo effect seen in Guided Filter post-processing.
As an additional bonus, HairMatteNet runs twice as fast
compared to HairSegNet, taking only 30ms per frame on
a mobile device and without the need for an extra postprocessing matting step. Due to our use of skip connections,
that help with capturing high resolution detail, HairMatteNet
maintains the original MobileNet encoder structure with the
deepest layers having 7 × 7 resolution. These layers have
many depth channels (1024) and become very expensive to
(a)
(b)
(c)
(d)
Figure 5. Hair segmentation and matting. (a) Input image. (b) HairSegNet.
(c) HairSegNet + Guided Filter. (d) HairMatteNet.
process with increased resolution. Having a 7 × 7 resolution
makes processing much faster compared to the 28 × 28
resolution in HairSegNet.
IV. E XPERIMENTS
We evaluate our method on three datasets. First is our
crowd-sourced dataset, consisting of 9000 training, 380
validation, and 282 testing images. All three subsets include
the original images and their flipped versions. Since our
target is hair matting on mobile devices, we pre-process our
data by detecting the face and cropping a region around it
based on the scale expected for typical selfies.
To compare our method to existing approaches, we evaluate two public datasets: LFW Parts dataset [20] and the
hair dataset of Guo and Aarabi [10]. The former consists of
2927 250 × 250 images, with 1500 training, 500 validation,
and 927 test images. Pixels are labeled into three categories:
hair, skin, and background, generated at the superpixel level.
The latter consists of 115 high-resolution images. Since it
contains too few images to train on, we use our crowdsourced training data when evaluating on this set. To make
this dataset consistent with our training data, we pre-process
it in a similar manner (using face detection and cropping),
adding flipped images as well. Since in a few cases faces
were not detected, the resulting dataset consists of 212
images.
Training is done using a batch size of 4 using the Adadelta
[21] method in Keras [22], with learning rate 1.0, ρ = 0.95,
and = 1e − 7. We use L2 regularization with the weight
2 · 10−5 for convolution layers only. Depthwise convolution
layers and the last convolution layer are not regularized.
We set the loss balancing weight to w = 0.5. In the threeclass LFW data, only the hair class is contributing to the
mask-image gradient consistency loss. We train our model
for 50 epochs and select the best performing epoch using
validation data. Training on crowd-sourced dataset takes 5
hours on Nvidia GeForce GTX 1080 Ti GPU and less than
an hour on LFW Parts due to much smaller training set size.
A. Quantitative evaluation
For quantitative performance analysis, we measure the F1score, Performance [10], IoU, and Accuracy, averaged across
all test images. To measure the consistency of image and
hair mask edges, we also report the mask-image gradient
consistency loss (Eqn. 1). Recall that during the manual
clean-up in Sec. III-A we only filtered images rather than
correcting the masks. As a result, the quality of our hair
annotation is still poor. Therefore, prior to evaluation on our
crowd-sourced data, we manually corrected the test masks,
spending no more than 2 minutes per annotation. This
yielded slightly better ground truth. Three variants of our
method are evaluated on this relabeled data. Table I shows
our results. All three methods perform similarly w.r.t. the
ground truth comparison measures, however, HairMatteNet
is the clear winner in the gradient consistency loss category,
indicating that its masks adhere much better to image edges.
On the LFW Parts dataset, we report an on-par performance with the best performing method in Qin et al. [13],
but achieve it in real-time on a mobile device. We use only
the accuracy measure for evaluation since it is the only
measure used in [13]. Arguably, especially since LFW Parts
was annotated at the superpixel level, the ground truth there
may not good enough for high-accuracy analysis. On the
dataset of Guo and Aarabi [10] we report an F1-score of
0.9376 and Performance of 0.8253. We re-ran HNN, the best
performing method in [10], on this post-processed dataset
and obtained similar performance to that reported by the
authors, with F1-score of 0.7673 and Performance of 0.4674.
Model
F1
Perf.
IoU
Acc. Grad-cons.
Crowd-sourced dataset
HairSegNet
0.9212 0.7833 0.8564 0.9624 0.2696
HairSegNet + GF 0.9251 0.7964 0.8637 0.9646 0.1803
HairMatteNet
0.9219 0.7945 0.8589 0.9619 0.0533
LFW Parts dataset [20]
HairMatteNet
NA
NA
NA
0.965
NA
[13] FCN+CRF
NA
NA
N A 0.9676
NA
HairMatteNet SP
NA
NA
N A 0.9769
NA
[13] FCN+CRF SP N A
NA
N A 0.9732
NA
Guo and Aarabi dataset [10]
HairMatteNet
0.9376 0.8253 0.8848 0.964
0.0532
HNN [10]
0.7673 0.4674 0.6454 0.8793 0.2732
Table I
Q UANTITATIVE EVALUATION
Depth
16
32
64
128
F1
0.9202
0.9217
0.9229
0.9225
Perf.
0.7878
0.8001
0.7939
0.7937
IoU
0.8559
0.8584
0.8608
0.8605
Acc.
0.9585
0.9581
0.9604
0.9596
Table II
D ECODER LAYER DEPTH EXPERIMENTS ON VALIDATION DATA
B. Qualitative evaluation
We evaluate our method on publicly available selfie images for qualitative analysis. Results can be seen in Fig. 6.
HairSegNet (Fig. 6b) yields good but coarse masks. HairSegNet with Guided Filter (Fig. 6c) produces better masks but
with an undesirable blur around hair boundaries. The most
accurate and sharpest results are achieved by HairMatteNet
(Fig. 6d). A failure mode of both Guided Filter postprocessing and HairMatteNet is their under-segmentation of
hair-like objects in the vicinity of hair, such as eyebrows
in case of dark hair or bright background for light hair.
In addition, highlights inside the hair can cause the hair
mask from HairMatteNet to be non-homogeneous, which is
especially apparent in the last three examples in column (h).
C. Network architecture experiments
Decoder layer depth Using our validation data, we have
experimented with number of decoder layer channels, but
observed that it does not have a large effect on accuracy.
Table II illustrates our experiments with the number of
channels in the decoder, with 64 channels yielding the
best results according to most measures. These experiments
were done using the skip connections architecture in Fig. 4
without using the gradient consistency loss.
Input image size Howard et al. [1] observed that MobileNets perform better given higher image resolution. Given
our goal of accurate hair matting, we experimented with
increasing the resolution beyond 224 × 224, which is the
highest resolution MobileNet were trained on ImageNet. For
the 2nd and 3rd image in Fig. 6, Fig. 7 shows qualitative
comparison of masks inferred using HairMatteNet from
(a)
(b)
Figure 6.
(c)
(d)
(e)
(f)
(g)
(h)
Qualitative evaluation. (a,e) Input image. (b,f) HairSegNet. (c,g) HairSegNet + Guided Filter. (d,h) HairMatteNet.
224 × 224 images vs. 480 × 480 images. The 480 × 480
results look more accurate around the hair edges, with
longer hair strands being captured (e.g., the long hair strand
falling on the nose in the first image). However, the issues
mentioned in the previous section are emphasized as well,
with more of the hair mask bleeding into non-hair regions
and the inside of the mask becoming non-homogeneous due
to hair highlights. In addition, processing a larger image is
significantly more expensive.
V. S UMMARY
This paper presented a hair matting method with real-time
performance on mobile devices. We have shown how, given
noisy and coarse data, a modified MobileNet architecture is
trained to yield accurate matting results. While we apply the
proposed architecture for hair matting, it is general and can
be applied to other segmentation tasks. In future work we
will explore fully automatic methods for training from noisy
data without the need for manual filtering. In addition, we
will explore further improvements to matting quality, such as
capturing longer hair strands and segmenting light hair; all
this while keeping the hair mask homogeneous, preventing
it from bleeding into non-hair regions, and maintaining our
real-time performance on mobile devices.
R EFERENCES
[1] A. G. Howard, M. Zhu, B. Chen, D. Kalenichenko, W. Wang,
T. Weyand, M. Andreetto, and H. Adam, “Mobilenets: Efficient convolutional neural networks for mobile vision applications,” arXiv preprint arXiv:1704.04861, 2017.
[2] K. He, J. Sun, and X. Tang, “Guided image filtering,” TPAMI,
vol. 35, no. 6, pp. 1397–1409, 2013.
[3] Y. Yacoob and L. S. Davis, “Detection and analysis of hair,”
TPAMI, vol. 28, no. 7, pp. 1164–1169, 2006.
[4] P. Aarabi, “Automatic segmentation of hair in images,” in
ISM, 2015, pp. 69–72.
[5] K. Khan, M. Mauro, and R. Leonardi, “Multi-class semantic
segmentation of faces,” in ICIP, 2015, pp. 827–831.
[6] K.-c. Lee, D. Anguelov, B. Sumengen, and S. B. Gokturk,
“Markov random field models for hair and face segmentation,” in FG, 2008, pp. 1–6.
[14] L.-C. Chen, G. Papandreou, I. Kokkinos, K. Murphy, and
A. L. Yuille, “Semantic image segmentation with deep convolutional nets and fully connected crfs,” in ICLR, 2015.
[15] P. Krähenbühl and V. Koltun, “Efficient inference in fully
connected crfs with gaussian edge potentials,” in NIPS, 2011,
pp. 109–117.
[16] N. Xu, B. Price, S. Cohen, and T. Huang, “Deep image
matting,” in CVPR, 2017.
[17] K. Simonyan and A. Zisserman, “Very deep convolutional
networks for large-scale image recognition,” arXiv preprint
arXiv:1409.1556, 2014.
[18] “Coreml,” https://developer.apple.com/documentation/coreml.
[19] C. Rhemann, C. Rother, J. Wang, M. Gelautz, P. Kohli,
and P. Rott, “A perceptually motivated online benchmark for
image matting,” in CVPR, 2009, pp. 1826–1833.
[20] A. Kae, K. Sohn, H. Lee, and E. Learned-Miller, “Augmenting CRFs with Boltzmann machine shape priors for image
labeling,” in CVPR, 2013.
[21] M. D. Zeiler, “Adadelta: an adaptive learning rate method,”
arXiv preprint arXiv:1212.5701, 2012.
[22] F. Chollet et al., “Keras,” https://github.com/fchollet/keras,
2015.
(a)
Figure 7.
(b)
Network resolution comparison (a) 224 × 224 (b) 480 × 480
[7] G. B. Huang, M. Narayana, and E. Learned-Miller, “Towards
unconstrained face recognition,” in CVPRW. IEEE, 2008,
pp. 1–8.
[8] N. Wang, H. Ai, and S. Lao, “A compositional exemplarbased model for hair segmentation,” in ACCV, 2010, pp. 171–
184.
[9] N. Wang, H. Ai, and F. Tang, “What are good parts for hair
shape modeling?” in CVPR, 2012, pp. 662–669.
[10] W. Guo and P. Aarabi, “Hair segmentation using heuristicallytrained neural networks,” TNNLS, 2016.
[11] J. Long, E. Shelhamer, and T. Darrell, “Fully convolutional
networks for semantic segmentation,” in CVPR, 2015, pp.
3431–3440.
[12] M. Chai, T. Shao, H. Wu, Y. Weng, and K. Zhou, “Autohair:
Fully automatic hair modeling from a single image,” TOG,
vol. 35, no. 4, p. 116, 2016.
[13] S. Qin, S. Kim, and R. Manduchi, “Automatic skin and hair
masking using fully convolutional networks,” in ICME, 2017.
| 1cs.CV
|
Efficient Diverse Ensemble for Discriminative Co-Tracking
Kourosh Meshgi, Shigeyuki Oba, Shin Ishii
Graduate School of Informatics, Kyoto University
606–8501 Yoshida-honmachi, Kyoto, Japan
arXiv:1711.06564v1 [cs.CV] 16 Nov 2017
{meshgi-k,oba,ishii}@sys.i.kyoto-u.ac.jp
Abstract
Ensemble discriminative tracking utilizes a committee of
classifiers, to label data samples, which are in turn, used for
retraining the tracker to localize the target using the collective knowledge of the committee. Committee members could
vary in their features, memory update schemes, or training
data, however, it is inevitable to have committee members
that excessively agree because of large overlaps in their
version space. To remove this redundancy and have an effective ensemble learning, it is critical for the committee to
include consistent hypotheses that differ from one-another,
covering the version space with minimum overlaps. In this
study, we propose an online ensemble tracker that directly
generates a diverse committee by generating an efficient set
of artificial training. The artificial data is sampled from the
empirical distribution of the samples taken from both target and background, whereas the process is governed by
query-by-committee to shrink the overlap between classifiers. The experimental results demonstrate that the proposed scheme outperforms conventional ensemble trackers
on public benchmarks.
(a) Typical ensemble state
(b) Conventional update
(c) Partial update
(d) Diversified update
Figure 1. Version space examples for ensemble classifiers. (a) All
hypotheses are consistent with the previous labeled data, but each
represents a different classifier in the version space Vt . In the next
time step, the models are updated with the new data (boxed). (b)
Updating with all of the data tend to make the hypothesis more
overlapping. (c) Random subsets of training data are given to
the hypotheses and they update without considering the rest of the
data, the hypotheses cover random areas of the version space. (d)
Random subsets of training data plus artificial generated data (proposed), trains the hypothese to be mutually uncorrelated as much
as possible, while encouraging them to cover more (unexplored)
area of the version space.
1. Introduction
Tracking-by-detection [2, 20, 23, 6, 21, 4] as one the
most popular approaches of discriminative tracking utilizes
classifier(s) to perform the classification task using object
detectors. In a tracking-by-detection pipeline, several samples are obtained from each frame of the video sequence,
to be classified and labeled by the target detector, and this
information is used to re-train the classifier in a closed feedback loop. This approach advantages from the overwhelming maturity of the object detection literature, both in the
terms of accuracy and speed [13, 15], yet struggles to keep
up with the target evolution as it rises issues such as proper
strategy, rate, and extent of the model update [51, 61, 36].
To adapt to object appearance changes, the tracking-bydetection methods update the decision boundary as opposed
to object appearance model in generative trackers. Imper-
fections of target detection and model update throughout
the tracking, manifest themselves as accumulating errors,
which essentially drifts the model from the real target distribution, hence leads to target loss and tracking failure.
Such imperfections can be caused by labeling noise, selflearning loop, sensitive online-learning schemes, improper
update frequency, non-realistic assumption about the target
distribution, and equal weights for all training samples.
Misclassification of a sample due to drastic target transformations, visual artifacts (such occlusion) or model errors not only degrades target localization accuracy, but also
confuses the classifier [23] when trained by this erroneous
label. Typically in tracking-by-detection, the classifier is
1
retrained using its own output from the earlier tracking
episodes (the self-learning loop), which amplitudes a training noise in the classifier and accumulate the error over
time. The problem amplifies when the tracker lacks a forgetting mechanism or is unable to obtain external scaffolds. Some researchers believe in the necessity of having a
“teacher” to train the classifier [21]. This inspired the use of
co-tracking [55], ensemble tracking [49, 62], disabling updates during occlusions, or label verification schemes [27]
to break the self-learning loop using auxiliary classifiers.
Ensemble tracking framework provides effective frameworks to tackle one or more of these challenges. In such
frameworks, the self-learning loop is broken, and the labeling process is performed by leveraging a group of classifiers
with different views [20, 22, 49], subsets of training data
[43] or memories [62, 42].
The main challenge in ensemble methods is how to
decorrelate ensemble members and diversify learned models [22]. Combining the outputs of multiple classifiers is
only useful if they disagree on some inputs [31], however,
individual learners with the same training data are usually
highly correlated [66] (See Figure 1).
Contributions: We propose a diversified ensemble discriminative tracker (DEDT) for real-time object tracking.
We construct an ensemble using various subsamples of the
tracking data and maintain the ensemble throughout the
tracking. This is possible by devising methods to update
the ensemble to reflect target changes while keeping its diversity to achieve good accuracy and generalization. In addition, breaking the self-learning loop to avoid the potential
drift of the ensemble is applied in a con-tracking framework
with an auxiliary classifier. However, to avoid unnecessary
computation and boost the accuracy of the tracker, an effective data exchange scheme is required. We demonstrate
that learning ensembles with randomized subsets of training data along with artificial data with diverse labels in a
co-tracking framework achieve superior accuracy. This paper offers the following contributions:
• We propose a novel ensemble update scheme that generates necessary samples to diversify the ensemble.
Unlike the other model update schemes that ignore
the correlation between classifiers of an ensemble, this
method is designed to promote diversity.
• We propose a co-tracking framework that accommodates the short and long-term memory mixture, effective collaboration between classification modules, and
optimized data exchange between modules by borrowing the concept of query-by-committee [54] from active learning literature.
Note that this is different from the co-tracking elaborated in
[55], as in that method two classifiers cast a weighted vote
to label the target, and pass the samples they struggle with
Figure 2. Schematic of the system. The proposed tracker, DEDT,
labels the obtained sample using an homogeneous ensemble of
the classifiers, the committee. The samples that the committee
has highest disagreement upon (the uncertain samples) are queried
from the auxiliary classifier, a different type of classifier. The location of the target is then estimated using the labeled target. Each
member of the ensemble is then updated with a random subset of
uncertain samples. By generating the diversity set (r.t Sec 4.2), the
ensemble is then diversified, yielding a more effective ensemble.
to the other one to learn. However, in our tracker, the ensemble passes the disputed samples to an auxiliary classifier
which is trained on all of the data periodically, to provide the
effect of long-term memory while being resistant to abrupt
changes, outliers and label noise. The evaluation results of
DEDT on OTB50 dataset [61] demonstrates competitive accuracy for our method compared to the state-of-the-art of
tracking.
2. Prior Work
Ensemble tracking: Using a linear combination of several weak classifiers with different associated weights has
been proposed in a seminal work by Avidan [3]. Following
this study, constructing an ensemble by boosting [20], online boosting [46, 35], multi-class boosting [48] and multiinstance boosting [4, 63] led to the enhancement of the performance of the ensemble trackers. Despite its popularity,
boosting demonstrates low endurance against label noise
[52] and alternative techniques such as Bayesian ensemble
weight adjustment [6] has been proposed to alleviate this
shortcoming. Recently, ensemble learning based on CNNs
gained popularity. Researchers make ensembles of CNNs
that shares convolutional layers [44], different loss functions for each output of the feature map [59], and repeatedly
subsampling different nodes and layers in fully connected
layers on CNN to build an ensemble [22, 38]. Furthermore,
it is proposed to exploit the power of ensembles such as feature adjustment in ensembles [18] and the addition of the
ensemble’s members [49, 62] over-time.
Ensemble diversity: Empirically, ensembles tend to yield
better results when there is a significant diversity among the
models [32]. Zhou [66] categorizes the diversity generation heuristics into (i) manipulation of data samples based
on sampling approaches such as bagging and boosting (e.g.
in [43]), (ii) manipulation of input features such as online
boosting [20], random subspaces[50], random ferns [47]
and random forests [49] or combining using different layers, neurons or interconnection layout of CNNs [22, 38],
(iii) manipulation of learning parameter, and (iv) manipulation of the error representation. The literature also suggests
a fifth category of manipulation of error function which encourages the diversity such as ensemble classifier selection
based on Fisher linear discriminant [58].
Training data selection: A principled ordering of training examples can reduce the cost of labeling and lead to
faster increases in the performance of the classifier [57],
therefore we strive to use training examples based on their
usefulness, and avoid using on all of them (including noisy
ones and outliers) that may result in higher accuracy [16].
Starting from easiest examples (Curriculum learning) [7],
pruning adversarial examples1 [39], excluding misclassified
samples from next rounds of training [56], sorting samples
by their training value [34] are some of the proposed approaches in the literature. However, the most common setting is active learning, in which the algorithm selects which
training examples to label at each step for the highest gains
in the performance. I this view, it may require to focus on
learning the hardest examples first. For example, following
the criteria of “highest uncertainty”, an active learner select
samples closest to the decision boundary to be labeled next.
This concept can be useful in visual tracking, e.g. to measure the uncertainty caused by bags of samples [65].
Active learning for ensembles: Query-by-committee
(QBC) [54] is one of the most popular ensemble-based active learning approaches, which constructs a committee of
models representing competing hypotheses to label the samples. By defining a utility function on the ensemble (such
as disagreement, entropy, or Q-statistics [66]), this method
selects the most informative samples to be queried from the
oracle (or any other collaborating classifier) in a form of
the query optimization process [53]. Built upon randomized component learning algorithm, QBC involves Gibbs
sampling, which is usually interactable in real-world situations. By extending QBC to use deterministic classifiers with different subsets of data to construct an ensemble, Abe and Mamitsuka[1] proposed practical query-bybagging and query-by-boosting. The set of hypotheses consistent with the data is called version space and by selecting
the most informative samples to be labeled, QBC attempts
to shrink the version space. However, only a committee
of hypotheses that effectively samples the version space of
all consistent hypotheses is productive for the sample se1 Images with tiny, imperceptible perturbations that fool a classifier into
predicting the wrong labels with high confidence.
lection [10]. To this end, it is crucial to promote the diversity of the ensemble [41]. In QBag and QBoost algorithms, all of the classifiers are trained on random subsets
of the similar dataset, which degrade the diversity of the ensemble. Reducing the number of necessary labeled samples
[33], unified sample learning and feature selection procedure [37] and reducing the sampling bias by controlling the
variance [9] are some of the improvements that active learning provides for the discriminative trackers. Moreover, using diversity data to diversify the committee members [41]
and promoting the classifiers that have unique misclassifications [58] are from few samples that active learning was
employed to promote the diversity of the ensemble.
3. Tracking by Detection
By definition, a tracker tries to determine the state of
the target pt in frame Ft (t ∈ {1, . . . , T }) by finding the
transformation yt from its previous state pt−1 . In trackingby-detection formulation, the tracker employs a classifier θt
to separate the target from the background. It is realized
by evaluating possible candidates from the expected target
state-space Yt . The candidate whose appearance resembles
the target the most, is usually considered as the new target
state. Finally, the classifier is updated to reflect the recent
information.
p
◦yj
To this end, first several samples xt t−1 t ∈ Xt are obtained by a transformation ytj ∈ Yt from the previous target
state, pt−1 ◦ ytj . Sample j ∈ {1, . . . , n} indicates the location pt−1 ◦ ytj in the frame Ft , where the image patch
p
◦yj
xt t−1 t is contained. Then, each sample is evaluated by
the classifier scoring function h : Xt → R to calculate the
p
◦yj
score sjt = h(xt t−1 t |θt ). This score is utilized to obtain
a label `jt for the sample, typically by thresholding its score,
j
+1 , st > τu
(1)
`jt = −1 , sjt < τl
0
, otherwise
where τl and τu serves as lower and upper thresholds respectively. Finally, the target location yt is obtained by
comparing the samples’ classification scores. To obtain the
exact target state, the sample with highest score is selected
∗
as the new target, yt = ytj s.t. j ∗ = argmax (sjt ). A
i
subset of the samples and their labels are used to re-train
the classifier’s model θt+1 = u(θt , Dξ(t) ). Here, Dt =
{hXt , Lt i} is the set of samples Xt and their labels Lt , u(.)
is the model update function, and the ξ(t) defines the subset
of the samples that the tracker considers for model update.
An ensemble discriminative tracker employs a set of
classifiers instead of one. These classifiers, hereafter called
(1)
(C)
committee, are represented by Ct = {θt , . . . , θt }, and
are typically homogeneous and independent (e.g., [49, 35]).
Popular ensemble trackers utilize the majority voting of the
committee as their utility function,
sjt =
C
X
p
sign h(xt t−1
◦ytj
(c)
|θt ) .
(2)
c=1
Then eq(1) is used to label the samples.
The model of each classifier is updated independently,
(c)
(c)
θt+1 = u(θt , Dξ(t) ) meaning that all of the committee
members are trained with a similar set of samples and a
common label for them.
4. Diverse Ensemble Discriminative Tracker
We propose a diverse ensemble tracker composed of
a highly-adaptive and diverse ensemble of classifiers C
(the committee), a long-term memory object detector (that
serves as the auxiliary classifier), and an information exchange channel governed by active learning. This allows for
effective diversification of the ensemble, improving the generalization of the tracker and accelerating its convergence
to the ever-changing distribution of target appearance. We
leveraged the complementary nature and long-term memory
of the auxiliary tracker to facilitate effective model update.
One way to diversify the ensemble is to increase the
number of examples they disagree upon [31]. Using bagging and boosting to construct an ensemble out of a fix
sample set, ignores this critical need for diversity as all of
the data are randomly sampled from a shared data distribution. However, for each committee member, there exists a
set of samples that distinguish them from other committee
members. One way to obtain such samples is to generate
some training samples artificially to differ maximally from
the current ensemble [40].
The diversified ensemble covers larger areas of the version space (i.e. the space of consistent hypotheses with the
samples from current frame), however, this radical update of
the ensemble may render the classifier susceptible to drastic
target appearance changes, abrupt motion, and occlusions.
In this case, given the non-stationary nature of the target
distribution2 , the classifier should adapt itself rapidly with
the target changes, yet it should keep a memory of the target
to re-identify if the target goes out-of-view or got occluded
(as known as stability-plasticity dilemma [21]). In addition,
there are samples for which the ensemble is not unanimous
and an external teacher maybe deemed required.
To amend these shortcomings, an auxiliary classifier is
utilized to label the samples which the ensemble dispute
upon (co-tracking). This classifier is batch-updated with all
of the samples less frequently than the ensemble, realizing
2 the non-stationarity means that the appearance of an object may
change so significantly that a negative sample in the current frame looks
more similar to a positive example in the previous frames.[5]
the longer memory for the tracker. Active query optimization is employed to query the label of the most informative
samples from the auxiliary classifier, which is observed to
effectively balance the stability-plasticity equilibrium of the
tracker as well. Figure 2 presents the schematic of the proposed tracker.
4.1. Formalization
In this approach, If the committee comes to a solid vote
about a sample, then the sample is labeled accordingly.
However, when the committee disagrees about a sample, its
(o)
label is queried from the auxiliary classifier θt :
+1
j
`t = −1
p
◦yj (o)
sign h(xt t−1 t |θt )
, sjt > τu
, sjt < τl
(3)
, otherwise
in which sjt is derived from eq(2). The uncertain samples
p
◦yj
list is defined as Ut = {xt t−1 t |τl < sjt ) < τu }.
The committee members are then updates using our proposed mechanism f (.) using the uncertain samples Ut ,
(c)
(1..c)
θt+1 = f (θt
, Ut , Dt )
(4)
Finally, to maintain a long-term memory and slower update
rate for the auxiliary classifier, it is updated every ∆ frames
with all of the samples from t − ∆ to t.
(
(o)
u(θt , Dt−∆..t ) , if t 6= k∆ + 1
(o)
θt+1 =
(5)
(o)
θt
, if t = k∆ + 1
Algorithm (1) summarizes the proposed tracker.
4.2. Diversifying Ensemble Update
The model updates to construct a diverse ensemble either replace the weakest or oldest classifier of the ensemble
[20, 3] or creates a new ensemble in each iteration [41].
While the former lacks flexibility to adjust to the rate of target change, the latter involves a high level of computation
redundancy. To alleviate these shortcomings, we create an
ensemble for the first frame, update them in each frame to
keep a memory of the target, and diversify them to improve
the effectiveness of ensemble. The diversifying update procedure is as follows:
1. The members ensemble Ct is updated with a random
subsets (of size m) of the uncertain data Ut , that make
them more adept in handling such samples, and generate a temporary ensemble Ct0 . Note that for certain
samples (those not in Ut ), the committee is unanimous
about the label and adding them to the training set of
the committee classifiers is redundant [43].
(c)
input : Committee models θt , Auxiliary model θ(o)
input : Target position in previous frame pt−1
output: Target position in current frame pt
for j ← 1 to n do
Sample a transformation ytj ∼ N (pt , Σsearch )
Calculate committee score sjt (eq(2))
if τl < sjt < τu then sample label is uncertain
p
◦yj
`jt = sign h(xt t−1 t |θ(o) )
j
Ut ← Ut ∪ {hxpt−1 ◦yt , `jt i}
else
`jt = sign(sjt )
j
D ← D ∪ {hxpt−1 ◦yt , `jt i}
for c ← 1 to C do
(c)
Uniformly resample m data St from Ut
0(c)
(c)
(c)
θt ← u(θt |St )
Calculate the prediction error of Ct , (Ct ) = |Ut |/|Dt |
Calculate empirical distribution of samples, Π(Xt )
for c ← 1 to C do
do
(c)
Draw m0 samples At from Π(Xt )
ˆ 0)
Calculate class membership probability `(C
t
−1
0
Set the labels of samples ∝ `ˆ (Ct )
0(c)
00(c)
(c)
θt ← u(θt |At )
Calculate new prediction error (Ct00 ) (eq(6))
while (Ct00 ) ≥ (Ct )
0(c)
00(c)
θt ← θt
All diversity sets are applied, Ct+1 ← Ct0
if mod(t, ∆) = 0 then
(o)
(o)
θt+1 ← u(θt , Dt−∆..t )
∗
Target transformation yt = ytj s.t.j ∗ = argmax(sjt )
i
Calculate target position pt = pt−1 ◦ ŷt
Algorithm 1: Diverse Ensemble Discriminative Tracker
2. The label prediction of the original ensemble Ct is then
calculated on Dt w.r.t. the labels given by the whole
tracker (composed of the ensemble and the auxiliary
classifier), and prediction error (Ct ) is obtained.
3. The empirical distribution of training data, Π(Xt ), is
calculated to govern the creation of the artificial data.
4. In an iterative process for each of the committee members, m0 samples are drawn from a Π(Xt ), assuming attribute independence. Given a sample, the class
membership probabilities of the temporary ensemble
ˆ 0 ) is then calculated. Labels are then sampled from
`(C
t
this distribution, such that the probability of selecting a
label is inversely proportional to the temporary ensemble prediction. This set of artificial samples and their
diverse labels are called the diversity set of committee
(c)
member c, At .
5. The classifier c of temporary ensemble is updated with
(c)
00(c)
At , to obtain the diverse ensemble Ct00 = {θt }
and calculate its prediction error (Ct00 ). If this update increases the total prediction error of the ensemble
((Ct00 ) > (Ct )), then the artificial data is rejected and
(c)
new data At should be generated,
(Ct00 ) =
C X
n
X
p
1 `jt 6= h(xt t−1
◦ytj
00(c)
|θt
) .
(6)
c=1 j=1
where 1(.) denotes the step function that returns 1 iff its
argument is true/positive and 0 otherwise.
This procedure creates samples for each member of the
committee that distinguish them from other members of the
ensemble using a contradictory label (therefore improving
the ensemble diversity [41]), but only accepts them when
using such artificial data improves the ensemble accuracy.
4.3. Implementation Details
There are several parameters in the system such as the
number of committee members (C), parameters of sampling
step (number of samples n, effective search radius Σsearch ),
and the holding time of auxiliary classifier (∆). Larger values of m results in temporary committee with a higher degree of overlap, thus less diverse, whereas smaller values
of m tend to miss the latest changes of the quick-changing
target. A Larger number of artificial samples m0 result in
more diversity in the ensemble, but reduce the chance of
successful update (i.e. lowering the prediction error of the
ensemble). These parameters were tuned using a simulated
annealing optimization on a cross-validation set.
In our implementation, we used lazy classifiers with
HOG [12] feature for the ensemble and reused the calculations with a caching mechanism to accelerate the classification method. For the empirical distribution of the data, a
Gaussian distribution is determinedly estimating the mean
and standard variation of the given training set (i.e. HOG
of Xt ). In addition, to localize the target, the samples with
positive ensemble scores are considered, and the one with
the highest sum of confidence scores is selected as the next
target position. The auxiliary classifier is a a part-based detector [17]. The features, part-base detector dictionary, and
the parameters of lazy classifier, thresholds τl , τu , and the
rest of above-mentioned parameters (Except for C that have
been adjusted to control the speed of the tracker, here) have
been adjusted using cross-validation. With C = 15, n =
1000, m = 80, m0 = 250, τu = 0.54, τl = −0.41 DEDT
achieved the speed of 21.97 fps on a Pentium IV PC @ 3.5
GHz and a Matlab/C++ implementation on a CPU.
Table 1. Quantitative evaluation of trackers under different visual
tracking challenges using AUC of success plot. The first, second
and third best methods are shown in color. More data available on
the author’s website.
Attribute
IV
DEF
OCC
SV
IPR
OPR
OV
LR
BC
FM
MB
TLD
0.48
0.38
0.46
0.49
0.50
0.48
0.54
0.36
0.39
0.45
0.41
0.53
0.51
0.50
0.51
0.54
0.53
0.52
0.33
0.52
0.52
0.47
0.62
0.62
0.61
0.58
0.58
0.62
0.68
0.43
0.67
0.65
0.63
0.73
0.69
0.69
0.71
0.69
0.70
0.73
0.50
0.72
0.65
0.65
0.68
0.70
0.69
0.68
0.69
0.67
0.62
0.47
0.67
0.56
0.61
0.70
0.67
0.70
0.71
0.70
0.69
0.66
0.58
0.70
0.63
0.69
0.75
0.69
0.76
0.76
0.72
0.74
0.79
0.70
0.70
0.72
0.72
0.75
0.69
0.72
0.74
0.73
0.74
0.76
0.58
0.73
0.74
0.72
ALL
0.49
0.55
0.62
0.72
0.69
0.70
0.75
0.74
STRK MEEM MUSTer STAPLE SRDCF CCOT
Ours
Table 2. Comparison of trackers based on their success rates
(IoU > 0.50). The first, second and third best methods are shown
in color.
TLD
STRK MEEM MUSTer STAPLE SRDCF CCOT
Ours
Success
45.1
58.2
68.2
66.7
73.9
76.0
81.6
81.8
Avg FPS
21.2
11.3
14.2
8.3
48.1
4.3
0.2
21.9
the regions respectively. We also compare all the trackers
by the success rate at the conventional thresholds of 0.50
(IoU > 0.50) [61].
5.1. Effect of Diversification
To demonstrate the effectiveness of the proposed diversification method we compare the DEDT tracker with two
different versions of the tracker. In the firs version, DEDTbag, the ensemble classifiers are only updated with uniformpicked subsets of the uncertain data (step 1 in section 4.2).
In the other version, DEDT-art, the committee members are
only updated with artificially generated data (steps 2-5 in
the same section). All three algorithms use m + m0 samples to update their classifiers. In addition to the overall
performance of the tracker, we measure the diversity of the
ensemble using the Q-statistics as elaborated in [32]. For
statistically independent classifiers i and j, the expectation
of Qi,k = 0. Classifiers that tend to classify the same
sample correctly will have positive values of Q, and those
which commit errors on different samples have negative Q
(−1 ≤ Qi,k ≤ +1). For the ensemble of C classifiers, the
averaged Q statistics over all pairs of classifiers is
5. Experiments
We perform a benchmark on the 50 videos of the OTB50
[61], along with partial subsets of the dataset with a distinguishing attribute to evaluate the tracker performance
under different situations. These attributes are illumination variation (IV), scale variation (SV), occlusions (OCC),
deformation (DEF), motion blur (MB), fast motion (FM),
in-plane-rotation (IPR), out-of-plane rotation (OPR), outof-view (OV), low resolution (LR), and background clutter
(BC), defined based on the biggest challenges that a tracker
may face throughout tracking. For this comparison, we have
used success and precision plots, where their area under
curve provides a robust metric for comparing tracker performances [61]. The result of the algorithms are reported as
the average of five independent runs.
The precision plot compares the number of frames that
a tracker has certain pixels of displacement, whereas the
overall performance of the tracker is measured by the area
under the surface of its success plot, where the success of
tracker in time t is determined when the normalized overlap
of the tracker target estimation pt with the ground truth p∗t
(also known as IoU) exceeds a threshold τov . Success plot,
graphs the success of the tracker against different values of
the threshold τov and its AU C is calculated as
1
AU C =
T
Z
0
T
1X
t=1
1
|pt ∩ p∗t |
> τov dτov ,
|p∗t ∪ p∗t |
(7)
where T is the length of sequence, |.| denotes the area of
the region and ∩ and ∪ stands for intersection and union of
Qav =
C−1
C
X X
2
Qi,j , s.t.
C(C − 1) i=1 j=i+1
(8)
Qi,j =
N f f N bb − N f b N bf
N f f N bb + N f b N bf
(9)
where N f b is the number of cases that classifier i classified
the sample as foreground, while classifier j detected it as
background, etc.
Figure 3. The effect of diversification procedure employed in the
proposed tracker.
Figure 3 illustrates the effectiveness of the diversification mechanism in contrast with merely generating data or update the classifiers with uninformed subsamples of the data.
From the experiment results,
AU C(DEDT-art) < AU C(DEDT-bag) < AU C(DEDT)
and 0 < Qav (DEDT) < Qav (DET-art) < Qav (DET-bag)
it can be concluded that all of steps of proposed diversification are crucial to maintain an accurate and diverse ensemble. Qav (DEDT-art) < Qav (DEDT-bag) shows that
the diversity of DEDT-art is better than random diversity obtain by DEDT-bag, however, AU C(DEDT-art) <
AU C(DEDT-bag) reveals that merely using artificial data
without the samples gathered by the tracker, does not provide enough data for an accurate model update.
5.2. Effect of using Artificial Data
In the first look, using synthesized data to train the ensemble that will keep track of a real object may not seem
proper. In this experiment, we look for the closest patch
of the real image (frame t of the video) to the synthesized
sample, and use it as the diversity data. To this end, in each
frame, a dense sampling over the frame is performed, the
HOG of these image patches are calculated, and the closest
match to the generated sample (using Euclidean distance)
is selected. The obtained tracker is referred as DEDT-real,
and its performance is compared to the original DEDT.
As Figure 4 shows, the use of this computationallyexpensive version of the algorithm does not improve the
performance significantly. However, it should be noted that
generating adversarial samples of the ensemble [19] for as
the diversity data of individual committee members is expected to increase the accuracy of the ensemble, yet it is out
of the scope of the current research and may be considered
as a future direction for this research.
Figure 5. The “activeness”, i.e. the effect of labeling thresholds on
the performance of the proposed algorithm.
semble or auxiliary classifier with the same chance. To interpret this figure it is prudent to note that δ → 0 forces the
ensemble to label all of the samples without any assistance
from the auxiliary classifier. By increasing δ the ensemble
starts to query highly disputed samples from the auxiliary
classifier, which is desired by design. If this value increases
excessively, the ensemble queries even slightly uncertain
samples from the auxiliary classifier, rendering the tracker
prone to the labeling noise of this classifier. In addition, the
tracker loses its ability to update rapidly in the case of an
abrupt change in the target’s appearance or location, leading to a degraded performance of the tracker. In the extreme
case of δ → 1 the tracker reduces to a single object detector
modeled by the auxiliary classifier.
The information exchange in one way is in the form
of querying the most informative labels from the auxiliary
classifier, and on the other way is re-training it with the labeled samples by the committee (for certain samples). We
observed that this exchange is essential to construct a robust and accurate tracker. Moreover, such data exchange
not only breaks the self-learning loop but also manages the
plasticity-stability equilibrium of the tracker. In this view,
lower values of δ correspond to a more-flexible tracker,
while higher values make it more conservative.
5.4. Comparison with State-of-the-Art
Figure 4. The effect of using artificial data versus real data employed in the proposed tracker.
5.3. Effect of “Activeness”
Labeling thresholds (τl and τu ) control the “activeness”
of the data exchange between the committee and the auxiliary classifier, therefore allowing the ensemble to get
more/less assistance for its collaborator. In our implementation, these two values are treated independently, but for
the sake of argument assume that τl = −δ and τu = +δ
(δ ∈ [0, 1]). Figure 5 compares the effects of different values of the δ, and also a “random” data exchange scheme in
which the labeler gets the label of the sample from the en-
To establish a fair comparison with the state-of-the-art,
some of the most popular discriminative trackers (according
to a recent large benchmark [61] and the recent literature)
are selected: TLD [27], STRK [23], MEEM [62], MUSTer
[26], STAPLE [8], SRDCF [14], and CCOT [15].
Figure 6 presents the success and precision plots of
DEDT along with other state-of-the-art trackers for all sequences. It is shown in this plot that DEDT usually keeps
the localization error under 10 pixels. Table 1 presents the
area under the curve of the success plot (eq(7)) for all the
sequences and their subcategories, each focusing on a certain challenge of the visual tracking. As shown, DEDT has
Figure 6. Quantitative performance comparison of the proposed
tracker, DEDT, with the state-of-the-art trackers using success plot
(top) and precision plot (bottom).
the competitive precision compared to CCOT which employs state-of-the-art multi-resolution deep feature maps,
and performs better than the rest of the other investigated
trackers on this dataset. The performance of DEDT is comparable with CCOT in the case of illumination variation,
deformation, out-of-view, out-of-plane rotation and motion
blur, while it has superior performance in handling background clutter. This indicates the effectiveness of the target vs. background detection and flexibility for accommodating rapid target changes. While the former can be attributed to effective ensemble tracking, the latter is known
to be the effect of combining long and short-term memory.
It is observed in the run-time that for handling extreme rotations, the ensemble heavily relies on the auxiliary tracker,
which although brings the superior performance in the category, a better representation of the ensemble model may reduce the reliance of the tracker to the auxiliary tracker.The
proposed algorithm shows a sub-optimal performance in
low-resolution scenario compared to DCF-based trackers
(SRDCF, and CCOT), and although it does not provide a
high-quality localization for smaller/low-resolution targets,
it is able to keep tracking them. This finding highlights the
importance of further research on the ensemble-based DCF
trackers. Finally, a qualitative comparison of DEDT versus
other trackers is presented in Figure 7.
6. Conclusion
Figure 7. Sample tracking results of evaluated algorithms on several challenging video sequences, in these sequences the red box
depicts the DEDT against other trackers (blue). The ground truth
is illustrated with yellow dashed box. From top to bottom the sequences are Skating1, FaceOcc2, Shaking, Basketball, and Soccer
with drastic illumination changes, scaling and out-of-plane rotations, background clutter, noise and severe occlusions.
In this study, we proposed diverse ensemble discriminative tracker (DEDT) that maintains a diverse committee
of classifiers to the label of the samples and queries the
most disputed labels –which are the most informative ones–
from a long-term memory auxiliary classifier. By generating artificial data with diverse labels, we intended to diversify the ensemble of classifiers, efficiently covering the
version space, increasing the generalization of the ensemble, and as a result, improve the accuracy. In addition, by
using the query-by-committee concept in labeling and updating stages of the tracker, the label noise problem is decreased because of updating classifiers only with the most
informative samples. By using the diverse committee, in
turn, the problem of equal weights for the samples are addressed, and a good approximation of the target location is
acquired even without dense sampling. The active learning
scheme also manages the balance between short-term and
long-term memory by recalling the label from long-term
memory when the short-term memory is not clear about
the label (due to forgetting the label or insufficient data).
This also reduces the dependence of the tracker on a single classifier (i.e., auxiliary classifier), yet breaking the selflearning loop to avoid accumulative model drift.
The result of the experiment on OTB50[61] benchmark
demonstrates the competitive tracking performance of the
proposed tracker compared with the state-of-the-art. In the
next step, we will investigate the strategies to detect or generate more challenging samples for the ensemble (e.g. adversarial samples of the ensemble) to accelerate the model
construction especially in rapidly changing scenarios.
References
[1] N. Abe and H. Mamitsuka. Query learning strategies using
boosting and bagging. In ICML’98, 1998. 3
[2] S. Avidan. Support vector tracking. PAMI, 26(8):1064–1072,
2004. 1
[3] S. Avidan. Ensemble tracking. PAMI, 29, 2007. 2, 4
[4] B. Babenko, M.-H. Yang, and S. Belongie. Visual tracking
with online multiple instance learning. In CVPR’09, 2009.
1, 2
[5] Q. Bai, Z. Wu, S. Sclaroff, M. Betke, and C. Monnier. Randomized ensemble tracking. In ICCV’13, 2013. 4
[6] Y. Bai and M. Tang. Robust tracking via weakly supervised
ranking svm. In CVPR’12, 2012. 1, 2
[7] Y. Bengio, J. Louradour, R. Collobert, and J. Weston. Curriculum learning. In ICML’09, 2009. 3
[8] L. Bertinetto, J. Valmadre, S. Golodetz, O. Miksik, and P. H.
Torr. Staple: Complementary learners for real-time tracking.
In Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, pages 1401–1409, 2016. 7
[9] A. Beygelzimer, S. Dasgupta, and J. Langford. Importance
weighted active learning. In Proceedings of the 26th Annual
International Conference on Machine Learning, pages 49–
56. ACM, 2009. 3
[10] D. A. Cohn, Z. Ghahramani, and M. I. Jordan. Active learning with statistical models. Journal of artificial intelligence
research, 4(1):129–145, 1996. 3
[11] R. T. Collins, Y. Liu, and M. Leordeanu. Online selection of
discriminative tracking features. PAMI, 27(10):1631–1643,
2005.
[12] N. Dalal and B. Triggs. Histograms of oriented gradients for
human detection. In Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference
on, volume 1, pages 886–893. IEEE, 2005. 5
[13] M. Danelljan, G. Bhat, F. S. Khan, and M. Felsberg. Eco:
Efficient convolution operators for tracking. arXiv preprint
arXiv:1611.09224, 2016. 1
[14] M. Danelljan, G. Hager, F. Shahbaz Khan, and M. Felsberg.
Learning spatially regularized correlation filters for visual
tracking. In ICCV’15, pages 4310–4318, 2015. 7
[15] M. Danelljan, A. Robinson, F. S. Khan, and M. Felsberg.
Beyond correlation filters: Learning continuous convolution
operators for visual tracking. In ECCV’16. 1, 7
[16] F. De la Torre and M. J. Black. Robust principal component
analysis for computer vision. In ICCV’01, 2001. 3
[17] P. F. Felzenszwalb, R. B. Girshick, D. McAllester, and D. Ramanan. Object detection with discriminatively trained partbased models. PAMI, 32, 2010. 5
[18] J. Gall, A. Yao, N. Razavi, L. Van Gool, and V. Lempitsky. Hough forests for object detection, tracking, and action
recognition. PAMI, 2011. 2
[19] I. J. Goodfellow, J. Shlens, and C. Szegedy. Explaining and harnessing adversarial examples. arXiv preprint
arXiv:1412.6572, 2014. 7
[20] H. Grabner, M. Grabner, and H. Bischof. Real-time tracking
via on-line boosting. In BMVC’06, volume 1, page 6, 2006.
1, 2, 3, 4
[21] H. Grabner, C. Leistner, and H. Bischof. Semi-supervised
on-line boosting for robust tracking. In ECCV’08. 2008. 1,
2, 4
[22] B. Han, J. Sim, and H. Adam. Branchout: Regularization
for online ensemble tracking with convolutional neural networks. In Proceedings of IEEE International Conference on
Computer Vision, pages 2217–2224, 2017. 2, 3
[23] S. Hare, A. Saffari, and P. H. Torr. Struck: Structured output
tracking with kernels. In ICCV’11, 2011. 1, 7
[24] S. He, Q. Yang, R. Lau, J. Wang, and M.-H. Yang. Visual tracking via locality sensitive histograms. In CVPR’13,
pages 2427–2434, 2013.
[25] J. F. Henriques, R. Caseiro, P. Martins, and J. Batista. Exploiting the circulant structure of tracking-by-detection with
kernels. In ECCV’12, pages 702–715. Springer, 2012.
[26] Z. Hong, Z. Chen, C. Wang, X. Mei, D. Prokhorov, and
D. Tao. Multi-store tracker (muster): a cognitive psychology inspired approach to object tracking. In CVPR’15. 7
[27] Z. Kalal, K. Mikolajczyk, and J. Matas. Tracking-learningdetection. PAMI, 34(7):1409–1422, 2012. 2, 7
[28] H. Kiani Galoogahi, A. Fagg, and S. Lucey. Learning background-aware correlation filters for visual tracking.
arXiv, 2017.
[29] H. Kiani Galoogahi, T. Sim, and S. Lucey. Correlation filters
with limited boundaries. In CVPR’15, 2015.
[30] M. Kristan, J. Matas, A. Leonardis, and M. Felsberg. The
visual object tracking vot2015 challenge results. In ICCVw’15.
[31] A. Krogh, J. Vedelsby, et al. Neural network ensembles,
cross validation, and active learning. Advances in neural information processing systems, 7:231–238, 1995. 2, 4
[32] L. I. Kuncheva and C. J. Whitaker. Measures of diversity in
classifier ensembles and their relationship with the ensemble
accuracy. Machine learning, 51(2):181–207, 2003. 3, 6
[33] C. H. Lampert and J. Peters. Active structured learning for
high-speed object detection. In PR, pages 221–231. Springer,
2009. 3
[34] A. Lapedriza, H. Pirsiavash, Z. Bylinskii, and A. Torralba.
Are all training examples equally valuable? arXiv, 2013. 3
[35] C. Leistner, A. Saffari, and H. Bischof. Miforests: Multipleinstance learning with randomized trees. In ECCV’10, 2010.
2, 3
[36] A. Li, M. Lin, Y. Wu, M.-H. Yang, and S. Yan. Nus-pro: A
new visual tracking challenge. PAMI, 2016. 1
[37] C. Li, X. Wang, W. Dong, J. Yan, Q. Liu, and H. Zha. Active
sample learning and feature selection: A unified approach.
arXiv preprint arXiv:1503.01239, 2015. 3
[38] H. Li, Y. Li, and F. Porikli. Convolutional neural net bagging for online visual tracking. Computer Vision and Image
Understanding, 153:120–129, 2016. 2, 3
[39] J. Lu, T. Issaranon, and D. Forsyth. Safetynet: Detecting and
rejecting adversarial examples robustly. arXiv, 2017. 3
[40] P. Melville and R. J. Mooney. Constructing diverse classifier ensembles using artificial training examples. In IJCAI,
volume 3, pages 505–510, 2003. 4
[41] P. Melville and R. J. Mooney. Diverse ensembles for active learning. In Proceedings of the twenty-first international
conference on Machine learning, page 74. ACM, 2004. 3, 4,
5
[42] K. Meshgi, S. Oba, and S. Ishii. Active discriminative tracking using collective memory. In MVA’17. 2
[43] K. Meshgi, S. Oba, and S. Ishii. Robust discriminative tracking via query-by-committee. In AVSS’16, 2016. 2, 3, 4
[44] H. Nam, M. Baek, and B. Han. Modeling and propagating
cnns in a tree structure for visual tracking. arXiv preprint
arXiv:1608.07242, 2016. 2
[45] S. Oron, A. Bar-Hillel, D. Levi, and S. Avidan. Locally orderless tracking. IJCV, 2015.
[46] N. C. Oza. Online bagging and boosting. In SMC’05, 2005.
2
[47] C. Rao, C. Yao, X. Bai, W. Qiu, and W. Liu. Online random ferns for robust visual tracking. In Pattern Recognition
(ICPR), 2012 21st International Conference on, pages 1447–
1450. IEEE, 2012. 3
[48] A. Saffari, C. Leistner, M. Godec, and H. Bischof. Robust
multi-view boosting with priors. In ECCV’10. 2010. 2
[49] A. Saffari, C. Leistner, J. Santner, M. Godec, and H. Bischof.
On-line random forests. In ICCVw’09. 2, 3
[50] A. Salaheldin, S. Maher, and M. Helw. Robust real-time
tracking with diverse ensembles and random projections. In
Proceedings of the IEEE International Conference on Computer Vision Workshops, pages 112–120, 2013. 3
[51] S. Salti, A. Cavallaro, and L. Di Stefano. Adaptive appearance modeling for video tracking: Survey and evaluation.
IEEE TIP, 2012. 1
[52] J. Santner, C. Leistner, A. Saffari, T. Pock, and H. Bischof.
Prost: Parallel robust online simple tracking. In CVPR’10. 2
[53] B. Settles. Active learning. Morgan & Claypool Publishers,
2012. 3
[54] H. S. Seung, M. Opper, and H. Sompolinsky. Query by committee. In COLT’92, pages 287–294. ACM, 1992. 2, 3
[55] F. Tang, S. Brennan, Q. Zhao, and H. Tao. Co-tracking using
semi-supervised support vector machines. In ICCV’07. 2
[56] A. Vezhnevets and O. Barinova. Avoiding boosting overfitting by removing confusing samples. In ECML’07. 3
[57] S. Vijayanarasimhan and K. Grauman. Cost-sensitive active
visual category learning. IJCV, 2011. 3
[58] I. Visentini, J. Kittler, and G. L. Foresti. Diversity-based
classifier selection for adaptive object tracking. In MCS,
pages 438–447. Springer, 2009. 3
[59] L. Wang, W. Ouyang, X. Wang, and H. Lu. Stct: Sequentially training convolutional networks for visual tracking. In
Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, pages 1373–1381, 2016. 2
[60] X. Wang, G. Hua, and T. Han. Discriminative tracking by
metric learning. ECCV’10, pages 200–214, 2010.
[61] Y. Wu, J. Lim, and M.-H. Yang. Online object tracking: A
benchmark. In CVPR’13, pages 2411–2418. IEEE, 2013. 1,
2, 6, 7, 8
[62] J. Zhang, S. Ma, and S. Sclaroff. Meem: Robust tracking via
multiple experts using entropy minimization. In ECCV’14.
2, 7
[63] K. Zhang and H. Song. Real-time visual tracking via online
weighted multiple instance learning. PR, 2013. 2
[64] K. Zhang, L. Zhang, and M.-H. Yang. Real-time compressive tracking. In ECCV’12, pages 864–877. Springer, 2012.
[65] K. Zhang, L. Zhang, M.-H. Yang, and Q. Hu. Robust
object tracking via active feature selection. IEEE CSVT,
23(11):1957–1967, 2013. 3
[66] Z.-H. Zhou. Ensemble methods: foundations and algorithms. CRC press, 2012. 2, 3
| 1cs.CV
|
arXiv:1710.04369v3 [math.ST] 28 Feb 2018
The Inverse Gamma-Gamma Prior for Optimal
Posterior Contraction and Multiple Hypothesis
Testing ∗
Ray Bai
Malay Ghosh
†
University of Florida
March 2, 2018
Abstract
We study the well-known problem of estimating a sparse n-dimensional
unknown mean vector θ = (θ1 , ..., θn ) with entries corrupted by Gaussian white noise. In the Bayesian framework, continuous shrinkage
priors which can be expressed as scale-mixture normal densities are
popular for obtaining sparse estimates of θ. In this article, we introduce a new fully Bayesian scale-mixture prior known as the inverse
gamma-gamma (IGG) prior. We prove that the posterior distribution
contracts around the true θ at (near) minimax rate under very mild
conditions. In the process, we prove that the sufficient conditions for
minimax posterior contraction given by van der Pas et al. [25] are not
necessary for optimal posterior contraction. We further show that the
IGG posterior density concentrates at a rate faster than those of the
horseshoe or the horseshoe+ in the Kullback-Leibler (K-L) sense. To
classify true signals (θi 6= 0), we also propose a hypothesis test based
on thresholding the posterior mean. Taking the loss function to be the
expected number of misclassified tests, we show that our test procedure asymptotically attains the optimal Bayes risk exactly. We illustrate through simulations and data analysis that the IGG has excellent
finite sample performance for both estimation and classification.
∗
Keywords and phrases: normal means problem, sparsity, nearly black vectors, posterior contraction, multiple hypothesis testing, heavy tail, shrinkage estimation
†
Malay Ghosh (email: [email protected]) is Distinguished Professor, Department of
Statistics, University of Florida. Ray Bai (email: [email protected]) is Graduate Student,
Department of Statistics, University of Florida.
1
1
1.1
Introduction
The Normal Means Problem Revisited
Suppose we observe an n-component random observation (X1 , ..., Xn ) ∈ Rn ,
such that
Xi = θi + i , i = 1, ..., n,
(1)
where i ∼ N (0, 1), i = 1, ..., n. In the high-dimensional setting where n is
very large, sparsity is a very common phenomenon. That is, in the unknown
mean vector θ = (θ1 , ..., θn ), only a few of the θi ’s are nonzero. Under model
(1), we are primarily interested in separating the signals (θi 6= 0) from the
noise (θi = 0) and giving robust estimates of the signals.
This simple framework (1) is the basis for a number of high-dimensional
problems, such as image reconstruction, genetics, and wavelet analysis (Johnstone and Silverman [20]). For example, if we wish to reconstruct an image
from millions of pixels of data, only a few pixels are typically needed to
recover the objects of interest. In genetics, we may have tens of thousands
of gene expression data points, but only a few are significantly associated
with the phenotype of interest. For instance, Wellcome Trust [28] has confirmed that only seven genes have a non-negligible association with Type I
diabetes. These applications demonstrate that sparsity is a fairly reasonable
assumption for θ in (1).
1.2
Scale-Mixture Shrinkage Priors
Scale-mixture shrinkage priors are widely used for obtaining sparse estimates
of θ in (1). These priors typically take the form
θi |σi2 ∼ N (0, σi2 ), σi2 ∼ π(σi2 ), i = 1, ..., n,
(2)
where π : [0, ∞) → [0, ∞) is a density on the positive reals. These scalemixture densities typically contain heavy mass around zero, so that the
posterior density is heavily concentrated around 0 ∈ Rn . However, they
also retain heavy enough tails in order to correctly identify and prevent
overshrinkage of the true signals.
Global-local (GL) shrinkage priors comprise a wide class of scale-mixture
shrinkage priors (2). GL priors take the form
θi |τ, λi ∼ N (0, λi τ ), λi ∼ f, τ ∼ g,
(3)
where τ is a global shrinkage parameter that shrinks all θi ’s to the origin,
while the local scale parameters λi ’s control the degree of individual shrinkage. Examples of GL priors include the Bayesian lasso (Park and Casella
2
[21]), the horseshoe prior (Carvalho et al. [9]), the Strawderman-Berger prior
(Strawderman [24], Berger [4]), the normal-exponential-gamma (NEG) prior
(Griffin and Brown [19]), the Dirichlet-Laplace prior (Bhattacharya et al.
[6]), the generalized double Pareto (GDP) family (Armagan et al. [2]), and
the horseshoe+ prior (Bhadra et al. [5]).
The three parameter beta normal (TPBN) mixture family introduced by
Armagan et al. [1] generalizes several well-known scale-mixture shrinkage
priors. The TPBN family places a beta prime density (also known as the
inverted beta) as the prior on λi in (3), i.e.
π(λi ) =
Γ(a + b) a−1
λ (1 + λi )−(a+b) , i = 1, ..., n,
Γ(a)Γ(b) i
(4)
where a and b are positive constants. Examples of priors that fall under the
TPBN family include the horseshoe prior (a = b = 0.5), the StrawdermanBerger prior (a = 1, b = 0.5), and the normal-exponential gamma (NEG)
prior (a = 1, b > 0).
GL priors have been studied extensively in the context of sparse normal
means estimation. Many authors have shown that the posterior distribution
under GL priors contracts at (near) minimax rate. Most of the past posterior
contraction results have relied on tuning or estimating the global parameter
τ to achieve this rate. The τ in (3) can either be a priori specified with a
specific rate of decay (as in van der Pas et al. [27] or Ghosh and Chakrabarti
[16]) or it can estimated from the data through empirical Bayes or by placing
a prior on τ (as in van der Pas et al. [27], van der Pas et al. [26], and
Bhattacharya et al. [6]).
Moving beyond the global-local framework, van der Pas et al. [25] provided conditions for which the posterior distribution under any scale-mixture
shrinkage prior of the form (2) achieves the minimax posterior contraction
rate, provided that the θi ’s are a posteriori independent. Their result is
quite general and covers a wide variety of priors, including the normalgamma prior (Griffin and Brown [18]), the spike-and-slab LASSO (Ročková
[22]) and the horseshoe+ prior (Bhadra et al. [5]). A thorough discussion of
optimal posterior contraction is given in Section 3.
In addition to robust estimation of θ, we are often interested in identifying the true signals (or non-zero entries) within θ. Here, we are essentially conducting n simultaneous hypothesis tests, H0i : θi = 0 vs. H1i :
θi 6= 0, i = 1, ..., n. Assuming that the true data-generating model is a
two-components mixture density, Bogdan et al. [7] studied the risk properties of a large number of multiple testing rules. Specifically, Bogdan et al.
3
[7] considered a symmetric 0-1 loss function taken to be the expected total number of misclassified tests. By imposing a few regularity conditions
to induce sparsity and to bound the Type I and Type II error probabilities away from zero and one, Bogdan et al. [7] arrived at a simple closed
form for the asymptotic Bayes risk under 0-1 loss. They termed this as the
asymptotically Bayes optimal risk under sparsity (or ABOS risk). They then
provided necessary and sufficient conditions for which a number of classical
multiple test procedures (e.g. the Benjamini and Hochberg [3] procedure)
could asymptotically match the ABOS risk, provided that the true θi ’s are
generated from a point mass-mixture density. A thorough discussion of this
decision theoretic framework is presented in Section 4.1.
Testing rules induced by scale-mixture shrinkage priors – specifically GL
priors (3) – have also been studied in this decision theoretic framework. Assuming that the θi ’s come from a two-components model, Datta and Ghosh
[12] showed that a thresholding rule based on the posterior mean under the
horseshoe prior could asymptotically attain the ABOS risk up to a multiplicative constant. Ghosh et al. [17] generalized this result to a general class
of shrinkage priors of the form (3), including the student-t distribution, the
TPBN family, and the GDP family of priors. Ghosh and Chakrabarti [16]
later showed that their thresholding rule for this same class of priors could
even asymptotically attain the ABOS risk exactly. Bhadra et al. [5] also
extended this same rule for the horseshoe+ prior, showing that a testing
rule based on the horseshoe+ prior could asymptotically attain the ABOS
risk up to a multiplicative constant. In all of the aforementioned papers,
the global parameter τ in (3) was treated as either a tuning parameter that
decays to zero as n → ∞ or set as a plug-in empirical Bayes estimate τb from
van der Pas et al. [27].
In this article, we introduce a new fully Bayesian scale-mixture shrinkage
prior. Our goal is twofold. Having observed a vector X = (X1 , ..., Xn ) with
entries from (1), we would like to achieve: 1) robust estimation of θ, and
2) a robust testing rule for identifying true signals. To tackle both these
problems, we introduce a new scale-mixture shrinkage prior known as the
Inverse Gamma-Gamma (IGG) prior.
The IGG prior has a number of attractive theoretical properties. Under
extremely mild conditions and with specification of appropriate hyperparameters, the IGG posterior density is able to attain the (near) minimax
contraction rate. Our work differs from the existing literature in several
notable ways. First, the IGG is a special case of the TPBN prior density
(4). However, we show that we can achieve (near) minimax posterior contraction by simply specifying sample-size dependent hyperparameters a and
4
b, rather than by tuning or estimating a shared global parameter τ . Our
prior therefore does not fall under the global-local framework and our theoretical results differ from many existing results based on global-local priors.
Moreover, our prior is an example of a scale-mixture shrinkage prior that
does not necessarily satisfy the conditions for optimal contraction given by
van der Pas et al. [25], thus proving that these conditions are not necessary
for minimax-optimal posterior contraction. Finally, we justify the use of the
IGG by showing that the posterior concentrates at a rate faster than any
known Bayes estimator (including the horseshoe and horseshoe+ densities)
in the Kullback-Leibler sense.
In addition, we show that our testing rule for classifying signals asymptotically achieves the optimal Bayes risk exactly. While previously, Ghosh
and Chakrabarti [16] demonstrated that testing rules based on global-local
priors could asymptotically attain the optimal Bayes risk exactly, their result required tuning or estimating a global parameter τ . The IGG prior
avoids this by placing appropriate values (dependent upon sample size) as
its hyperparameters instead.
The organization of this paper is as follows. In Section 2, we introduce the IGG prior. We show that it mimics traditional shrinkage priors
by placing heavy mass around zero. We also establish various concentration
properties of the IGG prior that characterize its tail behavior and that are
crucial for establishing our theoretical results. In Section 3, we discuss the
behavior of the posterior under the IGG prior. We show that for a class
of sparse normal mean vectors, the posterior distribution under the IGG
prior contracts around the true θ at (near) minimax rate under mild conditions, and moreover, that the posterior concentrates at a faster rate than
any known Bayes estimator. In Section 4, we introduce our thresholding rule
based on the posterior mean and demonstrate that it asymptotically attains
the ABOS risk exactly. In Section 5, we present simulation results which
demonstrate that the IGG prior has excellent performance for both estimation and classification in finite samples. Finally, in Section 6, we utilize the
IGG prior to analyze a prostate cancer data set.
1.3
Notation
We use the following notations for the rest of the paper. Let {an } and {bn }
be two non-negative sequences of real numbers indexed by n, where bn 6= 0
an
for sufficiently large n. We write an bn to denote 0 < lim inf
≤
n→∞ bn
an
lim sup
< ∞, and an - bn to denote that there exists a constant C > 0
n→∞ bn
5
independent of n such that an ≤ Cbn provided n is sufficiently large. If
limn→∞
an
bn
= 1, we write it as an ∼ bn . Moreover, if
an
bn
≤ M for all
sufficiently large n where M > 0 is a positive constant independent of n,
then we write an = O(bn ). If limn→∞ abnn = 0, we write an = o(bn ). Thus,
an = o(1) if limn→∞ an = 0.
Throughout the paper, we also use Z to denote a standard normal
N (0, 1) random variable having cumulative distribution function and probability density function Φ(·) and φ(·), respectively.
2
The Inverse Gamma-Gamma (IGG) Prior
Suppose we have observed X ∼ N (θ, In ), and our task is to estimate the
n-dimensional vector, θ. Consider putting a scale-mixture prior on each
θi , i = 1, ..., n of the form
θi |σi2
σi2
ind
∼
i.i.d.
∼
N (0, σi2 ), i = 1, ..., n,
β 0 (a, b), i = 1, ..., n,
(5)
where β 0 (a, b) denotes the beta prime density (4). The scale mixture prior
(5) is a special case of the TPBN family of priors with the global parameter
τ fixed at τ = 1. From (5), one easily sees that the posterior mean of θi
under (5) is given by
E{E(θi |Xi , σ 2 )} = {E(1 − κi )|Xi } Xi ,
(6)
1
where κi = 1+σ
2 . Using a simple transformation of variables, we also see
i
that the posterior density of the shrinkage factor κi is proportional to
κi Xi2
π(κi |Xi ) exp −
2
!
a−1/2
κi
(1 − κi )b−1 , κi ∈ (0, 1).
(7)
From (6), it is clear that the amount of shrinkage is controlled by the
shrinkage factor κi . With appropriately chosen a and b, one can obtain
sparse estimates of the θi ’s. For example, with a = b = 0.5, we obtain the
standard half-Cauchy density C + (0, 1).
To distinguish our work from previous results, we note that that the
beta prime density (4) can be rewritten as a product of independent inverse
gamma and gamma densities. We reparametrize (5) as follows:
6
Figure 1: Marginal density of the IGG prior (8) with hyperparameters a =
0.6, b = 0.4, in comparison to other shrinkage priors. The DL1/2 prior is
the marginal density for the Dirichlet-Laplace density with Dir(1/2, ...., 1/2)
specified as a prior in the Bayesian hierarchy.
ind
θi |λi , ξi ∼ N (0, λi ξi ), i = 1, ..., n,
i.i.d.
λi ∼ G(a, 1), i = 1, ..., n,
(8)
i.i.d.
ξi ∼ IG(b, 1), i = 1, ..., n,
where a, b > 0. It should be noted that the rate parameter 1 in (8) could
be replaced by any positive constant. Representation (8) gives us some
important intuition into the behavior of the IGG prior. Namely, for small
values of b, IG(b, 1) places more mass around zero. As Proposition 1 shows,
for any 0 < b ≤ 12 , the marginal distribution for a single θ under the IGG
prior has a singularity at zero.
Proposition 1. If θ is endowed with the IGG prior (8), then the marginal
distribution of θ is unbounded with a singularity at zero for any 0 < b ≤ 1/2.
Proof. See Appendix A.
7
Proposition 1 gives us some insight into how we should choose the hyperparameters in (8). Namely, we see that for small values of b, the IGG prior can
induce sparse estimates of the θi ’s by shrinking most observations to zero.
As we will illustrate in Section 2.1, the tails of the IGG prior are still heavy
enough to identify signals that are significantly far away from zero.
Figure 1 gives a plot of the marginal density π(θi ) for the IGG prior (8),
with a = 0.6 and b = 0.4. Figure 1 shows that with a small value for b, the
IGG has a singularity at zero. The IGG prior also appears to have slightly
heavier mass around zero than other well-known scale-mixture shrinkage
priors, but maintaining the same tail robustness. In Section 3, we provide a
theoretical argument that shows that the shrinkage profile near zero under
the IGG is indeed more aggressive than that of previous known Bayesian
estimators.
2.1
Concentration Properties of the IGG Prior
Consider the IGG prior given in (8), but now we allow the hyperparameter
bn is allowed to vary with n as n → ∞. Namely, we allow 0 < bn < 1 for all
n, but bn → 0 as n → ∞ so that even more mass is placed around zero as
n → ∞. We also fix a to lie in the interval ( 12 , ∞). To emphasize that the
hyperparameter bn depends on n, we rewrite the prior (8) as
ind
θi |λi , ξi ∼ N (0, λi ξi ), i = 1, ..., n,
i.i.d.
(9)
λi ∼ IG(a, 1), i = 1, ..., n,
i.i.d.
ξi ∼ G(bn , 1), i = 1, ..., n,
where bn ∈ (0, 1) = o(1) and a ∈ ( 12 , ∞). For the rest of the paper, we label
this particular variant of the IGG prior as the IGGn prior.
As described in Section 2, the shrinkage factor κi = 1+λ1 i ξi plays a critical
role in the amount of shrinkage of each observation Xi . In this section, we
further characterize the tail properties of the posterior distribution π(κi |Xi ),
which demonstrates that the IGGn prior (9) shrinks most estimates of θi ’s to
zero but still has heavy enough tails to identify true signals. In the following
results, we assume the IGGn prior on θi for Xi ∼ N (θi , 1).
Theorem 1. For any a, bn ∈ (0, ∞),
2
E(1 − κi |Xi ) ≤ eXi /2
Proof. See Appendix A.
8
bn
.
a + bn + 1/2
Corollary 1.1. If a is fixed and bn → 0 as n → ∞, then E(1 − κi |Xi ) → 0
as n → ∞.
Theorem 2. Fix ∈ (0, 1). For any a ∈ ( 21 , ∞), bn ∈ (0, 1),
2
P (κi < |Xi ) ≤ eXi /2
bn
.
(a + 1/2) (1 − )
Proof. See Appendix A.
Corollary 2.1. If a ∈ ( 12 , ∞) is fixed and bn → 0 as n → ∞, then by
Theorem 2, P (κi ≥ |Xi ) → 1 for any fixed ∈ (0, 1).
Theorem 3. Fix η ∈ (0, 1), δ ∈ (0, 1). Then for any a ∈ ( 12 , ∞) and
bn ∈ (0, 1),
P (κi > η|Xi ) ≤
a+
1
2
(1 − η)bn
1
bn (ηδ)a+ 2
η(1 − δ) 2
exp −
Xi .
2
Proof. See Appendix A.
Corollary 3.1. For any fixed n where a ∈ ( 21 , ∞), bn ∈ (0, 1), and for every
fixed η ∈ (0, 1), P (κi ≤ η|Xi ) → 1 as Xi → ∞.
Corollary 3.2. For any fixed n where a ∈ ( 12 , ∞), bn ∈ (0, 1), and for every
fixed η ∈ (0, 1), E(1 − κi |Xi ) → 1 as Xi → ∞.
Since E(θi |Xi ) = {E(1 − κi )|Xi } Xi , Corollaries 1.1 and 2.1 illustrate that
all observations will be shrunk towards the origin under the IGGn prior (9).
However, Corollaries 3.1 and 3.2 demonstrate that if Xi is big enough, then
the posterior mean {E(1 − κi )|Xi } Xi ≈ Xi . This assures us that the tails
of the IGG prior are still sufficiently heavy to detect true signals.
We will use the concentration properties established in Theorem 1 and
3 to provide sufficient conditions for which the posterior mean and posterior distribution under the IGGn prior (9) contract around the true θ0 at
minimax or near-minimax rate in Section 3. These concentration properties
will also help us to construct the multiple testing procedure based on κi in
Section 4.
9
3
3.1
Posterior Behavior Under the IGG Prior
Sparse Normal Vectors in the Nearly Black Sense
Suppose that we observe X = (X1 , ..., Xn ) ∈ Rn from (1). Let `0 [qn ] denote
the subset of Rn given by
`0 [qn ] = {θ ∈ Rn : #(1 ≤ j ≤ n : θj 6= 0) ≤ qn }.
(10)
If θ ∈ `0 [qn ] with qn = o(n) as n → ∞, we say that θ is sparse in the
“nearly black sense.” Let θ0 = (θ01 , ..., θ0n ) be the true mean vector. In
their seminal work, Donoho et al. [13] showed that for any estimator of θ,
b the corresponding minimax risk with respect to the l2 - norm
denoted by θ,
is given by
inf
sup
b θ0 ∈`0 [qn ]
θ
Eθ0 ||θb − θ0 ||2 = 2qn log
n
(1 + o(1)), as n → ∞.
qn
(11)
In (11) and throughout the paper, Eθ0 denotes expectation with respect to
the N (θ0 , In ) distribution. (11) effectively states that in the presence of
sparsity, a minimax-optimal estimator only loses as a logarithmic factor (in
the ambient dimension) as a penalty for not knowing the true locations of
the zeroes. Moreover, (11) implies that we only need a number of replicates
in the order of the true sparsity level qn to consistently estimate θ0 . In order
for the performance of Bayesian estimators to be compared with frequentist
ones, we say that a Bayesian point estimator θbB attains the minimax risk
(in the order of a constant) if
n
sup Eθ0 ||θ̂ − θ0 || qn log
.
qn
θ0 ∈`0 [qn ]
B
2
(12)
Examples of potential choices for θbB include the posterior median or the
posterior mean (as in Johnstone and Silverman [20]), or the posterior mode
(as in Ročková [22]). (12) pertains only to a particular point estimate.
For a fully Bayesian interpretation, we say that the posterior distribution
contracts around the true θ0 at a rate at least as fast as the minimax l2 risk
if
n
2
sup Eθ0 Π θ : ||θ − θ0 || > Mn qn log
X → 0,
(13)
qn
θ0 ∈`0 [qn ]
for every Mn → ∞ as n → ∞. On the other hand, in another seminal paper, Ghosal et al. [15] showed that the posterior distribution cannot contract
10
faster than the minimax rate of qn log qnn around the truth. Hence, the optimal rate of contraction of a posterior distribution around the true θ0 must
be the minimax optimal rate in (11), up to some multiplicative constant. In
other words, if we use a fully Bayesian model to estimate a “nearly black”
normal mean vector, the minimax optimal rate should be our benchmark,
and the posterior distribution
should capture the true θ0 in a ball of squared
n
radius at most qn log qn (up to a multiplicative constant) as n → ∞.
In the subsequent section, we first prove that the IGGn prior does not
satisfy the conditions for posterior contraction given by van der Pas et al. [25]
for scale-mixture shrinkage priors (2). We then provide sufficient conditions
on the rate of decay of bn in (9) such that, under the IGGn prior, the
posterior mean attains the minimax risk, while the posterior distribution
contracts at the minimax rate. In order for (12) and (13) to hold for the
IGGn prior, the true sparsity level qn must be known. However, if qn is
unknown, then the IGGn prior can still attain near-minimax concentration
rates.
3.2
Minimax Posterior Contraction Under the IGG Prior
For scale-mixture shrinkage priors (2) where the priors on σi2 ’s, i = 1, ..., n,
are a priori independent, van der Pas et al. [25] gave sufficient conditions
under which the posterior contracts at the minimax rate given in (13). A
variety of densities π(σi2 ) are known to satisfy these conditions, including the
horseshoe and horseshoe+ priors, the spike-and-slab LASSO, the normalgamma prior, and the inverse Gaussian prior. We first demonstrate that
the IGG prior (9) prior can fail to satisfy these conditions before proceeding
to provide conditions under which it does achieve the minimax posterior
contraction rate. We first restate Theorem 2.1 from van der Pas et al. [25]
below:
Proposition 2 (Van der Pas et al., 2016). Suppose that X = (X1 , ..., Xn ) ∼
N (θ0 , In ) is observed, and assume that the prior on θ is of form (2). Suppose further that qn = o(n) and let Mn be an arbitrary positive sequence
tending to +∞. Suppose that the following conditions on the scale prior π
hold:
1. For some b ≥ 0, we can write u 7→ π(u) = Ln (u)e−bu , where Ln
is a function that is uniformly regular varying. That is, there exist
constants R, u0 ≥ 1 (which do not depend on n), such that
1
L(au)
≤
≤ R, for all a ∈ [1, 2], and all u ≥ u0 .
R
L(u)
11
Suppose further that there are constants C 0 , K, b0 ≥ 0 and u∗ ≥ 1 such
that
K
qn
0
0
C π(u) ≥
e−b u for all u ≥ u∗ .
n
R1
2. Suppose that there is a constant c > 0 such that
3. Let sn = qnn log qnn , and let dn =
a constant C such that
Z ∞
sn
!
p
0
π(u)du ≥ c.
log(n/qn ). Assume that there is
d3
u ∧ √n π(u)du + dn
u
Z d2
n π(u)
1
√ du ≤ Csn .
u
(14)
Then, under Conditions 1-3,
sup
θ0 ∈`0 [qn ]
Eθ0 Π θ : ||θ − θ0 ||2 > Mn qn log
n
qn
X
→ 0,
i.e. the posterior distribution under prior (2) contracts at the minimax contraction rate.
To briefly summarize, Condition 1 of Proposition 2 assumes that the posterior recovers nonzero means at optimal rate by ensuring that the tails decay
no faster than at exponential rate. Condition 2 ensures that π puts some
finite mass on values between [0, 1]. Finally, Condition 3 describes the decay
of π away from a neighborhood of zero. One easily checks that the IGG prior
satisfies both the first two conditions for any a ∈ ( 21 , ∞) and appropriately
chosen b, but it does not necessarily satisfy the third one, as we show in the
below lemma.
Lemma 1. Suppose that we observe X = (X1 , ..., Xn ) ∼ N (θ0 , In ). Suppose that a ∈ ( 21 , ∞) and b ∈ (0, 1) is a sequence such that b = o(1). Then
the prior density on the scale term in the IGG prior with hyperparameters
(a, b) fails to satisfy Condition 3 in Proposition 2.
Proof. See Appendix B.
Lemma 1 shows that if a ∈ ( 12 , ∞), then for any b ∈ (0, 1) where b = o(1),
the IGGn prior does not satisfy the conditions given by van der Pas et al.
[25]. However, as we show in Theorem 6, for a ∈ ( 12 , ∞), the IGG posterior
does in fact contract at minimax rate, provided that an appropriate rate of
decay is placed on b. Therefore, we have shown that while the conditions
12
given in Proposition 2 are sufficient for minimax posterior contraction for
the sparse normal means problem, they are not necessary.
We next study the mean square error (MSE) and the posterior variance
of the IGG prior and provide an upper bound on both. For all our results,
we assume that the true θ0 belongs to the set of nearly black vectors defined
by (10). With a suitably chosen rate for bn in (9), these upper bounds are
equal, up to a multiplicative constant, to the minimax risk. Utilizing these
bounds, we also show that the posterior distribution under the IGGn prior
(9) is able to contract around θ0 at minimax-optimal rates.
Since the priors (9) are independently placed on each θi , i = 1, ..., n, we
denote the resulting vector of posterior means (E(θ1 |X1 ), ..., E(θn |Xn )) by
T (X) and the ith individual posterior mean by T (Xi ). Therefore, T (X) is
the Bayes estimate of θ under squared error loss. Theorem 4 gives an upper
bound on the mean squared error for T (X).
Theorem 4. Suppose X ∼ N (θ0 , In ), where θ0 ∈ `0 [qn ]. Let T (X) denote
the posterior mean vector under (9). If a ∈ ( 21 , ∞), bn ∈ (0, 1) with bn → 0
as n → ∞, the MSE satisfies
1
sup Eθ0 ||T (X) − θ0 || - qn log
bn
θ0 ∈`0 [qn ]
2
s
+ (n − qn )bn log
1
,
bn
provided that qn → ∞ and qn = o(n) as n → ∞.
Proof. See Appendix B.
By the minimax result in Donoho et al. [13], we also have the lower
bound,
sup
θ0 ∈`0 [qn ]
Eθ0 ||T (X) − θ0 ||2 ≥ 2qn log
n
(1 + o(1)),
qn
as n, qn → ∞ and qn = o(n). The choice of bn =
qn α
n , for
n
with
qn
α ≥ 1, therefore
leads to an upper bound MSE of order qn log
a multiplicative
constant of at most 2α. Based on these observations, we immediately have
the following corollary.
Corollary 4.1. Suppose that qn is known, and that we set bn =
where α ≥ 1. Then under the conditions of Theorem 4,
n
sup Eθ0 ||T (X) − θ0 || qn log
.
qn
θ0 ∈`0 [qn ]
2
13
qn α
,
n
Corollary 4.1 shows that the posterior mean under the IGG prior performs
well as a point estimator for θ0 , as it is able to attain the minimax risk (possibly up to a multiplicative constant of at most 2 for α = 1). Although the
IGG prior does not include a point mass at zero, Proposition 1 and Corollary 4.1 together show that the pole at zero for the IGG prior mimics the
point mass well enough, while the heavy tails ensure that large observations
are not over-shrunk.
The next theorem gives an upper bound for the total posterior variance
corresponding to the IGGn (9) prior.
Theorem 5. Suppose X ∼ N (θ0 , In ), where θ0 ∈ `0 [qn ]. Under prior (7)
and the conditions of Theorem 4, the total posterior variance satisfies
n
X
1
V ar(θ0i |Xi ) - qn log
sup Eθ0
bn
θ0 ∈`0 [qn ]
i=1
s
+ (n − qn )bn log
1
,
bn
provided that qn → ∞ and qn = o(n) as n → ∞.
Proof. See Appendix B.
Having proven Theorems 4 and 5, we are now ready to state our main
theorem concerning optimal posterior contraction. Theorem 6 shows that
the IGG is competitive with other popular heavy-tailed priors like the globallocal shrinkage priors considered in Ghosh and Chakrabarti [16] or the
Dirichlet-Laplace prior considered by Bhattacharya et al. [6]. As before,
we denote the posterior mean vector under (9) as T (X).
Theorem 6. Suppose X ∼ N (θ0 , In ), where θ0 ∈ `0 [qn ]. Suppose that the
true sparsity level qn is known, with qn → ∞, and qn = o(n) as n → ∞.
α
Under prior (9), with a ∈ ( 21 , ∞) and bn = qnn , α ≥ 1,
sup
θ0 ∈`0 [qn ]
Eθ0 Π θ : ||θ − θ0 ||2 > Mn qn log
n
qn
n
qn
X
→ 0,
(15)
→ 0,
(16)
and
sup
θ0 ∈`0 [qn ]
Eθ0 Π θ : ||θ − T (X)||2 > Mn qn log
X
for every Mn → ∞ as n → ∞.
Proof. A straightforward application of Markov’s inequality combined with
the results of Theorems 4 and 5 leads to (15), while (16) follows from
Markov’s inequality combined with only the result of Theorem 5.
14
Theorem 6 shows that under mild regularity conditions, the posterior
distribution under the IGG prior contracts around both the true mean vector
and the corresponding Bayes estimates at least as fast as the minimax l2
risk in (11). Since the posterior distribution
cannot contract around the
n
truth faster than the rate of qn log qn (by Ghosal et al. [15]), the posterior
distribution for the IGG prior under the conditions of Theorem 6 must
contract around the true θ0 at the minimax optimal rate in (11) up to some
multiplicative constant.
We remark that the conditions needed to attain the minimax rate of
posterior contraction are quite mild. Namely, we only require that qn =
o(n), and we do not need to make any assumptions on the size of the true
signal size or the sparsity level. For comparison, Castillo and van der Vaart
[10] showed that the spike-and-slab prior
with a Gaussian slab contracts
2
at sub-optimal rate if ||θ0 || % qn log qnn . Bhattacharya et al. [6] showed
that given the Dir(a, ..., a) prior in the Dirichlet-Laplace prior, the posterior
contracts around θ0 at the minimax rate, provided that ||θ0 ||22 ≤ qn log4 n
if a = n−(1+β) , or provided that qn % log n if a = n1 . The IGGn prior (9)
removes these restrictions on θ0 and qn . Moreover, our minimax contraction
result does not rely on tuning or estimating a global tuning parameter τ , as
many previous authors have done, but instead, on appropriate selection of
hyperparameters a and b in the Bayesian hierarchy for the product density
of an IG(a, 1) and G(b, 1).
In reality, the true sparsity level of qn is rarely known, so the best that
we can do is to obtain the near-minimax contraction rate of qn log n. A
suitable modification of Theorem 6 leads to the following corollary.
Corollary 6.1. Suppose X ∼ N (θ0 , In ), where θ0 ∈ `0 [qn ]. Suppose that
the true sparsity level qn is unknown, but that qn → ∞, and qn = o(n) as
n → ∞. Under prior (9), with a ∈ ( 12 , ∞) and bn = n1α , α ≥ 1, then
sup
θ0 ∈`0 [qn ]
2
Eθ0 Π θ : ||θ − θ0 || > Mn qn log n X
→ 0,
(17)
and
sup
θ0 ∈`0 [qn ]
2
Eθ0 Π θ : ||θ − T (X)|| > Mn qn log n X
→ 0,
(18)
for every Mn → ∞ as n → ∞.
Having shown that the posterior mean under (9) attains the minimax risk
up to a multiplicative constant, and that its posterior density captures the
15
true θ0 in a ball of squared radius at most qn log n up to some multiplicative
constant, we now quantify its shrinkage profile around zero in terms of
Kullback-Leibler risk bounds. We show that this risk bound is in fact sharper
than other known shrinkage priors.
3.3
Kullback-Leibler Risk Bounds
In Section 3.2, we established that the choice of bn = n1 allows the IGGn
posterior to contract at near minimax rate, provided that a ∈ ( 12 , ∞). Figure
1 suggests that the shrinkage around zero is more aggressive for the IGGn
prior than it is for other known shrinkage priors when a and b are both set
to small values. In this section, we provide a theoretical justification for this
behavior near zero.
Carvalho et al. [9] and Bhadra et al. [5] showed that when the true data
generating model is N (0, In ), the Bayes estimate for the sampling density
of the horseshoe and the horseshoe+ estimators converge to the true model
at a super-efficient rate in terms of the Kullback-Leibler (K-L) distance
between the true model and the posterior density. They argue that as a
result, the horseshoe and horseshoe+ estimators squelch noise better than
other shrinkage estimators. However, in this section, we show that the IGGn
prior is able to shrink noise even more aggressively with appropriate chosen
bn .
Let θ0 be the true parameter value and f (y|θ) be the sampling model.
Further, let K(q1 , q2 ) = Eq1 log(q1 /q2 ) denote the K-L divergence of the
density q2 from q1 . The proof utilizes the following result by Clarke and
Barron [11].
Proposition 3. (Clarke and Barron, 1990). Let νn (dθ|y1 , ..., yn ) be the posterior distribution corresponding to some prior ν(dθ) after observing data
y(n) = (y1 , ..., yn ) according to theR sampling model f (y|θ). Define the posterior predictive density q̂n (y) = f (y|θ)νn (dθ|y1 , ..., yn ). Assume further
that ν(A ) > 0 for all > 0. Then the Cesàro-average risk of the Bayes
P
estimator, define as Rn ≡ n−1 nj=1 K(qθ0 , q̂j ), satisfies
Rn ≤ −
1
log ν(A ),
n
where ν(A ) denotes the measure of the set {θ : K(qθ0 , qθ ) ≤ }.
Using the above proposition, it is shown in Carvalho et al. [9] and Bhadra
et al. [5] that when the global parameter τ is fixed at τ = 1 and the true
16
parameter θ0 = 0, the horseshoe and the horseshoe+ both have Cesàroaverage risk which satisfies
Rn = O
1
n
log
n
(log n)d
,
(19)
where d is a positive constant. This rate is super-efficient, in the sense that
the risk is lower than that of the maximum likelihood estimator (MLE),
which has the rate O(log n/n) when θ0 = 0. The next theorem establishes
that the IGG prior can achieve an even faster rate of convergence O(n−1 )
in the K-L sense, with appropriate choices of a and b.
Theorem 7. Suppose that the true sampling model pθ0 is yj ∼ N (θ0 , 1).
Then for q̂n under the IGG prior with any a > 0 and bn = n1 , the optimal
rate of convergence of Rn when θ0 = 0 satisfies the inequality,
√
1
1
Rn ≤
2 + log( π) + (a + 2) log(2) + log a +
n
2
+
2 log n
,
n2
(20)
Proof. See Appendix C.
n
Since log
= o(n−1 ), we see from Theorem 7 that the IGGn posterior density
n2
with hyperparameters a > 0 and bn = n1 has an optimal convergence rate
of O(n−1 ). This convergence rate is faster than that of the horseshoe or
horseshoe+, both of which converge at the rate of O{n−1 (log n−d log log n)}
when θ0 = 0. To our knowledge, this is the sharpest known bound on
Cesàro-average risk for any Bayes estimator. Our result provides a rigorous
explanation for the observation that the IGG seems to shrink noise more
aggressively than other scale-mixture shrinkage priors.
Theorem 7 not only justifies the use of bn = n1 as a choice for hyperparameter b in the IGG prior, but it also provides insight into how we
should choose the hyperparameter a. (20) shows that the constant C in
Rn ≤ Cn−1 + o(n−1 ) can be large if a is set to be large. This theorem thus
implies that in order to minimize the K-L distance between N (θ0 , In ) and
the IGG posterior density, we should pick a to be small. Since we require
a ∈ ( 21 , ∞) in order to achieve the near-minimax contraction rate, our theoretical results suggest that we should set a ∈ ( 12 , 12 + δ] for small δ > 0 for
optimal posterior concentration.
17
4
4.1
Multiple Testing with the IGG Prior
Asymptotic Bayes Optimality Under Sparsity
Suppose we observe X = (X1 , ..., Xn ), such that Xi ∼ N (θi , 1), for i =
1, ..., n. To identify the true signals in X, we conduct n simultaneous tests:
H0i : θi = 0 against H1i : θi 6= 0, for i = 1, ..., n. For each i, θi is assumed to
be generated by a true data-generating model,
i.i.d.
θi ∼ (1 − p)δ{0} + pN (0, ψ 2 ), i = 1, ..., n,
(21)
where ψ 2 > 0 represents a diffuse “slab” density. This point mass mixture
model is often considered a theoretical ideal for generating a sparse vector
θ in the statistical literature. Indeed, Carvalho et al. [8] referred to model
(21) as a “gold standard” for sparse problems.
Model (21) is equivalent to assuming that for each i, θi follows a random variable whose distribution is determined by the latent binary random
variable νi , where νi = 0 denotes the event that H0i is true, while νi = 1
corresponds to the event that H0i is false. Here νi ’s are assumed to be
i.i.d. Bernoulli(p) random variables, for some p in (0, 1). Under H0i , i.e.
θi ∼ δ{0} , the distribution having a mass 1 at 0, while under H1i , θi 6= 0 and
is assumed to follow an N (0, ψ 2 ) distribution with ψ 2 > 0. The marginal
distributions of the Xi ’s are then given by the following two-groups model:
i.i.d.
Xi ∼ (1 − p)N (0, 1) + pN (0, 1 + ψ 2 ), i = 1, ..., n.
(22)
Our testing problem is now equivalent to testing simultaneously
H0i : νi = 0 versus H1i : νi = 1 for i = 1, ..., n.
(23)
We consider a symmetric 0-1 loss for each individual test and the total loss
of a multiple testing procedure is assumed to be the sum of the individual
losses incurred in each test. Letting t1i and t2i denote the probabilities of
type I and type II errors of the ith test respectively, the Bayes risk of a
multiple testing procedure under the two-groups model (1) is given by
R=
m
X
{(1 − p)t1i + pt2i }.
(24)
i=1
Bogdan et al. [7] showed that the rule which minimizes the Bayes risk in
(24) is the test which, for each i = 1, ..., n, rejects H0i if
f (xi |νi = 1)
1−p
>
, i.e. Xi2 > c2 ,
f (xi |νi = 0)
p
18
(25)
where f (xi |νi = 1) denotes the marginal density of Xi under H1i , while
2
f (xi |νi = 0) denotes that under H0i and c2 ≡ c2ψ,f = 1+ψ
(log(1 + ψ 2 ) +
ψ2
2 log(f )), with f = 1−p
p . The above rule is known as the Bayes Oracle,
because it makes use of unknown parameters ψ and p, and hence, it is not
attainable in finite samples. By reparametrizing as u = ψ 2 and v = uf 2 ,
the above threshold becomes
c2 ≡ c2u,v = 1 +
1
u
log v + log 1 +
1
u
.
Bogdan et al. [7] considered the following asymptotic scheme.
Assumption 1
The sequences of vectors (ψn , pn ) satisfies the following conditions:
1. pn → 0 as n → ∞.
2. un = ψn2 → ∞ as n → ∞.
3. vn = un f 2 = ψn2
4.
log vn
un
1−pn 2
pn
→ ∞ as n → ∞.
→ C ∈ (0, ∞) as n → ∞.
Bogdan et al. [7] provided detailed insight on the threshold C. Summarizing
briefly, if C = 0, then both the Type I and Type II errors are zero, and for
C = ∞, the inference is essentially no better than tossing a coin. Under
Assumption 1, Bogdan et al. [7] showed that the corresponding asymptotic
optimal Bayes risk has a particularly simple form, which is given by
√
BO
ROpt
= n((1 − p)tBO
+ ptBO
(26)
1
2 ) = np(2Φ( C) − 1)(1 + o(1)),
where the o(1) terms tend to zero as n → ∞. A testing procedure with risk
R is said to be asymptotically Bayes optimal under sparsity (ABOS) if
R
→ 1 as n → ∞.
BO
ROpt
4.2
(27)
An Optimal Testing Rule Based on the IGG Estimator
As noted earlier, the posterior mean depends heavily on the shrinkage factor,
κi = λi ξ1i +1 . Because of the concentration properties of the IGG prior proven
in Sections 2.1 and 3, a sensible thresholding rule classifies observations as
19
signals or as noise based on the posterior distribution of this shrinkage factor.
Consider the following testing rule for the ith observation Xi :
1
Reject H0i if E(1 − κi |Xi ) > ,
2
(28)
where κi is the shrinkage factor based on the IGGn prior (9). Within the
context of multiple testing, a good benchmark for our test procedure (28)
should be whether it is ABOS, i.e. whether its optimal risk is asymptotically
equal to that of the Bayes Oracle risk. Adopting the framework of Bogdan
et al. [7], we let RIGG denote the asymptotic Bayes risk of testing rule (28),
and we compare it to the ABOS risk defined in (26).
The next theorem illustrates that in the presence of sparsity, rule (28) is
in fact ABOS.
Theorem 8. Suppose that X1 , ..., Xn are i.i.d. observations having distribution (22) where the sequence of vectors (ψ 2 , p) satisfies Assumption 1.
Suppose we wish to test (23) using the classification rule (28). Suppose further that a ∈ ( 21 , ∞) and bn ∈ (0, 1), with bn → 0 as n → ∞ in such a way
1/4
that limn→∞
bn
pn
∈ (0, ∞). Then
lim
n→∞
RIGG
= 1,
BO
ROpt
(29)
i.e. rule (28) based on the IGGn prior (9) is ABOS.
Proof. See Appendix D.
We have shown that our thresholding rule based on the IGGn prior asymptotically attains the ABOS risk exactly, provided that bn decays to zero at a
certain rate relative to the sparsity level p. For example, if the prior mixing
proportion pn is known, we can set the hyperparameter bn = p4n . Then the
conditions for classification rule (28) to be ABOS are satisfied.
Our work ultimately moves the testing problem beyond the global-local
framework. Previously, Datta and Ghosh [12], Ghosh et al. [17], Bhadra
et al. [5], and Ghosh and Chakrabarti [16]) have shown that horseshoe or
horseshoe-like priors asymptotically attain the Bayes Oracle risk (possibly
up to a multiplicative constant) either by specifying a rate for the global
parameter τ in (3) or by estimating it with an empirical Bayes plug-in estimator. In the case with the IGG prior, we prove that our thresholding
rule based on the posterior mean is ABOS without utilizing a shared global
tuning parameter.
20
5
5.1
Simulation Studies
Computation and Selection of Hyperparameters
Letting κi =
1
1+λi ξi ,
the full conditional distributions for (8) are
κi , i = 1, ..., n,
θi rest ∼ N (1
− κi )Xi , 1 −
2
1 θi
λi rest ∼ IG a + 2 , 2ξi + 1 , i = 1, ..., n,
ξi rest ∼ giG
θi2
λi , 2, b
−
1
2
(30)
, i = 1, ..., n,
where giG(a, b, p) denotes a generalized inverse Gaussian (giG) density with
f (x; a, b, p) ∝ x(p−1) e−(a/x+bx)/2 . Therefore, the IGG model (8) can be implemented straightforwardly with Gibbs sampling, utilizing the full conditionals in (30).
For all our simulations, we set a = 21 + n1 and b = n1 , in light of Theorems
6 and 7. These choices of a and b ensure that the IGG posterior will contract
around the true θ0 at least at near-minimax rate, while keeping a ∈ ( 21 , ∞)
small. We denote our IGG prior with hyperparameters (a, b) = 21 + n1 , n1
as IGG1/n . For both of the simulation studies described below, we run
10,000 iterations of a Gibbs sampler, discarding the first 5000 as burn-in.
5.2
Simulation Study for Sparse Estimation
To illustrate finite-sample performance of the IGG1/n prior, we use the set-up
in Bhadra et al. [5] where we specify sparsity levels of q/n = 0.05, 0.10, 0.20,
and 0.30, and set the signals all equal to values of either A = 7 or 8, for
a total of eight simulation settings. With n = 200, we randomly generate
n-dimensional vectors under these settings and compute the average squared
error loss corresponding to the posterior median across 100 replicates.
We compare our results for IGG1/n to the average squared error loss of
the posterior median under the Dirichlet-Laplace (DL), the horseshoe (HS),
and the horseshoe+ (HS+) estimators, since these are global-local shrinkage
priors (3) with singularities at zero. For the HS and HS+ priors, we use a
fully Bayesian approach, with τ ∼ C + (0, 1), as in Ghosh et al. [17]. For the
DL prior, we specify a = n1 in the Dir(a, ..., a) prior of the scale component,
along with τ ∼ G(na, 1/2), as in Bhattacharya et al. [6]. Our results are
presented in Table 1.
Table 1 shows that under these various sparsity and signal strength settings, the IGG1/n ’s posterior median has the lowest (estimated) squared error loss in nearly all of the simulation settings. It performs better than the
21
q/n
0.05
0.10
0.20
0.30
A
7
8
7
8
7
8
7
8
IGG
13.88
13.34
27.21
25.95
49.78
47.24
74.42
70.83
DL
14.30
13.27
29.91
27.67
56.40
52.22
85.72
79.03
HS
18.11
17.71
35.91
34.77
71.18
69.81
104.67
104.02
HS+
14.41
13.96
30.18
29.36
58.25
57.11
86.00
84.70
Table 1: Comparison of average squared error loss for the posterior median
estimate of θ across 100 replications. Results are reported for the IGG1/n ,
DL (Dirichlet-Laplace), HS (horseshoe), and the HS+ (horseshoe-plus).
horseshoe and the horseshoe+ in all settings. Our empirical results confirm
the theoretical properties that were proven in Section 3 and illustrate that
for finite samples, the IGG prior often outperforms other popular shrinkage priors. Our empirical results also lend strong support to the use of the
inverted beta prior β 0 (a, b) as the scale density in scale-mixture shrinkage
priors (2). However, our results suggest that we can obtain better estimation if we allow the a and b to vary with sample size, rather than keeping
them fixed (as the horseshoe priors do, with a = b = 0.5).
5.3
Simulation Study for Multiple Testing
For the multiple testing rule (28), we adopt the simulation framework of
Datta and Ghosh [12] and Ghosh et al. [17] and fix sparsity levels at p ∈
{0.01, 0.05, 0.10, 0.15, 0.2, 0.25, 0.3, 0.35, 0.4, 0.45, 0.5} for a total of 11 simulation settings. For sample size n = 200
√ and each p, we generate data from
the two-groups model (21), with ψ = 2 log n = 3.26. We then apply the
thresholding rule (28) using IGG1/n to classify θi ’s in our model as either
signals (θi 6= 0) or noise (θi = 0). We estimate the average misclassification
probability (MP) for the thresholding rule (28) from 100 replicates.
Taking p = 0.10, we plot in Figure 2 the theoretical posterior inclusion
probabilities ωi (Xi ) = P (νi = 1|Xi ) for the two-groups model (21) given by
(
ωi (Xi ) = π(νi = 1|Xi ) =
)−1
X 2 ψ2
i
1−p q
−
1 + ψ 2 e 2 1+ψ2 + 1
,
p
along with the shrinkage weights 1 − E(κi |Xi ) corresponding to the IGG1/n
22
1.0
●
●
● ●
●
●
●
● ●
0.8
0.6
●
0.4
●
●
●
●
●
0.2
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●●
●
●
●
●●
●
●●
●
●
0.0
Posterior Inclusion Probability
●
−10
−5
0
5
10
X
Figure 2: Comparison between the posterior inclusion probabilities and the
posterior shrinkage weights 1 − E(κi |Xi ) when p = 0.10.
prior. The circles in the figure denote the theoretical posterior inclusion
probabilities, while the triangles correspond to the shrinkage weights 1 −
E(κi |Xi ). The figure clearly shows that for small values of the sparsity level
p, the shrinkage weights are in close proximity to the posterior inclusion
probabilities. This and the theoretical results established in Section 4 justify
the use of using 1 − E(κi |Xi ) as an approximation to the corresponding
posterior inclusion probabilities ωi (Xi ) in sparse situations. Therefore, this
motivates the use of the IGG1/n prior (9) and its corresponding decision rule
(28) for identifying signals in noisy data.
Figure 3 shows the estimated misclassification probabilities (MP) for
decision rule (28) for the IGG1/n prior, along with the estimated MP’s for the
Bayes Oracle (BO), the Benjamini-Hochberg procedure (BH), the DirichletLaplace (DL), the horseshoe (HS), and the horseshoe+ (HS+). The Bayes
Oracle rule, defined in (25), is the decision rule that minimizes the expected
number of misclassified signals (24) when (p, ψ) are known. The Bayes
Oracle therefore serves as the lower bound to the MP, whereas the line
M P = p corresponds to the situation where we reject all null hypotheses
without looking into the data. For the Benjamini-Hochberg rule, we use
αn = 1/ log n = 0.1887. Bogdan et al. [7] theoretically established the
ABOS property of the BH procedure for this choice of αn . For the DL, HS,
23
0.5
0.4
0.3
0.2
0.1
0.0
Misclassification Probability
MP=p
Oracle
BH
IGG
DL
HS
HS+
0.0
0.1
0.2
0.3
0.4
0.5
Sparsity
Figure 3: Estimated misclassification probabilities. Thresholding rule (28)
based on the IGG posterior mean is nearly as good as the Bayes Oracle (25).
and HS+ priors, we use the classification rule
1
Reject H0i if E(1 − κi |X1 ..., Xn ) > ,
2
where κi =
1
1+σi2
(31)
and σi2 is the scale parameter in the scale-mixture shrink-
age model (2). For the horseshoe and horseshoe+ priors, we specify a halfCauchy prior on the global parameter τ ∼ C + (0, 1). Since τ is a shared
global parameter, the posterior for κi depends on all the data. Carvalho
et al. [9] first introduced thresholding rule (31) for the horseshoe. Ghosh
et al. [17] later extended rule (31) for a general class of global-local shrinkage priors (3), which includes the Strawderman-Berger, normal-exponentialgamma, and generalized double Pareto priors. Based on Ghosh et al. [17]’s
simulation results, the horseshoe performs similarly as or better than these
other aforementioned priors, so we do not include these other priors in our
comparison study.
Our results provide strong support to our theoretical findings in Section
4 and strong justification for the use of (28) to classify signals. As Figure 3
illustrates, the misclassification probability for the IGG prior with (a, b) =
( 21 + n1 , n1 ) is practically indistinguishable from the Bayes Oracle, which gives
the lowest possible MP. Thresholding rule (31) based on the horseshoe+
24
p
0.30
0.35
0.40
0.45
0.50
BO
0.08
0.08
0.09
0.10
0.10
BH
0.13
0.12
0.11
0.10
0.09
IGG
0.005
0.004
0.004
0.003
0.003
DL
0.08
0.09
0.10
0.12
0.13
HS
0.14
0.22
0.31
0.39
0.43
HS+
0.09
0.10
0.10
0.11
0.11
Table 2: Comparison of false discovery rate (FDR) for different classification
methods under dense settings. The IGG1/n has the lowest FDR of all the
different methods.
prior and the Dirichlet-Laplace priors also appears to be quite competitive
compared to the Bayes Oracle. Bhadra et al. [5] proved that the horseshoe+
prior asymptotically matches the Bayes Oracle risk up to a multiplicative
constant if τ is treated as a tuning parameter, but did not prove this for the
case where τ is endowed with a prior. There also does not appear to be any
theoretical justification for thresholding rule (31) under the DL prior in the
literature. On the other hand, Theorem 8 provides theoretical support for
the use of (28) under the IGG prior, which is confirmed by our empirical
study.
Figure 3 also shows that the performance for rule (31) under the horseshoe degrades considerably as θ = (θ1 , ..., θn ) becomes more dense. With
sparsity level p = 0.5, the horseshoe’s misclassification rate is close to 0.4,
only marginally better than rejecting all the null hypotheses without looking at the data. This phenomenon was also observed by Datta and Ghosh
[12] and Ghosh et al. [17]. This appears to be because in the dense setting,
there are many noisy entries that are “moderately” far from zero, and the
horseshoe prior does not shrink these aggressively enough towards zero in
order for testing rule (31) to classify these as true noise. The horseshoe+
prior seems to alleviate this by adding an additional half-Cauchy C + (0, 1)
prior to the Bayes hierarchy. In Table 2, we report the false discovery rate
(FDR) under dense settings for the different methods. We see that the FDR
is quite a bit larger for the horseshoe than for the other methods. Table
2 also shows that the IGG1/n prior has very tight control over the FDR in
dense settings. Although the IGG prior is not constructed to specifically
control FDR, we see that in practice, it does provide excellent control of
false positives.
Finally, we demonstrate the shrinkage properties corresponding to the
IGG1/n prior along with the horseshoe, the horseshoe+, and the Dirichlet-
25
10
5
0
−5
−10
Posterior Expectation
Flat
IGG
HS
HS+
DL
−10
−5
0
5
10
X
Figure 4: Posterior Mean E(θ|X) vs. X plot for p = 0.25.
Laplace priors. In Figure 4, we plot the posterior expectations E(θi |Xi )
for the IGG1/n prior and the posterior expectations E(θi |X1 , ..., Xn ) for the
HS, HS+, and DL priors and the posterior expectations. The amount of
posterior shrinkage can be observed in terms of distance between the 45◦
line and the posterior expectation. Figure 4 clearly shows that near zero,
the noisy entries are more aggressively shrunk towards zero for the IGG1/n
prior than for the other priors with poles at zero. This confirms our findings
in Theorem 7 which proved that the shrinkage profile near zero is more
aggressive for the IGG1/n prior in the Kullback-Leibler sense than for the
HS or HS+ priors. Meanwhile, Figure 4 also shows that the signals are left
mostly unshrunk, confirming that the IGG shares the same tail robustness
as the other priors. The more aggressive shrinkage of noise explains why
the IGG performs better estimation, as we demonstrated in Section 5.2.
6
Analysis of a Prostate Cancer Data Set
We demonstrate practical application of the IGG prior using a popular
prostate cancer data set introduced by Singh et al. [23]. In this data set,
there are gene expression values for n = 6033 genes for m = 102 subjects,
with m1 = 50 normal control subjects and m2 = 52 prostate cancer patients.
We aim to identify genes that are significantly different between control
26
and cancer patients. This problem can be reformulated as normal means
problem (1) by first conducting a two-sample t-test for each gene and then
transforming the test statistics (t1 , ..., tn ) to z-scores using the inverse normal cumulative distribution function (CDF) transform Φ−1 (Ft100 (ti )), where
Ft100 denotes the CDF for the Student’s t distribution with 100 degrees of
freedom. With z-scores (z1 , ..., zn ), our model is now
zi = θi + i ,
i = 1, ..., n,
(32)
where i ∼ N (0, 1). This allows us to implement the IGG prior on the
z-scores to conduct simultaneous testing H0i : θi = 0 vs. H1i : θi 6= 0,
i = 1, ..., n, to identify genes that are significantly associated with prostate
cancer. Additionally, we can also estimate θ = (θ1 , ..., θn ). As argued by
Efron [14], |θi | can be interpreted as the effect size of the ith gene for prostate
cancer. Efron [14] first analyzed model (32) for this particular data set by
obtaining empirical Bayes estimates θbiEf ron , i = 1, ..., n, based on the twogroups model (21). In our analysis, we use the posterior means θbi , i = 1, ..., n,
to estimate the strength of association.
With our z-scores, we implement the IGG1/n model with (a, b) = ( 21 +
1 1
n , n ) on model (32) and use classification rule (28) to identify significant
genes. For comparison, we also fit this model for the DL, HS, and HS+
priors, and benchmark it to the Benjamini-Hochberg (BH) procedure with
FDR α set to 0.10. The IGG1/n selects 85 genes as significant, in comparison to 60 genes under the BH procedure. The HS prior selects 62 genes
as significant. The HS+ and DL priors select 41 and 42 genes respectively,
indicating more conservative estimates. All 60 of the genes flagged as significant by the BH procedure are included in the 85 genes that the IGG
prior classifies as significant. On the other hand, the HS prior’s conclusions
diverge from the BH procedure. Seven genes (genes 11, 377, 637, 805, 1588,
3269, and 4040) are deemed significant by the HS, but not by BH.
Table 3 shows the top 10 genes selected by Efron [14] and their estimated
effect size on prostate cancer. We compare Efron [14]’s empirical Bayes
posterior mean estimates with the posterior mean estimates under the IGG,
DL, HS, and HS+ priors. Our results confirm the tail robustness of the IGG
prior. All of the scale-mixture shrinkage priors shrink the estimated effect
size for significant genes less aggressively than Efron’s procedure. Table 3
also shows that for large signals, the IGG posterior has slightly less shrinkage
for large signals than the DL posterior and roughly the same amount as the
HS posterior. The HS+ posterior shrinks the test statistics the least for
large signals, but the IGG’s estimates are still quite similar to those of the
HS+.
27
Gene
610
1720
332
364
914
3940
4546
1068
579
4331
z-score
5.29
4.83
4.47
-4.42
4.40
-4.33
-4.29
4.25
4.19
-4.14
θbiIGG
4.85
4.33
3.78
-3.78
3.71
-3.70
-3.59
3.49
3.31
-3.41
θbiDL
4.52
3.94
3.40
-3.10
3.11
-3.06
-3.09
3.09
2.98
-2.87
θbiHS
4.85
4.33
3.78
-3.78
3.71
-3.70
-3.59
3.49
3.31
-3.41
θbiHS+
4.91
4.35
3.99
-3.85
3.86
-3.80
-3.62
3.46
3.01
-3.43
θbiEf ron
4.11
3.65
3.24
-3.57
3.16
-3.52
-3.47
2.99
2.92
-3.30
Table 3: The z-scores and the effect size estimates for the top 10 genes
selected by Efron [14] by the IGG, DL, HS, and HS+ models and the twogroups empirical Bayes model by Efron [14].
7
Concluding Remarks
In this paper, we have introduced a new scale-mixture shrinkage prior called
the Inverse Gamma-Gamma prior for estimating sparse normal mean vectors. This prior has been shown to have a number of good theoretical properties, including heavy probability mass around zero and heavy tails. This
enables the IGG prior to perform selective shrinkage and to attain (near)
minimax contraction around the true θ in (1). The IGG posterior also converges to the true model at a faster rate than the horseshoe and horseshoe+
posterior densities in the Kullback-Leibler sense. The IGG, HS, and HS+
all fall under the class of priors which utilize a beta prime density (4) as a
prior on the scale component for model (2). However, our results suggest
that there is added flexibility in allowing the parameters (a, b) in the density
(4) to vary with sample size rather than keeping them fixed. This added
flexibility leads to excellent empirical performance and obviates the need to
estimate a global tuning parameter τ .
Moreover, by thresholding the posterior mean, the IGG can be used to
identify signals in θ. We have investigated the asymptotic risk properties
of this classification rule within the decision theoretic framework of Bogdan
et al. [7] and established asymptotically optimal theoretical properties for
multiple testing. Since we do not specify or estimate a global parameter τ ,
our paper appears to be the first article to establish the ABOS property for
a scale-mixture shrinkage prior which does not fall under the global-local
28
(3) framework.
Our simulation studies demonstrate the IGG’s strong finite sample performance for obtaining sparse estimates of θ and for correctly classifying
entries in θ as either signals or noise. By setting the hyperparameters
(a, b) = ( 21 + n1 , n1 ), the IGG prior outperforms other popular shrinkage
estimators. Finally, we demonstrated practical application of the IGG prior
with a prostate cancer data set.
In recent years, Bayesian scale-mixture shrinkage priors have gained a
great amount of attention because of their computational efficiency and
their ability to mimic point-mass mixtures in obtaining sparse estimates.
Our paper contributes to this large body of methodological and theoretical
work. There are a few possible future directions for research. For example,
the IGG prior can be adapted to other statistical problems such as sparse
covariance estimation, variable selection with covariates, and many others.
We conjecture that the IGG would satisfy many optimality properties (e.g.
model selection consistency, optimal posterior contraction, etc.) if it were
utilized in these other contexts.
Despite the absence of a data-dependent global parameter τ , the IGG
model adapts well to sparsity, performing well under both sparse and dense
settings. This seems to be in stark contrast to remarks made by authors
like Carvalho et al. [8] who have argued that scale-mixture shrinkage priors
which do not contain shared global parameters do not enjoy the benefits of
adaptivity. Nevertheless, we could investigate if theoretical and empirical
performance can be improved even further by incorporating a global parameter into the IGG framework. We leave these as interesting problems for
future research.
8
Acknowledgments
The authors would like to thank Dr. Anirban Bhattacharya and Dr. Xueying Tang for sharing their codes, which were modified to generate Figures
1-4.
A
Proofs for Section 2
Proof of Proposition 1. The joint distribution of the prior is proportional to
−1/2
π(θ, ξ, λ) ∝ (λξ)
θ2
exp −
2λξ
!
29
λ−a−1 exp −
1 b−1
ξ
exp (−ξ)
λ
!
∝ξ
b−3/2
−a−3/2
exp(−ξ)λ
!
θ2
1
exp −
+1
.
2ξ
λ
Thus,
π(θ, ξ) ∝ ξ
b−3/2
!
Z ∞
λ
exp(−ξ)
−a−3/2
λ=0
θ2
+1
2ξ
∝
!
θ2
1
exp −
+1
dλ
2ξ
λ
!−(a+1/2)
ξ b−3/2 e−ξ ,
and thus, the marginal density of θ is proportional to
π(θ) ∝
θ2
+1
2ξ
Z ∞
0
!−(a+1/2)
ξ b−3/2 e−ξ dξ.
(33)
As |θ| → 0, the expression in (33) is bounded below by
Z ∞
C
ξ b−3/2 e−ξ dξ,
(34)
0
where C is a constant that depends on a and b. The integral expression in
(34) clearly diverges to ∞ for any 0 < b ≤ 1/2. Therefore, (33) diverges to
infinity as |θ| → 0, by the monotone convergence theorem.
Proof of Theorem 1. From (7), the posterior distribution of κi under IGGn
is proportional to
κi Xi2
π(κi |Xi ) exp −
2
Since exp
κ X2
− i2 i
!
a−1/2
κi
(1 − κi )bn −1 , κi ∈ (0, 1).
is strictly decreasing in κi on (0, 1), we have
Z 1
a−1/2
κi
0
E(1 − κi |Xi ) = Z
1
0
(1 − κi )
a−1/2
κi
(1
2
eXi /2
≤
bn
κi
Z 1
a−1/2
0
κi
!
κi Xi2
− κi )bn −1 exp −
2
Z 1
a−1/2
0
κi Xi2
exp −
2
(1 − κi )bn dκi
(1 − κi )bn −1 dκi
30
dκi
!
dκi
(35)
Γ(a + 1/2)Γ(bn + 1)
Γ(a + bn + 1/2)
×
Γ(a + bn + 3/2)
Γ(a + 1/2)Γ(bn )
b
2
n
= eXi /2
.
a + bn + 1/2
2
= eXi /2
a−1/2
Proof of Theorem 2. Note that since a ∈ ( 12 , ∞), κi
is increasing in κi
on (0, 1). Additionally, since bn ∈ (0, 1), (1 − κi )bn −1 is increasing in κi on
(0, 1). Using these facts, we have
Z
P (κi < |Xi ) ≤ Z
0
κi Xi2
exp −
2
!
κi Xi2
exp −
2
!
1
Z
a−1/2
2
eXi /2
0
≤
κi
Z 1
a−1/2
κi
a−1/2
(1 − κi )bn −1 dκi
a−1/2
(1 − κi )bn −1 dκi
κi
κi
(1 − κi )bn −1 dκi
(1 − κi )bn −1 dκi
2
eXi /2 (1 − )bn −1
Z
a−1/2
κi
0
≤
a−1/2
Z 1
dκi
(1 − κi )bn −1 dκi
2
eXi /2 (1 − )bn −1 a +
=
1
2
−1
a+1/2
a−1/2 (1 − )b
b−1
n
bn
2
= eXi /2
.
(a + 1/2) (1 − )
Proof of Theorem 3. First, note that since bn ∈ (0, 1), (1−κi )bn −1 is increasing in κi on (0, 1). Therefore, letting C denote the normalizing constant that
depends on Xi , we have
Z η
π(κi |Xi )dκi = C
0
Z η
0
≥C
κi Xi2
exp −
2
Z ηδ
0
!
κi Xi2
exp −
2
31
a−1/2
κi
(1 − κi )bn −1 dκi
!
a−1/2
κi
(1 − κi )bn −1 dκi
ηδ
ηδ
a−1/2
≥ C exp − Xi2
κi
dκi
2
0
1
ηδ
1 −1
(ηδ)a+ 2 .
= C exp − Xi2
a+
2
2
Z
a−1/2
Also, since a ∈ ( 12 , ∞), κi
Z 1
π(κi |Xi )dκi = C
Z 1
η
η
(36)
is increasing in κi on (0, 1).
κi Xi2
exp −
2
ηX 2
≤ C exp − i
2
!Z
ηX 2
≤ C exp − i
2
!Z
ηX 2
= C exp − i
2
!
!
a−1/2
κi
1
a−1/2
κi
η
1
(1 − κi )bn −1 dκi
(1 − κi )bn −1 dκi
(1 − κi )bn −1 dκi
η
bn
b−1
n (1 − η) .
(37)
Combining (36) and (37), we have
Z 1
P (κi > η|Xi ) ≤ Z
π(κi |Xi )dκi
η
η
π(κi |Xi )dκi
0
a+
≤
B
1
2
(1 − η)bn
1
bn (ηδ)a+ 2
η(1 − δ) 2
exp −
Xi .
2
Proofs for Section 3.2
Proof of Lemma 1. It is enough to show that the second term on the lefthand side in (14) satisfies
dn
Z d2
n π(u)
1
√ du % sn .
u
(38)
We utilize the prior formulation in (5), so that the prior on the scale term
is
π(u) ∝ ua−1 (1 + u)−(a+b) .
32
Then for any a ∈ ( 12 , ∞), we have
dn
Z d2
n π(u)
√ du = dn
u
1
Z d2
n
ua−3/2 (1 + u)−(a+b) du
1
% (1 + d2n )−(a+b) d2a
n
= (1 +
Since d2n = log
d2n
n
qn
d2n )−(1+b)
d2n
1 + d2n
!a−1
d2n
(39)
→ ∞ as n → ∞ and b = o(1) by assumption, we have
a−1
∼ 1 and (1+d2n )−(1+b) ∼ (1+d2n )−1 for large n. Additionally, from
√
√
the inequality, log(1 + x) ≤ x for x ≥ 0, we have (1 + x)−1 ≥ exp (− x)
for x ≥ 0. Combining these with (39), we have
1+d2n
dn
Z d2
n π(u)
1
√ du % d2n (1 + d2n )−1
u
≥ d2n exp (−dn )
≥ d2n exp(−d2n )
n qn
= log
qn n
= sn ,
(for large n)
and thus (38) holds for any a ∈ ( 21 , ∞) and b = o(1).
Before proving Theorems 4 and 5, we first state two lemmas. For both
Lemmas 2 and 3, we denote T (x) = {E(1 − κ)|x}x as the posterior mean
1
under (9) for a single observation x, where κ = 1+λξ
. Our arguments follow
closely those of van der Pas et al. [27], Datta and Ghosh [12], and Ghosh and
Chakrabarti [16], except that their arguments rely on controlling the rate
of decay of tuning parameter τ or an empirical Bayes estimator τb. In our
case, since we are dealing with a fully Bayesian model, the degree of posterior
contraction is instead controlled by the positive sequence of hyperparameters
bn in (9).
Lemma 2. Let T (x) be the posterior mean under (9) for a single observation
x drawn from N (θ, 1). Suppose we have constants η ∈ (0, 12 ), δ ∈ (0, 1),
a ∈ ( 12 , ∞), and bn ∈ (0, 1), where bn → 0 as n → ∞. Then for any d > 2
and fixed n, |T (x) − x| can be bounded above by a real-valued function hn (x),
depending on d and satisfying the following:
33
For any ρ > d, hn (·) satisfies
lim
n→∞
|x|>
hn (x) = 0.
qsup
ρ log
1
bn
(40)
Proof of Lemma 2. Fix η ∈ (0, 1), δ ∈ (0, 1). First observe that
|T (x) − x| = |xE(κ|x)|
≤ |xE(κ1{κ < η}| + |xE(κ1{κ > η}|.
(41)
We consider the two terms in (41) separately. From (7) and the fact that
(1 − κ)bn −1 is increasing in κ ∈ (0, 1) when bn ∈ (0, 1), we have
2
Rη
κ · κa−1/2 (1 − κ)bn −1 e−κx /2 dκ
|xE(κ1{κ < η}| = x R 1
a−1/2 (1 − κ)bn −1 e−κx2 /2 dκ
0 κ
0
≤ x
= (1
R η a+1/2 −κx2 /2
e
dκ
bn −1 0 κ
(1 − η)
R1
2
a−1/2 e−κx /2 dκ
0 κ
R ηx2 t a+1/2 −t/2
e
dt
0
x2
− η)bn −1 R a−1/2
x2
t
e−t/2 dt
0
x2
= (1 − η)
bn −1
x
2
1 0ηx ta+1/2 e−t/2 dt
x
R
x2 x2 ta−1/2 e−t/2 dt
R
0
R ∞ a+1/2 −t/2
e
dt
−1
bn −1 0 t
x
≤ (1 − η)
R x2
0
ta−1/2 e−t/2 dt
#−1
" Z 2
x
a−1/2 −t/2
t
= C(n)
e
x
dt
−1
0
= h1 (x) (say),
(42)
where we use a change of variables t = κx2 in the second equality, and
C(n) = (1 − η)bn −1 Γ(1)Γ(a+3/2)
= (1 − η)bn −1 a +
Γ(a+5/2)
Next, we observe that since κ ∈ (0, 1),
3
2
−1
.
|xE(κ1{κ > η}|x| ≤ |xP (κ > η|x)|
≤
a+
1
2
(1 − η)bn
bn (ηδ)a+1/2
= h2 (x) (say),
34
η(1 − δ) 2
|x| exp −
x
2
(43)
where we use Theorem 3 for the second inequality.
Let hn (x) = h1 (x) + h2 (x). Combining (41)-(43), we have that for every
x ∈ R and fixed n,
|T (x) − x)| ≤ hn (x),
(44)
Observe from (42) that for fixed n, h1 (x) is strictly decreasing in |x|. Therefore, we have that for any fixed n and ρ > 0,
"s
|x|>
qsup
h1 (x) ≤ C(n)
ρ log
1
bn
1
ρ log
bn
Z ρ log
1
bn
#−1
t
a−1/2 −t/2
e
,
dt
0
and since bn → 0 as n → ∞, this implies that
lim
n→∞
|x|>
h1 (x) = 0.
qsup
1
bn
ρ log
(45)
Next, observe that from (43) that for fixed n, h2 (x) is eventually decreasing
in |x| with a maximum when |x| = √ 1
. Therefore, for sufficiently large
η(1−δ)
n, we have
s
h2 (x) ≤ h2
qsup
|x|>
1
bn
ρ log
Letting K ≡ K(a, η, δ) =
0 < bn < 1 for all n that
s
lim h2
n→∞
1
ρ log
bn
!
(a+ 12 )
,
(ηδ)a+1/2
1
ρ log
bn
1
≤ K lim
n→∞ bn
s
s
ρ log
√
= K ρ lim (bn )
1 − η(1−δ)
ρ log
2
e
ρ log
bn
1
bn
η(1−δ)
ρ
1
e 2 log(bn )
bn
η(1−δ)
2
n→∞
=
.
we have from (43) and the fact that
(1 − η)bn
= K lim
n→∞
bn
(
!
2
ρ− η(1−δ)
s
1
log
bn
2
0 if ρ > η(1−δ)
,
∞ otherwise,
from which it follows that
(
lim
n→∞
|x|>
qsup
ρ log
h2 (x) =
1
bn
35
2
0 if ρ > η(1−δ)
,
∞ otherwise.
(46)
Combining (45) and (46), we have for hn (x) = h1 (x) + h2 (x) that
(
lim
n→∞
|x|>
qsup
hn (x) =
ρ log
1
bn
2
0 if ρ > η(1−δ)
,
∞ otherwise.
(47)
Since η ∈ (0, 1), δ ∈ (0, 1), it is clear that any real number lager than 2 can
2
be expressed in the form η(1−δ)
. For example, taking η = 56 and δ = 15 , we
2
= 3. Hence, given any d > 2, choose 0 < η, δ < 1 such that
obtain η(1−δ)
2
c = η(1−δ) . Clearly, hn (·) depends on d. Following (44) and (47), we see
that |T (x) − x| is uniformly bounded above by hn (x) for all n and d > 2
and that condition (40) is also satisfied when d > 2. This completes the
proof.
Remark: Under the conditions of Lemma 2, we see that for any fixed n,
lim |T (x) − x| = 0.
(48)
|x|→∞
Equation (48) shows that for the IGG prior, large observations almost remain unshrunk no matter what the sample size n is. This is critical to its
ability to properly identify signals in our data. We now present our second
lemma which bounds the posterior variance.
Lemma 3. Let T (xi ) be the posterior mean under (9). Then for a single
observation x ∼ N (θ, 1), the posterior variance V ar(θ|x) can be bounded
above by
V ar(θ|x) ≤ 1 − (T (x) − x)2 + x2 ,
(49)
and
V ar(θ|x) ≤ 1 − T (x)2 + x2 .
(50)
Proof of Lemma 3. We first prove (49). By the law of the iterated variance
and the fact that θ|κ, x ∼ N ((1 − κ)x, 1 − κ), we have
V ar(θ|x) = E[V ar(θ|κ, x)] + V ar[E(θ|κ, x)]
= E(1 − κ|x) + V ar[(1 − κ)x|x]
= E(1 − κ|x) + x2 V ar(κ|x)
= E[(1 − κ|x) + x2 E(κ2 |x) − x2 [E(κ|x)]2 .
Since x − T (x) = xE(κ|x), we rewrite the above as
2
1 a+3/2
κ
(1 − κ)bn −1 e−κx /2 dx
T (x)
V ar(θ|x) =
− (T (x) − x)2 + x2 R01
a+1/2 (1 − κ)bn −1 e−κx2 /2 dx
x
0 κ
R
36
≤ 1 − (T (x) − x)2 + x2 ,
3
1
where the inequality follows from the fact that κ ∈ (0, 1), so κa+ 2 ≤ κa+ 2
for all a ∈ R.
Next, we show that (50) holds. We may alternatively represent V ar(θ|x)
as
V ar(θ|x) = E(1 − κ|x) + x2 E[(1 − κ)2 |x] − x2 E2 [(1 − κ)|x]
2
1 a+1/2
κ
(1 − κ)bn +1 e−κx /2 dx
T (x)
=
− T (x)2 + x2 R01
a+1/2 (1 − κ)bn −1 e−κx2 /2 dx
x
0 κ
R
≤ 1 − T (x)2 + x2 ,
where the final inequality holds because (1 − κ)bn +1 ≤ (1 − κ)bn −1 for all
bn ∈ R when κ ∈ (0, 1).
Lemmas 2 and 3 are crucial in proving Theorems 4 and 5, which provide
asymptotic upper bounds on the mean squared error (MSE) for the posterior
mean under the IGGn prior (9) and the posterior variance under (9). These
theorems will ultimately allow us to provide sufficient conditions under which
the posterior mean and posterior distribution under the IGGn prior contract
at minimax rates.
Proof of Theorem 4. Define qen = #{i : θ0i 6= 0}. We split the MSE,
Eθ0 ||T (X) − θ0 ||2 =
n
X
Eθ0i (T (Xi ) − θ0i )2
i=1
as
n
X
i=1
Eθ0i (T (Xi ) − θ0i )2 =
X
Eθ0i (T (Xi ) − θ0i )2 +
i:θ0i 6=0
X
Eθ0i (T (Xi ) − θ0i )2 .
i:θ0i =0
(51)
We consider the nonzero means and the zero means separately.
Nonzero means: For θ0i 6= 0, using the Cauchy-Schwartz inequality and the
fact that E0i (Xi − θ0i )2 = 1, we get
Eθ0i (T (Xi ) − θi )2 = Eθ0i (T (Xi ) − Xi + Xi − θi )2
= Eθ0i (T (Xi ) − Xi )2 + Eθ0i (Xi − θ0i )2 + 2Eθ0i (T (Xi ) − Xi )(Xi − θ0i )
q
q
≤ Eθ0i (T (Xi ) − Xi )2 + 1 + 2 Eθ0i (T (Xi ) − Xi )2 Eθ0i (Xi − θ0i )2
37
=
q
Eθ0i (T (Xi ) − Xi )2 + 1
2
.
(52)
We now define
s
1
2 log
.
bn
ζn =
(53)
Let us fix any d > 2 and choose any ρ > 2. Then, using Lemma 2, there
exists a non-negative real-valued function hn (·), depending on d such that
|Tn (x) − x| ≤ hn (x) for all x ∈ R,
(54)
and
lim
sup hn (x) = 0.
(55)
n→∞ |x|>ρζ
n
Using the fact that (T (Xi ) − Xi )2 ≤ Xi2 , together with (55), we obtain
Eθ0i (T (Xi ) − Xi )2 = Eθ0i [(T (Xi ) − Xi )2 1{|Xi | ≤ ρζn }]
+ Eθ0i [T (Xi − Xi )2 1{|Xi | > ρζn }]
!2
≤
ρ2 ζn2
+
sup hn (x)
.
(56)
|x|>ρζn
Using (55) and the fact that ζn → ∞ as n → ∞ by (53), it follows that
!2
= o(ζn2 ) as n → ∞.
sup hn (x)
|x|>ρζn
(57)
By combining (56) and (57), we get
Eθ0i (T (Xi ) − Xi )2 ≤ ρ2 ζn2 (1 + o(1)) as n → ∞.
(58)
Noting that (58) holds uniformly for any i such that θ0i 6= 0, we combine
(52), (53), and (58) to conclude that
X
2
Eθ0i (T (Xi ) − θ0i ) - qen log
i:θ0i 6=0
1
, as n → ∞,
bn
(59)
Zero means: For θ0i = 0, the corresponding MSE can be split as follows:
E0 T (Xi )2 = E0 [T (Xi )2 1{|Xi | ≤ ζn }] + E0 [T (Xi )2 1{|Xi | > ζn }],
38
(60)
where ζn is as in (53). Using Theorem 1, we have
2
E0 [T (Xi ) 1{|Xi | ≤ ζn }] ≤
bn
a + bn + 1/2
2 Z ζn
x2 e x
2 /2
dx
−ζn
b2n ζn 2 x2 /2
x e
dx
a2 −ζn
Z
2b2n ζn 2 x2 /2
x e
dx
= 2
a 0
2b2
2
≤ n (ζn eζn /2 )
as
1
,
- bn log
bn
Z
≤
(61)
where we use the integration by parts for the third inequality.
Now, using the fact that |T (x)| ≤ |x| for all x ∈ R,
2
E0 [T (Xi ) 1{|Xi | > ζn }] ≤ 2
Z ∞
x2 φ(x)dx
ζn
= 2[ζn φ(ζn ) + 1 − Φ(ζn )]
2φ(ζn )
≤ 2ζn φ(ζn ) +
ζn
r
2
2
=
ζn (e−ζn /2 + o(1))
π
s
1
- bn log
,
bn
(62)
d
where we used the identity x2 φ(x) = φ(x) − dx
[xφ(x)] for the first equality
φ(x)
and Mill’s ratio, 1 − Φ(x) ≤ x for all x > 0, in the second inequality.
Combining (61)-(62), we have that
s
X
2
Eθ0i T (Xi ) - (n − qen )bn log
i:θ0i =0
1
.
bn
(63)
From (51), (59) and (63), it immediately follows that
E||T (X) − θ0 ||2 =
n
X
Eθ0i (T (Xi ) − θ0i )2
i=1
1
- qen log
bn
39
s
+ (n − qen )bn log
1
.
bn
The required result now follows by observing that qen ≤ qn and qn = o(n)
and then taking the supremum over all θ0 ∈ `0 [qn ]. This completes the proof
of Theorem 4.
Proof of Theorem 5. Define qen = #{i : θ0i 6= 0}. We decompose the total
variance as
Eθ0
n
X
i=1
V ar(θ0i |Xi ) =
X
Eθ0i V ar(θ0i |Xi ) +
i:θ0i 6=0
X
Eθ0i V ar(θ0i |Xi ), (64)
i:θ0i =0
and consider the nonzero means and zero means separately.
Nonzero means: For θ0i 6= 0, we have
Eθ0i V ar(θ0i |Xi ) ≤ Eθ0i [1 − (T (Xi ) − Xi )2 + Xi2 ]
≤ 2 + Eθ0i (T (Xi ) − Xi )2
1
- log
,
bn
(65)
where the first inequality follows from (49) in Lemma 3 and the last one
follows from (58).
Zero means: For θ0i = 0, we have
E0 V ar(θ0i |Xi ) ≤ E0 [1 − T (Xi )2 + Xi2 ]
≤ 2 + E0 T (Xi )2
s
- bn log
1
,
bn
(66)
where the first inequality follows from (50) in Lemma 3 and the last one
follows from (60)-(62). Combining (64)-(66), we get
1
Eθ0i V ar(θ0i |Xi ) - qen log
bn
s
+ (n − qen )bn
1
log
.
bn
The required result now follows by observing that qen ≤ qn and qn = o(n)
and then taking the supremum over all θ0 ∈ `0 [qn ]. This completes the proof
of Theorem 5.
40
C
Proofs for Section 3.3
Proof of Theorem 7. Using the beta prime representation of the IGG prior,
we have
1
Z ∞
(2π) 2 B(a, b)
0
π(θ) =
1
!
3
θ2
exp −
ub− 2 (1 + u)−a−b du,
2u
where B(a, b) denotes the beta function. Under the transformation of variθ2
ables, z = 2u
, we have
1
2a+ 2
π(θ) =
1
(θ2 )b− 2
1
2
(2π) B(a, b)
Z ∞
1
exp(−z)z a− 2 (θ2 + 2z)−a−b dz.
(67)
0
Now define the set A = {θ : |θ| ≤ }. Then from (67), and for 0 < < 1,
we have
ν(A ) = P (|θ| ≤ )
1
2a+ 2
=
1
R∞
exp(−z)z a− 2
0
R
1
2 2b− 2 (θ 2 + 2z)−b dθ dz
|θ|≤ (θ )
1
(2π) 2 B(a, b)
1
2a+ 2
≥
1
R∞
exp(−z)z a− 2 (2z + 1)−a−b
0
R
|θ|≤ (θ
2 )b− 12 dθ
dz
1
(2π) 2 B(a, b)
1
2a+ 2 2−a−b
≥
R∞
0
1
exp(−z)z a− 2 (1 + z)−a−b
R
2 b− 12
dθ
0 (θ )
dz
1
2
(2π) B(a, b)
=
2b
Z ∞
2b bB(a, b)π 1/2
0
1
exp(−z)z a− 2 (1 + z)−a−b dz.
(68)
To bound the integral term in (68), note that
Z ∞
1
exp(−z)z a− 2 (1 + z)−a−b dz ≥
Z 1
0
1
exp(−z)z a− 2 (1 + z)−a−b dz
0
−1 −a−b
≥e
2
1
a+
2
−1
Therefore, combining (68) and (69), we have
2b
1
e−1 2−a−b a +
1/2
b
2
2 bB(a, b)π
ν(A ) ≥
41
−1
.
(69)
2b Γ(a + b)
e−1 2−a−b
2b Γ(a)Γ(b + 1)π 1/2
2b Γ(a)
−1 −a−2b
e 2
a+
≥
Γ(a)Γ(2)Γ( 12 )
=
b
≥ 2
(π)−1/2 e−1 2−a−2 a +
1
2
a+
1
2
1
2
−1
−1
−1
,
(70)
where we use the fact that 0 < b < 1 for the last two inequalities.
Following Clarke and Barron [11], the optimal rate of convergence comes
from setting n = 1/n, which reflects the ideal case of independent samples
y1 , ..., yn . We therefore apply Proposition 3, substituting in = 1/n and b =
1/n and invoking the lower bound for ν(A ) found in (70). This ultimately
gives us an upper bound on the Cesàro-average risk as
Rn ≤
1
n
−
=
1
n
h
1
n
log
2
1
n
n
π −1/2 e−1 2−a−2
a+
1
2
−1
i
√
2 + log( π) + (a + 2) log(2) + log a + 12 +
2 log n
,
n2
when θ0 = 0.
D
Proofs for Section 4
To establish conditions for (29) to hold, we must first find lower and upper
bounds on the Type I and Type II error probabilities, t1i and t2i respectively,
for rule (28). These error probabilities are given respectively by
t1i = P E(1 − κi |Xi ) >
t2i = P E(1 − κi |Xi ) ≤
1
2
H0i is true ,
1
2
H1i is true .
(71)
To this end, we first prove the following lemmas, Lemma 4-7 which give
upper and lower bounds for t1i and t2i in (71). Our proof methods follow
those of Datta and Ghosh [12], [17], and Ghosh and Chakrabarti [16], except
our arguments rely on control of the sequence of hyperparameters bn , rather
than on specifying a rate or an estimate for a global parameter τ , as in the
global-local (3) framework.
42
Lemma 4. Suppose that X1 , ..., Xn are i.i.d. observations having distribution (22) where the sequence of vectors (ψ 2 , p) satisfies Assumption 1.
Suppose we wish to test (23) using the classification rule (28). Then for all
n, an upper bound for the probability of a Type I error for the ith test is
given by
t1i ≤ √
2bn
a + bn + 1/2
log
π(a + bn + 1/2)
2bn
Proof of Lemma 4. By Theorem 1, the event
the event
−1/2
.
n
E(1 − κi |Xi ) >
1
2
o
implies
bn
1
>
a + bn + 1/2
2
a + bn + 1/2
2
.
⇔ Xi > 2 log
2bn
2
eXi /2
Therefore, noting that under H0i , Xi ∼ N (0, 1) and using Mill’s ratio, i.e.
P (|Z| > x) ≤ 2φ(x)
x , we have
t1i ≤ P
Xi2
a + bn + 1/2
> 2 log
2bn
s
= P |Z| >
r
2φ
≤
2 log
r
2 log
=√
2 log
H0i is true
a + bn + 1/2
2bn
a+bn +1/2
2bn
a+bn +1/2
2bn
a + bn + 1/2
2bn
log
π(a + bn + 1/2)
2bn
−1/2
.
Lemma 5. Suppose that X1 , ..., Xn are i.i.d. observations having distribution (22) where the sequence of vectors (ψ 2 , p) satisfies Assumption 1.
Suppose we wish to test (23) using the classification rule (28). Suppose further that a ∈ ( 12 , ∞) and bn ∈ (0, 1), with bn → 0 as n → ∞. Then for
43
any η ∈ (0, 12 ), δ ∈ (0, 1), and sufficiently large n, a lower bound for the
probability of a Type I error for the ith test is given by
v
u
u
u
t1i ≥ 1 − Φ t
1
2
η)bn
a+
(1 −
2
log
1
η(1 − δ)
bn (ηδ)a+ 2
.
Proof of Lemma 5. By definition, the probability of a Type I error for the
ith decision is given by
1
t1i = P E(1 − κi |Xi ) > H0i is true .
2
We have by Theorem 3 that
a+
E(κi |Xi ) ≤ η +
1
2
(1 − η)bn
1
bn (ηδ)a+ 2
η(1 − δ) 2
exp −
Xi ,
2
η(1 − δ) 2
1
Xi < − η .
2
2
and so it follows that
E(1 − κi |Xi ) >
1
2
⊇
a + 1 (1 − η)bn
2
a+ 21
exp −
bn (ηδ)
Thus, using the definition of t1i and the above and noting that under H0i ,
Xi ∼ N (0, 1), as n → ∞,
a+
t1i ≥ P
1
2
(1 − η)bn
1
bn (ηδ)a+ 2
1
η(1 − δ) 2
Xi < − η H0i is true
exp −
2
2
a + 12 (1 − η)bn
2
2
log
= P Xi >
1
η(1 − δ)
bn (ηδ)a+ 2 1 − η
2
v
u
u
u
= 2P Z > t
1
2
a+
1
2
a+
(1 − η)bn
2
log
1
η(1 − δ)
bn (ηδ)a+ 2 12 − η
v
u
u
u
= 2 1 − Φ t
,
(1 − η)bn
2
log
1
η(1 − δ)
bn (ηδ)a+ 2 12 − η
where for the last inequality, we used the fact that bn → 0 as n → ∞, and
the fact that η, ηδ ∈ (0, 21 ), so that the log(·) term in final equality is greater
than zero for sufficiently large n.
44
Lemma 6. Suppose we have the same set-up as Lemma 4. Assume further
1/4
that bn → 0 in such a way that limn→∞ bpnn ∈ (0, ∞). Then for any η ∈
(0, 12 ), δ ∈ (0, 1), and sufficiently large n, an upper bound for the probability
of a Type II error for the ith test is given by
s
"
t2i ≤ 2Φ
C
2η(1 − δ)
!
#
− 1 (1 + o(1)),
where the o(1) terms tend to zero as n → ∞.
Proof of Lemma 6. By definition, the probability of a Type II error is given
by
1
t2i = P E(1 − κi ) ≤ H1i is true .
2
Fix η ∈ (0, 12 ) and δ ∈ (0, 1). Using the inequality,
κi ≤ 1 {η < κi ≤ 1} + η,
we obtain
E(κi |Xi ) ≤ P (κi > η|Xi ) + η.
Coupled with Theorem 3, we obtain that for sufficiently large n,
1
E(κi |Xi ) >
2
⊆
a + 1 (1 − η)bn
2
1
bn (ηδ)a+ 2
η(1 − δ) 2
1
exp −
Xi > − η .
2
2
Therefore,
1
t2i = P E(κi |Xi ) > H1i is true
2
a+
≤P
1
2
(1 − η)bn
1
b(ηδ)an + 2
Xi2
=P
2
<
η(1 − δ)
log
=P
Xi2
1
2
η(1 − δ) 2
1
exp −
Xi > − η H1i is true
2
2
(
log
a + 12
bn (ηδ)a
− η (ηδ)1/2
(1 − η)bn
!
−
H is true
1i
a
2
<
log
(1 + o(1)) H1i is true ,
η(1 − δ)
bn (ηδ)a
45
(72)
where in the final equality, we used the fact that bn → 0 as n → ∞, so the
second log(·) term in the second to last equality is a bounded quantity.
Note that under H1i , Xi ∼ N (0, 1 + ψ 2 ). Therefore, by (72) and the fact
ψn2
that lim
= 1 (by the second condition of Assumption 1), we have
n→∞ 1 + ψ 2
n
s
t2i ≤ P |Z| <
2
η(1 − δ)
s
log(a(ηδ)−a b−1
n )
(1 + o(1)) as n → ∞. (73)
2
ψ
1/4
7/8
By assumption, limn→∞ bpnn ∈ (0, ∞). This then implies that limn→∞ bpn2 =
n
0. Therefore, by the fourth condition of Assumption 1 and the fact that
ψ 2 → ∞ as n → ∞, we have
log(a(ηδ)−a b−1
log(a(ηδ)−a ) + log(b−1
n )
n )
=
2
2
ψ
ψ
−1/8
=
log(bn
ψ2
)
−7/8
log(bn
+
ψ2
)
!
(1 + o(1))
−1/2
log(bn )
(1 + o(1))
4ψ 2
C
→
as n → ∞.
4
=
(74)
Thus, using (73) and (74), we have
s
t2i ≤ P
|Z| <
s
|Z| <
=P
"
=2 Φ
s
!
C
(1 + o(1))
2η(1 − δ)
as n → ∞
!
C
(1 + o(1)) as n → ∞
2η(1 − δ)
C
2η(1 − δ)
!
#
− 1 (1 + o(1)) as n → ∞.
Lemma 7. Suppose we have the same set-up as Lemma 4. Then a lower
bound for the probability of a Type II error for the ith test is given by
h
i
√
t2i ≥ 2Φ( C) − 1 (1 + o(1)) as n → ∞,
where the o(1) terms tend to zero as n → ∞.
46
Proof of Lemma 7. By definition, the probability of a Type II error for the
ith decision is given by
t2i = P E(1 − κi ) ≤
1
H1i is true
2
.
For any n, we have by Theorem 1 that
2
eXi /2
bn
a + bn + 1/2
≤
1
2
1
.
2
⊆ E(1 − κi |Xi ) ≤
Therefore,
1
t2i = P E(1 − κi |Xi ) ≤ H1i is true
2
bn
1
2
≥ P eXi /2
≤ H1i is true
a + bn + 1/2
2
a + bn + 1/2
2
= P Xi ≤ 2 log
H1i is true .
2bn
(75)
Since Xi ∼ N (0, 1 + ψ 2 ) under H1i , we have by the second condition in
ψn2
Assumption 1 that lim
→ 1. From (75) and the facts that a ∈
n→∞ 1 + ψ 2
n
−1/2
( 12 , ∞) and bn ∈ (0, 1) for all n (so b−1
for all n), we have for
n ≥ bn
sufficiently large n,
t2i ≥ P |Z| ≤
≥ P |Z| ≤
≥ P |Z| ≤
v
u
u 2 log a+bn +1/2
t
2bn
ψ2
v
u
u log 1
t
2bn
ψ2
(1 + o(1)) as n → ∞
(1 + o(1)) as n → ∞
v
u
u log(b−1/2 ) + log(1/2)
n
t
ψ2
(1 + o(1)) as n → ∞
√
= P (|Z| ≤ C)(1 + o(1)) as n → ∞
√
= 2[Φ( C) − 1](1 + o(1)) as n → ∞,
1/4
where in the second to last equality, we used the assumption that limn→∞
(0, ∞) and the second and fourth conditions from Assumption 1.
47
bn
pn
∈
Proof of Theorem 8. Since the κi ’s, i = 1, ..., n are a posteriori independent,
the Type I and Type II error probabilities t1i and t2i are the same for every
test i, i = 1, ..., n. By Lemmas 4 and 5, for large enough n,
v
u
u
u
2 1 − Φ t
≤√
2
η(1 − δ)
a+
(1 − η)
log
≤ t1i
a+ 1 1
1
2
bn (ηδ)
bn
2
2
2bn
a + bn + 1/2
log
π(a + bn + 1/2)
2bn
−η
−1/2
.
Taking the limit as n → ∞ of all the terms above and using the sandwich
theorem, we have
lim t1i = 0
(76)
n→∞
for the ith test, under the assumptions on the hyperparameters a and bn .
By Lemmas 6 and 7, for any η ∈ (0, 21 ) and δ ∈ (0, 1),
h
i
√
2Φ( C) − 1 (1 + o(1)) ≤ t2i ≤ 2Φ
"
s
C
2η(1 − δ)
!
#
− 1 (1 + o(1)). (77)
Therefore, we have by (76) and (77) that as n → ∞, the asymptotic risk
(24) of the classification rule (28), RIGG , can be bounded as follows:
√
np(2Φ( C) − 1)(1 + o(1)) ≤ RIGG ≤ np 2Φ
s
C
2η(1 − δ)
!
!
− 1 (1 + o(1).
(78)
Therefore, from (26) and (78), we have as n → ∞,
RIGG
RIGG
≤ lim sup BO ≤
n→∞ RBO
n→∞ ROpt
Opt
2Φ
1 ≤ lim inf
q
C
2η(1−δ)
−1
√
.
2Φ( C) − 1
(79)
Now, the supremum of η(1 − δ) over the grid (η, δ) ∈ (0, 21 ) × (0, 1) is clearly
1
2 , and so the√infimum of the numerator in the right-most term in (79) is
therefore 2Φ( C) − 1. Thus, one has that
1 ≤ lim inf
n→∞
RIGG
RIGG
≤ lim sup BO ≤ 1,
BO
ROpt
n→∞ ROpt
so classification rule (28) is ABOS, i.e.
RIGG
→ 1 as n → ∞.
BO
ROpt
48
References
[1] Armagan, A., Clyde, M., and Dunson, D. B. (2011). Generalized beta
mixtures of gaussians. In Shawe-taylor, J., Zemel, R., Bartlett, P., Pereira,
F., and Weinberger, K., editors, Advances in Neural Information Processing Systems 24, pages 523–531.
[2] Armagan, A., Dunson, D. B., and Lee, J. (2013). Generalized double
pareto shrinkage. Statistica Sinica, 23 1:119–143.
[3] Benjamini, Y. and Hochberg, Y. (1995). Controlling the false discovery
rate: A practical and powerful approach to multiple testing. Journal of
the Royal Statistical Society. Series B (Methodological), 57(1):289–300.
[4] Berger, J. (1980). A robust generalized bayes estimator and confidence
region for a multivariate normal mean. Ann. Statist., 8(4):716–761.
[5] Bhadra, A., Datta, J., Polson, N. G., and Willard, B. (2017). The
horseshoe+ estimator of ultra-sparse signals. Bayesian Anal., 12(4):1105–
1131.
[6] Bhattacharya, A., Pati, D., Pillai, N. S., and Dunson, D. B. (2015).
Dirichlet–laplace priors for optimal shrinkage. Journal of the American
Statistical Association, 110(512):1479–1490. PMID: 27019543.
[7] Bogdan, M., Chakrabarti, A., Frommlet, F., and Ghosh, J. K. (2011).
Asymptotic bayes-optimality under sparsity of some multiple testing procedures. Ann. Statist., 39(3):1551–1579.
[8] Carvalho, C. M., Polson, N. G., and Scott, J. G. (2009). Handling
sparsity via the horseshoe. In van Dyk, D. and Welling, M., editors, Proceedings of the Twelth International Conference on Artificial Intelligence
and Statistics, volume 5 of Proceedings of Machine Learning Research,
pages 73–80, Hilton Clearwater Beach Resort, Clearwater Beach, Florida
USA. PMLR.
[9] Carvalho, C. M., Polson, N. G., and Scott, J. G. (2010). The horseshoe
estimator for sparse signals. Biometrika, 97(2):465–480.
[10] Castillo, I. and van der Vaart, A. (2012). Needles and straw in a
haystack: Posterior concentration for possibly sparse sequences. Ann.
Statist., 40(4):2069–2101.
49
[11] Clarke, B. S. and Barron, A. R. (1990). Information-theoretic asymptotics of bayes methods. IEEE Transactions on Information Theory,
36:453–471.
[12] Datta, J. and Ghosh, J. K. (2013). Asymptotic properties of bayes risk
for the horseshoe prior. Bayesian Anal., 8(1):111–132.
[13] Donoho, D. L., Johnstone, I. M., Hoch, J. C., and Stern, A. S. (1992).
Maximum entropy and the nearly black object. Journal of the Royal
Statistical Society. Series B (Methodological), 54(1):41–81.
[14] Efron, B. (2010).
25(2):145–157.
The future of indirect evidence.
Statist. Sci.,
[15] Ghosal, S., Ghosh, J. K., and van der Vaart, A. W. (2000). Convergence
rates of posterior distributions. Ann. Statist., 28(2):500–531.
[16] Ghosh, P. and Chakrabarti, A. (2017). Asymptotic optimality of onegroup shrinkage priors in sparse high-dimensional problems. Bayesian
Anal., 12(4):1133–1161.
[17] Ghosh, P., Tang, X., Ghosh, M., and Chakrabarti, A. (2016). Asymptotic properties of bayes risk of a general class of shrinkage priors in multiple hypothesis testing under sparsity. Bayesian Anal., 11(3):753–796.
[18] Griffin, J. E. and Brown, P. J. (2010). Inference with normal-gamma
prior distributions in regression problems. Bayesian Anal., 5(1):171–188.
[19] Griffin, J. E. and Brown, P. J. (2013). Some priors for sparse regression
modelling. Bayesian Anal., 8(3):691–702.
[20] Johnstone, I. M. and Silverman, B. W. (2004). Needles and straw in
haystacks: Empirical bayes estimates of possibly sparse sequences. Ann.
Statist., 32(4):1594–1649.
[21] Park, T. and Casella, G. (2008). The bayesian lasso. Journal of the
American Statistical Association, 103(482):681–686.
[22] Ročková, V. (2017). Bayesian estimation of sparse signals with a continuous spike-and-slab prior. Ann. Statist. To appear.
[23] Singh, D., Febbo, P. G., Ross, K., Jackson, D. G., Manola, J., Ladd,
C., Tamayo, P., Renshaw, A. A., D’Amico, A. V., Richie, J. P., Lander,
E. S., Loda, M., Kantoff, P. W., Golub, T. R., and Sellers, W. R. (2002).
50
Gene expression correlates of clinical prostate cancer behavior. Cancer
Cell, 1(2):203 – 209.
[24] Strawderman, W. E. (1971). Proper bayes minimax estimators of the
multivariate normal mean. Ann. Math. Statist., 42(1):385–388.
[25] van der Pas, S., Salomond, J.-B., and Schmidt-Hieber, J. (2016). Conditions for posterior contraction in the sparse normal means problem.
Electron. J. Statist., 10(1):976–1000.
[26] van der Pas, S., Szabó, B., and van der Vaart, A. (2017). Adaptive posterior contraction rates for the horseshoe. Electron. J. Statist., 11(2):3196–
3225.
[27] van der Pas, S. L., Kleijn, B. J. K., and van der Vaart, A. W. (2014).
The horseshoe estimator: Posterior concentration around nearly black
vectors. Electron. J. Statist., 8(2):2585–2618.
[28] Wellcome Trust (2007). Genome-wide association study of 14,000 cases
of seven common diseases and 3000 shared controls. Nature, 447:661–678.
51
| 10math.ST
|
arXiv:1707.07012v3 [cs.CV] 1 Dec 2017
Learning Transferable Architectures for Scalable Image Recognition
Barret Zoph
Google Brain
Vijay Vasudevan
Google Brain
Jonathon Shlens
Google Brain
Quoc V. Le
Google Brain
[email protected]
[email protected]
[email protected]
[email protected]
Abstract
cation represents one of the most important breakthroughs
in deep learning. Successive advancements on this benchmark based on convolutional neural networks (CNNs) have
achieved impressive results through significant architecture
engineering [52, 58, 20, 59, 57, 67].
Developing neural network image classification models
often requires significant architecture engineering. In this
paper, we attempt to automate this engineering process by
learning the model architectures directly on the dataset of
interest. As this approach is expensive when the dataset is
large, we propose to search for an architectural building
block on a small dataset and then transfer the block to a
larger dataset. Our key contribution is the design of a new
search space which enables transferability. In our experiments, we search for the best convolutional layer (or “cell”)
on the CIFAR-10 dataset and then apply this cell to the
ImageNet dataset by stacking together more copies of this
cell, each with their own parameters. Although the cell is
not searched for directly on ImageNet, an architecture constructed from the best cell achieves, among the published
works, state-of-the-art accuracy of 82.7% top-1 and 96.2%
top-5 on ImageNet. Our model is 1.2% better in top-1 accuracy than the best human-invented architectures while having 9 billion fewer FLOPS – a reduction of 28% in computational demand from the previous state-of-the-art model.
When evaluated at different levels of computational cost,
accuracies of our models exceed those of the state-of-theart human-designed models. For instance, a smaller network constructed from the best cell also achieves 74% top1 accuracy, which is 3.1% better than equivalently-sized,
state-of-the-art models for mobile platforms. On CIFAR10, an architecture constructed from the best cell achieves
2.4% error rate, which is also state-of-the-art. Finally, the
image features learned from image classification can also
be transferred to other computer vision problems. On the
task of object detection, the learned features used with the
Faster-RCNN framework surpass state-of-the-art by 4.0%
achieving 43.1% mAP on the COCO dataset.
In this paper, we consider learning the convolutional architectures directly from data with application to ImageNet
classification. In addition to being an difficult and important benchmark in computer vision, features derived from
ImageNet classifiers are of great importance to many other
computer vision tasks. For example, features from networks
that perform well on ImageNet classification provide stateof-the-art performance when transferred to other computer
vision tasks where labeled data is limited [13].
1. Introduction
Our approach is inspired by the recently proposed Neural Architecture Search (NAS) framework [70], which uses
a policy gradient algorithm to optimize architecture configurations. Even though NAS is attractive as a method to
search for good convolutional network architectures, applying it directly to the ImageNet dataset is computationally
expensive given the size of the dataset. We therefore propose to search for a good architecture on the far smaller
CIFAR-10 dataset, and automatically transfer the learned
architecture to ImageNet. We achieve this transferrability by designing a search space so that the complexity of
the architecture is independent of the depth of the network
and the size of input images. More concretely, all convolutional networks in our search space are composed of convolutional layers (or “cells”) with identical structure but different weights. Searching for the best convolutional architectures is therefore reduced to searching for the best cell
structure. Searching for the best cell structure has two main
benefits: it is much faster than searching for an entire network architecture and the cell itself is more likely to generalize to other problems. In our experiments, this approach
significantly accelerates the search for the best architectures
using CIFAR-10 by a factor of 7× and learns architectures
that successfully transfer to ImageNet.
ImageNet classification [11] is an important benchmark
in computer vision. The seminal work of [32] on using
convolutional architectures [17, 33] for ImageNet classifi-
Our main result is that the best architecture found on
CIFAR-10 achieves state-of-the-art accuracy when transferred to ImageNet classification without much modifica1
tion. On ImageNet, an architecture constructed from the
best cell achieves, among the published works, state-ofthe-art accuracy of 82.7% top-1 and 96.2% top-5. This
result amounts to a 1.2% improvement in top-1 accuracy
than the best human-invented architectures while having 9
billion fewer FLOPS. On CIFAR-10 itself, the architecture
achieves 2.4% error rate, which is also state-of-the-art.
Additionally, by simply varying the number of the convolutional cells and number of filters in the convolutional
cells, we can create convolutional architectures with different computational demands. Thanks to this property of the
cells, we can generate a family of models that achieve accuracies superior to all human-invented models at equivalent or smaller computational budgets [59, 29]. Notably, the
smallest version of the learned model achieves 74.0% top1 accuracy on ImageNet, which is 3.1% better than previously engineered architectures targeted towards mobile and
embedded vision tasks [24, 69].
Finally, we show that the image features learned from
image classification are generically useful and transfer to
other computer vision problems. In our experiments, the
features learned from ImageNet classification can be combined with the Faster-RCNN framework [46] to achieve
state-of-the-art on COCO object detection task for both the
largest as well as mobile-optimized models. Our largest
model achieves 43.1% mAP, which is 4% better than previous state-of-the-art.
2. Method
Our work makes use of search methods to find good convolutional architectures on a dataset of interest. The main
search method we use in this work is the Neural Architecture Search (NAS) framework proposed by [70]. In NAS,
a controller recurrent neural network (RNN) samples child
networks with different architectures. The child networks
are trained to convergence to obtain some accuracy on a
held-out validation set. The resulting accuracies are used
to update the controller so that the controller will generate
better architectures over time. The controller weights are
updated with policy gradient (see Figure 1).
The main contribution of this work is the design of a
novel search space, such that the best architecture found
on the CIFAR-10 dataset would scale to larger, higherresolution image datasets across a range of computational
settings. One inspiration for this search space is the recognition that architecture engineering with CNNs often identifies repeated motifs consisting of combinations of convolutional filter banks, nonlinearities and a prudent selection of
connections to achieve state-of-the-art results (such as the
repeated modules present in the Inception and ResNet models [58, 20, 59, 57]). These observations suggest that it may
be possible for the controller RNN to predict a generic convolutional cell expressed in terms of these motifs. This cell
Sample architecture A!
with probability p
Train a child network!
with architecture A to !
convergence to get !
validation accuracy R
The controller (RNN)
Scale gradient of p by R!
to update the controller
Figure 1. Overview of Neural Architecture Search [70]. A controller RNN predicts architecture A from a search space with probability p. A child network with architecture A is trained to convergence achieving accuracy R. Scale the gradients of p by R to
update the RNN controller.
can then be stacked in series to handle inputs of arbitrary
spatial dimensions and filter depth.
In our approach, the overall architectures of the convolutional nets are manually predetermined. They are composed of convolutional cells repeated many times where
each convolutional cell has the same architecture, but different weights. To easily build scalable architectures for
images of any size, we need two types of convolutional cells
to serve two main functions when taking in a feature map
as input: (1) convolutional cells that return a feature map of
the same dimension, and (2) convolutional cells that return
a feature map where the feature map height and width is reduced by a factor of two. We name the first type and second
type of convolutional cells Normal Cell and Reduction Cell
respectively. For the Reduction Cell, we make the initial
operation applied to the cell’s inputs have a stride of two to
reduce the height and width. All of our operations that we
consider for building our convolutional cells have an option
of striding.
Figure 2 shows our placement of Normal and Reduction
Cells for CIFAR-10 and ImageNet. Note on ImageNet we
have more Reduction Cells, since the incoming image size
is 299x299 compared to 32x32 for CIFAR. The Reduction
and Normal Cell could have the same architecture, but we
empirically found it beneficial to learn two separate architectures. We use a common heuristic to double the number
of filters in the output whenever the spatial activation size is
reduced in order to maintain roughly constant hidden state
dimension [32, 52]. Importantly, much like Inception and
ResNet models [58, 20, 59, 57], we consider the number of
motif repetitions N and the number of initial convolutional
filters as free parameters that we tailor to the scale of an
image classification problem.
What varies in the convolutional nets is the structures of
the Normal and Reduction Cells, which are searched by the
controller RNN. The structures of the cells can be searched
provides good results, although we have not exhaustively
searched this space due to computational limitations.
In steps 3 and 4, the controller RNN selects an operation
to apply to the hidden states. We collected the following set
of operations based on their prevalence in the CNN literature:
•
•
•
•
•
•
•
Figure 2. Scalable architectures for image classification consist of
two repeated motifs termed Normal Cell and Reduction Cell. This
diagram highlights the model architecture for CIFAR-10 and ImageNet. The choice for the number of times the Normal Cells that
gets stacked between reduction cells, N , can vary in our experiments.
within a search space defined as follows. In our search
space, each cell receives as input two initial hidden states hi
and hi−1 which are the outputs of two cells in previous two
lower layers or the input image. The controller RNN recursively predicts the rest of the structure of the convolutional
cell, given these two initial hidden states (Figure 3). The
predictions of the controller for each cell are grouped into
B blocks, where each block has 5 prediction steps made
by 5 distinct softmax classifiers corresponding to discrete
choices of the elements of a block:
Step 1. Select a hidden state from hi , hi−1 or from the set of hidden
states created in previous blocks.
Step 2. Select a second hidden state from the same options as in Step 1.
Step 3. Select an operation to apply to the hidden state selected in Step 1.
Step 4. Select an operation to apply to the hidden state selected in Step 2.
Step 5. Select a method to combine the outputs of Step 3 and 4 to create
a new hidden state.
The algorithm appends the newly-created hidden state to
the set of existing hidden states as a potential input in subsequent blocks. The controller RNN repeats the above 5
prediction steps B times corresponding to the B blocks in
a convolutional cell. In our experiments, selecting B = 5
identity
1x7 then 7x1 convolution
3x3 average pooling
5x5 max pooling
1x1 convolution
3x3 depthwise-separable conv
7x7 depthwise-separable conv
•
•
•
•
•
•
1x3 then 3x1 convolution
3x3 dilated convolution
3x3 max pooling
7x7 max pooling
3x3 convolution
5x5 depthwise-seperable conv
In step 5 the controller RNN selects a method to combine
the two hidden states, either (1) element-wise addition between two hidden states or (2) concatenation between two
hidden states along the filter dimension. Finally, all of the
unused hidden states generated in the convolutional cell are
concatenated together in depth to provide the final cell output.
To allow the controller RNN to predict both Normal Cell
and Reduction Cell, we simply make the controller have
2 × 5B predictions in total, where the first 5B predictions
are for the Normal Cell and the second 5B predictions are
for the Reduction Cell.
Finally, our work makes use of the reinforcement learning proposal in NAS [70] intensively; however, it is also
possible to use random search to search for models in our
search space. In random search, instead of sampling the decisions from the softmax classifiers in the controller RNN,
we can sample the decisions from the uniform distribution.
In our experiments, we find that random search is worse
than reinforcement learning on the CIFAR-10 dataset. Although there is value in using reinforcement learning, the
gap is smaller than what is found in the original work
of [70]. This result suggests that the new search space is
well designed such that random search can perform reasonably well. We will compare reinforcement learning against
random search in Section 3.4.
3. Experiments and Results
In this section, we describe our experiments with our
method described above to learn convolutional cells. In
summary, all architecture searches are performed using the
CIFAR-10 classification task [31]. The controller RNN was
trained using Proximal Policy Optimization (PPO) [50] by
employing a global workqueue system for generating a pool
of child networks controlled by the RNN. In our experiments, the pool of workers in the workqueue consisted of
500 GPUs. Please see Appendix A for complete details of
the architecture learning algorithm and the controller system.
softmax!
layer
Select second!
hidden state
Select operation for !
first hidden state
Select operation for!
second hidden state
controller!
hidden layer
Select one!
hidden state
Select method to!
combine hidden state
new hidden layer
add
repeat B times
3 x 3 conv
2 x 2 maxpool
hidden layer A
hidden layer B
Figure 3. Controller model architecture for recursively constructing one block of a convolutional cell. Each block requires selecting 5
discrete parameters, each of which corresponds to the output of a softmax layer. Example constructed block shown on right. A convolutional cell contains B blocks, hence the controller contains 5B softmax layers for predicting the architecture of a convolutional cell. In our
experiments, the number of blocks B is 5.
The result of this search process over 4 days yields several candidate convolutional cells. We note that this search
procedure is almost 7× faster than previous approaches [70]
that took 28 days.1 Additionally, we demonstrate below that
the resulting architecture is superior in accuracy.
Figure 4 shows a diagram of the top performing Normal
Cell and Reduction Cell. Note the prevalence of separable
convolutions and the number of branches compared with
competing architectures [52, 58, 20, 59, 57]. Subsequent
experiments focus on this convolutional cell architecture,
although we examine the efficacy of other, top-ranked convolutional cells in ImageNet experiments (described in Appendix B) and report their results as well. We call the three
networks constructed from the best three searches NASNetA, NASNet-B and NASNet-C.
We demonstrate the utility of the convolutional cells by
employing this learned architecture on CIFAR-10 and a
family of ImageNet classification tasks. The latter family of
tasks is explored across a few orders of magnitude in computational budget. After having learned the convolutional
cells, several hyper-parameters may be explored to build a
final network for a given task: (1) the number of cell repeats
N and (2) the number of filters in the initial convolutional
cell. After selecting the number of initial filters, we use a
common heuristic to double the number of filters whenever
the stride is 2. Finally, we define a simple notation, e.g.,
4 @ 64, to indicate these two parameters in all networks,
where 4 and 64 indicate the number of cell repeats and the
number of filters in the penultimate layer of the network,
respectively.
1 In particular, we note that previous architecture search [70] used 800
GPUs for 28 days resulting in 22,400 GPU-hours. The method in this paper uses 500 GPUs across 4 days resulting in 2,000 GPU-hours. The former effort used Nvidia K40 GPUs, whereas the current efforts used faster
NVidia P100s. Discounting the fact that the we use faster hardware, we
estimate that the current procedure is roughly about 7× more efficient.
3.1. Results on CIFAR-10 Image Classification
For the task of image classification with CIFAR-10, we
set N = 4 or 6 (Figure 2). The test accuracies of the
best architectures are reported in Table 1 along with other
state-of-the-art models. As can be seen from the Table, a
large NASNet-A model with cutout data augmentation [12]
achieves a state-of-the-art error rate of 2.40% (averaged
across 5 runs), which is slightly better than the previous
best record of 2.56% by [12]. The best single run from our
model achieves 2.19% error rate.
3.2. Results on ImageNet Image Classification
We performed several sets of experiments on ImageNet
with the best convolutional cells learned from CIFAR-10.
We emphasize that we merely transfer the architectures
from CIFAR-10 but train all ImageNet models weights from
scratch.
Results are summarized in Table 2 and 3 and Figure 5.
In the first set of experiments, we train several image classification systems operating on 299x299 or 331x331 resolution images with different experiments scaled in computational demand to create models that are roughly on par
in computational cost with Inception-v2 [29], Inception-v3
[59] and PolyNet [68]. We show that this family of models achieve state-of-the-art performance with fewer floating
point operations and parameters than comparable architectures. Second, we demonstrate that by adjusting the scale
of the model we can achieve state-of-the-art performance
at smaller computational budgets, exceeding streamlined
CNNs hand-designed for this operating regime [24, 69].
Note we do not have residual connections between convolutional cells as the models learn skip connections on
their own. We empirically found manually inserting residual connections between cells to not help performance. Our
training setup on ImageNet is similar to [59], but please see
Appendix A for details.
Table 2 shows that the convolutional cells discovered with CIFAR-10 generalize well to ImageNet prob-
hi+1
concat
hi+1
add
add
concat
max!
3x3
add
sep!
3x3
add
iden!
tity
sep!
3x3
add
sep!
5x5
iden!
tity
avg!
3x3
add
avg!
3x3
sep!
3x3
add
avg!
3x3
sep!
5x5
avg!
3x3
iden!
tity
add
sep!
3x3
sep!
7x7
add
sep!
5x5
max!
3x3
hi
hi
...
...
hi-1
hi-1
Normal Cell
sep!
7x7
add
avg!
3x3
sep!
5x5
Reduction Cell
Figure 4. Architecture of the best convolutional cells (NASNet-A) with B = 5 blocks identified with CIFAR-10 . The input (white) is the
hidden state from previous activations (or input image). The output (pink) is the result of a concatenation operation across all resulting
branches. Each convolutional cell is the result of B blocks. A single block is corresponds to two primitive operations (yellow) and a
combination operation (green). Note that colors correspond to operations in Figure 3.
model
depth
# params
error rate (%)
DenseNet (L = 40, k = 12) [26]
DenseNet(L = 100, k = 12) [26]
DenseNet (L = 100, k = 24) [26]
DenseNet-BC (L = 100, k = 40) [26]
40
100
100
190
1.0M
7.0M
27.2M
25.6M
5.24
4.10
3.74
3.46
Shake-Shake 26 2x32d [18]
Shake-Shake 26 2x96d [18]
Shake-Shake 26 2x96d + cutout [12]
26
26
26
2.9M
26.2M
26.2M
3.55
2.86
2.56
NAS v3 [70]
NAS v3 [70]
39
39
7.1M
37.4M
4.47
3.65
-
3.3M
3.3M
27.6M
27.6M
2.6M
3.1M
3.41
2.65
2.97
2.40
3.73
3.59
NASNet-A
NASNet-A
NASNet-A
NASNet-A
NASNet-B
NASNet-C
(6 @ 768)
(6 @ 768) + cutout
(7 @ 2304)
(7 @ 2304) + cutout
(4 @ 1152)
(4 @ 640)
Table 1. Performance of Neural Architecture Search and other state-of-the-art models on CIFAR-10. All results for NASNet are the mean
accuracy across 5 runs.
lems. In particular, each model based on the convolutional cells exceeds the predictive performance of the corresponding hand-designed model. Importantly, the largest
model achieves a new state-of-the-art performance for ImageNet (82.7%) based on single, non-ensembled predictions,
surpassing previous best published result by ∼1.2% [8].
Among the unpublished works, our model is on par with
the best reported result of 82.7% [25], while having significantly fewer floating point operations. Figure 5 shows a
complete summary of our results in comparison with other
published results. Note the family of models based on convolutional cells provides an envelope over a broad class of
human-invented architectures.
Finally, we test how well the best convolutional cells
may perform in a resource-constrained setting, e.g., mobile
devices (Table 3). In these settings, the number of floating point operations is severely constrained and predictive
performance must be weighed against latency requirements
on a device with limited computational resources. MobileNet [24] and ShuffleNet [69] provide state-of-the-art re-
85
85
NASNet-A (6 @ 4032)
NASNet-A (6 @ 4032)
80
PolyNet
Inception-ResNet-v2
NASNet-A (5 @ 1538)
Inception-v4
ResNet-152
Xception
DPN-131
ResNeXt-101
NASNet-A (7 @ 1920)
SENet
accuracy (precision @1)
accuracy (precision @1)
NASNet-A (7 @ 1920)
Inception-v3
75
Inception-v2
NASNet-A (4 @ 1056)
VGG-16
ShuffleNet
MobileNet
Inception-v1
70
80
DPN-131
Inception-ResNet-v2
Inception-v3
SENet
PolyNet
ResNeXt-101
NASNet-A (5 @ 1538) Inception-v4
Xception
ResNet-152
Inception-v2
75
NASNet-A (4 @ 1056)
VGG-16
ShuffleNet
MobileNet
70
Inception-v1
65
65
0
10000
20000
30000
0
40000
40
20
# Mult-Add operations (millions)
100
80
60
120
140
# parameters (millions)
Figure 5. Accuracy versus computational demand (left) and number of parameters (right) across top performing published CNN architectures on ImageNet 2012 ILSVRC challenge prediction task. Computational demand is measured in the number of floating-point multiplyadd operations to process a single image. Black circles indicate previously published results and red squares highlight our proposed
models.
Model
image size
# parameters
Mult-Adds
Top 1 Acc. (%)
Top 5 Acc. (%)
Inception V2 [29]
NASNet-A (5 @ 1538)
224×224
299×299
11.2 M
10.9 M
1.94 B
2.35 B
74.8
78.6
92.2
94.2
Inception V3 [59]
Xception [9]
Inception ResNet V2 [57]
NASNet-A (7 @ 1920)
299×299
299×299
299×299
299×299
23.8 M
22.8 M
55.8 M
22.6 M
5.72 B
8.38 B
13.2 B
4.93 B
78.0
79.0
80.4
80.8
93.9
94.5
95.3
95.3
ResNeXt-101 (64 x 4d) [67]
PolyNet [68]
DPN-131 [8]
SENet [25]
NASNet-A (6 @ 4032)
320×320
331×331
320×320
320×320
331×331
83.6 M
92 M
79.5 M
145.8 M
88.9 M
31.5 B
34.7 B
32.0 B
42.3 B
23.8 B
80.9
81.3
81.5
82.7
82.7
95.6
95.8
95.8
96.2
96.2
Table 2. Performance of architecture search and other published state-of-the-art models on ImageNet classification. Mult-Adds indicate
the number of composite multiply-accumulate operations for a single image. Note that the composite multiple-accumulate operations are
calculated for the image size reported in the table. Model size for [25] calculated from open-source implementation.
Model
# parameters
Mult-Adds
Top 1 Acc. (%)
Top 5 Acc. (%)
Inception V1 [58]
MobileNet-224 [24]
ShuffleNet (2x) [69]
6.6M
4.2 M
∼ 5M
1,448 M
569 M
524 M
69.8
70.6
70.9
89.9
89.5
89.8
NASNet-A (4 @ 1056)
NASNet-B (4 @ 1536)
NASNet-C (3 @ 960)
5.3 M
5.3M
4.9M
564 M
488 M
558 M
74.0
72.8
72.5
91.6
91.3
91.0
Table 3. Performance on ImageNet classification on a subset of models operating in a constrained computational setting, i.e., < 1.5 B
multiply-accumulate operations per image. All models use 224x224 images.
sults obtaining 70.6% and 70.9% accuracy, respectively on
224x224 images using ∼550M multliply-add operations.
An architecture constructed from the best convolutional
cells achieves superior predictive performance (74.0% ac-
curacy) surpassing previous models but with comparable
computational demand. In summary, we find that the
learned convolutional cells are flexible across model scales
achieving state-of-the-art performance across almost 2 or-
ders of magnitude in computational budget.
3.4. Efficiency of architecture search methods
3.3. Improved features for object detection
2 A primary advance in the best reported object detection system is the
introduction of a novel loss [36]. Pairing this loss with NASNet-A image
featurization may lead to even further performance gains. Additionally,
performance gains are achievable through ensembling multiple inferences
across multiple model instances and image crops (e.g., [28]).
0.930
0.925
Accuracy at 20 Epochs
Image classification networks provide generic image features that may be transferred to other computer vision problems [13]. One of the most important problems is the spatial localization of objects within an image. To further
validate the performance of the family of NASNet-A networks, we test whether object detection systems derived
from NASNet-A lead to improvements in object detection
[28].
To address this question, we plug in the family of
NASNet-A networks pretrained on ImageNet into the
Faster-RCNN object detection pipeline [46] using an opensource software platform [28]. We retrain the resulting object detection pipeline on the combined COCO training plus
validation dataset excluding 8,000 mini-validation images.
We perform single model evaluation using 300-500 RPN
proposals per image. In other words, we only pass a single image through a single network. We evaluate the model
on the COCO mini-val [28] and test-dev dataset and report
the mean average precision (mAP) as computed with the
standard COCO metric library [37]. We perform a simple
search over learning rate schedules to identify the best possible model. Finally, we examine the behavior of two object
detection systems employing the best performing NASNetA image featurization (NASNet-A, 6 @ 4032) as well as
the image featurization geared towards mobile platforms
(NASNet-A, 4 @ 1056).
For the mobile-optimized network, our resulting system
achieves a mAP of 29.6% – exceeding previous mobileoptimized networks that employ Faster-RCNN by over
5.0% (Table 4). For the best NASNet network, our resulting
network operating on images of the same spatial resolution
(800 × 800) achieves mAP = 40.7%, exceeding equivalent
object detection systems based off lesser performing image
featurization (i.e. Inception-ResNet-v2) by 4.0% [28, 51]
(see Appendix for example detections on images and sideby-side comparisons). Finally, increasing the spatial resolution of the input image results in the best reported, single
model result for object detection of 43.1%, surpassing the
best previous best by over 4.0% [36].2 These results provide
further evidence that NASNet provides superior, generic
image features that may be transferred across other computer vision tasks. Figure 9 and Figure 10 in Appendix C
show four examples of object detection results produced by
NASNet-A with the Faster-RCNN framework.
0.920
0.915
0.910
0.905
0.900
0.895
0.890
0
RL Top 1 Unique Models
RL Top 5 Unique Models
RL Top 25 Unique Models
RS Top 1 Unique Models
RS Top 5 Unique Models
RS Top 25 Unique Models
10000
20000
30000
40000
Number of Models Sampled
50000
Figure 6. Measuring the efficiency of random search (RS) to reinforcement learning (RL) for learning neural architectures. The
x-axis measures the total number of model architectures sampled,
and the y-axis is the validation performance after 20 epochs on a
proxy CIFAR-10 training task. We emphasize that the absolute
performance on the proxy task is not important (see text) but only
the relative gain from the initial state. Each pair of curves measures the mean accuracy across top ranking models identified by
each algorithm.
An open question in this proposed method is the training efficiency of the architecture search algorithm. In this
section, we demonstrate the effectiveness of reinforcement
learning for architecture search on the CIFAR-10 image
classification problem and compare it to brute-force random
search (considered to be a very strong baseline for blackbox optimization [5]) given an equivalent amount of computational resources.
We define the effectiveness of an architecture search algorithm as the increase in model performance from the initial architecture identified with the search method. Importantly, we emphasize that the absolute value of the model
performance on the proxy task is less important as this artificially reflects irrelevant factors employed in the architecture search process, e.g., the number of training epochs
and the specific model construction. Thus, we employ the
increase in the model performance as a proxy for judging
convergence of the architecture search algorithm.
Figure 6 shows the performance of reinforcement learning (RL) and random search (RS) as more model architectures are sampled. Note that the best model identified with
RL is significantly better than the best model found by RS
by over 1% as measured by the proxy classification task on
CIFAR-10. Additionally, RL finds an entire range of models that are of superior quality to random search. We observe this in the mean performance of the top-5 and top-25
Model
resolution
mAP (mini-val)
mAP (test-dev)
MobileNet-224 [24]
ShuffleNet (2x) [69]
NASNet-A (4 @ 1056)
600 × 600
600 × 600
600 × 600
19.8%
24.5%†
29.6%
-
ResNet-101-FPN [35]
Inception-ResNet-v2 (G-RMI) [28]
Inception-ResNet-v2 (TDM) [51]
NASNet-A (6 @ 4032)
NASNet-A (6 @ 4032)
800 (short side)
600 × 600
600 × 1000
800 × 800
1200 × 1200
35.7%
37.3%
41.3%
43.2%
36.2%
35.6%
36.8%
40.7%
43.1%
ResNet-101-FPN (RetinaNet) [36]
800 (short side)
-
39.1%
Table 4. Object detection performance on COCO on mini-val and test-dev datasets across a variety of image featurizations. All results
are with the Faster-RCNN object detection framework [46] from a single crop of an image. Top rows highlight mobile-optimized image
featurizations, while bottom rows indicate computationally heavy image featurizations geared towards achieving best results. All mini-val
results employ the same 8K subset of validation images in [28].
models identified in RL versus RS. We take these results
to indicate that although RS may provide a viable search
strategy, RL does significantly improve our ability to learn
neural architectures.
4. Related Work
The proposed method is related to previous work in hyperparameter optimization [43, 4, 5, 53, 54, 6, 39] – especially recent approaches in designing architectures such
as Neural Fabrics [47], DiffRNN [40], MetaQNN [3] and
DeepArchitect [42]. A more flexible class of methods for
designing architecture is evolutionary algorithms [64, 16,
56, 30, 45, 41, 66], yet they have not had as much success
at large scale. Xie and Yuille [66] also transferred learned
architectures from CIFAR-10 to ImageNet but performance
of these models (top-1 accuracy 72.1%) are notably below
previous state-of-the-art (Table 2).
The concept of having one neural network interact with a
second neural network to aid the learning process, or learning to learn or meta-learning [23, 48] has attracted much
attention in recent years [1, 61, 14, 19, 34, 44, 15]. Most
of these approaches have not been scaled to large problems
like ImageNet. An exception is the recent work focused
on learning an optimizer for ImageNet classification that
achieved notable improvements [63].
The design of our search space took much inspiration from LSTMs [22], and Neural Architecture Search
Cell [70]. The modular structure of the convolutional cell is
also related to previous methods on ImageNet such as VGG
[52], Inception [58, 59, 57], ResNet/ResNext [20, 67], and
Xception/MobileNet [9, 24].
5. Conclusion
In this work, we demonstrate how to learn scalable, convolutional cells from data that transfer to multiple image
classification tasks. The learned architecture is quite flexible as it may be scaled in terms of computational cost
and parameters to easily address a variety of problems. In
all cases, the accuracy of the resulting model exceeds all
human-designed models – ranging from models designed
for mobile applications to computationally-heavy models
designed to achieve the most accurate results.
The key insight in our approach is to design a search
space that decouples the complexity of an architecture from
the depth of a network. This resulting search space permits identifying good architectures on a small dataset (i.e.,
CIFAR-10) and transferring the learned architecture to image classifications across a range of data and computational
scales.
The resulting architectures approach or exceed stateof-the-art performance in both CIFAR-10 and ImageNet
datasets with less computational demand than humandesigned architectures [59, 29, 68]. The ImageNet results are particularly important because many state-of-theart computer vision problems (e.g., object detection [28],
face detection [49], image localization [62]) derive image features or architectures from ImageNet classification
models. For instance, we find that image features obtained from ImageNet used in combination with the FasterRCNN framework achieves state-of-the-art object detection
results. Finally, we demonstrate that we can use the resulting learned architecture to perform ImageNet classification with reduced computational budgets that outperform
streamlined architectures targeted to mobile and embedded
platforms [24, 69].
References
[1] M. Andrychowicz, M. Denil, S. Gomez, M. W. Hoffman,
D. Pfau, T. Schaul, and N. de Freitas. Learning to learn by
gradient descent by gradient descent. In Advances in Neural
Information Processing Systems, pages 3981–3989, 2016.
[2] J. L. Ba, J. R. Kiros, and G. E. Hinton. Layer normalization.
arXiv preprint arXiv:1607.06450, 2016.
[3] B. Baker, O. Gupta, N. Naik, and R. Raskar. Designing neural network architectures using reinforcement learning. In International Conference on Learning Representations, 2016.
[4] J. Bergstra, R. Bardenet, Y. Bengio, and B. Kégl. Algorithms for hyper-parameter optimization. In Neural Information Processing Systems, 2011.
[5] J. Bergstra and Y. Bengio. Random search for hyperparameter optimization. Journal of Machine Learning Research, 2012.
[6] J. Bergstra, D. Yamins, and D. D. Cox. Making a science
of model search: Hyperparameter optimization in hundreds
of dimensions for vision architectures. International Conference on Machine Learning, 2013.
[7] J. Chen, R. Monga, S. Bengio, and R. Jozefowicz. Revisiting
distributed synchronous sgd. In International Conference on
Learning Representations Workshop Track, 2016.
[8] Y. Chen, J. Li, H. Xiao, X. Jin, S. Yan, and J. Feng. Dual
path networks. arXiv preprint arXiv:1707.01083, 2017.
[9] F. Chollet. Xception: Deep learning with depthwise separable convolutions. In Proceedings of the IEEE Conference on
Computer Vision and Pattern Recognition, 2017.
[10] D.-A. Clevert, T. Unterthiner, and S. Hochreiter. Fast and
accurate deep network learning by exponential linear units
(elus). In International Conference on Learning Representations, 2016.
[11] J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. FeiFei. Imagenet: A large-scale hierarchical image database. In
IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 2009.
[12] T. DeVries and G. W. Taylor. Improved regularization of
convolutional neural networks with cutout. arXiv preprint
arXiv:1708.04552, 2017.
[13] J. Donahue, Y. Jia, O. Vinyals, J. Hoffman, N. Zhang,
E. Tzeng, and T. Darrell. Decaf: A deep convolutional activation feature for generic visual recognition. In International Conference on Machine Learning, volume 32, pages
647–655, 2014.
[14] Y. Duan, J. Schulman, X. Chen, P. L. Bartlett, I. Sutskever,
and P. Abbeel. RL2 : Fast reinforcement learning via slow
reinforcement learning. arXiv preprint arXiv:1611.02779,
2016.
[15] C. Finn, P. Abbeel, and S. Levine. Model-agnostic metalearning for fast adaptation of deep networks. In International Conference on Machine Learning, 2017.
[16] D. Floreano, P. Dürr, and C. Mattiussi. Neuroevolution: from
architectures to learning. Evolutionary Intelligence, 2008.
[17] K. Fukushima. A self-organizing neural network model for a
mechanism of pattern recognition unaffected by shift in position. Biological Cybernetics, page 93202, 1980.
[18] X. Gastaldi. Shake-shake regularization of 3-branch residual
networks. In International Conference on Learning Representations Workshop Track, 2017.
[19] D. Ha, A. Dai, and Q. V. Le. Hypernetworks. In International Conference on Learning Representations, 2017.
[20] K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning
for image recognition. In IEEE Conference on Computer
Vision and Pattern Recognition, 2016.
[21] K. He, X. Zhang, S. Ren, and J. Sun. Identity mappings in
deep residual networks. In European Conference on Computer Vision, 2016.
[22] S. Hochreiter and J. Schmidhuber. Long short-term memory.
Neural Computation, 1997.
[23] S. Hochreiter, A. Younger, and P. Conwell. Learning to learn
using gradient descent. Artificial Neural Networks, pages
87–94, 2001.
[24] A. G. Howard, M. Zhu, B. Chen, D. Kalenichenko, W. Wang,
T. Weyand, M. Andreetto, and H. Adam. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861, 2017.
[25] J. Hu, L. Shen, and G. Sun. Squeeze-and-excitation networks. arXiv preprint arXiv:1709.01507, 2017.
[26] G. Huang, Z. Liu, and K. Q. Weinberger. Densely connected
convolutional networks. In IEEE Conference on Computer
Vision and Pattern Recognition, 2017.
[27] G. Huang, Y. Sun, Z. Liu, D. Sedra, and K. Weinberger. Deep
networks with stochastic depth. In European Conference on
Computer Vision, 2016.
[28] J. Huang, V. Rathod, C. Sun, M. Zhu, A. Korattikara,
A. Fathi, I. Fischer, Z. Wojna, Y. Song, S. Guadarrama, et al.
Speed/accuracy trade-offs for modern convolutional object
detectors. In IEEE Conference on Computer Vision and Pattern Recognition, 2017.
[29] S. Ioffe and C. Szegedy. Batch normalization: Accelerating
deep network training by reducing internal covariate shift.
In International Conference on Learning Representations,
2015.
[30] R. Jozefowicz, W. Zaremba, and I. Sutskever. An empirical
exploration of recurrent network architectures. In International Conference on Learning Representations, 2015.
[31] A. Krizhevsky. Learning multiple layers of features from
tiny images. Technical report, University of Toronto, 2009.
[32] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet
classification with deep convolutional neural networks. In
Advances in Neural Information Processing System, 2012.
[33] Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner. Gradientbased learning applied to document recognition. Proceedings of the IEEE, 1998.
[34] K. Li and J. Malik. Learning to optimize neural nets. arXiv
preprint arXiv:1703.00441, 2017.
[35] T.-Y. Lin, P. Dollár, R. Girshick, K. He, B. Hariharan, and
S. Belongie. Feature pyramid networks for object detection.
In Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, 2017.
[36] T.-Y. Lin, P. Goyal, R. Girshick, K. He, and P. Dollár.
Focal loss for dense object detection. arXiv preprint
arXiv:1708.02002, 2017.
[37] T.-Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan, P. Dollár, and C. L. Zitnick. Microsoft coco: Common objects in context. In European Conference on Computer Vision, pages 740–755. Springer, 2014.
[38] I. Loshchilov and F. Hutter. SGDR: Stochastic gradient descent with warm restarts. In International Conference on
Learning Representations, 2017.
[39] H. Mendoza, A. Klein, M. Feurer, J. T. Springenberg, and
F. Hutter. Towards automatically-tuned neural networks. In
Proceedings of the 2016 Workshop on Automatic Machine
Learning, pages 58–65, 2016.
[40] T. Miconi. Neural networks with differentiable structure.
arXiv preprint arXiv:1606.06216, 2016.
[41] R. Miikkulainen, J. Liang, E. Meyerson, A. Rawal, D. Fink,
O. Francon, B. Raju, A. Navruzyan, N. Duffy, and B. Hodjat.
Evolving deep neural networks.
arXiv preprint
arXiv:1703.00548, 2017.
[42] R. Negrinho and G. Gordon. DeepArchitect: Automatically
designing and training deep architectures. arXiv preprint
arXiv:1704.08792, 2017.
[43] N. Pinto, D. Doukhan, J. J. DiCarlo, and D. D. Cox. A highthroughput screening approach to discovering good forms of
biologically inspired visual representation. PLoS Computational Biology, 5(11):e1000579, 2009.
[44] S. Ravi and H. Larochelle. Optimization as a model for fewshot learning. In International Conference on Learning Representations, 2017.
[45] E. Real, S. Moore, A. Selle, S. Saxena, Y. L. Suematsu,
Q. Le, and A. Kurakin. Large-scale evolution of image classifiers. In International Conference on Machine Learning,
2017.
[46] S. Ren, K. He, R. Girshick, and J. Sun. Faster R-CNN: Towards real-time object detection with region proposal networks. In Advances in Neural Information Processing Systems, pages 91–99, 2015.
[47] S. Saxena and J. Verbeek. Convolutional neural fabrics. In
Advances in Neural Information Processing Systems, 2016.
[48] T. Schaul and J. Schmidhuber. Metalearning. Scholarpedia,
2010.
[49] F. Schroff, D. Kalenichenko, and J. Philbin. Facenet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE Conference on Computer Vision and
Pattern Recognition, pages 815–823, 2015.
[50] J. Schulman, F. Wolski, P. Dhariwal, A. Radford, and
O. Klimov. Proximal policy optimization algorithms. arXiv
preprint arXiv:1707.06347, 2017.
[51] A. Shrivastava, R. Sukthankar, J. Malik, and A. Gupta. Beyond skip connections: Top-down modulation for object detection. arXiv preprint arXiv:1612.06851, 2016.
[52] K. Simonyan and A. Zisserman. Very deep convolutional
networks for large-scale image recognition. In International
Conference on Learning Representations, 2015.
[53] J. Snoek, H. Larochelle, and R. P. Adams. Practical Bayesian
optimization of machine learning algorithms. In Neural Information Processing Systems, 2012.
[54] J. Snoek, O. Rippel, K. Swersky, R. Kiros, N. Satish, N. Sundaram, M. Patwary, M. Ali, R. P. Adams, et al. Scalable
Bayesian optimization using deep neural networks. In International Conference on Machine Learning, 2015.
[55] N. Srivastava, G. E. Hinton, A. Krizhevsky, I. Sutskever, and
R. Salakhutdinov. Dropout: a simple way to prevent neu-
[56]
[57]
[58]
[59]
[60]
[61]
[62]
[63]
[64]
[65]
[66]
[67]
[68]
[69]
[70]
ral networks from overfitting. Journal of Machine Learning
Research, 15(1):1929–1958, 2014.
K. O. Stanley, D. B. D’Ambrosio, and J. Gauci. A
hypercube-based encoding for evolving large-scale neural
networks. Artificial Life, 2009.
C. Szegedy, S. Ioffe, V. Vanhoucke, and A. Alemi. Inceptionv4, Inception-Resnet and the impact of residual connections
on learning. In International Conference on Learning Representations Workshop Track, 2016.
C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed,
D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich.
Going deeper with convolutions. In IEEE Conference on
Computer Vision and Pattern Recognition, 2015.
C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna.
Rethinking the Inception architecture for computer vision. In
IEEE Conference on Computer Vision and Pattern Recognition, 2016.
D. Ulyanov, A. Vedaldi, and V. Lempitsky. Instance normalization: The missing ingredient for fast stylization. arXiv
preprint arXiv:1607.08022, 2016.
J. X. Wang, Z. Kurth-Nelson, D. Tirumala, H. Soyer,
J. Z. Leibo, R. Munos, C. Blundell, D. Kumaran, and
M. Botvinick. Learning to reinforcement learn. arXiv
preprint arXiv:1611.05763, 2016.
T. Weyand, I. Kostrikov, and J. Philbin. Planet-photo geolocation with convolutional neural networks. In European
Conference on Computer Vision, 2016.
O. Wichrowska, N. Maheswaranathan, M. W. Hoffman, S. G.
Colmenarejo, M. Denil, N. de Freitas, and J. Sohl-Dickstein.
Learned optimizers that scale and generalize. arXiv preprint
arXiv:1703.04813, 2017.
D. Wierstra, F. J. Gomez, and J. Schmidhuber. Modeling
systems with internal state using evolino. In The Genetic
and Evolutionary Computation Conference, 2005.
R. J. Williams. Simple statistical gradient-following algorithms for connectionist reinforcement learning. In Machine
Learning, 1992.
L. Xie and A. Yuille. Genetic CNN. arXiv preprint
arXiv:1703.01513, 2017.
S. Xie, R. Girshick, P. Dollár, Z. Tu, and K. He. Aggregated
residual transformations for deep neural networks. In Proceedings of the IEEE Conference on Computer Vision and
Pattern Recognition, 2017.
X. Zhang, Z. Li, C. C. Loy, and D. Lin. Polynet: A pursuit
of structural diversity in very deep networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern
Recognition, 2017.
X. Zhang, X. Zhou, L. Mengxiao, and J. Sun. Shufflenet: An
extremely efficient convolutional neural network for mobile
devices. arXiv preprint arXiv:1707.01083, 2017.
B. Zoph and Q. V. Le. Neural architecture search with reinforcement learning. In International Conference on Learning
Representations, 2017.
Appendix
A. Experimental Details
A.1. Dataset for Architecture Search
The CIFAR-10 dataset [31] consists of 60,000 32x32
RGB images across 10 classes (50,000 train and 10,000
test images). We partition a random subset of 5,000 images
from the training set to use as a validation set for the controller RNN. All images are whitened and then undergone
several data augmentation steps: we randomly crop 32x32
patches from upsampled images of size 40x40 and apply
random horizontal flips. This data augmentation procedure
is common among related work.
A.2. Controller architecture
The controller RNN is a one-layer LSTM [22] with 100
hidden units at each layer and 2 × 5B softmax predictions
for the two convolutional cells (where B is typically 5) associated with each architecture decision. Each of the 10B
predictions of the controller RNN is associated with a probability. The joint probability of a child network is the product of all probabilities at these 10B softmaxes. This joint
probability is used to compute the gradient for the controller
RNN. The gradient is scaled by the validation accuracy of
the child network to update the controller RNN such that the
controller assigns low probabilities for bad child networks
and high probabilities for good child networks.
Unlike [70], who used the REINFORCE rule [65] to update the controller, we employ Proximal Policy Optimization (PPO) [50] with learning rate 0.00035 because training with PPO is faster and more stable. To encourage exploration we also use an entropy penalty with a weight of
0.00001. In our implementation, the baseline function is
an exponential moving average of previous rewards with a
weight of 0.95. The weights of the controller are initialized
uniformly between -0.1 and 0.1.
A.3. Training of the Controller
For distributed training, we use a workqueue system
where all the samples generated from the controller RNN
are added to a global workqueue. A free “child” worker in
a distributed worker pool asks the controller for new work
from the global workqueue. Once the training of the child
network is complete, the accuracy on a held-out validation set is computed and reported to the controller RNN.
In our experiments we use a child worker pool size of 450,
which means there are 450 networks being trained on 450
GPUs concurrently at any time. Upon receiving enough
child model training results, the controller RNN will perform a gradient update on its weights using PPO and then
sample another batch of architectures that go into the global
workqueue. This process continues until a predetermined
number of architectures have been sampled. In our experiments, this predetermined number of architectures is 20,000
which means the search process is terminated after 20,000
child models have been trained. Additionally, we update the
controller RNN with minibatches of 20 architectures. Once
the search is over, the top 250 architectures are then chosen
to train until convergence on CIFAR-10 to determine the
very best architecture.
A.4. Details of architecture search space
We performed preliminary experiments to identify a flexible, expressive search space for neural architectures that
learn effectively. Generally, our strategy for preliminary experiments involved small-scale explorations to identify how
to run large-scale architecture search.
• All convolutions employ ReLU nonlinearity. Experiments with ELU nonlinearity [10] showed minimal
benefit.
• To ensure that the shapes always match in convolutional cells, 1x1 convolutions are inserted as necessary.
• Unlike [24], all depthwise separable convolution do
not employ Batch Normalization and/or a ReLU between the depthwise and pointwise operations.
• All convolutions followed an ordering of ReLU, convolution operation and Batch Normalization following
[21].
• Whenever a separable convolution is selected as an operation by the model architecture, the separable convolution is applied twice to the hidden state. We found
this empirically to improve overall performance.
A.5. Training with stochastic regularization
We performed several experiments with various stochastic regularization methods. Naively applying dropout [55]
across convolutional filters degraded performance. However, when training NASNet models, we found that stochastically dropping out each path (i.e., edge with a yellow box
in Figure 4) in the cell with some fixed probability to be an
effective regularizer. This is similar to [27] and [68] where
they dropout full parts of their model during training and
then at test time scale the path by the probability of keeping that path during training. Interestingly we found that
linearly increasing the probability of dropping out a path
over the course of training to significantly improve the final
performance for both CIFAR and ImageNet experiments.
A.6. Training of CIFAR models
All of our CIFAR models use a single period cosine decay as in [38, 18]. All models use the momentum optimizer
with momentum rate set to 0.9. All models also use L2
weight decay. Each architecture is trained for a fixed 20
epochs on CIFAR-10 during the architecture search process.
Additionally, we found it beneficial to use the cosine learning rate decay during the 20 epochs the CIFAR models were
trained as this helped to further differentiate good architectures. We also found that having the CIFAR models use a
small N = 2 during the architecture search process allowed
for models to train quite quickly, while still finding cells
that work well once more were stacked.
A.7. Training of ImageNet models
We use ImageNet 2012 ILSVRC challenge data for large
scale image classification. The dataset consists of ∼ 1.2M
images labeled across 1,000 classes [11]. Overall our training and testing procedures are almost identical to [59]. ImageNet models are trained and evaluated on 299x299 or
331x331 images using the same data augmentation procedures as described previously [59]. We use distributed synchronous SGD to train the ImageNet model with 50 workers (and 3 backup workers) each with a Tesla K40 GPU [7].
We use RMSProp with a decay of 0.9 and epsilon of 1.0.
Evaluations are calculated using with a running average of
parameters over time with a decay rate of 0.9999. We use
label smoothing with a value of 0.1 for all ImageNet models as done in [59]. Additionally, all models use an auxiliary
classifier located at 2/3 of the way up the network. The loss
of the auxiliary classifier is weighted by 0.4 as done in [59].
We empirically found our network to be insensitive to the
number of parameters associated with this auxiliary classifier along with the weight associated with the loss. All
models also use L2 regularization. The learning rate decay scheme is the exponential decay scheme used in [59].
Dropout is applied to the final softmax matrix with probability 0.5.
B. Additional Experiments
We now present two additional cells that performed well
on CIFAR and ImageNet. The search spaces used for these
cells are slightly different than what was used for NASNetA. For the NASNet-B model in Figure 7 we do not concatenate all of the unused hidden states generated in the convolutional cell. Instead all of the hiddenstates created within
the convolutional cell, even if they are currently used, are
fed into the next layer. Note that B = 4 and there are 4 hiddenstates as input to the cell as these numbers must match
for this cell to be valid. We also allow addition followed by
layer normalization [2] or instance normalization [60] to be
predicted as two of the combination operations within the
cell, along with addition or concatenation.
For NASNet-C (Figure 8), we concatenate all of the unused hidden states generated in the convolutional cell like
in NASNet-A, but now we allow the prediction of addition
Figure 7. Architecture of NASNet-B convolutional cell with B =
4 blocks identified with CIFAR-10. The input (white) is the hidden
state from previous activations (or input image). Each convolutional cell is the result of B blocks. A single block is corresponds
to two primitive operations (yellow) and a combination operation
(green). As do we not concatenate the output hidden states, each
output hidden state is used as a hidden state in the future layers.
Each cell takes in 4 hidden states and thus needs to also create 4
output hidden states. Each output hidden state is therefore labeled
with 0, 1, 2, 3 to represent the next four layers in that order.
followed by layer normalization or instance normalization
like in NASNet-B.
C. Example object detection results
Finally, we will present examples of object detection results on the COCO dataset in Figure 9 and Figure 10. As can
be seen from the figures, NASNet-A featurization works
well with Faster-RCNN and gives accurate localization of
objects.
Figure 9. Example detections showing improvements of object detection over previous state-of-the-art model for Faster-RCNN with
Inception-ResNet-v2 featurization [28] (top) and NASNet-A featurization (bottom).
Figure 8. Architecture of NASNet-C convolutional cell with B =
4 blocks identified with CIFAR-10. The input (white) is the hidden state from previous activations (or input image). The output
(pink) is the result of a concatenation operation across all resulting branches. Each convolutional cell is the result of B blocks. A
single block corresponds to two primitive operations (yellow) and
a combination operation (green).
Figure 10. Example detections of best performing NASNet-A featurization with Faster-RCNN trained on COCO dataset. Top and
middle images courtesy of http://wikipedia.org. Bottom
image courtesy of Jonathan Huang
| 1cs.CV
|
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT
SOLVERS
arXiv:1510.00523v1 [cs.DS] 2 Oct 2015
TAKAHISA TODA AND TAKEHIDE SOH
Abstract. All solutions SAT (AllSAT for short) is a variant of
propositional satisfiability problem. Despite its significance, AllSAT has been relatively unexplored compared to other variants.
We thus survey and discuss major techniques of AllSAT solvers.
We faithfully implement them and conduct comprehensive experiments using a large number of instances and various types of solvers
including one of the few public softwares. The experiments reveal
solver’s characteristics. Our implemented solvers are made publicly
available so that other researchers can easily develop their solver
by modifying our codes and compare it with existing methods.
1. Introduction
Propositional satisfiability (SAT for short) is to decide if a Boolean
formula is satisfiable. SAT is ubiquitous in computer science. Because
of its significance, it has attracted the attention of many researchers
from theory to practice. Many applications have motivated empirical
studies, in particular the development of SAT solvers, softwares to solve
satisfiability. A fundamental task of SAT solvers is to solve as many
instances as possible in a realistic amount of time. To this end, various
practical algorithms and elegant implementation techniques have been
developed [56] [9] [40].
There are many variants of SAT. All solutions SAT (AllSAT for
short) or model enumeration is studied in the paper. It is, given a
CNF formula, to generate partial satisfying assignments such that they
form a logically equivalent DNF formula. Compared to neighboring
areas, AllSAT has been relatively unexplored. This is mentioned in
the literature [29] and also supported by the fact that there are only a
few recent papers, almost no software1 is publicly available, and it has
not even been taken up in major handbooks related to satisfiability.
A recent application of AllSAT is data mining. A fundamental task
in data mining is to generate all interesting patterns from a given database [26]. Examples include frequent itemsets, maximal frequent itemsets, or closed itemsets in transaction databases. Although algorithms
1A
few exceptions are clasp [21], picosat [10], and relsat [6]. Although they
support solution generation, they are positioned as an answer set solver, a single
solution SAT solver, and a #SAT solver rather than AllSAT solvers, respectively.
1
2
T. TODA AND T. SOH
for generating various patterns have been proposed, they are basically
specialized for their target patterns. This means that different patterns
require new algorithms. For this reason, a framework based on declarative paradigm has recently been proposed [24]. A basic flow is that
constrains of patterns to be generated are formulated as logical formulae and solved with a generic solver. Hence, all that users do is simply to
model their problems, not to design algorithms. Among much related
work, an approach on which problems are encoded into CNF formulae
and solved with AllSAT solvers has been studied [31]. An advantage of
declarative paradigm is its ability to handle new patterns in a flexible
manner. There is no need to see details of algorithms on which solvers
are based, thereby it is opened to wider users. It is instead inferior in
efficiency to problem-specific approaches. In practice it is necessary to
balance between efficiency and flexibility. Therefore, improving solver’s
performance is essential in the declarative framework.
Besides the data mining, there have been many studies on the application of ALLSAT, in particular to formal verification, such as network
verification [58] [38] [49], predicate abstraction [14], backbone computation [41], image and preimage computation in unbounded model
checking [25] [43] [51] [37] [20] [23].
Considering the above, we find it important to clarify state-of-theart techniques of AllSAT solvers and to improve them on a firm basis.
However, there are the following issues in the existing researches of
ALLSAT.
• Several methods are proposed but they are not globally compared. It is thus difficult to decide which method is effective for
which kinds of ALLSAT instances.
• Experiments are not carried out on comprehensive benchmarks.
• There is few public ALLSAT solver, which makes it difficult to
compare existing techniques.
We thus would like to survey major techniques of AllSAT solvers and
try to complement past references by gathering and organizing existing techniques. We further add some novel techniques. To evaluate
solvers, we conduct experimental comparisons, including clasp, one of
the few off-the-shelf softwares with solution generation support. Our
implemented solvers are made publicly available with expectation that
further improvement on solvers and their evaluation are easily done
and the AllSAT research is stimulated.
The paper is organized as follows. Section 2 provides related work of
AllSAT. Section 3 provides necessary notions, terminology, and results.
Section 4 surveys major techniques of AllSAT solvers, where those including our original ideas are indicated by adding asterisks to their
titles. Section 5 provides experimental results. Section 6 concludes the
paper.
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
3
2. Related Work
Another variant of SAT is the dualization of Boolean functions: given
a DNF formula of a Boolean function f , it is to compute the complete
DNF formula of the dual function f d . Since a CNF formula of f d
can be easily obtained by interchanging logical disjunction with logical conjunction as well as the constants 0 with 1, a main part is to
convert CNF to the complete DNF. Hence, an essential difference from
AllSAT is that the resulting DNF formula must be complete. Dualization has been well-studied in terms of complexity [18] [15], while there
seems no recent empirical study with a few exceptions [33] [11] [30] [54].
Practical algorithms for a restricted form of dualization have been presented [53] [46] and some implementations are available2, though they
are not for arbitrary Boolean functions.
Another variant is the problem of counting the number of total satisfying assignments, called propositional model counting or #SAT. It
has been well-studied because of good applications such as probabilistic
inference problems and hard combinatorial problems, and some solvers
are available [9]. Although #SAT is apparently similar to AllSAT,
techniques such as connected components and component caching are
inherent in counting, and they are not applicable to AllSAT as is [44].
3. Preliminaries
Necessary notions, terminology, and results concerning Boolean functions, satisfiability solvers, and binary decision diagrams are presented
in this section.
3.1. Boolean Basics. A literal is a Boolean variable or its negation. A
clause is a finite disjunction of literals, and a term is a finite conjunction
of literals. A propositional formula is in conjunctive normal form (CNF
for short) if it is a finite conjunction of clauses and in a disjunction normal form (DNF for short) if it is a finite disjunction of terms. We identify clauses with sets of literals and CNF formulae with sets of clauses.
The same applies to terms and DNFs. The dual of a Boolean function
f is the function f d defined by f d (x1 , . . . , xn ) = ¬f (¬x1 , . . . , ¬xn ). An
implicant of a Boolean function f is a term t with t ≤ f , where t is
considered as a Boolean function and the order of Boolean functions is
introduced as t ≤ f if t(v) ≤ f (v) for all v ∈ {0, 1}n . An implicant is
prime if the removal of any literal results in a non-implicant. A DNF
formula is complete if it consists of all prime implicants.
2Hypergraph
Dualization Repository, by Keisuke Murakami and Takeaki Uno,
http://research.nii.ac.jp/~uno/dualization.html, accessed on 19th Jan.,
2013. HTC-DD: Hypergraph Transversal Computation with Binary Decision Diagrams, by Takahisa Toda at ERATO MINATO Discrete Structure Manipulation
System Project, Japan Science and Technology Agency, at Hokkaido University,
http://www.sd.is.uec.ac.jp/toda/htcbdd.html, accessed on 10th Sept., 2015.
4
T. TODA AND T. SOH
An assignment to a set V of Boolean variables is a partial function
from V to {0, 1}. A satisfying assignment for a CNF formula is an assignment ν such that the CNF formula evaluates to 1. An assignment
to V is total (or complete) if it is a total function, that is, all variables in
V are assigned values. A Boolean formula is satisfiable if it has a satisfying assignment. For simplicity, we say that a literal is assigned a value
v if the assignment to the underlying variable makes the literal evaluate
to v. If there is no fear of confusion, we identify an assignment function
ν over V with the set of the form {(x, v) ∈ V × {0, 1} | ν(x) = v}. We
further identify the assignment x 7→ v with x if v = 1 and with ¬x if
v = 0. In this way, assignments and literals are used interchangeably
throughout the paper.
Example 1. Consider the sequence of literals x1 , ¬x5 , x3 . This means
that x1 , x5 , x3 are selected in this order and the values 1, 0, 1 are assigned to them, respectively.
3.2. Satisfiability Solvers. Propositional satisfiability problem (SAT
for short) is the problem of deciding if there exists a satisfying assignment for a CNF formula. Algorithm 1 shows a basic framework on
which modern SAT solvers are based. For simplicity, other techniques
such as lazy data structures, variable selection heuristics, restarting,
deletion policy of learnt clauses are omitted. See for details [56] and [9].
A basic behavior of Algorithm 1 is to search a satisfying assignment
in such a way that a solver finds a candidate assignment by assigning
values to variables and if the assignment turns out to be unsatisfying, the solver proceeds to the next candidate by backtracking. The
extension of an assignment is triggered at the decide stage, where an
unassigned variable x is selected and a value v ∈ {0, 1} is assigned to x,
and it is then spread at the deduce stage, where assignments to other
variables are deduced from the most recent decision (x, v).
Decision assignments are those given at the decide stage and decision
variables are those assigned values there. Consider a decision tree
that branches at each decision assignment. A decision level is the
depth of that decision tree, which is maintained by the variable dl in
Algorithm 1. The decision level of a variable x, denoted by δ(x), is one
at which x was assigned a value. For a literal l, the notation δ(l) is
defined as that of the underlying variable, and l@d denotes that l, seen
as an assignment, was given at level d, i.e. δ(l) = d.
The deduce stage is described below. A clause is unit if all but one
of literals are assigned the value 0 and the remaining one is unassigned.
The remaining literal is called a unit literal. Unit clauses are important
in the deduce stage because assignments to the underlying variables of
unit literals are necessarily determined so that unit literals evaluate to
1. After some assignments are determined by unit clauses, non-unit
clauses may become unit. Hence, all implications are deduced until an
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
5
ALGORITHM 1: DPLL procedure with conflict driven clause learning,
where δ(x) denotes the decision level of a variable x.
Input: a CNF formula ψ, an empty assignment ν.
Output: SAT if ψ is satisfied; UNSAT, otherwise.
dl ← 0;
/* Decision level */
while true do
ν ← propagate (ψ, ν);
/* Deduce stage */
if conflict happens then
if dl ≤ 0 then return UNSAT;
bl ← analyze (ψ, ν);
/* Diagnose stage */
ν ← {(x, v) ∈ ν | δ(x) ≤ bl};
dl ← bl;
else
if all variables are assigned values then
report ν;
return SAT;
else
dl ← dl + 1;
/* Decide stage */
select an unassigned variable x and a value v;
ν ← ν ∪ {(x, v)};
end
end
end
unsatisfied clause exists or no unit clause exists. This process is called
unit propagation. The function propagate performs unit propagation.
Implied assignments are those given at this stage and implied variables
are those assigned values there. The decision level of an implied variable
x, the notations δ(x) and l@d, where l is a literal representing an
implied assignment, are defined in the same way.
Example 2. Consider the CNF formula ψ that consists of the following
clauses.
C1
C2
C3
C4
C5
=
=
=
=
=
x1 ∨ ¬x3
x2 ∨ x3 ∨ x5
¬x1 ∨ ¬x3 ∨ x4
x4 ∨ ¬x5 ∨ x6
x5 ∨ ¬x6
Assume the decision assignment ¬x5 @1. The implied assignment ¬x6 @1
is obtained from C5 . Assume the decision assignment x3 @2. The implied assignments x1 @2 and x4 @2 are obtained from C1 and C3 in this
6
T. TODA AND T. SOH
¬
¬
¬
¬
¬
Figure 1. A conflict graph, where arcs are labeled with
antecedents of their target vertices.
order. Assume the decision assignment x2 @3, and the CNF formula is
satisfied.
It should be noted that in the middle of unit propagation, we may
encounter with an unsatisfied clause. This case is called conflict. As
soon as conflict happens, unit propagation halts, even though unit
clauses still remain. In conflict case, if all assigned variables are those
assigned prior to any decision (i.e. dl = 0), it means that there are
no other assignments to be examined, thereby a CNF formula must be
unsatisfiable. In that case, a solver halts, reporting UNSAT. If decision
has been made at least once, we enter into the diagnose stage to resolve
conflict.
At the diagnose stage, a ”cause” of the conflict we have just met is
analyzed, a new clause is learnt as a result, and it is added to a CNF
formula, by which a solver is guided not to fall into the conflict again
(and other conflicts related to it). To do this efficiently, modern solvers
maintain an implication graph during search, which represents an implication relation between assignments over unit propagation. Specifically, an implication graph is a directed acyclic graph G = (V, A) such
that
• vertices in V correspond to literals l representing assignments
to their variables;
• arcs in A correspond to implications so that if a unit clause C
with unit literal l yields in unit propagation, then arcs from all
assignments to underlying variables in C \ {l} to the implied
assignment l are added;
• if an unsatisfied clause exists, then arcs from all assignments to
underlying variables in that clause to the special vertex κ are
added.
An implication graph might be implemented so that whenever a variable x is implied, it is associated with the clause that determined the
assignment to x as a unit clause. This clause is called the antecedent
of x.
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
7
Example 3. Consider the CNF formula ψ given in Example 2. Assume in turn the decision assignments ¬x4 @1, ¬x6 @2, and ¬x2 @3 in
this order. The resulting implication graph is shown in Fig. 1. This
case results in conflict because C1 becomes unsatisfied.
A conflict graph is a subgraph H of an implication graph G obtained
by restricting G so that all vertices have paths to κ. For a subset U
of vertices in a conflict graph H = (V, A), the arc-cut (hereafter cut)
corresponding to U is the set of arcs that connect vertices in U with
those in V \ U . Examples are illustrated by dotted curves in Fig. 1.
We are now ready to describe a clause learning scheme, which is
performed by the function analyze. Consider cuts such that all decision
assignments are on one side, called the reason side, and the special
vertex κ is on the other side, called the conflict side. Take negation of
literals on reason side that are incident to arcs in a cut, which form a
conflict-driven clause (or conflict clause). This clause is considered as
a ”cause” of conflict. Indeed,if variables are assigned values following
literals on reason side that are incident to arcs in a cut, then the same
implications on conflict side are derived and the same conflict must
take place. Therefore, to avoid the conflict, it is necessary for variables
to be assigned values so that at least one of those literals is negated.
This condition is formulated as the conflict clause obtained above.
As illustrated in Fig. 1, there are many choices for cuts that induce
conflict clauses. Among them, conflict clauses that contain exactly one
literal from the current decision level are known to be effective. A
unique implication point (UIP for short) is a vertex in a conflict graph
such that every path from the decision at the current decision level to
κ passes through it. Note that at least one UIP exists, because the
decision at the current decision level is a UIP. The first UIP scheme is
to find the UIP that is the closest to κ.
Example 4. Consider the conflict graph given in Fig. 1. The middle
curve gives the first UIP x3 . Hence, a conflict clause is x4 ∨ ¬x3 .
The first UIP scheme can be efficiently performed by traversing a
conflict graph from κ in the reverse order of implications, based on
the implementation of an implication graph stated above. During the
traversal, it is easy to decide if the current literal is a UIP. Consider
the cut that induces a UIP. For all literals on the reason side, their
assignments are determined prior to those on the conflict side. Since
the traversal is in the reverse order of implications, the UIP can then
be located by keeping track of the number of unvisited vertices that
are immediate neighbors of visited vertices.
All that remains is to decide a backtrack level bl, cancel all assignments above bl, and set bl to the current decision level. To decide a
backtracking level, there are two choices. Suppose that the decision p
at level i resulted in conflict and there is no solution that extends the
8
T. TODA AND T. SOH
current assignment. Chronological backtracking cancels all assignments
of level i including the decision p and attempts to find a solution by
extending the assignment from level i − 1 with a conflict clause. In
this way, chronological backtracking undoes assignments from a higher
to a lower level. A drawback is that if there is no solution in higher
levels, it is hard to get out of those levels. On the other hand, nonchronological backtracking jumps at once to a lower level j by canceling
all assignments above j and attempts to find a solution upward by extending assignment from level j. The backtracking level j is commonly
determined as the largest level of a variable in a conflict clause below
the current level i. For each canceled assignment between the levels j
and i, the possibility for becoming a solution is left in general, though
this does not mean that a solver loses an opportunity to find solutions.
Example 5. Consider the conflict graph given in Fig. 1. Since a conflict clause is x4 ∨¬x3 , the non-chronological backtrack level is 1. Hence,
the assignments ¬x6 @2, ¬x5 @2 are canceled and search restarts from
¬x4 @1, however a solution could be obtained by backtracking to the level
2.
Remark 1. When a conflict clause is learnt, an assignment to its
unit literal is implied. Hence, the function analyze adds the implied
assignment to the current assignment function ν, by which its effect to
other assignments is taken at a subsequent propagation.
3.3. Binary Decision Diagrams. A binary decision diagram (BDD
for short) is a graphical representation of Boolean functions in a compressed form [36] [1] [12]. We follow the notation and terminology in
Knuth’s book [35].
Figure 2 shows an example of a BDD. Exactly one node has indegree
0, which is called the root. Each branch node f has a label and two
children. Node labels are taken from variable indices, and the children
consists of the LO child and the HI child. The arc to a LO child is
called LO arc, illustrated by a dotted arrow, and the LO arc of f means
assigning the value 0 to the variable of f . Similarly, the arc to a HI
child is called HI arc, illustrated by a solid arrow, and the HI arc of f
in turn means assigning the value 1 to its variable. There are two sink
nodes, denoted by > and ⊥. Paths from the root to > and ⊥ mean
satisfying and unsatisfying assignments, respectively.
BDDs are called ordered if for any node u with a branch node v as
its child, the index of u is less than that of v. BDDs are called reduced
if the following reduction operations can not be applied further.
(1) If there is a branch node u whose arcs both point to v, then
redirect all the incoming arcs of u to v, and then eliminate u
(Fig. 3(a)).
(2) If there are two branch nodes u and v such that the subgraphs
rooted by them are equivalent, then merge them (Fig. 3(b)).
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
⊥
1
2
3
9
>
Figure 2. The BDD representation for the function:
f (x1 , x2 , x3 ) = x1 ∧ ¬x2 ∨ x3 .
i
"
j
|
j
+3
i
jv
(a) Node elimination
i
(
k
iu
j
+3
(
k
(b) Node merging
Figure 3. The reduction rules
In this paper, ordered reduced BDDs are simply called BDDs. Ordered
BDDs that need not be fully reduced are distinguished from ordinary
BDDs by calling OBDDs. Note that each node in a BDD (or an OBDD)
is conventionally identified with the subgraph rooted by it, which also
forms BDD (or OBDD).
4. Techniques of All Solutions SAT Solvers
In order to implement an efficient AllSAT solver, we have to carefully
determine an appropriate suite of techniques by considering various
factors and their characteristics. Some details have been mentioned
only partly and scattered in past references. We survey major existing
techniques of AllSAT solvers and try to complement past references
by gathering and organizing existing techniques. We further add some
novel techniques.
This section is organized as follows. Three major types of solvers
are presented in their own subsections. Each subsection starts with an
overview, then provides specific techniques, and ends with the configuration of our implemented solvers. We added an asterisk to the title
of each specific technique that contains our original ideas.
4.1. Blocking Solvers.
4.1.1. Overview. One of the easiest ways of implementing an AllSAT
solver is to repeatedly run an ordinary SAT solver as a black box and
find satisfying assignments one by one. A specific procedure is as follows.
10
T. TODA AND T. SOH
(1)
(2)
(3)
(4)
Run a SAT solver with a CNF formula ψ.
If ψ is unsatisfiable, halt.
Report a found total satisfying assignment ν.
Compute the clause C of the form {x | ν(x) = 0}∪{¬x | ν(x) = 1}
in a set notation.
(5) Add C to ψ and go to Step 1.
The clause obtained at Step 4 is called a blocking clause [43]. Since
the blocking clause C is the complement of the term corresponding
to ν, the extended CNF formula ψ ∪ {C} is not satisfied by ν in a
later search, thereby a new solution will be found in each repetition.
Furthermore, since ν is total, no assignment other than ν is blocked.
Example 6. Execute the procedure with the CNF formula:
ψ = (x1 ∨ ¬x2 ) ∧ (x2 ∨ ¬x3 ) ∧ (x3 ∨ ¬x1 ).
Suppose a solver returns the satisfying assignment ¬x1 , ¬x2 , ¬x3 . The
blocking clause x1 ∨ x2 ∨ x3 is added to ψ:
ψ = (x1 ∨ ¬x2 ) ∧ (x2 ∨ ¬x3 ) ∧ (x3 ∨ ¬x1 ) ∧ (x1 ∨ x2 ∨ x3 ).
The solver then returns the satisfying assignment x1 , x2 , x3 . The blocking clause ¬x1 ∨ ¬x2 ∨ ¬x3 is added to ψ:
ψ = (x1 ∨¬x2 )∧(x2 ∨¬x3 )∧(x3 ∨¬x1 )∧(x1 ∨x2 ∨x3 )∧(¬x1 ∨¬x2 ∨¬x3 ).
This time a solver returns UNSAT, which means all satisfying assignments are found.
Since a blocking clause has size equal to the number of variables,
unit propagation is likely to slow down. Hence, it is arguably better
to consider blocking clauses that consist only of decisions, which we
call a decision-based blocking clause for convenience. Since decisions
determine the other assignments, decision-based blocking clauses have
the same effect as those of all literals. However, to know which literals
are decisions, we need to modify a solver code. Algorithm 2 is a pseudo
code obtained by modifying Algorithm 1. For convenience, we simply
call this blocking procedure to distinguish it from the other procedures
presented later. Only lines 5,12-16 are changed. At line 5 and 12, a
solver halts because dl ≤ 0 means that all variables are implied without
any decision and all solutions are found. At line 15, all assignments
except for those determined without any decision are canceled, and at
line 16 a solver backtracks to the root level.
A decision-based blocking clause only blocks a single assignment and
there are as many number of blocking clauses as total satisfying assignments. Since they are stored, it is likely to result in space explosion and
slow down of unit propagation. This is considered as a serious issue
since unit propagation in modern SAT solvers occupies the majority
of a whole processing time. Another disadvantage is that whenever a
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
11
ALGORITHM 2: Blocking procedure, where δ(x) denotes the decision
level of x.
Input: a CNF formula ψ, an empty assignment ν.
Output: all satisfying assignments.
dl ← 0;
/* Decision level */
while true do
ν ← propagate (ψ, ν);
/* Deduce stage */
if conflict happens then
if dl ≤ 0 then halt;
bl ← analyze (ψ, ν);
/* Diagnose stage */
ν ← {(x, v) ∈ ν | δ(x) ≤ bl};
dl ← bl;
else
if all variables are assigned values then
report ν;
if dl ≤ 0 then halt;
compute a blocking clause C from ν;
ψ ← ψ ∪ {C};
ν ← {(x, v) ∈ ν | δ(x) = 0};
dl ← 0;
else
dl ← dl + 1;
/* Decide stage */
select an unassigned variable x and a value v;
ν ← ν ∪ {(x, v)};
end
end
end
solution is found, a solver is enforced to restart from scrach with an
extended CNF formula, not resuming search.
On the other hand, the blocking clause-based implementation might
be considered as a good choice for such instances as even one solution
is hard to find or for instances with a small number of solutions. It is
easily implementable, because the blocking clause mechanism can be
realized outside a solver or with a small modification on a solver code as
demonstrated in Algorithm 2. We can benefit from powerful techniques
of modern SAT solvers such as conflict-driven clause learning, nonchronological backtracking, and so on.
Remark 2. Once blocking clauses are added to a CNF formula, they
are not deleted afterward and must not be treated in the same way
as conflict clauses. Otherwise, solutions would be rediscovered many
times, which is not allowed in the paper.
12
T. TODA AND T. SOH
4.1.2. Simplifying Satisfying Assignments. Simplification of satisfying
assignments is to obtain from a satisfying assignment ν to a CNF formula ψ a smaller assignment3 ν 0 that still makes ψ evaluate to 1. This
is done by canceling assignments to redundant variables in ν, where
redundant means either value is assigned without effect on the value
of ψ. A simplified assignment is partial in general and it represents a
set of total assignments, including the original assignment and possibly other satisfying assignments. Variable lifting refers to a number of
such simplification techniques [50]. Since this topic is well-summarized
in the literature [44], we do not go into details. The interested readers
are referred to it, as well as the references therein. For recent results,
see also the literature [57].
Simplification allows us to obtain from a single solution possibly exponentially many solutions in a compact form, i.e., as a partial assignment. It is desirable if we can obtain a partial assignment of minimum
size, however minimization is known to be computationally hard, and
in practice we have to compromise with near-minimum assignment by
means of approximation4. To combine simplification with the blocking
mechanism of Algorithm 2, it suffices to perform simplification just before line 13 and then to take complement of decisions in a simplified
assignment. It should be noted that if a simplified blocking clause is
empty, that is, all variables except for implied ones turn out to be redundant, then it means that all remaining solutions are covered. Thus,
in that case, a solver must be halted. Thanks to simplification, the
number of blocking clauses may be largely reduced, which leads to a
good effect on unit propagation at the cost of performing simplification.
Example 7. Consider the CNF formula ψ given in Example 2. The
assignments ¬x5 @1, ¬x6 @1, x3 @2, x1 @2, x4 @2, x2 @3 were given in this
order. The last decision is redundant. By removing it, we obtain the
partial assignment ¬x5 @1, ¬x6 @1, x3 @2, x1 @2, x4 @2. Consider the decision assignments ¬x5 @1 and x3 @2, by which the other variables are
implied or can be assigned either value. By flipping those assignments,
we obtain the simplified blocking clause C6 = x5 ∨ ¬x3 .
4.1.3. Continuing Search. In Algorithm 2, whenever a solution is found,
a solver is enforced to backtrack to the root level. After that, due to
a variable selection heuristic, a different assignment will be examined
and a region of the search space in which a solution was just found
remains incomplete, which may give rise to unnecessary propagations
and conflicts in a later search for that region. Restart is, however,
essential in AllSAT solving in particular when simplification is used.
Indeed after simplification is performed and a new clause is added, the
3We
say that an assignment ν 0 is smaller than ν if all variables x assigned values
in ν are also assigned values in ν and their values coincide, i.e., ν(x) = ν 0 (x).
4Even computing a minimal satisfying assignment requires quadratic time, which
is still expensive.
0
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
13
state of implications such as which literals are decisions becomes inconsistent, and it is necessary to deduce implications again. It is not
straightforward to answer how to continue search [32].
The problem of over-canceling due to backtracking was addressed [47],
and a simple technique, called progress saving, that stores recent canceled decisions in an array and simulates them after backtracking was
proposed. Specifically, any time a solver enters into the decide stage, it
checks if an assignment to a selected variable is stored, and it simulates
the previous decision if exists; otherwise, it follows a default heuristic.
Although this technique was proposed in the context of SAT, it is also
applicable to AllSAT.
Example 8. Continuing Example 7, suppose that we added the blocking
clause C6 to ψ and backtracked to the root level with progress saving
enabled. At this point, all assignments above the root level are canceled,
yet the previous decisions (x5 , 0), (x3 , 1) are stored in an array. If x5
or x3 is selected, the previous decision is made again.
4.1.4. Implementation. We implemented 4 programs based on blocking procedure according to whether simplification and continuation
techniques are selected or not.
For a simplification technique, we used a method related to set covering model [44] and decision-based minimal satisfying cube [57]. For the
sake of efficiency, near-minimal satisfying assignments are computed.
A basic idea is that given a total assignment, we select as a small number of decision variables as make a CNF formula evaluate to 1. This is
done in the following way:
(1) select all decision variables that related to implications of at
least one variable;
(2) for each clause that is not satisfied by selected variables, select arbitrary decision variable that makes the current clause
satisfied.
A simplified satisfying assignment then consists of assignments to the
selected decision variables and all implied variables. By flipping the assignments to the selected decisions, we obtain a blocking clause, which
blocks all total assignments represented by the simplified assignment.
We implemented a continuation technique so that before backtracking at line 15, all decisions are stored in an array and after backtracking,
we simulate these decisions whenever possible in the order of their decision levels. Clearly, not all decisions are assumed due to blocking
clause, and conflict or contradiction to the previous decision will happen. It is this point where a solver continues search, and we will then
enter into the conflict resolution or the decide stage.
4.2. Non-blocking Solvers.
4.2.1. Overview. We give a basic idea for an AllSAT procedure without the aid of blocking clauses. Like blocking procedure, we modify
14
1
2
3
4
5
T. TODA AND T. SOH
ALGORITHM 3: Chronological backtracking in non-blocking procedure,
where δ(y) denotes the decision level of y.
Input: an assignment ν, the current decision level dl.
Output: updated objects ν, dl.
(x, v) ← the decision assignment of level dl;
ν ← {(y, w) ∈ ν | δ(y) ≤ dl − 1};
dl ← dl − 1;
ν ← ν ∪ {(x, v̄)}, where v̄ is the opposite value from v;
return ν, dl;
−1∗
−20∗ 19 9
−15
−8
12
−18∗ 2
−5 −17
−10 11 −14 13
−6
−3 7
4
16∗
(a) Solution Found
−1∗
−20∗
−8
−16∗
−7
19
12
−6
13
9
−15
18∗
11 2
−5 −3
(b) Conflict
−1∗
−20∗ 19 9
−15
−8
12 18∗ 6
−16 −3
(c) Conflict
Figure 4. Snapshots of a non-blocking solver’s state in
the three different cases (a),(b), and (c). Assignments
are given from left to right, top to bottom, separated by
line for each level. Integers i specify assignments such
that the variable x|i| is assigned the value 0 if i < 0
and 1 if i > 0. Decision assignments have an asterisk
as a superscript. Non-decision assignments with NULL
antecedent have an asterisk as a subscript.
Algorithm 1. A main feature is to employ chronological backtracking instead of non-chronological backtracking. The chronological backtracking used here is a bit different from the ordinary one described
in Section 3.2. As shown in Fig. 3, only differences are to insert the
flipped decision (x, v̄) in ν and register it to an implication graph so
that it has no incomming arc. This is because there is no reason that
implied flipped decisions because of the absence of blocking clauses.
We say that a literal, seen as an assignment, has NULL antecedent
if it has no reason that implied it and there is no incomming arc in
an implication graph. The chronological backtracking given above is
hereafter abbreviated as BT for convenience, and it is performed by
the function backtrack. We collectively call a number of procedures
for AllSAT solving based on BT non-blocking procedure in contrast
to blocking procedure presented in Section 4.1. If there is no fear of
confusion, chronological backtracking always means BT.
An important point in this approach is how we make BT compatible
with conflict-driven clause learning. Consider a conflict graph in clause
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
15
learning phase. Due to BT, a conflict graph may contain several roots,
i.e. assignments with NULL antecedent, in the same decision level. See
for example the literals ¬x20 and x18 in Fig. 5. Since an ordinary first
UIP scheme commonly assumes a unique root in the same decision level,
implementations based on that assumption get stuck in non-decision
literals with NULL antecedent. To resolve this problem, two techniques
are presented later.
Example 9. Look at Fig. 4. (a) All variables are assigned values without conflict, which means a solution is found. (b) Following BT, all
assignments of level 3 are canceled and the flipped decision x18 is inserted as a non-decision assignment at level 2. Since no propagation
takes place, a new decision ¬x16 is made and a subsequent propagation results in conflict. The decision is the only one that has NULL
antecedent in the current decision level, and ordinary first UIP scheme
suffices in this case. (c) From the conflict we have just met, the conflict
clause x6 ∨ x1 ∨ ¬x18 ∨ ¬x12 is learnt, and a solver backtracks to level
2. 5 The assignment x6 is implied by the conflict clause. A subsequent
propagation results in conflict again. This time, there is a non-decision
assignment with NULL antecedent in the same decision level.
A major advantage of non-blocking approach is that no matter how
many solutions exist, a performance of unit propagation does not deteriorate thanks to the absence of blocking clauses. Instead, it has to
find total satisfying assignments one by one. Hence, there is a limit in
the number of solutions to be generated in a realistic mount of time.
4.2.2. Sublevel-based First UIP Scheme. Grumberg et al. introduced
the notion of sublevels and presented a sublevel-based first UIP scheme
that is compatible with non-blocking approach [23]. A basic idea is to
divide a single decision level into sublevels. Specifically, a new sublevel
is defined whenever BT is performed, and sublevels are undefined as
their decision levels are undefined. An ordinary first UIP scheme can
then be applied in the current sublevel.
A conflict clause obtained by this approach may contain many literals that are below the current sublevel yet in the same decision level.
Among literals in that conflict clause, those with NULL antecedent are
necessary for avoiding rediscovery of solutions and can not be removed
if exist, however it is expected that other literals are reduced further.
4.2.3. Decision Level-based First UIP Scheme*. We present an alternative first UIP scheme that need not require sublevels. Our scheme
can be realized with a small modification: it is simply not to stop at
literals with NULL antecedent and attempt to find the first UIP in
5In
this case, there is no oppotunity to rediscover solutions by ordinary chronological backtracking, and hence the flipped decision x16 is not inserted. This technique is explained in more detail when non-chronological backtracking with level
limit is introduced.
16
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
T. TODA AND T. SOH
ALGORITHM 4: Non-blocking procedure with decision level-based first
UIP scheme.
Input: a CNF formula ψ, an empty variable assignment ν.
Output: all satisfying assignments.
dl ← 0;
/* Decision level */
lim ← 0;
/* Limit level */
while true do
ν ← propagate (ψ, ν);
/* Deduce stage */
if conflict happens then
if dl ≤ 0 then halt;
(ν, dl, lim) ← resolve (ψ, ν, dl, lim);
/* Resolve stage */
else
if all variables are assigned values then
report ν;
if dl ≤ 0 then halt;
(ν, dl) ← backtrack (ν, dl);
lim ← dl;
else
dl ← dl + 1;
/* Decide stage */
select an unassigned variable x and a value v;
ν ← ν ∪ {(x, v)};
end
end
end
the current decision level. A specific procedure is to traverse a conflict graph from κ in the reverse order of implications and construct a
conflict clause C, repeating the following procedure until the first UIP
appears:
(1) if the current literal is below the current decision level, add the
negated literal to C and do not go up through the incomming
arcs of the current literal;
(2) if the current literal has NULL antecedent, add the negated
literal to C;
(3) for the other case, go up through the incoming arcs of the current literal if their source vertices have not yet been visited.
After the first UIP is found, add the negated literal to C.
Compared to the sublevel-based first UIP scheme, the decision levelbased scheme might be considered better. First of all, it is simple. Secondly, a conflict clause contains unique literal from the current decision
level except for those with NULL antecedent. However, it should be
noted that conflict clauses obtained by the decision level-based scheme
are not necessarily smaller, because the unique implication point is further from κ and thus a conflict clause may contain more literals below
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
17
¬
¬
¬
¬
¬
¬
Figure 5. An implication graph for the conflict case (c)
in Fig. 4.
the current decision level. A pseudo code for the modified scheme is
omitted, because modification would be straightforward.
Example 10. Continuing Example 9, consider the conflict case (c)
in Fig. 4. Figure 5 illustrates the difference of the two schemes: the
sublevel-based scheme finds x6 as a first UIP and learns ¬x6 ∨ ¬x9 as
a conflict clause, while the decision level-based scheme finds ¬x20 as a
first UIP and learns x20 ∨ x1 ∨ ¬x18 as a conflict clause. Note that the
conflict clause in either case does not become unit after backtracking,
though it does not menace algorithmic correctness because of the flipped
decision x20 .
Remark 3. Recall that when the function analyze is performed, an
assignment to its unit literal is set to the current assignment function
ν. In non-blocking procedure, a conflict clause is not necessarily unit as
seen in Example 10. Hence, the function analyze in non-blocking procedure only adds a conflict clause, and it does not consider an induced
assignment.
Algorithm 4 is a pseudo code for the non-blocking approach using
clause learning with the decision level-based first UIP scheme. Recall
that the function backtrack is to backtrack chronologically, following
Algorithm 3. There are some choices for it, where a generic function,
named resolve, is called. A simple way of realizing the resolve stage is
to perform clause learning, based on either first UIP scheme and then
perform BT. More elaborate methods are introduced later, with which
resolve can also be replaced. Since the variable lim is used in one of
those methods, it is introduced when needed.
4.2.4. Conflict Directed Backjumping. Grumberg et al. augmented
non-blocking approach with conflict resolution by means of a restricted
non-chronological backtracking [23]. Their backtracking method can be
considered as a form of conflict directed backjumping (CBJ for short).
18
T. TODA AND T. SOH
CBJ has been studied as one of tree search algorithms for constraint
satisfaction problem [48] [13] [17].
A basic idea is described below. Consider the scenario where conflict
happens at decision level i+1, and after backtracking to level i, conflict
happens again. In this case, obtain a conflict clause cl1 from the former
conflict, while from the latter conflict, obtain a conflict clause cl2 so that
its UIP is ¬p, where p is the first UIP in the former analysis. Perform
resolution of cl1 and cl2 and obtain a resulting clause cl3 . After that,
backtrack to the level preceding the highest level in cl3 .
A pseudo code is given in Algorithm 5, which is almost faithfully
rephrased in our setting from the code given in the literature [23]. The
call of propagate at the end of the while loop was not explicitly written
in the original code, which we consider necessary. At this call, unit
propagation considers the effect of the recent flipped decision inserted
as a result of backtrack. Note that the effect of an assignment implied
by the recent conflict clause is not considered here, because our nonblocking procedure assumes that the function analysis simply records
a conflict clause and does not insert an implied assignment, which
is separately inserted at line 12. The halt means that non-blocking
procedure is halted too.
4.2.5. Non-chronological backtracking with Level Limit And Its Combination with CBJ*. We present an alternative conflict resolution by
means of non-chronological backtracking with backtrack level limit. To
our knowledge, this method was first presented by [22], though it was in
the context of answer set programming. We thus would like to import
their idea to our non-blocking procedure.
Since non-blocking procedure does not record blocking clauses, it
must not backtrack to arbitrary level, even though a backtracking level
is one that is legitimately derived from a conflict clause. However, we
can do this if there is no opportunity of rediscovering found solutions
from the derived level. We use the variable lim that holds a ”safe”
level to be backtracked, that is, the first level at which the current
assignment and the previous satisfying assignment differ.
A pseudo code is given in Algorithm 6. We call this approach nonchronological backtracking with level limit, denoted by BJ, where the
underline means a backtrack level is limited. Since lim is always less
than or equal to dl, BT is performed if and only if lim = dl. If lim < dl,
backtracking does not entail inserting a flipped decision (see Example 9). This is because lim < dl implies no solution yet found, and
hence no opportunity to rediscover solutions by backtracking.
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
19
ALGORITHM 5: Conflict resolution based on conflict-directed backjumping
Input: a CNF formula ψ, an assignment ν, the current decision level dl.
Output: updated objects ν, dl.
stack ← an empty stack;
while true do
if conflict happens then
if dl ≤ 0 then halt;
analyze (ψ, ν);
push the learnt conflict clause into stack;
(ν, dl) ← backtrack (ν, dl);
else if stack is not empty then
cl1 ← the clause popped from stack;
if cl1 is a unit clause then
unit ← the unit literal in cl1 ;
add unit, seen as an assignment, to ν so that it has antecedent
cl1 ;
ν ← propagate (ψ, ν);
if conflict happens then
if dl ≤ 0 then halt;
cl2 ← the conflict clause from the recent conflict with unit
as UIP;
cl3 ← the resolution of cl1 and cl2 ;
push cl3 into stack;
bl ← the highest level in cl3 ;
(ν, dl) ← backtrack (ν, bl);
end
end
else
break;
end
ν ← propagate (ψ, ν);
end
return ν, dl;
We furthermore present a combination6 of BJ and CBJ. This is obtained by replacing the else part in BJ, in which BT is performed, with
CBJ: that is,
(1) if lim is less than the current decision level, then perform BJ;
(2) otherwise, perform CBJ.
6It
is mentioned [22] that a combination of conflict-directed backjumping and
non-chronological backtracking is proposed. However, their pseudo code almost
corresponds to Algorithm 6 and it is different from that stated in this paper.
20
1
2
3
4
5
6
7
8
9
10
T. TODA AND T. SOH
ALGORITHM 6: Conflict resolution based on non-chronological backtracking with level limit
Input: a CNF formula ψ, an assignment ν, the current decision level dl, a
level limit lim.
Output: updated objects ν, dl, lim.
bl ← analyze (ψ, ν);
/* Diagnose stage */
if lim < dl then
if bl < lim then bl = lim;
ν ← {(x, v) ∈ ν | δ(x) ≤ bl};
dl ← bl;
else
(ν, dl) ← backtrack (ν, dl);
lim ← dl;
end
return ν, dl, lim;
Step 2 is selected only when lim equals the current decision level:
in other words, when conflict happens just after the current assignment diverged from the previous satisfying assignment. Hence, BJ is
preferentially applied when one or more decisions from the diverging
point are made. This is designed with expectation that more decisions
are made from the diverging point, more effectively BJ prunes search
space. Since BJ is likely to be more frequently applied, this approach
is denoted by BJ+CBJ.
4.2.6. Implementation. We implemented 8 programs based on nonblocking procedure according to which of the two first UIP schemes
is selected and which of the conflict resolution methods, i.e. BT, BJ,
CBJ, or BJ+CBJ, is selected, where BT means performing BT after
clause learning.
4.3. Formula-BDD Caching Solvers.
4.3.1. Overview. Formula caching refers to a number of techniques
to memorize formulae to avoid recomputation of subproblems [7]. Examples include a caching technique in probabilistic planning [39], conflict clauses in SAT [6] [42], component caching and other cachings in
#SAT [5] [4], and blocking clauses in AllSAT [43].
Another type of formula caching in which formulae are associated
with propositional languages such as FBDD, OBDD, and a subset of
d-DNNF has been studied in the context of knowledge compilation [28].
Their work revealed a correspondence between exhaustive DPLL search
and propositional languages. They also proposed speeding up compilation by exploiting techniques of modern SAT solvers through the
correspondence. Although exhaustive DPLL search is simply used for
efficiency in their compilation approach, compilation in turn can contribute to speeding up exhaustive DPLL search. Actually, if a CNF
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
21
formula is compiled into a BDD, all satisfying assignments can be generated simply by traversing all possible paths from the root to the
sink node >. This seems like taking a long way around to AllSAT
solving, however thanks to the caching mechanism, recomputation of
many subproblems can be saved. A connection to AllSAT was mentioned, however their primary concern is on the compilation to suitable
languages for required queries, not restricted to AllSAT. To our knowledge, comparisons have been conducted only between various compilers. An application to an AllSAT solver itself was more explicitly
mentioned in the literature [55] and a compiler-based AllSAT solver
is released. However, comparisons with other AllSAT solvers have not
been conducted yet and its power remains unknown. Similar caching
techniques appear in other areas such as preimage computation in unbounded model checking [51] [37] [34], satisfiability [45], and discrete
optimization [3] [8].
The paper only deals with the caching method that records pairs of
formulae and OBDDs, which we call formula-BDD caching. A formulaBDD caching can be embedded in either blocking procedure or nonblocking procedure7. This is done without almost any loss of optimizations employed in an underlying procedure. An exception is that
variables must be selected in a fixed order at the decide stage. This
effect is far from negligible in terms of efficiency, as is well-recognized
in a single solution SAT. It is, however, confirmed in experiments that
formula-BDD caching solvers exhibit a quite good performance on the
whole, and it provides an efficient solution method for instances that
have a huge number of solutions and can not possibly be solved by
other means.
4.3.2. Caching Mechanism. We give a basic idea of formula-BDD caching,
using a simple BDD construction method with formula-BDD caching.
This method is elaborated later by implementing on top of a SAT
solver. We first introduce terminology. A subinstance of ψ in an assignment ν is the CNF formula derived from ψ by applying all assignments
defined in ν to ψ. The current subinstance refers to the subinstance
induced by the current assignment.
Consider the following procedure with a CNF formula ψ and an
empty variable assignment ν as initial arguments:
(1) if an unsatisfied clause exists in the current subinstance, then
return ⊥;
(2) if all variables are assigned values, then return >;
(3) i ← the smallest index of an unassigned variable;
(4) f0 ← the result obtained by a recursive call with ψ and ν ∪
{(xi , 0)};
7Only
the combination with blocking procedure has been presented in the past
work [27] [55].
22
T. TODA AND T. SOH
(5) f1 ← the result obtained by a recursive call with ψ and ν ∪
{(xi , 1)};
(6) return a node with the label i, the references to LO child f0 and
to HI child f1 ;
Since different assignments can yield subinstances that are logically
equivalent, we want to speed up the procedure by applying dynamic
programming. To do this, we need to quickly decide if the current
subinstance is solved. If it is unsolved, we compute a BDD for all
solutions of the instance and memorize it, associating with the instance.
Otherwise, the result is obtained in a form of BDD and recomputation
is avoided.
However, this approach involves the equivalence test of CNF formulae, which is computationally intractable, as it includes satisfiability
testing. Hence, we consider a weaker equivalence test. That is, we
encode subinstances into formulae so that if two subinstances are not
logically equivalent, then the encoded formulae are not identical. To decide if the current subinstance is solved, it suffices to search the encoded
formula in the set of registered formula-BDD pairs. All requirements
for formula-BDD caching to work is simply the sentence in italic above,
and any encoding that meets it will do. It should be noted that our
test is sound in that acceptance always is a correct decision, however
if we prioritize efficiency of encoding excessively, logically equivalent
subinstances are very likely to result in non-identical formulae, i.e., a
wrong decision.
Examples of formula-BDD cachings include those induced by cutsets
and separators [27], defined below, and a variant of cutsets [55].
Definition 1. The i-th cutset of a CNF formula ψ is the set of clauses
C in ψ such that C has literals with their underlying variables xj and
xk satisfying j ≤ i < k. The cutwidth of ψ is the maximum size of a
cutset of ψ.
Definition 2. The i-th separator of a CNF formula ψ is the set of
variables xj such that some clause in the i-th cutset has a literal with
its underlying variable xj satisfying j ≤ i. The pathwidth of ψ is the
maximum size of a separtor of ψ.
Example 11. Look at the CNF formula ψ illustrated in Fig. 6. The
3-rd cutset of ψ consists of C2 and C3 , while the 3-rd separator of ψ
consists of x1 , x2 , and x3 . The cutwidth and the pathwidth of ψ are
both 3.
The following proposition states that clauses (and variables) in cutsets (and separators) meet the requirement of formula-BDD caching,
respectively. Proof is omitted. See [27].
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
23
Figure 6. A CNF formula (left )and an OBDD for the
CNF (right), where arcs to the sink node ⊥ is omitted. Cutsets are associated with arcs, where underlined
clauses mean they are satisfied.
Proposition 1. Let ψ be a CNF formula, where variables are ordered
according to their indices. Let ν and µ be assignments with the i-th or
less variables assigned values and other variables unassigned.
(1) If satisfied clauses in the i-th cutset of ψ in ν coincide with
those in µ, then the subinstance in ν is logically equivalent to
that in µ.
(2) If variables assigned the value 1 in the i-th separator of ψ in ν
coincide with those in µ, then the subinstance in ν is logically
equivalent to that in µ.
Example 12. Figure 6 illustrates an OBDD constructed using cutsets
as formula-BDD caching. Cutsets are associated with arcs, and satisfied
clauses in them are underlined. If two arcs have the same set of satisfied
clauses, Proposition 1 implies that their target vertices can be merged
safely.
It should be noted that our weaker equivalence test may reject logically equivalent subintances; the subgraphs in a constructed BDD that
correspond to those subinstances are not merged. This means that
a constructed BDD is not fully reduced, i.e., an OBDD, though the
OBDD give in Fig. 6 happens to be fully reduced.
An important point of the formula-BDD caching approach is how
to balance quality with efficiency in our weaker equivalence test. The
quality here refers to how many correct decisions are made. Theoretically, it holds that a correct decision of the separator approach always
implies a correct decision of the cutset approach. On the other hand,
the efficiency refers to how much time is taken to create formulae from
24
T. TODA AND T. SOH
subinstances, which substantially amounts to evaluating clauses and
variables in cutsets and separators, respectively. In terms of efficiency,
evaluating clauses in a cutset would require time linear to the total size
of clauses due to lazy evaluation mechanism if it is implemented on top
of modern SAT solvers. On the other hand, evaluating variables in a
separator requires time linear to the number of variables.
From the argument above, we can say that for instances with small
cutwidth, evaluation cost of cutset is negligible compared to separator
and hence cutset is a better choice, and for instances with many clauses,
separator should be used instead.
4.3.3. Embedding Formula-BDD Caching in AllSAT Procedure*. We
demonstrate how to embed formula-BDD caching in a concrete AllSAT
procedure. We take non-blocking procedure as an example. To our
knowledge, this is the first time that the combination is presented. The
other combination, i.e. blocking procedure with formula-BDD caching,
is omitted.
We have assumed so far that conflict clauses (and blocking clauses
in blocking procedure) are added to a CNF ψ, but from now on we
will assume that they are separately maintained from ψ. This makes
ψ unchanged throughout the execution of our AllSAT procedure. Accordingly, the cutset and the separator in each level are unchanged
too.
Algorithm 7 is a pseudo code of non-blocking procedure with formulaBDD caching embedded. Formula-BDD caching mechanism consists of
the encode stage, the extend stage, and the enroll stage.
At the encode stage, the function makef ormula receives a CNF ψ,
the current assignment ν, and the index i − 1 of the largest assigned
variable. It computes a formula for the current subinstance. No specific
encoding is presented here. See Section 4.3.2 for examples of encoding.
Note that if all variables are assigned values, then i must be ∞, and
hence we have i − 1 = ∞. In this case, let the function makef ormula
return 1, which is the special formula representing true.
At line 15, we search an entry with the key (i − 1, φ) in S, where
S holds registered formula-BDD pairs. If it exists, the current subinstance is already solved, and the result is the OBDD g associated with
the key, which appears as a subgraph of f . Hence, at the extend stage,
the function extendobdd augments an OBDD f by adding a path from
the root of f to the root of g, following the current assignment ν. It
returns the pair of the extended OBDD and the added path. Since this
stage is straightforward, we omit a pseudo code of it.
At the enroll stage, we associate formulae for solved subinstances
with the corresponding OBDDs and insert these formula-BDD pairs to
S. To do this, important points are how to identify when subinstances
are solved and how to find their OBDDs. Let I be a subinstance
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
25
with the smallest unassigned variable xi . Since unit propagation is
performed at the beginning of each repetition, without loss of generality
we assume that xi is a decision variable. This means that a formula
ζ has been made from I, thereby (i − 1, ζ) is in T . Let νI and dlI be
the assignment and the decision level at this point. Without loss of
generality we assume that there exist one or more solutions extending
νI , because otherwise, the OBDD for I is not created. After adding at
least one path to f , we have the node that corresponds to the decision
at variable xi . Clearly, this node is reachable from the root of f through
the path following νI , and it is the root of the OBDD for I. When all
solutions for I are found, to go out of the exhausted search space,
backtracking to a lower level than dlI is performed, which is directly
triggered by an occurrence of conflict implying no solution left or by
the discovery of the last solution. Backtracking to a lower level can also
be performed without exhausting all solutions, however this case only
happens when no solution of I is yet found. Hence, we can distinguish
them. Summarizing the above, if a backtracking level is less than dlI
and at least one solution for I is found, then I is solved, and the root
of the OBDD for I is located at the end of the path following νI , which
is a part of the assignment just before backtracking.
The function associate is in charge of the enroll stage. With the
observation above, it is called whenever backtracking is performed. A
procedure for it is given as follows. We scan all nodes h in the most
recently added path π until the assignment at h taken in π contradicts
to the current assignment. Note that scanned nodes h correspond to
subinstances Ih such that Ih turns out to be satisfiable and the assignment that induced Ih is a part of the current assignment. For each
scanned node h, we test if a backtracking level is less than the decision
level of h and a formula ζ was made8 from Ih . If the test is passed, the
pair of (j − 1, ζ) and h is inserted into S, where j is the label of h.
The function resolveplus behaves in the same way as reslove except
that S and T are updated each time backtracking is performed, as in
lines 19-20.
Example 13. Figure 7 illustrates how Algorithm 7 constructs an OBDD
for the CNF formula ψ given in Fig. 6.
4.3.4. Refreshing OBDDs*. A constructed OBDD may become too
large to be stored on memory, though it would be in practice much
better in size than the list representation of all solutions and in the
worst case equal to it except for constant factor. We present a simple
technique to resolve this problem. Let n be the number of variables.
We introduce a threshold θ of an OBDD size, where θ > n. Insert
the following procedure after an BDD is extended and backtracking is
8
This is equivalent to finding an entry (j − 1, ζ) in T , where j is the label of h.
26
T. TODA AND T. SOH
Figure 7. Progress of OBDD construction. As paths
are added one by one, an OBDD is augmented from left
to right. In each step, thick arcs represent a path that
is about to be added, and gray nodes mean that the
subintances corresponding to them were solved.
performed. If the size of an OBDD is larger than or equal to θ − n,
then the current OBDD f is dumped to a file in a secondary storage,
and all objects f , S, T , and π of formula-BDD caching mechanism are
refreshed with initial states. Since formula-BDD caching is almost independent of the underlying non-blocking procedure, after refreshing,
the procedure simply attempts to examine unprocessed assignments
with formula-BDD caching empty.
4.3.5. Implementation. We implemented 2 programs on each nonblocking procedure and 2 programs on each blocking procedure according to which formula-BDD caching is selected, cutset or separator.
5. Experiments
5.1. Implementation And Environment. All solvers are implemented
in C on top of MiniSat-C v1.14.1 [19]. Clasp 3.1.2 was taken from
Potassco project9. As far as we are aware, clasp [21], picosat [10], and
relsat [6] are only SAT solvers which support the enumeration of all
solutions. Among them, we used clasp for the comparison, because it
achieved better performance than picosat, and relsat does not support
quiet mode in solution generation and generated solutions may be too
large to be stored.
All experiments were performed on 2.13GHz Xeon R E7- 2830 with
512GB RAM, running Red Hat Enterprise Linux 6.3 with gcc compiler
version 4.4.7. In the execution of each AllSAT solver, time limit and
memory limit were set to 600 seconds and 50GB, respectively. If either
limit is exceeded, the solver is enforced to halt. All solvers simply touch
found solutions and never output them.
9Potassco,
the Potsdam Answer Set Solving Collection, bundles tools for Answer Set Programming developed at the University of Potsdam,http://potassco.
sourceforge.net/, accessed on 13rd Sept., 2015.
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
27
ALGORITHM 7: Non-blocking procedure with formula-BDD caching,
where δ(x) denotes the decision level of a variable x.
Input: a CNF formula ψ, an empty variable assignment ν.
Output: an OBDD f for all satisfying assignments.
dl ← 0;
/* Decision level */
lim ← 0;
/* Limit level */
f ← ⊥;
/* OBDD */
S ← {((∞, 1), >)};
/* Set of formula-BDD pairs */
T ← ∅;
/* Set of formulae with indices */
π ← ;
/* Sequence of BDD nodes */
while true do
ν ← propagate (ψ, ν);
/* Deduce stage */
if conflict happens then
if dl ≤ 0 then return f ;
(ν, dl, lim, S, T ) ← resolveplus (ψ, ν, dl, lim, S, T ); /* Resolve and
enroll stage */
else
i ← min {j | xj is not assigned value};
φ ← makeformula (ψ, ν, i − 1);
/* Encode stage */
if an entry with key (i − 1, φ) exists in S then
g ← the OBDD node associated with (i − 1, φ) in S;
(f, π) ← extendobdd (f, g, ν);
/* Extend stage */
if dl ≤ 0 then return f ;
S ← associate (π, ν, S, T, dl − 1);
/* Enroll stage */
T ← {(j − 1, ζ) ∈ T | δ(xj ) ≤ dl − 1};
(ν, dl) ← backtrack (ν, dl);
lim ← dl;
else
T ← T ∪ {(i − 1, φ)};
dl ← dl + 1;
/* Decide stage */
select a value v;
ν ← ν ∪ {(xi , v)};
end
end
end
The types of compared solvers are a blocking solver, a non-blocking
solver, a formula-BDD caching solver, and clasp. The first three types
have some variations according to which techniques are used (see the
end of each subsection in Section 4). Among solvers of the same type,
we selected a solver with the most solved instances. The selected
solvers, called representative solvers, are as follows.
• Blocking NoSimple Cont: the blocking solver with simplification unselected and continuation selected.
28
T. TODA AND T. SOH
• NonBlocking DLevel BJ: the non-blocking solver with decision level first UIP scheme and non-chronological backtracking
with level limit both selected.
• BDD Cut NonBlocking DLevel BJ: the formula-BDD caching
solver with cutset caching selected and it is implemented on top
of NonBlocking DLevel BJ.
Throughout the section, if there is no fear of confusion, they are abbreviated as Blocking, NonBLocking, and BDD. Notation for solvers
with other configurations is introduced in the same way.
It is known that variable orderings significantly affect the performance of BDD compilation. Hence, we used the software MINCE
version 1.0 [2] to decide a static variable order before the execution
of formula-BDD caching solvers. The execution of MINCE failed for
some instances, and for that case, we used the original order. The
time required for deciding a variable order is included. Although for
some instances time limit exceeded in preprocessing, it was negligible
for many instances.
5.2. Problem Instances. We used total 2867 CNF instances (all satisfiable), which are classified as follows.
• satlib: SATLIB benchmark problems (2707 instances), taken
from SATLIB website10.
• sc14: SAT Competition 2014 benchmarks, application track
(56 instances) and crafted track (65 instances), taken from SAT
Competition 2014 website11.
• iscas: ISCAS85 and 89 circuit benchmarks in DIMACS CNF
format (39 instances), taken from TG-Pro website12.
Among instances released in each repository, we selected all instances
such that satisfiability could be decided in 600 seconds by either one
of the SAT solvers clasp 3.1.2, glucose4, minisat 2.2, and minisat 1.3,
and its result was satisfiable. For satlib and sc14, random instances
are excluded.
5.3. Comparison of Running Time. Figure 8 shows a cactus plot of
representative solvers. Solved instances are ranked with respect to the
times required to solve them. Each point represents a solved instance
with its rank (the horizontal coordinate) and the required time (the
vertical coordinate). Since one wants to solve as many instances as
10SATLIB
- The Satisfiability Library, by Holger H Hoos and Thomas Stützle
at Darmstadt University of Technology, http://www.cs.ubc.ca/~hoos/SATLIB/
benchm.html, accessed on 16th May, 2014.
11SAT
Competition
2014,
http://www.satcompetition.org/2014/
description.shtml, accessed on 8th Sept., 2015.
12TG-Pro - A SAT-based ATPG System, by Huan Chen and Joao MarquesSilva,
http://logos.ucd.ie/web/lib/exe/fetch.php?media=benchmarks:
circuit-cnf-tgpro-20110317.tgz, accessed on 16th May, 2014
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
29
600
clasp
NonBlocking_DLevel_BJ
Blocking_NoSimple_Cont
BDD_Cut_NonBlocking_DLevel_BJ
500
Time (sec)
400
300
200
100
0
1000
1200
1400
1600
1800
2000
2200
2400
#Solved
Figure 8. Cactus plot of representative solvers with respect to running time.
possible in a given amount of time, it is thought that gentler the slope
of plotted points is, more efficient a solver is. The formula-BDD caching
solver clearly outperforms the other solvers. It is then followed by the
non-blocking solver, clasp, and the blocking solver in this order.
Figures 9, 10, and 11 depict differences between solvers of the same
types. From Figure 9, we can observe that continuation of search is
effective yet simplification degrades performance. For some instances,
simplification enables a solver to find a large number of solutions, however such instances are limited and the current implementation is not
powerful enough to make it possible to solve instances that can not be
handled without simplification. Figure 10 has a narrower horizontal
range than the other figures. This is because non-blocking solvers exhibit quite similar performance and they can not be distinguished otherwise. It is surprising that BT is almost as efficient as the other elaborated backtracking methods. Decision level-based scheme is equal to or
more efficient than sublevel-based scheme. Figure 11 shows that nonblocking procedure is clearly better as an underlying solver in which
caching mechanism is embedded, while there is almost no difference
between caching methods.
5.4. Comparison of Maximum Memory Usage. Figure 12 shows
a cactus plot of the maximum memory usage. Solved instances are in
turn ranked with respect to the maximum memory usage. Each point
then represents a solved instance with its rank (the horizontal coordinate) and the required memory (the vertical coordinate). In terms
of memory consumption, the formula-BDD caching solver is the worst,
while the non-blocking solver and clasp exhibit a stable performance.
30
T. TODA AND T. SOH
600
Blocking_NoSimple_Cont
Blocking_NoSimple_NoCont
Blocking_Simple_Cont
Blocking_Simple_NoCont
500
Time (sec)
400
300
200
100
0
1000
1200
1400
1600
1800
2000
2200
2400
#Solved
Figure 9. Cactus plot of blocking solvers.
600
500
NonBlocking_DLevel_BT
NonBlocking_DLevel_BJ
NonBlocking_DLevel_CBJ
NonBlocking_DLevel_BJCBJ
NonBlocking_SubLevel_BT
NonBlocking_SubLevel_BJ
NonBlocking_SubLevel_CBJ
NonBlocking_SubLevel_BJCBJ
Time (sec)
400
300
200
100
0
1860
1880
1900
1920
1940
1960
#Solved
Figure 10. Cactus plot of non-blocking solvers, where
the horizontal scale is narrowed to make the difference
clear.
The rapid increase in the curves of the non-blocking solver and clasp is
due to large CNF formulae. Although the formula-BDD caching solver
consumes much memory, these days it is not unusual that even laptop computers have several giga bytes of RAM, and advantage of the
formula-BDD caching solver is not impaired so much.
5.5. Comparison of Scalability in The Number of Solutions.
As shown in Table 1, each representative solver has the following limit
in the number of solutions within 600 seconds time limit .
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
31
600
BDD_Cut_Blocking
BDD_Cut_NonBlocking_DLevel_BJ
BDD_Sep_Blocking
BDD_Sep_NonBlocking_DLevel_BJ
500
Time (sec)
400
300
200
100
0
1000
1200
1400
1600
1800
2000
2200
2400
#Solved
Figure 11. Cactus plot of formula-BDD caching solvers.
Maximum Memory Usage (KB)
1e+08
clasp
NonBlocking_DLevel_BJ
Blocking_NoSimple_Cont
BDD_Sep_NonBlocking_DLevel_BJ
1e+07
1e+06
100000
10000
1000
100
1000
1200
1400
1600
1800
2000
2200
2400
#Solved
Figure 12. Cactus plot of representative solvers with
respect to the maximum memory usage, where the vertical axis is in logarithmic scale.
•
•
•
•
Blocking: one million solutions.
Clasp: one hundred million solutions.
Non-Blocking: ten billion solutions.
BDD: more than one quadrillion solutions.
5.6. Distribution of Solved Instances over Instance Series. Table 2 shows the distribution of solved instances over all instance series.
32
T. TODA AND T. SOH
Table 1. Distribution of solved instances with respect
to the number of solutions.
(0, 101 )
[101 , 102 )
[102 , 103 )
[103 , 104 )
[104 , 105 )
[105 , 106 )
[106 , 107 )
[107 , 108 )
[108 , 109 )
[109 , 1010 )
[1010 , 1011 )
[1011 , 1012 )
[1012 , 1013 )
[1013 , 1014 )
[1014 , ∞)
total
Blocking clasp NonBlocking BDD
38
36
39
37
11
11
11
11
417
417
417
416
682
682
682
682
408
408
408
408
82
134
133
134
0
86
82
86
0
56
87
91
0
0
68
83
0
0
23
92
0
0
0
83
0
0
0
44
0
0
0
29
0
0
0
19
0
0
0
8
1,638 1,830
1,950 2,223
In almost all series, differences in the number of solved instances between solvers can be explained by their scalability.
Exceptions are the sc14 instances. They are clearly harder instances.
All solvers were unable to find even one solution in many instances. For
sc14-crafted series, solved instances are those of less than 10 solutions
with a few exceptions of BDD. Table 3 shows the distribution of all
sc14 instances including unsolved instances. Although clasp could find
relatively many solutions, the other solvers could only find less than
10 solutions for a majority of instances. In terms of the ability to find
solutions for sc14 instances, we could say that the best solver is clasp;
the blocking solvers and the non-blocking solvers are a tie, both ranked
at the second; the formula-BDD caching solver is no match for those
instances, which is due to fixed variable ordering.
The favorite ranges of instances for representative solvers are illustrated in Fig. 13 according to the two factors: hardness of instances
and the numbers of solutions instances have. Each solver is placed in
such a way that the vertical position corresponds to the ability to find
solutions for sc14 instances, where the blocking solver is above the
non-blocking solver because of more benefit from a SAT solver, and
the horizontal position corresponds to the scalability in the number of
solutions. Hence, each indicated range refers to instances leftward or
downward from it as well as those within it. It should be noted that
shrinking the vertical axis would be more suitable for real performance,
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
33
Table 2. Distribution of solved instances over instance
series, where the number of instances in each series is
enclosed in parenthesis.
ais
(4)
bmc
(13)
bw
(7)
Flat125-301
(100)
Flat150-360
(101)
Flat175-417
(100)
Flat200-479
(100)
Flat75-180
(100)
flat
(1,199)
gcp
(1)
hanoi
(2)
inductive
(41)
logistics
(4)
parity
(20)
qg
(10)
ssa
(4)
SW100-8-0
(100)
SW100-8-1
(100)
SW100-8-2
(100)
SW100-8-3
(100)
SW100-8-4
(100)
SW100-8-5
(100)
SW100-8-6
(100)
SW100-8-7
(100)
SW100-8-8
(100)
SW100-8-p0
(1)
sc14-app
(56)
sc14-crafted
(65)
iscas
(39)
total
(2,867)
Blocking clasp NonBlocking BDD
4
4
4
4
0
0
0
1
7
7
7
6
4
51
94
100
0
12
61
101
0
2
15
98
0
0
3
77
87
100
100
100
1,136 1,195
1,199 1,199
0
0
0
0
2
2
2
2
1
5
9
8
0
0
0
1
20
20
20
20
10
10
10
10
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
5
68
55
100
95
100
100
100
100
100
100
100
100
100
100
100
100
100
1
1
1
1
0
0
0
0
5
3
6
5
6
17
19
22
1,638 1,830
1,950 2,223
because in reality all solvers, on the whole, exhibits a poor performance
over hard instances.
5.7. Comparisons to Publicly Available #SAT Solvers. We also
have a comparison with publicly available #SAT solvers, sharpSAT
version 1.1 [52], c2d version 2.20 [16] and relsat version 2.20 [6], to
check the performance of our developed ALLSAT solvers for #SAT.
In the result for the same 2867 instances, relsat, sharpSAT, c2d and
BDD Cut NonBlocking DLevel BJ solved 2191, 2196, 2196 and 2223
34
T. TODA AND T. SOH
Table 3. Distribution of all sc14 instances including unsolved instances according to the number of found solutions within time limit.
[0, 0]
(0, 101 )
[101 , 102 )
[102 , 103 )
[103 , 104 )
[104 , 105 )
[105 , 106 )
[106 , 107 )
[107 , 108 )
[108 , 109 )
[109 , 1010 )
[1010 , 1011 )
[1011 , 1012 )
[1012 , 1013 )
[1013 , 1014 )
[1014 , ∞)
total
Blocking clasp NonBlocking BDD
54
22
58
89
25
24
22
19
8
0
0
0
12
1
0
0
3
5
1
0
4
20
1
0
15
27
2
0
0
21
0
2
0
1
0
0
0
0
14
0
0
0
23
0
0
0
0
0
0
0
0
1
0
0
0
1
0
0
0
0
0
0
0
9
121 121
121
121
Figure 13. Favorite ranges of instances for representative solvers.
respectively. Since relsat supports solution count, it was used as a
solution counter in this comparison. So, even for #SAT, the formulaBDD caching solver shows better performance.
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
35
6. Conclusion
We surveyed and discussed major techniques of existing AllSAT
solvers. We classified the types of solvers into a blocking solver, a nonblocking solver, and a formula-BDD caching solver. We faithfully implemented and released these solvers publicly so that other researchers
can easily develop their solver by modifying our codes and compare
it with existing methods. We conducted comprehensive experiments
with total 2867 instances taken from SATLIB, SAT competition 2014,
and ISCAS benchmarks. Apart from our implemented solvers, we used
clasp, one of the few off-the-shelf softwares with solution generation
support. The experiments revealed the following solver’s characteristics (600 seconds time limit). See also Fig. 13.
• The formula-BDD caching solver is the most powerful. It has
the most solved instances, including instances with more than
one quadrillion solutions. The maximum memory usage amounts
to several tens giga bytes in the worst case, though it is controllable by refreshing caches at the cost of a low cache hit rate.
They are bad at hard instances due to fixed variable ordering.
• The non-blocking solver is ranked at the next best, followed by
clasp. The non-blocking solver and clasp can handle instances
with ten billion solutions and one hundred million solutions
with a low maximum memory usage (a few mega bytes to several
tens of mega bytes), respectively. Although both solvers exhibit
relatively a similar performance, a difference is that clasp is able
to find a moderately many number of solutions from even hard
instances, though it is not powerful enough to make it possible
to solve instances that can not be handled by other means.
• The blocking solver is limited to instances with one million solutions as blocking clauses deteriorate the performance of unit
propagation. However, it can benefit from state-of-the-art techniques of SAT solvers as they are, thereby it is suitable for
finding a small number of solutions for hard instances.
From the above, we conclude that the formula-BDD caching solver is
the most superior in terms of exact AllSAT solving over various kinds
of instances. However, since not all solutions are necessary in some
practical applications and duplicated solutions may be allowed, it is
recommended to select an appropriate solver in accordance with types
of instances and applications.
References
[1] S. B. Akers. Binary decision diagrams. IEEE Trans. Comput.,
27(6):509–516, June 1978.
36
T. TODA AND T. SOH
[2] Fadi A. Aloul, Igor L. Markov, and Karem A. Sakallah. MINCE: A
static global variable-ordering heuristic for SAT search and BDD
manipulation. J. UCS, 10(12):1562–1596, 2004.
[3] H.R. Andersen, T. Hadzic, J.N. Hooker, and P. Tiedemann. A constraint store based on multivalued decision diagrams. In Christian
Bessiére, editor, Principles and Practice of Constraint Programming, volume 4741 of Lecture Notes in Computer Science, pages
118–132. Springer Berlin Heidelberg, 2007.
[4] F. Bacchus, S. Dalmao, and T. Pitassi. Algorithms and complexity
results for #sat and bayesian inference. In Foundations of Computer Science, 2003. Proceedings. 44th Annual IEEE Symposium
on, pages 340–351, Oct 2003.
[5] Roberto J. Bayardo and J. D. Pehoushek. Counting models using
connected components. In In Proceedings of the AAAI National
Conference, pages 157–162, 2000.
[6] Roberto J. Bayardo, Jr. and Robert C. Schrag. Using csp lookback techniques to solve real-world sat instances. In Proceedings of
the Fourteenth National Conference on Artificial Intelligence and
Ninth Conference on Innovative Applications of Artificial Intelligence, AAAI’97/IAAI’97, pages 203–208. AAAI Press, 1997.
[7] Paul Beame, Russell Impagliazzo, Toniann Pitassi, and Nathan
Segerlind. Formula caching in dpll. ACM Trans. Comput. Theory,
1(3):9:1–9:33, March 2010.
[8] D. Bergman, A. A. Cire, W.-J. van Hoeve, and J. N. Hooker.
Discrete optimization with decision diagrams. INFORMS Journal
on Computing. To appear.
[9] A. Biere, A. Biere, M. Heule, H. van Maaren, and T. Walsh. Handbook of Satisfiability: Volume 185 Frontiers in Artificial Intelligence and Applications. IOS Press, Amsterdam, The Netherlands,
The Netherlands, 2009.
[10] Armin Biere. Picosat essentials. JSAT, 4(2-4):75–97, 2008.
[11] Jrg Brauer, Andy King, and Jael Kriener. Existential quantification as incremental sat. In Ganesh Gopalakrishnan and Shaz
Qadeer, editors, Computer Aided Verification, volume 6806 of Lecture Notes in Computer Science, pages 191–207. Springer Berlin
Heidelberg, 2011.
[12] R.E. Bryant. Graph-based algorithms for boolean function manipulation. Computers, IEEE Transactions on, C-35(8):677–691,
Aug 1986.
[13] Xinguang Chen and Peter van Beek. Conflict-directed backjumping revisited. J. Artif. Int. Res., 14(1):53–81, March 2001.
[14] Edmund Clarke, Daniel Kroening, Natasha Sharygina, and Karen
Yorav. Predicate abstraction of ansi-c programs using sat. Formal
Methods in System Design, 25(2-3):105–127, 2004.
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
37
[15] Y. Crama and P.L. Hammer. Boolean Functions: Theory, Algorithms, and Applications. Encyclopedia of Mathematics and its
Applications. Cambridge University Press, 2011.
[16] Adnan Darwiche. New advances in compiling CNF into decomposable negation normal form. In Proceedings of the 16th Eureopean
Conference on Artificial Intelligence, ECAI’2004, including Prestigious Applicants of Intelligent Systems, PAIS 2004, Valencia,
Spain, August 22-27, 2004, pages 328–332, 2004.
[17] Rina Dechter and Daniel Frost. Backjump-based backtracking for
constraint satisfaction problems. Artificial Intelligence, 136(2):147
– 188, 2002.
[18] Thomas Eiter, Kazuhisa Makino, and Georg Gottlob. Computational aspects of monotone dualization: A brief survey. Discrete
Applied Mathematics, 156(11):2035 – 2049, 2008. In Memory of
Leonid Khachiyan (1952 - 2005 ).
[19] Niklas En and Niklas Srensson. An extensible sat-solver. In Enrico Giunchiglia and Armando Tacchella, editors, Theory and Applications of Satisfiability Testing, volume 2919 of Lecture Notes
in Computer Science, pages 502–518. Springer Berlin Heidelberg,
2004.
[20] M.K. Ganai, A. Gupta, and P. Ashar. Efficient sat-based unbounded symbolic model checking using circuit cofactoring. In
Computer Aided Design, 2004. ICCAD-2004. IEEE/ACM International Conference on, pages 510–517, Nov 2004.
[21] Martin Gebser, Benjamin Kaufmann, André Neumann, and
Torsten Schaub. clasp: A conflict-driven answer set solver. In
Chitta Baral, Gerhard Brewka, and John Schlipf, editors, Logic
Programming and Nonmonotonic Reasoning, volume 4483 of Lecture Notes in Computer Science, pages 260–265. Springer Berlin
Heidelberg, 2007.
[22] Martin Gebser, Benjamin Kaufmann, André Neumann, and
Torsten Schaub. Conflict-driven answer set enumeration. In Chitta
Baral, Gerhard Brewka, and John Schlipf, editors, Logic Programming and Nonmonotonic Reasoning, volume 4483 of Lecture Notes
in Computer Science, pages 136–148. Springer Berlin Heidelberg,
2007.
[23] Orna Grumberg, Assaf Schuster, and Avi Yadgar. Memory efficient all-solutions sat solver and its application for reachability
analysis. In AlanJ. Hu and AndrewK. Martin, editors, Formal
Methods in Computer-Aided Design, volume 3312 of Lecture Notes
in Computer Science, pages 275–289. Springer Berlin Heidelberg,
2004.
[24] Tias Guns, Siegfried Nijssen, and Luc De Raedt. Itemset mining: A constraint programming perspective. Artificial Intelligence,
175(1213):1951 – 1983, 2011.
38
T. TODA AND T. SOH
[25] Aarti Gupta, Zijiang Yang, Pranav Ashar, and Anubhav Gupta.
Sat-based image computation with application in reachability
analysis. In Jr. Hunt, WarrenA. and StevenD. Johnson, editors,
Formal Methods in Computer-Aided Design, volume 1954 of Lecture Notes in Computer Science, pages 391–408. Springer Berlin
Heidelberg, 2000.
[26] Jiawei Han, Hong Cheng, Dong Xin, and Xifeng Yan. Frequent
pattern mining: current status and future directions. Data Mining
and Knowledge Discovery, 15(1):55–86, 2007.
[27] Jinbo Huang and Adnan Darwiche. Using dpll for efficient obdd
construction. In HolgerH. Hoos and DavidG. Mitchell, editors,
Theory and Applications of Satisfiability Testing, volume 3542
of Lecture Notes in Computer Science, pages 157–172. Springer
Berlin Heidelberg, 2005.
[28] Jinbo Huang and Adnan Darwiche. The language of search. J.
Artif. Intell. Res. (JAIR), 29:191–219, 2007.
[29] Saı̈d Jabbour, Jerry Lonlac, Lakhdar Sais, and Yakoub Salhi. Extending modern SAT solvers for models enumeration. In Proceedings of the 15th IEEE International Conference on Information
Reuse and Integration, IRI 2014, Redwood City, CA, USA, August 13-15, 2014, pages 803–810, 2014.
[30] Said Jabbour, Joao Marques-Silva, Lakhdar Sais, and Yakoub
Salhi. Enumerating prime implicants of propositional formulae
in conjunctive normal form. In Eduardo Fermé and João Leite,
editors, Logics in Artificial Intelligence, volume 8761 of Lecture
Notes in Computer Science, pages 152–165. Springer International
Publishing, 2014.
[31] Said Jabbour, Lakhdar Sais, and Yakoub Salhi. Boolean satisfiability for sequence mining. In Proceedings of the 22Nd ACM International Conference on Conference on Information; Knowledge
Management, CIKM ’13, pages 649–658, New York, NY, USA,
2013. ACM.
[32] HoonSang Jin, HyoJung Han, and Fabio Somenzi. Efficient conflict analysis for finding all satisfying assignments of a boolean
circuit. In Nicolas Halbwachs and LenoreD. Zuck, editors, Tools
and Algorithms for the Construction and Analysis of Systems, volume 3440 of Lecture Notes in Computer Science, pages 287–300.
Springer Berlin Heidelberg, 2005.
[33] HoonSang Jin and Fabio Somenzi. Prime clauses for fast enumeration of satisfying assignments to boolean circuits. In Proceedings of
the 42Nd Annual Design Automation Conference, DAC ’05, pages
750–753, New York, NY, USA, 2005. ACM.
[34] Hyeong-Ju Kang and In-Cheol Park. Sat-based unbounded symbolic model checking. Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on, 24(2):129–140, Feb
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
39
2005.
Donald E. Knuth. The Art of Computer Programming, Volume
4, Fascicle 1: Bitwise Tricks & Techniques; Binary Decision Diagrams. Addison-Wesley Professional, 12th edition, 2009.
C. Y. Lee. Representation of switching circuits by binary-decision
programs. Bell System Technical Journal, 38(4):985–999, 1959.
Bin Li, Michael S. Hsiao, and Shuo Sheng. A novel SAT allsolutions solver for efficient preimage computation. In 2004 Design, Automation and Test in Europe Conference and Exposition
(DATE 2004), 16-20 February 2004, Paris, France, pages 272–279,
2004.
Nuno Lopes, Nikolaj Bjorner, Patrice Godefroid, and George
Varghese. Network verification in the light of program verification. Technical report, September 2013.
Stephen M. Majercik and Michael L. Littman. Using caching to
solve larger probabilistic planning problems. In Proceedings of
the Fifteenth National Conference on Artificial Intelligence and
Tenth Innovative Applications of Artificial Intelligence Conference, AAAI 98, IAAI 98, July 26-30, 1998, Madison, Wisconsin,
USA., pages 954–959, 1998.
Sharad Malik and Lintao Zhang. Boolean satisfiability from theoretical hardness to practical success. Commun. ACM, 52(8):76–82,
August 2009.
Joao Marques-Silva, Mikoláš Janota, and Inês Lynce. On computing backbones of propositional theories. In Proceedings of the 2010
Conference on ECAI 2010: 19th European Conference on Artificial Intelligence, pages 15–20, Amsterdam, The Netherlands, The
Netherlands, 2010. IOS Press.
J.P. Marques-Silva and K.A. Sakallah. Grasp: a search algorithm
for propositional satisfiability. Computers, IEEE Transactions on,
48(5):506–521, May 1999.
KenL. McMillan. Applying sat methods in unbounded symbolic
model checking. In Ed Brinksma and KimGuldstrand Larsen, editors, Computer Aided Verification, volume 2404 of Lecture Notes
in Computer Science, pages 250–264. Springer Berlin Heidelberg,
2002.
A. Morgado and J. Marques-Silva. Good learning and implicit
model enumeration. In Tools with Artificial Intelligence, 2005.
ICTAI 05. 17th IEEE International Conference on, pages 6 pp.–
136, Nov 2005.
DoRonB. Motter and IgorL. Markov. A compressed breadth-first
search for satisfiability. In DavidM. Mount and Clifford Stein,
editors, Algorithm Engineering and Experiments, volume 2409 of
Lecture Notes in Computer Science, pages 29–42. Springer Berlin
Heidelberg, 2002.
40
T. TODA AND T. SOH
[46] Keisuke Murakami and Takeaki Uno. Efficient algorithms for dualizing large-scale hypergraphs. Discrete Applied Mathematics,
170:83 – 94, 2014.
[47] Knot Pipatsrisawat and Adnan Darwiche. A lightweight component caching scheme for satisfiability solvers. In Theory and
Applications of Satisfiability Testing - SAT 2007, 10th International Conference, Lisbon, Portugal, May 28-31, 2007, Proceedings, pages 294–299, 2007.
[48] Patrick Prosser. Hybrid algorithms for the constraint satisfaction
problem. Computational Intelligence, 9:268–299, 1993.
[49] J. Qadir and O. Hasan. Applying formal methods to networking:
Theory, techniques, and applications. Communications Surveys
Tutorials, IEEE, 17(1):256–291, Firstquarter 2015.
[50] Kavita Ravi and Fabio Somenzi. Minimal assignments for bounded
model checking. In Kurt Jensen and Andreas Podelski, editors,
Tools and Algorithms for the Construction and Analysis of Systems, volume 2988 of Lecture Notes in Computer Science, pages
31–45. Springer Berlin Heidelberg, 2004.
[51] Shuo Sheng and Michael Hsiao. Efficient preimage computation
using a novel success-driven atpg. In Proceedings of the Conference
on Design, Automation and Test in Europe - Volume 1, DATE
’03, pages 10822–, Washington, DC, USA, 2003. IEEE Computer
Society.
[52] Marc Thurley. sharpsat counting models with advanced component caching and implicit bcp. In Armin Biere and CarlaP.
Gomes, editors, Theory and Applications of Satisfiability Testing
- SAT 2006, volume 4121 of Lecture Notes in Computer Science,
pages 424–429. Springer Berlin Heidelberg, 2006.
[53] Takahisa Toda. Hypergraph transversal computation with binary
decision diagrams. In Vincenzo Bonifaci, Camil Demetrescu, and
Alberto Marchetti-Spaccamela, editors, Experimental Algorithms,
volume 7933 of Lecture Notes in Computer Science, pages 91–102.
Springer Berlin Heidelberg, 2013.
[54] Takahisa Toda. Dualization of boolean functions using ternary
decision diagrams. In International Symposium on Artificial Intelligence and Mathematics, ISAIM 2014, Fort Lauderdale, FL,
USA, January 6-8, 2014, 2014.
[55] Takahisa Toda and Koji Tsuda. Bdd construction for all solutions
sat and efficient caching mechanism. In Proceedings of the 30th
Annual ACM Symposium on Applied Computing, SAC ’15, pages
1880–1886, New York, NY, USA, 2015. ACM.
[56] Frank van Harmelen, Frank van Harmelen, Vladimir Lifschitz, and
Bruce Porter. Handbook of Knowledge Representation. Elsevier
Science, San Diego, USA, 2007.
IMPLEMENTING EFFICIENT ALL SOLUTIONS SAT SOLVERS
41
[57] Yinlei Yu, P. Subramanyan, N. Tsiskaridze, and S. Malik. Allsat using minimal blocking clauses. In VLSI Design and 2014
13th International Conference on Embedded Systems, 2014 27th
International Conference on, pages 86–91, Jan 2014.
[58] Shuyuan Zhang, Sharad Malik, and Rick McGeer. Verification of computer switching networks: An overview. In Supratik
Chakraborty and Madhavan Mukund, editors, Automated Technology for Verification and Analysis, Lecture Notes in Computer
Science, pages 1–16. Springer Berlin Heidelberg, 2012.
(T. Toda) Graduate School of Information Systems, University of
Electro-Communications, 1-5-1 Chofugaoka, Chofu, Tokyo 182-8585,
Japan.
E-mail address: [email protected]
(T. Soh) Information Science and Technology Center, Kobe University, 1-1 Rokkodai, Nada Kobe 657-8501, Japan.
E-mail address: [email protected]
| 8cs.DS
|
arXiv:1703.01640v1 [cs.CG] 5 Mar 2017
Approximation algorithms for TSP with neighborhoods
in the plane
Adrian Dumitrescu ∗
University of Wisconsin–Milwaukee
Milwaukee, WI 53201-0784
[email protected]
Joseph S. B. Mitchell †
Stony Brook University
Stony Brook, NY 11794-3600
[email protected]
August 9, 2014
Abstract
In the Euclidean TSP with neighborhoods (TSPN), we are given a collection of n regions
(neighborhoods) and we seek a shortest tour that visits each region. As a generalization of the
classical Euclidean TSP, TSPN is also NP-hard. In this paper, we present new approximation
results for the TSPN, including (1) a constant-factor approximation algorithm for the case of
arbitrary connected neighborhoods having comparable diameters; and (2) a PTAS for the important special case of disjoint unit disk neighborhoods (or nearly disjoint, nearly-unit disks).
Our methods also yield improved approximation ratios for various special classes of neighborhoods, which have previously been studied. Further, we give a linear-time O(1)-approximation
algorithm for the case of neighborhoods that are (infinite) straight lines.
1
Introduction
A salesman wants to meet a set of n potential buyers. Each buyer specifies a connected region
in the plane, his neighborhood, within which he is willing to meet the salesman. For example, the
neighborhoods may be disks centered at buyers’ locations, and the radius of each disk specifies the
maximum distance a buyer is willing to travel to the meeting place. The salesman wants to find
a tour of shortest length that visits all of buyers’ neighborhoods and finally returns to its initial
departure point. A variant of the problem, which we will address in this paper, is that in which no
departure point is specified, and only a tour of the neighborhoods is to be found. This problem,
which is known as the TSP with neighborhoods (TSPN), is a generalization of the classic Euclidean
Traveling Salesman Problem (TSP), in which the regions, or “neighborhoods,” are single points,
and consequently is NP-hard [9, 21].
Related Work.
The TSP has a long and rich history of research in combinatorial optimization.
It has been studied extensively in many forms, including geometric instances; see [4, 13, 14, 20, 24].
The problem is known to be NP-hard, even for points in the Euclidean plane [9, 21]. It has
∗
This work was done while the author was a visiting faculty member at Stony Brook University.
Partially supported by grants from HRL Laboratories, NASA Ames, the National Science Foundation (CCR9732220), Northrop-Grumman Corporation, Sandia National Labs, and Sun Microsystems.
†
1
recently been shown that the geometric instances of the TSP, including the Euclidean TSP, have
a polynomial-time approximation scheme, as developed by Arora [2] and Mitchell [17], and later
improved by Rao and Smith [23].
Arkin and Hassin [1] were the first to study approximation algorithms for the geometric TSPN.
They gave O(1)-approximation algorithms for several special cases, including parallel segments of
equal length, translates of a convex region, translates of a connected region, and more generally,
for regions which have diameter segments that are parallel to a common direction, and the ratio
between the longest and the shortest diameter is bounded by a constant.
For the general case of connected polygonal regions, Mata and Mitchell [15] obtained an
O(log n)-approximation algorithm, based on “guillotine rectangular subdivisions”, with time bound
O(N 5 ), where N is the total complexity of the n regions. Gudmundsson and Levcopoulos [10] have
recently obtained a faster method, which, for any fixed ǫ > 0, is guaranteed to perform at least
one of the following tasks1 : (1) it outputs a tour of length at most O(log n) times optimum in time
O(n log n + N ); (2) it outputs a tour of length at most (1 + ǫ) times optimum in time O(N 3 ). So
far, no polynomial-time approximation algorithm is known for general connected regions.
Recently it was shown that TSPN is APX-hard and cannot be approximated within a factor of
1.000374 unless P=NP [5, 11]. In fact, the inapproximability factor for the vertex cover problem in
graphs with degree bounded by 5, as stated in [7], and on which the result in [11] is based, implies
a factor larger than that.
In the time since this paper first appeared, it has been shown by de Berg et. al [5] that the TSPN
has an O(1)-approximation algorithm in the case that the regions are the regions are connected,
disjoint, convex and fat. Also, Schwartz and Safra [25] have improved the lower bounds of [5, 11]
on the hardness of approximation
of several variants of the TSPN problem, and Jonsson [12] has
√
given an O(n) time 2-approximation algorithm for the case of regions that are lines in the plane;
our previous O(n) time π/2-approximation algorithm appears in Section 5.
Summary of Our Results.
geometric TSPN, including:
In this paper, we obtain several approximation results on the
(1) We extend the approaches initiated in [1] and obtain the first O(1)-approximation algorithm
for the TSPN having connected regions of the same or similar diameter. This solves among
others, the open problem posed in [1], to provide a constant-factor approximation algorithm
for TSPN on segments of the same length and arbitrary orientation.
(2) We give a polynomial-time approximation scheme (PTAS) for the case of disjoint unit disks or
the case of nearly disjoint disks of nearly the same size. The algorithm is based on applying
the m-guillotine method with a new area-based charging scheme. The fact that there is a
PTAS for the case in which the neighborhoods are “nice,” with no point lying in more than
a constant number of neighborhoods, should be contrasted with the fact that the TSPN
on arbitrary regions is APX-hard. The construction in the proof of [11] utilizes “skinny”
neighborhoods, which intersect each other extensively.
(3) We also give modest improvements on earlier approximation bounds in [1] for the cases of
parallel segments of equal length, translates of a convex region, and translates of a connected
region.
1
One does not know in advance which one will be accomplished.
2
(4) We present simple algorithms which achieve a constant-factor guarantee for the case of equal
disks and for the case of infinite straight lines.
Preliminaries.
The input to our algorithms will be a set R of n regions, each of which is a
simply-connected, closed subset of the plane, ℜ2 , bounded by a finite union of arcs of constantdegree algebraic curves (degenerate regions are simply points). Since the regions are assumed to
be closed, they include the points that lie on the curves that form their boundary. The assumption
that regions are simply connected means that each region has no “holes.”
Ideally, each region is a subset of the plane lying inside a simple, closed, continuous curve, together with the curve itself. However, we can only deal with regions that are computer-representable,
hence the above definition.
Examples of allowable regions include simple polygons, whose boundaries are unions of a finite
number of straight line segments, circular disks, regions bounded by straight segments and circular
arcs, infinite straight lines, etc. We let N denote the total number of arcs specifying all n regions
in R, i.e. the total combinatorial complexity of the input.
A tour (or circuit) T , is a closed continuous curve that visits each region of R. The length of
tour T , denoted |T |, is the Euclidean length of the curve T . To avoid ambiguity, the size of a finite
set X is denote by #X. In the TSP with neighborhoods (TSPN) problem, our goal is to compute
a tour whose length is guaranteed to be close to the shortest possible length of a tour. We let T ∗
denote any optimal tour and let L∗ = |T ∗ | denote its length. An algorithm that outputs a tour
whose length is guaranteed to be at most c·L∗ is said to be a c-approximation algorithm and to have
an approximation ratio of c. A family of (1 + ǫ)-approximation algorithms, parameterized by ǫ > 0,
and each running in polynomial time for fixed ǫ, is said to be a polynomial-time approximation
scheme (PTAS).
Outline of the Paper.
In Section 2 we use some simple packing arguments to yield approximation algorithms for the TSPN for equal-size disks. Section 3 presents a PTAS for the TSPN
for equal-size disks. In Section 4 we give an approximation algorithm for the TSPN for regions
having the same diameter. Finally, in Section 5, we give an approximation algorithm for the case
of regions that are infinite straight lines. We conclude with a short list of open problems for future
research.
2
Equal-Size Disks
We begin by giving some simple arguments and corresponding algorithms that achieve a constant
approximation ratio for TSPN on a set R of n disks of the same size. Without loss of generality,
we assume that all disks have unit radius. Our results carry over naturally to disks of nearly the
same size, with corresponding changes in the approximation factor.
First, we consider the case of disjoint unit disks. The algorithm is simple and natural: using
known PTAS results for TSP on points [2, 17, 23], compute, in time O(n log n), a (1+ǫ)-approximate
tour, T = TC , of the center points of the n disks. We refer to it as the center tour. Clearly TC is a
valid region tour. We claim that
Proposition 1 Given set of n disjoint unit disks, one can compute a tour, T , whose length satisfies
|T | ≤ ((1 +
8
)|T ∗ | + 8)(1 + ǫ),
π
3
where T ∗ is an optimal tour. The running time is dominated by that of computing a (1 + ǫ)approximate tour of n points.
Proof. Put L∗ = |T ∗ |. Since T ∗ visits all disks, the area AL∗ swept by a disk of radius 2, whose
center moves along T ∗ , covers all of the unit disks R. This area is bounded as follows
πn ≤ AL∗ ≤ 4L∗ + 4π.
Thus, n ≤ 4 +
4L∗
π .
A center tour of length at most
L∗ + 2n ≤ L∗ + 2(4 +
4L∗
8
) = (1 + )L∗ + 8
π
π
can be obtained by going along T ∗ and making a detour of length at most 2 to visit the center of a
disk at each point where T ∗ first visits a disk. Hence, the length of the computed tour is bounded
as claimed.
✷
For large n, the approximation ratio above is (1 + π8 )(1 + ǫ) ≤ 3.55; for small constant values
of n, the problem can be solved exactly using brute force. We note that for any algorithm that
outputs a tour on the center points, we cannot expect an approximation ratio smaller than 2. To
see this, consider a large square, and place almost touching unit disks along its perimeter, both on
its inside and on its outside. All of the disks touch the perimeter, which is also an optimal disk
tour except at the four corners of the square. The length of the disk center tour is roughly two
times the perimeter of the square.
When the disks are nearly of the same size, so that the ratio between the maximum and
minimum radius is bounded by a constant k > 1, for large n, the approximation ratio is about
2
1 + 8kπ .
Next we consider the case in which the disks can overlap. First, we compute a maximal independent (pairwise-disjoint) set I of disks. Next, we compute TI , a (1 + ǫ)-approximate tour of the
center points of disks in I. Finally, we output a tour T obtained by following the tour TI , taking
detours around the boundaries of each of the disks in I, as illustrated in Figure 1. More specifically,
we select an arbitrary disk D0 and one of the intersection points, s, between D0 and TI . We start
at point s and go clockwise along TI . Whenever the boundary of a disk of I is encountered, we
follow clockwise around the boundary of the disk until we encounter again the tour TI . When we
finally reach s, we continue clockwise around D0 to TI and then continue counterclockwise around
TI , again taking detours clockwise around the disks of I that we encounter along the way. The
tour T finally ends when we return the second time to s. In this way, our tour T traverses the
boundary of each disk of I exactly once and therefore visits all of the disks that are not in I as well.
We remark that this method of constructing a feasible tour of the disks results in a slightly better
worst-case ratio than another natural strategy for extending TI to a full disk tour: While traversing
TI , each time one encounters the boundary of a disk D ∈ I, traverse the entire circumference of D
exactly once, and then go directly to the point where the tour TI exits D and continue along TI .
Denote by T ∗ an optimal disk tour, of length L∗ , and by TI∗ an optimal disk tour of the subset
I ⊆ R of disks. A constant approximation ratio can be derived from the following three inequalities:
|T | ≤ π|TI | + 2π,
8
|TI∗ | + 8)(1 + ǫ),
|TI | ≤ (1 +
π
4
(1)
(2)
a1
s
D0
a2
Figure 1: Construction of the tour T from the tour TI on the center points of a maximal independent
set, I, of disks. Starting from s, we follow the thick solid tour, back to s, and then follow the thick
dashed tour back around to s again.
|TI∗ | ≤ L∗ .
(3)
The third inequality follows from the fact that I ⊆ R, and the second from the case of disjoint
unit disks considered above. To check the first inequality, decompose TI into #I parts, assuming
#I ≥ 2, one for each disk in I, by cutting each segment between two consecutive centers in the
middle. Let x + y = d ≥ 2 be the length of one of these parts of tour TI , corresponding to a disk
D, where x, y are the lengths of the two segments of TI adjacent to the center of D. Write a1 , a2
for the arc lengths of D when its boundary is traversed by T ; we have a1 + a2 = 2π. Writing the
ratio of the length of the corresponding part of T to the length, d, of this part of TI , we get
2(d + π − 2)
(x − 1 + a1 + y − 1) + (x − 1 + a2 + y − 1)
=
≤ π,
d
d
the maximum being attained when d = 2. When #I = 1, we have |TI | = 0, |T | = 2π. Thus (1) is
satisfied in all cases. Putting (1), (2), (3) together, we get
Proposition 2 Given set of n unit disks, possibly overlapping, one can compute a tour, T , whose
length satisfies
|T | ≤ ((π + 8)|T ∗ | + 8π)(1 + ǫ) + 2π,
where T ∗ is an optimal tour. The running time is dominated by that of computing a (1 + ǫ)approximate tour of n points.
For large n, the approximation ratio is (π + 8)(1 + ǫ) ≤ 11.15. We note that the approximation
ratio we have obtained with this
√ approach for disjoint unit disks, 3.55, (resp., 11.15 for unit disks)
is better (resp., weaker) than 32 + 72 ≈ 7.62, the approximation ratio that will be given at the
end of Section 4 for translates of a convex region, which applies, of course, to the case of unit disks.
5
3
A PTAS for Disjoint Equal Disks
In this section we present a polynomial-time approximation scheme for the TSPN in the case of
regions that are equal-size disks or nearly equal-size disks.
Given the powerful methods that have been developed to obtain PTAS’s for various geometric
optimization problems, such as the Euclidean TSP, it is natural to suspect that these same techniques may apply to the TSPN. Indeed, one may expect that TSPN should have a PTAS based on
applying existing methods. However, we know now, from the recent APX-hardness result of [11],
that this cannot be. What goes wrong?
The basic issue we must address in order to apply these techniques is to be able to write a
recursion to solve an appropriate “succinct” subproblem with dynamic programming. What is the
subproblem “responsible” for solving? For problems involving points, the subproblem can be made
responsible for constructing some kind of inexpensive network on the points inside the subproblem
defined by a rectangle, and to interconnect this network with the boundary in some nicely controlled
way, e.g., with only a constant complexity of connection, in the case of m-guillotine methods. The
problem with regions is that they can cross subproblem boundaries. Then, we do not know if the
subproblem is responsible to visit the region, or if the region is visited outside the subproblem. We
cannot afford to enumerate the subset of regions that cross the boundary for which the subproblem
is responsible – there are too many such subsets, leading to too many subproblems. Thus, we need
a new idea.
Our approach is to employ a new type of structural result, based on the general method of
m-guillotine subdivisions. In particular, we show how to transform an optimal tour into one of a
special class of tours that recursively has a special m-guillotine structure, permitting us to have
a succinct, constant-size specification of the subset of regions, crossing the subproblem boundary,
for which the subproblem is “responsible” in that it must visit these regions on its interior. In
order to bound the increase in tour length in performing this transformation, we must “charge off”
the added tour length to some small fraction of the length of the optimal tour, just as is done
in proving the bounds for the m-guillotine PTAS method for TSP. In order to do this charging,
we must assume some special structure on the class of neighborhoods in the TSPN, e.g., that
the regions D = {D1 , . . . , Dn } are pairwise-disjoint, equal-size disks, or have a similar structure
allowing us to relate tour length to area.
Here, we show how the approach applies to disjoint disks having equal radii, δ; generalizations
are readily made to the case of nearly equal radii, with a constant upper bound on the ratio of
radii, and to the case of “modestly overlapping,” in which the disks become pairwise-disjoint if all
of them are decreased in size by a constant factor while keeping the center points the same.
We begin with some definitions, largely following the notation of [17]. Let G be an embedding
of a planar graph, and let L denote the total Euclidean length of its edges, E. We can assume
without loss of generality that G is restricted to the unit square, B; i.e., E ⊂ int(B).
Consider an axis-aligned rectangle W , a window, with W ⊆ B. Rectangle W will correspond
to a subproblem in a dynamic programming algorithm. Let ℓ be an axis-parallel line intersecting
W . We refer to ℓ as a cut and assume, without loss of generality, that ℓ is vertical.
The intersection, ℓ ∩ (E ∩ int(W )), of a cut ℓ with E ∩ int(W ) consists of a possibly empty
set of subsegments of ℓ. These subsegments are possibly singleton points. Let ξ be the number
of endpoints of such subsegments along ℓ, and let the points be denoted by p1 , . . . , pξ , in order of
decreasing y-coordinate along ℓ. For a positive integer m, we define the m-span, σm (ℓ), of ℓ with
respect to W as follows. If ξ ≤ 2(m − 1), then σm (ℓ) = ∅; otherwise, σm (ℓ) is defined to be the line
6
segment, pm pξ−m+1 , joining the mth endpoint, pm , with the mth-from-the-last endpoints, pξ−m+1 .
Refer to Figure 2. Note that the segment pm pξ−m+1 may be of zero length in case pm = pξ−m+1 .
B
W
p1
p3
p2
σ3(ℓ)
p9
ℓ
Figure 2: Definition of m-span: Here, the 3-span, σ3 (ℓ) of ℓ with respect to the window W ⊂ B
is highlighted with a thick shaded vertical segment.
The intersection, ℓ ∩ D ∩ W of ℓ with the disks that intersect W consists of a possibly empty set
of ξD ≤ |D ∩ W | subsegments of ℓ, one for each disk that is intersected by ℓ in W . Let these disks
be D1 , D2 , . . . , DξD , in order of decreasing y-coordinate. For a positive integer m, we define the
m-disk-span, σm,D (ℓ), of ℓ with respect to W as follows. If ξD ≤ 2m, then σm,D (ℓ) = ∅; otherwise,
σm,D (ℓ) is defined to be the possibly zero-length line segment joining the bottom endpoint of ℓ∩Dm
with the top endpoint of ℓ ∩ DξD −m+1 . Refer to Figure 3.
Line ℓ is an m-good cut with respect to W if σm (ℓ) ⊆ E and σm,D (ℓ) ⊆ E. In particular, if
ξ ≤ 2(m − 1) and ξD ≤ 2m, then ℓ is trivially an m-good cut, since both the m-span and the
m-disk-span are empty in this case.
We now say that E satisfies the m-guillotine property with respect to window W if either (1) W
does not fully contain any disk; or (2) there exists an m-good cut, ℓ, that splits W into W1 and
W2 , and, recursively, E satisfies the m-guillotine property with respect to both W1 and W2 .
7
W
D1
D2
D3
σ3,D (ℓ)
ℓ
Figure 3: Definition of m-disk-span: Here, the 3-disk-span, σ3,D (ℓ) of ℓ with respect to the window
W ⊂ B is highlighted with a thick shaded vertical segment.
Theorem 1 Let G be an embedded connected planar graph, with edge set E, of total length L, and
let D be a given set of pairwise-disjoint equal-radius disks (of radius δ) each of which intersects E.
Assume that E and D are contained in the unit square B. Then, for any positive integer m, there
exists a planar graph G′ that satisfies the m-guillotine property with respect to B and has an edge
set E ′ ⊇ E of length
!
√
16δ
2 + 16/π
′
L+
.
L ≤ 1+
m
m
Proof. We convert G into a √
new graph G′ by adding to E a new set of horizontal/vertical edges
whose total length is at most 2+16/π
L + 16δ
m
m . The construction is recursive: at each stage, we show
that there exists a cut, ℓ, with respect to the current window W (which initially is the unit square
B), such that we can afford to add both the m-span and the m-disk-span to E.
We say that a point p on a cut ℓ is m-dark with respect to ℓ and W if, along ℓ⊥ ∩ int(W ), there
are at least m edges of E intersected by ℓ⊥ on each side of p, where ℓ⊥ is the line through p and
perpendicular to ℓ.2 We say that a subsegment of ℓ is m-dark (with respect to W ) if all points of
the segment are m-dark with respect to ℓ and W .
The important property of m-dark points along ℓ is the following: Assume, without loss of
generality, that ℓ is horizontal. We consider any line segment that lies along an edge of E to have
a top side and a bottom side; the top is the side that can be seen from above, from a point with
y = +∞. Then, if all points on subsegment pq of ℓ are m-dark, we can charge the length of pq off
to the bottoms of the first m subsegments, E + ⊆ E, of edges that lie above pq, and the tops of the
first m subsegments, E − ⊆ E, of edges that lie below pq, since we know that there are at least m
edges “blocking” pq from the top/bottom of W . We charge pq’s length half to E + , charging each
1
units of charge, and half to E − , charging each of the
of the m levels of E + from below, with 2m
2
We can think of the edges E as being “walls” that are not very effective at blocking light — light can go through
m − 1 walls, but is stopped when it hits the mth wall; then, p on a line ℓ is m-dark if p is not illuminated when light
is shone in from the boundary of W , along the direction of ℓ⊥ .
8
1
units of charge. We refer to this type of charge as the “red”
m levels of E − from above, with 2m
charge.
We say that a point p on a cut ℓ is m-disk-dark with respect to ℓ and W if, along ℓ⊥ ∩ int(W ),
there are at least m disks of D that have a nonempty intersection with ℓ⊥ ∩ W on each side of
p. Here, again, ℓ⊥ is the line through p and perpendicular to ℓ. We say that a subsegment of ℓ
is m-disk-dark with respect to W if all points of the segment are m-disk-dark with respect to ℓ
and W . The chargeable length within W of a cut ℓ is defined to be the sum of the lengths of its
m-dark portion and its m-disk-dark portion. Refer to Figure 4.
W
p
ℓ
ℓ⊥
Figure 4: Definition of m-disk-dark: Here, the points that are 2-disk-dark with respect to ℓ are
(2,D)
those four subsegments of ℓ that lie within the shaded regions, which comprise the set Rx
of
points of W that are 2-disk-dark with respect to horizontal cuts.
The important property of m-disk-dark points along horizontal ℓ is the following: If all points
on subsegment pq of ℓ are m-disk-dark, then we can charge the length of pq off to the bottoms of
the first m disks that lie above pq, and the tops of the first m disks that lie below pq, since we know
that there are at least m disks “blocking” pq from the top/bottom of W . We charge pq’s length
1
units of charge, and
half upwards, charging the bottoms of each of the m “levels” of disks with 2m
1
half downwards, charging the tops of each of the m “levels” of disks with 2m units of charge. We
refer to this type of charge as the “blue” charge.
A cut ℓ is favorable if its chargeable length within W is at least as large as the sum of the
lengths of the m-span and the m-disk-span. We do not attempt to take advantage of the fact that
there may be overlap among the m-span and the m-disk-span, nor that there may be portions of
these two segments that are already part of E; an argument taking advantage of these facts may
improve slightly the constants in some of our bounds.
The existence of a favorable cut is guaranteed by the following key lemma, whose proof is similar
to that of the key lemma in [17]:
Lemma 1 For any G and any window W , there is a favorable cut.
Proof. We show that there must be a favorable cut that is either horizontal or vertical.
9
Let f (x) denote the “cost” of the vertical line, ℓx , passing through the point (x, 0), where “cost”
means the sum of the lengths of the m-span and the m-disk-span for ℓx . Then,
f (x) = |σm (ℓx )| + |σm,D (ℓx )|.
Thus,
Ax =
Z
0
(m)
1
f (x)dx =
Ax(m)
+ A(m,D)
x
=
Z
1
0
|σm (ℓx )|dx +
Z
1
0
|σm,D (ℓx )|dx,
(m)
R1
|σm (ℓx )|dx is the area of the x-monotone region Rx of points of B that are mR1
(m,D)
dark with respect to horizontal cuts, and Ax
= 0 |σm,D (ℓx )|dx is the area of the x-monotone
where Ax
=
(m,D)
0
region Rx
of points of B that are m-disk-dark with respect to horizontal cuts. Refer
R 1 to Figure 4.
Similarly, define g(y) to be the cost of the horizontal line through y, and let Ay = 0 g(y)dy.
Assume, without loss of generality, that Ax ≥ Ay . We claim that there exists a horizontal
favorable cut; i.e., we claim that there exists a horizontal cut, ℓ, such that its chargeable length is
at least as large as the cost of ℓ, meaning that the length of its m-dark portion plus its m-disk-dark
portion is at least |σm (ℓ)| + |σm,D (ℓ)|. To see this, note that Ax can be computed by switching the
(m,D)
(m)
horizontally, rather than vertically; i.e.,
order Rof integration,
Rx and Rx
R 1“slicing” theR regions
1
1
Ax = 0 h(y)dy = 0 hm (y)dy + 0 hm,D (y)dy, where hm (y) is the m-dark length of the horizontal
(m,D)
line through y, hm,D (y) is the length of the intersection of Rx
with a horizontal line through
y, and h(y) is the chargeable length of the horizontal line through y. In other words, hm (y) (resp.,
hm,D (y)) is the length of the m-dark (resp., m-disk-dark) portion of the horizontal line through y.
R1
R1
Thus, since Ax ≥ Ay , we get that 0 h(y)dy ≥ 0 g(y)dy ≥ 0. Thus, it cannot be that for all values
of y ∈ [0, 1], h(y) < g(y), so there exists a y = y ∗ for which h(y ∗ ) ≥ g(y ∗ ). The horizontal line
through this y ∗ is a cut satisfying the claim of the lemma.
If, instead, we had Ax ≤ Ay , then we would get a vertical cut satisfying the claim.
✷
Now that we know there must be a favorable cut, ℓ, we can charge off the cost of the m-span
and the m-disk-span of ℓ, making “red” charge on the bottoms (resp., tops) of segments of E that
lie above (resp., below) m-dark points of ℓ, and making “blue” charge on the bottoms (resp., tops)
of disks that lie above (resp., below) m-disk-dark points of ℓ. We then recurse on each side of the
cut, in the two new windows.
After a portion of E has been charged red on one side, due to a cut ℓ, it will be within m levels
of the boundary of the windows on either side of ℓ, and, hence, within m levels of the boundary of
any future windows, found deeper in the recursion, that contain the portion. Thus, no portion of
E will ever be charged red more than once from each side,
√ in each of the two directions, horizontal
or vertical, so no portion of E will ever pay more than 2/m times its length in red charge. We
1
per unit length of the perimeter of the segment’s axis-aligned bounding
charge at the rate of 2m
box,
and
the
worst
case
is
achieved for a segment of slope ±1. Thus, the total red charge is at most
√
2
m L.
Similarly, no disk will ever have its boundary charged blue more than once from each of the
1
per unit length of its
two directions, horizontal or vertical. Since it is charged at the rate of 2m
axis-aligned bounding box, whose perimeter is 8δ, we get a total blue charge of at most 4δ
m n. We
now appeal to the lower bound from the previous section, which was based on an area argument.
Here, for radius δ disks, that argument shows that πδ2 n ≤ AL ≤ 4δL + (2δ)2 π, from which we get
10
4
L + 4. Note that this area argument uses the fact that E is connected. Thus, the total blue
n ≤ πδ
16
charge is at most πm
L + 16δ
m .
It is also important to note that we are always charging red portions of the original edge set
E: the new edges added are never themselves charged, since they lie on window boundaries and
cannot therefore serve to make a portion of some future cut m-dark.
Overall, then, the total increase in length caused by adding the m-spans and m-disk-spans along
favorable cuts is bounded by
√
16δ
16 + π 2
L+
.
πm
m
Our goal in adding the m-disk-span is to obtain a succinct representation of which disks that
straddle the boundary of a window are visited within the window and which are visited outside
the window. The m-disk-span segment visits all but a constant, O(m), number of the disks on
the corresponding side of the window. There is, however, one remaining issue with respect to the
m-disk-span segments: We need to argue that we can “afford,” within our charging scheme, to
connect the m-disk-span to the input edge set, E. This is because, in our dynamic programming
optimization, we will find a shortest possible planar graph with the m-guillotine property that obeys
certain connectivity constraints, as well as other properties that guarantee that the graph has an
Eulerian subgraph spanning all disks. The optimal graph that we compute uses the m-disk-span
segments to visit the corresponding disks on the boundaries of windows that define subproblems.
Remark. (Clarification added after journal publication.) We had previously phrased the above as
“find a shortest possible connected planar graph with the m-guillotine property”; we have rephrased
to be“find a shortest possible planar graph with the m-guillotine property that obeys certain connectivity constraints”.
In particular, we add connections to E from the endpoints of the m-disk-span to the point of
E in the corresponding disk that is closest to the endpoint. We know that this connection is of
length at most 2δ per endpoint of the m-disk-span, since the disks are of diameter 2δ. In total,
this adds only 4δ to the length of the m-disk-span. Assuming the m-disk-span stabs at least three
or more disks, its length is at least Ω(δ), implying that we can charge off this extra 4δ for the
connections in the same way that we charge off the m-disk-spans themselves. If, on the other
hand, the m-disk-span stabs only one or two disks, then we can afford to skip the addition of the
m-disk-span altogether, and just keep track in the dynamic program of the necessary information
for these couple extra disks, specifying whether they are to be visited within the window or not.
Remark. (Clarification added after journal publication; thanks to Sophie Spirkl for her inquiry
and input.) We argue above that we can afford to add connections to E, since the length added is
proportional to the bridge length. Our dynamic programming algorithm computes a minimum-length
planar network with the m-guillotine property that obeys certain connectivity constraints, so that
all of the network is connected except (possibly) the m-disk-spans, which may not be connected to
the rest of the (connected) network. The objective function in the dynamic program requires that we
minimize the total length of the network, counting the lengths of the bridges that serve as m-diskspans a constant number of times. Then, since we know we can afford to add length proportional
to the total m-disk-span lengths, we know we can add the connections mentioned above, resulting
in an overall connected network (and can make it Eulerian with appropriate doubling of the bridge
segments, in the usual way, as mentioned again below), appropriately close to the optimal length. ✷
11
Corollary 1 The TSPN for a set of disjoint equal-size disks has a PTAS. The same is true for
a set of nearly disjoint, nearly equal-size disks, for which there is a constant upper bound on the
ratio of largest to smallest radius and there is a constant factor such that the disks become disjoint
if their radii are each multiplied by the factor while keeping the center points the same.
Proof. We consider only the case of disjoint disks each of radius δ; the generalization to nearly
disjoint, nearly equal-size disks is straightforward.
We impose a regular m-by-m grid on each disk; let G denote the resulting set of O(m2 n) grid
points.
Consider an optimal tour, OP T , of length L∗ . Now, OP T is a simple polygon. We can
perturb the vertices of OP T so that each lies at a grid point in G, resulting in a new tour, OP T ′ ,
visiting every disk, whose length is at most L∗ + O(nδ/m). Using the fact, from the previous
4 ∗
L + 4, and assuming that n ≥ 8, we get that the length of OP T ′ is at most
section, that n ≤ πδ
4
8
∗
L∗ + O( πm
L∗ + 4δ
m ) ≤ L (1 + O( πm )). If n < 8, then we can solve the problem in constant time by
brute force.
Theorem 1 implies that we can convert OP T ′ , which consists of some set E of edges, into a
planar graph, OP T ′′ , obeying the m-guillotine property, while not increasing the total length by
too much. In particular, the length of OP T ′′ is at most
√
8
16δ
2 + 16/π ∗
)L (1 + O(
)) +
≤ (1 + O(1/m))L∗ .
(1 +
m
πm
m
We now apply a dynamic programming algorithm, running in O(nO(m) ) time, to compute a
minimum-length planar graph having a prescribed set of properties: (1) it satisfies the m-guillotine
property, which is necessary for the dynamic program to have the claimed efficiency; (2) it visits at
least one grid point of G in each region Di ; and (3) it contains an Eulerian subgraph that spans the
disks. This third condition that allows us to extract a tour in the end. We only outline here the
dynamic programming algorithm; the details are very similar to those of [17], with the modification
to account for the m-disk-span.
A subproblem is defined by a rectangle W whose coordinates are among those of the grid
points G, together with a constant amount (O(m)) of information about how the solution to the
subproblem interacts across the boundary of W with the solution outside of W . This information
includes the following:
(a) For each of the four sides of W , we specify a “bridge” segment and at most 2m other segments
with endpoints among G that cross the side; this is done exactly as in the case of the Euclidean
TSP on points, as in [17].
(b) For each of the four sides of W , we specify a “disk bridge” segment corresponding to the
m-disk-span, and, for each of at most 2m disks that are not intersected by the disk bridge
segment, we specify in a single bit whether the disk is to be visited within the subproblem or
not; if not, it is visited outside the window W .
(c) We specify a required “connection pattern” within W . In particular, we indicate which subsets
of the O(m) specified edges crossing the boundary of W are required to be connected within
W . This, again, is done exactly as is detailed for the Euclidean TSP on point sets in [17].
In order to end up with a graph having an Eulerian subgraph spanning the disks, we use the
same trick as done in [17]: we “double” the bridge segments and the disk bridge segments, and then
12
require that the number of connections on each side of a bridge segment satisfy a parity condition.
Exactly as in [17], this allows us to extract a tour from the planar graph that results from the
dynamic programming algorithm, which gives a shortest possible graph that obeys the specified
conditions.
The result is that in polynomial time (O(nO(m) )) one can compute a shortest possible graph,
from a special class of such graphs, and this graph spans the regions D. Theorem 1 guarantees
that the length of the resulting graph is very close, within factor 1 + O(1/m), to the length of an
optimal solution to the TSPN. (We also know from the remarks previously, that we can afford to add
connections to assure that the m-disk-spans are connected to the rest of the (connected) network.)
Thus, once we extract a tour from the Eulerian subgraph, we have the desired (1+ǫ)-approximation
solution, where ǫ = O(1/m).
Finally, we mention that the running time of O(nO(m) ) can be improved to O(nC ), for a constant
C independent of m, using the notion of grid-rounded guillotine subdivisions, as in [18, 19]; here, the
dependence on the constant m is exponential in the multiplicative constant concealed by the big-Oh
of O(nC ). We suspect that the techniques of Rao and Smith [23], based on Arora’s method [2],
can be used to improve the time bound to O(n log n), while possibly also addressing the problem
in higher dimensions; we leave this for future work.
✷
4
Connected Regions of the Same Diameter
In this section we give a constant-factor approximation algorithm for the TSPN problem that
applies in the case that all regions have the same diameter or nearly the same diameter.
The diameter of a region, δ, is the distance between two points in the region that are farthest
apart. Without loss of generality, we assume that all regions have unit diameter, δ = 1. The general
method we use is to carefully select a representative point in each region, and then compute an
almost optimal tour on these representative points. This approach was initiated in [1]. We also
employ a specialized version of the Combination Lemma in [1]. Now we describe the algorithm,
which is similar in many aspects to the one in [1].
In each region, compute a unit-length diameter segment; in case of multiple such segments,
select one arbitrarily. Computing a diameter segment of a region can be done efficiently, in time
linear in the complexity of the region. Classify the regions into two types: (1) those for which
the selected diameter is almost horizontal, by which we mean its slope is between −45◦ and 45◦ ;
(2) those for which the selected diameter is almost vertical, by which we mean all the others. Use
algorithm A (below) for each of these two region types. We will prove that a constant ratio is
achievable for each class, after a suitable transformation is applied to regions of type (2). We then
apply the Combination Lemma to obtain a constant-factor approximation for all regions.
Lemma 2 (Combination Lemma) Given regions that can be partitioned into two types — those
having almost horizontal unit diameters, and those having almost vertical unit diameters respectively
— and constants c1 , c2 bounding the error ratios with which we can approximate optimal tours on
regions of types 1 and 2, then we can approximate the optimal tour on all regions with an error
ratio bounded by c1 + c2 + 2.
We omit the proof, which is a simplified version of the argument in [1]. The bound on the
approximation ratio is still the same. We remark that the Combination Lemma in [1] implicitly
13
assumes that for each of the two types, the diameters of the regions are parallel to some direction,
an assumption which does not hold in our case.
Algorithm A gives a constant-factor approximation of the optimal tour for regions of type (1).
Regions of type (2) are readily handled by rotating them by 90◦ to obtain type (1) regions. When
the diameters are nearly the same, so that the ratio of the largest to the smallest is bounded by
a constant, we can still get an approximation algorithm with a constant ratio; however since this
ratio is rather large even for same diameters, we omit the calculations.
A set of lines is a cover of a set of regions if each region is intersected by at least one line from
the covering set. We refer to such a set of lines as covering lines.
A
F
E
D
B
C
Figure 5: Illustration of Step 1 in Algorithm A
Algorithm A. Input: a set of n regions of type (1).
Step 1. Construct a cover of the regions by a minimum number of vertical lines. This procedure
works in a greedy fashion, namely the leftmost line is as far right as possible, so that it is a right
tangent of some region. To obtain this cover, the intervals of projection on the x-axis of all regions
are computed and a greedy cover of this set of intervals is found. After removing all intervals covered
by a previous line, and there are still uncovered intervals, another covering line is repeatedly added
to the cover. At the same time, a representative point for each region is arbitrarily selected on the
corresponding covering line and inside the region, e.g., the topmost boundary point of intersection
between the region and its covering line. In this way n representative points, one per region, are
selected. An illustration of this procedure appears in Figure 5. An important remark is that the
representative points are not necessarily on the selected diameters, since a diameter may not be
entirely contained in its region.
Assuming that we have only regions of type (1), the greedy cover has the effect of obtaining
14
a large enough horizontal distance between any two consecutive covering lines. We remark that
the greedy covering algorithm for a set of closed intervals on a line is known to output a cover of
minimum size, a property which carries over to our vertical line cover.
Step 2. Proceed according to the following three cases.
Case 1: The greedy cover contains one covering line.
Compute a smallest perimeter axis-aligned rectangle Q that intersects all regions, where Q is
considered a two-dimensional domain. Let w and h denote Q’s width and height respectively.
Consider Q to be a graph with four vertices and four edges (its four sides). Let e1 and e2
be the vertical segments of height h that partition Q into three equal-width parts. Add to
the graph Q a double edge corresponding to e1 and a doubled edge corresponding to e2 . The
resulting graph G is an Eulerian multigraph, since all node degrees are even, with 8 vertices
and 12 edges. Output any Euler tour T of G. While such a tour is not, in general, the shortest
possible tour visiting the regions, it suffices for our purposes of approximation.
Case 2: The greedy cover contains two covering lines.
Move (if possible) the rightmost vertical covering line to the left as much as possible (while
still covering all regions). Recompute the representative points obtained in this way. Set D
to be the distance between the two covering lines (clearly D > 0).
Case 2.1: D ≥ 3.
Compute an axis-aligned rectangle Q of width w = D, with its vertical sides along the
two covering lines, and of minimal height, which includes all representative points (on
the two covering lines). Let h denote Q’s height. Output the tour T that is the perimeter
of Q.
Case 2.2: D ≤ 3 (similar to Case 1).
Compute a smallest perimeter axis-aligned rectangle Q that touches (intersects) all regions, where Q is considered to be a two-dimensional domain. Let w and h denote Q’s
width and height respectively. Note that w ≤ 5. Let e1 , . . . , e7 be the vertical segments
of height h that partition Q into eight equal-width parts. Consider the edges of Q,
together with doubled copies of the edges e1 , . . . , e7 , to define an Eulerian multigraph,
G, having 18 vertices and 32 edges. Output any Euler tour T of G.
Case 3: The greedy cover contains at least three covering lines.
Compute T , a (1 + ǫ)-approximate tour of the representative points as the output tour.
If the regions are simple polygons, then a minimum-perimeter touching rectangle Q is determined by at most four contact points with region boundary arcs. A brute force procedure examining
all possible k-tuples, k ≤ 4, of such arcs computes Q in O(N 5 ) time. The total running time of
the approximation algorithm is either bounded by the complexity of the above step or by the complexity of computing (1 + ǫ)-approximate tours on n points, depending on the size of the greedy
cover.
Theorem 2 Given a set R of n connected regions of the same diameter in the plane, a O(1)approximation of an optimal tour can be computed in polynomial time.
15
Proof. Let OP T be an optimal region tour. We address each of the cases we distinguished in the
previous algorithm. We will use repeatedly the following simple fact (see [1]): For positive a, b, w, h
the following inequality holds
p
p
(4)
aw + bh ≤ a2 + b2 w2 + h2 .
Case 1. Write diag(Q) for the diagonal of the rectangle Q. We first argue that T visits all regions.
Since all regions are covered by a unique covering line, they lie in a vertical strip of width
√≤ 2δ = 2.
So w ≤ 2. The horizontal projection of each type (1) region (on the x-axis) is at least 1/ 2. Hence,
each region is intersected either by the boundary of Q or by one of the two vertical segments inside
√
Q, since these segments partition Q into three subrectangles each of width at most 2/3 < 1/ 2.
(Each region that is not intersected by the perimeter of Q lies entirely inside Q). Consequently, T
is a valid region tour. We first give a lower bound on |OP T |. Since the length of a tour touching
all four sides of a rectangle is at least twice the length of the diagonal of the rectangle (see [1]),
p
|OP T | ≥ 2diag(Q) = 2 w2 + h2 .
The length of T is
√ p
√
|T | = 2w + 6h = 2(w + 3h) ≤ 2 10 w2 + h2 ≤ 10|OP T |.
Case 2.1: D ≥ 3. We distinguish two sub-cases.
Case 2.1.a: h ≤ 2. Recall that w = D ≥ 3.
|OP T | ≥ 2(w − 2),
|T | = 2w + 2h ≤ 2w + 4 ≤ 10(w − 2) ≤ 5|OP T |.
Case 2.1.b: h ≥ 2. Since each region has unit diameter, the optimal tour may lie inside
Q at distance at most one from its boundary, so it must touch all four sides of some rectangle Q′
having width ≥ w − 2 and height ≥ h − 2. Hence
p
|OP T | ≥ 2 (w − 2)2 + (h − 2)2 .
Since 8w + 8h ≥ 40, we have
√
√ p
|T | = 2w + 2h ≤ 10((w − 2) + (h − 2)) ≤ 10 2 (w − 2)2 + (h − 2)2 ≤ 5 2|OP T |.
√
Case 2.2: D ≤ 3. The horizontal projection of each region is at least 1/ 2 and the rectangle Q,
of width w ≤ 5, is partitioned
√ into 8 subrectangles, each of width ≤ 5/8, by the vertical segments
e1 , . . . , e7 . Thus, since 1/ 2 > 5/8, T visits all regions. (As in Case 1, each region that is not
intersected by the perimeter of Q lies entirely inside Q; hence, it is intersected by one of the seven
vertical segments.) A similar calculation yields
p
|OP T | ≥ 2diag(Q) = 2 w2 + h2 .
p
p
p
|T | = 2w + 16h ≤ 2 12 + 82 w2 + h2 ≤ 2(8.1) w2 + h2 ≤ 8.1|OP T |.
Case 3. Partition the optimal tour OP T into blocks OP Ti , with i ≥ 1. OP T1 starts at an arbitrary
point of intersection of OP T with the leftmost covering line, and ends at the last intersection of
16
OP T with the second from the left covering line, before OP T intersects a different covering line.
Notice that OP T does not cross to the left of the leftmost covering line. In general, the blocks
OP Ti are determined by the last point of intersection of OP T with a covering line, before OP T
crosses a different covering line. In Figure 5, the hypothetical optimum tour is partitioned into six
blocks AB, BC, CD, DE, EF, F A. For example, OP T crosses the second vertical line twice before
crossing the third vertical line, and B is the last point of intersection with the second line. Consider
the bounding box Q of OP Ti , the smallest perimeter axis-aligned rectangle which includes OP Ti .
Write w for its width and h for its height. There are two cases to consider.
Case 3.1: OP Ti intersects regions stabbed by two consecutive covering lines only, l1 , l2 say, at
distance w1 . This implies that OP Ti lies between these two covering lines, so w = w1 . Without
loss of generality, OP Ti touches the lower side of Q, at some point C, before it touches
√ the upper
side of Q,
√ at some point D. Since the horizontal projection of each region is at least 1/ 2, we have
w1 ≥ 1/ 2. Let 0 ≤ a, b ≤ h specify the starting and ending points A and B of OP Ti ; see Figure 6.
Namely, a is the vertical distance between A, the start point of OP Ti , and the lower horizontal side
of Q, and b is the vertical distance between B, the end point of OP Ti , and the upper horizontal
side of Q. By considering the reflections of OP Ti with respect to the two horizontal sides of Q, we
get that |OP Ti | is bounded from below by the length of the polygonal line A′ CDB ′ :
p
(5)
|OP Ti | ≥ |A′ CDB ′ | ≥ (h + a + b)2 + w1 2 .
B’
b
b
B
D
E
B
h
A
1 F
1
h
A
a
a
C
w = w1
D 1
A’
l1
l2
w = w1
l1
1
G
l2
Figure 6: Case 3.1: 2 lines.
We show that there exists a partial tour Ti (a path) of the representative points of all the regions
OP Ti visits, of length bounded by c|OP Ti | for some positive constant c, where Ti starts at A and
ends at B. Take Ti = ADEF GB, where the points D, E, F, G are on the lines l1 , l2 at unit distance
from the corners of Q; see Figure 6.
|Ti | ≤ (a + 1) + (1 + h + 1) + (w1 ) + (1 + h + 1) + (1 + h − b) ≤ 3(h + a + b) + (w1 + 6)
q
p
√
√
≤ 3(h + a + b) + (6 2 + 1)w1 ≤ 32 + (6 2 + 1)2 (h + a + b)2 + w1 2 < 9.95|OP Ti |. (6)
Put Ti together to get a tour T of the representative points, having length smaller than 9.95|OP T |.
Then, for ǫ ≤ 0.05, the (1 + ǫ) approximate tour of representatives, which the algorithm actually
computes, has length at most 10|OP T |.
17
Case 3.2: OP Ti intersects regions stabbed by three consecutive covering lines only, l1 , l2 and l3 .
Denote by w1 (resp., w2 ) the horizontal distance between l1 and l2 (resp., l2 and l3 ). This implies
that OP Ti lies between these three covering lines, but it does not touch the rightmost line l3 . We
can assume that OP Ti starts at A and ends at B, and as in the previous case, that it touches the
′
lower side of Q, at some point C, before it touches the upper side of Q, at some point D. Let l
′
′
be the supporting line
side of Q, and w be the horizontal distance between l2 and l .
√ of the right
′
We have w1 , w2 ≥ 1/ 2 and w ≥ max(0, w2 − 1). The case when OP Ti touches the upper side of
′
Q before it touches l is shown is Figure 7; the other case is similar and we get the same bound on
|OP Ti |. Let a, b, A, B be as before. We distinguish two sub-cases:
Case 3.2.a: w2 ≤ 1. The lower bound on OP Ti we have used earlier is still valid.
p
|OP Ti | ≥ (h + a + b)2 + w1 2 .
We show a partial tour Ti of the representative points of all the regions OP Ti visits. Take Ti =
ADEF BGHIF B; see Figure 7. Points E, F and I (resp., D, G and H) are on the lines l1 , l2 and
l3 at unit vertical distance above the upper side (resp., below the lower side) of Q.
|Ti | ≤ (a + 1) + (1 + h + 1) + w1 + (1 + h + 1) + w2 + (1 + h + 1) + w2 + (1 + b)
√
≤ 3(h + a + b) + (w1 + 2w2 + 8) ≤ 3(h + a + b) + (10 2 + 1)w1
q
p
√
≤ 32 + (10 2 + 1)2 (h + a + b)2 + w1 2 < 15.45|OP Ti |.
(7)
Put Ti together to get a tour T of the representative points, having length smaller than 15.45|OP T |.
Then, for ǫ ≤ 0.05, the (1 + ǫ)-approximate tour of representatives has length at most 15.5|OP T |.
w
′
h
b
D
b
B
A
a
a
l1
w
l2
I
B
h
C w1
F
E
′
D
l
h
A
′
l1
w1
w2
G
l2
H
l3
Figure 7: Case 3.2: 3 lines.
Case 3.2.b: w2 ≥ 1. We use a different lower bound on OP Ti .
p
|OP Ti | ≥ (h + a + b)2 + (w1 + 2w2 − 2)2 ,
(8)
which we get by considering the reflections of OP Ti with respect to the two horizontal sides of Q
′
and with respect to l ; see Figure 7. Take Ti = ADEF BGHIF B as in Case 3.2.a.
√
|Ti | ≤ 3(h + a + b) + (w1 + 2w2 + 8) ≤ 3(h + a + b) + (10 2 + 1)(w1 + 2w2 − 2)
18
≤
q
p
√
32 + (10 2 + 1)2 (h + a + b)2 + (w1 + 2w2 − 2)2 < 15.45|OP Ti |.
(9)
Put Ti together to get a tour T of the representative points, having length smaller than 15.45|OP T |.
Then, for ǫ ≤ 0.05, the (1 + ǫ)-approximate tour of representatives has length at most 15.5|OP T |.
The overall approximation ratio of the algorithm, derived from the Combination Lemma is 15.5 +
15.5 + 2 = 33.
✷
Comparison with [1]. We point out some of the similarities and differences between the techniques of Arkin and Hassin [1] and our algorithm and its analysis, which is based on theirs. First,
in [1], three different algorithms are presented, for parallel equal-length segments, translates of a
convex region, and translates of an arbitrary connected region. The second two algorithms are
refinements of the first, and representative points are chosen differently in each case. We presented
here a single algorithm that works for all regions of type (1). Our consideration of cases 1 and 2
are slightly different from the corresponding cases of [1], which allows us to handle a larger class
of inputs, namely regions of type (1); e.g. in case 2, [1] distinguishes between the subcases D ≤ 1
and D ≥ 1, while we distinguish between D ≤ 3 and D ≥ 3, and the cases are treated slightly
differently. Finally, the analysis of the algorithms is based on similar ideas, e.g. to divide the
optimal tours into blocks; our analysis differs in being able to address a single algorithm and a
larger class of inputs.
Some Special Cases
We note that our calculations of the approximation ratio for connected regions of a same diameter, give improved bounds for three cases addressed in [1]:
√
√
1. parallel equal segments, from 3 2 + 1, to 3 2,
√
√
2. translates of a convex region, from 32 + 72 + 1, to 32 + 72 ,
√
√
3. translates of a connected region, from 32 + 112 + 1, to 32 + 112 .
The reason why these cases can be improved, and the new approximation ratios have similar
expressions with the old ones, is that our algorithm A is similar to the algorithms in [1] for those
cases.
We exemplify here the case of parallel equal segments and omit details for the rest. The
algorithm computes a greedy cover of the segments, assumed to be of unit length, using vertical
lines. Then it proceeds
√ according to the cardinality of the cover. Cases 1 and 2 are treated in
[1], and the ratio is 2; this is not the bottleneck case. In Case 1 (one covering line), an optimal
tour is easy to obtain. In Case 2 (two covering lines), a smallest aligned rectangle which touches
all segments is the output tour. In Case 3 (three or more covering lines) the algorithm computes
an almost optimal tour of the representative points, as algorithm A does. Its analysis is divided
into two sub-cases, as in the proof of Theorem 2. In the first sub-case (OP Ti intersects segments
covered by two consecutive covering lines only), the lower bound in Equation (5) on |OP Ti | is valid.
The upper bound in Equation (6) on |Ti | is adjusted by dropping the constant term equal to +6.
Then
p
√
|Ti | ≤ 3(h + a + b) + w1 ≤ 32 + 12 |OP Ti | = 10|OP Ti |.
19
In the second sub-case (OP Ti intersects segments covered by three consecutive covering lines only),
the lower bound in Equation (8) on |OP Ti | is valid. The upper bound in Equation (9) on |Ti | is
adjusted by dropping the constant term equal to +8. We also have that w1 , w2 > 1. Then
√
|Ti | < 3(h + a + b) + w1 + 2w2 ≤ 3(h + a + b) + 3(w1 + 2w2 − 2) ≤ 3 2|OP Ti |.
√
The overall approximation ratio obtained for parallel equal segments is 3 2.
5
Lines
We consider now the case in which the n regions defining the TSPN instance are infinite straight
lines in the plane. It is interesting that this case allows for an exact solution in polynomial time:
Proposition 3 Given a set L of n infinite straight lines in the plane, a shortest tour that visits L
can be computed in polynomial time.
Proof. We convert the problem to an instance of the watchman route problem in a simple polygon.
A watchman route in a polygon is a tour inside the polygon, such that every point in the polygon
is visible from some point along the tour. The watchman route problem asks for a watchman route
of minimum length [3]. The problem is known to have an O(n5 ) algorithm; see [26], as well as [8].
Let B be a rectangle that contains all of the vertices of the arrangement of L. At any one of the
two points of intersection between a line li ∈ L and the boundary of B, we extend a very narrow
“spike” outward from that point, along li , for some fixed distance. Let P be the simple polygon
having 3n + 4 vertices that is the union of B and these n spikes, as illustrated in Figure 8. We
make the observation that a tour T visits all of the lines in L if and only if it sees all of the polygon
P , as required by the watchman route problem. Consequently, we can solve the TSPN on the set
of lines L by solving the watchman route problem on polygon P .
✷
Figure 8: Proof of Proposition 3.
Given the high running time of the watchman route algorithms, it is of interest to consider
more efficient algorithms that may approximate the optimal solution. To this end, we now present
a linear-time constant-factor approximation algorithm.
20
Let L = {l1 , . . . , ln } be the input set of n lines. A minimum touching circle (disk) is a circle of
minimum radius which intersects all of the lines in L. The algorithm computes and outputs CL , a
minimum touching circle for L. We will show that this provides a tour of length at most π2 |OP T |,
where, as usual, OP T denotes an optimal tour. First we argue about the approximation ratio, and
leave for later the presentation of the algorithm. To start, we assume for simplicity that no two
lines are parallel, though this assumption will be later removed.
Observation 1 The optimal tour of a set of lines is a (possibly degenerate) convex polygon P .
Proof. It is easy to see that an optimal tour must be polygonal, consisting of a finite union of
straight line segments. If an optimal tour were a non-convex polygon P , we obtain a contradiction
to its optimality since the boundary of the convex hull of P , which is shorter than P , also visits all
of the lines L, since P does.
✷
Observation 2 CL is determined by 3 lines in L, i.e. it is the inscribed circle in the triangle ∆
formed by these 3 lines.
We distinguish two cases:
Case 1. ∆ is an acute triangle. It is well known that for an acute triangle, the minimum perimeter
inscribed triangle (having a vertex on each side of the triangle) is its pedal triangle, whose vertices
are the feet of the altitudes of the given triangle (see e.g. [22]). So in this case, the optimal tour
OP T∆ , which visits the 3 lines of ∆ is its pedal triangle; we denote by y its perimeter. Clearly y is
a lower bound on |OP T |: |OP T | ≥ |OP T∆ | = y. Denote by s the semi-perimeter of ∆, by R the
radius of its circumscribed circle, and by r the radius of its inscribed circle.
Fact 1 For an acute triangle ∆, s > 2R.
Proof. If A, B, C are the angles of ∆, this is equivalent to
R(sin A + sin B + sin C) > 2R.
After simplification with R, this is a well known inequality in the geometry of an acute triangle
([6], page 18).
✷
Fact 2 For an acute triangle ∆, y =
2rs
R .
A proof of this equality can be found in [6], page 86.
Claim 1 For an acute triangle ∆, r < y4 .
Proof. Putting the above together, we get r =
Ry
2s
<
The length of the output tour is bounded as follows
21
Ry
4R
= y4 .
✷
y
π
π
= y ≤ |OP T |.
4
2
2
Case 2. ∆ is an obtuse triangle. In this case, |OP T∆ | = 2h, where h is the length of the altitude
corresponding to the obtuse angle, say A. Clearly 2h is a lower bound on |OP T |: |OP T | ≥
|OP T∆ | = 2h.
|CL | = 2πr < 2π
Fact 3 For any triangle ∆, h > 2r.
Proof. Let S denote the area of the triangle with side lengths a, b, and c. Then, we know that
S = ah/2, by our definition of the altitude h. We also know from elementary geometry that
S = (a + b + c)r/2, recalling that r is the radius of the inscribed circle of the triangle. Thus,
ah = (a + b + c)r, from which we obtain
a+b+c
a+a
h
=
>
= 2,
r
a
a
using the triangle inequality.
✷
Using this inequality, we have |OP T∆ | = 2h > 4r. The length of the output tour is bounded as
follows
π
π
π
|CL | = 2πr = (4r) < |OP T∆ | ≤ |OP T |.
2
2
2
Thus, in both cases, the approximation ratio is π2 ≤ 1.58.
When CL is determined by 3 lines in L of which two are parallel at distance h, we say that they
form a generalized triangle ∆. Clearly 2h is a lower bound on |OP T |: |OP T | ≥ |OP T∆ | = 2h. We
also have r = h/2, where r is the radius of CL , thus
π
|CL | = 2πr = πh ≤ |OP T |.
2
We now describe the algorithm for computing CL . The distance d(p, l) from a point p of
coordinates (x0 , y0 ) to a line l of equation ax + by + c = 0 is
d(p, l) =
|ax0 + by0 + c|
√
.
a2 + b2
Let the lines in L have the equations
(li :)
ai x + bi y + ci = 0, i = 1, . . . , n.
Finding a minimum touching circle amounts to finding the center coordinates (x, y), and a minimum
radius z, s.t.
|ai x + bi y + ci |
q
≤ z, i = 1, . . . , n.
a2i + b2i
This is equivalent to solving the following 3-dimensional linear program
a x + b y + c
−ai x − bi y − ci
i
i
q i
q
≤ z,
≤ z, i = 1, . . . , n ,
min z subject to
a 2 + b2
a2 + b2
i
i
i
i
which takes O(n) time [16]. Consequently, we have proved
Theorem 3 Given a set L of n (infinite straight) lines in the plane, a
visits L can be computed in O(n) time.
22
π
2 -approximate
tour that
6
Conclusion
Several open problems remain, including
(1) Is there a constant-factor approximation algorithm for arbitrary connected regions in the plane?
What if the regions are disconnected? (giving us a geometric version of a “one-of-a-set TSP”)
(2) What approximation bounds can be obtained in higher dimensions? Our packing arguments
for disjoint disks lift to higher dimensions, but our other methods do not readily generalize.
A particularly intriguing special case is the generalization of the case of infinite straight lines:
What can be said in 3-space for the TSPN on a set of lines or of planes?
(3) Is there a PTAS for general pairwise-disjoint regions in the plane?
Acknowledgements
We thank Estie Arkin and Michael Bender for several useful discussions on the TSPN problem. We
thank the anonymous referees for their detailed comments and suggestions, which greatly improved
the paper.
References
[1] E. M. Arkin and R. Hassin, Approximation algorithms for the geometric covering salesman
problem, Discrete Appl. Math., 55:197–218, 1994.
[2] S. Arora, Nearly linear time approximation schemes for Euclidean TSP and other geometric
problems, J. of the ACM, 45(5):1–30, 1998.
[3] T. Asano, S. K. Ghosh, and T. C. Shermer, Visibility in the plane, In Handbook of Computational Geometry (J.-R. Sack and J. Urrutia, editors), pages 829–876. Elsevier Science
Publishers B.V. North-Holland, Amsterdam, 2000.
[4] J. L. Bentley, Fast algorithms for geometric traveling salesman problems, ORSA J. on Comput.,
4(4):387–411, 1992.
[5] M. de Berg, J. Gudmundsson, M. J. Katz, C. Levcopoulos, M. H. Overmars, and A. F. van der
Stappen, TSP with neighborhoods of varying size, Proc. 10th Annual European Symposium on
Algorithms, to appear, September, 2002.
[6] O. Bottema, R. Ž. Djordjević, R. Janić, D. S. Mitrinović and P. M. Vasić, Geometric Inequalities, Wolters-Noordhoff, Groningen, 1969.
[7] P. Berman and M. Karpinski, On some tighter inapproximability results, Technical Report
TR98-065, ECCC, 1998.
[8] S. Carlsson, H. Jonsson and B. J. Nilsson, Finding the shortest watchman route in a simple
polygon, Discrete Comput. Geom. 22(3):377–402, 1999.
[9] M. R. Garey and D. S. Johnson, Computers and Intractability: A Guide to the Theory of
NP-Completeness, W. H. Freeman, New York, NY, 1979.
23
[10] J. Gudmundsson and C. Levcopoulos, A fast approximation algorithm for TSP with neighborhoods, Nordic J. of Comput., 6:469–488, 1999.
[11] J. Gudmundsson and C. Levcopoulos, Hardness result for TSP with neighborhoods, Technical Report LU-CS-TR:2000-216, Department of Computer Science, Lund University, Sweden,
2000.
[12] H. Jonsson, The traveling salesman problem for lines in the plane, Inform. Process. Lett.,
82(3):137–142, 2002.
[13] M. Jünger, G. Reinelt and G. Rinaldi, The traveling salesman problem, In Network Models,
Handbook of Operations Research/Management Science (M. O. Ball, T. L. Magnanti, C. L.
Monma, and G. L. Nemhauser, editors), pages 225–330, Elsevier Science, Amsterdam, 1995.
[14] E. L. Lawler, J. K. Lenstra, A. H. G. Rinnooy Kan and D. B. Shmoys, editors, The Traveling
Salesman Problem. John Wiley & Sons, New York, NY, 1985.
[15] C. Mata and J. S. B. Mitchell, Approximation algorithms for geometric tour and network
design problems, Proc. 11th Annu. ACM Sympos. Comput. Geom., pages 360–369, 1995.
[16] N. Megiddo, Linear programming in linear time when the dimension is fixed, J. of ACM,
31:114–127, 1984.
[17] J. S. B. Mitchell, Guillotine subdivisions approximate polygonal subdivisions: A simple
polynomial-time approximation scheme for geometric TSP, k-MST, and related problems,
SIAM J. on Comput., 28(4):1298–1309, 1999.
[18] J. S. B. Mitchell. Guillotine subdivisions approximate polygonal subdivisions: Part III – Faster
polynomial-time approximation schemes for geometric network optimization. Manuscript, University at Stony Brook, 1997.
[19] J. S. B. Mitchell. Approximation algorithms for geometric optimization problems. In Proc.
Ninth Canadian Conference on Computational Geometry, Queen’s University, Kingston,
Canada, August 11-14, 1997, pp. 229–232.
[20] J. S. B. Mitchell, Geometric shortest paths and network optimization, In Handbook of Computational Geometry (J.-R. Sack and J. Urrutia, editors), pages 633–701. Elsevier Science
Publishers B.V. North-Holland, Amsterdam, 2000.
[21] C. H. Papadimitriou, The Euclidean traveling salesman problem is NP-complete, Theoret.
Comput. Sci., 4:237–244, 1977.
[22] H. Rademacher and O. Toeplitz, The Enjoyment of Mathematics, Princeton University Press,
1957; a translation from Von Zahlen und Figuren, Springer, Berlin, 1933.
[23] S. B. Rao and W. D. Smith, Approximating geometrical graphs via “spanners” and “banyans”,
Proc. 30th Annu. ACM Sympos. Theory Comput., 540–550, 1998.
[24] G. Reinelt, Fast heuristics for large geometric traveling salesman problems, ORSA J. Comput.,
4:206–217, 1992.
24
[25] O. Schwartz and S. Safra, On the complexity of approximating TSP with neighborhoods and
related problems, Manuscript (submitted), July, 2002.
[26] X. Tan, Fast computation of shortest watchman routes in simple polygons, Inform. Process.
Lett., 77(1):27–33, 2001.
25
| 8cs.DS
|
Using Trusted Data to Train Deep Networks on
Labels Corrupted by Severe Noise
Dan Hendrycks * 1 Mantas Mazeika * 1 Duncan Wilson 2 Kevin Gimpel 3
arXiv:1802.05300v1 [cs.LG] 14 Feb 2018
Abstract
The growing importance of massive datasets with
the advent of deep learning makes robustness to
label noise a critical property for classifiers to
have. Sources of label noise include automatic labeling for large datasets, non-expert labeling, and
label corruption by data poisoning adversaries. In
the latter case, corruptions may be arbitrarily bad,
even so bad that a classifier predicts the wrong labels with high confidence. To protect against such
sources of noise, we leverage the fact that a small
set of clean labels is often easy to procure. We
demonstrate that robustness to label noise up to
severe strengths can be achieved by using a set of
trusted data with clean labels, and propose a loss
correction that utilizes trusted examples in a dataefficient manner to mitigate the effects of label
noise on deep neural network classifiers. Across
vision and natural language processing tasks, we
experiment with various label noises at several
strengths, and show that our method significantly
outperforms existing methods.
1. Introduction
Robustness to label noise is set to become an increasingly
important property of supervised learning models. With
the advent of deep learning, the need for more labeled data
makes it inevitable that not all examples will have highquality labels. This is especially true of data sources that
admit automatic label extraction, such as web crawling for
images, and tasks for which high-quality labels are expensive to produce, such as semantic segmentation or parsing.
Additionally, label corruption may arise in data poisoning
(Li et al., 2016; Steinhardt et al., 2017). Both natural and
malicious label corruption are known to sharply degrade the
performance of classification systems (Zhu & Wu, 2004).
We consider the scenario where we have access to a large set
of examples with potentially corrupted labels and determine
*
Equal contribution 1 University of Chicago 2 Foundational Research Institute 3 Toyota Technological Institute at Chicago. Correspondence to: Mantas Mazeika <[email protected]>.
True
GLC (Ours)
1.0
0.8
0.6
Forward
Confusion Matrix
0.4
0.2
0.0
Figure 1: A label corruption matrix C (top left) and three
matrix estimates for a corrupted CIFAR-10 dataset. Entry
Cij is the probability that a label of class i is corrupted to
class j, or Cij = p(ỹ = j|y = i). Our estimate matches
the true corruption matrix closer than the confusion matrix
and the Forward method. Further comparisons and method
descriptions are in Section 4.3.
how much can be gained from access to a small set of
examples where labels are considered gold standard. This
scenario is realistic, as it is usually the case that a number of
trusted examples have been gathered in the validation and
test sets, and that more could be gathered if necessary.
To leverage the additional information from trusted labels,
we propose a new loss correction and empirically verify it on
a number of vision and natural language datasets with label
corruption. Specifically, we demonstrate recovery from
extremely high levels of label noise, including the dire case
when the untrusted data has a majority of its labels corrupted.
Such severe corruption can occur in adversarial situations
like data poisoning, or when the number of classes is large.
In comparison to loss corrections that do not employ trusted
data (Patrini et al., 2016), our method is significantly more
Using Trusted Data to Train Deep Networks
accurate in problem settings with moderate to severe label
noise. Relative to a recent method which also uses trusted
data (Li et al., 2017), our method is far more data-efficient
and generally more accurate. These results demonstrate that
systems can weather label corruption with access only to a
small number of gold standard labels. The code is available
at https://github.com/mmazeika/glc.
2. Related Work
The performance of machine learning systems reliant on
labeled data has been shown to degrade noticeably in the
presence of label noise (Nettleton et al., 2010; Pechenizkiy
et al., 2006). In the case of adversarial label noise, this
degredation can be even worse (Reed et al., 2014). Accordingly, modeling, correcting, and learning with noisy labels
has been well studied (Natarajan et al., 2013; Biggio et al.,
2011; Frénay & Verleysen, 2014).
The methods of (Mnih & Hinton, 2012), (Larsen et al.,
1998), (Patrini et al., 2016) and (Sukhbaatar et al., 2014)
allow for label noise robustness by modifying the model’s
architecture or by implementing a loss correction. Unlike
(Mnih & Hinton, 2012) who focus on binary classification
of aerial images and (Larsen et al., 1998) who assume the
labels are symmetric (i.e., that the noise and the labels are
independent), (Patrini et al., 2016) and (Sukhbaatar et al.,
2014) consider label noise in the multi-class problem setting
with asymmetric labels.
In (Sukhbaatar et al., 2014), the authors introduce a stochastic matrix measuring label corruption, note its inability to be
calculated without access to the true labels, and propose a
method of forward loss correction. Forward loss correction
adds a linear layer to the end of the model and the loss is
adjusted accordingly to incorporate learning about the label
noise. In the work of (Patrini et al., 2016), they also make
use of the forward loss correction mechanism, and propose
an estimate of the label corruption estimation matrix which
relies on strong assumptions and no clean labels.
Contra (Sukhbaatar et al., 2014; Patrini et al., 2016), we
make the assumption that during training the model has access to a small set of clean labels and use this to create our
label noise correction. This assumption has been leveraged
by others for the purpose of label noise robustness, most notably (Veit et al., 2017; Li et al., 2017; Xiao et al., 2015), and
tenuously relates our work to the field of semi-supervised
learning (Zhu, 2005; Chapelle et al., 2010). In (Veit et al.,
2017), human-verified labels are used to train a label cleaning network by estimating the residuals between the noisy
and clean labels in a multi-label classification setting. In the
multi-class setting that we focus on in this work, (Li et al.,
2017) propose distilling the predictions of a model trained
on clean labels into a second network trained on the noisy
labels and the predictions of the first. Our work differs from
these two in that we do not train neural networks on the
clean labels alone.
3. Gold Loss Correction
e of u examples (x, ỹ),
We are given an untrusted dataset D
and we assume that these examples are potentially corrupted
examples from the true data distribution p(x, y) with K
classes. Corruption is according to a label noise distribution
p(ỹ | y, x). We are also given a trusted dataset D of t
examples drawn from p(x, y), where t/u 1. We refer
to t/u as the trusted fraction. Concretely, a web scraper
labeling images from metadata may produce an untrusted
set, while expert-annotated examples would form a trusted
dataset and be a gold standard.
In leveraging trusted data, we focus our investigation on the
stochastic matrix correction approach used by (Sukhbaatar
et al., 2014; Patrini et al., 2016). In this approach, a stochastic matrix is applied to the softmax output of a classifier,
and the resulting new softmax output is trained to match the
noisy labeling. If the stochastic matrix is engineered so as to
approximate the label noising procedure, this approach can
bring the original output close to the distribution of clean
labels, under moderate assumptions.
We explore two avenues of utilizing the trusted dataset to
improve this approach. The first involves directly using the
trusted data while training the final classifier. As this could
be applied to existing stochastic matrix correction methods,
we run ablation studies to demonstrate its effect. The second
avenue involves using the additional information conferred
by the clean labels to obtain a better matrix to use with
the approach. As a first approximation, one could use a
normalized confusion matrix of a classifier trained on the
untrusted dataset and evaluated on the trusted dataset. We
demonstrate, however, that this does not work as well as the
estimate used by our method, which we now describe.
Our method makes use of D to estimate the K × K matrix of corruption probabilities Cij = p(ỹ = j | y = i).
Once this estimate is obtained, we use it to train a modified
classifier from which we recover an estimate of the desired
conditional distribution p(y | x). We call this method the
Gold Loss Correction (GLC), so named because we make
use of trusted or gold standard labels.
3.1. Estimating The Corruption Matrix
To estimate the probabilities p(ỹ | y), we make use of the
identity
p(ỹ | x) =
K
X
y=1
p(ỹ | y, x)p(y | x).
Using Trusted Data to Train Deep Networks
The left hand side of the equality can be approximated by
e Let θ̃ be the parameters
training a neural network on D.
of this network, and let p̂(ỹ | x; θ̃) be its softmax output
vector.
Given an example x and its true one-hot label y, the term
on the right reduces to p(ỹ | y, x) = p(ỹ | x). In the
case where ỹ is conditionally independent of x given y, this
further reduces to p(ỹ | x) = p(ỹ | y). In the case where ỹ
is not conditionally independent of x given y, we can still
approximate p(ỹ | y). We know
p(ỹ, y, x)
p(x | ỹ, y)p(ỹ | y)p(y)
p(ỹ | y, x) =
=
p(y, x)
p(x | y)p(y)
p(x | ỹ, y)
= p(ỹ | y)
.
p(x | y)
This forces p(ỹ | y, x)p(x | y) = p(ỹ | y)p(x | ỹ, y).
Integrating over all x gives us
Z
Z
p(ỹ | y, x)p(x | y) dx = p(ỹ | y) p(x | ỹ, y) dx
= p(ỹ | y).
We approximate the integral on the left with the expectation
of p(ỹ | y, x) over the empirical distribution of x given y.
More explicitly, let Ai be the subset of x in D with label i.
b We have
Denote our estimate of C by C.
X
bij = 1
C
p̂(ỹ = j | x)
|Ai |
x∈Ai
1 X
=
p̂(ỹ = j | y = i, x)
|Ai |
x∈Ai
≈ p(ỹ = j | y = i).
This is how we estimate our corruption matrix for GLC. The
second equality comes from noting that if y is known, the
preceding discussion implies p(ỹ | x) = p(ỹ | y, x). This
approximation relies on p̂(ỹ | x) being a good estimate of
p(ỹ | x) and on the number of trusted examples of each
class.
3.2. Training a Corrected Classifier
b we follow the method of (Sukhbaatar et al.,
Now with C,
2014; Patrini et al., 2016) to train a corrected classifier.
Given the K × 1 softmax output s of our classifier, we
b We then reinitialize θ
define the new outputs as s̃ := Cs.
and train the model p̂(s̃ | x; θ) on the noisy labels with crossentropy loss. If ỹ is conditionally independent of x given y,
and if C is nonsingular, then
it follows from the invertibility
e = argminθ L s, D given that
of C that argminθ L s̃, D
b is a perfect estimate of C.
C
We find using s̃ to work well in practice, even for some
singular corruption matrices. We can further improve on
this method by using the data in the trusted set to train
the corrected classifier. On examples from the trusted set
b to the
encountered during training, we temporarily set C
identity matrix to turn off the correction. This has the effect of allowing our label correction to handle a degree of
instance-dependency in the label noise (Menon et al., 2016).
A summary of our method is in the algorithm below.
Algorithm G OLD L OSS C ORRECTION (GLC)
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
e loss `
Input: Trusted data D, untrusted data D,
e with loss `
Train network f (x) = p̂(e
y |x; θ) on D
b ∈ RK×K with zeros, K the number of classes
Fill C
for k = 1, . . . , K do
num_examples = 0
for (xi , yi ) ∈ D such that yi = k do
num_examples += 1
b k += f (xi ) {add f (xi ) to kth column}
C
end for
b k /= num_examples
C
end for
Initialize new model g(x) = p̂(y|x; θ)
e
b
Train g(x) with `(g(x), y) on D and `(Cg(x),
ye) on D
Output: Model p̂(y|x; θ)
•
•
4. Experiments
We empirically demonstrate GLC on a variety of datasets
and architectures under several types of label noise.
4.1. Description
Generating Corrupted Labels. Suppose our dataset has
t + u examples. We sample a set of t datapoints D, and the
e which we probabilistically
remaining u examples form D,
corrupt according to a true corruption matrix C. Note that
we do not have knowledge of which of our u untrusted examples are corrupted. We only know that they are potentially
corrupted.
e
To generate the untrusted labels from the true labels in D,
we first obtain a corruption matrix C. Then, for an example
with true label i, we sample the corrupted label from the
categorical distribution parameterized by the ith row of C.
Comparing Loss Correction Methods. The GLC differs
from previous loss corrections for label noise in that it reasonably assumes access to a high-quality annotation source.
Therefore, to compare to other loss correction methods,
we ask how each method performs when starting from the
same dataset with the same label noise. In other words, the
only additional information our method uses is knowledge
of which examples are trusted, and which are potentially
Using Trusted Data to Train Deep Networks
0.4
0.2
1.0
CIFAR-10, Uniform, 10% trusted
0.8
0.8
0.6
0.6
0.6
0.4
0.0
0.0
1.0
0.4
0.2
0.2 0.4 0.6 0.8
Corruption Strength
1.0
IMDB, Flip, 5% trusted
0.2
0.0
0.0
1.0
0.2 0.4 0.6 0.8
Corruption Strength
1.0
CIFAR-100, Hier., 10% trusted
0.0
0.0
0.6
0.6
0.6
0.6
0.2
0.0
0.0
0.2
0.2 0.4 0.6 0.8
Corruption Strength
1.0
0.0
0.0
Test Error
0.8
0.4
1.0
0.0
0.0
0.4
0.2
0.2
0.2 0.4 0.6 0.8
Corruption Strength
1.0
CIFAR-100, Uniform, 10% trusted
0.8
0.4
0.2 0.4 0.6 0.8
Corruption Strength
1.0
0.8
0.4
CIFAR-100, Flip, 10% trusted
0.4
0.8
Test Error
Test Error
1.0
0.2 0.4 0.6 0.8
Corruption Strength
1.0
0.8
0.2
0.0
0.0
SST, Flip, 1% trusted
1.0
Test Error
0.6
MNIST, Flip, 1% trusted
Test Error
Test Error
0.8
1.0
Test Error
GLC (Ours)
Distillation
Forward Gold
Forward
No Correction
Test Error
CIFAR-10, Flip, 10% trusted
1.0
0.2 0.4 0.6 0.8
Corruption Strength
1.0
0.0
0.0
0.2 0.4 0.6 0.8
Corruption Strength
1.0
Figure 2: Error curves for the compared methods across a range of corruption strengths on different datasets.
corrupted.
4.2. Datasets, Architectures, and Noise Corrections
MNIST. The MNIST dataset contains 28 × 28 grayscale
images of the digits 0-9. The training set has 50,000 images
and the test set has 10,000 images. For preprocessing, we
rescale the pixels to a unit range.
We train a 2-layer fully connected network each with dimension 256. The network is again optimized with Adam for
10 epochs, all while using batches of size 32 and a learning
rate of 0.001. For regularization, we use `2 weight decay on
all layers with λ = 1 × 10−6 .
CIFAR. The two CIFAR datasets contain 32×32×3 color
images. CIFAR-10 has ten classes, and CIFAR-100 has 100
classes. CIFAR-100 has 20 “superclasses” which partition
its 100 classes into 20 semantically similar sets. We use
these superclasses for hierarchical noise. Both datasets have
50,000 training images and 10,000 testing images. For both
datasets, we train a Wide Residual Network (Zagoruyko
& Komodakis, 2016) of depth 40. We train for 75 epochs
using a widening factor of 2 and stochastic gradient descent
with restarts (Loshchilov & Hutter, 2016).
IMDB. The IMDB Large Movie Reviews dataset (Maas
et al., 2011) contains 50,000 highly polarized movie reviews
from the Internet Movie Database, split evenly into train
and test sets. We pad and clip reviews to a length of 200
tokens, and learn 50-dimensional word vectors from scratch
for a vocab size of 5,000.
We train an LSTM with 64 hidden dimensions on this data.
We train using the Adam optimizer (Kingma & Ba, 2014)
for 3 epochs with batch size 64 and the suggested learning
rate of 0.001. For regularization, we use dropout (Srivastava
et al., 2014) on the linear output layer with a keep probability
of 0.8.
Twitter. The Twitter Part of Speech dataset (Gimpel et al.,
2011) contains 1,827 tweets annotated with 25 POS tags.
The training set has 1,000 tweets, and the test set has 500.
We use pretrained 50-dimensional word vectors, and for
each token, we concatenate word vectors in a fixed window
centered on the token. These form our training and test
set. We use a window size of 3, and train a 1-layer fully
connected network with hidden size 256, and use the nonlinearity from (Hendrycks & Gimpel, 2016). We train using
the Adam optimizer for 15 epochs with batch size 64 and
learning rate 0.001. For regularization, we use `2 weight
decay with λ = 5 × 10−5 on all but the linear output layer.
SST. The Stanford Sentiment Treebank dataset consists of
single sentence movie reviews. There are 8,544 reviews in
the training set and 2,210 in the test set. We use binarized labels for sentiment classification. Moreover, we pad and clip
reviews to a length of 200 tokens and learn 100-dimensional
word vectors from scratch for a vocab size of 10,000.
Our classifier is a word-averaging model with an affine
output layer. We use the Adam optimizer for 5 epochs with
batch size 50 and learning rate 0.001. For regularization, we
CIFAR-100
CIFAR-10
MNIST
Using Trusted Data to Train Deep Networks
Corruption
Type
Uniform
Uniform
Uniform
Flip
Flip
Flip
Mean
Uniform
Uniform
Uniform
Flip
Flip
Flip
Mean
Uniform
Uniform
Uniform
Flip
Flip
Flip
Hierarchical
Hierarchical
Hierarchical
Mean
Percent
Trusted
5
10
25
5
10
25
5
10
25
5
10
25
5
10
25
5
10
25
5
10
25
Trusted
Only
37.6
12.9
6.6
37.6
12.9
6.6
19.0
39.6
31.3
17.4
39.6
31.3
17.4
29.4
82.4
67.3
52.2
82.4
67.3
52.2
82.4
67.3
52.2
67.3
No
Forward
Correction Correction
12.9
14.5
12.3
13.9
9.3
11.8
50.1
51.7
51.1
48.8
47.7
50.2
30.6
31.8
31.9
9.1
31.9
8.6
32.7
7.7
53.3
38.6
53.2
36.5
52.7
37.6
42.6
23.0
48.8
47.7
48.4
47.2
45.4
43.6
62.1
61.6
61.9
61.0
59.6
57.5
50.9
51.0
51.9
50.5
54.3
47.0
53.7
51.9
Forward
Gold
13.5
12.3
9.2
41.4
36.4
37.1
25.0
27.8
20.6
27.1
47.8
51.0
49.5
37.3
49.6
48.9
46.0
62.6
62.2
61.4
52.4
52.1
51.1
54.0
Distillation Confusion
Correction Matrix
42.1
21.8
9.2
15.1
5.8
11.0
46.5
11.7
32.4
5.6
28.2
3.8
27.4
11.5
29.7
22.4
18.3
22.7
11.6
16.7
29.7
8.1
18.1
8.2
11.8
7.1
19.9
14.2
87.5
53.6
61.2
49.7
39.8
39.6
87.1
28.6
61.8
26.9
40.0
25.1
87.1
45.8
61.7
38.8
39.7
29.7
62.9
37.5
GLC
(Ours)
10.3
6.3
4.7
3.4
2.9
2.6
5.0
9.0
6.9
6.4
6.6
6.2
6.1
6.9
42.4
33.9
27.3
27.1
25.8
24.7
34.8
30.2
25.4
30.2
Table 1: Vision dataset results. Percent trusted is the trusted fraction multiplied by 100. Unless otherwise indicated, all
values are percentages representing the area under the error curve computed at 11 test points. The best mean result is shown
in bold.
use `2 weight decay with λ = 1 × 10−4 on the output layer.
Forward Loss Correction. The forward correction
b by trainmethod from (Patrini et al., 2016) also obtains C
ing a classifier on the noisy labels, and using the resulting
softmax probabilities. However, this method does not make
use of a trusted fraction of the training data. Instead, it uses
the argmax at the 97th percentile of softmax probabilities
for a given class as a heuristic for detecting an example that
is truly a member of said class. As in the original paper, we
replace this with the argmax over all softmax probabilities
for a given class on CIFAR-100 experiments. The estimate
b is then used to train a corrected classifier in the same way
C
as GLC.
Forward Gold. To examine the effect of training on
trusted labels as done by GLC, we augment the Forward
b estimate with the identity on
method by replacing its C
trusted examples. We refer to the resulting method as Forward Gold, which can be seen as an intermediate method
between Forward and GLC.
Distillation. The distillation method of (Li et al., 2017)
involves training a neural network on a large trusted dataset
and using this network to provide soft targets for the untrusted data. In this way, labels are “distilled” from a neural
network. If the classifier’s decisions for untrusted inputs
are less reliable than the original noisy labels, then the network’s utility is limited. Thus, to obtain a reliable neural
network, a large trusted dataset is necessary. A new classifier is trained using labels that are a convex combination of
the soft targets and the original untrusted labels.
4.3. Uniform, Flip, and Hierarchical Corruption
Corruption-Generating Matrices. We consider three
types of corruption matrices: corrupting uniformly to all
classes, i.e. Cij = 1/K, flipping a label to a different class,
and corrupting uniformly to classes which are semantically
similar. In order to create a uniform corruption at different
strengths, we take a convex combination of an identity matrix and the matrix 11T /K. We refer to the coefficient of
11T /K as the corruption strength for a “uniform” corruption. A “flip” corruption at strength m involves, for each
row, giving an off-diagonal column probability mass m and
the entries along the diagonal probability mass 1 − m. Fi-
Twitter
IMDB
SST
Using Trusted Data to Train Deep Networks
Corruption
Type
Uniform
Uniform
Uniform
Flip
Flip
Flip
Mean
Uniform
Uniform
Uniform
Flip
Flip
Flip
Mean
Uniform
Uniform
Uniform
Flip
Flip
Flip
Mean
Percent
Trusted
5
10
25
5
10
25
5
10
25
5
10
25
5
10
25
5
10
25
Trusted
Only
45.4
35.2
26.1
45.4
35.2
26.1
35.6
36.9
26.2
22.2
36.9
26.2
22.2
28.5
35.9
23.6
16.3
35.9
23.6
16.3
25.3
No
Correction
27.5
27.2
26.5
50.2
49.9
48.7
38.3
26.7
25.8
21.4
49.2
47.8
39.4
35.0
37.1
33.5
25.5
56.2
53.8
43.0
41.5
Forward
26.5
26.2
25.3
50.3
50.1
49.0
37.9
27.9
27.2
23.0
49.2
48.3
39.6
35.9
51.7
49.5
40.6
61.6
59.0
52.5
52.5
Forward
Gold
26.6
25.9
24.6
50.3
49.9
47.3
37.4
27.6
26.1
20.1
49.2
47.5
36.6
34.5
44.1
40.2
26.4
54.8
48.9
36.7
41.9
Distillation Confusion
Matrix
43.4
26.1
33.3
25.0
25.0
22.4
48.8
26.0
42.1
24.6
31.8
22.4
37.4
24.4
35.5
25.4
24.9
23.3
21.0
18.9
41.8
25.8
28.0
22.1
23.5
19.2
29.1
22.5
32.0
41.5
22.2
33.6
16.6
20.0
36.4
23.4
26.1
15.9
20.5
13.3
25.7
24.6
GLC
(Ours)
24.2
23.5
21.7
24.9
23.5
21.7
23.3
25.0
22.3
18.7
25.2
22.0
18.5
22.0
31.0
22.3
15.5
15.8
12.9
12.8
18.4
Table 2: NLP dataset results. Percent trusted is the trusted fraction multiplied by 100. Unless otherwise indicated, all values
are percentages representing the area under the error curve computed at 11 test points. The best mean result is bolded.
nally, a more realistic corruption is hierarchical corruption.
For this corruption, we apply uniform corruption only to
semantically similar classes; for example, “bed” may be
corrupted to “couch” but not “beaver” in CIFAR-100. For
CIFAR-100, examples are deemed semantically similar if
they share the same “superclass” or coarse label specified
by the dataset creators.
Experiments and Analysis of Results. We train the models described in Section 4.2 under uniform, label-flipping,
and hierarchical label corruptions at various fractions of
trusted data in the dataset. To assess the performance of
GLC, we compare it to other loss correction methods and
two baselines: one where we train a network only on trusted
data without any label corrections, and one where the network trains on all data without any label corrections. Additionally, we report results on a variant of GLC that uses
normalized confusion matrices, which we elaborate on in
the discussion. We record errors on the test sets at the corruption strengths {0, 0.1, . . . , 1.0}. Since we compute the
model’s accuracy at numerous corruption strengths, CIFAR
experiments involves training over 500 Wide Residual Networks. In Tables 4 and 5, we report the area under the
error curves across corruption strengths {0, 0.1, . . . , 1.0}
for all baselines and corrections. A sample of error curves
are displayed in Figure 2.
Across all experiments, GLC obtains better area under the
error curve than the Forward and Distillation methods. The
rankings of the other methods and baselines are mixed. On
MNIST, training on the trusted data alone outperforms all
methods save for GLC and Confusion Matrix, but performs
significantly worse on CIFAR-100, even with large trusted
fractions. Interestingly, Forward Gold performs worse than
Forward on several datasets. We did not observe the same
behavior when turning off the corresponding component
of GLC, and believe it may be due to variance introduced
during training by the difference in signal provided by the
Forward method’s C estimate and the clean labels. The
GLC provides a superior C estimate, and thus may be better
able to leverage training on the clean labels. Additional
results on SVHN, are in the supplementary materials.
4.4. Weak Classifier Labels
Our next benchmark for GLC is to use noisy labels obtained
from a weak classifier. This models the scenario of label
noise arising from a classification system weaker than one’s
own, but with access to information about the true labels that
one wishes to transfer to one’s own system. For example,
scraping image labels from surrounding text on web pages
provides a valuable signal, but these labels would train a
sub-par classifier without correcting the label noise.
Using Trusted Data to Train Deep Networks
Percent
Trusted
1
CIFAR-10 5
10
Mean
5
CIFAR-100 10
25
Mean
Trusted
Only
62.9
39.6
31.3
44.6
82.4
67.3
52.2
67.3
No Correction
28.3
27.1
25.9
27.1
71.1
66
56.9
64.7
Forward
28.1
26.6
25.1
26.6
73.9
68.2
56.9
66.3
Forward
Gold
30.9
25.5
22.9
26.4
73.6
66.1
51.4
63.7
Distillation
60.4
28.1
17.8
35.44
88.3
62.5
39.7
63.5
Confusion
Matrix
31.9
27
24.2
27.7
74.1
63.8
50.8
62.9
GLC
(Ours)
26.9
21.9
19.2
22.7
68.7
56.6
40.8
55.4
Table 3: Results when obtaining noisy labels by sampling from the softmax distribution of a weak classifier. Percent trusted
is the trusted fraction multiplied by 100. Unless otherwise indicated, all values are the percent error attained under the
indicated correction. The best average result for each dataset is shown in bold.
Weak Classifier Label Generation. To obtain the labels,
we train 40-layer Wide Residual Networks on CIFAR-10
and CIFAR-100 with clean labels for ten epochs each. Then,
we sample from their softmax distributions with a temperature of 5, and fix the resulting labels. This results in noisy
labels which we use in place of the labels obtained through
the uniform, flip, and hierarchical corruption methods. The
weak classifiers obtain accuracies of 40% on CIFAR-10
and 7% on CIFAR-100. Despite the presence of highly
corrupted labels, we are able to significantly recover performance with the use of a trusted set. Note that unlike the
previous corruption methods, weak classifier labels have
only one corruption strength. Thus, performance is measured in percent error rather than area under the error curve.
Results are displayed in Table 6.
Analysis of Results. Overall, GLC outperforms all other
methods in the weak classifier label experiments. The Distillation method performs better than GLC by a small margin
at the highest trusted fraction, but performs worse at lower
trusted fractions, indicating that GLC enjoys superior data
efficiency. This is highlighted by GLC attaining a 26.94%
error rate on CIFAR-10 with a trusted fraction of 1%, down
from the original error rate of 60%. It should be noted, however, that training with no correction attains 28.32% error
on this experiment, suggesting that the weak classifier labels
have low bias. The improvement conferred by GLC is more
significant at higher trusted fractions.
5. Discussion and Future Directions
Confusion Matrices. An intuitively reasonable alternative to GLC is to estimate C by a confusion matrix. To do
this, one would train a classifier on the untrusted examples,
obtain its confusion matrix on the trusted examples, rownormalize the matrix, and then train a corrected classifier
as in GLC. However, GLC is a far more data-efficient and
lower-variance method of estimating C. In particular, for
K classes, a confusion matrix requires at least K 2 trusted
examples to estimate all entries of C, whereas GLC requires
only K trusted examples.
Another problem with using confusion matrices is that normalized confusion matrices give a biased estimate of C in
the limit, due to using an argmax over class scores rather
than randomly sampling a class. This leads to vastly overestimating the value in the dominant entry of each row, as can
be seen in Figure 1. Correspondingly, we found GLC outperforms confusion matrices by a significant margin across
nearly all experiments, with a smaller gap in performance
on datasets where K, the number of classes, is smaller. Results are displayed in the main tables. We also found that
smoothing the normalized confusion matrices was necessary
to stabilize training on CIFAR-100.
Data Efficiency. We have seen that GLC works for small
trusted fractions, and we further corroborate its data efficiency by turning to the Clothing1M dataset (Xiao et al.,
2015). Clothing1M is a massive dataset with both humanannotated and noisy labels, which we use to compare the
data efficiency of GLC to that of Distillation when very few
trusted labels are present. The Clothing1M dataset consists
of 1 million noisily labeled clothing images obtained by
crawling online marketplaces. 50,000 images have humanannotated examples, from which we take subsamples as our
trusted set.
For both GLC and Distillation, we first fine-tune a pretrained 34-layer ResNet on untrusted training examples for
four epochs, and use this to estimate our corruption matrix. Thereafter, we fine-tune the network for four more
epochs on the combined trusted and untrusted sets using the
respective method. During fine tuning, we freeze the first
seven layers, and train using gradient descent with Nesterov
momentum and a cosine learning rate schedule. For preprocessing, we randomly crop to a resolution of 224 × 224, and
use mirroring. We also upsample the trusted dataset, finding
this to give better performance for both methods.
Percent Accuracy
Using Trusted Data to Train Deep Networks
70
Distillation
GLC (Ours)
60
50
40
30
100
500
1000
Number of Trusted Examples
Figure 3: Data efficiency of our method compared to Distillation on Clothing1M.
As shown in Figure 3, GLC outperforms Distillation by
a large margin, especially at lower numbers of trusted examples. This is because Distillation requires fine-tuning a
classifier on the trusted data alone, which generalizes poorly
with very few examples. By contrast, estimating the C
matrix can be done with very few examples. Correspondingly, we find that our advantage decreases as the number
of trusted examples increases.
With more trusted labels, performance on Clothing1M saturates as evident in Figure 3. We consider the extreme and
train on the entire trusted set for Clothing1M. We fine-tune
a pre-trained 50-layer ResNeXt (Xie et al., 2016) on untrusted training examples to estimate our corruption matrix.
Then, we fine-tune the ResNeXt on all training examples.
During fine-tuning, we use gradient descent with Nesterov
momentum. During the first two epochs, we tune only the
output layer with a learning rate of 10−2 . Thereafter, we
tune the whole network at a learning rate of 10−3 for two
epochs, and for another two epochs at 10−4 . Then we apply
our loss correction. Now, we fine-tune the entire network
at a learning rate of 10−3 for two epochs, continue training
at 10−4 , and early-stop based upon the validation set. In
a previous work, (Xiao et al., 2015) obtain 78.24% in this
setting. However, our method obtains a state-of-the-art accuracy of 80.67%, while with this procedure the Forward
method only obtains 79.03% accuracy.
b Estimation. For some datasets, the classifier
Improving C
p̂(ỹ | x) may be a poor estimate of p(ỹ | x), presenting a
b for GLC. To see the extent
bottleneck in the estimation of C
to which this could impact performance, and whether simple
methods for improving p̂(ỹ | x) could help, we ran several
variants of GLC experiment on CIFAR-100 under the label
flipping corruption at a trusted fraction of 5/100 which we
now describe. For all variants, we averaged the area under
the error curve over five random initializations.
b
1. In the first variant, we replaced GLC estimate of C
with C, the true corruption matrix used for generating
the noisy labels.
2. As demonstrated by (Guo et al., 2017), modern deep
neural network classifiers tend to have overconfident
softmax distributions. We found this to be the case
with our p̂(ỹ | x) estimate, despite the higher entropy
of the noisy labels, and used the temperature scaling
confidence calibration method proposed in the paper
to calibrate p̂(ỹ | x).
3. Suppose we know the base rates of corrupted labels b̃,
where b̃i = p(ỹ = i), and the base rate of true labels
b0 corrupted the
b of the trusted set. If we posit that C
Tb
labels, then we should have b C0 = b̃T . Thus, we
may obtain a superior estimate of the corruption matrix
b = argmin b kbT C
b0 −
by computing a new estimate C
C
b−C
b0 k2 subject to C1
b = 1.
b̃T k + λkC
2
b
We found that using the true corruption matrix as our C
provides a benefit of 0.96 percentage points in area under
the error curve, but neither the confidence calibration nor the
base rate incorporation was able to change the performance
from the original GLC. This indicates that GLC is robust to
the use of uncalibrated networks for estimating C, and that
improving its performance may be difficult without directly
improving the performance of the neural network used to
estimate p̂(y | x).
Better Performance for Worst-Case Corruption. The
uniform corruption that we use in experiments is an example of worst-case corruption in the sense that the mutual
information between ỹ and y is zero when the corruption
strength equals 1.0. We found that training on the trusted
dataset only resulted in superior performance at this corruption setting, especially on Twitter. This indicates that
it may be possible to devise a re-weighting of the loss on
trusted and untrusted examples using information theoretic
b that would improve performance
measures obtained from C
in worst-case regimes.
6. Conclusion
In this work we have shown the impact of having a small
set of trusted examples on classifier label robustness. We
proposed the Gold Loss Correction (GLC), a method for
handling label noise. This method leverages the assumption
that the model has access to a small set of correct labels
to yield accurate estimates of the noise distribution. In
our experiments, GLC surpasses previous label robustness
methods across various natural language processing and
vision domains which we showed by considering several
Using Trusted Data to Train Deep Networks
corruptions and numerous strengths. Consequently, GLC is
a powerful, data-efficient label corruption correction.
References
Biggio, B, Nelson, B, and Laskov, P. Support vector machines under adversarial label noise. ACML, 2011.
Chapelle, Olivier, Schlkopf, Bernhard, and Zien, Alexander.
Semi-Supervised Learning. The MIT Press, 1st edition,
2010.
Frénay, Benoît and Verleysen, Michel. Classification in the
presence of label noise: a survey. IEEE Trans Neural
Netw Learn Syst, 25(5):845–869, May 2014.
Gimpel, Kevin, Schneider, Nathan, O’Connor, Brendan,
Das, Dipanjan, Mills, Daniel, Eisenstein, Jacob, Heilman,
Michael, Yogatama, Dani, Flanigan, Jeffrey, and Smith,
Noah A. Part-of-speech tagging for twitter: Annotation,
features, and experiments. In Proceedings of the 49th
Annual Meeting of the Association for Computational Linguistics: Human Language Technologies: Short Papers
- Volume 2, HLT ’11, pp. 42–47, Stroudsburg, PA, USA,
2011. Association for Computational Linguistics.
Guo, Chuan, Pleiss, Geoff, Sun, Yu, and Weinberger, Kilian Q. On calibration of modern neural networks. CoRR,
abs/1706.04599, 2017. URL http://arxiv.org/
abs/1706.04599.
Hendrycks, Dan and Gimpel, Kevin. Bridging nonlinearities
and stochastic regularizers with gaussian error linear units.
27 June 2016.
Kingma, Diederik P. and Ba, Jimmy. Adam: A method
for stochastic optimization. CoRR, abs/1412.6980, 2014.
URL http://arxiv.org/abs/1412.6980.
Larsen, J, Nonboe, L, Hintz-Madsen, M, and Hansen, L K.
Design of robust neural network classifiers. In Acoustics,
Speech and Signal Processing, 1998. Proceedings of the
1998 IEEE International Conference on, volume 2, pp.
1205–1208 vol.2, May 1998.
Li, Bo, Wang, Yining, Singh, Aarti, and Vorobeychik, Yevgeniy. Data poisoning attacks on factorization-based collaborative filtering. CoRR, abs/1608.08182, 2016. URL
http://arxiv.org/abs/1608.08182.
Li, Yuncheng, Yang, Jianchao, Song, Yale, Cao, Liangliang,
Luo, Jiebo, and Li, Jia. Learning from noisy labels with
distillation. CoRR, abs/1703.02391, 2017. URL http:
//arxiv.org/abs/1703.02391.
Loshchilov, Ilya and Hutter, Frank. SGDR: stochastic gradient descent with restarts. CoRR, abs/1608.03983, 2016.
URL http://arxiv.org/abs/1608.03983.
Maas, Andrew L., Daly, Raymond E., Pham, Peter T.,
Huang, Dan, Ng, Andrew Y., and Potts, Christopher.
Learning word vectors for sentiment analysis. In Proceedings of the 49th Annual Meeting of the Association
for Computational Linguistics: Human Language Technologies, pp. 142–150, 2011.
Menon, Aditya Krishna, van Rooyen, Brendan, and Natarajan, Nagarajan. Learning from binary labels with instancedependent corruption. CoRR, abs/1605.00751, 2016.
URL http://arxiv.org/abs/1605.00751.
Mnih, Volodymyr and Hinton, Geoffrey E. Learning to
label aerial images from noisy data. In Proceedings of
the 29th International Conference on Machine Learning
(ICML-12), pp. 567–574, 2012.
Natarajan, Nagarajan, Dhillon, Inderjit S, Ravikumar,
Pradeep K, and Tewari, Ambuj. Learning with noisy
labels. In Burges, C J C, Bottou, L, Welling, M, Ghahramani, Z, and Weinberger, K Q (eds.), Advances in Neural
Information Processing Systems 26, pp. 1196–1204. Curran Associates, Inc., 2013.
Nettleton, David F, Orriols-Puig, Albert, and Fornells, Albert. A study of the effect of different types of noise
on the precision of supervised learning techniques. Artif
Intell Rev, 33(4):275–306, 1 April 2010.
Patrini, Giorgio, Rozza, Alessandro, Menon, Aditya, Nock,
Richard, and Qu, Lizhen. Making deep neural networks robust to label noise: a loss correction approach.
13 September 2016.
Pechenizkiy, M, Tsymbal, A, Puuronen, S, and Pechenizkiy,
O. Class noise and supervised learning in medical domains: The effect of feature extraction. In 19th IEEE Symposium on Computer-Based Medical Systems (CBMS’06),
pp. 708–713, 2006.
Reed, Scott, Lee, Honglak, Anguelov, Dragomir, Szegedy,
Christian, Erhan, Dumitru, and Rabinovich, Andrew.
Training deep neural networks on noisy labels with bootstrapping. 20 December 2014.
Srivastava, Nitish, Hinton, Geoffrey, Krizhevsky, Alex,
Sutskever, Ilya, and Salakhutdinov, Ruslan. Dropout: A
Simple Way to Prevent Neural Networks from Overfitting.
Journal of Machine Learning Research, 15:1929–1958,
2014.
Steinhardt, Jacob, Koh, Pang Wei, and Liang, Percy. Certified defenses for data poisoning attacks. In NIPS, 2017.
Sukhbaatar, Sainbayar, Bruna, Joan, Paluri, Manohar, Bourdev, Lubomir, and Fergus, Rob. Training convolutional
networks with noisy labels. 9 June 2014.
Using Trusted Data to Train Deep Networks
Veit, Andreas, Alldrin, Neil, Chechik, Gal, Krasin, Ivan,
Gupta, Abhinav, and Belongie, Serge J. Learning
from noisy large-scale datasets with minimal supervision.
CoRR, abs/1701.01619, 2017. URL http://arxiv.
org/abs/1701.01619.
Xiao, Tong, Xia, Tian, Yang, Yi, Huang, Chang, and Wang,
Xiaogang. Learning from massive noisy labeled data
for image classification. In 2015 IEEE Conference on
Computer Vision and Pattern Recognition (CVPR), pp.
2691–2699, June 2015.
Xie, Saining, Girshick, Ross, Dollár, Piotr, Tu, Zhuowen,
and He, Kaiming.
Aggregated residual transformations for deep neural networks. arXiv preprint
arXiv:1611.05431, 2016.
Zagoruyko, Sergey and Komodakis, Nikos. Wide residual
networks. 23 May 2016.
Zhu, X. Semi-supervised learning literature survey. 2005.
Zhu, Xingquan and Wu, Xindong. Class noise vs. attribute
noise: A quantitative study. Artificial Intelligence Review,
22(3):177–210, 1 November 2004.
Using Trusted Data to Train Deep Networks
CIFAR-100
CIFAR-10
SVHN
MNIST
A. Additional Results and Figures
Corruption
Type
Uniform
Uniform
Uniform
Flip
Flip
Flip
Mean
Uniform
Uniform
Uniform
Flip
Flip
Flip
Mean
Uniform
Uniform
Uniform
Flip
Flip
Flip
Mean
Uniform
Uniform
Uniform
Flip
Flip
Flip
Hierarchical
Hierarchical
Hierarchical
Mean
Percent
Trusted
5
10
25
5
10
25
0.1
1
5
0.1
1
5
5
10
25
5
10
25
5
10
25
5
10
25
5
10
25
Trusted
Only
37.56
12.93
6.62
37.56
12.93
6.62
19.04
80.42
79.66
24.28
80.42
79.66
24.28
61.45
39.6
31.26
17.43
39.6
31.26
17.43
29.43
82.37
67.28
52.21
82.37
67.28
52.21
82.37
67.28
52.21
67.29
No
Forward
Correction Correction
12.89
14.47
12.3
13.85
9.25
11.8
50.14
51.66
51.1
48.84
47.69
50.24
30.56
31.81
25.45
26.2
25.5
24.22
25.52
14.99
50.97
51.04
50.97
43.92
51.01
43.19
38.24
33.93
31.87
9.05
31.92
8.61
32.72
7.71
53.27
38.59
53.18
36.53
52.66
37.63
42.6
23.02
48.82
47.67
48.37
47.15
45.42
43.59
62.11
61.62
61.92
60.96
59.64
57.5
50.94
50.99
51.93
50.49
54.34
46.97
53.72
51.88
Forward
Gold
13.5
12.3
9.2
41.41
36.37
37.14
24.99
26.76
24.92
15.65
50.93
49.46
49.02
36.12
27.85
20.59
27.1
47.78
51.02
49.47
37.3
49.59
48.88
45.98
62.62
62.19
61.41
52.36
52.07
51.13
54.02
Distillation Confusion
Correction Matrix
42.08
21.81
9.21
15.09
5.78
11.01
46.55
11.65
32.37
5.63
28.21
3.77
27.37
11.49
80.93
25.71
80.39
28.23
24.06
2.67
89.11
19.81
86.27
17.81
17.56
2.22
63.05
16.07
29.73
22.42
18.34
22.69
11.62
16.65
29.66
8.13
18.1
8.16
11.77
7.06
19.87
14.18
87.48
53.64
61.2
49.7
39.82
39.61
87.11
28.58
61.85
26.93
39.96
25.14
87.12
45.75
61.71
38.84
39.73
29.7
62.89
37.54
GLC
(Ours)
10.31
6.33
4.67
3.36
2.88
2.57
5.02
24.36
28.13
2.82
19.35
21.7
2.21
16.43
9.02
6.92
6.36
6.62
6.2
6.1
6.87
42.39
33.91
27.34
27.13
25.83
24.69
34.78
30.16
25.41
30.18
Table 4: Vision dataset results. Percent trusted is the trusted fraction multiplied by 100. Unless otherwise indicated, all
values are percentages representing the area under the error curve computed at 11 test points. The best mean result is shown
in bold.
Twitter
IMDB
SST
Using Trusted Data to Train Deep Networks
Corruption
Type
Uniform
Uniform
Uniform
Flip
Flip
Flip
Mean
Uniform
Uniform
Uniform
Flip
Flip
Flip
Mean
Uniform
Uniform
Uniform
Flip
Flip
Flip
Mean
Percent
Trusted
5
10
25
5
10
25
5
10
25
5
10
25
5
10
25
5
10
25
Trusted
Only
45.36
35.2
26.14
45.36
35.2
26.14
35.57
36.94
26.23
22.2
36.94
26.23
22.2
28.46
35.85
23.64
16.28
35.85
23.64
16.28
25.26
No
Correction
27.48
27.21
26.53
50.19
49.9
48.69
38.33
26.68
25.76
21.44
49.16
47.8
39.42
35.04
37.1
33.45
25.51
56.23
53.83
42.99
41.52
Forward
26.55
26.19
25.33
50.33
50.08
48.99
37.91
27.94
27.19
23.0
49.2
48.26
39.57
35.86
51.68
49.52
40.6
61.59
59.01
52.49
52.48
Forward
Gold
26.55
25.9
24.6
50.33
49.9
47.28
37.43
27.57
26.1
20.11
49.18
47.5
36.64
34.52
44.09
40.21
26.43
54.81
48.91
36.7
41.86
Distillation Confusion
Matrix
43.37
26.11
33.34
25.03
24.96
22.39
48.77
26.01
42.11
24.58
31.84
22.39
37.4
24.42
35.47
25.45
24.89
23.33
21.01
18.93
41.84
25.8
28.03
22.1
23.48
19.2
29.12
22.47
32.01
41.48
22.22
33.62
16.59
20.04
36.44
23.38
26.15
15.93
20.53
13.25
25.66
24.62
GLC
(Ours)
24.23
23.53
21.74
24.89
23.52
21.75
23.27
25.03
22.34
18.71
25.23
21.98
18.54
21.97
30.96
22.25
15.5
15.83
12.94
12.85
18.39
Table 5: NLP dataset results. Percent trusted is the trusted fraction multiplied by 100. Unless otherwise indicated, all values
are percentages representing the area under the error curve computed at 11 test points. The best mean result is bolded.
Percent
Trusted
1
CIFAR-10 5
10
Mean
5
CIFAR-100 10
25
Mean
Trusted
Only
62.89
39.6
31.26
44.58
82.37
67.28
52.21
67.29
No Correction
28.32
27.12
25.9
27.11
71.07
66.01
56.87
64.65
Forward
28.07
26.6
25.13
26.6
73.92
68.23
56.86
66.34
Forward
Gold
30.86
25.51
22.91
26.43
73.57
66.08
51.44
63.7
Distillation
60.42
28.12
17.79
35.44
88.29
62.51
39.69
63.50
Confusion
Matrix
31.92
26.98
24.16
27.69
74.12
63.75
50.75
62.87
GLC
(Ours)
26.94
21.89
19.15
22.66
68.69
56.65
40.82
55.39
Table 6: Results when obtaining noisy labels by sampling from the softmax distribution of a weak classifier. Percent trusted
is the trusted fraction multiplied by 100. Unless otherwise indicated, all values are the percent error attained under the
indicated correction. The best average result for each dataset is shown in bold.
Using Trusted Data to Train Deep Networks
0.4
0.2
0.0
0.0
0.2
0.4
0.6
0.8
Corruption Strength
1.0
CIFAR-100, Uniform, 10% trusted
0.2
0.4
0.6
0.8
Corruption Strength
CIFAR-100, Flip, 10% trusted
0.0
0.0
1.0
0.6
0.4
0.2
0.2
0.4
0.6
0.8
Corruption Strength
1.0
CIFAR-100, Uniform, 25% trusted
Ours
Distillation
Forward Method
Forward Gold
Confusion
All Data
0.4
0.0
0.0
1.0
0.2
0.4
0.6
0.8
Corruption Strength
1.0
CIFAR-100, Flip, 25% trusted
0.4
0.6
0.8
Corruption Strength
1.0
Test Error
Ours
Distillation
Forward Method
Forward Gold
Confusion
All Data
0.4
1.0
1.0
0.6
0.6
0.4
0.2
0.4
0.6
0.8
Corruption Strength
CIFAR-10, Flip, 5% trusted
1.0
0.8
0.8
0.6
0.6
0.4
0.0
0.0
1.0
CIFAR-10, Uniform, 10% trusted
1.0
0.2
0.4
0.6
0.8
Corruption Strength
CIFAR-100, Hierarchical, 25% trusted
0.4
1.0
0.0
0.0
0.2
0.4
0.6
0.8
Corruption Strength
MNIST, Uniform, 0.1% trusted
1.0
Ours
Distillation
Forward Method
Forward Gold
Confusion
All Data
0.4
0.6
0.8
Corruption Strength
0.4
0.0
0.0
1.0
CIFAR-10, Flip, 10% trusted
1.0
0.4
0.2
0.2
0.4
0.6
0.8
Corruption Strength
0.0
0.0
1.0
MNIST, Uniform, 1% trusted
1.0
0.6
0.6
0.6
0.6
0.8
0.6
0.4
0.6
0.8
Corruption Strength
1.0
CIFAR-10, Uniform, 25% trusted
Ours
Distillation
Forward Method
Forward Gold
Confusion
All Data
0.4
1.0
0.2
0.0
0.0
0.0
0.0
0.2
0.2
0.4
0.6
0.8
Corruption Strength
1.0
CIFAR-10, Flip, 25% trusted
0.4
0.6
0.8
Corruption Strength
1.0
0.0
0.0
1.0
0.8
0.8
0.6
0.6
0.4
0.2
0.2
0.4
0.0
0.0
0.2
0.4
0.6
0.8
Corruption Strength
1.0
MNIST, Uniform, 5% trusted
Ours
Distillation
Forward Method
Forward Gold
Confusion
All Data
0.4
0.6
0.8
Corruption Strength
1.0
0.4
0.0
0.0
0.4
0.6
0.8
Corruption Strength
1.0
MNIST, Flip, 1% trusted
0.4
0.0
0.0
1.0
0.2
0.4
0.6
0.8
Corruption Strength
1.0
MNIST, Flip, 5% trusted
0.8
0.2
0.2
0.2
0.2
Test Error
1.0
0.2
Test Error
0.0
0.0
0.2
Test Error
0.2
Test Error
0.8
Test Error
0.8
Test Error
0.8
0.4
MNIST, Flip, 0.1% trusted
0.6
0.8
0.4
1.0
0.8
0.2
0.2
1.0
0.2
0.2
0.4
0.6
0.8
Corruption Strength
1.0
CIFAR-100, Hierarchical, 10% trusted
0.0
0.0
0.8
0.0
0.0
0.4
0.6
0.8
Corruption Strength
0.4
0.8
Test Error
0.2
0.2
0.2
0.2
CIFAR-10, Uniform, 5% trusted
0.2
1.0
Test Error
0.4
Test Error
Test Error
Test Error
0.2
0.6
0.2
Test Error
0.0
0.0
CIFAR-100, Hierarchical, 5% trusted
0.4
0.6
0.0
0.0
Test Error
0.4
0.6
0.2
1.0
0.6
0.8
0.8
0.0
0.0
0.6
0.8
1.0
0.6
0.8
0.8
0.0
0.0
0.8
0.8
1.0
0.2
1.0
1.0
0.2
Test Error
Test Error
1.0
CIFAR-100, Flip, 5% trusted
Test Error
1.0
Test Error
0.6
Ours
Distillation
Forward Method
Forward Gold
Confusion
All Data
Test Error
Test Error
0.8
CIFAR-100, Uniform, 5% trusted
Test Error
1.0
0.6
0.4
0.2
0.2
0.4
0.6
0.8
Corruption Strength
1.0
0.0
0.0
0.2
0.4
0.6
0.8
Corruption Strength
1.0
Using Trusted Data to Train Deep Networks
1.0
0.0
0.0
1.0
0.4
0.6
0.8
Corruption Strength
SVHN, Uniform, 1% trusted
Ours
Distillation
Forward Method
Forward Gold
Confusion
All Data
0.2
1.0
0.6
0.2
0.4
0.6
0.8
Corruption Strength
SVHN, Uniform, 5% trusted
0.4
0.6
0.8
Corruption Strength
0.2
0.4
0.6
0.8
Corruption Strength
0.0
0.0
1.0
SVHN, Flip, 1% trusted
1.0
Twitter, Uniform, 1% trusted
0.2
0.2
0.4
0.6
0.8
Corruption Strength
0.0
0.0
1.0
IMDB, Uniform, 5% trusted
1.0
0.8
0.6
0.6
0.6
0.4
0.6
Ours
Distillation
Forward Method
Forward Gold
Confusion
All Data
0.2
0.4
0.6
0.8
Corruption Strength
0.0
0.0
SVHN, Flip, 5% trusted
1.0
Ours
Distillation
Forward Method
Forward Gold
Confusion
All Data
0.4
1.0
0.4
0.2
1.0
0.4
0.6
0.8
Corruption Strength
Twitter, Flip, 1% trusted
0.2
0.4
0.6
0.8
Corruption Strength
0.0
0.0
1.0
IMDB, Uniform, 25% trusted
1.0
0.8
0.6
0.6
0.4
1.0
0.2
0.4
0.6
0.8
Corruption Strength
0.0
0.0
1.0
SST, Uniform, 0.1% trusted
1.0
0.6
0.6
0.6
1.0
0.2
0.4
0.6
0.8
Corruption Strength
0.0
0.0
1.0
Twitter, Uniform, 5% trusted
1.0
Test Error
0.6
Test Error
0.8
0.2
0.4
0.2
0.2
0.4
0.6
0.8
Corruption Strength
0.0
0.0
1.0
Twitter, Flip, 5% trusted
1.0
0.2
0.4
0.6
0.8
Corruption Strength
0.0
0.0
1.0
SST, Uniform, 1% trusted
1.0
0.6
0.6
0.6
0.6
0.0
0.0
1.0
0.2
0.2
0.4
0.6
0.8
Corruption Strength
1.0
Twitter, Uniform, 25% trusted
0.0
0.0
1.0
Test Error
0.8
Test Error
0.8
0.2
0.4
0.2
0.2
0.4
0.6
0.8
Corruption Strength
1.0
Twitter, Flip, 25% trusted
0.0
0.0
1.0
0.2
0.4
0.6
0.8
Corruption Strength
1.0
SST, Uniform, 5% trusted
0.0
0.0
1.0
0.6
0.6
0.6
0.0
0.0
0.2
0.2
0.4
0.6
0.8
Corruption Strength
1.0
0.0
0.0
Test Error
0.6
Test Error
0.8
Test Error
0.8
0.2
0.4
0.2
0.2
0.4
0.6
0.8
Corruption Strength
1.0
0.0
0.0
IMDB, Flip, 25% trusted
0.2
0.4
0.6
0.8
Corruption Strength
1.0
SST, Flip, 0.1% trusted
0.2
0.4
0.6
0.8
Corruption Strength
1.0
SST, Flip, 1% trusted
0.2
0.8
0.4
1.0
0.4
0.8
0.4
0.4
0.6
0.8
Corruption Strength
0.2
0.8
0.4
0.2
0.4
0.8
0.4
IMDB, Flip, 5% trusted
0.2
0.8
0.4
1.0
0.4
0.8
0.4
0.4
0.6
0.8
Corruption Strength
0.4
0.8
0.0
0.0
1.0
0.2
0.2
0.2
0.2
IMDB, Flip, 1% trusted
0.4
0.8
0.0
0.0
1.0
Test Error
0.2
0.2
Test Error
Test Error
0.2
0.4
0.8
0.0
0.0
Test Error
Ours
Distillation
Forward Method
Forward Gold
Confusion
All Data
0.8
0.8
0.2
Test Error
0.4
1.0
Ours
Distillation
Forward Method
Forward Gold
Confusion
All Data
0.2
1.0
0.6
0.0
0.0
1.0
0.4
0.0
0.0
0.6
Test Error
Test Error
0.8
0.6
0.2
Test Error
0.0
0.0
0.8
1.0
Test Error
Test Error
0.4
0.8
0.0
0.0
1.0
0.8
0.6
0.8
0.2
0.2
1.0
Test Error
0.2
IMDB, Uniform, 1% trusted
Test Error
0.4
1.0
Test Error
0.6
Ours
Distillation
Forward Method
Forward Gold
Confusion
All Data
Test Error
Test Error
0.8
SVHN, Flip, 0% trusted
Test Error
SVHN, Uniform, 0% trusted
Test Error
1.0
0.2
0.4
0.6
0.8
Corruption Strength
1.0
SST, Flip, 5% trusted
0.4
0.2
0.2
0.4
0.6
0.8
Corruption Strength
1.0
0.0
0.0
0.2
0.4
0.6
0.8
Corruption Strength
1.0
| 9cs.NE
|
arXiv:1205.4273v4 [math.CV] 12 Feb 2013
AN ALGEBRAIC APPROACH TO THE OPENNESS
CONJECTURE OF DEMAILLY AND KOLLÁR
MATTIAS JONSSON AND MIRCEA MUSTAŢĂ
Abstract. We reduce the Openness Conjecture of Demailly and Kollár on
the singularities of plurisubharmonic functions to a purely algebraic statement.
Contents
1. Introduction
2. Background
3. Plurisubharmonic functions
4. Proof of the main results
References
1
4
13
21
25
1. Introduction
In this paper we study singularities of plurisubharmonic (psh) functions. These
are important in complex analytic geometry, see, for instance, [Lel69, Sko72,
Siu74, Dem87, Kis87, Kis94, DK01]. Specifically, we study the openness conjecture of Demailly and Kollár, and reduce this conjecture to a purely algebraic
statement.
Let ϕ be the germ of a psh function at a point x on a complex manifold. It
is easy to see that the set of real numbers c > 0 such that exp(−cϕ) is locally
integrable at x is an interval. It is nonempty by a result of Skoda [Sko72]. The
openness conjecture, see [DK01, Remark 5.3], asserts that this interval is open.
If we define the complex singularity exponent of ϕ at x by
cx (ϕ) = sup{c > 0 | exp(−2cϕ) is locally integrable at x},
then the conjecture can be stated as follows:
Conjecture A. If cx (ϕ) < ∞, then the function exp(−2cx (ϕ)ϕ) is not locally
integrable at x.
Date: April 9, 2018.
Key words and phrases. Plurisubharmonic function, graded sequence, log canonical threshold,
valuation.
2010 Mathematics Subject Classification. Primary 32U05; Secondary 32U25, 14F18, 12J20,
14B05.
The first author was partially supported by NSF grant DMS-1001740 and the second author
was partially supported by NSF grant DMS-1068190.
1
2
MATTIAS JONSSON AND MIRCEA MUSTAŢĂ
In fact, Demailly and Kollár made the following slightly more precise conjecture, which easily implies Conjecture A, see [DK01, Remark 4.4].
Conjecture B. If cx (ϕ) < ∞, then for every open neighborhood U of x on which
ϕ is defined, we have the estimate
Vol{y ∈ U | cx (ϕ)ϕ(y) < log r} & r2
as r → 0.
Here and throughout the paper we write f (r) & r2 as r → 0 if there exists
c > 0 such that f (r) ≥ cr2 for all sufficiently small r.
Demailly and Kollár also proved that Conjecture A implies a stronger openness
statement, namely, that the local integrability of exp(−2ϕ) is an open condition
with respect to the L1loc topology, see [DK01, Conjecture 5.4].
Conjectures A and B are easily verified in dimension one. A proof in the twodimensional case was given in [FJ05b]. In higher dimensions, they are open. In
this paper we reduce Conjecture B to a purely algebraic conjecture:
Conjecture C. Let k be an algebraically closed field of characteristic zero. Let
a• be a graded sequence of ideals in the polynomial ring R = k[x1 , . . . , xm ] such
that a1 is m-primary, where m is a maximal ideal in R. Then there exists a
quasimonomial valuation v on R which computes lct(a• ).
Let us briefly explain the meaning of the terms here; see §2.1 and [JM12] for
more details. The log canonical threshold lct(a) of an ideal a ⊆ R is the algebrogeometric analogue of the complex singularity exponent. A graded sequence a• =
(aj )∞
j=1 of ideals in R is a sequence such that ai · aj ⊆ ai+j for all i, j ≥ 1 (we
always assume that some ai is nonzero). We then define
lct(a• ) := sup j lct(aj ) = lim j lct(aj ),
j→∞
j
where the limit is over those j for which aj is nonzero. Similarly, if v : R → R≥0
is a valuation, then we set
v(a• ) := sup j −1 v(aj ) = lim j −1 v(aj ),
j→∞
j
where again the limit is over the j for which aj is nonzero. One can show that
lct(a• ) = inf
v
A(v)
,
v(a• )
(?)
where the infimum is over quasimonomial valuations v, that is, valuations that
are monomial in suitable coordinates on a suitable blowup of Spec R. Here A(v)
is the log discrepancy of v. Finally, we say that a quasimonomial valuation v
computes lct(a• ) if the infimum in (?) is achieved by v.
Conjecture C holds in dimension two, see [JM12, §9]. In higher dimensions, it
is open. Our main result is
Theorem D. If Conjecture C holds for any dimension m ≤ n and any algebraically closed field k of characteristic zero, then Conjecture B holds in dimension n.
OPENNESS CONJECTURE
3
In fact, we prove a slightly more general result, with the log canonical threshold replaced by more general jumping numbers in the sense of [ELSV04], see
Theorem D’ in §3.1. This result has the following consequence. Let ϕ be a psh
function on a complex manifold U . Recall that the multiplier ideal J (ϕ) of ϕ
is the analytic ideal sheaf on U whose stalk at a point x is given by the set of
holomorphic germs f ∈ Ox such that |f |2 e−2ϕ is locally integrable at x. This is
a coherent ideal sheaf. Now define J + (ϕ) as the (increasing, locally stationary)
limit of J ((1 + ε)ϕ) as ε & 0. We then show that a suitable generalization of
Conjecture C implies that J + (ϕ) = J (ϕ), see Remark 3.10.
We note that one can formulate a version of Conjecture C in a more general
setting, dealing with arbitrary graded sequences on regular excellent connected
schemes over Q. It was shown in [JM12] that this more general conjecture follows
from the special case in Conjecture C above.
One can also formulate a similar conjecture for subadditive sequences. Recall
that a sequence b• = (bj )∞
j=1 of nonzero ideals in R is subadditive if bi · bj ⊇ bi+j
for all i, j ≥ 1. As in the case of graded sequences, we can define lct(b• ) and
v(b• ) when v : R → R≥0 is a valuation, and we can consider whether v computes
lct(b• ). We say that b• has controlled growth if
1
1
v(bj ) ≤ v(b• ) ≤ (v(bj ) + A(v))
j
j
for all j ≥ 1 and all quasimonomial valuations v on R (with the left inequality
being obvious). Subadditive systems usually arise as multiplier ideals and then
are of controlled growth, see Proposition 3.12 and also [JM12, Proposition 2.13].
We show that Conjecture C implies (in fact, it is equivalent to) the following
statement.
Conjecture E. Let b• be a subadditive sequence of ideals in an excellent regular
domain R of equicharacteristic zero. If b• is of controlled growth and there is a
maximal ideal m in R and a positive integer p such that mpj ⊆ bj for all j, then
there exists a quasimonomial valuation v on R such that v computes lct(b• ).
It is this form of the conjecture that we will use in the proof of Theorem D.
Let us now indicate the strategy of this proof. Suppose ϕ is a psh germ at a
point x on a complex manifold with λ := cx (ϕ) < ∞. To ϕ we associate a
sequence b• = (bj )j≥1 of ideals by letting bj be the analytic multiplier ideal of
the psh function jϕ. It follows from [DEL00] that b• is subadditive. Further,
using techniques due to Demailly [Dem92, Dem93], one can show that b• has
controlled growth and that the singularities of bj closely approximate those of ϕ.
The complex singularity exponent cy (ϕ) is a lower semicontinuous function of
the point y, so we can define V as the “log canonical locus of λϕ”, that is, the
germ at x of the analytic set defined by cy (ϕ) ≤ λ. Assume that V is smooth
at x (this is in fact no restriction) and let Ox,V be the localization of the ring of
holomorphic germs at x, at the prime ideal defined by V . Since the latter ring is
excellent [Mat80, Theorem 102], so is Ox,V .
We now have the subadditive sequence b• · Ox,V of ideals in the excellent,
regular local ring Ox,V . By applying Conjecture E, we conclude that there exists
4
MATTIAS JONSSON AND MIRCEA MUSTAŢĂ
a quasimonomial valuation of Ox,V computing lct(b• · Ox,V ). This valuation is
monomial in suitable algebraic coordinates on a regular scheme X admitting a
projective birational map to Spec Ox,V . We can “analytify” the latter map and
interpret the quasimonomial valuation as an analytic invariant, the Kiselman
number of ϕ. Using basic properties of psh functions and Kiselman numbers we
then obtain the desired volume estimates in Conjecture B.
As already mentioned, Conjecture C holds in dimension two, so we obtain a
new proof of the openness conjecture in dimension two. In fact, this proof is quite
similar to the one in [FJ05b]. The strategy in loc. cit. is to consider a subspace
V of semivaluations v : Ox → [0, +∞] satisfying v(mx ) = 1, where mx is the
maximal ideal. One can equip V with a natural topology in which it is compact
Hausdorff; it also has the structure of a tree and is studied in detail in [FJ04]
(see also [Jon12]). To a psh germ at x one can associate a lower semicontinuous
function on V whose minimum is equal to cx (ϕ). It turns out that the minimum
must occur for a semivaluation that is either quasimonomial or associated to the
germ of an analytic curve at x. In both cases one can deduce the volume estimate
in Conjecture B using a simplified version of the arguments in §4.2.
In higher dimensions, the analogue of the space V was studied in [BFJ08],
where it was shown that cx (ϕ) can be computed using quasimonomial valuations.
However, when ϕ does not have an isolated singularity at the origin, it seems
difficult to define a suitable lower semicontinuous functional directly on V, having
minimum equal to cx (ϕ). The idea is to instead work at a generic point of the log
canonical locus of λϕ. This does not quite make sense in the analytic category,
and for this reason we pass to algebraic arguments using the subadditive sequence
b• . In the algebraic category, localization arguments work quite well and were
extensively used in [JM12].
The idea of studing psh functions using valuations was systematically developed in [FJ05a, FJ05b, BFJ08] but appears already in the work of Lelong [Lel69]
and Kiselman [Kis87, Kis94]. For some recent work on the singularities of psh
functions, see also [Ras06, Ber06, Lag10, Gue10].
The paper is organized as follows. In §2 we review facts about sequences of
ideals and log canonical thresholds in an algebraic setting and adapt some of
the statements to the setting of complex analytic manifolds. We also prove the
equivalence of Conjectures C and E above. In §3 we discuss plurisubharmonic
functions, Kiselman numbers, multiplier ideal sheaves and the Demailly approximation procedure. Finally, the main results are proved in §4.
Acknowledgment. We thank A. Rashkovskii for spotting a mistake in the
proof of Theorem D’ in an earlier version of the paper. We also thank the referee
for a careful reading and several useful remarks.
2. Background
2.1. Algebraic setting. We start by recalling some basic algebraic facts. For
more details we refer to [JM12] even though much of what follows is standard
material. Let R be an excellent, regular domain of equicharacteristic zero. In the
OPENNESS CONJECTURE
5
cases we will consider, R will be the localization at a prime ideal of the ring of
germs of holomorphic functions at a point in a complex manifold.
2.1.1. Quasimonomial valuations. By a valuation on R we mean a rank 1 valuation v : R \ {0} → R≥0 . A valuation is divisorial if there exists a projective
birational morphism π : X → Spec R, with X regular, a prime divisor E on X
and a positive number α > 0 such that v = α ordE , where ordE denotes the order
of vanishing along E.
More generally, consider a projective birational morphism πP: X → Spec R,
with X regular, a reduced
T simple normal crossing divisor E = i∈ITDi on X, a
subset J ⊆ I such that i∈J Di 6= ∅, an irreducible component Z of i∈J Di and
nonnegative numbers αi ≥ 0, i ∈ J, not all zero. Then there is a unique valuation
v on R such that the following holds: if (uj )j∈J are local coordinates at the generic
bX,ξ as
point ξ of Z such that Dj = {uj = 0} and we write f ∈ R ⊆ OX,ξ ⊆ O
P
β
bX,ξ and, for each β, either cβ = 0 or cβ (ξ) 6= 0, then
f = β cβ u , with cβ ∈ O
X
v(f ) = min{
αi βi | cβ 6= 0}.
i
We call such a valuation quasimonomial 1 and we say that the morphism π : X →
Spec R is adapted to v. In general, π is not unique. On the other hand, we can
always choose it so that αi > 0 for all i and that the αi are rationally independent,
see [JM12, Lemma 3.6]. Finally note that quasimonomial valuations are also
known as Abhyankar valuations, see [ELS03] and [JM12, §3.2].
2.1.2. Log discrepancy. Using the notation above we define the log discrepancy
A(v) of a quasimonomial valuation v by
X
A(v) =
αj (1 + ordDj (K)),
j∈J
where K = KX/ Spec R is the relative canonical divisor. In particular, A(ordDj ) =
1 + ordDj (K). One can show that the log discrepancy of a quasimonomial valuation does not depend on any choices made, see [JM12, §5.1]. Furthermore, one
can extend the definition of log discrepancy to arbitrary valuations on R; in this
case the log discrepancy can be infinite, see [JM12, §5.2].
2.1.3. Log canonical thresholds and jumping numbers. If a ⊆ R is a proper
nonzero ideal, then we define the log canonical threshold of a as
lct(a) = inf
v
A(v)
,
v(a)
(2.1)
where the infimum is over all nonzero valuations on R (it is enough to only
consider quasimonomial or even divisorial valuations). The quantity Arn(a) =
1As opposed to the convention in [JM12], we do not consider the trivial valuation, which is
identically zero on R \ {0}, to be quasimonomial.
6
MATTIAS JONSSON AND MIRCEA MUSTAŢĂ
lct(a)−1 is called the Arnold multiplicity of a. More generally, if q ⊆ R is a
nonzero ideal, then we define
lctq (a) = inf
v
A(v) + v(q)
v(a)
and
Arnq (a) = lctq (a)−1 .
(2.2)
Then lctq (a) is a jumping number of a in the sense of [ELSV04], and all jumping
numbers appear in this way. Note that lct(a) = lctR (a). The infimum in (2.1)
(resp. (2.2)) is attained at some divisorial valuation associated to a prime divisor
on some log resolution of a (resp. a · q). We make the convention that if a = 0 or
a = R, then lctq (a) = 0 or ∞, respectively.
2.1.4. Graded sequences. We now recall the definitions of the asymptotic invariants for graded sequences of ideals. For proofs and details we refer to [JM12], see
also [Mus02]. A sequence of ideals a• = (aj )j≥1 is a graded sequence if ai ·aj ⊆ ai+j
for all i, j ≥ 1. For example, if v is a valuation on R and α is a positive real
number, then by putting aj := {f ∈ R | v(f ) ≥ jα}, we obtain a graded sequence
in R. We refer to [Laz, §10.1] for other examples of graded sequences of ideals.
We assume that all graded sequences are nonzero in the sense that some aj is
nonzero.
It follows from the definition that if a• is a graded sequence of ideals in R and
v is a valuation on R, then v(ai+j ) ≤ v(ai ) + v(aj ) for all i, j ≥ 1. By Fekete’s
Lemma, this subadditivity property implies that
v(a• ) := inf
j≥1
v(aj )
v(aj )
= lim
,
j→∞
j
j
where the limit is over those j such that aj is nonzero. Similarly, if q is a nonzero
ideal in R, we have
lctq (a• ) := sup j · lctq (aj ) = lim j · lctq (aj ),
j→∞
j≥1
where the limit is over those j such that aj is nonzero. We also put
Arnq (a• ) := lctq (a• )−1 .
The jumping number lctq (a• ) is positive, but may be infinite. One can show (see
[JM12, Corolloray 6.9]) that as in the case of one ideal, we have
lctq (a• ) = inf
v
A(v) + v(q)
,
v(a• )
(2.3)
where the infimum is over all nonzero valuations of R (it is enough, in fact, to
only consider quasimonomial or even divisorial valuations).
2.1.5. Subadditive sequences. Let us now review the corresponding notions for
the case of subadditive sequences, referring for details to [JM12]. A sequence
b• = (bj )j≥0 of nonzero ideals in R is called subadditive if bi+j ⊆ bi · bj for all
i, j ≥ 0. This implies that v(bi+j ) ≥ v(bi ) + v(bj ) for all valuations v on R and
hence that
v(bj )
v(bj )
v(b• ) := sup
= lim
∈ R≥0 ∪ {+∞}.
j→∞
j
j
j
OPENNESS CONJECTURE
7
A subadditive sequence b• has controlled growth if
v(bj ) A(v)
v(b• ) ≤
+
(2.4)
j
j
for all j ≥ 1 and all quasimonomial valuation v (in fact, it is enough to only
impose this condition for divisorial valuations). In particular, for such b• we
have v(b• ) < ∞ for every quasimonomial valuation v.
For every subadditive system b• and every nonzero ideal q ⊆ R, we define
lctq (b• ) := inf j · lctq (bj ) = lim j · lctq (bj ).
j→∞
j≥1
q
q
We also put Arn (b• ) = lct (b•
)−1 .
For every subadditive sequence we have
lctq (b• ) = inf
v
A(v) + v(q)
,
v(b• )
(2.5)
where the infimum is over all valuations v of R with A(v) < ∞ (see [JM12,
Corollary 6.8]). It is clear from the definition that lctq (b• ) < ∞ unless bj = R
for all j. Moreover, if b• has controlled growth, then lctq (b• ) > 0. Indeed, one
can easily see that
1
1
1
Arnq (bj ) ≤ Arnq (b• ) ≤ Arnq (bj ) +
j
j
j
q
for all j ≥ 1, so that Arn (b• ) < ∞.
Subadditive sequences arise algebraically as asymptotic multiplier ideals. If a•
is a graded sequence of ideals in R and if bj = J (aj• ) is the asymptotic multiplier
ideal of a• of exponent j, then b• is a subadditive sequence of controlled growth
(see [JM12, Proposition 2.13]). Furthermore, we have lctq (a• ) = lctq (b• ) for
every nonzero ideal q, and v(a• ) = v(b• ) for every valuation v with A(v) < ∞
(see [JM12, Proposition 2.14, 6.2]).
2.1.6. Computing jumping numbers of graded sequences. If a• is a graded sequence of ideals in R and q is a nonzero ideal, then we say that a nonzero valuation
v computes lctq (a• ) if v achieves the infimum in (2.3), that is, lctq (a• ) = A(v)+v(q)
v(a• ) .
q
Note that if lct (a• ) = ∞, then v(a• ) = 0 for every v; hence every v computes
lctq (a• ). In what follows we will focus on the case lctq (a• ) < ∞; then every
valuation v that computes lctq (a• ) must satisfy A(v) < ∞.
It was shown in [JM12, Theorem 7.3] that for every graded sequence a• and
every nonzero ideal q, there is a valuation v on R that computes lctq (a• ). One
should contrast this with
Conjecture C’. For every excellent regular domain R of equicharacteristic zero,
every graded sequence of ideals a• , and every nonzero ideal q in R, there is a
quasimonomial valuation v on R that computes lctq (a• ).
One can also consider the following special case of this conjecture.
Conjecture C”. If k is an algebraically closed field of characteristic zero and
R = k[x1 , . . . , xm ], then for every nonzero ideal q and every graded sequence a•
of ideals in R such that a1 ⊇ mp for some maximal ideal m in R and some p ≥ 1,
there is a quasimonomial valuation v on R that computes lctq (a• ).
8
MATTIAS JONSSON AND MIRCEA MUSTAŢĂ
Note that when the ideal q is equal to R, Conjecture C” specializes to Conjecture C in the Introduction. It is shown2 in [JM12, Theorem 7.6] that Conjecture C’ holds for rings of dimension ≤ n if and only if Conjecture C” holds
for rings of dimension ≤ n. We note that both conjectures are trivially true in
dimension one. They are also true in dimension two. A proof, modeled on ideas
in [FJ05b] is given in [JM12, §9].
2.1.7. Computing jumping numbers of subadditive sequences. We now turn to the
analogous considerations for subadditive sequences. If b• is such a sequence, then
a valuation v with A(v) < ∞ computes lctq (b• ) if v achieves the infimum in (2.5).
The following conjecture extends Conjecture E from the Introduction to the case
of arbitrary jumping numbers.
Conjecture E’. Let q be a nonzero ideal and b• a subadditive sequence of ideals
in an excellent regular domain R of equicharacteristic zero. If b• is of controlled
growth and there is a maximal ideal m in R and a positive integer p such that
mpj ⊆ bj for all j, then there exists a quasimonomial valuation v on R such that
v computes lctq (b• ).
The key requirement in the above conjecture is that the valuation v be quasimonomial. The next proposition shows that if we drop this requirement, we can
find a valuation computing the log canonical threshold. This is the analogue of
the corresponding result for graded sequences that we have mentioned above.
Proposition 2.1. Under the assumptions in Conjecture E’, there is a nonzero
valuation v on R with A(v) < ∞ which computes lctq (b• ).
Remark 2.2. A similar result appears in [Hu12a], see also [Hu12b].
Proof. The argument follows verbatim the proof of [JM12, Thm 7.3], which
treated the case of graded sequences.3 If lctq (b• ) = ∞, then the assertion is trivial: we may take v to be any quasimonomial valuation such that v(m) = 0, since
in this case v(b• ) = 0. Hence, from now on, we may assume that lctq (b• ) < ∞.
By the assumption on b• , if v(m) = 0, then v(b• ) = 0. Therefore we only need
to focus on valuations v with v(m) > 0, and, after normalizing, we may assume
v(b• )
that v(m) = 1. Let us fix with 0 < < Arnq (b• ) and suppose that A(v)+v(q)
> .
pj
For every j ≥ 1 we have m ⊆ bj , hence v(bj ) ≤ jp, and therefore v(b• ) ≤ p.
This implies that A(v) ≤ A(v) + v(q) ≤ M , where M = p/. We thus have
lctq (b• ) = inf
v∈VM
A(v) + v(q)
,
v(b• )
where VM is the set of all valuations v with v(m) = 1 and A(v) ≤ M .
The space of all valuations carries a natural topology, and the subspace VM
is compact by [JM12, Proposition 5.9]. Moreover, A is a lower semicontinuous
2For the comparison with [JM12], note that a ring R has equicharacteristic zero iff Spec R is
a scheme over Q.
3The proof of [JM12, Thm 7.3] involves an extra step, the reduction to the case when all
ideals are m-primary, for some maximal ideal m in R; in our case, we do not have to worry about
this step since this is part of the hypothesis.
OPENNESS CONJECTURE
9
function on VM , while the functions v 7→ v(q) and v 7→ v(b• ) are continuous on
VM by [JM12, Proposition 5.7, Corollary 6.6] (for the last assertion we make use
of the hypothesis that b• has controlled growth). It follows that the function
v 7→ A(v)+v(q)
is lower semicontinuous on VM ; hence it achieves its infimum at
v(b• )
some point v ∈ VM .
2.1.8. Equivalence of conjectures. Our main result is that Conjecture C’ implies
the openness conjecture, see Theorem D’ in §3.1. As a first step, we show that
Conjectures C’, C” and E’ are equivalent.
Proposition 2.3. If one of Conjectures C’,C”, and E’ holds for all rings of
dimension ≤ n, then the other two conjectures hold for such rings.
Proof. As we have already mentioned, [JM12, Theorem 7.6] gives the equivalence
of Conjectures C’ and C”. On the other hand, it is easy to see that if Conjecture E’
holds in dimension ≤ n, then so does Conjecture C”. Indeed, let q and a• be as
in Conjecture C”, and let bj = J (aj• ). In this case b• is a subadditive sequence
of controlled growth, and for every j ≥ 1 we have
mpj ⊆ aj1 ⊆ aj ⊆ bj .
Furthermore, if v is a quasimonomial valuation of R which computes lctq (b• ),
then, since v(a• ) = v(b• ) and lctq (a• ) = lctq (b• ), it follows that v computes
lctq (a• ). Therefore Conjecture C” holds in dimension ≤ n.
We now assume that Conjecture C’ holds in dimension ≤ n, and consider a
nonzero q and a subadditive sequence b• as in Conjecture E’, with dim(R) ≤ n.
We may assume that lctq (b• ) < ∞, since otherwise the assertion to be proved
is trivial (note also that lctq (b• ) > 0 since b• has controlled growth). It follows
from Proposition 2.1 that there is a nonzero valuation w of R with A(w) < ∞
which computes lctq (b• ). In particular, w(b• ) is finite and positive. If we put
aj = {f ∈ R | w(f ) ≥ j}, then a• is a graded sequence of ideals, and by
Conjecture C’ there is a quasimonomial valuation v on R which computes lctq (a• ).
It is enough to show that in this case v also computes lctq (b• ).
It follows easily from the definition of a• that w(a• ) = 1 and if v(a• ) = γ, then
γ = inf{v(f )/w(f ) | f ∈ R, w(f ) > 0}
(see for example [JM12, Lemma 2.4]). We first deduce that lctq (a• ) ≤ A(w) +
w(q) < ∞, hence γ > 0. Furthermore, we have γ −1 v ≥ w. Since v computes
lctq (a• ), we have
γ −1 (A(v) + v(q)) =
A(w) + w(q)
A(v) + v(q)
≤
= A(w) + w(q).
v(a• )
w(a• )
(2.6)
On the other hand, using the fact that γ −1 v ≥ w, we obtain γ −1 v(b• ) ≥ w(b• ),
and therefore (2.6) gives
A(w) + w(q)
A(v) + v(q)
≤
.
v(b• )
w(b• )
(2.7)
By assumption, w computes lctq (b• ), hence we have equality in (2.7), and v also
computes lctq (b• ).
10
MATTIAS JONSSON AND MIRCEA MUSTAŢĂ
Remark 2.4. By running the argument in the proof of Proposition 2.3 with
q = R, we see that Conjectures C and E in the Introduction are equivalent, in
the sense that one holds for rings of dimension ≤ n if and only if the other one
does.
2.1.9. A converse to the conjectures. As a partial converse to the (equivalent)
conjectures C’, C” and E’ above we show that any quasimonomial valuation
computes some jumping number. This result will not be used in the sequel. In
its formulation and proof we freely use terminology from [JM12].
Proposition 2.5. Let X be an excellent, regular, connected, separated scheme
over Q and let v be a quasimonomial valuation on X. Then there exists a nonzero
ideal q on X and a graded sequence a• on X such that v computes lctq (a• ).
Proof. By [JM12, Thm 7.8] it suffices to find a nonzero ideal q such that the
following statement holds: for every valuation w ∈ ValX such that w ≥ v (in the
sense that w(a) ≥ v(a) for all ideals a on X) we have A(w) + w(q) ≥ A(v) + v(q).
Here A = AX is the log discrepancy with respect to X.
After replacing X by an open neighborhood of the center cX (v) of v on X
we may assume that X = Spec R is affine. Since v is quasimonomial, there
exists a proper birational morphism π : Y → X, with Y regular, and algebraic
local coordinates y1 , . . . , yn at cY (v) with respect to which v is monomial. Let
Ei = {yi = 0}, 1 ≤ i ≤ n, be the associated prime divisors on Y and pick N
large enough so that N ≥ A(ordEi ) for all i. Also write yi = ai /bi with ai , bi ∈ R
nonzero.
We claim that the principal ideal q = (b1 · . . . · bn )N does the job. Indeed,
suppose w ∈ ValX satisfies w ≥ v. In particular, we then have
w(ai ) ≥ v(ai )
and w(bi ) ≥ v(bi )
for all i.
(2.8)
Since v is monomial in coordinates y1 , . . . , yn we have
A(v) =
n
X
v(yi )A(ordEi ).
(2.9)
i=1
By the definition of A(w) we also have
A(w) ≥
n
X
w(yi )A(ordEi ).
(2.10)
i=1
Equations (2.9) and (2.10) and the definition of q now imply
A(w) − A(v) + w(q) − v(q) ≥
n
X
A(ordEi )(w(yi ) − v(yi )) +
i=1
=
n
X
i=1
A(ordEi )(w(ai ) − v(ai )) +
n
X
N (w(bi ) − v(bi ))
i=1
n
X
(N − A(ordEi ))(w(bi ) − v(bi )) ≥ 0,
i=1
where the last inequality follows from (2.8) and the choice of N . This completes
the proof.
OPENNESS CONJECTURE
11
Remark 2.6. It follows from [JM12, Thm 7.8] that with the choice of q above, v
also computes lctq (b• ) for some subadditive sequence b• as well as lctq (a0• ), where
a0• is the graded sequence defined by a0j = {v ≥ j} for j ≥ 1.
2.2. Analytic setting. Let U be a complex manifold. When talking about open
sets in U we always refer to the classical topology unless mentioned otherwise.
By an ideal on U we will always mean a coherent analytic ideal sheaf on U . For
a point x ∈ U , Ox denotes the ring of germs of holomorphic functions at x. Note
that Ox is isomorphic to the ring of convergent power series in n variables over
C, where n = dim(U ); hence Ox is an excellent regular local ring, see [Mat80,
Thm 102].
We denote by mx the maximal ideal in Ox . By a valuation at x we mean a
valuation on Ox in the sense of §2.1.1.
A subadditive sequence of ideals on U is a sequence b• = (bj )∞
j=1 of everywhere
nonzero ideals on U such that bi · bj ⊇ bi+j . If x ∈ U , then we write b• · Ox for
the corresponding subadditive sequence inside Ox . We say that b• has controlled
growth if b• · Ox has controlled growth for all x ∈ U .
If q is an everywhere nonzero ideal on U , b• is a subadditive sequence of ideals
on U and x ∈ U , then we define lctqx (b• ) := lctq·Ox (b• · Ox ) and Arnqx (b• ) :=
lctqx (b• )−1 . Thus we have
Arnqx (b• ) = sup
v
v(b• )
,
A(v) + v(q)
where the supremum is over all (quasimonomial) valuations at x (note that we
simply write v(b• ) and v(q) for v(b• · Ox ) and v(q · Ox ), respectively).
More generally, we shall consider the following situation. Let V be a germ
of a complex submanifold at a point x in a complex manifold. Let Ox,V be the
localization of Ox along the ideal IV . This is an excellent regular local ring with
maximal ideal mx,V . Consider a subadditive system of ideals b• defined near x
and a nonzero ideal q ⊆ Ox . We set
lctqx,V (b• ) := lctq·Ox,V (b• · Ox,V )
and
Arnqx,V (b• ) := lctqx,V (b• )−1
Then
v(b• )
,
A(v)
+ v(q)
v
where the supremum is over all (quasimonomial) valuations of Ox,V .
Note that if V = {x}, then we recover the previous situation.
Arnqx,V (b• ) = sup
2.2.1. Analytification of birational morphisms. Let x, V be as above. Consider
a projective birational morphism π : X → Spec Ox,V of schemes over C, with X
regular. We can then analytify π as follows.4 Since π is projective, there exists a
closed embedding
X ,→ Spec Ox,V ×Spec C PN
(2.11)
C
such that π is the restriction of the projection of the right hand side onto
Spec Ox,V . Thus X is cut out by finitely many homogeneous equations with
4The analytification procedure here is ad hoc and not functorial, but nevertheless related to
the construction of a complex manifold associated to a smooth complex projective variety.
12
MATTIAS JONSSON AND MIRCEA MUSTAŢĂ
coefficients in Ox,V . These coefficients can be written as fi /g, where fi ∈ Ox and
g ∈ Ox \ IV · Ox . Let U be a neighborhood of x on which g and the fi are defined.
Set W := {g = 0} ⊆ U . This is a (possibly empty) analytic subset of U that
does not contain V . After shrinking U we may assume that W is either empty
or contains x.
We now define a complex manifold
X an ,→ (U \ W ) × PN (C)
as the analytic subset cut out by the same equations as in (2.11). Then X an is
a complex manifold and the induced projection π an : X an → U \ W is a proper
modification. We shall have more to say about this construction later.
Given a point y ∈ U \ W we define in the same way a projective birational
morphism πy : Xy → Spec Oy . Namely, Xy ⊆ Spec Oy ×Spec C PN
C is defined by
the same homogeneous polynomials as above. After shrinking U and increasing
W (but keeping x ∈ U and W 6⊇ V ) we may further obtain that if E ⊆ πy−1 (V )
is any prime divisor, then the image πy (E) contains V . Further, suppose b is an
ideal on U and that π : X → Spec Ox,V as above is a log resolution of b · Ox,V .
Then, we may assume that the birational morphism πy : Xy → Spec Oy is a log
resolution of b · Oy for all y ∈ U \ W . Further, there is a bijection between the
set of prime divisors E of Xy for which ordE (b · Oy ) > 0 and the set of prime
divisors E of X such that ordE (b · Ox,V ) > 0.
2.2.2. Log canonical locus. The key to the proof of Theorem D is to localize at
the locus where the log canonical threshold is as small as possible. Let x and V
be as above and let b• (resp. q) be a subadditive system of ideals (resp. a nonzero
ideal) defined on some neighborhood U of x. Assume that U is small enough that
V is a submanifold of U .
Lemma 2.7. Assume that b• has controlled growth and that
lctqy (b• ) ≤ λ = lctqx (b• )
for all y ∈ V , where λ ≥ 0. Then lctqx,V (b• ) = λ.
Proof. Let us first prove that lctqx,V (b• ) ≥ λ. For this, fix m ≥ 1 and pick a log
resolution πm : Xm → Spec Ox of the ideal (qbm ) · Ox . After a base change by
Spec Ox,V → Spec Ox , πm induces a log resolution of the ideal (qbm ) · Ox,V . We
have
ordE (bm )
,
Arnqx (bm ) = max
E A(ordE ) + ordE (q)
where the maximum is over the set of prime divisors E ⊆ Xm for which ordE (bm ) >
0. On the other hand Arnqx,V (bm ) is given by the same expression, but where the
maximum is only over the subset of prime divisors E for which πm (E) contains
V . It is then clear that Arnqx,V (bm ) ≤ Arnqx (bm ). Dividing by m and letting
m → ∞ yields Arnqx,V (b• ) ≤ Arnqx (b• ) and hence lctqx,V (b• ) ≥ lctqx (b• ) = λ.
Now we prove the reverse inequality. Pick any m ≥ 1. Consider a log resolution
πm : Xm → Spec Ox,V of the ideal qbm · Ox,V . As in §2.2.1 this gives rise to
an open neighborhood Um of x, an analytic subset Wm ⊆ Um not containing
OPENNESS CONJECTURE
13
V ∩ Um , and for each y ∈ V ∩ (Um \ Wm ), a log resolution πm,y : Xm,y → Spec Oy
of qbm · Oy . Further, there is a bijection between the set of prime divisors E ⊆
Xm,y such that ordE (bm · Oy ) > 0 and the set of prime divisors E ⊂ Xm for
which ordE (bm · Ox,V ) > 0. This implies that Arnqy (bm ) = Arnqx,V (bm ) for any
y ∈ (Um \ Wm ) ∩ V since both quantities are calculated using the same divisors.
Thus we have
Arnqy (bm ) = Arnqx,V (bm ) ≤ m Arnqx,V (b• ),
the inequality being definitional.
Now, for any y ∈ (Um \ Wm ) ∩ V and any j ≥ 1 there exists a quasimonomial
(or even divisorial) valuation vj at y such that
vj (b• )
1
≥ Arnqy (b• ) − .
A(vj ) + vj (q)
j
This gives
vj (b• )
vj (bm ) + A(vj )
1
1
+ ≤
+
A(vj ) + vj (q) j
m(A(vj ) + vj (q)) j
q
Arny (bm )
vj (bm )
1
1
1
1
1
1
+
+ ≤
+
+ ≤ Arnqx,V (b• ) +
+ ,
≤
m(A(vj ) + vj (q)) m j
m
m j
m j
λ−1 ≤ Arnqy (b• ) ≤
where the second inequality follows from the assumption that b• ·Oy has controlled
growth. Letting first j → ∞ and then m → ∞ we obtain Arnqx,V (b• ) ≥ λ−1 , and
hence lctqx,V (b• ) ≤ λ. This completes the proof.
3. Plurisubharmonic functions
Let U be a complex manifold. A function ϕ : U → R ∪ {−∞} is plurisubharmonic (psh) if ϕ 6≡ −∞ on any connected component of U , ϕ is upper semicontinuous, and τ ∗ ϕ is subharmonic or ≡ −∞ for every holomorphic map τ : D → U ,
where D ⊆ C is the unit disc. A germ of a psh function at a point is defined in
the obvious way.
A basic example of a psh function is ϕ = log maxi |fi |, where f1 , . . . , fm are
holomorphic functions on U . If x ∈ U and q ⊆ Ox is an ideal, then we can define
a psh germ log |q| at x by setting
log |q| := log max |fi |
i
(3.1)
where fi ∈ Ox are generators of q. The choice of generators only affects log |q|
up to a bounded additive term. If a and b are two ideals in Ox , then
log |a · b| = log |a| + log |b| + O(1).
For further facts about psh functions, see e.g. [Hor94, Dem].
3.1. Jumping numbers and singularity exponents. Let ϕ be a psh germ at
a point x on a complex manifold and let q ⊆ Ox be a nonzero ideal. Define
cqx (ϕ) = sup{c > 0 | |q|2 exp(−2cϕ) is locally integrable at x}.
This definition does not depend on the choice of generators used to define |q|.
x
We also write cx (ϕ) := cO
x (ϕ). In [DK01], cx (ϕ) is called the complex singularity
14
MATTIAS JONSSON AND MIRCEA MUSTAŢĂ
exponent of ϕ at x, whereas cqx (ϕ) is a jumping number in the sense of [ELSV04].
If a ⊆ Ox is a nonzero ideal, then we have
cqx (log |a|) = lctqx (a),
where the right hand side is defined as in §2.2, see [DK01, Proposition 1.7].5 We
have the following generalizations of Conjectures A and B.
Conjecture A’. If cqx (ϕ) < ∞, then the function |q|2 exp(−2cqx (ϕ)ϕ) is not
locally integrable at x.
This conjecture, which is also due to Demailly and Kollár, can be paraphrased
as a semicontinuity statement for multiplier ideals, see Remark 3.10.
Conjecture B’. If cqx (ϕ) < ∞, then for any open neighborhood U of x on which
ϕ and q are defined, we have
Vol{y ∈ U | cx (ϕ)ϕ(y) − log |q| < log r} & r2
(3.2)
as r → 0.
It is clear that Conjecture B’ implies Conjecture A’ and that neither conjecture
depends on the choice of generators of q. The following result is a variation of
Theorem D from the introduction. We shall prove both these theorems in §4.
Theorem D’. If Conjecture C” in §2.1.6 holds for all m ≤ n and all algebraically
closed fields k of characteristic zero, then Conjecture B’ holds on complex manifolds of dimension n.
3.2. Kiselman numbers. We now recall an analytic version of monomial valuations due to Kiselman [Kis87, Kis94]. It is a special case of the generalized
Lelong numbers introduced by Demailly [Dem87]. As our setting differs slightly
from the above references, we give some details for the convenience of the reader.
Let Ω be a complex manifold of dimension n, Z ⊆ Ω a connected submanifold
of codimension m ≥ T
1 and D1 , . . . , Dm distinct, smooth, connected hypersurfaces
in Ω such that Z = i Di and such that the Di meet transversely along Z. Also
suppose we are given positive real numbers αi > 0, 1 ≤ i ≤ m. In this situation
we will associate to any psh function ϕ on U its Kiselman number τZ,D,α (ϕ) ≥ 0.
In preparation for the definition, pick a point z ∈ Z and local analytic coordinates (u1 , . . . , un ) at z such that Di = {ui = 0} for 1 ≤ i ≤ m locally at z. For
t ∈ Rn≤0 with ti 0 let Du (t) ⊆ Ω be the polydisc with radius et and Su (t) its
distinguished boundary, that is
n
n
\
\
Du (t) :=
{|ui | ≤ eti } and Su (t) :=
{|ui | = eti }.
(3.3)
i=1
i=1
We also write Du (s) = Du (s, s, . . . , s) for s ∈ R≤0 .
Let ϕ be a psh germ at z and pick ε > 0 small enough that ϕ is defined in an
open neighborhood of the polydisc Du (log ε). For t ∈ Rn≤log ε set
H(t) := sup ϕ = sup ϕ.
Du (t)
Su (t)
5In loc. cit. only the case q = O is treated but the same proof works in the general case.
x
OPENNESS CONJECTURE
15
Clearly H is increasing in each argument and it is finite-valued since ϕ is upper
semicontinuous. Less obvious is the fact that H is convex; for this see [Kis94,
p.12]. Note that H is continuous on the closed set Rn≤log ε since it is defined and
convex on an open neighborhood of this set.
We now define a new function
h = hϕ,Z,D,z,u,ε : Rn≥0 → R
by setting
H(log ε + sα)
.
s→−∞
s
The limit is well defined by the convexity of H.
h(α) := lim
Lemma 3.1. The function h = hϕ,Z,D,z,u,ε has the following properties:
(i) h is nonnegative, continuous, concave, 1-homogeneous and increasing in
each argument;
(ii) h does not depend on the choice of ε as long as ϕ is defined in an open
neighborhood of D(log ε).
If, further, αi = 0 for i > m, then
(iii) h does not depend on the choice of local coordinates (u1 , . . . , un ) at z, as
long as Di = {ui = 0} for i ≤ m;
(iv) h does not depend on the choice of point z ∈ Z as long as ϕ is defined in
a neighborhood of z.
Proof. To alleviate notation, we shall only write out the relevant part of the
subscripts of h = hϕ,Z,D,z,u,ε .
The fact that h is nonnegative, continuous, concave and increasing follows from
H being continuous, convex and increasing. That h is 1-homogeneous is clear.
This proves (i).
As for (ii), suppose 0 < ε0 < ε. It is clear that hε0 ≥ hε since H is increasing.
To prove the reverse inequality, first suppose that αi > 0 for 1 ≤ i ≤ n and set
δ = mini αi . Then
Du (log ε + sα) ⊆ Du (log ε0 + (s +
ε
1
log 0 )α),
δ
ε
so that H(log ε + sα) ≤ H(log ε0 + (s + 1δ log εε0 )α) for any s ≤ 0. This implies
hε (α) ≥ hε (α). By continuity of hε and hε0 we get hε ≥ hε0 and hence hε = hε0
on Rn≥0 .
Now we turn to (iii) and (iv) so suppose αi = 0 for i > m.
Let (u01 , . . . , u0n ) be another set of local analytic coordinates at z such that
Di = {u0i = 0} for 1 ≤ i ≤ m. We can write ui = u0i gi for 1 ≤ i ≤ m, where
gi ∈ Oz and gi (z) 6= 0. It is easy to see that if ε > 0 is small enough, then there
exists ε0 > 0 such that
Du0 (log ε0 + sα) ⊆ Du (log ε + sα)
for all s ≤ 0. This gives hu0 (α) = hu0 ,ε0 (α) ≥ hu,ε (α) = hu (α) and the reverse
inequality follows by symmetry. Thus (iii) holds.
16
MATTIAS JONSSON AND MIRCEA MUSTAŢĂ
Finally we prove (iv). Thus pick a point z ∈ Z, and a set of local coordinates
u at z. Pick 0 < ε 1 and z 0 ∈ Du (log ε) ∩ Z. Then u0 := u − u(z 0 ) defines local
coordinates at z 0 and for any α as above and any s ≤ 0 we have
Du0 (log ε + sα) ⊆ Du (log 2ε + sα)
and Du (log ε + sα) ⊆ Du0 (log 2ε + sα).
This implies that hz 0 = hz 0 ,u0 ,ε ≥ hz,u,2ε = hz and, similarly, hz ≥ hz 0 . Thus z →
7
hz is locally constant on Z, which completes the proof since Z is connected.
Now assume αi = 0 for i > m and αi > 0 for 1 ≤ i ≤ m. The number
τZ,D,α (ϕ) := hϕ,Z,D (α)
is called the Kiselman number 6 of ϕ along Z with weight αi along Di . As explained in Lemma 3.1, it does not depend on the choice of coordinates ui defining
the hypersurfaces Di . However, given such coordinates, it follows from the convexity of H that we have the estimate
1
log |ui | + O(1),
(3.4)
ϕ ≤ τZ,D,α (ϕ) max
i≤m αi
near z. From this inequality we easily deduce
Lemma 3.2. Suppose ϕ, ψ are psh functions defined near some Zariski general
point z ∈ Z. Write τ = τZ,D,α . Then:
(i) if ϕ ≤ ψ + O(1) near z, then τ (ϕ) ≥ τ (ψ);
(ii) τ (max{ϕ, ψ}) = min{τ (ϕ), τ (ϕ)}.
Proof. The inequality in (i) follows immediately from the definition. As for (ii),
note that (i) implies τ (max{ϕ, ψ}) ≤ min{τ (ϕ), τ (ϕ)}. The reverse inequality
follows from (3.4).
Remark 3.3. It is also true that τ (ϕ + ψ) = τ (ϕ) + τ (ψ), but we do not need
this fact.
Remark 3.4. Using the same construction, we can define τZ,D,α when Z and
the Di are germs of complex submanifolds at a point in a complex manifold.
Remark 3.5. When αi = 1 for 1 ≤ i ≤ m, the choice of hypersurfaces Di play
no role; in this case the Kiselman number is equal to the Lelong number along
Z [Lel69].
3.3. Kiselman numbers and quasimonomial valuations. Let U be a complex manifold, x ∈ U a point and V the germ at x of a complex submanifold of
U . We allow for the case V = x but assume that V has codimension ≥ 1. As
in §2.2.1 let Ox,V be the localization of Ox at the ideal IV · Ox and let mx,V be
the maximal ideal of Ox,V . Let v be a quasimonomial valuation of Ox,V . We
want to associate to v a Kiselman number on a suitable modification.
Consider a projective birational morphism π : X → Spec Ox,V that is adapted
to v in
Pthe sense of §2.1.1. Thus there exist prime divisors D1 , . . . , Dm on X such
that Di has simple normal crossing singularities, and an irreducible component
6In [Kis87, Kis94], the Kiselman number is called a refined Lelong number whereas Demailly [Dem87] calls it a directional Lelong number.
OPENNESS CONJECTURE
17
T
Z of m
i=1 Di such that v is monomial with weight αi > 0 on Di for 1 ≤ i ≤ m.
The assumption that v ≥ 0 on Ox,V implies that π(Z) ⊂ V . Let ξ be the generic
point of Z and pick functions ui ∈ OX,ξ , 1 ≤ i ≤ m, such that Di = (ui = 0).
Thus the functions ui are regular on a Zariski open subset of Z.
Using the construction and conventions of §2.2.1, after shrinking U a little,
the projective birational morphism π : X → Spec Ox,V gives rise to a complex
manifold X an and a proper modification π an : X an → U \ W , where W ⊆ U is a
complex subvariety not containing V .
Further, after again shrinking U and increasing W if necessary, there exists an
open subset Ω of X an on which the functions ui , 1 ≤ i ≤ m, are holomorphic and
such that the following properties hold: the sets Dian := (ui = 0) are complex
submanifolds of Ω ofTcodimension one, meeting transversely along the connected
submanifold Z an := 1≤i≤m Dian . Further π an (Z an ) ⊇ V \ W .
Let τ = τZ an ,Dan ,α denote the Kiselman number with respect to the data above,
see §3.2.
Definition 3.6. If ϕ is the germ of a psh function at x, then we define
v(ϕ) := τ (ϕ ◦ π an ).
(3.5)
Note that this definition a priori depends on a lot of choices made above.
However, we have:
Proposition 3.7. The definition of v(ϕ) does not depend on any choices made
as long as the birational morphism π : X → Spec Ox,V is adapted to v.
We shall prove this result in §3.4 using multiplier ideals, see Remark 3.13. For
now, we only treat the following special case.
Lemma 3.8. If b ⊆ Ox is a nonzero ideal, then
v(b · Ox,V ) = τ ((log |b|) ◦ π an ).
(3.6)
Proof. Note that both sides of (3.6) depend continuously on the weight α ∈
Rm
>0 . Hence we may assume that the αi are rationally independent. In view of
Lemma 3.2 we may also assume that b is generated by a single element f ∈ Ox .
We must prove that τ (log |f | ◦ π an ) = v(f ).
Consider a Zariski general closed point z ∈ Z and pick functions um+1 , . . . , un ∈
OX,z such that u := (u1 , . . . , un ) define local algebraic coordinates on X at z.
Write u0 := (u1 , . . . , um ) and u00 := (um+1 , . . . , un ). Consider the expansion of
00
0
[
f ◦ π as a formal power series in O
X,ξ ' C[[u]] = C[[u ]][[u ]]:
X
X
f ◦π =
aβγ (u0 )β (u00 )γ =
aβ (u00 )(u0 )β ,
(3.7)
n−m
β∈Zm
≥0 ,γ∈Z≥0
β∈Zm
≥0
where aβ,γ ∈ C and
aβ (u00 ) =
X
γ∈Zn−m
≥0
aβγ (u00 )γ ∈ C[[u00 ]] ⊆ C[[u]].
(3.8)
18
MATTIAS JONSSON AND MIRCEA MUSTAŢĂ
Since the αi are rationally independent, there exists a unique β̄ minimizing β·α :=
β1 α1 + · · · + βm αm over all β for which aβ 6≡ 0. By definition, we then have
v(f ) = β̄ · α.
Since the point z ∈ Z was generically chosen, it corresponds to a point, also
denoted z, on the complex manifold Z an . We may assume that such that f
is holomorphic near π an (z) ∈ U \ W . Pick 0 < ε 1 such that f ◦ π an is
holomorphic on the open polydisk |ui | < ε, 1 ≤ i ≤ n. The first series in (3.7)
is then the Taylor series of the holomorphic function f ◦ π an at z in the analytic
coordinates u and this series converges locally uniformly in the polydisk kuk < ε.
Further, for every β, the series in (3.8) converges locally uniformly for ku00 k < ε
to a holomorphic function aβ (u00 ) and the second series in (3.7) converges locally
uniformly for kuk < ε.
By assumption, the holomorphic function aβ̄ is not constantly equal to zero.
After moving z (but keeping z ∈ Z an ) a little and translating the coordinates
um+1 , . . . , un accordingly, we may assume that aβ̄ (0) 6= 0. Let us use the notation
of §3.2. For 0 < ε 1 we have
log |f | ◦ π an = log |f ◦ π an | ∼ log |aβ̄ (0)(u0 )β̄ | ∼ sβ̄ · α
on the set Su (log ε + sα), as s → −∞. This implies that
τ (log |f | ◦ π an ) = β̄ · α = v(f )
as was to be shown.
3.4. Multiplier ideal sheaves and Demailly approximation. To a psh function ϕ on a complex manifold U is associated a multiplier ideal sheaf J (ϕ). This
is an ideal sheaf on U whose stalk at a point x is the set of holomorphic germs
f ∈ Ox such that |f |2 e−2ϕ is locally integrable at x. The coherence of J (ϕ)
is a nontrivial result due to Nadel [Nad89, Nad90], which can be proved using
Hörmander’s L2 -estimates, see [DK01, Thm 4.1].
Recall from §3.1 the definition of the jumping number cqx (ϕ) of ϕ at x relative
to an ideal q on U . Given µ > 0 consider the colon ideal aµ = (J (µϕ) : q) on U .
This is an ideal sheaf on U whose stalk at a point x ∈ U is given by
aµ · Ox := {h ∈ Ox | |h|2 |q|2 e−2µϕ is locally integrable at x}.
(3.9)
Since J (µϕ) and q are coherent, so is aµ .
Lemma 3.9. We have cqx (ϕ) < µ iff aµ ·Ox 6= Ox . As a consequence, the function
x 7→ cqx is lower semicontinuous in the analytic Zariski topology on U .
Proof. The first statement is clear. Hence, for µ > 0, the set
Vµ− := {x ∈ U | cqx (ϕ) < µ}
(3.10)
is equal to the support of the coherent sheaf OU /aµ and in particular an analytic
subset of U . It follows that for λ > 0, the set
\
Vλ := {x ∈ U | cqx (ϕ) ≤ λ} =
Vµ−
(3.11)
µ>λ
is also an analytic subset of U . This concludes the proof.
OPENNESS CONJECTURE
19
Remark 3.10. Conjecture A’ in §3.1 is equivalent to a semicontinuity statement
about multiplier ideals. Indeed, define J + (ϕ) as the increasing (locally stationary) limit of J ((1 + ε)ϕ) as ε & 0. Then Conjecture A’ precisely says that
J + (ϕ) = J (ϕ).
If f1 , . . . , fm are holomorphic functions on U , generating an ideal sheaf q and
if log |q| is the corresponding psh function on U defined by (3.1), then we have
J (log |q|) = J (q),
(3.12)
where the right-hand side is defined as in §2.1, see [DK01, Proposition 1.7].
Lemma 3.11. If ϕ ≥ p log |q| + O(1) for some integer p ≥ 1, then J (ϕ) ⊇ qp .
Proof. In view of the assumption and (3.12) we have
J (ϕ) ⊇ J (p log |q|) = J (qp ) ⊇ qp .
Here the last inclusion holds since J (a) ⊇ a for any ideal a.
Now fix a psh function ϕ on U . For j ≥ 1 set
bj := J (jϕ).
It follows from [DEL00] that b• = (bj )∞
j=1 is a subadditive sequence of ideals
on U . The following result (which was known in the case V = x, see [DK01,
Theorem 4.2] and [BFJ08, Theorem 5.5]) allows us to understand the singularities
of ϕ in terms of those of b• .
Proposition 3.12. Let x be any point in U and let V be the germ at x of a proper
complex submanifold. Define Ox,V as in §2.2. Then the following properties hold:
(i) for every nonzero ideal q ⊆ Ox we have cqx (ϕ) = lctqx (b• );
(ii) the subadditive sequence b• · Ox,V has controlled growth;
(iii) for every quasimonomial valuation v on Ox,V we have v(ϕ) = v(b• ·Ox,V ).
Remark 3.13. In (iii) we compute v(ϕ) as a Kiselman number of the pullback
of ϕ under a suitable proper modification, the latter being the analytification of
a blowup of Spec Ox,V , see §3.3. Since the quantity v(b• · Ox,V ) does not depend
on any choices made, we see that v(ϕ) is uniquely defined. Thus we obtain a
proof of Proposition 3.7.
The proof of Proposition 3.12 relies on a fundamental approximation procedure
due to Demailly [Dem92, Dem93]. We refer to [DK01, §4] for details on what
follows.
Let ϕ be a psh function defined in some pseudoconvex domain B ⊆ U containing x. For p ≥ 1 consider the Hilbert space
Z
Hp := {f ∈ O(B) |
|f |2 e−2pϕ < ∞},
B
with the natural inner product. It is a fact that for every y ∈ B, the elements of
Hp generate the stalk at y of the multiplier ideal sheaf bp := J (pϕ). Define
Z
1
ϕp := sup{log |f | |
|f |2 e−2pϕ ≤ 1}.
p
B
20
MATTIAS JONSSON AND MIRCEA MUSTAŢĂ
Then ϕp is psh on B. It follows from the Ohsawa-Takegoshi Theorem that
ϕ ≤ ϕp +
C
p
(3.13)
on B, for some constant C not depending on ϕ or p. For any y ∈ B and any
nonzero ideal q ⊆ Oy we also have
(p lctqy (bp ))−1 = cqy (ϕp )−1 ≤ cqy (ϕ)−1
≤ cqy (ϕp )−1 +
1
1
= (p lctqy (bp ))−1 + . (3.14)
p
p
Here the two equalities follow from (3.12) whereas the first inequality results
from (3.13). The second inequality is proved in [DK01, Thm 4.2 (3)] in the case
q = OU and the same proof works in the general case.
Proof of Proposition 3.12. Clearly (i) follows from (3.14) with y = x by letting
p → ∞. It remains to prove (ii) and (iii).
We use the notation of §3.3. Write τ = τZ,D,α . It follows from (3.13) and from
Proposition 3.7 that
1
τ (ϕ ◦ π an ) ≥ τ (ϕp ◦ π an ) = v(bp · Ox,V )
p
(3.15)
for any p ≥ 1.
We will show that if f ∈ Hp , then
v(f ) + A(v) ≥ pτ (ϕ ◦ π an ).
(3.16)
Grant (3.16) for the moment. We then have
1
1
1
v(bp · Ox,V ) ≤ τ (ϕ ◦ π an ) ≤ v(bp · Ox,V ) + A(v).
p
p
p
(3.17)
Letting p tend to infinity we see that τ (ϕ ◦ π an ) = v(b• · Ox,V ), proving (iii). In
particular, v(ϕ) = τ (ϕ ◦ π an ) is well defined independently of any choices made
so we have established Proposition 3.7. Since v was an arbitrary quasimonomial
valuation on Ox,V we also see that b• · Ox,V has controlled growth, proving (ii).
It only remains to prove (3.16). Since both sides of (3.16) depend continuously
on the weight α, we may assume that α1 , . . . , αm are rationally independent. We
now argue as in the proof of Lemma 3.8, recycling the notation from that proof.
Thus we have the expansion (3.7) and we have aβ̄ (0) 6= 0 for the unique β̄ ∈ Zm
≥0
for which β̄ · α = v(f ).
Now fix K 1. Define a sequence of disjoint open subsets (Ωk )k≥0 of Ω by
Ωk :=
m
\
{−(K + k) <
i=1
n
\
log |ui |
< 1 − (K + k)} ∩
{−K < log |ui | < 1 − K}.
αi
i=m+1
(3.18)
For large k we then have the following estimates on Ωk :
log |f ◦ π an | ≥ −kv(f ) + O(1)
and ϕ ◦ π an ≤ −kτ (ϕ ◦ π an ) + O(1).
OPENNESS CONJECTURE
21
Here the second estimate follows from (3.4). Let η be a nonvanishing holomorphic
volume form near x and write (π an )∗ η = Jπ an · ηu near z, where ηu := du1 ∧ · · · ∧
dun . We then have
log |Jπ an | =
m
X
(Ai − 1) log |ui | + O(1)
(3.19)
i=1
near z, where Ai ∈ Z>0 . Further, we have
A(v) =
m
X
α i Ai .
(3.20)
i=1
As k → ∞, we then have
an
log |Jπ | ∼ −k(A(v) −
m
X
αi ) + O(1)
(3.21)
i=1
on Ωk . Moreover, the volume of Ωk can be estimated by
Z
m
X
√
αi + O(1)
log
( −1)n ηu ∧ ηu = −2k
Ωk
(3.22)
i=1
as k → ∞.
Note that if K is large enough, then π an is biholomorphic on Ωk and π an (Ωk )
is contained in B for all k ≥ 0. Thus we get
Z
+∞>
2 −2pϕ
|f | e
∞
X
√
( −1)n η ∧ η ≥
B
k=0
=
∞ Z
X
k=0
&
∞
X
Z
√
|f |2 e−2pϕ ( −1)n η ∧ η
π an (Ωk )
√
an
|f ◦ π an |2 e−2pϕ◦π |Jπ an |2 ( −1)n ηu ∧ ηu
Ωk
exp −2kv(f ) + 2kpτ (ϕ ◦ π an ) − k A(v) −
m
X
!! Z
αi
i=1
k=0
&
∞
X
√
( −1)n ηu ∧ ηu
Ωk
exp (−2k(v(f ) − pτ (ϕ ◦ π an ) + A(v))) ,
k=0
which yields (3.16) (with strict inequality).
4. Proof of the main results
We are now ready to prove Theorem D from the introduction and its variant
Theorem D’ from §3.1. Consider a germ of a psh function ϕ at a point x in a
complex manifold of dimension n and let q ⊆ Ox be a nonzero ideal such that
cqx (ϕ) < ∞. Let U be a small open neighborhood of x such that ϕ and q are
defined on an open neighborhood of U . Also fix a nonvanishing holomorphic
volume form η in a neighborhood
of U and compute all volumes with respect to
√
the positive measure ( −1)n η ∧ η.
22
MATTIAS JONSSON AND MIRCEA MUSTAŢĂ
4.1. Analytic reduction. As in §3.4 set
Vµ := {y ∈ U | cqy (ϕ) ≤ µ}
for µ ≥ λ := cqx (ϕ) and
V := Vλ = {y ∈ U | cqy (ϕ) ≤ λ}.
Note that x ∈ V . By the lower semicontinuity of y 7→ cqy (see Lemma 3.9), Vµ is
a proper analytic subset of U for any µ ≥ λ and V is the decreasing intersection
of Vµ for all µ > λ. Using the fact that ϕ and q are defined in a neighborhood of
U we deduce the existence of µ > λ such that V = Vµ .
Lemma 4.1. In order to prove Theorem D’, it suffices to assume that V is smooth
at x and that ϕ ≥ p log |IV | + O(1) near x for some integer p ≥ 0.
Proof. We can replace x by a Zariski general point in V . Indeed, we have cqy (ϕ) =
λ for a Zariski general point y ∈ V , and if the estimate
Vol{y 0 ∈ Uy | λϕ(y 0 ) − log |q| < log r} & r2
(4.1)
holds for every neighborhood Uy of any point y in a dense subset of V , then it
also holds for every neighborhood of x. In particular, we may assume that V is
smooth at x.
Pick generators of IV · Ox . After shrinking U , we may assume these generators
are defined on U and that the associated psh function log |IV |, defined as in (3.1),
is negative on U . For an integer p > 0 define
ϕ̃ := max{ϕ, p log |IV |}.
cqx (ϕ̃)
cqx (ϕ)
We claim that
=
for p 0. This will allow us to replace ϕ by ϕ̃ and
complete the proof. Indeed, we have ϕ ≤ ϕ̃ so if the estimate (3.2) holds with ϕ
replaced by ϕ̃, then it must also hold for ϕ.
To prove the claim, pick µ > λ such that Vµ = V . Consider the colon ideal
aµ = (J (µϕ) : q) on U . This is a coherent ideal sheaf on U whose stalk at y ∈ U
is given by
aµ · Oy := {h ∈ Oy | |h|2 |q|2 e−2µϕ is locally integrable at y}.
The fact that Vµ = V implies that the zero locus of aµ is equal to V . Hence the
Nullstellensatz implies that there exists N ≥ 1 such that IVN ⊆ aµ . Now pick the
integer p > 0 large enough so that
p>
N
.
µ−λ
Pick any λ0 ∈ (λ, µ) such that p > N/(µ − λ0 ). For 0 < r 1 define Borel
subsets Ur , Ũr and Ur0 of U by
Ur := {λ0 ϕ − log |q| < log r}
Ũr := {λ0 ϕ̃ − log |q| < log r}
Ur0 := {µϕ − log |q| − N log |IV | < log r}.
OPENNESS CONJECTURE
23
It follows from the choice of p that Ur ⊆ Ũr ∪ Ur0 . The inclusion IVN ⊆ aµ
guarantees that, after possibly shrinking U , we have
Z ∞
dr
Vol(Ur0 ) 3 < ∞.
(4.2)
r
0
Indeed, if we set F := exp(N log |IV | + log |q| − µϕ), then, after shrinking U ,
Z ∞
Z ∞
Z
dr
2
Vol(Ur0 ) 3 ,
Vol(U ∩ {F > t})t dt = 2
F =2
∞>
r
0
0
U
where the last equality follows from setting t = 1/r.
On the other hand, the fact that λ0 > λ = cqx (ϕ) implies that
Z ∞
dr
Vol(Ur ) 3 = ∞.
r
0
The inclusion Ur ⊆ Ũr ∪ Ur0 then gives
Z ∞
dr
Vol(Ũr ) 3 = ∞,
r
0
so that cqx (ϕ̃) ≤ λ0 . Letting λ0 → λ we get cqx (ϕ̃) ≤ λ. But ϕ̃ ≥ ϕ, so we must
have cqx (ϕ̃) ≥ cqx (ϕ) = λ and hence cqx (ϕ̃) = cqx (ϕ), establishing the claim and
completing the proof of the lemma.
Remark 4.2. The proof of Lemma 4.1 can be viewed as an analytic analogue of
the arguments in [JM12, §7.4].
4.2. End of proof. Let x and V be as above. In particular, V is smooth at x.
Let Ox,V be the localization of Ox at the ideal IV · Ox . Then Ox,V is a regular
local ring with maximal ideal mx,V = IV · Ox,V . Its dimension is equal to the
codimension of V and hence bounded by n. It is also an excellent ring. Indeed,
Ox is isomorphic to the ring of convergent power series in n variables, hence
excellent, see [Mat80, Theorem 102], and excellence is preserved by localization.
Set bj = J (jϕ) for j ≥ 0. Then b• · Ox,V is a subadditive system of ideals
having controlled growth, see Proposition 3.12. By Lemma 4.1 we may assume
ϕ ≥ p log |IV | + O(1); hence Lemma 3.11 implies bj · Ox,V ⊇ mpj
x,V for all j ≥ 1.
From the definition of V = Vλ and from Proposition 3.12 we see that
lctqy (b• ) = cqy (ϕ) = λ
for every y ∈ V . Lemma 2.7 then shows that
lctq·Ox,V (b• · Ox,V ) = λ.
Recall that we assume that Conjecture C’ holds in rings of dimension at most
n. Proposition 2.3 implies that Conjecture E’ also holds in rings of dimension at
most n. We can thus find a quasimonomial valuation v on Ox,V such that
A(v) + v(q · Ox,V )
= λ.
v(b• · Ox,V )
(4.3)
Consider a projective birational morphism π : X → Spec Ox,V such that π
defines a log resolution of q and such that X is adapted to v. Thus v is given by
data Z, D, α as in §2.1.1.
24
MATTIAS JONSSON AND MIRCEA MUSTAŢĂ
We analytify π following §2.2.1 and §3.3. Let τ denote the Kiselman number
with respect to the data Z an , Dan , α, see §3.2. We know from Proposition 3.12 (iii)
and Remark 3.13 that
τ (ϕ ◦ π an ) = v(b• · Ox,V ).
(4.4)
λτ (ϕ ◦ π an ) = A(v) + v(q).
(4.5)
Thus (4.3) yields
We use the notation from §3.3. Pick a Zariski general point z ∈ Z an . Then
log |q| ◦ π an =
m
X
ci log |ui | + O(1)
i=1
near z, where ci = ordDi (q) ≥ 0; see the end of §2.2.1. We also have
m
X
log |Jπ | =
(Ai − 1) log |ui | + O(1),
an
i=1
where Ai ∈ Z>0 , see (3.19). Finally, recall from (3.4) that
1
log |ui | + O(1).
1≤i≤m αi
ϕ ◦ π an ≤ τ (ϕ ◦ π an ) max
Fix K 1 and define disjoint open subsets Ωk , k ≥ 0, of Ω as in (3.18). As
k → ∞, we then have the following estimates on Ωk :
ϕ ◦ π an ≤ −kτ (ϕ ◦ π an ) + O(1),
log |q| ◦ π
an
≥ −k
m
X
ci αi + O(1) = −kv(q) + O(1).
i=1
Using (4.5) these estimates imply that
λϕ − log |q| ≤ −k(λτ (ϕ ◦ π an ) − v(q)) + O(1) = −kA(v) + O(1)
(4.6)
on the open set π an (Ωk ) ⊂ U . For 1 ≤ i ≤ m set
Ωk,i := {−(K + k) <
log |ui |
< 1 − (K + k)}.
αi
Then we can estimate the volume of π an (Ωk ) as follows:
Z
Z
√
√
Vol π an (Ωk ) = ( −1)n
η ∧ η = ( −1)n
|Jπ an |2 ηu ∧ η u
π an (Ωk )
&
m
Y
√
i=1
Z
−1
Ωk,i
|ui |2Ai −2 dui ∧ dūi &
Ωk
m
Y
exp(−k(2Ai αi )) = exp(−2kA(v)).
i=1
This estimate together with (4.6) concludes the proof of Theorem D’. By choosing
q = OU throughout all the arguments (see also Remark 2.4), we also obtain a
proof of Theorem D.
OPENNESS CONJECTURE
25
References
[Ber06]
B. Berndtsson. Subharmonicity properties of the Bergman kernel and some other
functions associated to pseudoconvex domains. Ann. Inst. Fourier 56 (2006), 1633–
1662. 4
[BFJ08] S. Boucksom, C. Favre and M. Jonsson. Valuations and plurisubharmonic singularities. Publ. Res. Inst. Math. Sci. 44 (2008), 449–494. 4, 19
[Dem]
J.-P. Demailly. Complex analytic and algebraic geometry. Book available at
www-fourier.ujf-grenoble.fr/∼demailly. 13
[Dem87] J.-P. Demailly. Nombres de Lelong généralisés, théorèmes d’intégralité et d’analyticité.
Acta Math. 157 (1987), 153–169. 1, 14, 16
[Dem92] J.-P. Demailly. Regularization of closed positive currents and intersection theory. J.
Alg. Geom. 1 (1992), 361–409. 3, 19
[Dem93] J.-P. Demailly. A numerical criterion for very ample line bundles. J. Differential
Geom. 37 (1993), 323–374. 3, 19
[DEL00] J.-P. Demailly, L. Ein and R. Lazarsfeld. A subadditivity property of multiplier ideals.
Michigan Math. J. 48 (2000), 137–156. 3, 19
[DK01]
J.-P. Demailly and J. Kollár. Semicontinuity of complex singularity exponents and
Kähler-Einstein metrics on Fano orbifolds. Ann. Sci. École Norm. Sup. (4) 34 (2001),
525–556. 1, 2, 13, 14, 18, 19, 20
[ELS03] L. Ein, R. Lazarsfeld, and K. E. Smith, Uniform approximation of Abhyankar valuations in smooth function fields, Amer. J. Math. 125 (2003), 409–440. 5
[ELSV04] L. Ein, R. Lazarsfeld, K. E. Smith and D. Varolin. Jumping coefficients of multiplier
ideals. Duke Math. J. 123 (2004), 469–506. 3, 6, 14
[FJ04]
C. Favre and M. Jonsson. The valuative tree. Lecture Notes in Mathematics 1853.
Springer-Verlag, Berlin, 2004. 4
[FJ05a] C. Favre and M. Jonsson. Valuative analysis of planar plurisubharmonic functions.
Invent. Math. 162 (2005), 271–311. 4
[FJ05b] C. Favre and M. Jonsson. Valuations and multiplier ideals. J. Amer. Math. Soc. 18
(2005), 655–684. 2, 4, 8
[Gue10] H. Guenancia. Toric plurisubharmonic functions and analytic adjoint ideal sheaves.
arXiv:1011.3162. 4
[Hor94]
L. Hörmander. Notions of convexity. Progress in Mathematics, 127. Birkhäuser,
Boston, MA, 1994. 13
[Hu12a] Z. Hu. Valuative multiplier ideals. Preprint. 8
[Hu12b] Z. Hu. Valuations and log canonical thresholds. Preprint. 8
[Jon12]
M. Jonsson. Dynamics on Berkovich spaces in low dimensions. arXiv:1201.1944.
To appear in Berkovich spaces and applications, Séminaires et Congrès, Société
Mathématique de France. 4
[JM12]
M. Jonsson and M. Mustaţă. Valuations and asymptotic invariants for sequences of
ideals. Ann. Inst. Fourier 62 (2012), 2145–2209. 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 23
[Kis87]
C.-O. Kiselman. Un nombre de Lelong raffiné. In Séminaire d’analyse complexe et
géométrie 1985-1987. Faculté des sciences de Tunis et Faculté des Sciences et Techniques de Monastir, 1987, pp. 61–70. 1, 4, 14, 16
[Kis94]
C. O. Kiselman. Attenuating the singularities of plurisubharmonic functions. Ann.
Polon. Math. 60 (1994), 173–197. 1, 4, 14, 15, 16
[Lag10]
A. Lagerberg. A new generalization of the Lelong number. arXiv:1001.3562. 4
[Laz]
R. Lazarsfeld. Positivity in algebraic geometry II. Ergebnisse der Mathematik und
ihrer Grenzgebiete, 3. Folge, Vol. 49, Springer-Verlag, Berlin, 2004. 6
[Lel69]
P. Lelong. Plurisubharmonic functions and positive differential forms. Gordon and
Breach, New York, and Dunod, Paris, 1969. 1, 4, 16
[Mat80] H. Matsumura. Commutative algebra. Mathematics Lecture Note Series, 56. Benjamin/Cummings. Reading, Mass., 1980. 3, 11, 23
26
MATTIAS JONSSON AND MIRCEA MUSTAŢĂ
[Mus02]
[Nad89]
[Nad90]
[Ras06]
[Siu74]
[Sko72]
M. Mustaţă. On multiplicities of graded sequences of ideals. J. Algebra 256 (2002),
229–249. 6
A. M. Nadel. Multiplier ideal sheaves and existence of Kähler-Einstein metrics of
positive scalar curvature. Proc. Nat. Acad. Sci. USA 86 (1989), 7299–7300. 18
A. M. Nadel. Multiplier ideal sheaves and Kähler-Einstein metrics of positive scalar
curvature. Ann. of Math. 132 (1990), 549–596. 18
A. Rashkovskii. Relative types and extremal problems for plurisubharmonic functions.
Int. Math. Res. Not. 2006, Art. ID 76283. 4
Y.-T. Siu. Analyticity of sets associated to Lelong numbers and the extension of
positive closed currents. Inventiones. Math. 27 (1974), 53–156. 1
H. Skoda. Sous-ensembles analytiques d’ordre fini ou infini dans Cn . Bull. Soc. Math.
France 100 (1972), 353–408. 1
Dept of Mathematics, University of Michigan, Ann Arbor, MI 48109-1043, USA
E-mail address: [email protected], [email protected]
| 0math.AC
|
Presentations for cusped arithmetic hyperbolic lattices
Alice Mark, Julien Paupert
arXiv:1709.06691v2 [math.GR] 31 Oct 2017
April 6, 2018
Abstract
We present a general method to compute a presentation for any cusped hyperbolic lattice Γ, applying a
classical result of Macbeath to a suitable Γ-invariant horoball cover of the corresponding symmetric space.
As applications we compute presentations for the Picard modular groups PU(2, 1, Od ) for d = 1, 3, 7 and the
quaternionic lattice PU(2, 1, H) with entries in the Hurwitz integer ring H.
1
Introduction
Discrete subgroups and lattices in semisimple Lie groups form a rich and well-studied class of finitely generated groups acting on non-positively curved metric spaces. The case of real rank one, where the associated
symmetric space is negatively curved, is of special interest. There are essentially two main families of constructions of such lattices, arithmetic on one hand and geometric on the other. Arithmetic lattices are roughly
speaking obtained by taking matrices with entries lying in the integer ring of some number field; the general
definition is more complicated and we will not give it here, as the arithmetic lattices that we consider in this paper are of this simplest type. By Margulis’ celebrated superrigidity and arithmeticity theorems, all (irreducible)
lattices in G are of this arithmetic type when G is a semisimple Lie group of real rank at least 2.
The other family involves geometric constructions such as polyhedra, reflections or other types of involutions
or other finite-order isometries. A prototype of this type of construction is given by Coxeter groups in the
constant curvature geometries E n , S n and H n , which are generated by reflections across hyperplanes. These
groups are classical and were classified by Coxeter in the spaces E n and S n , whereas their hyperbolic counterparts
(studied by Vinberg and others) are still not completely understood. However by construction these groups
come equipped with data including a presentation (as an abtract Coxeter group) and a fundamental domain for
their action on the symmetric space.
Arithmetic lattices are given by a global description and their global structure is in some sense well understood by work of Siegel, Borel, Tits, Prasad and others. However concrete information such as a presentation
and a fundamental domain are not readily accessible from the arithmetic construction. One can obtain geometric information such as volume by Prasad’s celebrated volume formula ([P]) but computing the constants
appearing in this formula usually involves some non-trivial work (see for example [Be] and [Sto]).
Very few presentations of arithmetic lattices, and of lattices in general, are known. Presentations can
provide useful geometric and algebraic information about groups, such as explicit index of torsion-free subgroups
(effective Selberg lemma, as used for example in [Sto]), cohomology of the group Γ or quotient space X/Γ, see
for instance [Y] (for the Picard modular groups with d = 1, 3) and of course representations of Γ, for instance
if one is interested in deformations of Γ into a larger Lie group.
Presentations for SL(n, Z) with n > 3 were given by Steinberg ([Ste], following Magnus); the case of SL(2, Z)
is classical and possibly dates to Gauss; see also Siegel [Si]. In rank one, Swan
√ gave in [Sw] presentations for
the Bianchi groups PGL(2, Od ) (where Od denotes the ring of integers of Q[i d] for d a positive square-free
integer), following Bianchi’s original construction in [Bi]. These act as isometries of (real) hyperbolic 3-space,
as they are lattices in PGL(2, C) ' Isom+ (H3R ).
Presentations for the related Picard modular groups PU(2, 1, Od ) were found only recently in the simplest
cases of d = 3 ([FP]) and d = 1 ([FFP]). One of the reasons for this is that the associated symmetric space,
complex hyperbolic 2-space H2C , is more complicated and in particular has non-constant (pinched) negative
curvature. A particular feature of such spaces, the absence of totally geodesic real hypersurfaces, makes constructions of fundamental domains difficult as there are no obvious walls to use to bound such domains. The
1
presentations obtained for d = 1, 3 were in fact obtained by constructing fundamental domains and using the
Poincaré polyhedron theorem. This approach seems to become too complicated when considering more complicated groups, such as Picard modular groups with higher values of d, and no further such constructions
have appeared. Using a similar strategy, Zhao gave in [Zh] generating sets for the Picard modular groups with
d = 1, 2, 3, 7, 11 but he does not go as far as obtaining a presentation, finding a set whose translates covers the
space but without control over intersections and cycles. (We will in fact use a covering argument closely related
to the one he uses to cover a fundamental prism on the ideal boundary by isometric spheres, see Lemma 13).
In this paper we present a method for obtaining presentations for cusped hyperbolic lattices, i.e. noncocompact lattices in semisimple Lie groups of real rank one, based on a classical result of Macbeath (Theorem 1
below) which gives a presentation for a group Γ acting by homeomorphisms on a topological space X, given
an open subset V whose Γ-translates cover X. We apply this by finding a suitable horoball V based at a cusp
point of Γ whose Γ-translates cover X, then analyzing the triple intersections and associated cyles to obtain a
presentation for Γ. The main tools for this analysis come from the additional arithmetic structure that we get by
assuming that Γ is in fact an integral lattice in the sense that it is contained in GL(n + 1, OE ) for some number
field E (or finitely generated division algebra over Q). The crucial such tool that we use is the notion of level
between two E-rational boundary points in ∂∞ X (see Definition 1) which gives a notion of distance between such
points using only algebraic data. More importantly for us, levels measure the relative sizes of horospheres based
at the correpsonding boundary points, which allows us to control whether or not such horospheres intersect at
a given height (see Lemma 4).
As applications of the method we compute presentations for the Picard modular groups PU(2, 1, Od ) with
d = 3, 1, 7, given in (12), (13) and (14). We expect to treat the cases d = 2, 11 with the same method but
they are computationally more intensive and will be treated elsewhere. We also compute a presentation (15)
for the quaternion hyperbolic lattice which we call the Hurwitz modular group PU(2, 1, H), where H is the ring
] ⊂ H. This is a lattice in PU(2, 1, H) (sometimes denoted PSp(2, 1)),
of Hurwitz integers H = Z[i, j, k, 1+i+j+k
2
acting on the 8-dimensional symmetric space H2H . As far as we know this is the first presentation ever found
for a higher-dimensional quaternion hyperbolic space. (In dimension 1, H1H ' H4R and such groups have been
studied e.g. in [DVV], see also [A], [W] and [Ph]).
The paper is organized as follows. In Section 2 we discuss generalities about horoball coverings of hyperbolic
spaces, levels for cusp points of integral lattices, and outline how we apply Macbeath’s theorem in this context.
In Section 3 we discuss horosphere intersections in more detail, in particular the quantitative relation between
levels and heights of horospheres for integral lattices. In Sections 4 and 5 we apply this method to compute
presentations for the Picard and Hurwitz modular groups respectively.
We would like to thank Daniel Allcock for suggesting this method and for many helpful comments, and
Matthew Stover and Daniel Allcock for pointing out a mistake in an earlier version of the paper.
2
2.1
Horoball coverings and lattice presentations
Adapted horoball coverings and covering complex
Let X be a negatively curved symmetric space, i.e. a hyperbolic space HnK , with K = R, C, H or O (and n > 2
if K = R, n = 2 if K = O). We refer the reader to [CG] for general properties of these spaces and their isometry
groups. In particular isometries of such spaces are roughly classified into the following 3 types: elliptic (having
a fixed point in X), parabolic (having no fixed point in X and exactly one on ∂∞ X) or loxodromic (having no
fixed point in X and exactly two on ∂∞ X).
Let Γ be a lattice in Isom(X); the well-known Godement compactness criterion states that Γ contains
parabolic isometries if and only if it is non-cocompact, which we now assume. A cusp point of Γ is a point of
∂∞ X fixed by a parabolic element of Γ; a cusp group of Γ is a subgroup of the form StabΓ (p) where p ∈ ∂∞ X
is a cusp point of Γ.
Assume that we are given a Γ-invariant covering of X by (open) horoballs (see Definition 3), i.e. a collection
B of horoballs such that:
γB ∈ B for all γ ∈ Γ and B ∈ B
S
B∈B B = X
2
We will moreover assume that each horoball B ∈ B is based at a cusp point of Γ, and that each cusp point
of Γ is the basepoint of a unique horoball in B (giving a bijection between cusp points of Γ and horoballs in
B); we will call such a covering B a Γ-adapted horoball covering. Since the lattice Γ has only finitely many cusp
points modulo the action of Γ, it follows that such a horoball covering is a finite union of Γ-orbits of horoballs.
Given a Γ-adapted horoball covering B, the covering complex C(B) associated to B is the simplicial 2-complex
with vertex set B, with an edge connecting each pair of vertices B1 and B2 such that B1 ∩ B2 6= ∅, and a triangle
for each triple of vertices B1 , B2 , B3 such that B1 ∩ B2 ∩ B3 6= ∅. This the 2-skeleton of a simplicial complex
sometimes called the nerve of the covering. By the above remark the quotient of the covering complex by the
action of Γ is a finite simplicial 2-complex.
We will use the following classical result of Macbeath ([M]):
Theorem 1 ([M]) Let Γ be a group acting by homeomorphisms on a topological space X. Let V be an open
subset of X whose Γ-translates cover X.
(1) If X is connected then the set E(V ) = {γ ∈ Γ | V ∩ γV 6= ∅} generates Γ.
(2) If moreover X is simply-connected and V path-connected, then Γ admits a presentation with generating set
E(V ) and relations γ · γ 0 = γγ 0 for all γ, γ 0 ∈ E(V ) such that V ∩ γV ∩ γγ 0 V 6= ∅.
Now if as above Γ is a lattice in Isom(X) and B is a Γ-adapted horoball covering of X, we may as remarked above write B as a finite union of Γ-orbits of horoballs B1 , ..., Bk (say, minimally). One can then apply
Macbeath’s theorem with V = B1 ∪ ... ∪ Bk , after possibly enlarging each horoball Bi in order for this union
to be (path-)connected. For simplicity of exposition, we henceforth asume that Γ has a single cusp, so that the
Γ-adapted horoball covering consists of a single Γ-orbit of horoballs (this is the case in all examples considered
in this paper). In that case the process of obtaining a presentation fom the covering complex is closely related
to a complex of groups structure on the quotient of the covering complex, the only difference being that we
need to take into account non-trivial edge and face stabilizers.
2.2
Levels and proximal cusp complex
Recall that if X is a hyperbolic space HnK (with K = R, C, H or O) then X admits the following projective
model which we briefly recall.
Consider Kn,1 , the vector space Kn+1 endowed with a Hermitian form h· , ·i of signature (n, 1). (When K = H
or O we will use the
convention that scalars acton vectors on the right, whereas matrices act on vectors on the
left.) Let V − = Z ∈ Kn,1 |hZ, Zi < 0 , V 0 = Z ∈ Kn,1 |hZ, Zi = 0 and let π : Kn+1 − {0} −→ KPn denote
projectivization. One then defines HnK to be π(V − ) ⊂ KPn , endowed with the distance d (Bergman metric)
given by, for Z, W ∈ V − :
cosh2
d(π(Z), π(W ))
2
=
|hZ, W i|2
.
hZ, ZihW, W i
(1)
Note that the right-hand side is independent of the choice of lifts Z, W . Then Isom0 (X) = PU(n, 1, K), the
(projectivization of) the matrix group preserving the Hermitian form (see [CG]). Note that PU(n, 1, K) is
usually denoted PO(n, 1) when K = R, PU(n, 1) when K = C and PSp(n, 1) when K = H. The boundary at
infinity ∂∞ X is then identified with π(V 0 ) ⊂ KPn . We would like to measure distances between points of ∂∞ X
using the Hermitian form as in (1); one way to do this is to use integral lifts of vectors with rational coordinates
as follows.
We now assume that Γ is an integral lattice in the sense that it is contained in U(H, OE ) for some number
field E (or finite-degree division algebra over Q when K = H or O) with ring of integers OE , and Hermitian
n+1
form H = h· , ·i defined over E. We say that an integral vector P0 = (p1 , ..., pn+1 ) ∈ OE
is primitive if it has
n+1
−1
no integral submultiple in the following sense: if P0 λ ∈ OE for some λ ∈ OE then λ is a unit in OE .
If p is an E-rational point in KP n , i.e. the projective image of a vector P = (p1 , ..., pn+1 ) ∈ E n+1 , a primitive
n+1
integral lift of p is any lift P0 of p to OE
which is a primitive integral vector.
Lemma 1 If OE is a principal ideal domain then primitive integral lifts are unique up to multiplication by a
unit.
3
Lemma 2 (a) Any column-vector of a matrix A ∈ U(H, OE ) is a primitive integral vector. (b) If moreover E is
imaginary quadratic with OE a principal ideal domain and one of the standard basis vectors Bi is H-isotropic,
then for any H-isotropic primitive integral vector V and A ∈ U(H, OE ), AV is a primitive integral vector.
Proof. (a) Let A ∈ U(H, OE ) and V a column-vector of A. Then V is integral; assuming that it is not
primitive, there would exist a non-unit λ ∈ OE such that V λ−1 is also integral. But then the matrix A0 obtained
from A by replacing the column-vector V by V λ−1 would also be in GL(n + 1, OE ), with det A0 = det Aλ−1 , a
contradiction since the latter is not an integer, as det A is a unit and λ is not.
(b) Let V be an H-isotropic primitive integral vector and A ∈ U(H, OE ). If OE is a principal ideal domain
then PU(H, OE ) has a single cusp (see [Zi]), therefore there exists M ∈ U(H, OE ) mapping Bi to AV λ for some
λ ∈ E. Then as in (a) λ must be a unit, hence AV is a column-vector of M λ−1 ∈ U(H, OE ) and we conclude
by (a).
Definition 1 Given two E-rational points p, q ∈ ∂∞ X, the level between p and q, denoted lev(p, q), is |hP0 , Q0 i|2
for any two primitive integral lifts P0 , Q0 of p, q respectively. When we are given a preferred E-rational point
∞ ∈ ∂∞ X, the depth of an E-rational point p ∈ ∂∞ X is the level between p and ∞.
By Lemma 1 this is well-defined when OE is a principal ideal domain. The proximal cusp complex of level
n, denoted Cn (Γ), is the complex whose vertices are cusp points of Γ, with an edge connecting 2 vertices p, q
whenever lev(p, q) 6 n, and a triangle for each triple of distinct edges.
Levels give a convenient way to distinguish orbits of edges and triangles in the covering complex, by the
following observation which follows from Lemmas 1 and 2:
Lemma 3 If OE is a principal ideal domain, for any two E-rational points p, q ∈ ∂∞ X and γ ∈ U(H, OE ),
lev(γp, γq) = lev(p, q).
More importantly, levels allow us to find the optimal height u of a horosphere Hu = ∂Bu based at a preferred
E-rational point ∞ ∈ ∂∞ X such that the orbit ΓBu covers X. This relies on the following result, which follows
from Corollary 4.6 of [KP]:
Lemma 4 There exists a decreasing function u : N −→ R such that, for any E-rational point p ∈ ∂∞ X with
depth n, and any (integral) Ap ∈ Γ satisfying Ap (∞) = p, the set Hu ∩ Ap (Hu ) is empty if and only if u > u(n).
In fact we will see in Corollary 1 below that the function u is given by u(n) =
Definition 2 The covering depth of Γ is the unique n ∈ N such that
the maximal height such that ΓBucov covers X.
2.3
√2
n+1
√2 .
n
< ucov 6
√2 ,
n
where ucov denotes
Reduction modulo the vertex stabilizer Γ∞
We choose a preferred cusp point ∞ ∈ ∂∞ X of Γ (in general we will take ∞ = π([1, 0, ..., 0]T ) in the Siegel
model, see section 3), and consider the cusp stabilizer Γ∞ = StabΓ (∞). Since Γ is a lattice, it is well known
that Γ∞ acts cocompactly on all horospheres based at ∞. Let n denote the covering depth of Γ and ucov the
corresponding covering height, so that the Γ-translates of the horoball Bu cover X, and let D∞ ⊂ Hu be a
compact fundamental domain for the action of Γ∞ on Hu ' ∂∞ X \ {∞}. In practice we will choose D∞ to be
an affinely convex polytope in Heisenberg coordinates (see section 3).
Assume that we are given a finite presentation Γ∞ = hS∞ |R∞ i. Then we may reduce the procedure in
Macbeath’s theorem to finitely many additional generators and relations as follows. Let {p1 , ..., pk } denote the
E-rational points with depth at most n in D∞ , and assume for simplicity that they are ordered in such a way
that the first r of them form a system of representatives under the action of Γ∞ . Assume moreover that we
have found for each i = 1, ..., r an element Ai ∈ Γ such that Ai (∞) = pi (this is possible in principle since Γ is
assumed to have a single cusp).
Generators: The group Γ is generated by {S∞ , A1 , ..., Ar }. This follows easily from part (1) of Macbeath’s
theorem and Lemma 4, as any E-rational point of ∂∞ X with depth at most n is in the Γ∞ -orbit of one of
4
p1 , ..., pr . Note that with the notation from the Theorem, we are using the open set V = Bu = B to cover X,
1
2
1
2
and E(B) = {γ ∈ Γ | B ∩ γB 6= ∅} = Γ∞ {A1 , ..., Ar }Γ∞ = {γ∞
Ai γ ∞
| γ∞
, γ∞
∈ Γ∞ , i = 1, ..., r}. Indeed, by
Lemma 4, B ∩ γB 6= ∅ if and only if γ∞ is either ∞ or an E-rational point of depth at most n, which is a
Γ∞ -translate of one of p1 , ..., pr .
Relations: We now rephrase part (2) of Macbeath’s theorem in this context. Let γ, γ 0 ∈ E(B) satisfy
B ∩ γB ∩ γγ 0 B 6= ∅, and first assume that γ∞ =
6 ∞ and γγ 0 ∞ =
6 ∞. After conjugating by an element of Γ∞ we
0
1
2
0
3
4
1
4
may asume that γ = Ai , γ = γ∞ Aj γ∞ , γγ = γ∞
Ak γ ∞
for some i, j, k ∈ {1, ..., r} and γ∞
, ..., γ∞
∈ Γ∞ . The
0
0
1
2
3
4
corresponding relation γγ = γ · γ is then: Ai γ∞ Aj γ∞ = γ∞ Ak γ∞ . Taking the image of ∞ under both sides of
1
3
this relation gives: Ai (γ∞
pj ) = γ∞
pk . In practice this is how we will detect the relations, finding which points
of depth at most n are sent to points of depth at most n by the generators Ai . One then recovers the relation
1
3
1
3
as follows. For each triple (i, j, k) for which there exist γ∞
, γ∞
∈ Γ∞ such that Ai (γ∞
p j ) = γ∞
pk , we obtain a
−1 3 −1
1
relation Ri,j,k by identifying the element Ak (γ∞ ) Ai γ∞ Aj ∈ Γ∞ as a word in the generators S∞ .
Now assume that one of γ∞, γγ 0 ∞ is ∞ but not both (as the relations in Γ∞ have already been considered).
The corresponding relation can be obtained as above, using the point p∞ = ∞ with correpsonding group element
A∞ = Id.
Summarizing the above discussion gives:
Lemma 5 With the above notation, Γ admits the presentation Γ = hS∞ , A1 , ..., Ar |R∞ , Ri,j,k i.
2.4
The method in practice
We now give an outline of the method we use to apply Macbeath’s theorem:
(1) Find an explicit (affine) fundamental domain D∞ ⊂ ∂∞ X ' Hu for the action of Γ∞ = StabΓ (∞), and a
presentation Γ∞ = hS∞ |R∞ i.
(2) Find the covering depth n of Γ. Consider the corresponding covering complex C(ΓBucov ) ' Cn (Γ).
(3) Find all E-rational points {p1 , ..., pk } in D∞ with depth at most n (and denote p∞ = ∞).
(4) For each of the r Γ∞ -orbit of points pi , find an explicit Ai ∈ Γ such that Ai (∞) = pi .
1
3
1
3
(5) For each triple (i, j, k) for which there exist γ∞
, γ∞
∈ Γ∞ such that Ai (γ∞
pj ) = γ∞
pk , we obtain a
−1 3 −1
1
relation Ri,j,k by identifying the element Ak (γ∞ ) Ai γ∞ Aj ∈ Γ∞ as a word in the generators S∞ .
Then by Macbeath’s theorem and Lemma 5, Γ = hS∞ , A1 , ..., Ar |R∞ , Ri,j,k i.
In order to avoid tedious repetition of similar arguments or straightforward computations, we will only give
one detailed proof for each step for the Picard modular groups, but we will give detailed arguments for the
quaternionic lattice when they are substantially different. We will usually choose the most difficult case, or the
most instructive if the various cases are of similar difficulty. Steps (1) and (5) are routine and we just state the
results (except step (1) for the quaternionic lattice, which we cover in detail in Lemmas 15 and 16). We give a
detailed argument and proof for step (2) for the Picard modular group Γ(7) in Lemma 13, and for step (3) for
the same group and depth 2 in Lemma 14.
There seems to be no general strategy for step (4); we find all relevant matrices in this paper by combining
two tricks, which luckily cover all the cases we need. The first trick is to use stabilizers of vertical complex line
in the Heisenberg group: it is easy to find such a matrix when it stabilizes the vertical axis, then we carry over
to other vertical lines by conjugating by a horizontal translation. The second trick is to hit all relevant integral
points by the group elements that we already know, and see if we land in the Γ∞ -orbit of the point we are
trying to reach.
2.5
A toy example: Γ = PSL(2, Z)
In order to illustrate the method, we now go through its steps for Γ = PSL(2, Z) exactly as we will for the
more complicated Picard and Hurwitz modular groups. The results are either well-known or elementary and
we state them without proof.
5
Presentation and fundamental domain for the cusp stablilizer Γ∞ : The cusp stabilizer Γ∞ has
presentation hT i; a fundamental domain for its action on ∂H2R \ {∞} ' R is D∞ = [0, 1]. Concretely we use the
following generator for Γ∞ :
1 1
T =
0 1
Covering depth and Q-rational points in D∞ : The covering depth of PSL(2, Z) is 1. The Q-rational
points of depth 1 in D∞ are 0 and 1, both in the same Γ∞ -orbit. An integral lift of 0 is p0 = [0, 1]T ; we denote
p1 = T p0 .
Generators: The following element A0 ∈ Γ maps the point ∞ = [1, 0]T to p0 :
0 −1
A0 = I0 =
1 0
Relations: We list in Table 1 the relations obtained for PSL(2, Z) by applying generators to points of depth
at most 1 as described in part (5) of section 2.4. The second relation is obtained by following the corresponding
cycle of points, which gives I0 T I0 T I0 ∈ Γ∞ . The latter element is computed to be T −1 , giving the relation
(I0 T )3 = Id.
Image of vertex
Cycle of points
I0
I0 p0 = ∞
I0 p1 = T −1 p0
Relation
I0
I02 = Id
∞ −→ p0 −→ ∞
(T I0 )
I
−1
−1
(T I0 )
0
∞ −→
p0 −−−−−→ p1 −−−−−→ ∞
(I0 T )3 = Id
Table 1: Action of generators on vertices for PSL(2, Z)
3
Horosphere intersections
Our main reference for this section is [KP]. We will use the Siegel model of hyperbolic space HnK (with
K = R, C, H), which is the projective model (as described in Section 2.2) associated to the Hermitian form on
Kn+1 given by hZ, W i = W ∗ JZ with:
0
0
1
J = 0 In−1 0
1
0
0
Then hyperbolic space HnK can be parametrized by Kn−1 × Im K × R+ as follows, denoting as before by π the
projectivization map: HnK = {π(ψ(ζ, v, u) | ζ ∈ Kn−1 , v ∈ Im K, u ∈ R+ )}, where:
(−|ζ|2 − u + v)/2
ζ
ψ(ζ, v, u) =
1
(2)
With this parametrization the boundary at infinity ∂∞ HnK corresponds to the one-point compactification:
π(ψ(ζ, v, 0) | ζ ∈ Kn−1 , v ∈ Im K ∪ {∞}
where ∞ = π((1, 0, ..., 0)T ). The coordinates (ζ, v, u) ∈ Kn−1 ×Im K×R+ are called the horospherical coordinates
of the point π(ψ(ζ, v, u) ∈ HnK .
Definition 3 For a fixed u0 ∈ R+ , the level set Hu0 = {π(ψ(ζ, v, u0 ) | ζ ∈ Kn−1 , v ∈ Im K} is called the
horosphere at height u based at ∞, and Bu0 = {π(ψ(ζ, v, u) | ζ ∈ Kn−1 , v ∈ Im K, u > u0 } is called the horoball
at height u based at ∞.
6
The punctured boundary ∂∞ HnK \ {∞} is then naturally identified to the generalized Heisenberg group
Heis(K, n), defined as the set Kn−1 × Im K equipped with the group law:
(ζ1 , v1 )(ζ2 , v2 ) = (ζ1 + ζ2 , v1 + v2 + 2Im (ζ1 · ζ2 ))
where · denotes the usual Euclidean dot-product on Kn−1 . This is the classical 3-dimensional Heisenberg group
when K = C and n = 2. The identification of ∂∞ HnK \ {∞} with Heis(K, n) is given by the simply-transitive
action of Heis(K, n) on ∂∞ HnK \ {∞}, where the element (ζ1 , v1 ) ∈ Heis(K, n) acts on the vector ψ(ζ2 , v2 , 0) by
left-multiplication by the following Heisenberg translation matrix in U(n, 1, K):
1 −ζ1∗ (−|ζ1 |2 + v1 )/2
ζ1
T(ζ1 ,v1 ) = 0 In−1
(3)
0
0
1
Given an element U ∈ U(n, K), the Heisenberg rotation by
1 0
RU = 0 U
0 0
U is given by the following matrix:
0
0
1
(4)
There is an additional class of isometries fixing ∞ when K = H, coming from the action of diagonal matrices
which is non-trivial in the non-commutative case. Recall that our convention is that matrices act on vectors
on the left, and scalars act on vectors on the right. Then, for any unit quaternion q ∈ H, the diagonal matrix
Cq = q Id acts by the isometry of hyperbolic space given by conjugating horospherical coordinates (the result
of multiplying the vector form (2) by q on the left, then normalizing by q −1 on the right):
Cq : (ζ, v, u) 7−→ (qζq −1 , qvq −1 , u)
(5)
HnH
For this reason, when K = H the relevant projectivization of U(n, 1, H) acting on
is PU(n, 1, H) =
U(n, 1, H)/{±Id} rather than U(n, 1, H)/U(1).
Heisenberg translations and rotations, as well as conjugation by unit quaternions, preserve the following
distance function on Heis(K, n), called the Cygan metric, defined for (ζ1 , v1 ), (ζ2 , v2 ) ∈ Heis(K, n) by:
dC ((ζ1 , v1 ), (ζ2 , v2 ))
=
|ζ1 − ζ2 |4 + v1 − v2 − 2Im (ζ1 · ζ2 )
2 1/4
(6)
1/2
= |2hψ(ζ1 , v1 , 0), ψ(ζ2 , v2 , 0)i|
(7)
This in fact the restriction to ∂∞ HnK \{∞} of an incomplete distance function on HnK \{∞} called the extended
Cygan metric (see [KP]), defined for (ζ1 , v1 , u1 ), (ζ2 , v2 , u2 ) ∈ Kn−1 × Im K × R>0 ' HnK \ {∞} by:
dXC ((ζ1 , v1 , u1 ), (ζ2 , v2 , u2 ))
=
|ζ1 − ζ2 |2 + |u1 − u2 |
2
+ v1 − v2 − 2Im (ζ1 · ζ2 )
1/2
= |2hψ(ζ1 , v1 , u1 ), ψ(ζ2 , v2 , u2 )i|
2 1/4
(8)
(9)
We define Cygan spheres, Cygan balls, extended Cygan spheres and extended Cygan balls in the usual way
relative to these distance functions.
When we apply Macbeath’s theorem we argue that the images under Γ of the horoball Bu based at ∞ at
a certain height u > 0 cover X, or equivalently cover the horosphere Hu = ∂Bu . The following result, which
follows from Proposition 4.3 of [KP], allows us to control the traces on Hu of these images only in terms of
Cygan spheres depending only on arithmetic data.
Lemma 6 p
Let A = (ai,j ) ∈ U(n, 1, K) such that A(∞) 6= ∞, S the extended Cygan sphere with center A−1 (∞)
and radius 2/|an,1 |, and Hu the horosphere based at ∞ at height u > 0. Then Hu ∩ A(Hu ) = Hu ∩ S.
Corollary 1 Let E be a number field such that OE is a principal ideal domain, p ∈ ∂∞ X an E-rational point
with depth n > 1 and Ap ∈ U(H, OE ) satisfying Ap (∞) = p. Then Hu ∩ A−1
p (Hu ) = Hu ∩ S, where S is the
4 1/4
−1
Cygan sphere centered at p with radius n
. In particular: Hu ∩ Ap (Hu ) = ∅ ⇐⇒ u > u(n) = √2n .
7
Proof. Since Ap (∞) = p and e1 = (1, 0, ..., 0)T is a lift of ∞, the first column vector of Ap is a lift P0 of p,
and since Ap ∈ U(H, OE ) it is an integral lift. In fact by Lemma 2 it is a primitive lift, therefore the depth of
p is |hP0 , e1 i|2 = |an,1 |2 , denoting as above Ap = (ai,j ), and the result follows from Lemma 6. The second part
of the statement follows by using this radius in the formula for the extended Cygan metric, Equation 8.
We will also use the following observation, which is Lemma 1 of [FFP], in our covering arguments:
Lemma 7 Extended Cygan balls are affinely convex in horospherical coordinates.
Finally, when considering the action of a discrete subgroup Γ∞ of Isom(∂∞ X) (relative to the Cygan metric)
it is convenient to consider its vertical and horizontal components defined as follows (see [FP] for the case
K = C and n = 2). The homomorphism Π : Heis(K, n) → Kn−1 given by projection to the first factor in the
decomposition Heis(K, n) ' Kn−1 o Im K induces a short exact sequence:
Π∗
1 −→ Isom(Im K) −→ Isom(Heis(K, n)) −−→ Isom(Kn−1 ) −→ 1,
(10)
where the isometries of Im K and Kn−1 are relative to the Euclidean metric. Denoting Γv∞ = Γ∞ ∩ Isom(Im K)
and Γh∞ = Π∗ (Γ∞ ) this gives the short exact sequence:
Π∗
1 −→ Γv∞ −→ Γ∞ −−→ Γh∞ −→ 1.
4
(11)
Picard modular groups
In this section we use the method described in Section 2.4 to compute the following
presentations for the
√
Picard modular groups Γ(d) = PU(2, 1, Od ) with d = 1, 3, 7. We will denote τ = 1+i2 d when d ≡ 3 (mod 4), so
that Od = Z[τ ].
*
PU(2, 1, O3 ) =
T1 , Tτ , R, I
PU(2, 1, O1 ) =
D
+
[[T1 , Tτ ], T1 ] , [[T1 , Tτ ], Tτ ] , [[T1 , Tτ ], R] ,
6
−1
−1
−1
R Tτ R = T1 , R T1 R = T1 Tτ , R ,
.
I 2 , [R, I], ([T1 , Tτ ]I)6 , T1 Tτ−1 [T1−1 , I]Tτ T1−1 = I[T1 , Tτ ]
T2 , Tτ , Tv , R, I
(12)
[Tτ , T2 ] = Tv4 , [Tv , T2 ], [Tv , Tτ ], [Tv , R], R4 , I 2 , [R, I],
RT2 R−1 = Tτ2 T2−1 Tv4 , RTτ R−1 = Tτ T2−1 Tv2 ,
[I, T2 ]2 , (ITv )3 = R, [I, Tτ ] = Tτ IR2 , (Tv IR−1 Tv2 I)2 ,
ITv−1 Tτ IRT2−1 Tv−1 = T2 Tτ−1 ITτ R2 Tv I,E
(13)
(ITv−1 Tτ IRT2−1 Tv−1 )2 = R−1 T2−1 Tτ Tv−3
PU(2, 1, O7 ) =
D
T1 , Tτ , Tv , R, I0 , I1
[Tτ , T1 ] = Tv , [Tv , T1 ], [Tv , Tτ ], [Tv , R], R2 , (RTτ )2 ,
(RT1 )2 = Tv , I02 , I12 , [R, I0 ], [R, I1 I0 T1−1 Tτ ]2 ,
[R, I1 I0 T1−1 Tτ ] = Tv I0 I1 Tτ T1−1 I1 I0 Tτ T1−2 Tv ,
[R, I1 I0 T1−1 Tτ ] = Tv T1−1 I0 T1 I0 Tτ−1 I1 RI0 Tv−1 ,
[I0 , Tv−1 Tτ T1 ] = T1 I0 I1 I0 T1−1 ,
−1
R[R, I1 I0 T1−1 Tτ ] = T1 I0 Tv T1−2 I0 TE
1 Tv R,
(14)
I1 = T12 Tτ RT12 I0 T1−1 I0 T1 I0
The action of Γ∞ (d) = StabΓ(d) (∞) on ∂H2C is well understood for all d, see [FP] for d = 3, [FFP] for d = 1
and Section 5.3 of [PW] for all other values (using unpublished notes of Falbel-Francsics-Parker). We will refer
to these papers for presentations and fundamental domains for Γ∞ (d) which we state in Lemmas 8, 10 and 12.
8
Figure 1: Covering the prism D∞ (3) by Cygan balls of depth 1
4.1
The Eisenstein-Picard modular group Γ(3) = PU(2, 1, O3 )
Presentation and fundamental domain for the cusp stabilizer Γ∞ (3):
Lemma 8
1. The cusp stabilizer Γ∞ (3) admits the following presentation:
Γ∞ (3) =
T1 , Tτ , R
[[T1 , Tτ ], T1 ] , [[T1 , Tτ ], Tτ ] , [[T1 , Tτ ], R] ,
R−1 Tτ R = T1 , R−1 T1 R = T1 Tτ−1 , R6
.
2. Let D∞ (3) ⊂√∂H2C be the
convex
√ hull of the points with horospherical coordinates (0, 0), (1, 0),
√ affine
τ +1
,
0),
(0,
2
,
2
( τ +1
3),
(1,
2
3),
(
3). Then D∞ (3) is a fundamental domain for Γ∞ (3) acting on
3
3
∂H2C \ {∞}.
Concretely, we use the following generators for Γ∞ (3) (recall that τ =
1 −1 τ 2
1 −τ̄
1 Tτ = T(τ,√3) = 0 1
T1 = T(1,√3) = 0 1
0 0
1
0 0
√
1+i 3
)
2
τ2
1
τ R= 0
1
0
0
τ
0
0
0
1
√
Covering depth and Q[i 3]-rational points in D∞ (3):
We denote B ((z, t), r) the open extended Cygan ball centered at p = (z, t) ∈ ∂∞ H2C with radius r (see
Equation 8 for the definition of the extended Cygan metric). Recall that u(n) = √2n is the height at which balls
of depth n appear, in the sense of Corollary 1.
Lemma 9 Let u = u(5) + ε = 0.895 and Hu the horosphere of height u based at ∞. Then the prism D∞ (3)
√ ×
{u} is covered by the intersections with Hu of the following extended Cygan balls of depth 1: B (0, 0), 2 ,
√ √
√ √
B (0, 2 3), 2 and B (1, 3), 2 .
We omit the proof, which is similar to the proof of Lemma 13 but much simpler; see Figure 4.1.
9
Note that in order to cover D∞ (3) × {u} we only need balls of depth 1, in particular none of depths 3 or
4 even though they are present at the height u = u(5) + ε which we consider. It is however necessary to pass
to this height, as we have observed experimentally
that at height u = u(4) + ε balls of depth at most 3 do not
√
cover D∞ (3) × {u} (there are no Q[i 3]-rational points of depth 2).
Corollary 2 The covering depth of Γ(3) is at most 4.
√
By inspection, we see that the Q[i 3]-rational points in D∞ (3) with depth at most 4 are, in horospherical
coordinates:
√
√
• Depth 1: (0, 0), (0, 2 3) and (1, 3), all in the same Γ∞ (3)-orbit;
√
√
√
√
• Depth 3: (0, 23 3), (1, 53 3) in one Γ∞ (3)-orbit, and (0, 43 3), (1, 13 3) in the other;
√
√
• Depth 4: (0, 3), (1, 0) and (1, 2 3), all in the same Γ∞ (3)-orbit.
Integral lifts of representatives of Γ∞ (3)-orbits of these points are:
√
−1
−2
0
i 3
0 p3,2 = √
0 p4 = 0
p0 = 0 p3,1 = √
1
i 3
2
i 3
Generators: The following elements
above (for α = 0; 3, 1; 3, 2; 4) :
0
A0 = I0 = 0
1
Aα ∈ Γ(3) map the point ∞ = [1, 0, 0]T to the corresponding pα as
0
−1
0
−1 0
1
0
1
0 A3,1 = A3 = √
0
i 3 0
√
−i 3
A4 = 0
−2
A3,2 = A−1
3
0
−1
0
√
i 3
0
2
−2
0
√
i 3
Relations: We list in Table 2 the relations obtained for Γ(3) by applying generators to points of depth at
most 4 as described in part (5) of section 2.4. By successively eliminating A4 then A3 we obtain presentation (12).
The details are straightforward and left to the reader.
4.2
The Gauss-Picard modular group Γ(1) = PU(2, 1, O1 )
Presentation and fundamental domain for the cusp stabilizer Γ∞ (1):
Lemma 10
1. The cusp stabilizer Γ∞ (1) admits the following presentation:
Γ∞ (1) =
T2 , Tτ , Tv , R
[Tτ , T2 ] = Tv4 , [Tv , T2 ], [Tv , Tτ ], [Tv , R], R4 ,
RT2 R−1 = Tτ2 T2−1 Tv4 , RTτ R−1 = Tτ T2−1 Tv2
.
2. Let D∞ (1) ⊂ ∂H2C be the affine convex hull of the points with horospherical coordinates (0, 0), (1, 0), (τ, 0),
(0, 2), (1, 2), (τ, 2). Then D∞ (1) is a fundamental domain for Γ∞ (1) acting on ∂H2C \ {∞}.
Concretely, we use the following generators for Γ∞ (1) (denoting τ = 1 + i):
1 −2 −2
1 −τ̄
2 Tτ = T(τ,0) = 0 1
T2 = T(2,0) = 0 1
0 0
1
0 0
Tv = T(0,2)
1
= 0
0
0
1
0
i
0
1
1
R= 0
0
10
0
i
0
0
0
1
−1
τ
1
Image of vertex
Cycle of points
I0
A3
Rp3,2 = p3,2
√
I0 (0, 2 3) = Tv−1 p3,2
√
I0 (1, 3) = Tv−1 Tτ p0
A3 p 0 = p 4
A3 p4 = Tv p0
A3 p3,1 = p3,2
A4 p0 = p3,2
A4 p3,1 = Tv p0
I02 = Id
A24 = Id
I0
R
[R, I0 ] = Id
A−1
3
R
→ p3,1 −−−→ ∞
∞ −−→ p3,1 −
Rp3,1 = p3,1
I0 p4 = Tv−1 p3,1
A4
→ p0 −→ ∞
∞ −→ p0 −
Rp0 = p0
I0 p3,2 = Tv−1 p4
A4
Relation
∞ −−→ p4 −−→ ∞
A4 p4 = ∞
I0 p3,1 =
I0
∞ −→ p0 −→ ∞
I0 p0 = ∞
Tv−1 p0
I0
A−1
3
[R, A3 ] = Id
A
R
3
∞ −−−→ p3,2 −
→ p3,2 −−→
∞
√ Tv I 0
A3
∞ −−−→ (0, 2 3) −−−→ p3,2 −−→ ∞
√ T −1 Tv I0
T I0
I0
(1, 3) −−τ−−−−→ p0 −→
∞ −−1−→
∞
[R, A3 ] = Id
Tv I0
A3
Tv I0
I0
T I
A−1
4
A3 = R3 (Tv I0 )−2
I0 Tτ−1 Tv I0 T1 I0 = Tv−1 T1 Tτ−1
∞ −−→ p3,1 −−−→ p0 −→ ∞
A−1
3
0
∞ −−−→ p3,2 −−v−→
p4 −−−→ ∞
A−1
3
T I
A
0
4
p3,1 −−−→ ∞
p4 −−v−→
∞ −−→
I
A−1
4
A
0
3
p0 −−→
p4 −−−→ ∞
∞ −→
A3 = I0 Tv−1 I0 R3 Tv−1
3
A4 = Tv I0 A−1
3 R
A4 = I0 Tv−1 A3 R3
A4 = A3 I0 Tv−1 R3
A
Tv−1 A3
I
3
A4 = A−1
3 Tv I0 R
A3
A3
A3
A33 = R3
0
4
∞
∞ −−→
p4 −−−−→ p0 −→
∞ −−→ p3,1 −−→ p3,2 −−→ ∞
I0
A4
A3
∞ −→ p0 −−→ p3,2 −−→ ∞
A
Tv−1 A4
I
3
0
∞ −−→
p3,1 −−−−→ p0 −→
∞
3
A4 = A−1
3 R Tv I0
A4 = A3 R3 I0 Tv−1
Table 2: Action of generators on vertices for d = 3
Covering depth and Q[i]-rational points in D∞ (1):
We denote B ((z, t), r) the open extended Cygan ball centered at p = (z, t) ∈ ∂∞ H2C with radius r (see
Equation 8 for the definition of the extended Cygan metric). Recall that u(n) = √2n is the height at which balls
of depth n appear, in the sense of Corollary 1.
Lemma 11 Let u = u(5)+ε = 0.895 and Hu the horosphere of height u based at ∞. Then the prism D∞ (1)×{u}
is covered by the intersections with Hu of the following extended Cygan balls:
√
√
√
√
√ √
• (depth 1) B (0, 0), 2 , B (0, 2), 2 , B (τ, 0), 2 , B (τ, 2), 2 , B (1, 7), 2 ,
√
• (depth 2) B (1, 1), 4 2 .
We omit the proof, which is similar to the proof of Lemma 13 but simpler; see Figure 4.2.
Note that in order to cover D∞ (1) × {u} we only need balls of depth at most 2, in particular none of depth
4 even though they are present at the height u = u(5) + ε which we consider. It is however necessary to pass
to this height, as we have observed experimentally that at height u = u(4) + ε balls of depth at most 2 do not
cover D∞ (1) × {u} (there are no Q[i]-rational points of depth 3).
Corollary 3 The covering depth of Γ(1) is at most 4.
By inspection, we see that the Q[i]-rational points in D∞ (1) with depth at most 4 are, in horospherical
coordinates:
• Depth 1: (0, 0), (0, 2), (τ, 0) and (τ, 2), all in the same Γ∞ (1)-orbit;
• Depth 2: (1, 1)
11
Figure 2: Covering the prism D∞ (1) by Cygan balls of depth 1 and 2
• Depth 4: (0, 1), (τ, 1) in one Γ∞ (1)-orbit and (1, 0), (1, 2) in the other.
Integral lifts of representatives of Γ∞ (1)-orbits of these points are:
0
−1
i
−1
p0 = 0 p2 = 1 + i p4,1 = 0 p4,2 = 2
1
1+i
2
2
Generators: The following elements
above (for α = 0; 2; 4, 1; 4, 2) :
0
A0 = I 0 = 0
1
A4,1
i
= 0
2
Aα ∈ Γ(1) map the point ∞ = [1, 0, 0]T to the corresponding pα as
0
−1
0
0
−1
0
−1
1
0 A2 = 1 + i
1+i
0
1
0
−i
A4,2
−2
2+i
1+i
−1
= 2
2
−2
3
2
2+i
−1 − i
−i
2
−2
−1
Relations: We list in Table 3 the relations obtained for Γ(1) by applying generators to points of depth
at most 4 as described in part (5) of section 2.4. By successively eliminating A4,2 , A4,1 then A2 we obtain
presentation (13). The details are straightforward and left to the reader.
4.3
The Picard modular group Γ(7) = PU(2, 1, O7 )
Presentation and fundamental domain for the cusp stabilizer Γ∞ (7):
Lemma 12
1. The cusp stabilizer Γ∞ (7) admits the following presentation:
Γ∞ (7) =
D
T1 , Tτ , Tv , R
[Tτ , T1 ] = Tv , [Tv , T1 ], [Tv , Tτ ], [Tv , R], (RTτ )2 , (RT1 )2 = Tv , R2
E
√
2. Let D∞ (7)√⊂ ∂H2C be
√ the affine
√ convex hull of the points with horospherical coordinates (0, 0), 2(1, 7),
(τ, 0), (0, 2 7), (1, 3 7), (τ, 2 7). Then D∞ (7) is a fundamental domain for Γ∞ (7) acting on ∂HC \{∞}.
12
Image of vertex
Cycle of points
I0
Relation
I0
I02 = Id
∞ −→ p0 −→ ∞
I0 p 0 = ∞
A4,1
A4,1
A24,1 = Id
A4,2
A4,2
A24,2 = Id
A4,1 p4,1 = ∞
∞ −−−→ p4,1 −−−→ ∞
A4,2 p4,2 = ∞
∞ −−−→ p4,2 −−−→ ∞
Rp0 = p0
0
0
p0 −
→ p0 −→
∞
∞ −→
I
A4,1
I0 (τ, 2) = Tτ T2−1 p2
(Tτ I0 )
I0 Tτ T2−1
[I0 , Tτ ] = Tτ I0 R3
A
(Tv Tτ I0 )−1
A2 = T2 Tτ−1 I0 Tv Tτ I0 R2
2
p2 −−−−−−→ (τ, 2) −−−−−−−→ ∞
∞ −−→
A
Tτ−1 Tv I0
I
A2 = I0 Tv−1 Tτ I0 RT2−1 Tv−1
Tv2 I0
I
A4,1 = I0 Tv−2 I0 RTv−1
2
0
p2 −−−−−−→ p0 −→
∞
∞ −−→
A4,1
0
∞
∞ −−−→ p4,1 −−−→ p0 −→
A4,2
T2−1 I0
I
Tv2 I0
I0
0
∞ −−−→ p4,1 −−−−→ p0 −→
∞
A4,1
Tτ−1 T2 Tv4 p0
A4,2 = [I0 , T2 ]
A4,1 = I0 Tv−2 I0 RTv−1
∞ −−−→ p4,1 −−−→ p0 −→ ∞
A
A
A22 = R−1 T2−1 Tτ Tv−3
2
2
∞ −−→
p2 −−→
∞
A2 p 2 = ∞
A−1
2
Tv−4 T2−1 Tτ A2
A4,1
2 −1
4
−1
A4,1 = A−1
2 Tτ T2 Tv A2 R T2
∞ −−−→ p4,1 −−−−−−−−−→ p2 −−−→ ∞
A4,2
Tv−1 A2
A
Tv−1 A4,1
I
2
∞ −−−→ p4,2 −−−−→ p2 −−→
I
−1
−1
A4,2 = A−1
2 Tv A2 T2 Tτ R
∞
A4,1 = Tv I0 R−1 Tv2 I0
0
0
∞ −→
p0 −−−−−→ p0 −→
∞
A4,1 p0 = Tv p0
A−1
2
A4,1
A
A4,1 = A2 R2 Tτ−1 T2−1 Tv−2 A−1
2
2
∞ −−→
p2 −−−→ p2 −−−→ ∞
A4,1 p2 = p2
T2−1 A4,2
I
I
0
0
∞
∞ −→
p0 −−−−−→ p0 −→
A4,2 p0 = T2 p0
A4,2 p2 = Tv−1 (τ, 0)
(I0 Tv )3 = R
−1
I
T I
I0 p4,2 = T2 p0
A2 p4,2 = Tv p2
[R, A4,1 ] = Id
I0
0
0
(τ, 0) −−−−−−→ ∞
(τ, 0) −→
∞ −−τ−→
I0 p4,1 = Tv−2 p0
A2 p4,1 = Tτ−1 T2 Tv4 p2
Tv I0
∞ −−−→ (0, 2) −−−→ p0 −→ ∞
I0 p2 = Tv−1 Tτ p0
A2 p0 =
R
Tv I0
Tv−1 p0
I0 (τ, 0) = (τ, 0)
[R, I0 ] = Id
A−1
4,1
∞ −−−→ p4,1 −
→ p4,1 −−−→ ∞
Rp4,1 = p4,1
I0 (0, 2) =
I
R
A4,1 = [T2 , I0 ]
(T τ I0 )−1
Tv A4,2
A2
A4,2 = Tv−1 A2 R−1 Tτ T2−1 A−1
2
∞ −−→ p2 −−−−→ (τ, 0) −−−−−−→ ∞
Table 3: Action of generators on vertices for d = 1
√
Concretely, we use the following generators for Γ∞ (7) (denoting τ = 1+i2 7 ):
1 −τ̄
1 −1 τ − 1
1 Tτ = T(τ,0) = 0 1
T1 = T(1,√7) = 0 1
0 0
0 0
1
Tv = T(0,2√7)
1
= 0
0
0
1
0
√
i 7
0
1
1
R= 0
0
0
−1
0
−1
τ
1
0
0
1
√
Covering depth and Q[i 7]-rational points in D∞ (7):
We denote B ((z, t), r) the open extended Cygan ball centered at p = (z, t) ∈ ∂∞ H2C with radius r (see
Equation 8 for the definition of the extended Cygan metric). Recall that u(n) = √2n is the height at which balls
of depth n appear, in the sense of Corollary 1.
Lemma 13 Let u = u(8) + ε = 0.70711 and Hu the horosphere of height u based at ∞. Then the prism
D∞ (7) × {u} is covered by the intersections with Hu of the following extended Cygan balls:
√
√ √
√
√ √
√ √
• (depth 1) B (0, 0), 2 , B (0, 2 7), 2 , B (τ, 0), 2 , B (τ, 2 7), 2 , B (1, 7), 2 ,
√
√
√ √
• (depth 2) B (τ /2, 3 7/2), 4 2 , B ((τ + 1)/2, 7), 4 2
13
Figure 3: Covering the prism D∞ (7) by Cygan balls of depth 1, 2 and 4
√
• (depth 4) B (τ, 7), 1 .
Proof. Figure 4.3 shows the prism D∞ (7) and the relevant Cygan balls. We prove the result by dissecting
the prism D∞ (7) × {u} into affine polyhedra, each of which lies in one of the extended Cygan balls. This is
reminiscent of the proof of Proposition 5.2 of [Zh]. Consider the following points of ∂∞ H2C , in horospherical
coordinates (see Figure 4.3):
q1 = (0.65τ, 2.8)
q2 = (τ, 2)
q6 = (1, 4.3)
q7 = ((τ + 1)/2, 1.5)
√
q11 = (τ, 4)
q12 = ((τ + 1)/2, 2 7)
q16 = (0.3τ, 3)
q17 = (τ /2, 1)
q3 = (τ, 3.3) q4 = (0.35 + 0.65τ, 3.4) q5 = (0.7 + 0.3τ, 4.2)
q8 = (τ, 1.5)
q9 = ((τ + 1)/2,
q10 = (1, 1)
√ 0)
q13 = (τ /2, 4)
q14 = (τ /2, 2 7)
q15 = (0, 3.5)
q18 = (0, 1.7)
q19 = (τ /2, 0)
Denoting Hull(S) the affine hull (in horospherical coordinates) of a subset S ⊂ Hu ' ∂∞ H2C × {u}, we
claim that the following affinely convex pieces of D∞ (3) × {u} are each contained in the corresponding (open)
extended Cygan sphere:
√
• C1 = Hull ((0, 0), (1, 0), q9 , q10 , q17 , q18 , q19 ) ⊂ B (0, 0), 2
√
√
√ √
• C2 = Hull (0, 2 7), (1, 2 7), q6 , q12 , q13 , q14 , q15 ⊂ B (0, 2 7), 2
√
• C3 = Hull ((τ, 0), q7 , q8 , q9 , q17 , q19 ) ⊂ B (τ, 0), 2
√
√ √
• C4 = Hull (τ, 2 7), q11 , q12 , q13 , q14 ⊂ B (τ, 2 7), 2
√ √
√
• C5 = Hull (1, 7), q6 , q7 , q10 , q15 , q16 , q17 , q18 ⊂ B (1, 7), 2
√
√
• C6 = Hull (q1 , q3 , q4 , q5 , q11 , q12 , q13 , q15 , q16 ) ⊂ B (τ /2, 3 7/2), 4 2
√ √
• C7 = Hull (q1 , q2 , q4 , q5 , q6 , q7 , q8 , q16 , q17 ) ⊂ B ((τ + 1)/2, 7), 4 2
√
• C8 = Hull (q1 , q2 , q3 , q4 ) ⊂ B (τ, 7), 1
14
To verify each of these claims, we check numerically that each of the vertices indeed belongs to the ball in
question using Equation (8), then extend to √
the whole
√ affine covex hull√by Lemma
√ 7. For example,
√
the point
q1 = (0.65τ, 2.8) indeed belongs to B (τ /2, 3 7/2), 4 2 , B ((τ + 1)/2, 7), 4 2 and B (τ, 7), 1 because:
√
√
4
2 ' 1.189
dXC (0.65τ, 2.8, u), (τ /2, 3 7/2,
√ 0) ' 1.179 < √
dXC (0.65τ, 2.8, u), ((τ + 1)/2, √7, 0) ' 1.172 < 4 2 ' 1.189
dXC (0.65τ, 2.8, u), (τ, 7, 0) ' 0.982 < 1
The result then follows as the prism D∞ (7) × {u} is the union of the affinely convex pieces C1 , ..., C8 , see
Figure 4.3.
Corollary 4 The covering depth of Γ(7) is at most 7.
Note that in the above covering argument we have only needed balls of depth at most 4 (in particular none of
depth 7) even though they are present at the height u = u8 + ε which we consider. It is however necessary to
pass to this height, as we have observed √
experimentally that at height u = u7 + ε balls of depth at most 4 do
not cover D∞ (7) × {u} (there are no Q[i 7]-rational points of depths 5 or 6).
√
By inspection, we see that the Q[i 7]-rational points in D∞ (7) with depth at most 7 are the following, in
horospherical coordinates. We give in Lemma 14 below a detailed justifcation for the points of depth 2.
√
√
√
• Depth 1: (0, 0), (0, 2 7), (τ, 0), (τ, 2 7) and (1, 7), all in the same Γ∞ (7)-orbit;
√
√
• Depth 2: ( τ2 , 32 7) in one Γ∞ (7)-orbit and ( τ +1
2 , 7) in the other;
√
√
√
√
√
τ +1
• Depth 4: (0, 7), (τ, 7), (1, 0), (1, 2 7) in one Γ∞ (7)-orbit, ( τ2 , 12 7) in a second and ( τ +1
2 , 0), ( 2 , 2 7)
in the third;
√
√
7), (τ, 2k
7),
• Depth 7: for each k = 1, ..., 6, there is a Γ∞ (7)-orbit containing the 3 points (0, 2k
7
7
√
(1, 2k+7
7)
(with
2k
+
7
taken
mod
7).
7
Integral lifts of representatives of Γ∞ (7)-orbits of these points are:
0
p0 = 0
1
p2,1
p7,1
−1
0
= √
i 7
2
−τ − 2
= −1 p2,2 = 1 − τ
−τ
τ −1
p7,2
−2
0
= √
i 7
p7,3
−3
0
= √
i 7
p4,1
√
i 7
= 0
2
p4,2
p7,4
−4
0
= √
i 7
−1
τ −1
= τ p4,3 = τ + 1
2
2
p7,5
−5
0
= √
i 7
p7,6
−6
0
= √
i 7
√
√
√
Lemma 14 The Q[i 7]-rational points in D∞ (7) with depth 2 are exactly ( τ2 , 23 7) and ( τ +1
2 , 7).
Proof. We illustrate the general procedure for finding points of depth n, then specialize to the present case.
The depths at which there will be E-rational points are the natural numbers n such that |z|2 = n has a
solution z ∈ Od . For d = 7, the first few n’s are 1, 2, 4, 7, . . .. Begin by assuming we have found all points of
depth less than n. In this case those are just the points at depth 1.
1. Find all q = √
x + yτ ∈ Od (up to multiplication by a unit) with |q|2 = n. There are two possibilities: either
1+i 7
q = τ := 2 or q = τ − 1.
15
√
(1, 2 7)
q12
2
4
√
(1, 2 7)
√
(0, 2 7)
√
(τ, 2 7)
q14
4
4
2
√
(1, 2 7)
q12
2
2
q6
q6
q13
q15
q11
6
q4
q3
q16
q1
q5
6
8
7
8
5
5
q2
7
q18
5
q8
q10
q7
q10
q17
1
1
3
3
1
(1, 0)
q19
(0, 0)
(τ, 0)
q9
3
1
q9
(1, 0)
Figure 4: Affine cell decomposition of the prism D∞ (7)
16
(1, 0)
2. Consider the standard lift of a point of ∂HK2 \ {∞}:
P =
−|z|2 +it
2
z
1
√
Note that t = b 7 for some b ∈ Q. The calculation is more transparent if we rewrite the first coordinate:
−|z|2 + it
−|z|2 − b
=
+ bτ
2
2
For P to be the vector form of an E-rational point p of depth 2, it must satisfy the following:
(a) P does not have depth 1 (in general, P does not have depth less than n). In other words, the
coordinates of P are not in O7 .
(b) P q’s coordinates must be in O7 for some q from step (1).
Next, we do some calculations to make sure (b) is satisfied.
3. Find all z in the projection to C of D∞ such that zq ∈ O7 . If q = τ we can have z = 0, 1, τ, or 1+τ
2 . If
q = τ − 1, we can have z = 0, 1, τ, τ2 .
2
4. For each possible z, find |z|2 and compute −|z|2 −b + bτ q. Use this to list all b’s such that (z, b) ∈ D∞
2
and −|z|2 −b + bτ q ∈ O7 .
z
|z|2
q
0
0
1
1
τ
2
1+τ
2
τ
2
1
τ
τ −1
τ
τ −1
τ
τ −1
τ
1
2
τ −1
−|z|2 −b
2
+ bτ q
−2b + bτ
2
b
− 3b
2 − 2τ
2b + b−1
2 τ
1−3b
1+b
−
2
2 τ
−2b − b−2
2
2−3b
2+b
2 − 2 τ
2b + b−1
2 τ
1−6b
1+2b
4 − 4 τ
b’s
0, 2
0, 2
1
1
0, 2
0, 2
1
3
2
point(s) in horo. coords
√
(0, 0), (0, 2√7)
(0, 0), (0,
√ 2 7)
(1, √7)
(1, 7)√
(0, 0), (0, 2√7)
(0, 0), (0,√2 7)
1+τ
2 ,√ 7
τ 3 7
2, 2
5. Get rid ofnall the ones that areo
level 1 (or from any previous level). What you are left with are the level
√ τ 3√7
1+τ
2 points:
.
2 , 7 , 2, 2
Generators: The following elements Aα ∈ Γ(7) map the point ∞ = [1, 0, 0]T to the corresponding pα as
above (for α = 0; 2, 1; 2, 2; 4, 1; 4, 2; 4.3; 7, 1; ...; 7, 6) :
17
0
A0 = I 0 = 0
1
A4,1
√
i 7
= 0
2
0
−1
0
1
0
0
−5
−1
√
i 7
5
0√
−i 7
τ −1
τ
2
= τ
2
1−τ
2
1−τ
−τ
A2,1
0
4
1
0√
0 −i 7
−τ − 2
= −1
τ −1
A4,2
−1 0 0
0
1 0
= √
i 7 0 −1
A7,1
√
−4 0 3i 7
0
1
0
= √
5
i 7 0
A7,2
A7,5
√
−5 0 3i 7
0
1
0
= √
4
i 7 0
A2,2
−τ
τ −1
−2
τ
τ −1
2
2
= 1−τ
−τ
A4,3
−1 τ − 2
3
= τ +1
2
2−τ
A7,3
A7,4
√
i 7
0
3
−2 0
0
1
= √
i 7 0
−3
0
= √
i 7
A7,6
−6
0
= √
i 7
2
−τ − 1
−1
√
0 i 7
1
0
0
2
√
0 i 7
1
0
0
1
Relations: We list in Table 4 the relations obtained for Γ(7) by applying generators to points of depth at
most 7 as described in part (5) of section 2.4. By successively eliminating A2,1 , A7,1 , A7,4 , A7,6 , A7,2 , A7,3 ,
A7,5 , A2,2 , A4,3 then A4,1 , and setting I1 = A4,2 we obtain presentation (14). The details are straightforward
and left to the reader.
5
The Hurwitz quaternion modular group PU(2, 1, H)
In this section we use the method described in Section 2.4 to compute the following presentation for the
Hurwitz modular group Γ(H) = PU(2, 1, H), sometimes denoted PSp(2, 1, H). Recall that the Hurwitz integer
ring is H = Z[i, j, k, σ] ⊂ H, where we denote σ = 1+i+j+k
. The generators S∞ and relations R∞ for Γ∞ (H)
2
are defined in Lemma 15.
PU(2, 1, H) =
D
R∞ , I 2 , [I, Ri ], [I, Rσ ], [I, Ci ], [I, Cσ ], [ITv−2
IRi Tv−1
Ci , Rσ ],
i
i
S∞ , I
[Cσ−1 (ITv−1
Tv−1
Tv−1
)3 Ri2 Cσ , Ri ], [Cσ−1 (ITv−1
Tv−1
Tv−1
)3 Ri2 Cσ , Rσ ],
i
j
i
j
k
k
[Cσ−1 (ITv−1
Tv−1
Tv−1
)3 Ri2 Cσ , Cσ ], (ITv−2
IRi Tv−1
Ci )2 , (Tvi I)3 = Ri Ci ,
i
j
i
i
k
(Tvi Tvj I)4 = Ri2 , (Tvi Tvj Tvk I)6 , ITv−1
(ITvj )2 = (Tvj ITv−1
)2 Ri ,
i
i
Tv−1
Tv−1
Cσ−1 ,
Tv−1
)3 Ri2 Cσ ], IT1 Tσ−1 ITσ I = T1 Tv−1
[(Tvi Tvj I)2 , Cσ−1 (ITv−1
Tv−1
j
j
i
k
k
E i
I = Tσ ITvi Tvj IT1−1 Tσ Ci Tk
ITi Tk Tv−1
Tv−2
i
k
(15)
Presentation and coarse fundamental domain for Γ∞ (H):
In this section we study the action of Γ∞ (H) on ∂∞ H2H \ {∞} ' H × Im H. We use the notation of Equations (3), (4) and (5), namely T(ζ,v) , Rw , Cw respectively denote Heisenberg translation by (ζ, v), Heisenberg
rotation by w and conjugation by w. Note that for any unit quaternion w ∈ H and purely imaginary q ∈ H,
Γ∞ (H) contains the following Heisenberg translations:
Tw = T(w,i+j+k)
1
= 0
0
−w̄
1
0
−1+i+j+k
2
w
1
,
Tvq = T(0,q)
1
= 0
0
0
1
0
q
0
1
Lemma 15 Γ∞ (H) admits the following presentation:
Γ∞ (H) = hS∞ | R∞ i = Ri , Rσ , Ci , Cσ , T1 , Ti , Tj , Tk , Tσ , Tvi , Tvj , Tvk | A1 , A2 , A3 , A4 , A5
18
(16)
Image of vertex
Cycle of points
Relation
I0
I0
I02 = Id
∞ −→ p0 −→ ∞
I0 p0 = ∞
A4,1
A4,1
A24,1 = Id
A4,2
A4,2
A24,2 = Id
A4,3
A4,3
A24,3 = Id
A4,1 p4,1 = ∞
∞ −−−→ p4,1 −−−→ ∞
A4,2 p4,2 = ∞
∞ −−−→ p4,2 −−−→ ∞
A4,3 p4,3 = ∞
∞ −−−→ p4,3 −−−→ ∞
I0
→ p0 −→ ∞
∞ −→ p0 −
Rp0 = p0
I0 p2,2 = T1−1 p4,3
I0 p4,1 = Tv−1 p7,5
I0 p4,2 = T1−1 Tv−1 p2,1
I0 p4,3 = Tτ T1 Tv−1 p0
I0 p7,1 = Tv−1 p0
I0 p7,2 = Tv−1 p4,1
√
I0 (0, 2 7) = Tv−1 p7,6
√
I0 (1, 7) = Tv−1 p2,1
I0 (τ, 0) = (τ, 0)
A2,1 p0 = p7,5
A2,2 p0 = p4,2
A4,1 p0 = p7,4
A4,1 p7,3 = Tv p0
A4,2 p0 = p2,2
A4,2 p7,2 = Tτ T1−1 p2,2
I0
R
A2,2
[R, I0 ] = Id
T I
A−1
4,3
T I
A−1
7,5
0
p4,3 −−−→ ∞
∞ −−−→ p2,2 −−1−→
A4,1
0
p7,5 −−−→ ∞
∞ −−−→ p4,1 −−v−→
A4,2
A−1
2,1
T T I
v 1 0
−−→ p2,1 −−−→ ∞
∞ −−−→ p4,2 −−
A−1
4,3
I0 Tτ T1 Tv−1
I
0
p0 −−−−−−−→ p4,3 −−−→ ∞
∞ −→
A−1
7,1
I0 Tv−1
I
0
p0 −−−−→ p7,1 −−−→ ∞
∞ −→
A−1
7,2
I0 Tv−1
A4,1
∞ −−−→ p4,1 −−−−→ p7,2 −−−→ ∞
√ T I0
A−1
T I0
7,6
(0, 2 7) −−v−→
p7,6 −−−→ ∞
∞ −−v−→
√ T I0
A−1
T I0
2,1
∞ −−1−→
(1, 7) −−v−→
p2,1 −−−→ ∞
T I
(Tτ I0 )
I
A2,1
A−1
7,5
I
A2,2
A−1
4,2
I0
A4,1
A−1
7,4
0
∞ −→
p0 −−−→ p7,5 −−−→ ∞
0
∞ −→
p0 −−−→ p4,2 −−−→ ∞
∞ −→ p0 −−−→ p7,4 −−−→ ∞
Tv−1 A4,1
A7,3
I0
∞ −−−→ p7,3 −−−−−→ p0 −→ ∞
A−1
2,2
A4,2
I
0
∞ −→
p0 −−−→ p2,2 −−−→ ∞
A7,2
T1 Tτ−1 A4,2
I
T1−1 Tτ−1 Tv A4,3
A−1
2,2
∞ −−−→ p7,2 −−−−−−−→ p2,2 −−−→ ∞
I
A4,3 p0 = Tv−1 Tτ T1 p0
0
0
∞
∞ −→
p0 −−−−−−−−−−→ p0 −→
A7,1 p0 = p0
0
0
∞ −→
p0 −−−→ p0 −→
∞
A7,2 p4,1 = p0
A4,1
A7,3 p0 = p4,1
A7,3 p4,2 = T1−1 p2,1
A7,3 p7,1 = p7,4
A7,5 p2,2 = Tv T1−1 p4,3
A7,5 p4,1 = Tv p0
A7,5 p7,3 = p7,6
A7,5 p7,4 = ∞
A7,6 p0 = Tv p0
A7,6 p7,1 = ∞
A7,6 p7,2 = p7,5
A7,2
A7,3
I0
A7,2
A7,4
A−1
7,1
A7,2
∞ −−−→ p7,4 −−−→ p7,1 −−−→ ∞
I
A−1
4,1
A7,3
0
∞ −→
p0 −−−→ p4,1 −−−→ ∞
A4,2
A−1
2,1
T1 A7,3
∞ −−−→ p4,2 −−−−→ p2,1 −−−→ ∞
A7,1
A−1
7,4
A7,3
∞ −−−→ p7,1 −−−→ p7,4 −−−→ ∞
A7,2
A7,3
A−1
4,1
A7,4
0
∞ −→
p0 −−−→ p4,1 −−−→ ∞
A−1
4,3
T1 Tv−1 A7,5
A2,2
∞ −−−→ p2,2 −−−−−−−→ p4,3 −−−→ ∞
Tv−1 A7,5
A4,1
I
0
∞ −−−→ p4,1 −−−−−→ p0 −→
∞
A7,3
A−1
7,6
A7,5
∞ −−−→ p7,3 −−−→ p7,6 −−−→ ∞
A7,4
A7,5
∞ −−−→ p7,4 −−−→ ∞
I
Tv−1 A7,6
I
0
0
∞ −→
p0 −−−−−→ p0 −→
∞
A7,6
A7,1
∞ −−−→ p7,1 −−−→ ∞
A7,2
A4,3 = I0 Tτ T1 Tv−1 I0 Tτ−1 T1−1
A7,1 = I0 Tv−1 I0 R
A7,2 = I0 Tv−1 A4,1
A7,6 = (Tv I0 )2
A2,1 = Tv I0 T1 I0 Tv T1−2
A7,6
(I0 Tτ R)3 = Id
A7,5 = A2,1 I0 T1 Tv−1 R
A4,2 = A2,2 I0
A7,4 = A4,1 I0
A7,3 = A−1
4,1 Tv I0 R
A4,2 = A2,2 I0
−1
−2
A7,2 = A−1
4,2 Tτ T1 A2,2 Tτ T1 Tv
A4,3 = Tv−1 Tτ T1 I0 T1−1 Tτ−1 Tv I0
A7,1 = I0 RTv−1 I0
A7,2 = I0 Tv−1 A−1
4,1
A7,4 = A−1
7,2 A7,1 R
A7,3 = A4,1 RTv I0
A7,3 = T1−1 A2,1 Tτ−1 T12 Tv A−1
4,2
A7,4 = A7,3 A7,1
A7,3 = A−1
7,2 R
∞ −−−→ p7,2 −−−→ ∞
I
−1
2
A−1
4,2 = T1 Tτ Tv RA2,1 Tv T1 I0
A7,3 = A−1
7,2 R
∞ −−−→ p7,3 −−−→ ∞
A7,3 p7,2 = ∞
A7,4 p0 = p4,1
I
∞ −−−→ p4,1 −−−→ p0 −→ ∞
A7,2 p7,3 = ∞
A7,2 p7,4 = p7,1
A7,1
I
A7,5 = RTv I0 A4,1
−1
0
0
∞ −−τ−→
(τ, 0) −→
(τ, 0) −−−−−−→ ∞
I
A4,3 = T1 I0 A2,2 T1−1
A−1
7,5
∞ −−−→ p7,2 −−−→ p7,5 −−−→ ∞
19
A7,4 = A4,1 I0
A7,5 = Tv T1−1 A4,3 RTτ−2 T1 A−1
2,2
A7,5 = Tv I0 RA−1
4,1
A7,6 = A7,5 A7,3
A7,5 = RTv A−1
7,4
A7,6 = (Tv I0 )2
A7,6 = RTv A−1
7,1
A7,6 = A7,5 RA−1
7,2
Table 4: Action of generators on vertices for d = 7
where the An are the following sets of relations:
A1 = {Ri4 , Ri2 Rσ−3 , (Ri Rσ )3 , (Ri−1 Rσ )2 Ri−1 Rσ−2 }
A2 = {Ci2 , Cσ3 , (Ci Cσ )3 }
A3 =
[Tvw , T ] , [T1 , Tw ] = Tv−2
, [T1 , Tσ ] = Tv−1
Tv−1
Tv−1
,
w
i
j
k
2
−1
[Tw , Tŵ ] = Tvwŵ , [Tw , Tσ ] = Tvw Tvŵ Tvwŵ
where T runs over T1 , Ti , Tj , Tk , Tσ , Tvi , Tvj , Tvk , w runs over i, j, k, and î = j, ĵ = k, k̂ = i.
A4 = Ci Ri Ci = Ri , Ci Rσ Ci = Ri Rσ4 Ri , Cσ Ri Cσ−1 = Rσ Ri Rσ−1 , Cσ Rσ Cσ = Rσ
A5 = {GT G−1 = EG,T },
where G runs over Ri .Rσ , Ci , Cσ , T runs over T1 , Ti , Tj , Tk , Tσ , Tvi , Tvj , Tvk , and EG,T is the entry in the G
column and T row of the table below:
T1
Ti
Tj
Tk
Tσ
Tvi
Tvj
Tvk
Ri
Ti
−1
T1 Tvi Tvj Tvk
Tk
Tj−1 Tvi Tvj Tvk
Tσ−1 Ti Tk Tvj Tv−1
k
Tvi
Tvj
Tvk
Rσ
Tσ
−1 −1
T1 Tk Tσ Tvj Tv2k
T1−1 Ti−1 Tσ Tv2i Tvk
T1−1 Tj−1 Tσ Tvi Tv2j
T1−1 Tσ
Tvi
Tvj
Tvk
Ci
Tv−1
T1 Tv−1
j
k
Ti Tv−1
Tv−1
j
k
Tj−1 Tvi
Tk−1 Tvi
−1 −1
Tj Tk Tσ Tvj
Tvi
Tv−1
j
Tv−1
k
Cσ
T1
Tj
Tk
Ti
Tσ
Tvj
Tvk
Tvi
Proof. To obtain a presentation for Γ∞ (H), we identify 3 of its subgroups, observe that some of them
normalize each other, and build up the presentation via a sequence of extensions using the following procedure.
Suppose that G is a group with subgroups N and K where N is normal in G and G is an extension of N by K.
Suppose also that we know presentations for N and K, N = hSN | RN i and K = hSK | RK i. Then G admits the
presentation hSN ∪ SK | RN ∪ RK ∪ Ri, where the set R consists of relations of the form knk −1 = n0 where k runs
over all elements of SK , n runs over the elements of SN , and n0 ∈ N is expressed as a word in the generators
SN .
The three subgroups of Γ∞ (H) we identify are the rotation, conjugation, and translation subgroups.
The rotation subgroup consists of all Heisenberg rotations Rw where w is a Hurwitz integral unit quaternion.
It is isomorphic to the binary tetrahedral group, which has order 24 (see e.g. [CS]). It admits the presentation
hRi , Rσ | A1 i
The conjugation subgroup consists of all conjugations by unit quaternions. Elements of this group also
correspond to Hurwitz unit integral quaternions, only Cw acts the same as C−w . Thus, this group is isomorphic
to the quotient of the binary tetrahedral group by −1, which is the tetrahedral group (or the alternating group
on 4 elements). It admits the presentation
hCi , Cσ | A2 i
The translation subgroup consists of all Heisenberg translations. It admits the presentation
T1 , Ti , Tj , Tk , Tσ , Tvi , Tvj , Tvk | A3
The rotation subgroup is normalized by the conjugation subgroup. The extension of the rotation subgroup
by the conjugation subgroup is a finite group of order 288. We obtain the four relations in A4 by conjugating
Ri and Rσ by Ci and Cσ .
20
The translation subgroup is normalized by the rotation-conjugation subgroup. The conjugates of the translation generators by the rotation and conjugation generators are listed in the table. The translations T are
along the left side, the rotations/conjugations G are along the top, and the table entry EG,T is the element
GT G−1 written as a word in the translation generators. A5 contains these relations.
The action of the translation subgroup of Γ∞ (H) is relatively straightforward, however the finite group
Γ0,∞ (H) fixing 0 and ∞ is more complicated. Namely, the group of units in H (which has order 24 and is
generated by say i and σ) acts on ∂∞ H2H faithfully by rotations, and with kernel {±1} by conjugation. Together
these actions produce the group Γ0,∞ (H) as a semi-direct product of order 288 as described above, and the
geometric compatibility between the action of this finite group and the translation subgroup is not clear. For
this reason, we do not make explicit a fundamental domain for the action of Γ∞ (H) on ∂∞ H2H \ {∞}, rather we
only use a larger subset D∞ (H) which is geometrically simpler and sufficient for our purposes in the sense that
its Γ∞ (H)-translates cover ∂∞ H2H \ {∞}. Such a set is sometimes called a coarse fundamental domain.
1+j 1+k −1+i −1+j −1+k i+j i+k j+k
h
h
Define D∞
(H) = Hull( 12 , − 12 , 1+i
2 , 2 , 2 , 2 ,
2 ,
2 , 2 , 2 , 2 ) ⊂ H, and D∞ (H) = D∞ (H) ×
3
2
[0, 1] ⊂ ∂∞ HH \ {∞} ' H × Im H.
Lemma 16 The Γ∞ (H)-translates of D∞ (H) cover ∂∞ H2H \ {∞}.
Proof. We proceed in several steps, first considering the horizontal projections (as defined in the short exact
sequence (11)) Γh∞ = Π∗ (Γ∞ ) of Γ∞ = Γ∞ (H) and of some of its subgroups.
h
• Claim 1: A fundamental domain for hT1 , Ti , Tj , Tk i in H ' R4 is [−1/2, 1/2]4 .
This is clear as Heisenberg translations act as ordinary translations on the horizontal factor.
h
• Claim 2: A fundamental domain for hT1 , Ti , Tj , Tk , Ri , Rj , Rk i in H is [0, 1/2]4 ∪ [−1/2, 0] × [0, 1/2]3 :
This can be seen by subdividing the cube [−1/2, 1/2]4 into 16 cubes of half side-length. The group
hRi , Rj , Rk i, isomorphic to the classical quaternion group of order 8, acts on these 16 subcubes with 2
orbits, and the claim follows from choosing 2 adjacent representatives of these orbits.
h
h
• Claim 3: A fundamental domain for hT1 , Ti , Tj , Tk , Ri , Rj , Rk , Tσ i in H is D∞
(H):
h
First note that D∞ (H) ⊂ H is the union of two half-cubes of edge-length 1/2, D+ and D− , where
1+j 1+k i+j i+k j+k
−
D+ = Hull(0, 21 , 2i , 2j , k2 , 1+i
is obtained from D+ by negating the first
2 , 2 , 2 , 2 , 2 , 2 ) and D
coordinate. Each of these is obtained by cutting a cube in 2 along a diagonal hyperplane, for example
D+ P
is obtained by taking half of the cube [0, 1/2]4 , cut along the diagonal hyperplane {(x1 , ..., x4 ) ∈
4
R |
xi = 1}.
Note that this hyperplane is the equidistant hyperplane between 0 and Tσ (0); likewise the hyperplane
{(x1 , ..., x4 ) ∈ R4 | − x1 + x2 + x3 + x4 = 1} is the equidistant hyperplane between 0 and Tσ T1−1 (0). Since
h
h
Tσ2 = T1 Ti Tj Tk , the subgroup hT1 , Ti , Tj , Tk , Ri , Rj , Rk i has index 2 in hT1 , Ti , Tj , Tk , Ri , Rj , Rk , Tσ i ,
and the claim follows from the previous claim.
• Claim 4: A fundamental domain for T1 , Ti , Tj , Tk , Ri , Rj , Rk , Tσ , Tvi , Tvj , Tvk in ∂∞ H2H \{∞} ' H×Im H
h
is D∞
(H) × [−1, 1]3 :
This follows from the previous claim as the additional generators Tvi , Tvj , Tvk are vertical translations by
2 units in Heisenberg coordinates.
h
• Claim 5: The translates of D∞
(H) × [0, 1]3 under T1 , Ti , Tj , Tk , Ri , Rj , Rk , Tσ , Tvi , Tvj , Tvk , Ci , Cj , Ck
2
cover ∂∞ HH \ {∞}:
Recall from (5) that for any unit quaternion w, the matrix Cw acts on ∂∞ H2H ' H × Im H by conjugation
by w on both the horizontal and vertical factors. Since each of i, j, k conjugate the two others to their
opposites, the claim follows by considering only the action on the vertical factor.
Covering depth and Q[i, j, k]-rational points in D∞ (H):
21
We denote as before B ((ζ, v), r) the open extended Cygan ball centered at p = (ζ, v) ∈ ∂∞ H2H with radius r
(see Equation 8 for the definition of the extended Cygan metric dXC ). Recall that u(n) = √2n is the height at
which balls of depth n appear, in the sense of Corollary 1.
Lemma 17 Let u = u(6)+ε = 0.8165 and Hu the horosphere of height u based at ∞. Then the prism D∞ (H)×
√
{u} is covered by the intersections with Hu of the following extended Cygan balls of depth 1: B (0, 0), 2 ,
√
√
B (σ, i + j + k), 2 and B (σ − 1, i + j + k), 2 .
h
h
Proof. Recall that D∞ (H) = D∞
(H) × [0, 1]3, where the base D∞
(H) ⊂ H is the union
of two half-cubes of
1 i j k 1+i 1+j 1+k i+j i+k j+k
+
−
+
edge-length 1/2, D and D where D = Hull 0, 2 , 2 , 2 , 2 , 2 , 2 , 2 , 2 , 2 , 2
and D− is obtained
from D+ by negating the first coordinate.
√
√
Claim: The half-prism D+ × [0, 1]3 is contained in B (0, 0), 2 ∪ B (σ, i + j + k), 2 .
We separate D+ × [0, 1]3 into 2 pieces by the ”horizontal” hyperplane A = {(x1 + x2 i + x3 j + x4 k, t1 i + t2√j +
t3 k) ∈ H×Im H | t1 +t2 +t3 = 2.5}. The claim is then verified by showing that D+ ×[0, 1]3 ∩A− ⊂ B (0, 0), 2
√
and D+ ×[0, 1]3 ∩A+ ⊂ B (σ, i + j + k), 2 , where A± denote the 2 half-spaces bounded by A, with (0, 0) ∈ A−
and (σ, i + j + k) ∈ A+ . This is done as previously by checking the vertices numerically using Equation (8), then
extending the result to their convex hull by Lemma 7. For the vertices, note that for each of the 11 base vertices
of D+ there is a 3-cube above it in the vertical direction, spanned by 0, i, j, k, i+j, i+k, j +k, i+j +k. We √
first
check using Equation (8) that for each of the 11 base vertices, all vertical vertices above it are in B (0, 0), 2
except for the top vertex
√ (corresponding to i+j +k), and that likewise all 11 of these top vertices are in the other
ball B (σ, i + j + k), 2 . Finally, we check that all 33 midpoints between these top vertices and the lower
√
√
level (spanned by i + j, i + k and j + k) are contained in the intersection B (0, 0), 2 ∩ B (σ, i + j + k), 2 .
j+k
j+k
For example, the midpoint ( j+k
2 , i + j + k/2) between ( 2 , i + j) and ( 2 , i + j + k) satisfies:
√
j+k
, i + j + k/2, u), (0, 0, 0) ' 1.187 < 2,
dXC (
2
√
j+k
, i + j + k/2, u), (σ, i + j + k, 0) ' 1.4127 < 2.
dXC (
2
+
−
All other computations are similar. Likewise, replacing D√
by
gives that
√ coordinate
D by negating the first
−
3
the other half-prism D × [0, 1] is contained in B (0, 0), 2 ∪ B (σ − 1, i + j + k), 2 .
Corollary 5 The covering depth of Γ(H) is at most 5.
In fact we suspect that the covering depth of Γ(H) is 4, however the covering argument is much more delicate
at height u(5) + ε, in particular the 3 Cygan balls used above do not suffice.
By inspection, we see that the Q[i, j, k]-rational points in D∞ (H) with depth at most 5 are, in horospherical
coordinates:
• Depth 1: (0, 0) and its Γ∞ -translates;
• Depth 2: (0, i + j) and its Γ∞ -translates;
i+j+k
) and their Γ∞ -translates;
• Depth 4: (0, i), (0, i + j + k), ( 1+i
2 ,
2
• Depth 5: (0, 4i+2j
5 ) and its Γ∞ -translates.
Integral lifts of these points are:
22
0
p0 = 0
1
−1
p2 = 0
i+j
p4,1
i
= 0
2
p4,2
i+j+k
1
1
p4,3 = −(i + k) p5 =
0
0
=
2
−2σ
−2i − j
Generators: The following elements Aα ∈ Γ(1) map the point ∞ = [1, 0, 0]T to the corresponding pα as
above (for α = 0; 2; 4, 1; 4, 2) :
0
A0 = I0 = 0
1
A4,2
i+j+k
0
=
2
0
−1
0
0
−1
0
1
0
0
−1
A2 = 0
i+j
0 i+j
1
0
0
1
2
1
0
0
A4,3 = −(i + k)
0
1
0
−(i + j + k)
−2σ
−(i + k) 1
A4,1
i
= 0
2
1
0
A5 =
−2i − j
0
−1
0
0
1
0
1
0
−i
2i + j
0
6
Relations: We list in Tables 5 and 6 the relations obtained for Γ(H) by applying generators to points of
depth at most 5 as described in part (5) of section 2.4. By successively eliminating the generators A5 , A4,3 , A4,2 ,
A4,1 then A2 , we obtain the presentation (15). Most of the details are straightforward and left to the reader, but
we now give more details on how to obtain the relations (Tvi Tvj Tvk I)6 and [(Tvi Tvj I)2 , Cσ−1 (ITv−1
Tv−1
Tv−1
)3 Ri2 Cσ ]
i
j
k
as these are not entirely straightforward.
Substituting for A2 using (5) in (6) (both from Table 6), we obtain
A4,2 = ITv−1
Tv−1
ITv−1
Tv−1
Tvk Tvi Tvj ITvi Tvj ICσ−1 Ri Cσ Tvi Tvj Tv−1
Cσ−1 Ci Cσ
i
j
i
j
k
Use the relations Cσ Tvw Cσ−1 = Tvŵ and [Ri , Tvw ] = 1 from Γ∞ (H) and the relations (2) and (3) from Table 5
to get
A4,2 = Cσ−1 ITv−1
Tv−1
ITvi ITvj Tvk ITvj Tvk Tv−1
Ri Ci Cσ
j
i
k
Use the relation (ITvi )3 = Ri Ci (which comes from eliminating A5 using (7) and (8)) to make the subsitution
ITvi I = Tv−1
ITv−1
Ri Ci .
i
i
A4,2 = Cσ−1 ITv−1
Tv−1
Tv−1
ITv−1
Ri Ci Tvj Tvk ITvj Tvk Tv−1
Ri Ci Cσ
j
i
i
i
k
Use the relations [Ci , Tvi ] = 1 and Ci Tvw Ci−1 = Tv−1
if w 6= i from Γ∞ (H) to get
w
Tv−1
Ri2 Cσ
A4,2 = Cσ−1 ITv−1
Tv−1
Tv−1
ITv−1
Tv−1
Tv−1
ITv−1
Tv−1
i
i
j
j
i
j
k
k
k
−1
−1 −1 −1 3 2
= Cσ (ITvi Tvj Tvk ) Ri Cσ
The relation (Tvi Tvj Tvk I)6 comes from substituting this expression for A4,2 in the relation (1) from Table
5. The relation [(Tvi Tvj I)2 , Cσ−1 (ITv−1
Tv−1
Tv−1
)3 Ri2 Cσ ] comes from first observing that (4) in Table 5 and (6)
i
j
k
in Table 6 are conjugate to each other by A2 . Since both are equal to A4,2 , we obtain [A2 , A4,2 ] = 1. Then to
get the relation that appears in the presentation, we substitute for A2 using (5) from Table 6 and for A4,2 using
the expression obtained above.
References
[A]
D. Allcock; New complex- and quaternion-hyperbolic reflection groups. Duke Math J. 103 (2000), no.
2, 303–333.
[Be]
M. Belolipetsky; On the volumes of arithmetic quotients of SO(1,n). Ann. Scuola Norm. Sup. Pisa Cl.
Sci. (5) III (2004), 749–770.
23
Image of vertex
Cycle of points
Relation
I0
I0
I02 = Id
A2
A2
A22 = Ri2
∞ −→ p0 −→ ∞
I0 p0 = ∞
∞ −−→ p2 −−→ ∞
A2 p 2 = ∞
A4,1
A4,1
A4,2
A4,2
A4,1 p4,1 = ∞
∞ −−−→ p4,1 −−−→ ∞
A4,2 p4,2 = ∞
∞ −−−→ p4,2 −−−→ ∞
Ri p0 = p0
Rσ p0 = p0
Ci p0 = p0
Cσ p0 = p0
Ri p2 = p2
Rσ p2 = p2
Ri p4,1 = p4,1
Rσ p4,1 = p4,1
Ri p4,2 = p4,2
Rσ p4,2 = p4,2
Ri p5 = p5
Rσ p5 = p5
Ci p4,1 = p4,1
Cσ p4,2 = p4,2
A4,1 p0 = Tvi p0
A4,1 p2 = Tv−1
p2
j
A4,2 p2 = Tvk p2
I0
Ri
I0
I0
Rσ
I0
I0
Ci
I0
I0
Cσ
I0
A24,1 = Id
−→ p0 −→ ∞
∞ −→ p0 −
∞ −→ p0 −−→ p0 −→ ∞
Rσ
A2 −1
∞ −−→ p2 −−→ p2 −−→
A4,1
Ri
A−1
4,1
A4,1
Rσ
A−1
4,1
A4,2
Ri
A−1
4,2
R
A−1
4,2
∞
[Rσ , A2 ] = Id
[Ri , A4,1 ] = Id
∞ −−−→ p4,1 −−→ p4,1 −−−→ ∞
[Rσ , A4,1 ] = Id
∞ −−−→ p4,2 −
−→ p4,2 −−−→ ∞
[Ri , A4,2 ] = Id
σ
∞ −−−→ p4,2 −−→
p4,2 −−−→ ∞
A5
Ri
A−1
5
A5
Rσ
A−1
5
[Rσ , A4,2 ] = Id
∞ −−→ p5 −
−→ p5 −−−→ ∞
[Ri , A5 ] = Id
∞ −−→ p5 −−→ p5 −−−→ ∞
A4,1
C
A−1
4,1
C
A−1
4,2
[Rσ , A5 ] = Id
i
∞ −−−→ p4,1 −→
p4,1 −−−→ ∞
A4,2
[Ci , A4,1 ] = Id
σ
∞ −−−→ p4,2 −−→
p4,2 −−−→ ∞
I
Tv−1 A4,1
i
[Cσ , A4,2 ] = Id
I
A4,1 = Tvi I0 Ri−1 Tv2i I0 Ci
0
0
∞ −→
p0 −−−−−→ p0 −→
∞
A
Tvj A4,1
A−1
2
A
Tv−1 A4,2
k
A−1
2
A4,1 = Tv−1
A2 Ri Tv−1
Tvj Ci A−1
2
j
i
2
∞ −−→
p2 −−−−−→ p2 −−−→ ∞
2
∞ −−→
p2 −−−−−→ p2 −−−→ ∞
(3)
[Ri , A2 ] = Id
∞ −−−→ p4,1 −
−→ p4,1 −−−→ ∞
A4,2
(2)
[Cσ , I0 ] = Id
A−1
2
−→ p2 −−−→ ∞
∞ −−→ p2 −
A2
[Ri , I0 ] = Id
[Ci , I0 ] = Id
∞ −→ p0 −−→ p0 −→ ∞
Ri
(1)
[Rσ , I0 ] = Id
∞ −→ p0 −→ p0 −→ ∞
A2
A24,2 = Id
A4,2 = Tvk A2 Cσ−1 Ri Cσ Tvi Tvj Tv−1
Cσ−1 Ci Cσ A−1
2
k
(4)
Table 5: Action of generators on vertices for H, degenerate cycles
[Bi]
L. Bianchi; Sui gruppi di sostituzioni lineari con coefficienti appartenenti a corpi quadratici
immaginari. Math. Ann. 40 (1892), 332–412.
[C]
E. Cartan; Sur le groupe de la géométrie hypersphérique. Comment. Math. Helv. 4 (1932), 158–171.
[CS]
J.H. Conway, D.A. Smith; On quaternions and octonions: their geometry, arithmetic and symmetry.
AK Peters (2003).
[CG]
S. Chen, L. Greenberg; Hyperbolic spaces, in Contributions to Analysis. Academic Press, New York
(1974), 49–87.
[DVV] J.P. Diaz, A. Verjovsky, F. Vlacci; Quaternionic Kleinian modular groups and arithmetic hyperbolic
orbifolds over the quaternions. arXiv:1503.07214.
[FFP] E. Falbel, G. Francsics, J. R. Parker; The geometry of the Gauss-Picard modular group. Math. Ann.
349 (2011), no. 2, 459–508.
[FP]
E. Falbel, J. R. Parker; The geometry of the Eisenstein-Picard modular group. Duke Math. J. 131
(2006), no. 2, 249–289.
24
Image of vertex
I0 p2 = Tv−1
Tv−1
p0
i
j
I0 p4,1 = Tv−2
p0
i
I0 (σ, i + j + k) = Tσ T1−1 p0
I0 p4,3 = Ti Tk Tv−2
Tv−1
Tv−2
p0
i
j
k
A2 p0 = Tvi Tvj p0
Cycle of points
A
Relation
Tvj Tvi I0
I
A2 = (I0 Tv−1
Tv−1
)2 Ri2
i
j
Tv2 I0
i
I
A4,1 = I0 Tv−2
I0 Ri Tv−1
Ci
i
i
2
0
p2 −−−−−−→ p0 −→
∞
∞ −−→
A4,1
0
∞ −−−→ p4,1 −−−→ p0 −→
∞
T I
T1 Tσ−1 I0
I
I0 T1 Tσ−1 I0 Tσ I0 = T1 Tv−1
Tv−1
Tv−1
Cσ−1
i
j
k
A4,3
Tv2 Tvj Tv2 Tk−1 Ti−1 I0
i
k
I
A4,3 = I0 Ti Tk Tv−2
Tv−1
Tv−2
I0
i
j
k
0
0
(σ, i + j + k) −−−−−→ p0 −→
∞
∞ −−σ−→
0
∞ −−−→ p4,3 −−−−−−−−−−−−−→ p0 −→
∞
I
Tv−1 Tv−1 A2
j
i
I
0
0
p0 −−−−−−−→ p0 −→
∞ −→
∞
A4,1
Tv−1 A2
i
A−1
2
A4,2
Tv−1 A2
A−1
A4,3
T −1 A2
A−1
A
Tvj Tv2 I0
i
A2 p4,1 = Tvi p2
∞ −−−→ p4,1 −−−−→ p2 −−−→ ∞
A2 p4,2 = Tvk p2
k
∞ −−−→ p4,2 −−−
−→ p2 −−2−→ ∞
A2 p4,3 = Tσ p2
σ
∞ −−−→ p4,3 −−
−−→ p2 −−2−→ ∞
I0 p5 = Tv−2
Tv−1
p0
i
j
A2 = (Tvi Tvj I0 )2
(5)
A4,1 =
−1 −1
−1
A−1
2 Tvi A2 Cσ Ri Cσ Tvi Tvj Cσ Ci Cσ
A4,2 =
(6)
−1
−1 −1
A−1
2 Tvk A2 Cσ Ri Cσ Tvi Tvj Tvk Cσ Ci Cσ
−1
−1
A4,3 = A−1
2 Tσ A2 T1 Tσ Tk Tvi Ci
I
A5 = [I0 , Tv−2
Tv−1
]
i
j
5
0
p5 −−−−−−→ p0 −→
∞
∞ −−→
A
Tv−1 Tv−2 I0
j
i
I
A2 p5 = Tv2i Tvj p0
5
0
∞ −−→
p5 −−−−−−−→ p0 −→
∞
A4,1 p5 = Tvi Tv−1
p0
j
5
i
0
∞ −−→
p5 −−−
−−−−−→ p0 −→
∞
A
Tv−1 Tvj A4,1
I
−1 3 −1
2
A5 = A−1
(8)
2 Tvi Tvj I0 Ri Tvi Tvj Ci
A5 =
−2 −2 −1
−1
−1 −1
A−1
4,1 Tvj Tvi I0 Cσ Ri Cσ Tvi Tvj Cσ Ci Cσ
Table 6: Action of generators on vertices for H, nondegenerate cycles
[GR]
H. Garland, M.S. Raghunathan; Fundamental domains for lattices in (R-)rank 1 semisimple Lie
groups. Ann. of Math. (2) 92 (1970) 279–326.
[G]
W.M. Goldman; Complex Hyperbolic Geometry. Oxford Mathematical Monographs. Oxford University
Press (1999).
[H]
R.-P.Holzapfel; Invariants of arithmetic ball quotient surfaces. Math. Nachr. 103 (1981), 117–153.
[KP]
I. Kim, J.R. Parker; Geometry of quaternionic hyperbolic manifolds. Math. Proc. Camb. Phil. Soc.
135 (2003), 291–320.
[M]
A.M. Macbeath; Groups of homeomorphisms of a simply connected space. Ann. of Math. (2) 79,
473–488.
[Ph]
Z. Philippe; Invariants globaux des espaces hyperboliques quaternioniques. PhD thesis, Université de
Bordeaux, 2016.
[P]
G. Prasad; Volumes of S-arithmetic quotients of semi-simple groups. Inst. Hautes Etudes Sci. Publ.
Math. 69 (1989), 91–117.
[PW]
J. Paupert, P. Will; Real reflections, commutators and cross-ratios in complex hyperbolic space.
Groups Geom. Dyn. 11 (2017), 311–352.
[Si]
C.L. Siegel; Discontinuous groups. Ann. of Math. (2) 44 (1943), 674–689.
[Ste]
R. Steinberg; Some consequences of the elementary relations in SLn . Cont. Math. 45 (1985), 335–350.
[Sto]
M. Stover; Volumes of Picard modular surfaces. Proc. Amer. Math. Soc. 139 (2011), no. 9, 3045–3056.
[Sw]
R.G. Swan; Generators and relations for certain special linear groups. Advances in Math. 6 (1971),
1–77.
[Y]
D. Yasaki; Integral cohomology of certain Picard modular surfaces. J. Number Theory 134 (2014),
13–28.
25
(7)
[W]
J.M. Woodward; Integral lattices and hyperbolic manifolds. PhD thesis, University of York, 2006.
[Zh]
T. Zhao; Generators for the Euclidean Picard modular groups. Trans. Amer. Math. Soc. 364 (2012),
3241–3263.
[Zi]
T Zink; Über die Anzahl der Spitzen einiger arithmetischer Untergruppen unitärer Gruppen. Math.
Nachr. 89 (1979), 315–320.
Alice Mark, Julien Paupert
School of Mathematical and Statistical Sciences, Arizona State University
[email protected], [email protected]
26
| 4math.GR
|
A Digital Neuromorphic Architecture Efficiently
Facilitating Complex Synaptic Response Functions
Applied to Liquid State Machines
Michael R. Smith∗ , Aaron J. Hill∗ , Kristofor D. Carlson∗ , Craig M. Vineyard∗ , Jonathon Donaldson∗ ,
David R. Follett† , Pamela L. Follett†‡ , John H. Naegle∗ , Conrad D. James∗ and James B. Aimone∗
arXiv:1704.08306v1 [q-bio.NC] 21 Mar 2017
∗ Sandia
National Laboratories, Albuquerque, NM 87185 USA
Email:{msmith4, ajhill, kdcarls, cmviney, jwdonal, jhnaegl, cdjame, jbaimon}@sandia.gov
† Lewis Rhodes Labs, Concord, MA 01742 USA
Email:{drfollett, plfollett}@earthlink.net
‡ Tufts University, Medford, MA 02155 USA
Abstract—Information in neural networks is represented as
weighted connections, or synapses, between neurons. This poses
a problem as the primary computational bottleneck for neural
networks is the vector-matrix multiply when inputs are multiplied
by the neural network weights. Conventional processing architectures are not well suited for simulating neural networks, often requiring large amounts of energy and time. Additionally, synapses
in biological neural networks are not binary connections, but
exhibit a nonlinear response function as neurotransmitters are
emitted and diffuse between neurons. Inspired by neuroscience
principles, we present a digital neuromorphic architecture, the
Spiking Temporal Processing Unit (STPU), capable of modeling
arbitrary complex synaptic response functions without requiring
additional hardware components. We consider the paradigm of
spiking neurons with temporally coded information as opposed to
non-spiking rate coded neurons used in most neural networks. In
this paradigm we examine liquid state machines applied to speech
recognition and show how a liquid state machine with temporal
dynamics maps onto the STPU—demonstrating the flexibility and
efficiency of the STPU for instantiating neural algorithms.
I. I NTRODUCTION
Neural-inspired learning algorithms are achieving state of
the art performance in many application areas such as speech
recognition [1], image recognition [2], and natural language
processing [3]. Information and concepts, such as a dog or
a person in an image, are represented in the synapses, or
weighted connections, between the neurons. The success of a
neural network is dependent on training the weights between
the neurons in the network. However, training the weights in a
neural network is non-trivial and often has high computational
complexity with large data sets requiring long training times.
One of the contributing factors to the computational complexity of neural networks is the vector-matrix multiplications
This work was supported by Sandia National Laboratories Laboratory
Directed Research and Development (LDRD) Program under the Hardware
Acceleration of Adaptive Neural Algorithms (HAANA) Grand Challenge
project. Sandia National Laboratories is a multi-mission laboratory managed
and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed
Martin Corporation, for the U. S. Department of Energys National Nuclear
Security Administration under Contract DE-AC04-94AL85000.
(the input vector multiplied by the synapse or weight matrix).
Conventional computer processors are not designed to process
information in the manner that a neural algorithm requires
(such as the vector-matrix multiply). Recently, major advances
in neural networks and deep learning have coincided with
advances in processing power and data access. However, we
are reaching the limits of Moore’s law in terms of how much
more efficiency can be gained from conventional processing
architectures. In addition to reaching the limits of Moore’s
law, conventional processing architectures also incur the von
Neumann bottleneck [4] where the processing unit’s program
and data memory exist in a single memory with only one
shared data bus between them.
In contrast to conventional processing architectures which
consist of a powerful centralized processing unit(s) that operate(s) in a mostly serialized manner, the brain is composed of
many simple distributed processing units (neurons) that are
sparsely connected and operate in parallel. Communication
between neurons occurs at the synaptic connection which
operate independently of the other neurons that are not involved in the connection. Thus, vector-matrix multiplications
are implemented more efficiently facilitated by parallel operations. Additionally, the synaptic connections in the brain are
generally sparse and information is encoded in a combination
of the synaptic weights and the temporal latencies of a spike
on the synapse [5]. Biological synapses are not simply a
weighted binary connection but rather exhibit a non-linear
synaptic response function due to the release and dispersion
of neurotransmitters in the space between neurons.
Biological neurons communicate using simple “data packets,” that are generally accepted as binary spikes. This is in
contrast to the neuron models used in traditional artificial neural networks (ANN) which are commonly rate coded neurons.
Rate coded neurons encode information between neurons as
a real-valued magnitude of the output of a neuron—a larger
output represents a higher firing rate. The use of rate coded
neurons stems from the assumption that the firing rate of a
Fig. 1. High level overview of the STPU. The STPU is composed of a set of leaky integrate and fire neurons. Each neuron has an associated temporal buffer
such that inputs can be mapped to a neuron with a time delay. W(t) is the neuronal encoding transformation which addresses connectivity, efficacy and
temporal shift. The functionality of the STPU mimics the of functionality of biological neurons.
neuron is the most important piece of information, whereas
temporally coded neurons encode information based on when
a spike from one neuron arrives at another neuron. Temporally
coded information has been shown to be more powerful than
rate coded information and more biologically accurate [6] .
Based on these neuroscience principles, we present the Spiking Temporal Processing Unit (STPU), a novel neuromorphic
hardware architecture designed to mimic neuronal functionality and alleviate the computational restraints inherent in conventional processors. Other neuromorphic architectures have
shown very strong energy efficiency [7], powerful scalability
[8], and aggressive speed-up [9] by utilizing the principles observed in the brain. We build upon these efforts leveraging the
benefits of low energy consumption, scalability, and run time
speed ups and include an efficient implementation of arbitrarily
complex synaptic response functions in a digital architecture.
This is important as the synaptic response function has strong
implications in spiking recurrent neural networks [10].
We also examine liquid state machines (LSMs) [11] to show
how the constructs available in the STPU facilitate complex
dynamical neuronal systems. While we examine the STPU in
the context of LSMs, the STPU is a general neuromorphic
architecture. Other spiked-based algorithms have been implemented on the STPU [12], [13].
In Section II, we present the STPU. A high level comparison
with other neuromorphic architectures is presented in Section
III. We present LSMs in Section IV. In Section V, we examine
how LSMs map onto the STPU and show results from running
the LSM on the STPU. We conclude in Section VI.
II. T HE S PIKING T EMPORAL P ROCESSING U NIT
In this section, we describe the Spiking Temporal Processing
Unit (STPU) and how the components in the STPU map
to functionality in biological neurons. The design of the
STPU is based on the following three neuroscience principles
observed in the brain: 1) the brain is composed of simple
processing units (neurons) that operate in parallel and are
sparsely connected, 2) each neuron has its own local memory for maintaining temporal state, and 3) information is
encoded in the connectivity, efficacy, and signal propagation
characteristics between neurons. A high-level overview of a
biological neuron and how its components map onto the STPU
are shown in Figure 1. The STPU derives its dynamics from
the leaky integrate and fire (LIF) neuron model [14]. Each
LIF neuron j maintains a membrane potential state variable,
vj , that tracks its stimulation at each time step based on the
following differential equation [10]:
dvj
vj X X
=− +
wkj · s(t − tkl − ∆kl ).
(1)
dt
τj
k
l
The variable τj is the time constant of the first-order dynamics,
k is the index of the presynaptic neuron, wkj is the weight
connecting neuron j to neuron k, tkl is the time of the lth spike
from neuron k, ∆kl is the synaptic delay from neuron k on the
lth spike, and s(·) is the dynamic synaptic response function
to an input spike. In the LIF model, neuron j will fire if vj
exceeds a threshold θj . The synapses between input neurons
to destination neurons are defined in the weight matrix W(t)
for a given time t as the weights between inputs and neurons
can change over time.
Unique to the STPU, each LIF neuron has a local temporal
memory buffer R composed of D memory cells to model
synaptic delays. When a biological neuron fires, there is a
latency associated with the arrival of the spike at the soma of
the postsynaptic neuron due to the time required to propagate
down the axon of the presynaptic neuron and the time to
propagate from the dendrite to the soma of the postsynaptic
neuron (∆kl ). The temporal buffer represents different synaptic
junctions in the dendrites where a lower index value in the
temporal buffer constitutes a dendritic connection closer to the
soma and/or a shorter axon length than one with a larger index
value. Thus, synapses in the STPU are specified as a weight
wkjd from a source input neuron k, to a destination neuron j in
the dth cell of the temporal buffer, d ∈ {0, 1, 2, . . . , D − 1}.
This allows multiple connections between neurons with different synaptic delays. At each time step a summation of
the product of the inputs i(t) and synaptic weights W(t)
occurs and is added to the current value
P in that position of
the temporal buffer R̂d (t) = Rd (t) + k ik (t)wkjd (t) where
R̂(t) is a temporary state of the temporal buffer. The value
in each cell of the temporal buffer is then shifted down one
position, that is Rd (t+1) = R̂d−1 (t). The values at the bottom
of the buffer are fed into the LIF neuron.
In biological neurons, when a neuron fires a (near) binary
spike is propagated down the axon to the synapse, which
defines a connection between neurons. The purpose of the
synapse is to transfer the electric activity or information from
one neuron to another neuron. Direct electrical communication
does not take place, rather a chemical mediator is used. In the
presynaptic terminal, an action potential from the emitted spike
causes the release of neurotransmitters into the synaptic cleft
(space between the pre and postsynaptic neurons) from the
synaptic vescles. The neurotransmitters cross the synaptic cleft
and attach to receptors on the postsynaptic neuron injecting
a positive or negative current into the postsynaptic neuron.
Through a chemical reaction, the neurotransmitters are broken
down in receptors on the postsynaptic neuron and are released
back into the synaptic cleft where the presynaptic neuron
reabsorbs the broken down molecules to synthesize new neurotransmitters. In terms of electrical signals, the propagation
of activation potentials on the axon is a digital signal as shown
in Figure 2. However, the chemical reactions that occur at the
synapse to release and reabsorb neurotransmitters are modeled
as an analog signal.
The behavior of the synapse propagating spikes between
neurons has important ramifications on the dynamics of the
liquid. In Equation 1, the synaptic response function is represented by s(·). Following Zhang et al. [10], the Dirac delta
function δ(·) can be used as the synaptic response function
and is convenient for implementation on digital hardware.
However, the Dirac delta function exhibits static behavior.
Zhang et al. show that dynamical behavior can be modeled in
the synapse by using the first-order response to a presynaptic
spike:
1 − t−tkls−∆kl
τ
e
· H(t − tkl − ∆kl )
(2)
τs
where τ s is the time constant of the first-order response, H(·)
is the Heaviside step function, and 1/τ s normalizes the firstorder response function. The dynamical behavior can also be
implemented using a second-order dynamic model for s(·):
t−tkl −∆kl
t−tkl −∆kl
1
−
−
s
s
τ1
τ2
(e
−
e
) · H(t − tkl − ∆kl ) (3)
τ1s − τ2s
Fig. 2. Spike propagation along the axon and across the synapse. The spike
propagated on the axon is generally accepted as a binary spike. Upon arrival
at the synapse, the spike initiates a chemical reaction in the synaptic cleft
which stimulates the postsynaptic neuron. This chemical reaction produces
an analog response that is fed into the soma of the postsynaptic neuron. In
the STPU, arbitrary synaptic response functions are modeled efficiently using
the temporal buffer. The synaptic response function is discretely sampled and
encoded into the weights connecting one neuron to another and mapped to
the corresponding cells in the temporal buffer.
where τ1s and τ2s are the time constants for the second
order response and 1/(τ1s − τ2s ) normalizes the second-order
dynamical response function. Zhang et al. showed significant
improvements in accuracy and the dynamics of the liquid when
using these dynamical response functions.
Implementing exponential functions in hardware is expensive in terms of the resources needed to implement exponentiation. Considering that the STPU is composed of
individual parallel neuronal processing units, each neuron
would need its own exponentiation functionality. Including the
hardware mechanisms for each neuron to do exponentiation
would significantly reduce the number of neurons by orders
of magnitude as there are limited resources on an FPGA.
Rather than explicitly implement the exponential functions in
hardware, we use the temporal buffer associated with each
neuron. The exponential function is discretely sampled and
the value at each sample is assigned a connection weight
wkjd from the presynaptic neuron k to the corresponding
cell d in the temporal buffer of the postsynaptic neuron j.
Thus, a single weighted connection between two neurons is
expanded to multiple weighted connections between the same
two neurons. This is shown graphically in Figure 2. The use
of the temporal buffer allows for an efficient implementation
of the digital signal propagation down the axon of a neuron or
TABLE I
H IGH - LEVEL C OMPARISON OF THE STPU WITH T RUE N ORTH AND S PI NNAKER .
Platform:
STPU
TrueNorth
SpiNNaker
Interconnect:
Neuron Model:
Synapse Model:
3D mesh multicast1
LIF
Programmable4
2D mesh unicast
LIF2
Binary
2D mesh multicast
Programmable3
Programmable5
1 The 3D mesh is enabled due to the temporal buffer available for each neuron in STPU.
2 TrueNorth provides a highly programmable LIF to facilitate additional neural dynamics.
3 SpiNNaker provides flexibility for the neuron model, however more complex biological models
4 The synapse model
5 As with the neuron
are more computationally expensive.
is programmable in the STPU via the temporal buffer by discretely sampling an arbitrary synapse model.
model, SpiNNaker is optimized for simpler synaptic models. More complex synaptic models incur a cost in computational complexity.
the analog signal propagation between neurons at the synapse.
III. C OMPARISON WITH OTHER N EUROMORPHIC
A RCHITECTURES
The STPU is not the first neuromorphic architecture. Four
prominent neuromorphic architectures are IBM’s TrueNorth
chip [7], the Stanford Neurogrid [15], the Heidelberg BrainScaleS machine [16] and the Manchester Spiking Neural Network Architecture (SpiNNaker) [17]. The Stanford Neurogrid
and the Heidelberg BrainScaleS are analog circuits while
TrueNorth and SpiNNaker are digital circuits. As the STPU
is also a digital system, we will focus on a comparison with
TrueNorth and SpiNNaker.
The TrueNorth chip leverages a highly distributed crossbar based architecture designed for high energy-efficiency
composed of 4096 cores. The base-level neuron is a highly
parametrized LIF neuron. A TrueNorth core is a 256 × 256
binary crossbar where the existence of the synapse is encoded
at each junction, and individual neurons assign weights to
particular sets of input axons. The crossbar architecture allows
for efficient vector-matrix multiplication. TrueNorth only allows for point-to-point routing. Each of the 256 neurons on
a core is programmed with a spike destination addressed to a
single row on a particular core which could be the same core,
enabling recurrence, or a different core. The crossbar inputs
are coupled via delay buffers to insert axonal delays. A neuron
is not natively able to connect to multiple cores or to connect
to a single neuron with different temporal delays. As a work
around, a neuron is to be replicated within the same core and
mapped to the different cores. For multiple temporal delays
between two neurons (such as those in the STPU), there is no
obvious mechanism for an implementation [18].
SpiNNaker is a massively parallel digital computer composed of simple ARM cores with an emphasis on flexibility.
Unlike the STPU and TrueNorth, SpiNNaker is able to model
arbitrary neuron models via an instruction set that is provided
to the ARM core. SpiNNAker is designed for sending large
numbers of small data packages to many destination neurons.
While SpiNNaker was designed for modeling neural networks,
it could potentially be used more generally due to its flexibility.
The STPU architecture falls in between the TrueNorth
and SpiNNaker architectures. The STPU implements a less
parameterized LIF neuron than TrueNorth, however, its routing
of neural spikes is more flexible and allows a multicast similar
to SpiNNaker rather than the unicast used in TrueNorth. A
key distinguishing feature of the STPU is the temporal buffer
associated with each neuron, giving the STPU 3-dimensional
routing. A high-level summary of the comparison of STPU
with TrueNorth and SpiNNaker is shown in Table I.
IV. L IQUID S TATE M ACHINES
The liquid state machine (LSM) [11] is a neuro-inspired
algorithm that mimics the cortical columns in the brain.
It is conjectured that the cortical microcircuits nonlinearly
project input streams into a high-dimensional state space.
This high-dimension representation is then used as input to
other areas in the brain where learning can be achieved. The
cortical microcircuits have a sparse representation and fading
memory—the state of the microcircuit “forgets” over time.
While LSMs may be able to mimic certain functionality in
the brain, it should be noted that LSMs do not try to explain
how or why the brain operates as it does.
In machine learning, LSMs are a variation of recurrent neural networks that fall into the category of reservoir computing
(RC) [19] along with echo state networks [20]. LSMs differ
from echo state machines in the type of neuron model used.
LSMs use spiking neurons while echo state machines use rate
coded neurons with a non-linear transfer function.
LSMs operate on temporal data composed of multiple
related time steps. LSMs are composed of three general
components: 1) input neurons, 2) randomly connected leakyintegrate and fire spiking neurons called the liquid, and 3)
readout nodes that read the state of liquid. A diagram of an
LSM is shown in Figure 3. Input neurons are connected to
a random subset of the liquid neurons. The readout neurons
may be connected to all the neurons in the liquid or a subset
of them. Connections between neurons in the liquid are based
on probabilistic models of brain connectivity [11]:
Pconnection (N1 , N2 ) = q · e−
E(N1 ,N2 )
r2
(4)
where N1 and N2 represent two neurons and E(N1 , N2 ) is
the Euclidean distance between N1 and N2 . The variables q
and r are two chosen constants. In this paper, we use a 3dimensional grid to define the positions of neurons on the
liquid. The liquid functions as a temporal kernel, casting the
input data into a higher dimension. The LIF neurons allow
for temporal state to be carried from one time step to another.
LSMs avoid the problem of training recurrent neural models
V. M APPING THE LSM ONTO THE STPU
Fig. 3. A liquid state machine, composed of three components: 1) a set of
input neurons, 2) the liquid—a set of recurrent spiking neurons, and 3) a set
of readout neurons with plastic synapses that can read the state of the neurons
in the liquid.
TABLE II
PARAMETERS FOR THE SYNAPSES ( OR CONNECTIONS BETWEEN
NEURONS ) IN THE LIQUID .
Parameter
type
r from Equation 4
ALL
value
q from Equation 4
E→E
E→I
I→E
I→I
0.45
0.30
0.60
0.15
Synaptic weight
E→E
E→I
I→E
I→I
3
6
-2
-2
2
by only training the synaptic weights from the liquid to the
readout nodes, similar to extreme machine learning that use
a random non-recurrent neural network for non-temporal data
[21]. It is assumed that all temporal integration is encompassed
in the liquid. Thus, the liquid in an LSM acts similarly to
the kernel in a support vector machine on streaming data
by employing a temporal kernel. In general, the weights and
connections in the liquid do not change, although some studies
have looked at plasticity in the liquid [22].
The readout neurons are the only neurons that have plastic
synapses, allowing for synaptic weight updates via training.
Using each neurons firing state from the liquid, the temporal
aspect of learning on temporal data is transformed to a static
(non-temporal) learning problem. As all temporal integration
is done in the liquid, no additional mechanisms are needed to
train the readout neurons. Any classifier can be used, but often
a linear classifier is sufficient. Training of the readout neurons
can be done in a batch or on-line manner [10].
LSMs have been successfully applied to several applications
including speech recognition [10], vision [23], and cognitive
neuroscience [11], [24]. Practical applications suffer from the
fact that traditional LSMs take input in the form of spike trains.
Transforming numerical input data into spike data, such that
the non-temporal data is represented temporally, is nontrivial.
In this section, we implement the LSM on the STPU. There
have been previous implementations of LSMs on hardware,
however, in most cases an FPGA or VLSI chip has been
designed specifically for a hardware implementation of an
LSM. Roy et al. [25] and also Zhang et al. [10] present
a low-powered VLSI hardware implementation of an LSM.
Schrauwen et al. [26] implement an LSM on an FPGA chip.
In contrast to other work, the STPU has been developed to
be a general neuromorphic architecture. Other neuroscience
work and algorithms are being developed against the STPU
such as spike sorting and using spikes for median filtering
[13]. Currently, we have an STPU simulator implemented in
MATLAB as well as an implementation on an FGPA chip. The
MATLAB simulator has a one-to-one correspondence with the
hardware implementation.
Given the constructs provided by the STPU, the LSM with
a liquid composed of LIF neurons maps naturally onto the
STPU. We use the second-order synaptic response function of
Equation 3 that is based on the work of Zhang et al. [10].
They found that the second-order response function produced
more dynamics in the liquid allowing the neural signals to
persist longer after the input sequence had finished. This lead
to improved classification results. Following Zhang et al., the
synaptic properties of the liquid, including parameters for the
connection probabilities between the liquid neurons defined in
Equation 4 and the synaptic weights, are given in Table II.
There are two types of neurons: excitatory (E) and inhibitory
(I). As has been observed in the brain [11], the liquid is
made up of an 80/20 network where 80% of the nuerons
are excitatory and 20% of the neurons are inhibitory. The
probability of a synapse existing between two neurons and
the weights between the neurons is dependent on the types of
the considered neurons. E/I → E/I denotes the presynaptic
and postsynaptic neurons being connected by the synapse. For
example, E → I denotes the connection between an excitatory
presynaptic neuron with an inhibitory postsynaptic neuron.
Excitatory neurons increase the action potential at a target
neurons (positive synaptic weights) while the inhibitory neurons decrease the action potential (negative synaptic weights).
When the connections are generated between neurons in the
liquid, the neurons are randomly connected according to
Equation 4 with the parameters given in Table II. Each input
neuron is randomly connected to a subset of 30% of the
neurons in the liquid with a weight of 8 or -8 chosen uniformly
at random.
To implement the second-order synaptic response function,
Equation 3 is sampled at discrete time steps and multiplied by
the synaptic weight value between the neurons as specified in
Table II. The discretely sampled weights are then encoded via
multiple weights at corresponding cells in the temporal buffer
for the postsynaptic neuron. In this implementation, there is
no synaptic delay (∆kl = 0) and τ1s is set to 4 and τ2s is set
to 8 for excitatory neurons. For inhibitory neurons, τ1s and τ2s
are set to 4 and 2 respectively. For all neurons, τj is set to 32.
TABLE III
S EPARATION VALUES , AVERAGE SPIKING RATES , AND CLASSIFICATION
ACCURACY FROM DIFFERENT SYNAPTIC RESPONSE FUNCTIONS .
Synaptic Res
TrainSep
TrainRate
TestSep
TestRate
SVM
A. Experiments
Dirac Delta
First-Order
Second-Order
0.129
0.251
0.263
0.931
0.845
0.261
0.139
0.277
0.290
0.931
0.845
0.255
0.650
0.797
0.868
First-Order 30
First-Order 40
First-Order 50
0.352
0.293
0.129
0.689
0.314
0.138
0.389
0.337
0.134
0.688
0.314
0.138
0.811
0.817
0.725
To evaluate the effect of different parameters for the liquid
state machine, we use a data set for spoken digit recognition
of Arabic digits from 0 to 9 [27]. The dataset is composed of
the time series Mel-frequency cepstral coefficients (MFCCs)
of 8800 utterances of each digit from 88 speakers on with 10
repetitions per digit (10 × 10 × 88). The MFCCs were taken
from 44 male and 44 female native Arabic speakers between
the ages of 18 and 40. The dataset is partitioned into a training
set from 66 speakers and a test set from the other 22 speakers.
We scale all variables between 0 and 1.
To evaluate the performance of the LSM, we examine
the classification accuracy on the test set, and measure the
separation in the liquid from the training set. If there is good
separation within the liquid, then the state vectors from the
trajectories for each class should be distinguishable from each
other. To measure the separability of a liquid Ψ on a set of
state vectors O from the liquid perturbed by a given input
sequence, we follow the definition from Norton and Ventura
d
where cd is the inter-class distance
[22]: Sep(Ψ, O) = cvc+1
and cv is the intra-class variance. Separation is the ratio of the
distance between the classes divided by the class variance.
The inter-class difference is the mean difference of
the
mass for every pair of classes: cd =
Pn center
Pn ofkµ(O
l )−µ(Om )k2
where k·k2 is the L2 norm, n is
l=1
m=1
n2
the number of classes, and µ(Ol ) is the center of mass for each
class. For a given class, the intra-class variance is the mean
variance of the state vectors from thePinputs from the center
Pn
kµ(Ol )−ok k2
of mass for that class: cv = n1 l=1 ok ∈Ol |Ol |
.
We investigate various properties of the liquid state machine, namely the synaptic response function, the input encoding scheme, the liquid topology, and the readout training algorithm. We also consider the impact of θj on the
liquid. A neuron j will spike if vj exceeds θj . Thus, θj
can have a significant impact on the dynamics of the liquid. Beginning with a base value of 20 (as was used by
Zhang et al.) we consider the effects of decreasing values
of θj ∈ {20, 17.5, 15, 12.5, 11, 10, 9, 7.5, 5, 3, 2.5, 2, 1}. For
default parameters, we use a reservoir of size 3 × 3 × 15, we
feed the the magnitude of the inputs into the input neurons
(current injection) and a linear SVM to train the synapses for
the readout neurons.
1) Synaptic Response Functions: We first investigate the
effect of the synaptic response function using default parameters. Using θj = 20, the average separation values, average
spiking rates and the classification accuracy of a linear SVM
are given in Table III. As highlighted in bold, the second-order
synaptic function (Equation 3) achieves the largest separation
values for training and testing, the lowest average spike rate,
and the highest classification accuracy. The average spike rate
is significantly higher for the first-order response function
response val
The plastic readout neurons are connected to all of the
neurons in the liquid. Training is done off-line using a linear
classifier on the average firing rate of the neurons in the liquid.
We examine the effect of the various linear classifiers below.
0.2
First-Order
Second-Order
0.1
0
0
5
10
15
20
time
25
30
35
Fig. 4. Visualization of the first- and second-order response functions.
than for the second-order response function, which is counterintuitive since the second-order response function perpetuates
the signal through the liquid longer. However, examining the
first-order and second-order response functions, as shown in
Figure 4, shows that the first-order response function has a
larger initial magnitude and then quickly subsides. The secondorder response function has a lower initial magnitude, but is
slower to decay giving a more consistent propagation of the
spike through time.
Adjusting the value of θj to 30, 40, and 50 accommodate
this behavior for the first-order response function (the bottom
three rows int he Table III) shows that an improvement can be
made in the separation values, spiking rate, and classification
accuracy. Despite this improvement, the first-order response
function does not achieve a better performance than the
second-order response function for the classification accuracy.
The first-order response function does get a better separation
score, but this does not translate into better accuracy.
2) Input Encoding Schemes: In traditional LSMs, the input
is temporally encoded in the form of a spike train. Unfortunately, most datasets are not temporally encoded, but
rather are numerically encoded. A spike train input aligns
with neuroscience, but practically it is non-trivial to encode
all information temporally as the brain does. Therefore, we
examine three possible encoding schemes: 1) rate encoding
where the magnitude of the numeric value is converted into
a rate and a spike train at that rate is fed into the liquid 2)
bit encoding where the magnitude of the numeric value is
converted into its bit representation at a given precision, and
3) current injection. Rate encoding requires n time steps to
encode a single input by converting a magnitude to a rate.
This is similar to binning and has some information loss. Bit
encoding, only requires one time step, however, it requires
m inputs per standard input to convert the magnitude into its
TABLE IV
T HE SEPARATION VALUES , AVERAGE SPIKING RATES OF THE LIQUID , AND
CLASSIFICATION ACCURACY EXAMINING LIQUID TOPOLOGIES WITH
DIFFERENT INPUT ENCODING SCHEMES AND VALUES FOR θj . T HE
LARGEST SEPARATION VALUES AND ACCURACIES FOR EACH ENCODING
SCHEME ARE IN BOLD
θj
Encoding Scheme
20
15
10
5.5
3
TABLE V
T HE SEPARATION VALUES AND AVERAGE SPIKE RATE OF THE LIQUID
USING DIFFERENT LIQUID TOPOLOGIES . T HE LARGEST SEPARATION
VALUES AND ACCURACIES FOR EACH TOPOLOGY ARE IN BOLD
Topology/
Num Neurons
θj :
2
Current Injection
0.263
0.261
0.868
0.409
0.580
0.905
0.378
0.750
0.894
0.334
0.843
0.873
0.324
0.873
0.868
0.324
0.878
0.866
Bit Encoding
0.271
0.434
0.741
0.310
0.497
0.741
0.338
0.544
0.735
0.350
0.592
0.755
0.353
0.634
0.764
0.357
0.620
0.761
Rate Encoding
0.164
0.146
0.747
0.364
0.199
0.733
0.622
0.594
0.643
0.197
0.952
0.601
0.047
0.985
0.548
0.048
0.985
0.558
m bit-precise representation. We set m to 10. Compared to
current injection, the execution time increases linearly in the
number of time steps for rate encoding.
Table IV shows the separation values (first row for each
encoding scheme), average spiking rates (second row), and the
accuracy from a linear SVM on the test set (third row) for the
input encoding schemes with various values of θj . The average
spiking rate gives the percentage of neurons that were firing
in the liquid through the time series and provides insight into
how sparse the spikes are within the liquid. Table IV shows
a representative subset of the values that were used for θj .
The bold values represent the highest separation value and
classification accuracy for each encoding scheme.
The results show that the value of θj has a significant effect
on the separation of the liquid as well as the classification
accuracy from the SVM. This is expected as the dynamics of
the liquid are dictated by when neurons fire. A lower threshold
allows for more spikes as is indicated in the increasing values
of the average spiking rates as the values for θj decrease.
Overall, using rate encoding produces the greatest values in
separation. However, there is significant variability as the
values for θj change. For rate encoding, the greatest accuracy
from the SVM is achieved with a low separation value. In the
other encoding schemes, separation and classification accuracy
appear to be correlated. The greatest classification accuracy is
achieved from current injection.
3) Liquid Topology: The topology of the liquid in an LSM
determines the size of the liquid and influences the connections
within the liquid as the distance between the neurons impacts
the connections made between neurons. A more cubic liquid
(e.g. 5×5×5) should be more densely connected compared to
a column of liquid (e.g. 2×2×20). In this section, we examine
using liquids with grids of 3 × 3 × 15, 2 × 2 × 20, 4 × 5 × 20,
and 5 × 5 × 5. As before, we consider different values for θj .
The separation values, average spike rates, and the accuracy
from a linear SVM are given in Table V for the values of θj
that provided the largest separation values for each topology
configuration and encoding scheme combination.
3x3x15/135
θj :
5x5x5/125
θj :
4x5x10/200
θj :
2x2x20/80
Current Injection
Encoding Scheme
Bit Encoded
Rate Encoded
15
12.5
3
2
11
10
0.409
0.580
0.905
0.405
0.693
0.884
0.353
0.634
0.764
0.357
0.620
0.761
0.622
0.563
0.658
0.622
0.594
0.643
12.5
11
3
2
10
9
0.467
0.534
0.889
0.432
0.682
0.900
0.384
0.596
0.765
0.380
0.586
0.755
0.384
0.473
0.637
0.451
0.600
0.610
15
12.5
15
12.5
15
12.5
0.418
0.698
0.879
0.384
0.760
0.876
0.506
0.576
0.830
0.501
0.603
0.835
0.479
0.289
0.644
0.352
0.577
0.612
11
10
3
2
10
9
0.397
0.608
0.903
0.389
0.658
0.912
0.264
0.537
0.672
0.247
0.550
0.666
0.305
0.609
0.695
0.255
0.846
0.678
Again, the value for θj has a significant impact on the
separation of the liquid and the classification accuracy. The
greatest separation values and classification accuracies for each
topology is highlighted in bold. For all of the topologies,
current injection achieves the highest classification accuracy.
Interestingly, the separation values across encoding schemes
and topologies do not correlate with accuracies. Within the
same encoding scheme and topology, however, the accuracy
generally improves as the separation increases.
For current injection, the different topologies do not appear
to have a significant impact on the classification accuracy
except for the 4 × 5 × 10 topology which has a decrease in
accuracy. This may be due to increased number of liquid nodes
that are used as input to the SVM. The converse is true for
bit encoding as the 4 × 5 × 10 topology achieves the highest
accuracy possibly due to the increased number of inputs due
to the bit representation of the input.
4) Readout Training Algorithms: How the plastic synapses
are trained will have a significant effect on the performance of
the LSM. Traditionally, LSMs use a linear classifier based on
the assumption that the liquid has transformed the state space
such that the problem is linearly separable. Linear models are
represented as a set of weights and a threshold—which can
be implemented in neuromorphic hardware. By using a linear
model, the liquid and the classification can all be done on
the STPU avoiding the overhead of going off chip to make a
prediction. We consider four linear classifiers: 1) linear SVM,
2) linear discriminant analysis (LDA), 3) ridge regression, and
4) logistic regression. With each of these algorithms, we use
the default parameters as they are set in the Statistics and
Machine Learning Toolbox in MATLAB.
We examine the classification of each of the linear classifiers
TABLE VI
C LASSIFICATION ACCURACY ON THE TEST SET FROM DIFFERENT LINEAR
CLASSIFIERS . T HE GREATEST ACCURACY FOR EACH TOPOLOGY IS IN
BOLD
Linear Model:
Linear SVM
LDA
Ridge Regress
Logistic Regress
3 × 3 × 15
θj = 15
5×5×5
θj = 11
4 × 5 × 10
θj = 15
2 × 2 × 20
θj = 10
0.906
0.921
0.745
0.431
0.900
0.922
0.717
0.254
0.900
0.922
0.717
0.254
0.914
0.946
0.897
0.815
on the topologies and θj values that achieved the highest classification accuracy on the linear SVM in previous experiments.
We also limit ourselves to examining current injection for the
input scheme as current injection consistently achieved the
highest classification accuracy. The results are shown in Table
VI. LDA consistently achieves the highest classification accuracy of the considered classifiers. The highest classification
accuracy achieved is 0.946.
VI. C ONCLUSION AND F UTURE W ORK
In this paper, we presented the Spiking Temporal Processing
Unit or STPU—a novel neuromorphic processing architecture.
It is well suited for efficiently implementing neural networks
and synaptic response functions of arbitrary complexity. This
is facilitated by using the temporal buffers associated with
each neuron in the architecture. The capabilities of the STPU,
including complex synaptic response functions, were demonstrated through implementing the functional mapping and
implementation of an LSM onto the STPU architecture.
As neural algorithms grow in scale and conventional processing units reach the limits of Moore’s law, neuromorphic
computing architectures, such as the STPU, allow efficient
implementations of neural algorithms. However, neuromorphic
hardware is based on spiking neural networks to achieve low
energy. Thus, more research is needed to understand and
develop spiking-based algorithms.
R EFERENCES
[1] L. Deng, G. E. Hinton, and B. Kingsbury, “New types of deep neural
network learning for speech recognition and related applications: an
overview,” in Proceedings of International Conference on Acoustics,
Speech, and Signal Processing (ICASSP), 2013, pp. 8599–8603.
[2] D. Ciresan, U. Meier, and J. Schmidhuber, “Multi-column deep neural
networks for image classification,” in Proceedings of the 2012 IEEE
Conference on Computer Vision and Pattern Recognition.
IEEE
Computer Society, 2012, pp. 3642–3649.
[3] R. Socher, A. Perelygin, J. Wu, J. Chuang, C. D. Manning, A. Ng,
and C. Potts, “Recursive deep models for semantic compositionality
over a sentiment treebank,” in Proceedings of the 2013 Conference on
Empirical Methods in Natural Language Processing. Association for
Computational Linguistics, October 2013, pp. 1631–1642.
[4] J. Backus, “Can programming be liberated from the von neumann style?:
A functional style and its algebra of programs,” Communications of the
ACM, vol. 21, no. 8, pp. 613–641, Aug. 1978.
[5] P. L. Follett, C. Roth, D. Follett, and O. Dammann, “White matter
damage impairs adaptive recovery more than cortical damage in an in
silico model of activity-dependent plasticity,” Journal of Child Neurology, vol. 24, no. 9, pp. 1205–1211, 2009.
[6] T. J. Sejnowski, “Time for a new neural code?” Nature, vol. 376, no.
6535, pp. 21–22, Jul. 1995.
[7] P. Merolla, J. Arthur, R. Alvarez-Icaza, A. Cassidy, J. Sawada,
F. Akopyan, B. Jackson, N. Imam, C. Guo, Y. Nakamura, B. Brezzo,
I. Vo, S. Esser, R. Appuswamy, B. Taba, A. Amir, M. Flickner, W. Risk,
R. Manohar, and D. Modha, “A million spiking-neuron integrated circuit
with a scalable communication network and interface,” Science, pp. 668–
673, August 2014.
[8] S. B. Furber, D. R. Lester, L. A. Plana, J. D. Garside, E. Painkras,
S. Temple, and A. D. Brown, “Overview of the spinnaker system
architecture,” IEEE Transactions on Computers, vol. 62, no. 12, pp.
2454–2467, 2013.
[9] J. Schemmel, J. Fieres, and K. Meier, “Wafer-scale integration of analog
neural networks,” in IEEE International Joint Conference on Neural
Networks, june 2008, pp. 431 –438.
[10] Y. Zhang, P. Li, Y. Jin, and Y. Choe, “A digital liquid state machine with
biologically inspired learning and its application to speech recognition,”
IEEE Transactions on Neural Networks and Learning Systems, vol. 26,
no. 11, pp. 2635–2649, 2015.
[11] W. Maass, T. Natschläger, and H. Markram, “Real-time computing
without stable states: A new framework for neural computation based
on perturbations,” Neural Computation, vol. 14, no. 11, pp. 2531–2560,
Nov. 2002.
[12] S. J. Verzi, C. M. Vineyard, E. D. Vugrin, M. Galiardi, C. D. James, and
J. B. Aimone, “Optimization-based computation with spiking neurons,”
in Proceedings of the IEEE International Joint Conference on Neural
Network, 2017, p. Accepted.
[13] S. J. Verzi, F. Rothganger, O. D. Parekh, T.-T. Quach, N. E. Miner, C. D.
James, and J. B. Aimone, “Computing with spikes: The advantage of
fine-grained timing,” submitted.
[14] P. Dayan and L. F. Abbott, Theoretical neuroscience : computational
and mathematical modeling of neural systems, ser. Computational neuroscience. Cambridge (Mass.), London: MIT Press, 2001.
[15] B. V. Benjamin, P. Gao, E. McQuinn, S. Choudhary, A. Chandrasekaran,
J.-M. Bussat, R. Alvarez-Icaza, J. Arthur, P. Merolla, and K. Boahen,
“Neurogrid: A mixed-analog-digital multichip system for large-scale
neural simulations,” Proceedings of the IEEE, vol. 102, no. 5, pp. 699–
716, 2014.
[16] J. Schemmel, D. Briiderle, A. Griibl, M. Hock, K. Meier, and S. Millner,
“A wafer-scale neuromorphic hardware system for large-scale neural
modeling,” in Proceedings of 2010 IEEE International Symposium on
Circuits and Systems, May 2010, pp. 1947–1950.
[17] S. Furber, F. Galluppi, S. Temple, and L. A. Plana, “The spinnaker
project,” Proceedings of the IEEE, vol. 102, no. 5, pp. 652–665, 2014.
[18] W. Severa, K. D. Carlson, O. Parekh, C. M. Vineyard, and J. B. Aimone,
“Can we be formal in assessing the strengths and weaknesses of neural
architectures? A case study using a spiking cross-correlation algorithm,”
in NIPS Workshop Computing with Spikes, 2016.
[19] M. Lukoševičius and H. Jaeger, “Reservoir computing approaches to
recurrent neural network training,” Computer Science Review, vol. 3,
no. 3, pp. 127–149, August 2009.
[20] H. Jaeger, “Adaptive nonlinear system identification with echo state
networks,” in Advances in Neural Information Processing Systems 15.
MIT Press, 2003, pp. 609–616.
[21] G. B. Huang, Q. Y. Zhu, and C. K. Siew, “Extreme learning machine:
theory and applications,” Neurocomputing, vol. 70, no. 1-3, pp. 489–501,
2006.
[22] D. Norton and D. Ventura, “Improving liquid state machines through
iterative refinement of the reservoir,” Neurocomputing, vol. 73, no. 1618, pp. 2893–2904, 2010.
[23] H. Burgsteiner, M. Kröll, A. Leopold, and G. Steinbauer, “Movement
prediction from real-world images using a liquid state machine,” Applied
Intelligence, vol. 26, no. 2, pp. 99–109, 2007.
[24] D. Buonomano and W. Maass, “State-dependent computations: Spatiotemporal processing in cortical networks,” Nature Reviews Neuroscience, vol. 10, no. 2, pp. 113–125, 2009.
[25] S. Roy, A. Banerjee, and A. Basu, “Liquid state machine with dendritically enhanced readout for low-power, neuromorphic VLSI implementations,” IEEE Transactions on Biomedical Circuits and Systems, vol. 8,
no. 5, 2014.
[26] B. Schrauwen, M. D‘Haene, D. Verstraeten, and D. Stroobandt, “Compact hardware liquid state machines on fpga for real-time speech
recognition,” Neural Networks, no. 21, pp. 511–523, 1 2008.
[27] N. Hammami and M. Bedda, “Improved tree model for arabic speech
recognition,” in Proceddings of the IEEE International Conference on
Computer Science and Information Technology, 2010.
| 9cs.NE
|
The Effect of Phasor Measurement Units on the
Accuracy of the Network Estimated Variables
H. Abdollahzadeh Sangrody
M.T. Ameli
Power and Water University of Technology
Tehran, Iran
[email protected]
Power and Water University of Technology
Tehran, Iran
[email protected]
M.R.Meshkatoddini
Power and Water University of Technology
Tehran, Iran
[email protected]
Abstract— The most commonly used weighted least square state
estimator in power industry is nonlinear and formulated by using
conventional measurements such as line flow and injection
measurements. PMUs (Phasor Measurement Units) are gradually
adding them to improve the state estimation process. In this
paper the way of corporation the PMU data to the conventional
measurements and a linear formulation of the state estimation
using only PMU measured data are investigated. Six cases are
tested while gradually increasing the number of PMUs which are
added to the measurement set and the effect of PMUs on the
accuracy of variables are illustrated and compared by applying
them on IEEE 14, 30 test systems.
Keywords-conventional state estimation; hybrid
estimation; linear formulation; phasor measurement unit
state
I.
INTRODUCTION
State estimation is a key element of the online security
analysis function in modern power system energy control
centers. The function of state estimation is to process a set of
redundant measurements to obtain the best estimate of the
current state of a power system. State estimation is traditionally
solved by the weighted least square algorithm with
conventional measurements such as voltage magnitude, real
and reactive power injection, real and reactive power flow [1].
Recently, synchronized phasor measurement techniques based
on a time signal of the GPS (Global Positioning System) are
introduced in the field of power systems. A PMU, when placed
at a bus, can measure the voltage phasor at the bus, as well as
the current phasors through the lines incident to the bus. It
samples the ac voltage and current waveforms while
synchronizing the sampling instants with a GPS clock. The
computed values of voltage and current phasors are then timestamped and transmitted by the PMUs to the local or remote
receiver [2]-[4]. The traditional state estimation is by nature a
nonlinear problem. The most commonly used approach is
Weighted Least Squares which converts the nonlinear
equations into the normal equations by using first-order Taylor
series. However, the state estimation equations for PMU
measurements are inherently linear equations. Some research
has been conducted to try to formulate the mixed set of
traditional and PMU measurements. The natural approach is to
treat PMU measurements as additional measurements to be
appended to traditional measurements, which causes the
additional computation burden of calculation. Another
approach is to use the distributed scheme for the mixed state
estimation [5-9]. The problem of finding optimal PMU
locations for power system state estimation is well investigated
in the literature [10]–[13]. This paper shows the effect of
PMUs on the accuracy of the estimated variables. Six cases are
tested by gradually increasing the PMU numbers and applying
them on IEEE 14, 30 test systems. In the first case, state
estimation without any PMU and in the sixth case, linear
formulation of the state estimation using only PMU measured
data is discussed. In the other four cases, hybrid state
estimation with different number of added PMUs to the
conventional measurement set are tested.
II.
WEIGHTED LEAST SQUARED STATE ESTIMATION
METHOD
As shown “(1)”, this method minimizes the weighted sum
of squares of the residuals
Nm
J ( x)
i 1
( z i h i ( x )) 2
i2
z h( x )T R 1 z h( x )
Where in this equation z is measurement vector, x state
vector, standard deviation and h is the nonlinear function
relating measurement i to the state vector x. R is measurement
covariance matrix is given by “(2)”.
2
R diag 12 , 22 , , Nm
Pi
Pij
Q
H i
Q
ij
0
At the minimum value of the objective function, the firstorder optimality conditions have to be satisfied. These can be
expressed in compact form as follows:
g ( x)
J ( x )
H T ( x) R 1 ( z h( x)) 0
x
(3)
Where
H ( x)
h ( x )
x
(4)
The nonlinear function g (x) can be expanded into its
Taylor series around the state vector x k neglecting the higher
order terms. An iterative solution scheme known as the GaussNewton method is used to solve “(3)”:
x k 1 x k G ( x k )
1
.g ( x k )
(5)
Where, k is the iteration index and x k is the solution vector
at iteration k. G( x k ) is called the gain matrix, and expressed by:
G( x k )
g ( x k )
H T ( x k ) R 1 H ( x k )
x
g ( x k ) H T ( x k ) R 1 z h( x k )
(6)
Pi
V
Pij
V
Qi
V
Qij
V
VMag
V
In this matrix and V are state variables, Pi and Qi are
real and reactive power injection at bus i. Pij , Qij are real and
reactive power flow from bus i to bus j. In this condition of
estimation, relation between measurement data and state
variables are nonlinear and its final solution depend on an
iterative solution scheme expressed “(5)”.
IV. HYBRID STATE ESTIMATION
One PMU can measure the voltage and the current phasors.
The equivalent model of the line connecting buses i and j
with assumption of a PMU connected to bus i is shown in Fig.
1.
If Yij g ij jbij is defined as the series admittance and
as the shunt admittance, current phasor
measurements can be written in rectangular coordinates as
shown in Fig. 1. The expressions for Cij and Dij are:
Ysi g si jb si
(7)
These iterations are going on until the maximum variable
Cij Vi Ysi cos( i si )
system having (N) buses; the state vector will have (2N-1)
components which are composed of (N) bus voltage
magnitudes and (N-1) phase angles.
III. CONVENTIONAL STATE ESTIMATION
There are three most commonly used measurement types in
conventional state estimation. They are bus power injections,
line power flows and bus voltage magnitudes. These
measurement equations can be expressed using the state
variables. Jacobian matrix H has rows at each measurement
and columns at each variable. Considering “(4)”, power
injection and power flow in Fig. 1, H matrix components
corresponding to these measurements are partial derivation of
each variable [14].
V j Yij cos( j ij ) Vi Yij cos( j ij )
difference satisfies the condition, ' Max x k '. Consider a
Dij Vi Ysi sin( i si )
V j Yij sin( j ij ) ViYij sin( j ij )
Iij (Cij jDij )
Yij Yij ij
Vi Ei jFi
_
Ysi Ysi si
Figure 1. Transmission Line Model
V j E j jF j
_
The entries of the measurement Jacobian H corresponding
to the real and reactive parts of the current phasors are:
C ij
Vi
Ysi cos( i si ) Yij cos( i ij )
Cij
Yij cos( j ij )
Vi Ysi sin( i si ) Vi Yij sin( i ij )
V j
Cij
i
Cij
V j Yij sin( j ij )
j
measurement data can be expressed in rectangular coordinate
system. As shown in Fig. 1 a PMU located at bus i measured
voltage Vi and line current I ij . The voltage measurement
( Vi Vi i ) can be expressed as ( Vi Ei jFi ), and the
current measurement can be expressed as ( I ij Cij jDij ). In
this condition of estimation, measurement vector z and sate
vector x are:
T
T
z Ei Cij Fi Di j
x Ei E j Fi F j
In Fig. 1, line current flow I ij can be expressed as a linear
function of voltages.
Cij jDij ( g ij jbij ) ( g si jbsi ) ( Ei jFi )
Dij
Vi
( g ij jbij ) ( E j jF j )
Ysi sin( i si ) Yij sin( i ij )
i
Cij
Yij sin( j ij )
Vi Ysi cos( i si ) Vi Yij cos( i ij )
V j
Dij
Ei
Cij
Cij
j
V j Yij cos( j ij )
E j
The measurement vector z contains , Cij and Dij as well
as the power injections, power flows and voltage magnitude
measurements.
T
T
T
Z Pinj
, Qinj
, P Tflow , QTflow , V , T , CijT , DijT
Jacobian matrix H components are expressed by
Dij
LINEAR FORMULATION OF STATE ESTIMATION USING
ONLY PMUS
If the measurement set is composed of only voltage and
current measured by PMUs, the state estimation can be
formulated as a linear problem. The state vector and
Fi
Cij
F j
Dij
Generally, those measurements received from PMUs are
more accurate with small variances compared to the variances
of conventional measurements. Therefore, including PMU
measurements is expected to produce more accurate estimates.
Cij
Ei
Dij
E j
g ij g si
g ij
bij bsi
bij
bij bsi
bij
g ij g si
V.
Dij
Fi
Dij
F j
g ij
Then, the estimated value xˆ Eˆ i jFˆi can be obtained by
solving the linear equation below:
xˆ ( H T R 1 H ) 1 H T R 1 zˆ
This is very simple and fast, because it doesn't need any
iteration. In addition covariance matrix R in “(31)” is very
smaller than covariance matrix of conventional measurement,
so the estimated variables are very accurate.
VI. SIMULATION RESULTS
To investigate the effect of PMUs on the accuracy of
estimated variables, several cases are tested with different
number of added PMUs to the conventional measurement set.
Two different IEEE test systems (IEEE 14, IEEE 30 bus
system) are tested with 6 different cases which are shown in
table I. Fig. 2 and Fig. 3 show the network diagrams for each
system. Arrow with circle at the bus means a pair of real and
reactive power injection measurements and any point on the
transmission line; it means a pair of real and reactive power
flow measurements.
TABLE I.
Case 1
Case 2
Case 3
Case 4
Case 5
Case 6
SIX D IFFERENT CASES BY ADDING PMUS
Conventional Measurements with No PMUs
Conventional Measurements with PMUs of (10% of bus number)
Conventional Measurements with PMUs of (20% of bus number)
Conventional Measurements with PMUs of (30% of bus number)
Conventional Measurements with PMUs of (40% of bus number)
Only Minimum PMUs
Figure 3. IEEE30 Bus System Diagram with Conventional Measurements
Each network has a voltage magnitude measurement
connected to bus 1. Table II has more detailed information
about the conventional measurement set installed in the
networks.
The setting of error standard deviations for power injection,
power flow and voltage magnitude are 0.01, 0.08 and 0.04
respectively. A PMU has much smaller error deviations than
other conventional measurements as 0.00001. PMUs are
located at buses 2, 6, 7 and 9 in IEEE 14 bus system, and at
buses 3, 5, 6, 9, 10, 12, 19, 23, 25 and 29 in IEEE 30 bus
system at case 6 [10]. One of the ways of representing the level
of state estimation accuracy is to refer the covariance of the
estimated variables. The covariance of the estimated variable
vector is obtained from the inverse diagonal elements of gain
matrix. The accuracy of two variables (voltage magnitude,
voltage angle) is investigated separately. Fig. 4 and Fig. 5 show
the accuracy of the estimated voltage magnitudes of each
system. Fig. 6 and Fig .7 show the accuracy of the estimated
voltage angles of each system.
TABLE II.
VARIABLE NUMBERS, MEASUREMENT TYPE AND NUMBERS
Measurements
Figure 2. IEEE14 Bus System Diagram with Conventional Measurements
Network
IEEE 14 bus
system
IEEE 30 bus
system
Variables
Power
injection
Power
flow
Voltage
magnitude
Total
27
18
24
1
43
59
38
56
1
95
No PMU
10% PMU
20% PMU
30% PMU
40% PMU
No PMU
Only PMU
20% PMU
30% PMU
40% PMU
Only PMU
0.006
Standard Diviation
0.005
Standard Diviation
10% PMU
0.007
0.006
0.004
0.003
0.005
0.004
0.003
0.002
0.002
0.001
0.001
0
0
1
2
3
4
5
6
7
8
Bus Number
9
10
11
12
13
Figure 4. Accuracy of |V| of IEEE14 Bus System with PMUs
No PMU
10% PMU
20% PMU
30% PMU
40% PMU
Only PMU
0.008
0.007
0.006
Standard Diviation
1
14
0.005
0.004
3
5
7
9
11
13
15
17
19
21
23
25
27
29
Bus Number
Figure 7. Voltage Angle Accuracy of IEEE30 Bus System with PMUs
These figures show the effect of the PMUs on the accuracy
of the estimated variable. Average valued S.D. (Standard
Deviation) of each variable and their percentage values are
shown in tables III and IV. The percentage values in these
tables mean that how the S.D. values at each cases are
decreased compared to the S.D. of ‘Case 1’ which is forced to
be set as 100%. In case of ‘Only PMUs’, it becomes nearly
zero. Average valued S.D. of voltage magnitude and voltage
angle are shown in Fig. 8 and Fig. 9 respectively.
0.003
0.002
TABLE III.
0.001
cases
0
1
3
5
7
9
11
13
15
17
19
21
23
25
27
29
Bus Number
Figure 5. Accuracy of |V| of IEEE30 Bus System with PMUs
No PMU
10% PMU
20% PMU
30% PMU
40% PMU
Only PMU
0.0035
No PMUs
10% PMUs
20% PMUs
30% PMUs
40% PMUs
Only PMUs
AVERAGE ERROR STANDARD DEVIATIONS OF THE VOLTAGE
MAGNITUDE
IEEE 14 Bus
IEEE 30 Bus
Average
Error S.D.
Percentage
Average
Error S.D.
Percentage
0.0043741
0.0008449
0.0001727
0.0001497
0.0000810
0.0000055
100%
19.31%
3.95%
3.42%
1.85%
0.13%
0.0046548
0.0010444
0.0004986
0.0003240
0.0003229
0.0000042
100%
22.43%
10.70%
6.96%
6.94%
0.09%
Standar Diviation
0.003
0.0025
TABLE IV.
0.002
cases
0.0015
0.001
0.0005
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
bus number
Figure 6. Voltage Angle Accuracy of IEEE14 Bus System with PMUs
No PMUs
10% PMUs
20% PMUs
30% PMUs
40% PMUs
Only PMUs
AVERAGE ERROR STANDARD DEVIATIONS OF THE VOLTAGE
ANGLE
IEEE 14 Bus
IEEE 30 Bus
Average
Error S.D.
Percentage
Average
Error S.D.
Percentage
0.0023332
0.0008298
0.0001555
0.0001311
0.0000618
0.0000027
100%
35.56%
6.66%
5.62%
2.65%
0.11%
0.0030143
0.0010244
0.0004918
0.0003182
0.000317
0.0000032
100%
33.98%
16.3%
10.56%
10.52%
0.11%
Average valued standard diviation of voltage
angle
IEEE 14 bus sys tem
IEEE 30 bus sys tem
[3]
0.005
[4]
0.004
[5]
0.003
[6]
0.002
0.001
[7]
0
No PMUs
10% PMUs
20% PMUs
30% PMUs
40% PMUs
Only PMUs
[8]
Figure 8. Average Voltage Magnitude Standard Deviation of Two Systems
[9]
IEEE 14 bus system
IEEE 30 bus system
[10]
Average valued standard diviation of voltage
magnitude
0.0035
[11]
0.003
0.0025
[12]
0.002
0.0015
0.001
[13]
0.0005
0
No PMUs
[14]
10% PMUs
20% PMUs
30% PMUs
40% PMUs
Only PMUs
A. G. Phadke and J. S. Thorp, Synchronized Phasor Measurements and
Their Applications, Springer, 2008, pp. 93-97.
R. Zivanovic and C. Cairns, “Implementation of PMU technology in
state estimation: an overview”, IEEE AFRICON, pp. 1006-1011, 2006.
Y.M. El-Fattah and M. Ribbens-Pavella, “Multi-level approach to state
estimation in electric power systems, ” Proc. of the IV IFAC Symposium
on Identification and System Parameter Estimation, Tbilisi, USSR, pp.
166-179, Sept. 1976.
K. A. Clements, O. J. Denison, and R. J. Ringlee, “A multi-area
approach to state estimation in power system networks,” in roc. IEEE
Power Eng. Society Summer Meeting, San Francisco, CA, 1972,
C72465-3.
T. Van Cutsem, J. L. Horward, and M. Ribbens-Pavella, “A two-level
static state estimator for electric power systems,” IEEE Trans. Power
Apparat. Syst., vol. PAS-100, no. 8, pp. 3722–3732, Aug. 1981.
L. Zhao and A. Abur, “Multiarea state estimation using synchronized
phasor measurements,” IEEE Trans. Power Syst., vol. 20, no. 2, pp.
611–617, May 2005.
Weiqing Jiang; Vittal, V.; Heydt, G.T, “A Distributed state estimator
utilizing synchronized phasor measurements,” IEEE Tran. Power Syst.,
vol. 22, pp. 563 – 571, May 2007.
B. Xu and A. Abur, “Optimal placement of phasor measurement units
for state estimation, ” PSERC, Oct. 2005, Fin. Proj. Rep.
B. Xu and A. Abur, “Observability analysis and measurement placement
for systems with PMUs,” in Proc. IEEE PES Power Systems Conf.
Expo., Oct. 2004, pp. 943–946.
C. Rakpenthai, S. Premrudeepreechacharn, S. Uatrongjit, and N. R.
Watson, “An optimal PMU placement method against measurement loss
and branch outage,” IEEE Trans. Power Del., vol. 22, no. 1, pp.101–107,
Jan. 2005.
S. Chakrabarti and E. Kyriakides, “Optimal placement of phasor
measurement units for power system observability,” IEEE Trans. Power
Syst., vol. 23, no. 3, pp. 1433–1440, Aug. 2008.
Y.J. Yoon, “Study of the utilization and benefits of phasor measurement
units for large scale power system state estimation”, Master of Science
Thesis.Texas Univ. December 2005.
Figure 9. Average Voltage Angle Standard Deviation of Two Systems
H. Abdollahzadeh Sangrody
VII. CONCULTION
In this paper the way of incorporating the PMU data to the
conventional measurements set is discussed. It is expected that
those PMU measured data improve the measurement
redundancy and accuracy, due to the small error standard
deviations of PMU. A linear formulation of the state estimation
is investigated using only PMU measured data. This linear
formulation of the PMU data can produce the estimation result
by a single calculation not requiring any iteration. Six cases are
tested while gradually increasing the number of PMUs which
are added to the measurement set by applying them on IEEE
14, 30 test systems. With the help of advanced accuracy of
PMU, it was seen that the estimated accuracy is also gradually
increase. One of the interesting thing is that the accuracy of
estimated variables improves most effectively when the
number of implemented PMUs are around ‘10%’ of the system
buses.
REFERENCES
[1]
[2]
A. Abur and A. G. Exposito, Power System State Estimation, Theory
and Implementation, MAECEL DEKKER,2005, pp. 9-27.
Real time dynamics monitoring system [Online]. Available: http://
www.phasor-rtdms.com.
received the
B.Sc. degree in Electrical Engineering from Zanjan
University, Iran 2006. He is currently pursuing Master
of Science in Electrical Engineering at Power and
Water University of Technology. His research interests
include Power System Observability and State
Estimation in Power Systems.
M.T. Ameli received B.Sc. degree in Electrical
Engineering from Technical College of Osnabrueck,
Germany in 1988 and M.Sc. & Ph.D. from Technical
University of Berlin in 1992 & 1997. Since then He
teaches and researches as associated Professor in
Electrical Engineering Dept of Power & Water
University of Technology in Teheran. Areas of research:
Power system Simulation, Operation, Planning &
Control of power system, usage of renewable Energy in Power system.
M.R. Meshkatoddini(SM'96) received his B.Sc. and
M.Sc. degrees, in 1980 and 1990 respectively, in
Electrical Engineering from Tehran Polytechnic
University, Iran, and the Ph.D. degree in Electrical
Engineering, from Paul Sabatier University of Toulouse,
France in 1996. Since 1992, he has been a faculty
member at PWUT. Dr. Meshkatoddini has more than 25
years of experience in the areas of power transformers, surge arresters, electric
materials and power network transients.
| 3cs.SY
|
Does quantification without adjustments work?
Dirk Tasche∗
arXiv:1602.08780v2 [stat.ML] 12 Aug 2016
August 12, 2016
Classification is the task of predicting the class labels of objects based on the observation
of their features. In contrast, quantification has been defined as the task of determining the
prevalences of the different sorts of class labels in a target dataset. The simplest approach
to quantification is Classify & Count where a classifier is optimised for classification on a
training set and applied to the target dataset for the prediction of class labels. In the case of
binary quantification, the number of predicted positive labels is then used as an estimate of
the prevalence of the positive class in the target dataset. Since the performance of Classify &
Count for quantification is known to be inferior its results typically are subject to adjustments.
However, some researchers recently have suggested that Classify & Count might actually work
without adjustments if it is based on a classifier that was specifically trained for quantification.
We discuss the theoretical foundation for this claim and explore its potential and limitations
with a numerical example based on the binormal model with equal variances. In order to
identify an optimal quantifier in the binormal setting, we introduce the concept of local Bayes
optimality. As a side remark, we present a complete proof of a theorem by Ye et al. (2012).
Keywords: Classification, quantification, confusion matrix method, Bayes error.
1. Introduction
The formal definition of quantification as a machine learning task is often credited to Forman (2008) who
wrote: “The quantification task for machine learning: given a limited training set with class labels, induce
a quantifier that takes an unlabeled test set as input and returns its best estimate of the number of cases
in each class. In other words, the quantification task is to accurately estimate the test class distribution
via machine learning, but without assuming a large training set that is sampled at random from the test
distribution. The input to a quantifier is a batch of cases, whereas a traditional classifier takes a single
case at a time and predicts its single class (or a distribution of classes reflecting its uncertainty about
that one case).”
At least since the 1960s (Gart and Buck, 1966), researchers and practitioners were aware of the need
to track changes of the prior probabilities (or prevalences) of classes between different datasets. In the
machine learning community, the topic received renewed attention after Saerens et al. (2002) suggested
a powerful alternative to the ‘confusion matrix method’ they considered the standard approach at the
time.
∗ E-mail:
[email protected]
The author currently works at the Swiss Financial Market Supervisory Authority (FINMA). Most of the research for
this paper was done while he was an employee of the Prudential Regulation Authority (a directorate of the Bank of
England) and on secondment to the Bank’s research hub. The opinions expressed in this paper are those of the author
and do not necessarily reflect views of FINMA or the Bank of England.
1
Fawcett and Flach (2005) marked another milestone in the discussion of how to deal with changed
prevalences when they noticed that as a consequence of different causalities there are different dataset
shift regimes that need to be tackled in different ways. Since then a number of papers has been published
with proposals of how to categorise different types of dataset shift (Storkey, 2009; Moreno-Torres et al.,
2012; Kull and Flach, 2014).
There are two types of dataset shift between training and target dataset that can be easily characterised.
Under ‘covariate shift’, the assumption is that the posterior (i.e. conditional) class probabilities are the
same on the training and the target datasets. However, the distribution of the covariates (or features)
may change. This change should be taken into account already when a classifier is learnt (Shimodaira,
2000; Sugiyama et al., 2007; Bickel et al., 2009). The other easily characterised dataset shift type is
‘prior probability shift’ where the feature distributions conditional on the classes remain the same when
datasets are switched. Typically, in this case, adjustments to the posterior class probabilities and decision
thresholds are recommended in the literature (Elkan, 2001; Forman, 2008; Xue and Weiss, 2009; Hopkins
and King, 2010; Bella et al., 2010). Another approach is the direct estimation of the changed prior
probabilities by minimising the distance of the feature distributions on the training and target datasets
(Saerens et al., 2002; Forman, 2008; González-Castro et al., 2013; Hofer and Krempl, 2013; Du Plessis
and Sugiyama, 2014; Kawakubo et al., 2016).
Other types of dataset shift are less easy to describe and to deal with. Tasche (2014) defined the ‘invariant
density ratio’ dataset shift which generalises the prior probability shift in such a way that only ratios
of feature densities but not the densities themselves are unchanged. A recent paper by Hofer (2015) is
outstanding by dealing with dataset shift under very weak assumptions on the structure of the shift.
Esuli et al. (2010) suggested that specially trained classifiers (called quantifiers) can be used for the socalled ‘Classify & Count’ quantification (Forman, 2008) without a need of adjustments to the estimates.
Classify & Count means that a classifier is optimised for classification on a training set and applied to
the target dataset for the prediction of class labels. The number of predicted positive labels (in the case
of binary quantification) is then used as an estimate of the prevalence of the positive class in the target
dataset. The practical implementation of this proposal for binary classification and quantification has
been explored in papers by Milli et al. (2013), Barranquero et al. (2015) and Esuli and Sebastiani (2015).
In all these three papers, emphasis is put on the need to have the quantifier properly calibrated on the
training dataset, in the sense that the number of objects predicted to be positive should be equal to the
true number of positive objects.
The experiments by Milli et al. (2013) suggest that after all Classify & Count with adjustments works
better than pure Classify & Count. In contrast, Barranquero et al. (2015) and Esuli and Sebastiani
(2015) report Classify & Count quantification performance of the specially trained quantifiers that is
at least comparable to the performance of classifiers with adjustments. Esuli and Sebastiani (2015) are
somewhat ambiguous with respect to clearly stating all of their optimisation criteria. This is different to
Barranquero et al. (2015) whose authors clearly say that the calibration criterion must be supplemented
by a condition enforcing good classification. This is an intuitive requirement because, in particular, the
complementarity of the two criteria of calibration and classification seems to guarantee uniqueness of the
optimal quantifier.
In this paper, we discuss the theoretical foundations and limitations of quantification without adjustments
and illustrate the insights with the classical example of the binormal model with equal variances (van
Trees, 1968). We focus on analysis of the ‘Q-measure’ approach by Barranquero et al. (2015) because it
has been well and intuitively documented. Our first finding is that quantification without adjustments
in principle may work if proper calibration on the training dataset is ensured and the positive class
prevalences on the training and target datasets are the same or nearly the same. However, a second finding
is that the Q-measure approach has to be deployed with care because the quantifiers resulting from it
may be miscalibrated. All in all, these findings suggest that the potential applications of quantification
2
without adjustments are rather limited.
This paper is organised as follows: In Section 2 and its subsections, the theory of binary classification
is revisited such that the theoretically best quantifiers can be identified for some specific optimisation
criteria. In particular, we introduce the concept of ‘local Bayes optimality’ and discuss its applications
to minimax tests of two simple hypotheses and the optimisation of F-measure in the context of binary
classification. As another application of the results from Section 2, in Section 3 the experiment of Barranquero et al. (2015) is revisited and reviewed in the fully controlled setting of the binormal model with
equal variances. Section 4 concludes the paper. As a side remark, we present in Appendix A a complete
proof of Theorem 4 of Ye et al. (2012) who published only the key argument of the proof but did not
mention other important steps.
2. Classifying for quantification
In order to be able to appropriately assess the merits and limitations of the proposal by Barranquero
et al. (2015) we adopt a precise mathematical formalism. Based on this formalism, we can characterise
‘locally optimal binary classifiers’ which are closely related to both optimal Bayes classifiers and optimal
Neyman-Pearson classifiers (van Trees, 1968, Section 2.2). The concept of local optimality allows us
to characterise minimax tests of two simple hypotheses in a way alternative to that by Scharf (1991,
Chapter 5) and to provide an alternative proof of Theorem 4 of Ye et al. (2012) on F-measure-optimal
classifiers. In Section 3, we use results of this section to explore the Barranquero et al. proposal in detail
by inspecting its implementation for the binormal model with equal variances.
2.1. Locally optimal binary classifiers
We discuss binary classification and the properties of classifiers in a probabilistic setting specified by
a probability space as it was done by many authors before (see, e.g. van Trees, 1968). The probability
space (Ω, A, P) describes the experiment of choosing an object at random1 . The object has a class label
and features. The features can be observed immediately while, depending on whether the probability
space is interpreted as a training sample or target sample (sometimes also called test sample), the label
is also observable at once or can be observed only with some delay. We interpret A as the σ-field (see,
e.g. Billingsley, 1995, Section 2) of all admissible events, including events that cannot yet be observed.
In addition, we have a σ-field H which is the family of the events that can be observed now. The event
A with A ∈ A but A ∈
/ H reveals the object’s class label. If A occurs the object has got class label 1
(positive). If Ac = Ω\A occurs the object’s label is −1 (negative).
Assumption 2.1
• (Ω, A, P) is a probability space. This space describes the experiment of selecting an object from a
population at random and observing its features and (typically with some delay) class label.
• A ∈ A is a fixed event with 0 < P[A] < 1. If A is observed, the object’s class label is 1, otherwise if
Ac = Ω\A is observed, the object’s class label is -1.
• H ⊂ A is a sub-σ-field of A such that A ∈
/ H. H is the σ-field of immediately observable events
and, in particular, features.
In a binary classification problem setting, typically there are random variables X : Ω → Rd for some
d ∈ N (vector of explanatory variables or scores) and Y : Ω → {−1, 1} (dependent or class variable) such
1 The
case of Ω being finite and P being the uniform distribution on Ω provides the sample-based setting which often is
assumed for machine learning papers.
3
that H = σ(X) and Y −1 ({1}) = A.
In the setting of Assumption 2.1, typically one wants to predict an object’s class label (i.e. predict whether
or not event A has occurred) based on the observable information captured in the events H ∈ H. Each
of these events H defines a binary ‘classifier’ in the following sense:
• If H occurs the object’s label is predicted as 1.
• If H c = Ω\H occurs the object’s label is predicted as -1.
This way binary classifiers are identified with elements of H. We therefore do not introduce extra notation
for classifiers. Note that the object’s class A does not define a classifier because by assumption we have
A∈
/ H.
Define the expected ‘misclassification cost’ La,b (H) for H ∈ H and fixed a, b ≥ 0 with a + b > 0 by
La,b (H) = a P[H c ∩ A] + b P[H ∩ Ac ].
(2.1)
According to (2.1), there is no cost for misclassification if the label is correctly predicted (i.e. if the event
(A ∩ H) ∪ (Ac ∩ H c ) occurs). If 1 is predicted for true label −1 (event H ∩ Ac , false positive), the cost
is b. If −1 is predicted for true label 1 (event H c ∩ A, false negative), the cost is a. The misclassification
cost La,b (H) is the expected cost for the classifier represented by event H.
From Section 2.2 of van Trees (1968) or Section 1.3 of Elkan (2001), we know the optimal choice H ∗
(‘Bayes classifier’) of H for minimising La,b (H):
def
H∗ =
P[A | H] >
b
a+b
=
ω ∈ Ω : P[A | H](ω) >
b
a+b
= arg min La,b (H),
H∈H
(2.2)
where P[A | H] denotes the conditional probability (or posterior probability) of A given H as defined in
standard text books on probability theory (e.g. Billingsley, 1995, Section 33). The following proposition
shows that in some sense all classifiers of the shape
def
Hq = {P[A | H] > q},
0 < q < 1,
(2.3)
are local minimisers of La,b (H).
Proposition 2.2 Under Assumption 2.1, let a, b ≥ 0 with a + b > 0 be fixed. Define La,b (H) and Hq by
(2.1) and (2.3) respectively. Let pq = P[Hq ]. Then the following two statements hold:
(i) q <
(ii) q >
b
a+b
⇒
b
a+b
⇒
Hq = arg
Hq = arg
min
H∈H, P[H]≥pq
min
H∈H, P[H]≤pq
La,b (H).
La,b (H).
Proof. Let H ∈ H be given. With some algebra2 , it can be shown that
La,b (H) = a P[A] + b − (a + b) q P[H] + (a + b) E (q − P[A | H]) 1H∩Hq
+ (a + b) E (q − P[A | H]) 1H∩Hqc
≥ a P[A] + b − (a + b) q P[H] + (a + b) E (q − P[A | H]) 1H∩Hq
≥ a P[A] + b − (a + b) q P[H] + (a + b) E (q − P[A | H]) 1Hq .
(2.4)
b
we have b − (a + b) q > 0. Then it holds that b − (a + b) q P[H] ≥ b − (a + b) q pq for
In case q < a+b
P[H] ≥ pq . By (2.4), this implies (i).
b
In case q > a+b
we have b − (a + b) q < 0. Then it holds that b − (a + b) q P[H] ≥ b − (a + b) q pq for
P[H] ≤ pq . From this observation and (2.4), statement (ii) follows.
2
21
S
denotes the indicator function of the set S, i.e. 1S (s) = 1 for s ∈ S and 1S (s) = 0 for s ∈
/ S.
4
Proposition 2.2 is about ’locally’ optimal classifiers in the sense that only classifiers with identical probability of predicting 1 are compared. We state this observation more precisely in item (i) of the following
remark:
Remark 2.3
b
(i) We have H ∗ = H b for H ∗ as defined in (2.2). Hence the case q = a+b
is not treated in Propoa+b
sition 2.2 because it is covered by (2.2). Nonetheless, it is worth noting that Proposition 2.2 and
(2.2) together imply that for all a, b ≥ 0 with a + b > 0 and 0 < q < 1 it holds that
Hq = arg
min
H∈H, P[H]=pq
La,b (H).
(ii) In the case a = 0, b = (1 − P[A])−1 , Proposition 2.2 (i) implies for all 0 < q < 1 that
Hq = arg
P[H ∩ Ac ]
= arg
min
P[H | Ac ].
P[Ac ]
H∈H, P[H]≥pq
H∈H, P[H]≥pq
min
P[H | Ac ] is called ‘false positive rate’ (FPR).
(iii) In the case a = P[A]−1 and b = 0, Proposition 2.2 (ii) implies for all 0 < q < 1 that
Hq = arg
max
H∈H, P[H]≤pq
P[H ∩ A]
= arg
max
P[H | A].
P[A]
H∈H, P[H]≤pq
P[H | A] is called ‘true positive rate’ (TPR).
As mentioned above, Proposition 2.2 may be interpreted as a result in between the characterisation of
optimal Bayes classifiers and the optimal classifier (test) from the Neyman-Pearson lemma. The following
theorem gives a precise statement of this observation.
Theorem 2.4 Let (Ω0 , M, µ) be a measure space. Assume that Q− and Q+ are probability measures on
(Ω0 , M) which are absolutely continuous with respect to µ. Assume furthermore that the densities f −
+
and f + of Q− and Q+ respectively are positive. Define the likelihood ratio λ by λ = ff − > 0. If the
distribution of λ is continuous under Q− and Q+ , i.e. Q− [λ = `] = 0 = Q+ [λ = `] for all ` > 0, then
there is a number `∗ > 0 with Q− [λ > `∗ ] = Q+ [λ ≤ `∗ ] such that
min max Q− [M ], Q+ [M c ] = Q− [λ > `∗ ].
(2.5)
M ∈M
Proof. Define the probability space (Ω, A, P) by
• Ω = Ω0 × {−1, 1} with projections X(ω, c) = ω and Y (ω, c) = c for (ω, c) ∈ Ω,
• A = M ⊗ P({−1, 1}) = σ(X, Y ),
• P[Y = −1] = 1/2 = P[Y = 1] as well as P[X ∈ M | Y = −1] = Q− [M ] and P[X ∈ M | Y = 1] =
Q+ [M ] for M ∈ M.
Then Assumption 2.1 is satisfied if A is chosen as A = {Y = 1} and H is chosen as H = σ(X) =
M × ∅, {−1, 1} . By construction of P, it follows that the probability of A = {Y = 1} conditional on H
is given by
f+ ◦ X
.
P Y = 1|H = +
f ◦ X + f− ◦ X
This implies for any 0 < q < 1 that
Q− [λ >
P P[Y = 1 | H] > q =
5
q
1−q ]
+ Q+ [λ >
2
q
1−q ]
.
(2.6)
Fix M ∈ M and let H = {X ∈ M }. The assumption on the continuity of the distribution of λ under Q−
and Q+ implies that
min max Q− [M ], Q+ [M c ] < 1.
M ∈M
For this proof, we therefore may assume without loss of generality that max Q− [M ], Q+ [M c ] < 1 and
hence 0 < P[H] < 1. Again by the assumption on the continuity of the distribution of λ under Q− and
Q+ , then (2.6) implies that there is q = q(H) such that P[H] = P P[Y = 1 | H] > q . From Remark 2.3
(ii) and (iii) now it follows that
max Q− [M ], Q+ [M c ] = max P[H | Y = −1], P[H c | Y = 1]
≥ max P P[Y = 1 | H] > q | Y = −1 , P {P[Y = 1 | H] > q}c | Y = 1
+
q
q
= max Q− λ > 1−q
, Q λ ≤ 1−q
.
Since this holds for all M ∈ M with max Q− [M ], Q+ [M c ] < 1, we can conclude that
min max Q− [M ], Q+ [M c ]
M ∈M
≥ min max Q− λ > ` , Q+ λ ≤ ` .
`>0
The intermediate value theorem implies that there is an `∗ such that Q− [λ > `∗ ] = Q+ [λ ≤ `∗ ]. Since
` 7→ Q− λ > ` is non-increasing and ` 7→ Q+ λ ≤ ` is non-decreasing, it follows that
min max Q− λ > ` , Q+ λ ≤ ` = Q− [λ > `∗ ].
2
`>0
Remark 2.5 One interpretation of Theorem 2.4 is as providing a minimax test for the decision between
two simple hypotheses (see Chapter 5 of Scharf, 1991). The test problem is to distinguish Q− and Q+ .
Tests are characterised by observable sets M ∈ M where ω ∈ M means ’accept Q+ ’ and ω ∈
/ M means
’reject Q+ in favour of Q− ’. However, in contrast to the setting of the Neyman-Pearson lemma, none of
the two hypotheses is considered more important than the other. Therefore, as expressed on the left-hand
side of (2.5), an optimal test is meant to minimise the probabilities of the type I and II errors at the
same time.
(2.5) shows that in a ’continuous’ setting there is an optimal test under the criterion given by the left-hand
side of (2.5) which is based on the likelihood ratio λ, i.e. the ratio of the densities of the tested probability
measures. Hence the structure of the optimal test is the same as for the optimal Neyman-Pearson test,
the cost-optimal Bayes test and the minimax optimal Bayes test (see Section 2.2 of van Trees, 1968, or
Chapter 5 of Scharf, 1991).
The concept of local Bayes optimality (i.e. Proposition 2.2) can also be applied to the question of how
to determine binary classifiers that are optimal with respect to the ‘F-measure’ criterion. Fβ -measure for
β > 0 was introducted by van Rijsbergen (1974) in order to avoid neglecting the minority class when
learning binary classifiers. For a given classifier, its Fβ -measure is defined as
Fβ =
1 + β2
β2
Recall
+
1
Precision
,
where the classifier’s ‘precision’ is the ratio of the number of positively predicted true positive objects
and the number of positively predicted objects while its ‘recall’ is the ratio of the number of positively
predicted true positive objects and the number of true positive objects.
In the setting of Assumption 2.1, we have
Precision = P[A | H]
and
6
Recall = P[H | A],
where A denotes ‘positive class’ and H stands for ‘classifier predicts positive’. Note that recall is identical
with ‘true positive rate’ as defined in Remark 2.3. We can rewrite the definition of Fβ as
β2 + 1
Fβ (H) =
β2
P[H | A]
+
1
P[A | H]
=
(1 + β 2 ) P[H | A]
,
β 2 + P[H]/P[A]
(2.7)
for H ∈ H and fixed β > 0. Ye et al. (2012, Theorem 4) observed that classifiers that are optimal in the
sense of maximising Fβ can be constructed by ‘thresholding’ the conditional class probability P[A | H].
In the notation of this paper, their observation can be precisely stated as follows:
sup Fβ (H) =
H∈H
sup max Fβ ({P[A | H] > q}), Fβ ({P[A | H] ≥ q}) .
(2.8)
0≤q≤1
Ye et al. (2012) published only the most important part of the proof3 of (2.8). In Appendix A of this
paper, we provide a complete proof of (2.8).
However, in the case where the conditional class probability P[A | H] has a continuous distribution, (2.8)
is an immediate consequence of Remark 2.3 (iii):
• By continuity of the distribution of P[A | H], for any classifier H ∈ H with 0 < P[H] < 1 there is a
number 0 < q < 1 such that P[H] = P[Hq ] with Hq defined as in (2.3).
• Therefore, Remark 2.3 (iii) implies that
Fβ (H) ≤
(1 + β 2 ) P[Hq | A]
(1 + β 2 ) P[Hq | A]
=
= Fβ (Hq ).
2
β + P[H]/P[A]
β 2 + P[Hq ]/P[A]
2.2. Application to quantification under prior probability shift
In contrast to Esuli and Sebastiani (2015) and Milli et al. (2013), Barranquero et al. (2015) specify the
dataset shift problem they are going to tackle with their proposal: It is prior probability shift. We modify
Assumption 2.1 accordingly.
Assumption 2.6 We extend the setting of Assumption 2.1 by assuming that there is a second probability
measure P1 on (Ω, A). P1 evolves from P by ‘prior probability shift’, i.e. the probabilities of sets H ∈ H
conditional on A and the probabilities of sets H ∈ H conditional on Ac are the same under P and P1 :
P[H | A] = P1 [H | A]
and
P[H | Ac ] = P1 [H | Ac ],
for all H ∈ H.
Under Assumption 2.6, we can describe for any classifier H ∈ H the probability P1 [H] as an affine
function of w = P1 [A]:
P1 [H] = w P[H | A] − P[H | Ac ] + P[H | Ac ].
(2.9)
In practice, the true positive rate (TPR) P[H | A] and the false positive rate (FPR) P[H | Ac ] can be
estimated (possibly with large potential bias) from the training set (in our setting: (Ω, A, P)) and the
probability P1 [H] of an object to be classified as positive (after prior probability shift) can be estimated
from the target set (in our setting: (Ω, A, P1 )). Then (2.9) can be solved for w = P1 [A] to obtain an
estimate of the new prior probability of the positive class:
P1 [A] =
P1 [H] − P[H | Ac ]
.
P[H | A] − P[H | Ac ]
3 The
proof is available in an appendix to the paper of Ye et al. which can be downloaded at
https://www.comp.nus.edu.sg/∼leews/publications/fscore-appendix.pdf
7
(2.10)
This approach is called ‘confusion matrix method’ (Saerens et al., 2002). It has also been described as
‘Adjusted Count’ approach (Forman, 2008) and has been deployed by practitioners at least since the
1960s (Gart and Buck, 1966).
In theory, for any classifier H, (2.10) provides the adjustment needed to obtain an accurate estimate of
the probability of the positive class from a potentially quite inaccurate estimate by P1 [H]. Experiments
by some research teams, however, have cast doubt on the appropriateness of this approach. Both good
(Xue and Weiss, 2009; Hopkins and King, 2010) and unsatisfactory performance (Saerens et al., 2002;
Forman, 2008) of the confusion matrix method have been reported. Other papers report mixed findings
(Bella et al., 2010; González-Castro et al., 2013; Hofer and Krempl, 2013; Du Plessis and Sugiyama,
2014).
As (2.10) is valid only under prior probability shift (Assumption 2.6), performance issues with the confusion matrix method should not be a surprise in circumstances when there is little evidence of prior
probability shift against other types of dataset shift (see Moreno-Torres et al., 2012, for a taxonomy of
dataset shift types). But most if not all of the above-mentioned reports on the performance of the confusion matrix method refer to controlled environments with prior probability shift. A number of reasons
have been identified to potentially negatively impact the confusion matrix method performance. Among
them are class imbalance in the training set (Forman, 2008) and issues with the accurate estimation of
TPR and FPR on the training set (Esuli and Sebastiani, 2015).
Although many other approaches to prior probability estimation have been proposed (Hofer and Krempl,
2013; Du Plessis and Sugiyama, 2014; Hofer, 2015; Kawakubo et al., 2016), no gold standard has yet
emerged because all approaches appear to suffer from numerical problems to some extent.
This observation has led some authors to suggest that so-called ‘quantifiers’ (classifiers, specifically developed for quantification) might be a viable solution (Esuli et al., 2010; Milli et al., 2013; Barranquero
et al., 2015; Esuli and Sebastiani, 2015). In the notation of this paper, both classifiers and quantifiers
are characterised by observable events H ∈ H which are interpreted as ’predict positive’. The difference
between the concepts of ’classifier’ and ’quantifier’ is the intended use, as explained in the quotation from
Forman (2008) in Section 1:
• Classifiers are deployed for predicting the class labels of single objects. Therefore, development of
a classifier typically involves minimising the expected loss of decisions about single objects (see, for
instance, the right-hand-side of (2.2)).
• Quantifiers are deployed for estimating the prevalence of a class in a sample or population. Barranquero et al. (2015) have argued that this different purpose should be reflected in a different
objective function for the development of a quantifier. They suggest that with an appropriate objective function, no adjustment like (2.10) would be needed.
• In their paper, Barranquero et al. (2015) suggest maximising a Q-measure criterion (see (2.14a)
below). Their experiments were conducted in a prior probability shift setting (see Assumption 2.6).
Similarly, Milli et al. (2013) report experimental results from a prior probability shift setting.
• As a different approach, Esuli et al. (2010) suggest minimising the Kullback-Leibler distance between
the observed class distribution and the predicted class distribution on the training set. Implicitly,
as they work with Support Vector Machines (Esuli and Sebastiani, 2015), they also apply some
classification optimisation criterion. Esuli and Sebastiani only use ’natural’ datasets such that their
datashift environment cannot be characterised as prior probability shift.
In the following, we focus on the analysis of the approach proposed by Barranquero et al. (2015) to deal
with prior probability shift. Analysis of the approach followed by Esuli and Sebastiani (2015) is harder
because Esuli and Sebastiani do not specify their dataset shift assumption and because the performance
of their approach seems to depend on their choice of the classifier development methodology (as support
8
0.25
Figure 1: Illustration of prediction error function (2.11).
0.15
0.10
0.00
0.05
Prediction error
0.20
Uniformly best
Locally best
Qbeta best
0.0
0.2
0.4
0.6
0.8
1.0
Test set prevalence of positive class
vector machines). Analysis and potential criticism of Esuli and Sebastiani (2015), therefore, is not undertaken in this paper. The results of Milli et al. (2013) are less controversial than those of Barranquero et al.
(2015) and Esuli and Sebastiani (2015) because Milli et al. report superior quantification performance
for adjusted classifiers.
For a fixed, unadjusted classifier specified by a set H ∈ H, the absolute prediction error |P1 [A] − P1 [H]|
of the prevalence of the positive class in the target dataset is the combination of a decreasing and
an increasing straight line if it is represented as a function of the true positive class prior probability
w = P1 [A]:
(
| Ac ]
w P[H | A] − P[H | Ac ] − 1 + P[H | Ac ], for w ≤ P[H | AP[H
c ]+1−P[H | A] ,
(2.11)
EH (w) =
w 1 − P[H | A] + P[H | Ac ] − P[H | Ac ], otherwise.
See Figure 1 for an illustration of the absolute prediction error concept. The rationale for the three
different curves is explained in Section 3 below. For the moment, if we ignore the question of how to
minimise the absolute prediction error, the figure tells us that every classifier is a perfect predictor of one
positive class prevalence in the target dataset. Unfortunately, it is not very helpful to know this because
it is perfection in the way a broken clock is perfectly right once a day. Hence it is worthwhile to try and
find out more about minimising the error as we do in the following.
9
(2.11) immediately implies the following result on error bounds for the prediction of the positive class
prevalence by a classifier:
Proposition 2.7 Under Assumption 2.6, the following inequality holds for any H ∈ H:
P1 [A] − P1 [H] ≤ max P[H | Ac ], P[H c | A] .
(2.12)
Proposition 2.7 shows that a classifier’s prediction error with regard to the positive class prevalence
is controlled by the classifier’s false positive rate (FPR) P[H | Ac ] and its false negative rate (FNR)
P[H c | A]. Theorem 2.4 (or Remark 2.3 (ii) and (iii)) makes it possible to identify the optimal (in this
case the minimax) classifier with regard to the prediction of the positive class prevalence:
Corollary 2.8 Under Assumption 2.6, define the classifiers Hq , 0 < q < 1 by (2.3). Assume in addition,
that the distribution of P[A | H] is continuous under both P[· | A] and P[· | Ac ]. Then there is a number
0 < q ∗ < 1 with P[Hq∗ | Ac ] = 1 − P[Hq∗ | A] such that
min max P[H | Ac ], P[H c | A] = P[Hq∗ | Ac ].
H∈H
Corollary 2.8 is nice in telling us which classifier minimises at the same time the probabilities of ‘false
negative’ and ‘false positive’ predictions on the target dataset for whatever value of the positive class
prevalence. Note the similarity between this classifier and the classifier serving as the basis for the ’method
X’ of Forman (2008). It is also interesting to see that ’Method Max’ of Forman (2008) (maximise TPR FPR) is a special case of (2.2) with a = 1/P[A], b = 1/(1 − P[A]).
But from (2.11) it follows that the prediction error EHq∗ (w) of Hq∗ is zero if and only if w = 1/2, i.e. if the
prior positive class probability on the target dataset is 50%. This may seem unsatisfactory in particular
if the positive class prevalence P[A] on the training set is very different from 1/2. It might be more
appropriate to have prediction error zero for w = P[A], i.e. if the positive class prevalence on the target
dataset is the same as on the training set. For this case the following result applies:
Corollary 2.9 Under Assumption 2.6, define the classifiers Hq , 0 < q < 1 by (2.3). Assume in addition,
that there is a number 0 < r < 1 such that P[Hr ] = P[A]. Then it holds that
min
max P[H | Ac ], P[H c | A] = max P[Hr | Ac ], P[Hrc | A] .
H∈H, P[H]=P[A]
It can be easily checked that for Hr from Corollary 2.9 we have EHr (P[A]) = 0, with E defined as in
(2.11).
2.3. The Q-measure approach
Barranquero et al. (2015) define the ‘Normalized Absolute Score’ (NAS) for measuring how well a classifier
(characterised by a set H ∈ H, as explained below Assumption 2.1) predicts the prior class probabilities
P[A] and 1 − P[A] in the binary classification setting as described by Assumption 2.1:
def
NAS(H) = 1 −
|P[H] − P[A]|
.
max(P[A], 1 − P[A])
(2.13a)
By definition, we have NAS(H) = 1 if and only if P[H] = P[A]. Otherwise, the range of NAS(H) depends
P[A]
on the value of P[A]. If P[A] ≤ 1 − P[A], then P[H] = 0 implies NAS(H) = 1−2
1−P[A] and P[H] = 1
implies NAS(H) = 0. If P[A] > 1 − P[A], then P[H] = 0 implies NAS(H) = 0 and and P[H] = 1 implies
NAS(H) = 2 P[A]−1
P[A] .
10
The dependence of the range of NAS on the value of P[A] is unsatisfactory because it makes comparison
of NAS values computed for different underlying values of P[A] incommensurable and, potentially, could
entail bias if NAS is used as an optimization criterion. The following alternative definition of NAS∗ avoids
these issues:
max(P[H] − P[A], 0) max(P[A] − P[H], 0)
def
NAS∗ (H) = 1 −
−
.
(2.13b)
1 − P[A]
P[A]
By this definition, we have NAS∗ (H) = 1 if and only if P[H] = P[A], NAS∗ (H) = 0 if and only if
P[H] ∈ {0, 1}, and 0 < NAS∗ (H) < 1 otherwise. In the following, we use NAS∗ instead of NAS in order
to make sure that the full potential of the approach by Barranquero et al. (2015) is realised.
Barranquero et al. (2015) suggest training ‘reliable’ classifiers in order to predict prior (unconditional)
class probabilities on the target dataset under prior probability shift. With reliability they mean that
the classifiers in question should perform well in terms of being good at classification and being good at
quantification at the same time.
In order to train an optimal quantifier for predicting the class probability P[A], Barranquero et al. (2015)
suggest to maximise for some β > 0 the ‘Qβ -measure’ over all possible classifiers (characterised by the
sets H ∈ H whose outcomes trigger the prediction of class 1):
(1 + β 2 ) P[H | A] NAS(H)
β 2 P[H | A] + NAS(H)
1 + β2
.
=
2
β
1
NAS(H) + P[H | A]
def
Qβ (H) =
(2.14a)
(2.14b)
By the definitions of P[H | A] and NAS(H) the denominator on the right-hand side of (2.14a) takes the
value 0 if and only if P[H] = 0. Representation (2.14b) of Qβ (H) implies limP[H]→0 Qβ (H) = 0. Therefore
we can define Qβ (H) by (2.14a) for H ∈ H with P[H] > 0 and Qβ (H) = 0 for H ∈ H with P[H] = 0.
Qβ (H) is a weighted harmonic mean of the true positive rate P[H | A] and the normalized absolute score
and, as such, is increasing in both P[H | A] and NAS(H). Barranquero et al. (2015) suggest that by
maximising Qβ (H) over H for fixed A on a training set, the resulting classifier should be able to provide
good estimates of P1 [A] on target datasets with possibly different prior class distributions.
Using the observation from Remark 2.3 (iii), in Section 3 we demonstrate by the standard example of a
binormal model that optimal classifiers with respect to Qβ in general are not best quantifiers. First note
that Remark 2.3 (iii) implies the following result.
Proposition 2.10 Under Assumption 2.1, define Qβ (H), H ∈ H by (2.14a) and Hq , q ∈ (0, 1) by (2.3).
For 0 < u < 1 denote by q(u) the u-quantile4 of P[A | H]. If the distribution of P[A | H] is continuous
then it holds that
sup Qβ (H) =
sup Qβ (Hq(1−u) ).
(2.15)
H∈H
Proof. Observe that sup Qβ (H) =
H∈H
P[A]≤u<1
sup
Qβ (H) since Qβ (H) = 0 for P[H] = 0 and P[H] = 1.
H∈H, 0<P[H]<1
Fix H ∈ H with 0 < P[H] < 1. By continuity of x 7→ P P[A | H] ≤ x , then we have P[Hq(u) ] = P[H] for
u = 1 − P[H]. Hence Remark 2.3 (iii) implies
Qβ (H) =
1 + β2
β2
NAS(Hq(u) )
≤
+
1
P[H | A]
1 + β2
β2
NAS(Hq(u) )
+
1
P[Hq(u) | A]
= Qβ (Hq(u) ).
4 For
a real random variable X and α ∈ (0, 1), the α-quantile qα (X) of X is defined by qα (X) = inf{x ∈ R : P[X ≤ x] ≥ α}.
11
Figure 2: Illustration of Proposition 2.10 and Corollary 2.11.
0.4
0.2
Qbeta
0.6
0.8
beta = 1
beta = 2
0.0
p = 0.25
0.0
0.2
0.4
0.6
0.8
1.0
Predicted prevalence of positive class
This implies
sup Qβ (H) =
H∈H
sup Qβ (Hq(1−u) ).
0<u<1
However, for 0 < u ≤ P[A] both P[Hq(1−u) | A] and NAS(Hq(1−u) ) are non-decreasing in u. Hence it
follows that Qβ (Hq(1−u) ) ≤ Qβ (Hq(1−P[A]) ) for 0 < u ≤ P[A] and therefore (2.15).
2
See Figure 2 for an illustration of Proposition 2.10. Unfortunately, in practice most of the time it is not
possible to accurately estimate general posterior probabilities like P[A | H]. This has led some authors to
propose workarounds like the one by Platt (2000) which do not necessarily deliver good results. However,
the following corollary describes a special setting in which the right-hand side of (2.15) can be considerably
simplified.
Corollary 2.11 Under Assumption 2.1, define Qβ (H), H ∈ H by (2.14a) and Hq , q ∈ R by (2.3). Make
these two additional assumptions:
(i) There is a real random variable X on (Ω, A, P) with continuous distribution such that H ⊃ σ(X),
i.e. X is H-measurable.
(ii) There is a continuous function f : R → [0, 1] such that
P[A | H] = f (X).
12
The function f is either strictly increasing with limx→−∞ f (x) = 0 and limx→∞ f (x) = 1 or strictly
decreasing with limx→−∞ f (x) = 1 and limx→∞ f (x) = 0.
Then if f is increasing it holds that
sup Qβ (H) =
H∈H
Qβ {X > q1−u (X)} .
sup
P[A]≤u≤1
Otherwise, if f is decreasing it holds that
sup Qβ (H) =
H∈H
Qβ {X < qu (X)} .
sup
P[A]≤u≤1
Proof. Follows from Proposition 2.10 because Hq(1−u) = {X > q1−u (X)} in the case of increasing f and
Hq(1−u) = {X < qu (X)} in the case of decreasing f , for P[A] ≤ u < 1.
2
Corollary 2.11 allows us in Section 3 to replicate the experiment by Barranquero et al. (2015) in a fully
controlled environment such that the merits and limitations of their approach can carefully be studied.
3. The binormal case with equal variances
We consider the ‘binormal model’ with equal variances as an example that fits into the setting of Assumption 2.1 and Corollary 2.11.
• Ω = R×{−1, 1}, A = B(R)⊗P({−1, 1}) where B(R) denotes the Borel-σ-field on R and P({−1, 1})
is the power set of {−1, 1}.
• On Ω, we define the projections X and Y , i.e. for ω = (x, y) ∈ Ω we let X(ω) = x and Y (ω) = y.
• A = {Y = 1} ∈
/ H = σ(X).
• P is defined by specifying the marginal distribution of Y with P[A] = p ∈ (0, 1), and defining the
conditional distribution of X given Y as normal distributions with equal variances:
P[X ∈ · | A] = N (ν, σ 2 ),
(3.1a)
P[X ∈ · | Ac ] = N (µ, σ 2 ).
In (3.1a), we assume that µ < ν and σ > 0. (3.1a) implies that the distribution of X is given by a
mixture of normal distributions5
x−ν
x−µ
P[X ≤ x] = p Φ
+ (1 − p) Φ
, x ∈ R.
(3.1b)
σ
σ
• The posterior probability P[A | H] in this setting is given by
1
,
1 + exp(a X + b)
P[A | H] =
with a =
µ−ν
σ2
< 0 and b =
ν 2 −µ2
2 σ2
+ log
1−p
p
(3.2)
.
We replicate the experiment of Barranquero et al. (2015) in this setting:
• We look at a ‘training set’ (Ω, A, P) and a ‘target dataset’ (Ω, A, P1 ). The probability measures P
and P1 are defined like P above but with (possibly) different values of P[A] = p and P1 [A] = p1
respectively.
5Φ
denotes the standard normal distribution function Φ(x) =
13
√1
2π
Rx
−∞
e− y
2
/2
dy.
• We “train” a classifier on the training set (Ω, A, P) by maximising Qβ as given by (2.14a). Classifiers
can be identified with sets H ∈ H in the sense that the prediction is the positive class A if H occurs
and the negative class Ac otherwise. “Training” in the binormal setting actually means to make use
of Corollary 2.11 in order to identify the optimal classifier H ∗ . The following formulae are used for
the optimization of Qβ :
q1−u (X) − ν
P[X > q1−u (X) | A] = 1 − Φ
,
(3.3a)
σ
max(u − p, 0) max(p − u, 0)
−
.
(3.3b)
NAS∗ ({X > q1−u (X)}) = 1 −
1−p
p
The quantile q1−u (X) (see footnote 4 for its definition) must be numerically determined by solving
for x the following equation:
x−ν
x−µ
1 − u = p0 Φ
+ (1 − p0 ) Φ
.
(3.4)
σ
σ
As the optimization problem has no closed-form solution, we apply the R-function ’optimize’ (R
Development Core Team, 2010) to find the optimal classifier H ∗ = {X > q1−u∗ (X)}.
• We evaluate the Qβ -optimal classifier H ∗ on the target dataset (Ω, A, P1 ) by calculating P1 [H ∗ ]
and compare its value to p1 = P1 [A] in order to check how good the Classify & Count approach
(Forman, 2008) based on H ∗ is. We compare the performance of H ∗ with two other classifiers: the
minimax classifier HMini from Corollary 2.8 and the locally best classifier Hloc from Corollary 2.9.
This means that we need to evaluate (2.11) for the three classifiers. For this purpose, the following
formulae are used:
q1−u∗ (X) − ν
q1−u∗ (X) − µ
∗
∗
c
,
P[H | A ] = Φ
;
(3.5a)
P[H | A] = Φ
σ
σ
!
!
µ+ν
µ+ν
2 −ν
2 −µ
,
P[HMini | Ac ] = Φ
;
(3.5b)
P[HMini | A] = Φ
σ
σ
q1−p (X) − µ
q1−p (X) − ν
,
P[Hloc | Ac ] = Φ
.
(3.5c)
P[Hloc | A] = Φ
σ
σ
• For the calculations, we have used the following parameters:
µ = 0,
ν = 2,
σ = 1,
P[A] = p = 25%.
(3.6)
The results of the calculations are shown in Figures 2 and 1. Figure 2 presents graphs of u 7→ Qβ {X >
q1−u (X)} in the binormal setting of this section, with parameters chosen as in (3.6). The Q-measure
Qβ is defined by (2.14b), but we use NAS∗ instead of NAS. The solid curve is for β = 1, where equal
weights are put on NAS∗ and the TPR P[H | A], and the dashed curve is for β = 2, where the weight put
on NAS∗ is four times the weight for the TPR.
The kinks in both graphs of Figure 2 are due to the fact that the mapping u 7→ NAS∗ ({X > q1−u (X)})
with NAS∗ ({X > q1−u (X)}) defined by the right-hand side of (3.3b) is not differentiable in u = p. The
function u 7→ NAS would not be differentiable in u = p either. Both curves have a unique maximum
which is at u = p = 0.25 for β = 2 and at some u > p = 0.25 for β = 1.
Hence the graph for β = 2 has its maximum at that u where NAS∗ ({X > q1−u (X)}) takes its maximum
value 1. As a consequence, in the case β = 2, the Qβ -optimal classifier is identical with the locally best
classifier according to Corollary 2.9.
In contrast, in the case β = 1, for u slightly greater than p = 0.25 the decline in value of NAS∗ ({X >
q1−u (X)}) is over-compensated by a rise in the value of the TPR such that the maximum is incurred at
14
some u > p. The consequence of this for the error (2.11) in the prediction of a target dataset positive
class prevalence is displayed in Figure 1.
Figure 1 shows that by incident the error-performance of the Qβ -optimal classifier for β = 1 is close to the
performance of the minimax classifier identified in Corollary 2.8. Nonetheless, its performance would be
deemed unsatisfactory if the true positive class prevalence in the target dataset were the same or nearly
the same as the assumed positive class prevalence of 25% in the training dataset. In that case, clearly the
locally best classifier as identified by the Qβ -measure for β = 2 or by Corollary 2.9 would perform much
better and even perfectly if the training and target prevalences were the same.
4. Conclusions
We have investigated a claim by Barranquero et al. (2015) and Esuli and Sebastiani (2015) that binary
class prevalences on target datasets can be estimated by classifiers without further adjustments if these
classifiers are developed as so-called quantifiers on the training datasets. The development of such quantifiers involves special optimisation criteria covering both calibration (i.e. the number of objects predicted
as positive equals the true number of positives) and classification power.
Barranquero et al. (2015) recommended the so-called Q-measure as the optimisation criterion for the
quantifier and tested their approach on some real-world datasets. It is not fully clear, however, from
Barranquero et al. (2015) which of their observations are fundamental and which are sample-driven
and incidental. In this paper, therefore, we have identified the theoretically correct way to determine
the best quantifiers according to the Q-measure criterion. We then have replicated the experiment of
Barranquero et al. (2015) in the fully controlled setting of the binormal model with equal variances. For
binary classification settings, we have found that
1) quantification without adjustments in principle may work if proper calibration on the training
dataset is ensured and the positive class prevalences on the training and target datasets are the
same or nearly the same, and
2) the Q-measure approach has to be deployed with care because the quantifiers resulting from it may
be miscalibrated.
All in all, these findings suggest that the potential applications of quantification without adjustments are
rather limited.
References
J. Barranquero, J. Dı́ez, and J.J. del Coz. Quantification-oriented learning based on reliable classifiers.
Pattern Recognition, 48(2):591–604, 2015.
A. Bella, C. Ferri, J. Hernandez-Orallo, and M.J. Ramı́rez-Quintana. Quantification via probability
estimators. In Data Mining (ICDM), 2010 IEEE 10th International Conference on, pages 737–742.
IEEE, 2010.
S. Bickel, M. Brückner, and T. Scheffer. Discriminative learning under covariate shift. The Journal of
Machine Learning Research, 10:2137–2155, 2009.
P. Billingsley. Probability and measure. John Wiley & Sons, third edition, 1995.
M.C. Du Plessis and M. Sugiyama. Semi-supervised learning of class balance under class-prior change by
distribution matching. Neural Networks, 50:110–119, 2014.
15
C. Elkan. The foundations of cost-sensitive learning. In B. Nebel, editor, Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence, IJCAI 2001, pages 973–978. Morgan
Kaufmann, 2001.
A. Esuli and F. Sebastiani. Optimizing Text Quantifiers for Multivariate Loss Functions. ACM Trans.
Knowl. Discov. Data, 9(4):1–27, June 2015. ISSN 1556-4681. doi: 10.1145/2700406. URL http:
//doi.acm.org/10.1145/2700406.
A. Esuli, F. Sebastiani, and A. Abbasi. Sentiment quantification. IEEE intelligent systems, 25(4):72–79,
2010.
T. Fawcett and P.A. Flach. A response to Webb and Ting’s On the Application of ROC Analysis to
Predict classification Performance under Varying Class Distributions. Machine Learning, 58(1):33–38,
2005.
G. Forman. Quantifying counts and costs via classification. Data Mining and Knowledge Discovery, 17
(2):164–206, 2008.
J.J. Gart and A.A. Buck. Comparison of a screening test and a reference test in epidemiologic studies.
II. A probabilistic model for the comparison of diagnostic tests. American Journal of Epidemiology,
83(3):593–602, 1966.
V. González-Castro, R. Alaiz-Rodrı́guez, and E. Alegre. Class distribution estimation based on the
Hellinger distance. Information Sciences, 218:146–164, 2013.
V. Hofer. Adapting a classification rule to local and global shift when only unlabelled data are available.
European Journal of Operational Research, 243(1):177–189, 2015.
V. Hofer and G. Krempl. Drift mining in data: A framework for addressing drift in classification. Computational Statistics & Data Analysis, 57(1):377–391, 2013.
D.J. Hopkins and G. King. A Method of Automated Nonparametric Content Analysis for Social Science.
American Journal of Political Science, 54(1):229–247, 2010.
H. Kawakubo, M.C. du Plessis, and M. Sugiyama. Computationally Efficient Class-Prior Estimation under
Class Balance Change Using Energy Distance. IEICE Transactions on Information and Systems, 99
(1):176–186, 2016.
M. Kull and P. Flach. Patterns of dataset shift. Working paper, 2014.
L. Milli, A. Monreale, G. Rossetti, F. Giannotti, D. Pedreschi, and F. Sebastiani. Quantification trees.
In 13th International Conference on Data Mining (ICDM), pages 528–536. IEEE, December 2013. doi:
10.1109/ICDM.2013.122.
J.G. Moreno-Torres, T. Raeder, R. Alaiz-Rodriguez, N.V. Chawla, and F. Herrera. A unifying view on
dataset shift in classification. Pattern Recognition, 45(1):521–530, 2012.
J.C. Platt. Probabilities for SV Machines. In P.J. Bartlett, B. Schölkopf, D. Schuurmans, and A.J. Smola,
editors, Advances in Large-Margin Classifiers, pages 61–74. MIT Press Cambridge, 2000.
R Development Core Team. R: A Language and Environment for Statistical Computing. R Foundation
for Statistical Computing, Vienna, Austria, 2010. URL http://www.R-project.org/.
M. Saerens, P. Latinne, and C. Decaestecker. Adjusting the Outputs of a Classifier to New a Priori
Probabilities: A Simple Procedure. Neural Computation, 14(1):21–41, 2002.
16
L.L. Scharf. Statistical signal processing: detection, estimation, and time series analysis. Addison-Wesley,
1991.
H. Shimodaira. Improving predictive inference under covariate shift by weighting the log-likelihood
function. Journal of statistical planning and inference, 90(2):227–244, 2000.
A. Storkey. When Training and Test Sets Are Different: Characterizing Learning Transfer. In
J. Quiñonero-Candela, M. Sugiyama, A. Schwaighofer, and N.D. Lawrence, editors, Dataset Shift in
Machine Learning, pages 3–28. Cambridge, MA: MIT Press, 2009.
M. Sugiyama, M. Krauledat, and K.-R. Müller. Covariate shift adaptation by importance weighted cross
validation. The Journal of Machine Learning Research, 8:985–1005, 2007.
D. Tasche. Exact fit of simple finite mixture models. Journal of Risk and Financial Management, 7(4):
150–164, 2014.
C.J. van Rijsbergen. Foundation of evaluation. Journal of Documentation, 30(4):365–373, 1974.
H.L. van Trees. Detection, Estimation, and Modulation Theory, Part I. John Wiley & Sons, 1968.
J.C. Xue and G.M. Weiss. Quantification and Semi-supervised Classification Methods for Handling
Changes in Class Distribution. In Proceedings of the 15th ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining, pages 897–906, New York, 2009.
N. Ye, K.M. Chai, W.S. Lee, and H.L. Chieu. Optimizing F-measure: A Tale of Two Approaches.
In J. Langford and J. Pineau, editors, Proceedings of the 29th International Conference on Machine
Learning (ICML-12), pages 289–296, New York, NY, USA, 2012. ACM. URL http://icml.cc/2012/
papers/175.pdf.
A. Appendix: Optimal classifiers for the F-measure
In the following, we give a proof of (2.8) which is based on the idea of Ye et al. (2012) and fills the gaps
left by them.
Proof of (2.8). The proof makes use of the four following lemmata.
Lemma A.1 Let (Ω, A, P), A ∈ A and H ⊂ A be as in Assumption 2.1.Then there are a probability
space (Ω̃, Ã, P̃), an event à ∈ à and a sub-σ-field H̃ of à with the following three properties:
(i) There is a measurable mapping X : (Ω̃, Ã) → (Ω, A) such that
P̃ ◦ X −1 = P,
à = X −1 (A),
H̃ ⊃ X −1 (H),
P̃[Ã | H̃] = P[A | H] ◦ X.
(ii) (Ω̃, Ã, P̃), Ã ∈ Ã and H̃ satisfy Assumption 2.1.
def
(iii) For any H ∈ H and α ∈ [0, 1] there exists H̃α ∈ H̃, H̃α ⊂ X −1 (H) = H̃ such that
P̃[H̃α ] = α P̃[H̃].
Proof of Lemma A.1. For (i) and (ii), define Ω̃ = Ω × (0, 1), Ã = A ⊗ B(0, 1), P̃ = P ⊗ U (0, 1), and let
X be the projection from Ω̃ to Ω, where B(0, 1) denotes the Borel-σ-field on (0, 1) and U (0, 1) stands for
the uniform distribution on (0, 1). In addition, let H̃ = H ⊗ B(0, 1). For (iii), define H̃α = H × (0, α). 2
Lemma A.2 Under Assumption 2.1, for any fixed H ∈ H there is a number q ∈ [0, 1] such that
P P[A | H] > q ≤ P[H] ≤ P P[A | H] ≥ q .
17
(A.1)
2
Proof. Choose q as an (1 − P[H])-quantile of P[A | H] or q ∈ {0, 1}.
Lemma A.3 Under Assumption 2.1, if for a fixed H ∈ H there are H ∗ ∈ H and 0 ≤ q ≤ 1 such that
{P[A | H] > q} ⊂ H ∗ ⊂ {P[A | H] ≥ q}
and
P[H] = P[H ∗ ],
then it holds that P[H ∩ A] ≤ P[H ∗ ∩ A].
Proof. By assumption we have H ∗ ⊂ {P[A | H] ≥ q} and (H ∗ )c ⊂ {P[A | H] ≤ q}. This implies
P[H ∗ ∩ A] − P[H ∩ A] = P[H ∗ ∩ H c ∩ A] − P[(H ∗ )c ∩ H ∩ A]
= E P[A | H] 1H ∗ ∩H c − E P[A | H] 1(H ∗ )c ∩H
≥ q P[H ∗ ∩ H c ] − q P[(H ∗ )c ∩ H]
= q P[H ∗ ] − P[H] = 0.
2
Lemma A.4 Under Assumption 2.1, for all β > 0 and q ∈ [0, 1] it holds that
Fβ (H) ≤ max Fβ (H ∩ {P[A | H] > q}), Fβ (H ∪ {P[A | H] = q}) .
(A.2)
Proof. The proof of this lemma is essentially identical with the proof given by Ye et al. (2012) for
Theorem 4. This suggests that the proof by Ye et al. (2012) is incomplete since some more steps are
needed to show that (A.2) implies (2.8).
Fix β > 0. We distinguish the two cases q = 1 and 0 ≤ q < 1. For the sake of a more concise notation,
we define
Z = P[A | H].
Case q = 1. We show that Fβ (H) ≤ Fβ (H ∪ {Z = 1}). Note that H ∪ {Z = 1} = H ∪ (H c ∩ {Z = 1})
and that
P[A ∩ H c ∩ {Z = 1}] = E Z 1H c ∩{Z=1} = P[H c ∩ {Z = 1}].
This implies
Fβ (H) ≤ Fβ (H ∪ {Z = 1})
(1 + β 2 ) P[A ∩ H] + P[H c ∩ {Z = 1}]
(1 + β 2 ) P[A ∩ H]
≤
⇔
β 2 P[A] + P[H]
β 2 P[A] + P[H] + P[H c ∩ {Z = 1}]
⇔ P[A ∩ H] P[H c ∩ {Z = 1}] ≤ P[H] P[H c ∩ {Z = 1}] + β 2 P[A] P[H c ∩ {Z = 1}].
The last row of this equation chain is true because P[A ∩ H] ≤ P[H]. This proves (A.2) in the case q = 1.
Case 0 ≤ q < 1. We show that Fβ (H) > Fβ (H ∩ {Z > q}) implies Fβ (H) ≤ Fβ (H ∪ {Z = q}). Observe
first that
⇔
Fβ (H) > Fβ (H ∩ {Z > q})
β P[A] + P H ∩ {Z > q} P A ∩ H ∩ {Z ≤ q} > P H ∩ {Z ≤ q} P A ∩ H ∩ {Z > q} . (A.3)
2
Secondly, we have
Fβ (H) ≤ Fβ (H ∪ {Z = q})
c
⇔ P[A ∩ H] P H ∩ {Z = q} ≤ β 2 P[A] + P[H] q P H c ∩ {Z = q} .
18
(A.4)
If P H c ∩ {Z = q} = 0 then by (A.4) there is nothing left to be proved. Hence assume P H c ∩ {Z =
q} > 0. Then from (A.4) we obtain
Fβ (H) ≤ Fβ (H ∪ {Z = q})
⇔ P[A ∩ H] ≤
β 2 P[A] + P[H] q.
(A.5)
(A.3) implies P H ∩ {Z ≤ q} > 0 because otherwise we would have 0 > 0. Therefore, (A.5) follows from
(A.3) because
P[A ∩ H] = P A ∩ H ∩ {Z ≤ q} + P A ∩ H ∩ {Z > q}
β 2 P[A] + P H ∩ {Z > q} P A ∩ H ∩ {Z ≤ q}
≤ P A ∩ H ∩ {Z ≤ q} +
P H ∩ {Z ≤ q}
!
β 2 P[A] + P H ∩ {Z > q}
= E Z 1H∩{Z≤q} 1 +
P H ∩ {Z ≤ q}
β 2 P[A] + P[H]
≤ P H ∩ {Z ≤ q} q
P H ∩ {Z ≤ q}
= β 2 P[A] + P[H] q.
Hence (A.5) is true if (A.3) holds. This completes the proof of (A.2).
2
Finishing the proof of (2.8). Fix H ∈ H. We need to show that there is a number 0 ≤ q ≤ 1 such that
Fβ (H) ≤ max Fβ ({P[A | H] > q}), Fβ ({P[A | H] ≥ q}) .
(A.6)
Since Fβ (H) = 0 if P[H] = 0, (A.6) is obvious is that case. Therefore, we may assume P[H] > 0 for the
remainder of the proof.
The notation Fβ (H) hides the fact that Fβ (H) does not only depend on the classifier H, but also on
the class event A and the probability measure P. This matters because the next step in the proof is to
replace (Ω, A, P), A and H by (Ω̃, Ã, P̃), Ã and H̃ as provided by Lemma A.1. In the following, when
using notation like Fβ (H̃) we implicitly assume that all ingredients for the calculation come from the
probability space (Ω, A, P).
Against this backdrop, define H̃ = X −1 (H) where X denotes the projection on Ω as defined in Lemma A.1.
Then it is easy to see that
Fβ (H) = Fβ (H̃), Fβ ({P[A | H] > q}) = Fβ ({P̃[Ã | H̃] > q}), Fβ ({P[A | H] ≥ q}) = Fβ ({P̃[Ã | H̃] ≥ q}).
Hence, if we prove
Fβ (H̃) ≤ max Fβ ({P̃[Ã | H̃] > q}), Fβ ({P̃[Ã | H̃] ≥ q}) ,
(A.7)
(A.6) immediately follows. Choose 0 ≤ q ≤ 1 according to Lemma A.2 such that
P̃ P̃[Ã | H̃] > q ≤ P̃[H̃] ≤ P̃ P̃[Ã | H̃] ≥ q .
(A.8)
By Lemma A.1 (iii) and (A.8), there exists an event H̃0 ∈ H̃ such that
H̃0 ⊂ {P̃[Ã | H̃] = q} and P̃[H̃0 ] = P̃[H̃] − P̃ P̃[Ã | H̃] > q .
Hence for H̃ ∗ = H̃0 ∪ {P̃[Ã | H̃] > q} we obtain
P̃[H̃ ∗ ] = P̃[H̃]
and {P̃[Ã | H̃] > q} ⊂ H̃ ∗ ⊂ {P̃[Ã | H̃] ≥ q}.
Now, Lemma A.3 implies that
Fβ (H̃) =
(1 + β 2 ) P̃[Ã ∩ H̃ ∗ ]
(1 + β 2 ) P̃[Ã ∩ H̃]
≤
= Fβ (H̃ ∗ ).
β 2 P̃[Ã] + P̃[H̃]
β 2 P̃[Ã] + P̃[H̃ ∗ ]
19
(A.9)
From Lemma A.4, it follows that
Fβ (H̃ ∗ ) ≤ max Fβ (H̃ ∗ ∩ {P̃[Ã | H̃] > q}), Fβ (H̃ ∗ ∪ {P̃[Ã | H̃] = q}) .
(A.10)
Note that by construction, we have got that
H̃ ∗ ∩ {P̃[Ã | H̃] > q} = {P̃[Ã | H̃] > q}
and H̃ ∗ ∪ {P̃[Ã | H̃] = q} = {P̃[Ã | H̃] ≥ q}.
2
Hence, (A.9) and (A.10) together imply (A.7).
20
| 10math.ST
|
UNIFORM SYMBOLIC TOPOLOGIES VIA MULTINOMIAL EXPANSIONS
arXiv:1703.04530v2 [math.AC] 15 Dec 2017
ROBERT M. WALKER
Abstract. When does a Noetherian commutative ring R have uniform symbolic topologies on
primes–read, when does there exist an integer D > 0 such that the symbolic power P (Dr) ⊆ P r for
all prime ideals P ⊆ R and all r > 0? Groundbreaking work of Ein-Lazarsfeld-Smith, as extended
by Hochster and Huneke, and by Ma and Schwede in turn, provides a beautiful answer in the setting
of finite-dimensional excellent regular rings. It is natural to then sleuth for analogues where the ring
R is non-regular, or where the above ideal containments can be improved using a linear function
whose growth rate is slower. This manuscript falls under the overlap of these research directions.
Working with a prescribed type of prime ideal Q inside of tensor products of domains of finite type
over an algebraically closed field F, we present binomial- and multinomial expansion criteria for
containments of type Q(Er) ⊆ Qr , or even better, of type Q(E(r−1)+1) ⊆ Qr for all r > 0. The final
section consolidates remarks on how often we can utilize these criteria, presenting an example.
1. Introduction and Conventions for the Paper
Given a Noetherian commutative ring R, when is there an integer D, depending only on R, such
that the symbolic power P (Dr) ⊆ P r for all prime ideals P ⊆ R and all positive integers r? In
short, when does R have uniform symbolic topologies on primes [6, Section 3] [16]?
The Ein-Lazarsfeld-Smith Theorem [8], as extended by Hochster and Huneke [13], says that if R
is a d-dimensional regular ring containing a field, then Q(Dr) ⊆ Qr for all radical ideals Q ⊆ R and
all r > 0, where D = max{1, d−1}.1 To what extent does this theme ring true for non-regular rings?
Under mild stipulations, a local domain R regular on the punctured spectrum has uniform symbolic
topologies on primes [15, Cor. 3.10]. This paper makes first strides in establishing affirmative cases
of the above questions for rings with non-isolated singularities. We postpone sojourning into that
wilderness until Section 3, once we have proven our main result–Theorem 1.2.
We now revisit the regular setting. Over an arbitrary field F, S = F[PN ] = F[x0 , x1 , . . . , xN ]
is a standard N-graded polynomial ring. The groundbreaking work of Ein-Lazarsfeld-Smith and
Hochster-Huneke [8, 13] implies that the symbolic power I (N r) ⊆ I r for all graded ideals 0 $ I $ S
and all integers r > 0. In particular, I (4) ⊆ I 2 holds for all graded ideals in F[P2 ], and Huneke
asked whether an improvement I (3) ⊆ I 2 holds for any radical ideal I defining a finite set of points
in P2 . Building on this, Harbourne proposed dropping the symbolic power from N r down to the
Harbourne-Huneke bound N r − (N − 1) = N (r − 1) + 1 when N ≥ 2 [3, Conj. 8.4.2]: i.e.,
I (N (r−1)+1) ⊆ I r for any graded ideal 0 $ I $ S, all r > 0, and all N ≥ 2.
(1.0.1)
There are several scenarios where these improved containments hold: for instance, they hold for all
monomial ideals in S over any field [3, Ex. 8.4.5]; see also recent work of Grifo-Huneke [10].
2010 Mathematics Subject Classification: 13H10, 14C20, 14M25.
Keywords: multinomial theorem, non-isolated singularities, symbolic powers, toric variety.
1This result has been extended to all excellent regular rings, even in mixed characteristic, by Ma-Schwede [17].
1
However, Dumnicki, Szemberg, and Tutaj-Gasińska showed in characteristic zero [7] that the
containment I (3) ⊆ I 2 can fail for a radical ideal defining a point configuration in P2 . HarbourneSeceleanu showed in odd positive characteristic [12] that (1.0.1) can fail for pairs (N, r) 6= (2, 2)
and ideals I defining a point configuration in PN . Akesseh [1] cooks up many new counterexamples
to (1.0.1) from these original constructions. No prime ideal counterexample has been found.
Our goal is to establish Harbourne-Huneke bounds on the growth of symbolic powers of certain
primes in non-regular Noetherian rings containing a field. This project first began with Theorems
1.1 and 3.1 in [22]: to clarify, normal affine semigroup rings are domains generated by Laurent
monomials that arise as the coordinate rings of normal affine toric varieties [5, 9].
Theorem 1.1 ([22, Thm. 1.1]). Let R1 , . . . , Rn be normal affine semigroup rings over a field
F, built, respectively, from full-dimensional strongly convex rational polyhedral cones σi ⊆ Rmi ,
1 ≤ i ≤ n. For each 1 ≤ i ≤ n, suppose there is an integer Di > 0 such that P (Di (r−1)+1) ⊆ P r for
all r > 0 and all monomial primes P ⊆ Ri . Set D := max{D1 , . . . , Dn }. Then Q(D(r−1)+1) ⊆ Qr
for all r > 0 and any monomial prime Q in the normal affine semigroup ring R = R1 ⊗F · · · ⊗F Rn .
To prove Theorem 1.1, we needed to know first that monomial primes
P in Ri expand to monomial
primes in R, that any Q as above can be expressed as a sum Q = ni=1 Pi R where each Pi ⊆ Ri is
a monomial prime, and that the symbolic powers of Q admit a multinomial expansion in terms of
symbolic powers of the Pi R. These ideas will resurge below, but in a more general setup.
One drawback of Theorem 1.1 is that it only covers a finite collection of prime ideals. What
follows is the main result of this paper, a more powerful variant of Theorem 1.1 that will typically
cover infinitely-many primes inside of tensor product domains; see Remark 2.11 for details.
Theorem 1.2. Let F be an algebraically closed field. Let R1 , . . . , Rn (n ≥ 2) be affine commutative
F-algebras which are domains. Suppose that for each 1 ≤ i ≤ n, there exists a positive integer Di
such that for all prime ideals P in Ri , either: (1) P (Di r) ⊆ P r for all r > 0 and for all i; or, even
stronger, (2) P (Di (r−1)+1) ⊆ P r for all r > 0 and for all i. Fix any
N nnprime ideals Pi in Ri , and
′
consider the expanded ideals Pi = Pi T in the affine domain T = ( F )i=1 Ri , along with their sum
P
Q = ni=1 Pi′ in T . When (1) holds, Q(Dr) ⊆ Qr for all r > 0, where D = D1 + · · · + Dn . When
(2) holds, this improves to Q(D(r−1)+1) ⊆ Qr for all r > 0, where D = max{D1 , . . . , Dn }.
The proof of this theorem leverages a multinomial formula for the symbolic powers of the prime
ideal Q in T (Theorem 2.8). Hà, Nguyen, Trung, and Trung recently announced a binomial theorem
for symbolic powers of ideal sums [11, Thm. 3.4], generalizing [4, Thm. 7.8], where one takes two
arbitrary ideals I ⊆ A, J ⊆ B inside of two Noetherian commutative algebras over a common field
k, whose tensor product R = A ⊗k B is Noetherian; see Remark 2.12 for details. However, we give
a proof of the Multinomial Theorem 2.8 which is more elementary and self-contained.
Conventions: All our rings are Noetherian and commutative with identity. Indeed, our rings will
typically be affine F-algebras, that is, of finite type over a fixed field F of arbitrary characteristic.
By algebraic variety, we will mean an integral scheme of finite type over the field F.
Acknowledgements: I thank my thesis adviser Karen E. Smith, while on her sabbatical, and my
surrogate adviser, Mel Hochster, for several patient and fruitful discussions during the Fall 2016
semester. I thank Huy Tài Hà for sharing a preliminary draft of Section 2 of [11] in November 2016. I
thank Eloı́sa Grifo Pires, Daniel Hernández, Jack Jeffries, Luis Núñez-Betancourt, and Felipe Pérez
for reading a draft of the paper. I thank an anonymous referee for comments improving exposition
in the paper. I acknowledge support from a NSF GRF (Grant No. PGF-031543), NSF RTG grant
DMS-0943832, and a 2017 Ford Foundation Dissertation Fellowship.
2
2. A Multinomial Theorem for Symbolic Powers of Primes
If P is any prime ideal in a Noetherian ring R, its a-th (a ∈ Z>0 ) symbolic power ideal
P (a) = P a RP ∩ R = {f ∈ R : uf ∈ P a for some u ∈ R − P }
is the P -primary component in any Lasker-Noether minimal primary decomposition of P a ; it is the
smallest P -primary ideal containing P a . We separately set P (0) = P 0 = R to be the unit ideal.
Note that P (1) = P , while the inclusion P (a) ⊇ P a for each a > 1 can be strict. Before proceeding,
we record a handy asymptotic conversion lemma.
Lemma 2.1 (Cf., [22, Lem. 3.3]). Given a prime ideal P in a Noetherian ring S, and E ∈ Z>0 ,
P (N ) ⊆ P ⌈N/E⌉ for all N ≥ 0 ⇐⇒ P (E(r−1)+1) ⊆ P r for all r > 0.
Torsion free modules over Noetherian Domains. A module M over a domain R is torsion
free if whenever rx = 0 for some x ∈ M and r ∈ R, then either r = 0 or x = 0. We first record
a lemma on torsion free modules to be used both here and in the next subsection (cf., Lemmas
15.6.7-8 from the Stacks Project page [20] on torsion free modules):
Lemma 2.2. Let R be a Noetherian domain. Let M be a nonzero finitely generated R-module.
Then the following assertions are equivalent:
(1) M is torsion free;
(2) M is a submodule of a finitely generated free module;
(3) (0) is the only associated prime of M, i.e., AssR (M ) = {(0)}.
Working over an arbitrary field F, we fix two affine F-algebras R and S which are domains. The
tensor product T = R ⊗F S will be an affine F-algebra. T is a domain when F is algebraically closed
(Milne [18, Prop. 4.15]). We note that when R and S are duly nice (e.g., polynomial, or normal
toric rings more generally), T is a domain over any field. We now record two additional lemmas.
Lemma 2.3. Suppose that all three of R, S, and T = R ⊗F S are affine domains over a field F. If
M and N are finitely generated torsion free modules over R and S, respectively, then M ⊗F N is a
finitely generated torsion free T -module.
Proof. Viewed as vector spaces, M ⊗F N = 0 if and only if M = 0 or N = 0, in which case torsion
freeness is vacuous. So we will assume all three of M, N, and M ⊗F N are nonzero. Per Lemma 2.2,
suppose we have embeddings M ⊆ Ra and N ⊆ S b . Apply the functor • ⊗F N to the first inclusion
to get M ⊗ N ⊆ Ra ⊗ N , which in turn is contained in Ra ⊗ S b by tensoring the inclusion N ⊆ S b
with Ra . Thus M ⊗ N ⊆ Ra ⊗ S b ∼
= (R ⊗ S)ab = T ab , where the isomorphism is easily checked
in the category of F-vector spaces since direct sum commutes with tensor product. Of course, this
inclusion holds in the category of T -modules, and all T -submodules of T ab are finitely generated
since T is Noetherian, so we are done by invoking Lemma 2.2 again.
Lemma 2.4. For any prime P in any Noetherian ring A, the finitely generated module P (a) /P (a+1)
is torsion free as an A/P -module for all integers a ≥ 0.
Proof. Say x ∈ (P (a) /P (a+1) ) is killed by r ∈ A/P . This means, lifting to A, that x ∈ P (a)
and rx ∈ P (a+1) . Localize at P . Then rx ∈ P (a+1) AP = P a+1 AP . If r 6∈ P , this means x ∈
P a+1 AP ∩ A = P (a+1) . That is, either r = 0 in A/P or otherwise, x = 0 in (P (a) /P (a+1) ). Ergo by
definition, (P (a) /P (a+1) ) is a torsion-free A/P -module.
3
Finally, we record a consequence of Lemma 2.3 that will be important in the next subsection.
The following proposition follows immediately from Lemmas 2.3 and 2.4
Proposition 2.5. Suppose that all three of R, S, and T = R ⊗F S are affine domains over a
field F. Fix two prime ideals P and Q in R and S respectively, such that the affine F-algebra
T ′ = (R/P ) ⊗F (S/Q) is a domain. Then (P (a) /P (a+1) ) ⊗F (Q(b) /Q(b+1) ) is finitely generated and
torsion free over T ′ for any pair of nonnegative integers a and b.
Proving the Multinomial Theorem. Working over an algebraically closed field F, we fix two
affine F-algebras R and S that are domains, and two prime ideals P ⊆ R, Q ⊆ S. Let
T = R ⊗ S ⊇ P ⊗ S + R ⊗ Q =: P T + QT, T ′ = (R/P ) ⊗ (S/Q) ∼
= T /(P T + QT ),
where all tensor products are over F. Both T and T ′ are affine domains over F. Because F is
algebraically closed, the extended ideals P T, QT are both prime, along with their sum P T + QT .
We cannot relax the assumption that F is algebraically closed to its merely being perfect. For
instance, R is perfect (being of characteristic zero), and along the ring extension
S :=
R[x] ∼
C[x] ∼
= C ֒→ T := 2
= C ⊗R S ∼
= C ⊗R C
(x2 + 1)
(x + 1)
the zero ideal of S (which is maximal) extends to a radical ideal which is not prime.
Relative to a flat map φ : A → B of Noetherian rings, we define the ideal JB := hφ(J)iB for
any ideal J in A. Then J r B = (JB)r for all r ≥ 0, since the two ideals share a generating set. We
define the set P(A) = {prime ideals P ⊆ A : P B is prime} to consist of prime ideals that extend
along φ to prime ideals of B. We now record without proof a handy proposition.
Proposition 2.6 (Cf., [22, Prop. 2.1]). Suppose φ : A → B is a faithfully flat map of Noetherian
rings. Then for each prime ideal P ∈ P(A) and all integer pairs (N, r) ∈ (Z≥0 )2 , we have
P (N ) B = (P B)(N ) ,
and
P (N )
⊆
Pr
if and only if
(P B)(N )
=
P (N ) B
⊆
P rB
=
(2.0.1)
(P B)r .
When B is a polynomial ring in finitely many variables over A and φ is inclusion, P(A) = Spec(A).
It is possible that P(A) 6= Spec(A) in Proposition 2.6, per the T ∼
= C ⊗R C example. Working
over a field F, we use Proposition 2.6 when B = A ⊗F C for two affine F-algebras, so B is an affine
F-algebra; when A and C are domains and F is algebraically closed, B is a domain, P(A) = Spec(A)
and P(C) = Spec(C).
We are now ready to prove a binomial theorem for the symbolic powers of P T + QT .
P
Theorem 2.7. For all n ≥ 1, the symbolic power (P T + QT )(n) = a+b=n (P T )(a) (QT )(b) .
Proof. We’ll drop the T ’s from the notation,
P and we will assume that both P, Q are nonzero to
justify the effort. For 0 ≤ c ≤ n, set Jc = ct=0 P (c−t) Q(t) , so Jc ⊆ Jc−1 for all 1 ≤ c ≤ n, since
P (c−t) ⊆ P (c−1−t) for t ≤ c − 1 and for t = c, Q(c) ⊆ Q(c−1) . Note that
X
X
(!)
(P + Q)n =
P a Qb ⊆ Jn =
P (a) Q(b) ⊆ (P + Q)(n) ,
a+b=n
a+b=n
and (!) is easy to verify term-by-term for each P (a) Q(b) . Indeed, P (a) Q(b) is generated by elements
of the form f g with f ∈ P (a) ⊂ R and g ∈ Q(b) ⊂ S (viewing them as elements of T ). We need
f g ∈ (P + Q)(a+b) . Per Proposition 2.6, there exist u ∈ R − P and v ∈ S − Q such that uf ∈ P a and
4
vg ∈ Qb . Viewing u and v as elements of the overring T , we have uv 6∈ (P + Q). Indeed, since P + Q
is prime, if uv ∈ P + Q, then either u or v is in P + Q, but (P + Q)T ∩ R = P and (P + Q)T ∩ S = Q,
contradicting that u 6∈ P and v 6∈ Q. Therefore, in T , (uf )(vg) = (uv)(f g) ∈ P a Qb ⊂ (P + Q)a+b ,
which means f g ∈ (P + Q)(a+b) . Thus (!) holds, and notably Jn is a proper ideal–read, Jn $ T .
Since Jn contains (P + Q)n , and (P + Q)(n) is the smallest (P + Q)-primary ideal containing
(P +Q)n , the opposite inclusion to (!) will follow once we show that Jn is (P +Q)-primary, i.e., that
the set of associated primes AssT (T /Jn ) = {P + Q}. We have short exact sequences of T -modules
0 → Jc−1 /Jc → T /Jc → T /Jc−1 → 0,
for all 1 ≤ c ≤ n.
Thus AssT (Jc−1 /Jc ) ⊆ AssT (T /Jc ) ⊆ AssT (Jc−1 /Jc ) ∪ AssT (T /Jc−1 ) for all 1 ≤ c ≤ n, using the
fact that given an inclusion of modules N ⊆ M ,
Ass(N ) ⊆ Ass(M ) ⊆ Ass(N ) ∪ Ass(M/N ).
Thus by iterative unwinding and using that J0 = T , i.e., AssT (T /J0 ) = ∅, we conclude that
∅ 6= AssT (T /Jn ) ⊆
n
[
AssT (Jc−1 /Jc ).
(2.0.2)
c=1
Taking all direct sums and tensor products over F, we have a series of vector space isomorphisms
M
[P (a) /P (a+1) ⊗ Q(b) /Q(b+1) ], 1 ≤ c ≤ n.
(2.0.3)
Jc−1 /Jc ∼
=
a+b=c−1
We prove this first, considering two chains of symbolic powers, where each ideal is expressed as a
direct sum of F-vector spaces:
P (c) = V0 ⊆ P (c−1) = V0 ⊕ V1 ⊆ . . . ⊆ P (0) = R = V0 ⊕ · · · ⊕ Vc ,
Q(c) = W0 ⊆ Q(c−1) = W0 ⊕ W1 ⊆ . . . ⊆ Q(0) = S = W0 ⊕ · · · ⊕ Wc .
In particular, for all pairs 0 ≤ a, b ≤ c − 1,
P (a) =
c−a
M
Vi ,
P (a+1) =
c−a−1
M
Q(b) =
Vi ,
Q(b+1) =
Wj ,
c−b−1
M
Wj .
j=0
j=0
i=0
i=0
c−b
M
For any pair a, b as above with a + b = c − 1, c − b = a + 1, and so
M
a+b=c−1
P (a)
Q(b) ∼
⊗
=
F
P (a+1)
Q(b+1)
M
Vc−a ⊗ Wc−b =
c−1
M
Vc−a ⊗ Wa+1 .
a=0
a+b=c−1
We now prove (2.0.3) by killing off a common vector space. First,
X
M
Jc−1 =
P (a) Q(b) =
Vi ⊗ W j
a+b=c−1
0≤a≤c−1
0≤i≤c−a,0≤j≤a+1
=
M
(Vi ⊗ Wj ) ⊕
0≤a≤c−1
or
M
0≤i<c−a
while
Jc =
X
a+b=c
P (a) Q(b) =
0≤a≤c
0≤j<a+1
0≤i≤c−a,0≤j≤a
5
Vi ⊗ W j .
c−1
M
a=0
Vc−a ⊗ Wa+1 ,
Identifying repeated copies of a Vi ⊗ Vj term with i + j ≤ c (we can do this since we are working
with vector subspaces of the ring T ), it is straightforward to check that the boxed sums are equal.
Thus for each 1 ≤ c ≤ n, we have canonical isomorphisms of F-vector spaces:
Jc−1 /Jc ∼
=
c−1
M
Vc−a ⊗ Wa+1 ∼
=
a=0
M
a+b=c−1
Q(b)
P (a)
⊗
.
F
P (a+1)
Q(b+1)
Therefore, since for each 1 ≤ c ≤ n there is a natural surjective T -module map (hence F-linear)
M
[P (a) /P (a+1) ⊗ Q(b) /Q(b+1) ] → Jc−1 /Jc ,
a+b=c−1
this map must be injective per isomorphism (2.0.3). Thus for all 1 ≤ c ≤ n,
[
AssT (Jc−1 /Jc ) =
AssT [P (a) /P (a+1) ⊗ Q(b) /Q(b+1) ].
a+b=c−1
For any 1 ≤ c ≤ n such that Jc−1 /Jc 6= 0, i.e., AssT (Jc−1 /Jc ) 6= ∅, in turn the above identity
implies that one of the modules P (a) /P (a+1) ⊗ Q(b) /Q(b+1) is nonzero, in which case
[
AssT (Jc−1 /Jc ) =
AssT [P (a) /P (a+1) ⊗ Q(b) /Q(b+1) ] = {P + Q}.
(2.0.4)
a+b=c−1
To explain the right-hand equality: for any pair (a, b) ∈ (Z≥0 )2 , Proposition 2.5 says that
Ma,b := P (a) /P (a+1) ⊗ Q(b) /Q(b+1)
is a finitely generated torsion-free module over T ′ = (R/P ) ⊗ (S/Q) ∼
= T /(P + Q); thus when
Ma,b 6= 0, we have AssT /(P +Q) (Ma,b ) = {(0)} by Lemma 2.2: that is, AssT (Ma,b ) = {P + Q}.
Finally, combining (2.0.4) with the inclusion
(2.0.2) for AssT (T /Jn ) 6= ∅–recall, Jn is a proper
S
ideal, we conclude that AssT (T /Jn ) = nc=1 AssT (Jc−1 /Jc ) = {P + Q}, that is, the ideal Jn is
(P + Q)-primary as was to be shown. Thus Jn ⊇ (P + Q)(n) , and indeed this is an equality.
We now deduce a multinomial theorem by induction on the number of tensor factors:
Theorem 2.8. Let F be an algebraically closed field. Let R1 , . . . , Rn (n ≥ 2) be affine commutative
F-algebras which are domains. Fix any
N n prime ideals Pi in Ri , and consider the expanded ideals
Pi′ = Pi T in the affine domain T = ( F )ni=1 Ri . Then the symbolic power
!(N )
n
n
Y
X
X
′
(Pi′ )(Ai ) for any N ≥ 0.
(2.0.5)
Pi
=
i=1
A1 +···+An =N i=1
Proof. Induce on the number n of tensor factors with base case n = 2 being Theorem 2.7. Now
suppose n ≥ 3, and assume the result for tensoring up to n − 1 factors. Suppose that R = R1 and
S = R2 ⊗F · · · ⊗F Rn , and that we have an expansion result in S of the form
!(N )
n
n
X
Y
X
(A )
Pi
Pi i
for all nonnegative integers N
(2.0.6)
=
i=2
A2 +...+An =N i=2
P
for n − 1 primes Pi ⊆ Ri (2 ≤ i ≤ n). The sum Q := ni=2 Pi is prime along with all extensions of
the Pi to S. Given a prime P = P1 in R, the sum P + Q is prime in T = R ⊗F S, together with all
6
extensions Pi T and QT being prime. The first equality below holds by Theorem 2.7, and applying
Proposition 2.6 to the extension φ : S ֒→ T , the second equality holds by (2.0.6):
n
N
Y
X
X
X
(A )
(A )
P i
P1 1
(P + Q)(N ) =
P (A1 ) Q(B) =
i
A2 +...+An =N −A1 i=2
A1 =0
A1 +B=N
n
Y
X
⊆
(Ai )
Pi
,
A1 +A2 +...+An =N i=1
using the fact that I(J + K) ⊆ IJ + IK whenever I, J, K are ideals in a commutative ring. This
proves the n-fold version of the hard inclusion in the proof of Theorem 2.7; deducing the opposite
inclusion is about as easy as before, hence the above inclusion is an equality.
Proving Theorem 1.2: We now use the Multinomial Theorem 2.8 to deduce a corollary. Note
that Theorem 1.2 is the version of this corollary where all tensor factors are assumed to satisfy
uniform symbolic topologies on primes.
Corollary 2.9. Let F be an algebraically closed field. Let R1 , . . . , Rn (n ≥ 2) be affine commutative
F-algebras which are domains.
n primes Pi P
⊆ Ri , and consider the expanded ideals Pi′ = Pi T
N Fix
in the affine domain T = ( F )ni=1 Ri ; set Q = ni=1 Pi′ . Suppose that for each 1 ≤ i ≤ n, there
exists a positive integer Di such that either:
(D r)
(1) Pi i ⊆ Pir for all r > 0 and for all i; or, even stronger,
(D (r−1)+1)
(2) Pi i
⊆ Pir for all r > 0 and for all i.
When (1) holds, Q(Dr) ⊆ Qr for all r > 0, where D = D1 + · · · + Dn . When (2) holds, this improves
to Q(D(r−1)+1) ⊆ Qr for all r > 0, where D = max{D1 , . . . , Dn }.
Proof. Assume (1) holds. Per Theorem 2.8 note that for D = D1 + D2 + · · · + Dn ,
Q
(Dr)
n
Y
(Pi′ )(Ai ) .
X
=
A1 +A2 +···+An =D1 r+D2 r+···+Dn r i=1
In each n-tuple of indices (A1 , . . . , An ), we must have that Aj ≥ Dj r for some j, otherwise
Pn
Pn
Qn
′ (Ai ) will lie in some (P ′ )r
j
i=1 Ai <
i=1 Di r, a contradiction. Thus each summand
i=1 (Pi )
r
applying (1) and Proposition 2.6, and hence also in Q . Since r > 0 was arbitrary, we win.
(D(r−1)+1)
If (2) holds, then Pi
⊆ Pir for all r > 0 and all i, where D = max1≤i≤n Di , so equivalently
per Lemma 2.1 and Proposition 2.6, for all n-tuples (A1 , . . . , An ) ∈ (Z≥0 )n , we have containments
(Pi′ )(Ai ) ⊆ (Pi′ )⌈Ai /D⌉ ⊆ Q⌈Ai /D⌉ . For all nonnegative integers N , per Theorem 2.8
Q
(N )
=
X
n
Y
(Pi′ )(Ai ) ⊆
A1 +···+An =N i=1
Pn
X
n
Y
A1 +···+An =N i=1
(Pi′ )⌈Ai /D⌉
⊆
X
n
Y
Q⌈Ai /D⌉ ⊆ Q⌈N/D⌉ ,
A1 +···+An =N i=1
P
since the integer i=1 ⌈Ai /D⌉ ≥ ⌈( ni=1 Ai )/D⌉ = ⌈N/D⌉ for all n-tuples (A1 , . . . , An ) ∈ (Z≥0 )n
Pn
with i=1 Ai = N . Thus equivalently, Q(D(r−1)+1) ⊆ Qr for all r > 0 by Lemma 2.1.
Remark 2.10. We get a much stronger conclusion in Corollary 2.9 when (2) holds. This is because
we can then give a proof using Lemma 2.1 as a workaround. It is less clear what the strongest
7
conclusion to shoot for is when (1) holds. We note that if (1) holds under Corollary 2.9, then
setting D = max Di , one can alternatively prove by contradiction that
Q(n(Dr−1)+1) ⊆ Qr for all r > 0.
In part (1) of the proof above, simply adjust the claim “A
Pj ≥ Dj r for some j” to “Aj ≥ Dr for
some j.” Otherwise, some tuple satisfies n(Dr − 1) + 1 = ni=1 Ai ≤ n(Dr − 1), a contradiction.
Remark 2.11. When all hypotheses are satisfied, Corollary 2.9 typically applies to an infinite set
of prime ideals in the tensor product T . If R is a Noetherian ring of dimension at least two, or a
Noetherian ring of dimension one which has infinitely many maximal ideals, then Spec(R) is infinite;
see [2, Exercises 21.11-21.12]. Now suppose R1 , . . . , Rn are F-affine domains, with n ≥ 2 and F
algebraically
closed, at least one of which is of dimension
one or more. Then in the domain T =
N
P
( F )ni=1 Ri , the following set QED (T ) := {Q = ni=1 Pi T ∈ Spec(T ) : ∀1 ≤ i ≤ n, Pi ∈ Spec(Ri )}
is infinite.
Remark 2.12. Let R = F[x1 , . . . , xm ], S = F[y1 , . . . , yn ], and T = R⊗F S ∼
= F[x1 , . . . , xm , y1 , . . . , yn ]
be polynomial rings over a field F. Our original inspiration for Theorem 2.8 was the following
Theorem (Thm. 7.8 of Bocci et al [4]). Let I ⊆ R and J ⊆ S be squarefree monomial ideals. Let
I ′ = IT and J ′ = JT be their expansions to T . Then for any N ≥ 0, the symbolic power
(I ′ + J ′ )(N ) =
N
X
(I ′ )(N −i) (J ′ )(i) =
i=0
X
(I ′ )(A) (J ′ )(B) .
(2.0.7)
A+B=N
Ha, Nguyen, Trung, and Trung [11, Thm. 3.4] recently extended the above theorem to the case of
two nonzero ideals I ⊆ R, J ⊆ S in two Noetherian commutative F-algebras such that T = R ⊗F S
is also Noetherian. A general multinomial theorem then follows by adapting the proof of Theorem
2.8, where one containment would require the n-fold version of [11, Lem. 2.1(i)]. Combining this
multinomial expansion with the general versions of Lemma 2.1 and Proposition 2.6 we proved in
[22, Prop. 2.1, Lem. 3.3, Prop. 3.4], one can extend Corollary 2.9 to a form allowing, for instance,
any proper ideals Ii ⊆ Ri . As a final note in passing, the proof of [22, Prop. 2.1] still works up to a
tweak of multiplicative system, for those who opt to define symbolic powers of proper ideals using
only minimal associated primes as in [11], rather than using all associated primes as in [22].
3. Finale: Sample Applications to Tensor Power Domains
We begin with two results on uniform linear bounds on asymptotic growth of symbolic powers
for equicharacteristic Noetherian domains that have nice structure, but need not be regular. The
first is due to Huneke, Katz, and Validashti, while the second is due to Ajinkya A. More.
Theorem 3.1 ([15, Cor. 3.10]). Let R be an equicharacteristic Noetherian local domain such that
R is an isolated singularity. Assume that R is either essentially of finite type over a field of
characteristic zero or R has positive characteristic, is F -finite and analytically irreducible. Then
there exists an E ≥ 1 such that P (Er) ⊆ P r for all r > 0 and all prime ideals P in R.
Theorem 3.2 ([19, Thm. 4.4, Cor. 4.5], see also [6, Thm. 3.25]). Suppose R ⊆ S is a finite
extension of equicharacteristic normal domains such that: (1) S is a regular ring generated as an
R-module by n elements, and n! is invertible in S; and (2) R is either essentially of finite type over
an excellent Noetherian local ring (or over Z), or is characteristic p > 0 and F -finite. Then there
exists an E ≥ 1 such that P (Er) ⊆ P r for all r > 0 and all prime ideals P in R.
8
Remark 3.3. Suppose that R is the coordinate ring of an affine variety over any perfect field F,
whose singular locus is zero dimensional. Then in tandem with the results of Ein-Lazarsfeld-Smith
and Hochster-Huneke [8, 13], Theorem 3.1 would yield a uniform slope E for all primes in R.
In particular, this covers F[x, y, z]/(y 2 − xz), F[x, y, z, w]/(xy − zw), and more generally when R
corresponds to the affine cone over any smooth projective variety.
Indeed, the class of rings R to which Theorems 3.1-3.2 apply is large. Applying Theorem 1.2 to any
collection of two or more rings under Remark 3.3, Remark 2.11 says that we can create an infinite
set as a vantage point for data suggestive of uniform symbolic topologies in the corresponding tensor
product domain. At present, since the domain we create has non-isolated singularities, there is no
theorem in the literature affirming that the domain has uniform symbolic topologies on all primes.
We illustrate how these matters occur together in an example below.
But first, we fix an algebraically
N closed field F. If R is an F-affine domain, we use the tensor
power notation T = R⊗N = ( F )N
i=1 Ri to denote the F-affine domain obtained by tensoring
together N copies of R over F, where Ri and Rj are presented as quotients of polynomial rings in
disjoint sets of variables
PN when i < j. From Remark 2.11, we recall the following set of prime ideals
QED (T ) := {Q = i=1 Pi T ∈ Spec(T ) : each Pi ∈ Spec(Ri )}.
Example 3.4. To start, we fix an algebraically closed field F. Given integers a and d both at least
two, consider an affine hypersurface domain R = F[z1 , . . . , za ]/(Fd (z̄)) where Fd is an irreducible
homogeneous polynomial of degree d, with isolated singularity at the origin. Consider the varieties
VR = Spec(R) ⊆ Fa and V = Spec(T ) ⊆ FaN where
T = R⊗N =
F[zi,1 , . . . , zi,a : 1 ≤ i ≤ N ]
.
(Fd (zi,1 , . . . , zi,a ) : 1 ≤ i ≤ N )
Per Remark 3.3, Theorem 1.2 implies that Q(N E·r) ⊆ Qr for all r > 0 and all primes Q ∈ QED (T ).
Meanwhile, in terms of n-factor Cartesian products, the singular locus
Sing(V ) = ({0} × VR × · · · × VR ) ∪ (VR × {0} × VR × · · · × VR ) ∪ · · · ∪ (VR × · · · × VR × {0})
is equidimensional of dimension (a − 1)(N − 1). In particular, while T is not an isolated singularity
when N ≥ 2, the set QED (T ) is infinite by Remark 2.11 and provides a vantage point for witnessing
uniform linear bounds lurking for the asymptotic growth of symbolic powers of primes in T .
Remark 3.5. For pointers to results where an explicit value E ≥ 1 as in Theorems 3.1-3.2 is given
for particular examples of domains R under Remark 3.3, we invite the reader to see the recent
survey paper [6, Thm. 3.29, Cor. 3.30], along with the main results featured in the introductions to
our papers [21, 22, 23]. Section 3 or 4 in each of the latter papers typically includes remarks about
when the designated value E can be considered optimal.
Closing Remarks. Launching from Theorem 1.1 in the introduction, we have deduced a more
powerful criterion for proliferating uniform linear bounds on the growth of symbolic powers of prime
ideals (e.g., Harbourne-Huneke bounds)–Theorem 1.2. In the setting of domains of finite type over
algebraically closed fields, this criterion contributes further evidence for Huneke’s philosophy in
[14] about uniform bounds lurking throughout commutative algebra. We close with a goalpost
question that exceeds our grasp at present: Given the role of tensor products in our manuscript, do
analogues of the above criteria hold for other product constructions in commutative algebra, such
as Segre products of N-graded rings, or fiber products of toric rings?
9
References
[1] S. Akesseh. Ideal Containments Under Flat Extensions. arXiv/1512.08053
[2] A. Altman and S. Kleiman. A Term of Commutative Algebra. Worldwide Center of Mathematics LLC, Cambridge,
MA, 2014.
[3] T. Bauer, S. Di Rocco, B. Harbourne, M. Kapustka, A.L. Knutsen, W. Syzdek, T. Szemberg. A primer on Seshadri
constants. Contemporary Mathematics 496 (2009), pp. 33-70. arXiv/0810.0728
[4] C. Bocci, S. Cooper, E. Guardo, B. Harbourne, M. Janssen, U. Nagel, A. Seceleanu, A. Van Tuyl, T. Vu. The
Waldschmidt constant for squarefree monomial ideals. J. Algebr. Comb. 44, no.4, pp. 875-904. arXiv/1508.00477
[5] D.A. Cox, J.B Little, and H.K. Schenck. Toric Varieties (2011), Graduate Studies in Mathematics 124.
American Mathematical Society, Providence, RI.
[6] H. Dao, A. De Stefani, E. Grifo, C. Huneke, L. Nuñez-Betancourt. Symbolic Powers of Ideals. To appear in
Advances in Singularities and Foliations: Geometry, Topology and Applications, Springer Proceedings in Mathematics & Statistics. arXiv/1708.0301
[7] M. Dumnicki, T. Szemberg, and H. Tutaj-Gasińska. Counterexamples to the I (3) ⊆ I 2 containment. J. Algebra
393 (2013) pp.24-29. arXiv/1301.7440
[8] L. Ein, R. Lazarsfeld, and K. Smith. Uniform bounds and symbolic powers on smooth varieties. Invent. Math. 144
(2001), pp. 241-252. arXiv/0005098
[9] W. Fulton. Introduction to Toric Varieties (1993), Annals of Math. Studies 131. Princeton University Press,
Princeton, NJ.
[10] E. Grifo and C. Huneke. Symbolic powers of ideals defining F-pure and strongly F-regular rings. International
Mathematics Research Notices, rnx213, https://doi.org/10.1093/imrn/rnx213 arXiv/1702.06876
[11] H.T. Hà, H.D. Nguyen, N.V. Trung, T.N. Trung. Symbolic Powers of Sums of Ideals. arXiv/1702.01766
[12] B. Harbourne and A. Seceleanu. Containment counterexamples for ideals of various configurations of points in
Pn . J. Pure Appl. Algebra 219 (2015), no.4, pp. 1062-1072. arXiv/1306.3668
[13] M. Hochster and C. Huneke. Comparison of ordinary and symbolic powers of ideals. Invent. Math. 147 (2002),
pp. 349-369. arXiv/0211174
[14] C. Huneke. Uniform bounds in Noetherian rings. Invent. Math. 107 (1992), pp. 203-223.
[15] C. Huneke, D. Katz, and J. Validashti. Uniform equivalence of symbolic and adic topologies. Illinois J. Math. 53
(2009), no. 1, pp. 325–338.
[16] C. Huneke, D. Katz, and J. Validashti. Uniform symbolic topologies and finite extensions. J. Pure Appl. Algebra
219 (2015), no. 3, pp. 543–550.
[17] L. Ma and K. Schwede. Perfectoid multiplier/test ideals in regular rings and bounds on symbolic powers.
arXiv/1705.02300
[18] J.S. Milne. Algebraic Geometry. Version 5.22, 2013. http://www.jmilne.org/math/CourseNotes/ag.html
[19] A.A. More. Uniform bounds on symbolic powers. J. Algebra 383 (2013), pp. 29-41.
[20] The Stacks Project authors. The Stacks Project, 2016.
[21] R.M. Walker. Rational Singularities and Uniform Symbolic Topologies. Illinois J. Math. Vol. 60, no. 2, Summer
2016, pp. 541-550. arXiv/1510.02993
[22] R.M. Walker. Uniform Harbourne-Huneke Bounds via Flat Extensions. arXiv/1608.02320
[23] R.M. Walker. Uniform Symbolic Topologies in Normal Toric Rings. arXiv/1706.06576
Department of Mathematics, University of Michigan, Ann Arbor, MI, 48109
E-mail address: [email protected]
10
| 0math.AC
|
MULTIVARIATE INTEGRAL PERTURBATION
TECHNIQUES - I (THEORY)
JAN W. DASH
J. Dash Consultants
[email protected]
Submitted for publication
September 2006
Abstract
We present a quasi-analytic perturbation expansion for multivariate N dimensional Gaussian integrals. The perturbation expansion is an infinite series
of lower-dimensional integrals (one-dimensional in the simplest approximation).
This perturbative idea can also be applied to multivariate Student-t integrals. We
evaluate the perturbation expansion explicitly through 2nd order, and discuss the
convergence, including enhancement using Padé approximants. Brief comments
on potential applications in finance are given, including options, models for
credit risk and derivatives, and correlation sensitivities.
1. Introduction
The evaluation of multivariate integrals is of substantial interest in various areas
of finance including options and credit derivatives, as well as in science and
engineering. While some techniques are available in special cases, a common
procedure is brute-force numerical integration, e.g. via Monte Carlo simulation.
In this paper, we present a technique that we believe is new and may prove to
be useful. It is quasi-analytic and is based on a perturbation expansion. The
perturbation expansion gives the N -dimensional multivariate Gaussian integral
©September 2006, Jan W. Dash
2
as an infinite series of low-dimensional integrals, which in the simplest case are
just one-dimensional integrals. The idea is applicable also to Student-t integrals,
and probably others as well. Possibly the expansion, with a clever choice of the
initial term, will turn out to provide an interesting and viable numerical approach.
This paper discusses theory. Subsequent papers will report on numerical aspects.
The initial “point” about which the expansion is performed is key, as it
always is for perturbation expansions. In this work, this “point” is constructed
from an approximation to the original correlation matrix involving a factorized
expression (one factor), or of sums of such factorized expressions (several
factors)i. In this paper, we focus on the one-factor approximation. The
perturbation expansion is then found in terms of expectation values of {powers of
[the difference of (the inverse of the original correlation matrix) and the (inverse
of the approximate correlation matrix)]}. These expectation values are with
respect to the approximate probability density function, and are readily obtained
analytically. We give explicit expressions for Gaussian multivariate integrals of
arbitrary dimension using one factor up to second order in the expansion. To 0th
order, there is a single one-dimensional integral. In first order, there are N 2
additional one-dimensional integrals. In second order, there are N 4 additional
one-dimensional integrals. All integrals can be grouped into classes of similar
appearance, so only a few integrals need to be programmed.
In Sect. 2, we treat the perturbation expansion of multivariate Gaussian
integrals for one factor. Sect. 3 has an outline of the procedure for multiple
factors. Sect. 4 contains the perturbation expansion of multivariate Student-t
integrals. Sect. 5 has some details of the formalism for Gaussian perturbation
theory. Sect. 6 deals with the 1st-order perturbation results, and Sect. 7 has the
2nd-order perturbation results. Sect. 8 presents the cluster decomposition
diagrammatic notation. Sect. 9 discusses the approximate correlation matrix
needed to start the perturbation analysis. Sections 10 and 11 briefly discuss
potential applications to options and to credit risk and derivatives. Sect. 12
discusses correlation sensitivity. Sect. 13 discusses convergence, and Sect. 14
discusses enhanced convergence using Padé approximants. Sect. 15 has a logical
“flow chart” of the steps needed for numerical investigations.
2. Perturbation Expansion of Multivariate Gaussian Integrals
Consider the N -dimensional Gaussian multivariate integral I N with positivedefinite correlation matrix with inverse matrix 1 , determinant :
x1max
;
I N x
max
i
1
2
xNmax
...
exp 12 x T 1 x D x
©September 2006, Jan W. Dash
(2.1)
3
Here, x xi is the vector of variables,
x with
max
i
upper limits assumed constant (i.e. independent of the
N
i 1...N are the
xi
variables), and
D x dxi / 2 . Matrix multiplication is understood in the exponent.
i 1
Now consider the one-factor approximation f to the correlation matrix. We
introduce numbers ci and write for the i j matrix elements of f :
f ij ci c j
(2.2)
It is easy to prove (see Curnow and Dunnett (Ref. i) and Sect. 5) that if we
were to replace by f , then I N would become a one-dimensional integral
;
I N x
max
i
f
f
d
2
exp 12 2
1
x1max
2
xNmax
...
exp 12 x T f 1 x D x
N
(2.3)
N
max
i
i 1
(2.4)
Here is an auxiliary variable. There is one such variable (i.e. one factor),
corresponding to the single factorized term ci c j for f ij . Also N is the
standard one-dimensional cumulative normal, and
imax
ximax ci
si
(2.5)
Here si 1 ci2 needs to be positive to reproduce I N 1 as xi .
The single integral in Eq. (2.4) can be done straightforwardly using good
uniform algebraic approximations for the normal integral N ii.
The perturbation expansion follows from the trivial identity
1 f 1 1 f 1
©September 2006, Jan W. Dash
(2.6)
4
inserted into the original integral. We keep the explicit f dependence in the
exponent as in Eq. (2.3) for I N ximax ; f , and we expand the rest of the
exponential in the integrand in a power series in the matrix , defined as
1 f 1
(2.7)
So we get
I N ximax ; I N( ) ximax ; f ;
0
(2.8)
where
I N( ) ximax ; f ;
1
x1max
xNmax
...
1
12 *
!
exp x f x
1
2
1
T
x
T
x
(2.9)
Dx
If we include all the terms in the sum, the result must only depend on the original
correlation matrix , with all dependence on f cancelling out.
Using standard functional techniques described in Sect. 5, we can evaluate
for given as a sum of one-dimensional integrals. For 0 we get the
I
( )
N
same result up to normalization as the result for I N ximax ; f , namely the
single one-dimensional integral
I
( 0)
N
ximax ; f ; J f , d exp 12 2
2
N
N
i 1
max
i
(2.10)
Here the normalization is J f ,
f
.
For 1 we get one-dimensional integrals of the form
©September 2006, Jan W. Dash
5
d
I N( 1) ximax ; f ; 12 J f ,
exp 12 2
2
N
i , j 1
ij
Gij
N
N
l i , j ; l 1
max
l
*
(2.11)
Here, the various Gij are functions of that are different according to
whether i j or i j (see Sect. 6). The perturbation matrix element is
ij 1 f 1 . Note that I N( 1) has an explicit minus sign. There are N 2
ij
of these two types of integrals.
For 2 we get one-dimensional integrals of the form (see Sect. 7)
I
( 2)
N
ximax ; f ; 18 J f , d exp 12 2
2
N
i , j , k ,l 1
*
(2.12)
ij kl G(ijkl ) in C
()
Here is a “class label” corresponding to the seven different classes C of
indices i, j , k , l that arise when the indices are all distinct, have one pair equal,
two pairs equal, three values equal, or four values equal. The classes can be
conveniently associated with diagrams, in a sort of “cluster decomposition” iii, 1.
)
The various functions G((ijkl
are categorized using the class label . There
) in C
are a total of N 4 of these integrals, of five different types. Because the indexing
)
is complicated, products of normal functions are lumped into G((ijkl
.
) in C
3. Multiple Factors for the Gaussian Perturbation Expansion
Using multiple-factors means we take approximated by f of the form
K
fij ci c j for i j
(3.1)
1
1
Cluster Decomposition: The cluster decomposition in the present paper is similar in
spirit but different in detail from the cluster decomposition for multivariate Gaussian
integrals that I envisioned in the late 1980’s (see p. 623 of Ref. iii).
©September 2006, Jan W. Dash
6
with 1...K . This leads to K -dimensional integrals using K auxiliary
variables that replace the one-dimensional integrals. Perturbation theory
is performed along the same lines. The tradeoff is between the extra complexity
of multidimensional integrals versus a better initial description of the correlation
matrix. If K N and with principal components to get f as explained in
Sect. 9), we restore the original problem, and nothing is accomplished.
We shall, however, only give results for perturbations about a one-factor
approximation in this paper.
4. Perturbation Expansion of Multivariate Student-t Integrals
We next outline perturbation theory for multivariate Student-t integrals. This
produces two-dimensional integrals instead of one-dimensional integrals, in the
one-factor approximation to f . The basic idea is to use an integral
representation in order to rewrite things in exponential form, so that we can again
use perturbation theory similarly to the Gaussian case.
The multivariate Student-t (“St”) cumulative probability distribution in N
dimensions with degrees of freedom isiv
I
( St )
N
; ;
x
max
i
K 1
x1max
1
2
with K 1 12 N 12
N
2
1 1 x T 1 x
N / 2
xNmax
...
1 1 x
T
1 x
N / 2
Dx
(4.1)
. We use the identity
1
2
1
K 2 y N 1 exp 12 1 1 x T 1 x y 2 dy (4.2)
0
1
with K 2 12 N 2 N 2 / 2 . The integral over y is an extra
complication for the Student-t distribution. We make the change of variables
ui yxi
and define uimax y yximax
. We obtain
©September 2006, Jan W. Dash
7
I
( St )
N
x
max
i
; ;
u1max y
max
uN
y
Here Du
...
du
N
i 1
i
1 12
2
1
2
1
2
1 2
1 2 y
y
e
*
0
(4.3)
exp 12 u T 1u Du dy
/ 2 . We now have a Gaussian form and thus can use the
same perturbation procedure in Sect. I. We expand in powers of 1 f 1
and perform the integrals over the u variables with respect to the measure with
exp 12 u T f 1u . Assuming a one factor approximation for f , this again
yields one-dimensional integrals over , which along with the integral over y ,
gives the perturbative result for I N( St ) ximax ; ; in terms of sums of two-
dimensional integrals. Explicitly,
I
( St )
N
1 2
yximax
1 2
1 2 y
ximax ; ; 2
y
e
I
; dy
N
1
2
0
1
(4.4)
yximax
; is the Gaussian multivariate Eq. (2.1) with changed
Here I N
upper limits for fixed y , namely ximax yximax
y ;
I N u
max
i
12
u1max y
max
uN
y
...
uimax y . We have
exp 12 u T 1u Du
(4.5)
We can now use the results from the previous analysis for multivariate
Gaussian perturbation theory, inserted into Eq. (4.4), to get the perturbation
expansion for the multivariate Student-t integral, including the y integral.
For large , it is well known that the Student-t approaches the Gaussian.
Using WKB around y* eliminates the y integral, and yields the result:
I N( St ) ximax ; ;
WKB
Large
I N ximax ;
©September 2006, Jan W. Dash
(4.6)
8
5. Formalism for Gaussian Perturbation Theory
This section discusses some details of the formalism for Gaussian perturbation
theory. We first show how the extra variable arises. Start with Eq. (2.3) and
note the identity
exp x f x
1
T
1
2
2
d
exp
2
1
2
2
xi ci 2
(5.1)
exp 12
si2
i 1
N
Here
N
2 1
l 1
cl2
sl2
(5.2)
This identity introduces the extra variable . Now we use Eq. (5.1) in Eq.(2.3),
and change variables, introducing i to eliminate the xi :
i
xi ci
or xi ci si i
si
(5.3)
The integral in Eq. (2.3) becomes
;
I N x
max
i
f
d
2
exp
1
2
2
i d
i
1 2 (5.4)
exp
2 2 i
i 1
max
N
where imax is in Eq. (2.5). This immediately yields Eq. (2.4).
Consider the average F
of any function F xi with respect to the
f
approximation measure with f in Eq. (2.3). This is:
F
f
f
1
2
x1max
xNmax
...
F xi exp 12 x T f 1 x D x
(5.5)
Such integrals can be handled using a standard functional technique. We
introduce “currents” J i and functional derivatives J i . Making the same
change of variables in Eq. (5.3), we get
©September 2006, Jan W. Dash
9
exp 12 2 F ci si
*
J i
2
F
f
d
(5.6)
i d
i
exp 12 i2 i J i J 0
i
2
i 1
max
N
upper limit parameters, we get
Restoring the original ximax
exp 12 2 F ci si
*
J i
2
N
ximax ci
2
1
exp(
J
)
N
J
i J 0
2 i
i
si
i 1
F
f
d
(5.7)
For the problem at hand, we set
1
12 x T x
0 !
F xi
(5.8)
Writing out the components of the matrices, we have
x
T
x
N
i , j 1
1...
xi i
1
j
x j
We make the replacement xi ci si J i , evaluate the
(5.9)
J i derivatives
and then set J i 0. Sects. 6 and 7 contain the results for 2 .
It is useful to have an analytic inverse for the one-factor matrix f . This isv
f
1
ii
1
f
ij
1
si2
ci2
1
2 2
si
ci c j
si2 s 2j 2
for i j
©September 2006, Jan W. Dash
(5.10)
(5.11)
10
where 2 is given in Eq. (5.2). For multiple factors, the inverse of f is
complicated, and we have been unable to find an analytic inverse.
6. Details of the 1 (1st order) terms
In this section, we give the 1 functions Gij in the text. First, define
i N imax
and
1
i
exp 12 imax
2
(6.1)
2
(6.2)
Also define
wi(1) ci i si i
(6.3)
and
wi(2) ci2 2 si2 i 2ci si si2 imax i
(6.4)
Then for equal indices i j
Gii wi(2)
(6.5)
and for unequal indices i j
Gij
i j
wi(1) w(1)
j
(6.6)
7. Details of the 2 (2nd order) terms
In this Section, we discuss the 2nd-order 2 terms. We first define wi(3)
and wi(4) :
©September 2006, Jan W. Dash
11
wi(3) ci3 3 3ci si2 i
2
3ci2 si 2 3ci si2 imax si3 imax 2 i
(7.1)
wi(4) ci4 4 6ci2 si2 2 3si4 i
4c 3 s 3 6c 2 s 2 2 max 4c s 3 max 2 2
i i i
i i
i
i i
i
2
4 max
max
si i i 3
(7.2)
The seven classes of terms are defined as follows corresponding to the indices
(i, j , k , l ) in the outer product of the two matrices with elements ij kl . Two
of them are degenerate, so there are really only five independent classes.
Class 1 : No two indices are equal. There are N ( N 1)( N 2)( N 3) such
terms for N 4 . An example is 12 34 . The corresponding function is
( 1)
G1234
w1(1) w2(1) w3(1) w4(1)
N
m . In general,
m 1,2,3,4
( 1)
Gijkl
wi(1) w(1)j wk(1) wl(1)
N
m i , j ,k ,l
m
(7.3)
Class 2 : One pair of indices is equal in one matrix; the others are unequal
to each other and unequal to the pair. There are 2 N ( N 1)( N 2) such terms for
N 3 . An example is 11 23 . The corresponding function is
( 2)
G1123
w1(2) w2(1) w3(1)
N
. In general,
m 1,2,3
( 2)
Giijk
wi(2) w(1)j wk(1)
m
N
m i , j ,k
m
(7.4)
Class 3 : One pair of indices is crosswise equal between the two matrices;
the others are unequal to each other and unequal to the pair. There are
©September 2006, Jan W. Dash
12
4 N ( N 1)( N 2)
such terms for
N 3 . An example is 12 13 . The
( 3)
( 2)
corresponding function is degenerate, G1213
G1123
. In general,
( 3)
Gijik
Giijk(2)
(7.5)
Class 4 : Each pair of indices on each matrix are equal, but distinct. There
are N ( N 1) such terms for N 2 . An examples is 11 22 . The corresponding
function is
N
( 4)
G1122
w1(2) w2(2) m , or in general
m 1,2
N
( 4)
Giijj
wi(2) w(2)
j m
(7.6)
m i , j
Class 5 : Two pairs of indices are crosswise equal, but distinct. There are
2 N ( N 1) such terms for N 2 . An example is 12 12 . The corresponding
( 5)
( 4)
function is degenerate, G1212
G1122
. In general,
( 5)
Gijij
Giijj(4)
(7.7)
Class 6 : Three indices are equal, different from the fourth. An example is
1112 . There are 4 N ( N 1) such terms for N 2 . An example is 1112 . The
( 6)
corresponding function is G1112
w1(3) w2(1)
N
. In general,
m 1,2
m
N
( 6)
Giiij
wi(3) w(1)j m
(7.8)
m i , j
Class 7 : All indices are equal. There are N terms. An example is 1111 .
( 7)
The corresponding function is G1111
w1(4)
N
. In general
m 1
m
N
( 7)
Giiii
wi(4) m
(7.9)
m i
The total number of terms from all classes is N 4 , and as is clear from the
above discussion there are five types of integrals with different parameters.
©September 2006, Jan W. Dash
13
8. Cluster Decomposition Diagrammatic Notation
The cluster decomposition is a useful device that is a visual mnemonic for the
various types of terms (cf. Ref. iii, p.700). Each index is represented by a line
going from left to right. Each pair of lines starting at the left and going from top
to bottom corresponds to indices i, j on one of the ij matrices. Consider Fig. 1
below. If two indices are equal, we make the lines enter and leave a “bubble”,
like the picture on the left. If two indices are unequal, they will not go into the
same “bubble”, like the picture on the right.
Indices
unequal
Indices
equal
Fig. 1: 1st-order
diagrams
The seven classes in the 2nd order perturbation term with two ij kl matrices
with four indices (so, four lines) can be drawn as in Fig. 2 below.
©September 2006, Jan W. Dash
14
Class 1
Class 2
Class 4
Class 3
Class 5
Class 6
Class 7
Fig. 2: 2nd-order
diagrams
9. Choice of the parameters in the matrix f
The choice of the ci parameters in the K -factor approximation matrix f is
arbitrary. Of course the perturbation results to some given order will depend on
the choice. One idea is to use a principal component (PC) decomposition of the
original correlation matrix , keep the first K of the PCs, and thereby identify
ci . The PC decomposition of the
NxN matrix is a sum of N factorized
terms, and is an identity. It reads
©September 2006, Jan W. Dash
15
N
ij i j
(9.1)
1
Here and are the -th eigenfunction and eigenvalue of . This
is already a sum of factorized terms in the matrix indices. Hence, truncating the
sum at the K th term yields a K - factor approximation f to . This is exactly
the procedure used in VAR calculations using SVD to get rid of N K negative
eigenvalues, setting them to zero. We need to renormalize the eigenfunctions so
that f will have unit diagonal elements (cf. p. 327 of Ref. iii). So we replace
i
by i
i
,
i
1
2
K
2
where i i , and then write
1
K
K
1
1
fij ci c j i j
(9.2)
Identifying terms with , we then can set ci
i
. If is
positive definite with N positive eigenvalues 0 , then the NxN matrix
f is positive semi-definite with K positive eigenvalues and N K zero
eigenvalues.
For one factor, K 1 , this procedure just produces fij 1 , which is not too
useful. However, we could really assume any constant fij 1 N 1 for
i j , maintaining f positive definiteness. To do this, we can look for a best fit
to for the constant approximation matrix f with fij c 2 for i j . Hence,
write
2
c
2
N
i j 1
2
ij
and set 2 / c 2 0 . We get
1
2
c 1
abs il
N ( N 1)
i ,l i
(9.3)
Here, “ abs ” means absolute value; we include this so that the expression always
makes sense.
©September 2006, Jan W. Dash
16
A generalization to a nonconstant matrix f can be done by pulling out the
sum over the index i in Eq. (9.3), and then identifying ci for given i as
1
2
ci 1 abs il sgn il
l i
l i
( N 1)
(9.4)
Here, “ sgn ” means sign, and is included for generality so that f can have
matrix elements with signs. While this procedure may seem arbitrary, again recall
that we are free to choose the approximate correlation matrix f any way we
want. With Eq. (9.4), we get the final result for the one factor approximate matrix
elements i j that we propose to use,
1
f ij
1
2
2
1
abs ik abs lj sgn ik sgn lj
( N 1)
k i
k i
l j
l j
(9.5)
Visually, this amounts to approximating the original correlation matrix element
ij by a geometric average of signed averages over the matrix elements of the
row and column whose intersection contains ij . Note that the approximation
can have either positive or negative sign. Since ci is obtained using an average,
the extent to which f approximates will depend on the internal differences
of matrix elements of , with relatively constant matrix elements being more
tractable.
A least-squares approach for getting the ci may also be useful. These
equations are nonlinear, and need to be solved numerically.
Regardless, the requirement that f is positive definite needs to be checked
explicitly.
10. Applications to Options
The perturbation expansion has potential application to options that are
dependent on several variables. For simplicity, we restrict the discussion to an
illustrative example.
©September 2006, Jan W. Dash
17
Consider the expectation of a “payoff” function C x of the variables xi
remain constants, and not interlocked , independent
2
such that the limits ximax
of the variables xi . We can use either the Gaussian or Student-t multivariate
distribution, depending on the correlation matrix . Carrying out the same
perturbation procedure as above (for which C x 1 ) leads to a perturbation
series for this expectation of
C x using the
f -dependent approximate
measure.
Recall the general nature of the expectation F
with respect to the f f
dependent approximate measure in Eq. (5.6). We now want to use
1
12 x T x
0 !
F xi C x
(10.1)
We go through the same procedure as before. Similarly to Sect. 6 and 7, the
functions for a given approximation at 0,1, 2 etc. need to be evaluated
including the dependence on the payoff function C x .
11. Application to Credit Risk and Credit Derivatives
The perturbation expansion developed in this paper can be potentially useful for
analysis for credit risk and credit derivativesvi.
For buy-and-hold portfolios, the determination of credit risk obtained using
historical correlations between asset returns in a “structural model” can be
appropriate. Analysis with these large correlation matrices could potentially be
numerically handled using the perturbation methods in this paper.
For trading portfolios, “reduced-form models” that calibrate to market CDS,
CDO prices and other data are appropriate. If the reduced-form model has several
factors, we could then use the one-factor perturbation expansion to provide a
potentially useful evaluation tool for credit derivatives.
2
Options: This assumption is true for some, but not all, options. Some options with
min/max conditions that interlock the limits through dependence on the {xi} can be
handled by changing variables in the integrals, before applying perturbation theory.
©September 2006, Jan W. Dash
18
12. Correlation Sensitivity
We get straightforward approximations for correlation sensitivity using the
perturbation expansion that may prove useful. Consider a function C of the
correlation matrix. Suppose the correlation matrix changes from 1 to
2 . The resultant change in the function, i.e. the correlation sensitivity, is
C C 2 C 1
(12.1)
Suppose further that we choose the approximate matrix f2 for 2 as
unchanged from the approximate matrix f1 of 1 , that is f2 f1 f .
Then subtracting the two perturbation expansions we get an approximation to the
correlation sensitivity. In first order 1 , the f dependence cancels out
except for the approximate measure.
13. Convergence of the Perturbation Series
In this Section we discuss convergence of the perturbation series, although we
have not constructed a formal proof. There are two main points. First, as a
!
1
function of the order , the exponential expansion contains a factor
,
which eventually overwhelms powers Q for any Q as a function of .
Second, rapid decrease of the integrand at large values of exists, which means
that the integrals are effectively finite, so the interchange of -summation and
-integration is allowed.
Some intuition can be gained by looking at the 0th-order approximation.
max
Define average parameters cavg and xavg
(the details will not matter). The
dependence of the integrand is essentially of the form exp where
12 2 N log N
max
xavg
cavg
savg
©September 2006, Jan W. Dash
(13.1)
19
is the dimension and N
Again, N
is the normal integral. We
differentiate Eqn. (13.1) and set ' * 0 at the point * where the
magnitude of the integrand is largest. The equation to determine * is
*
Ncavg
savg
max
xavg
cavg *
N '
N
savg
max
xavg
cavg *
savg
Here, the derivative of the normal integral is N '
1
(13.2)
. The 0th-order integrand has
a pronounced bump at * , falling off rapidly on either side. Similar remarks
hold for the 1st and 2nd order integrands, proportional to N and N ' , although
due to cancellations between terms there may be some additional structure in
besides a simple bump. As N increases, it would appear that * will increase
too, but the other factors can decrease to make * relatively constant in N .
Given the above bump structure, it is intriguing to speculate that a WKB
approximation might be useful as a rough guide, without doing any integrations.
It is also instructive to look at the dominant order * at fixed dimension N .
Arguments similar to the above yield a rough estimate for * as
* 12 N 2 avg
(13.3)
where avg is an average matrix element of the matrix. Finally, at a given
order , the most important dimension N * is roughly given by
N*
2
(13.4)
ln 1/ N avg
where N avg is a normal integral at * with average parameters as above.
Metrics for Convergence
The theory in this paper is exact if all orders in perturbation theory are utilized.
However, the whole idea is to stop at some manageable point, e.g. 2nd order.
Hence there will be some error. We need to characterize the error to understand
when the approximation can be useful. To this end, we define some metrics; the
numerical error will be a function of these metrics.
©September 2006, Jan W. Dash
20
Since we are using a one-factor approximation with a limited number of
variables ci , if the correlation matrix elements are approximately constant the
approximation will be good, and the amount to which the correlation matrix
elements are highly variable will limit the utility of the approximation. Hence, we
anticipate that the internal correlation variance 2 ,Int of will be a useful
metric, where
2 ,Int 12 N N 1 1
1
2
N
i j
ij
avg
(13.5)
Here, avg is the average of the off-diagonal matrix elements of . In particular,
since the approximate matrix f is obtained through averaging over elements of
, its internal variance 2 f ,Int will be smaller than 2,Int . We also anticipate
that 2,Int , the internal variance of the expansion matrix 1 f 1 , will
be useful.
If is close to being singular (i.e. has one or more very small eigenvalues),
then 1 will have large matrix elements, but f 1 will not. Therefore
1 f 1 will have large elements and convergence will be less rapid.
Cutoffs on the minimum eigenvalue may have to be applied in some cases,
Min N
(13.6)
That is, the correlation matrix may need to be regularized somewhat in order to
apply this method. Naturally, the correlations in the regularized matrix will be
changed somewhat, which is a drawback. On the other hand, it is known that
correlations in practice are highly unstable with large uncertaintiesiii, so the
change due to regularization may be small compared to these uncertainties. In
any case, this procedure must be consistent with the experimental uncertainties of
the correlation matrix elements. We anticipate that the cutoff will depend on the
dimension N .
A useful metric for the correlation matrix is the distance of the matrix from a
singular matrix, which we call R N . We suggest R N be defined as
R N
1
(13.7)
1
1
N
©September 2006, Jan W. Dash
21
Eqn. (13.7) is formally the same as the total resistance of N resistors in parallel,
with the resistances taken as . If some 0 , then R N 0 and
the matrix becomes singular. For example, if all correlation matrix elements are
equal to one, then all but one eigenvalue are equal to zero. A zero eigenvalue in
the resistor circuit analogy corresponds to a “short circuit”.
The maximum distance of the matrix from the singular case occurs when all
N
eigenvalues are equal. Since we must have
N , we get
1 , and
1
so Max R N . Note that the distance from a singular matrix decreases
as the dimension increases.
1
N
14. Enhancing the Convergence with Padé Approximants
In this Section we discuss enhancing the convergence of the perturbation series
using Padé approximants. This is a common procedure in scientific applications,
but it may not be so familiar in finance, and so we shall spend a little time giving
some background. We shall also use the idea in a somewhat extended fashion.
A Padé approximant is defined as a rational function that agrees with the
perturbation expansion of a function to a given order. Padé approximantsvii can
enhance numerical convergence. In some cases (including applications of this
theory), Padé approximants may be more than numerically helpful; they may be
necessary.
For small values of matrix elements ij of 1 f 1 in which the
perturbation is being carried out, the perturbation expansion will converge
rapidly, and no problems are anticipated. However, for larger values of ij , the
convergence will be less rapid, or even appear to diverge at some finite order. We
have calculated through 2nd order. We claim that the perturbation series
converges. Even if the perturbation series were to diverge, for example as an
asymptotic series, the Padé approximants provide a method of summing the
series.
Consider the simple case with equal matrix elements 0 (i.e. ij 0 for
i j ), so the perturbation expansion is in 0 . Simplifying the notation, we have
for the th order perturbative term with 0,1, 2 . The series
I O 0
( )
expansion of the Padé approximant I Pade
matches the sum of the perturbative
©September 2006, Jan W. Dash
22
( )
terms to order , viz I Pade
I O
0
1
0
. As
increases, the match to
the perturbation series becomes more exact. The expansion can be carried out at
small values of 0 , and then the Padé approximants can be analytically continued
to large values of 0 . The Padé approximants effectively provide approximations
to arbitrarily high-order perturbative terms without explicitly calculating them.
Again, the Padé results can be numerically better than the perturbation expansion.
Padé approximants are labeled by L, M or L / M , where L and M are the
orders of the numerator and denominator.
( )
So, we define successive Padé approximants I Pade
of 0th, 1st, and 2nd order as:
(0)
I Pade
I 0
I 1
(1)
I Pade
I 0 1 0
I
I
(2)
Pade (1,1)
(14.1)
1
(14.2)
I 0I 2 I 2
I 0 I 1 1 1 1
I
I
1
(14.3)
The above 2nd-order Padé approximant is of 1/1 type. Another 2nd-order
approximant, of 0 / 2 type, is defined as
I 1 I 2 I 1 2
0
(2)
I Pade (0,2) I 1 0 1 0
I
I
I
1
(14.4)
Often the diagonal approximants L / L are used, but off-diagonal approximants
(1)
can be useful. Note that I Pade
has type 0 /1.
We will use these same Padé approximant formulae for the real case of nonconstant ij matrix elements, dropping the restriction of constant 0 . This
procedure goes beyond the usual Padé theory. However, the assumption is simple
to write down, and it can be tested numerically against direct integration.
An additional acceleration device may turn out to be useful. We can try to
parametrically and approximately extrapolate the Padé approximants to ,
i.e. infinite order in , thereby obtaining I for the final approximation to the
original multivariate Gaussian integral, Eqn. (2.1). Consider the ansatz
©September 2006, Jan W. Dash
23
( )
I Pade
I 0 I e g I
(14.5)
Here is a parameter and g is some reasonable function, with g 0 1 so
(0)
that I Pade
I 0 . We might choose g cos [or g 1 ] for an
oscillating [non-oscillating] Padé sequence, which is known at 0,1, 2 . We
(1)
(2)
know I Pade
and I Pade
(see footnote3). Hence there are 2 equations and 2
unknowns, and hence we can get the final result I by determining .
15. Numerical Aspects, Logical Flow Chart
Numerical aspects of the theory presented in this paper are currently being
investigated, including error analysis as a function of parameters, and will be
reported separately viii. Preliminary results are encouraging, but also indicate that
care is required in applying the theory, including Padé approximants.
Here is a logical “flow chart” with explicit steps in order to obtain the
Gaussian I N ximax ; f in Eqn. (2.1), using the 1-factor approximation.
1.
Obtain the N -dimensional correlation matrix . Check that is
positive definite (PD). It may be necessary to impose an eigenvalue
cutoff Min N to make the 2nd-order approximation
“accurate enough”. Get the inverse 1 and determinant .
2. Get
ci via Eq. (9.4), or least squares, from
; write si 1 ci2 .
3. Get the one-factor approximation f to in Eqn. (9.5). Check that f
is PD. Calculate the inverse matrix f 1 in Eqns. (5.10) - (5.11), the
determinant f , and J f ,
f
.
4. Get 1 f 1 (subtract the matrices element by element).
5. Specify the upper limit values ximax .
Which 2nd-order Padé? It may be useful to take the maximum or the average of the
two 2nd-order Padé approximants.
3
©September 2006, Jan W. Dash
24
6. For each in the 1-factor integration , where is a
“sufficiently big number”, calculate for each i 1...N :
imax in Eqn. (2.5)
i N imax using a normal integral approximationii
i , wi(1) , wi(2) in Eqns. (6.2) - (6.4)
Gij in Eqns. (6.5) - (6.6) for the 1st order contribution
I N( 1) ximax ; f ;
, wi(4) in Eqns. (7.1) - (7.2)
w
)
in Eqns. (7.1) - (7.9) for the 2nd order contribution
G((ijkl
) in C
(3)
i
I N( 2) ximax ; f ;
7. Calculate 0th order contribution I N( 0) in Eqn. (2.10).
8. Calculate 1st order contribution I N( 1) in Eqn. (2.11) and obtain the 1storder approximation I N(1st Order Approx.) I N( 0) I N( 1) .
9. Calculate 2nd order contribution I N( 2) in Eqn. (2.12) and obtain the 2ndorder approximation I N(2 nd Order Approx.) I N( 0) I N( 1) I N( 2) .
( )
10. Calculate the 1, 2 Padé approximants I Pade
in Eqns. (14.2) - (14.4).
11. Obtain the extrapolation of the Padé approximants, I , as
using Eqn. (14.5). I is the suggested final result.
12. Use the internal correlation variance 2 ,Int and the distance from a
singular matrix R N from Sect. 13 as metrics for application analysis.
Acknowledgements
I thank Kris Kumar for discussions regarding numerical aspects and potential
applications of the theory.
References
©September 2006, Jan W. Dash
25
[i] Curnow, R. and Dunnett, C., The Numerical Evaluation of Certain Multivariate
Normal Integrals. Ann. Math. Statist., 1962, Pp. 571-579, and references therein.
[ii] Abramowitz, M., Stegun, I., Handbook of Mathematical Functions. National Bureau
of Standards, Applied Mathematics Series #55, 1964. See Sect. 26.2.17.
[iii] Dash, J. W., Quantitative Finance and Risk Management, A Physicist’s Approach,
World Scientific, 2nd printing 2005, ISBN 9812387129.
[iv] Hodoshima, J., The Effects of Nonnormality on the Market Model in the Class of
Elliptical Distributions, Nagoya City U. preprint, March 2001, p. 7.
[v] Chern, S. S. and Shen, Z., Riemann-Finsler Geometry, World Scientific, Nankai
Tracts in Mathematics, Vol. 6, 2005, Pp. 4,5.
[vi] Duffie, D. and Singleton, K. J., Credit Risk: Pricing, Measurement, and Management,
Princeton U. Press, 2003; Smithson, C. W., Credit Portfolio Management, Wiley
Finance, 2003
[vii ] Kleinert, H., Path Integrals in Quantum Mechanics, Statistics and Polymer Physics,
2nd Edition, World Scientific 1995, p 611; Honerkamp, J., Statistical Physics – An
Advanced Approach with Applications, Springer-Verlag, 1998, p 91; Wikipedia
http://en.wikipedia.org/wiki/Pade_approximant; Baker, G. et al, Padé Approximants,
Encyclopedia of Mathematics and its Applications, 2nd Ed, Cambridge U. Press, 1996.
[viii] Dash, J. W. and Kumar, K., Multivariate Integral Perturbative Techniques - II
(Numerical Aspects), to appear.
File =
DASH Multivariate Integral Perturbative Techniques I Theory Sept06 R2 posted.doc
Last accessed: 10/13/2006, 7:46 AM
©September 2006, Jan W. Dash
| 5cs.CE
|
arXiv:1509.02629v2 [quant-ph] 22 Sep 2016
Error Bounds for Finite-Dimensional Approximations
of Input-Output Open Quantum Systems by Subspace
Truncation and Adiabatic Elimination∗
Onvaree Techakesari and Hendra I. Nurdin
†
February 22, 2018
Abstract
An important class of physical systems that are of interest in practice are inputoutput open quantum systems that can be described by quantum stochastic differential equations and defined on an infinite-dimensional underlying Hilbert space.
Most commonly, these systems involve coupling to a quantum harmonic oscillator
as a system component. This paper is concerned with error bounds in the finitedimensional approximations of input-output open quantum systems defined on an
infinite-dimensional Hilbert space. We develop a framework for developing error
bounds between the time evolution of the state of a class of infinite-dimensional
quantum systems and its approximation on a finite-dimensional subspace of the original, when both are initialized in the latter subspace. This framework is then applied
to two approaches for obtaining finite-dimensional approximations: subspace truncation and adiabatic elimination. Applications of the bounds to some physical examples
drawn from the literature are provided to illustrate our results.
Keywords: Quantum stochastic differential equations, input-output open quantum systems,
finite-dimensional approximations, error bounds, approximation errors
1
Introduction
Quantum stochastic differential equations (QSDEs) developed independently by Hudson
and Parthasarathy [1] and Gardiner and Collett [2] (the latter in a less general form than
the former) have been widely used to describe the input-output models of physical open
markov quantum systems [3–5]. Such models describe the evolution of Markovian quantum
∗
Research supported by the Australian Research Council
O. Techakesari and H. I. Nurdin are with the school of Electrical Engineering and Telecommunications, UNSW Australia, Sydney NSW 2052, Australia. Email: [email protected] and
[email protected]
†
1
systems interacting with a propagating quantum field, such as a quantum optical field,
and are frequently encountered in quantum optics, optomechanics, and related fields. An
example in quantum optics would be a cavity QED (quantum electrodynamics) system
where a single atom is trapped inside an optical cavity that interacts with an external
coherent laser beam impinging on the optical cavity. These input-output models have
subsequently played an important role in the modern development of quantum filtering
and quantum feedback control theory [6, 7]. Many types of quantum feedback controllers
have been proposed in the literature on the basis of QSDEs, using both measurementbased quantum feedback control, e.g., [3,4,6,7], and coherent feedback control, e.g., [8–10].
Besides, QSDEs have also been applied in various developments in quantum information
processing, such as in quantum computation technology; e.g., see [11].
In various physical systems of interest, one often deals with input-output systems that
include coupling to a quantum harmonic oscillator. For instance, typical superconducting
circuits that are of interest for quantum information processing consist of artificial two-level
atoms coupled to a transmission line resonator. The former is typically described using a
finite-dimensional Hilbert space and the latter is a quantum harmonic oscillator with an
infinite-dimensional underlying Hilbert space (i.e., L2 (R), the space of square-integrable
complex-valued functions on the real line). Another example is a proposed photonic realization of classical logic based on Kerr nonlinear optical cavities in [12], which is built around
a quantum harmonic oscillator with a Kerr nonlinear medium inside it. If a mathematical model for such quantum devices is sufficiently simple, it is often possible to simulate
the dynamics of the system on a digital computer to assess the predicted performance of
the actual device, as carried out in [12]. The simulation carried out is typically that of a
stochastic master equation that simulates the stochastic dynamics of a quantum system
when one of its output is observed via laboratory procedures such as homodyne detection
or photon counting, see [3, 6, 13]. However, since it is not possible to faithfully simulate a
quantum system with an infinite-dimensional Hilbert space, often in simulations this space
is truncated to some finite-dimensional subspace. Two approaches that are often employed
to approximate a quantum system, defined on an infinite-dimensional space, are subspace
truncation approximation and adiabatic elimination (also known as singular perturbation).
Subspace truncation approximation is applied to eliminate higher dimensions of the original infinite-dimensional Hilbert space. An operator X on the infinite-dimensional space is
approximated by a truncated operator of the form P XP , where P denotes an orthogonal
projection projector onto the approximate finite-dimensional subspace. For instance, with
quantum harmonic oscillators, a commonly used finite-dimensional space is the span of a
finite number of Fock states |0i, |1i, . . . , |ni. On the other hand, adiabatic elimination is
often used to simplify quantum systems comprising components that evolve at multiple
well-separated time-scales. In this approach, the faster variables are eliminated from the
mathematical model description of the systems.
Despite the ubiquity of approximating infinite-dimensional Hilbert spaces of quantum
systems by finite-dimensional subspaces for simulations of input-output quantum systems,
to the best of the authors’ knowledge, there does not appear to be any work that has tried to
obtain some explicit bounds on the approximation error of the joint state of the system and
2
the quantum field it is coupled to. This work develops a framework for developing bounds
on the error between the quantum state of a quantum system described by the QSDE and
the quantum state of a finite-dimensional approximation described by another QSDE, when
both systems are initialized in a state in the finite-dimensional subspace. Central to the
framework is a contractive semigroup associated with the unitary QSDEs of input-output
Markov quantum systems. Error bounds are developed for both adiabatic elimination
and subspace truncation approximations. For illustration, our results are applied to some
physical examples drawn from the literature. Prelimary results of this work were announced
in the conference paper [14]. The results presented in the work go significantly beyond [14].
In particular, [14] only treates the subspace truncation approximation with some elements
of the proofs omitted, error bounds for adiabatic elimination had not been developed, and
computability of the error bounds were not considered.
The rest of this paper is structured as follows. In Section 2, we present the class of
open quantum systems and the associated QSDEs describing Markovian open quantum
systems. Explicit error bounds for the subspace truncation approximation of a Markovian
open quantum system are established in Section 3 and some examples are provided. We
then establish error bounds for adiabatic elimination approximation in Section 4 and some
examples are also provided. Finally, concluding remarks close the paper in Section 5.
2
2.1
Preliminaries
Notation
√
We use ı = −1 and let (·)∗ denote the adjoint of a linear operator on a Hilbert space as well
as the conjugate of a complex number, and (·)⊤ denote matrix transposition. We denote
by δij the Kronecker delta function. We define ℜ{A} = 12 (A + A∗ ) and ℑ{A} = 2ı1 (A − A∗ ).
For a linear operator A, we write ker(A) to denote the kernel of A and ran(A) the range
of A. We often write |·i to denote an element of a Hilbert space and denote by H⊗F the
algebraic tensor product of Hilbert spaces H and F . For a subspace H0 of a Hilbert space
H, we write PH0 to denote the orthogonal projection operator onto H0 . For a Hilbert space
H = H0 ⊕ H1 , we will write H ⊖ H0 to denote H1 . For a linear operator X on H, X|H0
denotes the restriction of X to H0 . We use B(H) to denote the algebra of all bounded
linear operators on H. We write [A, B] = AB − BA. The notation k · k will be used
to denote Hilbert space norms and operator norms, h·, ·i denotes an inner product on a
Hilbert space, linear in the right slot and antilinear in the left, and |·i h·| denotes an outer
product. Here, 1[0,t] : [0, t] → {0, 1} denotes the indicator function. Finally, Z+ denotes
the set of all positive integers.
2.2
Open quantum systems
Consider a separable Hilbert space H0 and the symmetric boson Fock space (of multiplicity m) F defined over the space L2 ([0, T ]; Cm ) = Cm ⊗ L2 ([0, T ]) with 0 < T < ∞;
3
see [15, Ch. 4-5] for more details. We will use e(f ) ∈ F , with f ∈ L2 ([0, T ]; Cm ), to
m
denote exponential vectors in F . Let S ⊂ L2 ([0, T ]; Cm ) ∩ L∞
loc ([0, T ]; C ) be an admissible subspace in the sense of Hudson-Parthasarathy [1] which contains at least all simple
m
functions, where L∞
loc ([0, T ]; C ) is the space of locally bounded vector-valued functions.
Here, we will consider a dense domain D0 ⊂ H0 and a dense domain of exponential vectors
E = span{e(f ) | f ∈ S} ⊂ F .
Consider an open Markov quantum system that can be described by a set of linear
operators defined on the Hilbert space H0 : (i) a self-adjoint Hamiltonian operator H, (ii) a
vector of coupling operators L with the j-th element, Lj : H0 → H0 for all j = 1, 2, . . . , m,
and (iii) a unitary scattering matrix S with the ij-th element, Sij : H0 → H0 for all i, j =
1, 2, . . . , m. Moreover, the operators Sij , Lj , H and their adjoints are assumed to have D0
as a common invariant dense domain. Under this description, we note that m corresponds
to the number of external bosonic input fields driving the system. Each bosonic input
∗
field can be described by annihilation and creation field operators, bit and bit , respectively,
∗
which satisfy the commutation relations [bit , bjs ] = δij δ(t − s) for all i, j = 1, 2, . . . , m and
∗
all t, s ≥ 0. We can then define the annihilation process Ait , the creation process Ait , and
the gauge process Λij
t as
Z t
Z t
Z t
∗
ij
i
i
i∗
i∗
At =
bs ds,
At =
bs ds,
Λt =
bis bjs ds.
0
0
0
Note that these processes are adapted quantum stochastic processes. In the vacuum repre∗
∗
∗
sentation, the products of their forward differentials dAit = Ait+dt −Ait , dAit = Ait+dt −Ait ,
ij
ij
and dΛij
t = Λt+dt − Λt satisfy the quantum Itō table
dAkt
0
0
0
0
×
dAit
∗
dAjt
dΛij
t
dt
∗
dAkt
δik dt
0
∗
δjk dAit
0
dΛkℓ
t
δik dAℓt
0
δjk dΛiℓ
t
0
dt
0
0 .
0
0
dAi
Here, bit = dtt can be interpreted as a vacuum quantum white noise, while Λiit can be
interpreted as the quantum realization of a Poisson process with zero intensity [1].
Following [16], the time evolution of a Markov open quantum system is given by an
adapted process Ut satisfying the left Hudson-Parthasarathy QSDE [1]:
( m
m
X
X
ij
∗
dUt = Ut
L∗i dAit
Sji − δij )dΛt +
i=1
i,j=1
−
m
X
i,j=1
i∗
∗
Sji
Lj dAt
# )
m
1X ∗
(L Li ) dt
+ ıH −
2 i=1 i
"
(1)
with U0 = I. The quantum stochastic integrals are defined relative to the domain D0 ⊗E.
With the left QSDE, the evolution of a state vector ψ ∈ H0 ⊗ F is given by Ut∗ ψ.
4
In this paper, we are interested in the problem of approximating the system with
operator parameters (S, L, H) by an open quantum system with linear operator parameters
(S (k) , L(k) , H (k) ) defined on a closed subspace H(k) ⊂ H0 , where S (k) is unitary and H (k) is
self-adjoint. Consider a dense domain D (k) ⊂ H(k) . Again, the operators (S (k) , L(k) , H (k) )
and their adjoints are assumed to have D (k) as a common invariant dense domain. Similar
(k)
to (1), the time evolution of the approximating system is given by an adapted process Ut
satisfying the left Hudson-Parthasarathy QSDE [1]:
( m
m
X
X (k)∗
(k)∗
(k)
(k)
i
+
L
dA
Sji − δij )dΛij
dUt = Ut
t
t
i
i=1
i,j=1
−
m
X
i,j=1
∗
(k)∗
Sji Lj dAit
# )
m
X
∗
1
(k)
(k)
(L Li ) dt ,
+ ıH (k) −
2 i=1 i
"
(2)
(k)
with U0 = I. Here, the quantum stochastic integrals in the above equation are defined
relative to the domain D (k) ⊗E. Similarly, the evolution of a state vector ψ ∈ H(k) ⊗ F is
(k) ∗
given by Ut ψ.
2.3
Associated semigroups
Let θt : L2 ([t, T ]; Cm ) → L2 ([0, T ]; Cm ) be the canonical shift θt f (s) = f (t + s). We also
let Θt : F[t → F denote the second quantization of θt , where F[t denotes the Fock space
over L2 ([t, ∞); Cm). Note that an adapted process Ut on H0 ⊗ F is called a contraction
(or unitary) cocycle if Ut is a contraction (or unitary) for all t ≥ 0, t 7→ Ut is strongly
continuous, and Us+t = Us (I ⊗ Θ∗s Ut Θs ).
Let us now impose an important condition on the open quantum systems under consideration, adopted from [16].
Condition 1 (Contraction cocycle solutions). For all t ≥ 0 and all k ∈ Z+ ,
(a) the QSDE (1) possesses a unique solution Ut which extends to a unitary cocycle on
H0 ⊗ F ,
(k)
(b) the QSDE (2) possesses a unique solution Ut
on H(k) ⊗ F .
(αβ)
Let us define an operator Tt
(αβ)
hu, Tt
1
which extends to a contraction cocycle
: H0 → H0 via the identity
2 +kβk2 )t
vi = e− 2 (kαk
u ⊗ e(α1[0,t] ), Ut v ⊗ e(β1[0,t] )
for all u, v ∈ H0 and all α, β ∈ Cm . From [16, Lemma 1], under Condition 1(a), the
(αβ)
operator Tt
∈ B(H0 ) is a strongly continuous contraction semigroup on H0 and its
5
generator L(αβ) satisfies Dom(L(αβ) ) ⊃ D0 such that
" m
m
m
X
X
X
∗
∗
L(αβ) u =
αi∗ Sji
βj −
αi∗ Sji
Lj +
L∗j βj
i,j=1
1
+ ıH −
2
i,j=1
m
X
L∗i Li
i=1
!
j=1
#
kαk2 + kβk2
−
u
2
(3)
for all u ∈ D0 . Here, we note that Dom(L(αβ) ) is dense in H0 . We likewise define an
(k;αβ)
(k)
operator Tt
: H(k) → H(k) by replacing Ut with Ut .
Condition 2 (Core for generators). For all t ≥ 0 and all k ∈ Z+ ,
(a) D0 is a core for L(αβ) ,
(b) D (k) is a core for L(k;αβ) .
Condition 2(a) ensures that the definition (3) completely determines L(αβ) for all α, β ∈
C , likewise 2(b) completely determines L(k;αβ) . In the sequel, we will make use of the above
semigroups associated with open quantum systems in establishing our model approximation
error bound. Several sufficient conditions are known to guarantee that a QSDE possesses
a unique solution that extends to a unitary cocycle when the Hilbert space is infinitedimensional and the operator coefficients of the QSDE are unbounded, see, e.g., [17], and a
related discussion in [16, Remark 4]. Throughout the paper, we will assume that Conditions
1 and 2 are fulfilled.
m
3
Error bounds for subspace truncation approximations
In this section, we consider the problem where the infinite-dimensional space H0 is truncated to a finite-dimensional subspace H(k) , and the original operators X on H0 is approximated by truncated operators of the form PH(k) XPH(k) . Here, the dimension of H(k)
(k)
increases with k ∈ Z+ and D (k) = H(k) . Moreover, Condition 1(b) (in fact, Ut is unitary [1]) and 2(b) hold immediately.
3.1
Assumptions and preliminary results
Assumption 1. For any k ∈ Z+ and any α, β ∈ Cm , H(k) ⊂ Dom(L(αβ) ).
Let M(k) = ran L(α,β) − L(k;α,β) H(k) . Supposing that Assumption 1 holds, we also
assume the following.
(αβ)
Assumption 2. For each k ∈ Z+ and each α, β ∈ Cm , there exists γk
0, and a non-trivial subspace {0} ⊂ K(k) ⊆ H(k) such that
6
(k;αβ)
, qL
(k;αβ)
, qa
(k;αβ)
, qe
>
(k;αβ)
L(αβ) − L(k;αβ) K(k) ≤ qL
.
(b) L(αβ) − L(k;αβ) H(k) ⊖K(k) = 0,
T
i.e., H(k) ⊖ K(k) ⊆ α,β∈Cm ker L(αβ) − L(k;αβ)
(a)
H(k)
(c) For any u ∈ H(k) ,
ℜ{hPK(k) L(k;αβ) u, PK(k) ui} = −g(k, α, β) kPK(k) uk2 + h(k, α, β, u)
(αβ)
for some g(k, α, β) ≥ γk
(k;αβ)
and some |h(k, α, β, u)| ≤ qa
kPK(k) uk kuk.
(d) For any u ∈ H(k) and any t ≥ 0,
(αβ)
ℜ{hTt
(α,β)
L(αβ) PM(k) u, Tt
(αβ)
for some ĝ(k, α, β) ≥ γk
(αβ)
PM(k) ui} = −ĝ(k, α, β) Tt
2
PM(k) u
(k;αβ)
and some ĥ(t, k, α, β, u) ≤ qe
+ ĥ(t, k, α, β, u)
(αβ)
Tt
PM(k) u kuk.
Assumption 3. There exists r, s ∈ Z+ such that, for all α, β ∈ Cm , we have that
(k;αβ)
(k;αβ)
lim qL
qe
(αβ)
k→∞
γk
!(1−2−r )
(k;αβ)
qa
(αβ)
γk
!(1−2−s )
=0
Moreover, for any i = 0, 1, 2, . . . , r, and j = 0, 1, 2, . . . , s, we have that
(k;αβ)
lim
k→∞
qL
(αβ)
γk
(αβ)
lim e−γk
k→∞
(k;αβ)
qe
(αβ)
γk
t (k;αβ)
qL
!(1−2−i )
(k;αβ)
qa
γk
!(1−2−ℓ )
(k;αβ) (k;αβ)
qa
(αβ) 2
(γk )
qe
(αβ)
!(1−2−j )
=0
= 0,
for any α, β ∈ Cm , any t > 0, and for ℓ = 0, 1, 2, . . . , min{r, s} − 1.
Let us present some useful lemmas.
Lemma 1. Suppose that Assumption 2(c) holds. Then for any k, r ∈ Z+ , any α, β ∈ Cm ,
any u ∈ H(k) , and any t ≥ 0, it holds that
−r
−j
!
!
r−1
(k;αβ) (1−2 )
(k;αβ) (1−2 )
X
(αβ)
qa
−j
qa
(k;αβ)
kuk (4)
PK(k) Tt
u ≤
+
cj e−(2 )γk t
(αβ)
(αβ)
γk
γk
j=0
q
where c0 = 1 and cj = cj−1 2j (2j − 1)−1 for j ≥ 1.
7
(αβ)
Proof. First note, from the definition of a strongly continuous semigroup, that T0
(αβ)
and dtd Tt u = L(αβ) u [18]. From Assumption 2(c), we have that
E
2
d D
d
(k;αβ)
(k;αβ)
(k;αβ)
P (k) T
u =
P (k) T
u, PK(k) Tt
u
dt K t
dt nDK t
Eo
(k;αβ)
(k;αβ)
= 2ℜ PK(k) L(k;αβ) Tt
u, PK(k) Tt
u
(k;αβ)
=−2g(k, α, β) PK(k) Tt
2
(k;αβ)
u + 2h(k, α, β, Tt
=I
u).
Solving the above ODE gives us that
2
(k;αβ)
PK(k) Tt
u
−2g(k,α,β)t
2
Z
t
h(k, α, β, Tτ(k;α,β)u)e−2g(k,α,β)(t−τ ) dτ
0
Z t
(αβ)
(αβ)
2
−2γk
t
(k;αβ)
≤e
kPK(k) uk + 2qa
e−2γk (t−τ ) PK(k) Tτ(k;αβ) u kukdτ (5)
0
"
#
(k;αβ)
(αβ)
qa
≤ e−2γk t + (αβ) kuk2.
γk
=e
kPK(k) uk + 2
Here, the second step follows from Assumption 2(c). The lastp
step follows because kPK(k) uk ≤
(k;αβ)
kuk and Tt
is a contraction semigroup. Noticing that |a|2 + |b|2 ≤ |a| + |b| for any
a, b ∈ R, we have that
! 21
(k;αβ)
(αβ)
qa
(k;αβ)
kuk.
(6)
PK(k) Tt
u ≤ e−γk t +
(αβ)
γk
Now, substituting (6) into the right-handed side of (5), we have that
(k;αβ)
PK(k) Tt
(αβ)
−2γk
≤e
t
2
kuk +
Z
+ 2qa(k;αβ)
(αβ)
≤ e−2γk
t
t
2qa(k;αβ)
Z
t
e
(αβ)
−γk
t
+ 2e
(αβ)
+2e−γk
t
(αβ)
e−γk
(2t−τ )
0
(αβ)
−2γk
(t−τ )
0
(αβ)
−2γk
t
= e
2
u
(k;αβ)
qa
(αβ)
γk
! 12
(αβ)
−γk
t
1−e
(k;αβ)
qa
(αβ)
γk
!
+
kuk2dτ
kuk2dτ
(k;αβ)
qa
(αβ)
γk
(k;αβ)
qa
(αβ)
γk
!
! 32
(αβ)
−2γk
t
+ 1−e
! 32
kuk2
kuk2.
Taking the square root on both sides of the equation, we get
!1
(k;αβ) 2
√
(αβ)
(αβ)
1
qa
(k;αβ)
+
PK(k) Tt
u ≤ e−γk t + 2e− 2 γk t
(αβ)
γk
8
(k;αβ)
qa
(αβ)
γk
(k;αβ)
qa
(αβ)
γk
! 34
kuk.
From repeat application of the above steps, we establish the lemma statement.
Lemma 2. Suppose that Assumption 2(d) holds. Then for any k, r ∈ Z+ , any α, β ∈ Cm ,
any u ∈ H(k) , and any t ≥ 0, it holds that
−r
!
!(1−2−j )
r−1
(k;αβ) (1−2 )
(k;αβ)
X
(αβ)
qe
qe
(αβ)
t
−(2−j )γk
kuk
Tt PM(k) u ≤
+
c
e
(7)
j
(αβ)
(αβ)
γk
γ
j=0
k
q
where c0 = 1 and cj = cj−1 2j (2j − 1)−1 for j ≥ 1.
Proof. Similar to Lemma 1, using Assumption 2(d), we have that
2
d
(αβ)
(αβ)
(αβ)
Tt PM(k) u = 2ℜ{hTt L(αβ) PM(k) u, Tt PM(k) ui}
dt
(αβ)
= −2ĝ(k, α, β) Tt
PM(k) u
2
+ 2ĥ(t, k, α, β, u).
Solving the ODE, we have that
(αβ)
Tt PM(k) u
2
(αβ)
−2γk
≤e
"
2
t
2qe(k;αβ)
kPM(k) uk +
#
(k;αβ)
(αβ)
q
e
≤ e−2γk t + (αβ) kuk2 .
γk
Z
t
(αβ)
e−2γk
(t−τ )
0
(αβ)
Tt
PM(k) u kukdτ
The lemma statement is then established by following similar arguments to Lemma 1.
3.2
Error bounds for finite-dimensional approximations
We begin by defining
k
zr,s
(t, α, β)
:=
(k;αβ)
qL
+
(αβ)
γk
s−1
X
2 i ci
(αβ)
i=1
γk
r−1 X
s−1
X
(αβ)
γk
r−1
X
2 i ci
i=0
+
t
!(1−2−r )
(k;αβ)
qe
(αβ)
−2−i γk
t
1−e
(αβ)
−2−i γk
t
1−e
(k;αβ)
qa
(αβ)
γk
!(1−2−s )
q (k;αβ)
e
(αβ)
γk
q (k;αβ)
a
(αβ)
γk
!(1−2−i )
!(1−2−i )
(k;αβ)
qa
(αβ)
γk
(k;αβ)
qe
(αβ)
γk
!(1−2−s )
!(1−2−r )
q (k;αβ)
−i (αβ)
(αβ)
e
−2 γk
t
−2−j γk
t
ci cj
+
e
−e
(αβ)
(αβ)
i
j
(2 − 2 ) γk
γk
i=0 j=0
j6=i
−i
!
min{r,s}−1
(k;αβ) (k;αβ) (1−2 )
X
(αβ)
qe
qa
−i
,
+t
c2i e−2 γk t
(αβ) 2
(γ
)
i=0
k
2(i+j)
9
!(1−2−i )
! −j
(k;αβ) (1−2 )
qa
(αβ)
γk
(8)
p
where c0 = 1, and cj = cj−1 2j (2j − 1)−1 for j ≥ 1. We now establish an error bound
between the two semigroups associated with the open quantum systems.
Lemma 3. Suppose Assumptions 1 and 2 hold. Then for any k, r, s ∈ Z+ , any α, β ∈ Cm ,
any u ∈ H(k) , and any t ≥ 0, it holds that
(αβ)
(k;αβ)
k
(t, α, β)kuk.
(9)
u ≤ zr,s
Tt
− Tt
Proof. First note, from the definition of a strongly continuous semigroup, that [18]
(αβ)
1. T0
(k;αβ)
= T0
2.
d (αβ)
T
u
dt t
3.
d (k;αβ)
T
u
dt t
= I for all k ∈ Z+ ,
= L(αβ) u for all u ∈ Dom(L(αβ) ),
= L(k;αβ) u for all u ∈ H(k) (since H(k) is finite-dimensional).
From the above properties and Assumption 1, we can write for all u ∈ H(k) and all t ≥ 0
that
d (αβ)
(k;αβ)
(αβ) (αβ)
(k;αβ) (k;αβ)
u
u = L Tt
−L
Tt
T
− Tt
dt t
(k;αβ)
(αβ)
(k;αβ)
u + L(αβ) − L(k;αβ) H(k) Tt
u (10)
− Tt
= L(αβ) Tt
(αβ)
(k;αβ)
u = 0. Note that by Assumption 2,
with T0 − T0
bounded operator. Since L
(αβ)
(due to Assumption 1), and
L(αβ) − L(k;αβ)
H(k)
is a
is a generator of a semigroup on a Hilbert space,
(αβ)
(k;αβ)
u ∈ Dom(L(αβ) ),
T0 − T0
L(αβ) − L(k;αβ)
(k;αβ)
H(k)
Tt
u ∈ C 1 ([0, t]; H0 )
(the class of continuously differentiable functions from [0, t] to H0 ), a unique solution of
(10) exists and is given by [18, Thm 3.1.3]
Z t
(αβ)
(αβ)
(k;αβ)
u=
Tt−τ L(αβ) − L(k;αβ) Tτ(k;αβ) udτ
Tt
− Tt
0
for all t ≥ 0 and all u ∈ H(k) . From Assumption 2(b) and the definition of M(k) , we then
have for all u ∈ H(k) and all t ≥ 0 that
Z t
(αβ)
(αβ)
(k;αβ)
Tt−τ L(αβ) − L(k;αβ) Tτ(k;αβ) u dτ
u ≤
Tt
− Tt
Z0 t
(αβ)
(11)
=
Tt−τ PM(k) L(αβ) − L(k;αβ) PK(k) Tτ(k;αβ) u dτ.
0
10
Now using the bounds (4) and (7) (established in Lemmas 1 and 2, respectively), and
applying Assumption 2(a), we have that
(αβ)
Tt−τ PM(k) L(αβ) − L(k;αβ) PK(k) Tτ(k;αβ) u
! −r
! −s
(k;αβ) (1−2 )
(k;αβ) (1−2 )
qa
(k;αβ) qe
≤ qL
(αβ)
(αβ)
γk
γk
! −s " r−1
! −i #
(k;αβ) (1−2 )
(k;αβ) (1−2 ) X
(αβ)
q
qa
−i
e
ci e−2 γk (t−τ )
+
(αβ)
(αβ)
γk
γk
i=0
−i #
! −r " s−1
!
(k;αβ) (1−2 ) X
(k;αβ) (1−2 )
(αβ)
qe
q
−i
a
+
ci e−2 γk τ
(αβ)
(αβ)
γk
γk
i=1
−i
−j #
!
!
" r−1 s−1
(k;αβ) (1−2 )
(k;αβ) (1−2 )
XX
(αβ)
qa
qe
−i
−i
−j
kuk.
+
ci cj eγk (−2 t+(2 −2 )τ )
(αβ)
(αβ)
γ
γ
i=0 j=0
k
k
The result (9) then follows from substitution of the above identity into (11) and integration.
This establishes the lemma statement.
Let S′ ⊂ L2 ([0, T ]; Cm) denote the dense set of all simple functions in L2 ([0, T ]; Cm ).
That is, for any t ∈ [0, T ] and f ∈ S′ , there
Pℓ exists 0 < ℓ < ∞ and a sequence 0 = t0 m<
t1 < · · · < tℓ < tℓ+1 = t such that f = i=0 α(i)1[ti ,ti+1 ) for some constants α(i) ∈ C ,
i = 0, 1, . . . , ℓ. Let U (k) = {u ⊗ e(f ) | u ∈ H(k) , f ∈ S′ }. We can now proceed to derive
error bounds for approximations by subspace truncation.
Lemma 4. Suppose Assumptions 1 and 2 hold. For any ψ1 = u1 ⊗ e(f1 ), ψ2 = u2 ⊗
e(f2 ) ∈ U (k) , let
P t0 = 0 < t1 < . . . < tℓ < tℓ+1 = t with 0 < t ≤ T be a sequence
such that fj = ℓi=0 αj (i)1[ti ,ti+1 ) for all i = 0, 1, . . . , ℓ, with αj (i) ∈ Cm for j = 1, 2 and
i = 0, 1, . . . , ℓ. Then for any k, r, s ∈ Z+ ,
ℓ
∗
E
D
X
(k)
k
ψ1 , ψ2 ≤
zr,s
((ti+1 − ti ), α1 (i), α2 (i)) kψ1 kkψ2 k.
Ut − Ut
(12)
i=0
Proof. First recall that our admissible subspace S contains S′ . Hence, U (k) ⊂ H(k) ⊗E
and the quantum stochastic integrals are well defined for all ψ ∈ U (k) . Also, recall that
kψk2 = hu ⊗ e(f ), u ⊗ e(f )i = kuk2 ke(f )k2 for any ψ ∈ H0 ⊗ F [15]. Using the cocycle
(αβ)
(k;αβ)
properties (Condition 1) as well as the definitions of Tt
and Tt
, we have the identity
[16]
(α (0)α2 (0))
1
hUt∗ ψ1 , ψ2 i = ke(f1 )k ke(f2 )k hu1 , Tt1 −t
0
(αβ)
and likewise when Ut and Tt
(α (ℓ)α2 (ℓ))
u2 i,
(k)
(k;αβ)
· · · Tt−t1ℓ
are respectively replaced by Ut
11
and Tt
(13)
, from which
we immediately obtain
∗
D
E
(k)
Ut − Ut
ψ1 , ψ2
(α1 (0)α2 (0))
(α1 (ℓ)α2 (ℓ))
(k;α1 (0)α2 (0))
(k;α1 (ℓ)α2 (ℓ))
≤ kψ1 k ke(f2 )k Tt1 −t
u2 .
·
·
·
T
−
T
·
·
·
T
t−tℓ
t1 −t0
t−tℓ
0
(14)
Now, note that for any u ∈ H(k) that
(α1 (0)α2 (0)) (α1 (1)α2 (1))
(α1 (ℓ)α2 (ℓ))
(k;α1 (0)α2 (0)) (k;α1 (1)α2 (1))
(k;α1 (ℓ)α2 (ℓ))
Tt1 −t
T
·
·
·
T
−
T
T
·
·
·
T
u
t2 −t1
t−tℓ
t1 −t0
t2 −t1
t−tℓ
0
h
(α1 (0)α2 (0))
(k;α (0)α (0))
(k;α (1)α (1)) (k;α (2)α (2))
(k;α (ℓ)α (ℓ))
= Tt1 −t
− Tt1 −t01 2
Tt2 −t11 2 Tt3 −t21 2 · · · Tt−tℓ 1 2
0
(α1 (0)α2 (0))
(α1 (1)α2 (1))
(k;α1 (1)α2 (1))
(k;α (1)α (1))
(k;α (ℓ)α (ℓ))
+ Tt1 −t
T
−
T
Tt2 −t11 2 · · · Tt−tℓ 1 2
t2 −t1
t2 −t1
0
i
(α1 (0)α2 (0))
(α1 (ℓ)α2 (ℓ))
(k;α1 (ℓ)α2 (ℓ))
(α1 (ℓ−1)α2 (ℓ−1))
u.
+ · · · + Tt1 −t
T
−
T
·
·
·
T
t−tℓ
t−tℓ
tℓ −tℓ−1
0
From (14), the bound (9) (established in Lemma 3), and that fact that the semigroups are
contractions, we have for any u ∈ H(k) that
(α1 (0)α2 (0)) (α1 (1)α2 (1))
(k;α1 (0)α2 (0)) (k;α1 (1)α2 (1))
(α1 (ℓ)α2 (ℓ))
(k;α1 (ℓ)α2 (ℓ))
Tt1 −t0
Tt2 −t1
− Tt1 −t0
· · · Tt−tℓ
u
Tt2 −t1
· · · Tt−tℓ
≤
ℓ
X
i=0
k
zr,s
((ti+1 − ti ), α1 (i), α2 (i)) kuk.
(15)
The bound (12) then follows by substituting (15) into (14). This establishes the theorem
statement.
Corollary 1. Suppose Assumptions 1, 2, and 3 hold. For any t ∈ [0, T ] with 0 < T < ∞,
any ψ1 = u1 ⊗ e(f1 ), ψ2 = u2 ⊗ e(f2 ) ∈ H(k) ⊗ F , we have that
∗
D
E
(k)
Ut − Ut
ψ1 , ψ2 ≤ 2 ku1kke(f1 ) − e(f1′ )kkψ2 k + ku2kke(f2 ) − e(f2′ )kkψ1 k
+
ℓ
X
i=0
′
k
′
′
zr,s
(ti+1 − ti ), f1,i
, f2,i
kψ1 kkψ2′ k.
(16)
P
′
for any ψj′ = uj ⊗ e(fj′ ) ∈ U (k) with fj′ = ℓi=0 fj,i
1[ti ,ti+1 ) for some ℓ ∈ Z+ , some sequence
′
t0 = 0 < t1 < . . . < tℓ < tℓ+1 = t, and some constants fj,i
∈ Cm for j = 1, 2 and
i = 0, 1, . . . , ℓ. Moreover, for any fixed positive integer p ∈ Z+ , and any ψ1 = u1 ⊗
e(f1 ), ψ2 = u2 ⊗ e(f2 ) ∈ H(p) ⊗ F ,
∗
D
E
(k)
Ut − Ut
ψ1 , ψ2
lim
= 0.
(17)
k→∞
(k)
Proof. Recall that Ut is unitary and Ut
is a contraction (Condition 1). From the triangle
12
inequality and Cauchy-Schwarz’s inequality, we note that
∗
∗
D
D
E
E
(k)
(k)
Ut − Ut
Ut − Ut
u1 ⊗ (e(f1 ) − e(f1′ )) , u2 ⊗ e(f2 )
ψ1 , ψ2 ≤
∗
E
D
(k)
′
′
u1 ⊗ e(f1 ), u2 ⊗ (e(f2 ) − e(f2 ))
+
Ut − Ut
∗
E
D
(k)
u1 ⊗ e(f1′ ), u2 ⊗ e(f2′ )
+
Ut − Ut
≤ 2ku1 k ke(f1 ) − e(f1′ )k kψ2 k + 2ku2 k ke(f2 ) − e(f2′ )k kψ1′ k
∗
D
E
(k)
Ut − Ut
u1 ⊗ e(f1′ ), u2 ⊗ e(f2′ ) .
+
The result (16) then follows from the bound (12) (established in Lemma 4).
To show (17), recall that S′ is dense in L2 ([0, T ]; Cm ). Therefore, for each ǫ > 0 and
each fj ∈ L2 ([0, T ]; Cm ), there exists fj′ ∈ S′ such that kfj −fj′ k < ǫ. Moreover, there exists
P
0 < ℓ < ∞ and 0 = t0 < t1 < · · · < tℓ < tℓ+1 = t, such that fj′ = ℓi=0 αj′ (i)1[ti ,ti+1 ) with
αj′ (0), αj′ (1), . . . , αj′ (ℓ) ∈ Cm . Suppose that u1 , u2 6= 0 (otherwise the corollary statement
becomes trivial), then for any ǫ > 0 we may choose f1′ , f2′ ∈ S′ (choosing f1′ first followed
by f2′ ) such that
ǫ
ke(f1 ) − e(f1′ )k <
6ku1 k ke(f2 )k
ǫ
ke(f2 ) − e(f2′ )k <
6ku2 k ke(f1′ )k
Finally, from Assumption 3 and the bound (12) (established in Lemma 4), we can find a
sufficiently large k ∈ Z+ , larger than p, such that
ℓ
X
i=0
k
zr,s
(((ti+1 − ti ), α1′ (i), α2′ (i))) <
ǫ
3kψ1′ kkψ2′ k
.
From (16) and the above choices, we then have that
∗
D
E
(k)
Ut − Ut
ψ1 , ψ2 < ǫ.
This establishes the corollary statement.
Theorem 1. Suppose that Assumptions 1,2, and 3 hold. Let 0 < T < ∞. For any
PL′t ′
′
′
ψj,t , with ψj,t
= u′j,t ⊗ e(gj,t
) ∈ U (k) and
t ∈ [0, T ], consider any L′t ∈ Z+ , any ψt′ = j=1
′
′
′
uj,t 6= 0. Also, consider any f ∈ S . Let ℓ be a positive integer and t0 = 0 < t1 < . . . <
P
P
′
′
1[ti ,ti+1 ) for
= ℓi=0 gj,t,i
tℓ < tℓ+1 = t be a sequence such that f ′ = ℓi=0 fi′ 1[ti ,ti+1 ) and gj,t
′
m
′
some constants fi , gj,t,i ∈ C for for j = 1, 2, . . . , Lt and i = 0, 1, . . . , ℓ. Let u ∈ H(k) with
kuk = 1, and |f i = e(f )/ke(f )k ∈ F (i.e., |f i is a coherent state with amplitude f ), and
ψ = u ⊗ |f i. Then,
∗ 2
(k)
Ut − Ut
ψ ≤ 4 k|f i − |f ′ik + kUt ∗ ψ − ψt′ k
′
+2
Lt
ℓ
X
X
j=1 i=1
13
′
k
′
zr,s
(ti+1 − ti ), fi′ , gj,t,i
kψj,t k.
(18)
(k)
If Ut
is unitary for each t then the following bound holds,
∗
(k)
Ut − Ut
ψ
2
′
≤ 4 k|f i − |f ik +
+2
(k) ∗
Ut ψ
ψt′
−
′
Lt
ℓ
X
X
j=1 i=1
′
k
′
zr,s
(ti+1 − ti ), fi′ , gj,t,i
kψj,t k.
Moreover, for any fixed p ∈ Z+ and any ψ = u ⊗ |f i ∈ H(p) ⊗ F ,
∗
(k)
Ut − Ut
ψ = 0.
lim
(19)
(20)
k→∞
for any t ∈ [0, T ] with 0 < T < ∞.
Remark 1. Note that a stronger
result of strong convergence uniformly over compact time
∗
(k)
ψ = 0, has been established in [16, Proposition
intervals, limk→∞ sup0≤t≤T Ut − Ut
20] employing a Trotter-Kato theorem. However, no error bound as in (18) for a finite
value of k has previously been established.
(k)
Proof. First note that since Ut is unitary and Ut
2
∗
(k)
ψ
Ut − Ut
a contraction,
(k)
≤ 2ℜ{h(Ut − Ut )∗ ψ, Ut∗ ψi}
(k)
≤ 2|h(Ut − Ut )∗ ψ, Ut∗ ψi|.
Also, we have that
∗
∗
E
E
D
D
(k)
(k)
∗
′
∗
ψ, Ut ψ ≤
u ⊗ (|f i − |f i) , Ut ψ
Ut − Ut
Ut − Ut
∗
D
E
(k)
+
Ut − Ut
u ⊗ |f ′ i, (Ut∗ ψ − ψt′ )
∗
D
E
(k)
′
′
Ut − Ut
+
u ⊗ |f i, ψt
≤ 2kukkf i − |f ′ ikkψk + 2kukk|f ′ik kUt∗ ψ − ψt′ k
L′t D
∗
E
X
(k)
′
u ⊗ |f ′ i, ψj,t
.
+
Ut − Ut
j=1
The result (18) then follows from the bound (12), and substituting kuk = 1, kψk = 1, and
(k)
k|f ′ ik = 1. If Ut is unitary then we have the bound,
∗
(k)
Ut − Ut
ψ
2
(k)
= 2ℜ{h(Ut
(k) ∗
− Ut )∗ ψ, Ut
(k)
(k) ∗
≤ 2|h(Ut − Ut )∗ ψ, Ut
14
ψi}
ψi|,
and following analogous calculations to the above yields,
∗
D
E
(k)
(k) ∗
(k) ∗
Ut − Ut
ψ, Ut ψ ≤ 2kukkf i − |f ′ikkψk + 2kukk|f ′ik Ut ψ − ψt′
+
L′t D
X
j=1
Ut −
(k)
Ut
∗
u ⊗ |f
′
′
i, ψj,t
E
,
leading to the alternative bound (19).
To show (20), let t ∈ [0, T ] be fixed. Suppose ψ 6= 0. Then for any ǫ > 0, we may
choose f ′ ∈ S′ such that
k|f i − |f ′ik <
ǫ2
.
12
′
Since T is finite, for k0 ∈ Z+ sufficiently large we can choose 0 < L′t < ∞ and ψj,t
∈ U (k0 )
for j = 1, 2, . . . , L′t such that
kUt∗ ψ − ψt′ k <
ǫ2
,
12
PL′t ′
′
with ψt′ =
j=0 ψj,t . Finally, from Corollary 1, since Lt is finite we can find k1 ∈ Z+
sufficiently large, with k1 > max{p, k0 }, such that
D
Ut −
(k)
Ut
∗
u ⊗ |f
′
i, ψt′
E
<
ǫ2
.
6
for all k > k1 . From the above choices and taking square roots on both sides of (18), we
have that
∗
(k)
Ut − Ut
ψ < ǫ,
for all k > k1 . Since the theorem statement holds trivially when ψ = 0, this completes the
proof.
A discussion of the error bounds presented in Theorem 1 is now in order, starting with
(18). The error bound on the right hand side of (18) is the sum of three terms. The first
term is a bound on the error committed by approximating e(f ) by e(f ′ ) for some simple
function f ′ . The second term bounds the error in approximating Ut∗ ψ by a finite sum of
terms in U (k) given in ψt′ . Finally, the last term gives an upper bound for the magnitude
(k)
of the inner product between the error term (Ut − Ut )∗ u ⊗ e(f ′ ) and ψt′ . The first and
15
final terms are computable. However, the second term is difficult. We note that
*
+1/2
L′t
L′t
L′t
X
X
X
′
′
′
,
= Ut∗ ψ −
ψj,t
, Ut∗ ψ −
ψj,t
Ut∗ ψ −
ψj,t
j=1
j=1
′
′
= kψk2 − 2
j=1
2
= kψk − 2
(f ′ g ′
Lt
X
′
ℜ{hUt∗ ψ, ψj,t
i} +
Lt
X
′
ke(gj,t
)kℜ
j
)
′
j
′
ℓ j,t,ℓ
′
Ttℓ+1
−tℓ uj,t
Eo
+
Lt
X
j=1
Lt
X
j=1
2 1/2
′
ψj,t
,
nD
′
′
(f0′ gj,t,0
) (f1′ gj,t,1
)
u, Tt1 −t
Tt2 −t1 · · ·
0
2 1/2
′
ψj,t
,
(21)
where in the last line, we again use the identity (13). However, this is difficult to compute
(αβ)
as it involves the semigroup Tt
which acts on the infinite dimensional space H0 . Thus
to alleviate this difficulty we now turn to the alternative bound (19).
The first and third terms of (19) are the same as for (18). However, for the second
term we have the identity
L′t
L′t
nD
X
X
∗
(k;f ′ g ′
) (k;f ′ g ′
)
(k)
′
′
2
Ut ψ −
ψj,t =
ke(gj,t)kℜ u, Tt1 −t00 j,t,0 Tt2 −t11 j,t,1 · · ·
kψk − 2
j=1
j
′
′
)
(ℓ;fℓ′ gj,t,ℓ
Ttℓ+1 −tℓ u′j,t
Eo
+
Lt
X
j=1
2 1/2
′
ψj,t
,
(22)
derived in the same manner as (21). However, unlike (21), (22) involves only the semigroup
T (k;αβ) which acts on the finite dimensional Hilbert space H(k) . Thus it is a quantity
that will be much easier to compute. All that remains now is to construct a suitable
(k) ∗
′
′
approximation ψj,t
to Ut ψ. One way to do this is to choose ψj,t
to locally minimize the
right hand side of (22) or, equivalently, the term under the square root. Unfortunately,
although this is in principle possible, it is in general a challenging and computationally
intensive non-convex optimization problem. We will demonstrate this optimization in an
example that will follow.
3.3
3.3.1
Subspace truncation examples
Kerr-nonlinear optical cavity:
Consider a single-mode Kerr-nonlinear optical cavity coupled to a single external coherent
field (m = 1), which is used in the construction of the photonic logic gates presented in [12].
16
P
2
Let H0 = ℓ2 (the space of infinite complex-valued sequences with ∞
n=1 |xn | < ∞) which
has an orthonormal Fock state basis {|ni}n≥0 . On this basis {|ni}n≥0 , the annihilation,
creation, and number operators of the cavity oscillator can be defined (see, e.g., [16])
satisfying
√
√
a∗ |ni = n + 1 |n + 1i ,
a∗ a |ni = n |ni ,
a |ni = n |n − 1i ,
respectively. Similar to Examples 14-15 of [16], we set D0 = span{|ni | n ∈ Z+ }. The
Kerr-nonlinear optical cavity can be described by
√
S = I,
L = λa,
H = ∆a∗ a + χa∗ a∗ aa,
where λ, ∆, χ > 0. We now show that Conditions 1(a) and 2(a) hold for the Kerr-nonlinear
cavity.
Consider H(k) = span {|ni | n = 0, 1, 2, . . . , k} and a system approximation of the form
S (k) = I,
H (k) = PH(k) HPH(k) .
L(k) = PH(k) LPH(k) ,
(23)
Conditions 1(b) and 2(b) hold immediately because D (k) = H(k) is finite dimensional. Note
that H(k) ⊂ D0 . Hence, Assumption 1 holds. Recall that M(k) = ran L(α,β) − L(k;α,β) H(k) .
From the (S, L, H), we see that M(k) = span{|k + 1i}. Now consider K(k) = span {|ki}
(αβ)
and γk = 21 (λk + |α − β|2). We will now show that Assumptions 2 and 3 hold for the
Kerr-nonlinear optical cavity and the approximation.
Assumption 2(a): Note that
L(αβ) − L(k;αβ)
√
= β λ a∗ |K(k) .
K(k)
(k;αβ)
Thus, we have that Assumption 2(a) holds with qL
=
p
λ(k + 1)|β|.
Assumption 2(b): This assumption follows for the defined K(k) because
ker L(αβ) − L(k;αβ) H(k) = span {|ni | n = 0, 1, 2, . . . , k − 1} for all α, β ∈ C.
∗
Assumption 2(c): First
note that L(k) PK(k) = 0, PK(k) L(k) PH(k) = 0, and
∗
∗
PK(k) 21 L(k) L(k) − ıH PH(k) ⊖K(k) = 0. Also, for any u ∈ H(k) , PK(k) L(k) L(k) PK(k) u =
λkPK(k) u. From these identities and the fact that H (k) is self-adjoint, we have for any
u ∈ H(k) that
ℜ{hPK(k) L(k;αβ) u, PK(k) ui} = ℜ{hPK(k) L(k;αβ) (PK(k) + PH(k) ⊖K(k) ) u, PK(k) ui}
1
= − λk + |α|2 + |β|2 − 2ℜ{α∗ β} kPK(k) uk2
2 nD
Eo
√
+ℜ
λβPK(k) a∗ PH(k) ⊖K(k) u, PK(k) u
= −g(k, α, β) kPK(k) uk2 + h(k, α, β, u).
17
Notice that |α|2 + |β|2 − 2ℜ{α∗ β} = |α − β|2. Also, note that
ℜ
nD√
λβPK(k) a∗ PH(k) ⊖K(k) u, PK(k) u
√
≤ |β| λ kPK(k) a∗ PH(k) ⊖K(k) uk kPK(k) uk
√
≤ |β| λkkuk kPK(k) uk .
Eo
(αβ)
Therefore, we have that Assumption 2(c) holds for the defined K(k) and the defined γk
√
(k;αβ)
with qa
= |β| λk.
Assumption 2(d): For any u ∈ H0 , HPM(k) u = (∆(k + 1) + χk(k + 1)) PM(k) u. This
(αβ)
(αβ)
implies that ℜ{hTt (ıH)PM(k) u, Tt PM(k) ui} = 0. Also, L∗ LPM(k) u = λ(k + 1)PM(k) u
for any u ∈ H0 . Therefore, we have that
(αβ)
(αβ)
ℜ{hTt L(αβ) PM(k) u, Tt PM(k) ui}
1
(αβ)
2
2
∗
= − λ(k + 1) + |α| + |β| − 2ℜ{α β} Tt PM(k) u
2
Eo
nD
√
(αβ)
(αβ)
λ (βa∗ − α∗ a) PM(k) u, Tt PM(k) u
+ ℜ Tt
(αβ)
= −ĝ(k, α, β) Tt
PM(k) u
2
2
+ ĥ(t, k, α, β, u).
(αβ)
Similarly to the previous derivation, using that Tt
is a contraction, we see that
p Assump(αβ)
(k;αβ)
(k)
λ(k + 1) +
tion
2(d)
holds
for
the
defined
K
and
the
defined
γ
with
q
=
|α|
e
k
p
|β| λ(k + 2).
(αβ)
(k;αβ)
(k;αβ)
(k;αβ)
Assumption 3: From the defined γk , qL
, qa
, qe
, we see that this assumption holds for any r, s ∈ Z+ such that r + s ≥ 3.
Finally, because Assumptions 1-3 hold, Lemma 4, Corollary 1, and Theorem 1 can be
applied to obtain error bounds on the finite-dimensional approximations.
Numerical example of the Kerr-nonlinear optical cavity: Consider λ = 25, ∆ =
50, and χ = −∆/60 (these parameters are used in [12]). We also consider an input field
with a constant amplitude of α = 0.1 for
t ∈ [0, T] with T = 5. Let ψ = |0i ⊗ |α1[0,t] i. We
(k)
∗
Ut − Ut
ψ for different values of k. From (18)
will now compute an error bound on
(established in Theorem 1) and the fact that α1[0,t] ∈ S′ is a simple function, we have that
(k)
Ut − Ut
∗
2
ψ
(k) ∗
≤ 4 Ut
ψ − ψt′
′
+2
Lt
ℓ
X
X
j=1 i=1
′
k
′
zr,s
(ti+1 − ti ), f ′ 1[ti ,ti+1 ) , gj,t
1[ti ,ti+1 ) kψj,t
k
18
Table 1: Numerical computation of error bounds on
nonlinear optical cavity
k Error Bound
19
0.2366
29
0.2115
39
0.1970
49
0.1872
59
0.1799
69
0.1742
79
0.1696
89
0.1658
99
0.1625
where f ′ = α1[0,t] , ψt′ =
we have
(k) ∗
Ut
ψ − ψt′
2
PL′t
′
j=1 ψj,t ,
∗
(k)
Ut − Ut
ψ
for the Kerr-
′
′
′
and ψj,t
= u′j,t ⊗ e(gj,t
) with gj,t
∈ S′. Now, using (22)
= kψk2 + kψt′ k2
′
−2
Lt
X
j=1
′
ke(gj,t
)kℜ
nD
0
(k;α,β ′ (0)) (k;α,β ′ (1))
Tt1 −t0 j Tt2 −t1 j
(α,β ′ (ℓ))
· · · Tt−tℓ j u′j,t
Eo
(24)
′
where βj′ (i) = gj,t
1[ti ,ti+1 ) (s) for any s ∈ [ti , ti+1 ). To find an appropriate ψt′ , we set up the
cost function
!
Lt
nD
Eo 1/2
X
′ (0))
′ (1))
′ (ℓ))
(k;α,β
(k;α,β
(k;α,β
′
ke(gj,t
)kℜ 0 Tt1 −t0 j Tt2 −t1 j · · · Tt−tℓ j u′j,t
Jk (ψt′ ) = 1 + kψt′ k2 − 2
,
j=1
(25)
PL′t ′
′
′
uj,t ⊗ e(gj,t
). We then choose u′j,t and gj,t
for j = 1, 2, . . . , L′t such that
for any ψt′ = j=1
it is a local minimizer of Jk .
For computational simplicity, let us fix Lt = 1 and take ti+1 − ti = 0.5 for all i =
0, 1, 2, . . . , ℓ. With t = tℓ+1 = 5, we then have that ℓ = 9. We take an initialize
′
guess at ψ1,t
= |0i ⊗ e(α1[0,T ]). Using the general purpose unconstrained optimiza′
tion function fminunc in Matlab, a local minimizer ψt′ = u′1,t ⊗ e(g1,t
) was found as
′
′
u1,t = 0.9999 |0i − (0.0024 − 0.0094ı) |1i − 0.0001 |2i and g1,t = (0.0866 + 0.0462ı)1[t0,t1 ) +
(0.0882 + 0.0471ı)1[t1,T ) . The
cost is J(ψt′ ) = 0.0096. Consider r = s = 2.
corresponding
(k)
∗
ψ for various values of k are shown in Table 1.
Using ψt′ , error bounds on
Ut − Ut
Recall that the dimension of the reduced subspace is k + 1.
3.3.2
Atom-cavity model:
Consider a three-level atom coupled to an optical cavity, which itself is coupled to a single
external coherent field (m = 1) [11]. Let H0 = C3 ⊗ ℓ2 . We will use |ei = (1, 0, 0)⊤ ,
19
|+i = (0, 1, 0)⊤ , and |−i = (0, 0, 1)⊤ to denote the canonical basis vectors in Cm . We also
consider |ni, denoting the normalized n-photon Fock state of the system, as the basis vector
of ℓ2 (as in the previous example). Let D0 = C3 ⊗ span{|ni | n ∈ Z+ }. This atom-cavity
system is then described by the following parameters:
√
H = ıχ (σ+ ⊗ a − σ− ⊗ a∗ ) ,
S = I ⊗ I,
L = I ⊗ λa,
where λ, χ > 0, σ+ = |ei h+|, and σ− = |+i he|. From Lemma 12 of [16], we have that
Condition 1(a) and 2(a) holds for this atom-cavity model.
Consider H(k) = C3 ⊗ span {|ni | n = 0, 1, 2, . . . , k} and a system approximation of
the form (23). That is, we are approximating the dynamics of the harmonic oscillator.
Recall that Conditions 1(b) and 2(b) hold immediately because D (k) = H(k) has finite
dimension. We also see that H(k) ⊂ D0 . Hence, Assumption 1 holds. Similar to the
previous example, we note that M(k) = C3 ⊗ |k + 1i. Now consider K(k) = C3 ⊗ |ki and
(αβ)
γk
= 12 (λk + |α − β|2 ). Using similar derivation to the previous example, we will now
show that Assumptions 2 and 3 hold for the atom-cavity model and the approximation.
Assumption 2(a): Note that
√
=
β
λ
+
χσ
a∗ |K(k) .
−
K(k)
√
√
(k;αβ)
Thus, we have that Assumption 2(a) holds with qL
= k + 1 |β| λ + χ .
L(αβ) − L(k;αβ)
Assumption 2(b): This assumption follows for the defined K(k) because
ker L(αβ) − L(k;αβ) H(k) = C3 ⊗ span {|ni | n = 0, 1, 2, . . . , k − 1} for all α, β ∈ C.
∗
Assumption 2(c): Note that L(k) PK(k) = 0, PK(k) L(k) PH(k) = 0,
∗
PK(k) L(k) L(k) PH(k) ⊖K(k) = 0, and PK(k) HPH(k) ⊖K(k) = −ıχPK(k) σ− a∗ PH(k) ⊖K(k) . Also, for any
∗
u ∈ H(k) , PK(k) L(k) L(k) PK(k) u = λkPK(k) u. From these identities and the fact that H (k) is
self-adjoint, we have for any u ∈ H(k) that
ℜ{hPK(k) L(k;αβ) u, PK(k) ui} = ℜ{hPK(k) L(k;αβ) (PK(k) + PH(k) ⊖K(k) ) u, PK(k) ui}
1
= − λk + |α|2 + |β|2 − ℜ{α∗ β} kPK(k) uk2
2 nD
Eo
√
+ ℜ PK(k) β λ + χσ− a∗ PH(k) ⊖K(k) u, PK(k) u
= −g(k, α, β) kPK(k) uk2 + h(k, α, β, u).
Noticing that |α|2 + |β|2 − 2ℜ{α∗ β} = hα, αi + hβ, βi − hα, βi − hα, βi = |α − β|2. Also,
note that
Eo
√
nD
∗
ℜ PK(k) β λ + χσ− a PH(k) ⊖K(k) u, PK(k) u
√
≤ PK(k) β λ + χσ− a∗ PH(k) ⊖K(k) u kPK(k) uk
√
√
≤ k χ + |β| λ kuk kPK(k) uk .
20
(αβ)
Therefore, we have that Assumption
2(c) holds for the defined K(k) and the defined γk
√
√
(k;αβ)
with qa
= k χ + |β| λ .
Assumption 2(d): For any u ∈ H0 , note that L∗ LPM(k) u = λ(k + 1)PM(k) u and
ıHPM(k) u = ı (∆(k + 1) + χk(k + 1)) PM(k) u. Also, Thus, we have that
(αβ)
(αβ)
ℜ{hTt L(αβ) PM(k) u, Tt PM(k) ui}
1
(αβ)
2
2
∗
= − λ(k + 1) + |α| + |β| − 2ℜ{α β} Tt PM(k) u
2
nD
Eo
√
(αβ)
(αβ)
∗
∗
+ ℜ Tt
λ (βa − α a) PM(k) u, Tt PM(k) u
nD
Eo
(αβ)
(αβ)
+ ℜ Tt χ (σ− a∗ − σ+ a) PM(k) u, Tt PM(k) u
(αβ)
= −ĝ(k, α, β) Tt
PM(k) u
2
2
+ ĥ(t, k, α, β, u).
(αβ)
Similar to the previous derivation, using that Tt
is a contraction, we
As see that
√
√
(αβ)
(k;αβ)
(k)
sumption 2(d) holds for the defined K and γk
with qe
= k + 1 χ + |α| λ +
√
√
k + 2 χ + |β| λ .
(αβ)
(k;αβ)
(k;αβ)
(k;αβ)
Assumption 3: From the defined γk , qL
, qa
, qe
, we see that this assumption holds for any r, s ∈ Z+ such that r + s ≥ 3.
Finally, because Assumptions 1-3 hold, Lemma 4, Corollary 1, and Theorem 1 can be
applied to obtain error bounds on the finite-dimensional approximations.
4
Error bounds for adiabatic elimination approximations
When an open quantum system comprises subsystems evolving at two well-separated
timescales, the system dynamics can be approximated by eliminating the fast variables
from the model description. This method is known as adiabatic elimination in the physics
literature and singular perturbation in the applied mathematics literature. In this section,
we will establish error bounds for this type of finite dimensional approximation of open
quantum systems, when the slow subsystem lives on a finite-dimensional subspace.
(k)
Let Ut satisfying (2) describe the time evolution of the original Markov open quantum
system to be approximated. We set H(k) = H and D (k) = D. We also let Ut satisfying
(1) describe the time evolution of the adiabatic elimination approximation defined on a
finite-dimensional subspace H0 ⊂ H. In this setting, D0 = H0 . We note that Conditions
1(a) and 2(a) hold immediately because H0 is finite dimensional. As in [16], we assume
the following.
21
Assumption 4 (Singular scaling). For i, j = 1, 2, . . . , m, there exists operators Y , Y ∗ , A,
A∗ , B, B ∗ , Fj , Fj∗ , Gj , G∗j , Wij , Wij∗ with the common invariant domain D such that
"
ıH
(k)
#
m
1 X (k) ∗ (k)
Li Li
= k 2 Y + kA + B,
−
2 i=1
(k) ∗
Lj
= kFj + Gj ,
(k) ∗
Sji
= Wij .
Assumption 5 (Structural requirements). The subspace H0 ⊂ H is a closed subspace such
that
1. D0 = PH0 D ⊂ D
2. Y PH0 = 0 on D
3. There exists Ỹ , Ỹ ∗ with the common invariant domain D so that Ỹ Y = Y Ỹ = PH⊥0 .
4. Fj∗ PH0 = 0 on D for all j = 1, 2, . . . , m
5. PH0 APH0 = 0 on D.
Assumption 6 (Limit coefficients). The approximating system operators (S, L, H) are
such that
∗
Sji
=
m
X
ℓ=1
∗
PH0 Wiℓ Fℓ Ỹ Fj + δℓj PH0 ,
L∗j = PH0 Gj − AỸ Fj PH0 ,
o
n
H = ℑ PH0 B − AỸ A PH0 .
Let us now re-state an important result.
Lemma 5 ( [16, Lemma 10]). Suppose Assumptions 4, 5, and 6 hold. The linear operators
S, L, H, defined in Assumption 6, have the common invariant domain D0 . The operator S
is unitary and H is self-adjoint.
For any α, β ∈ Cm and any v ∈ D, let us define
A(αβ) v :=
A+
m
X
j=1
B (αβ) v :=
Fj βj −
m
X
αi∗ Wij Fj∗
i,j=1
!
v,
!
m
m
X
X
|α|2 + |β|2
−
+B+
Gj βj +
αi∗ Wij βj − G∗j
v.
2
j=1
i,j=1
We now introduce an additional assumption required in obtaining our error bound results.
22
Assumption 7 (Boundedness of operators). For any k ∈ Z+ and any α, β ∈ Cm , we have
that
1 (αβ)
(k;α,β)
(αβ)
(αβ)
(αβ)
B
− A Ỹ A
,
−
M1
:= Ỹ PH⊥0 A
k
H0
1 (αβ)
(k;α,β)
(αβ)
(αβ)
(αβ)
−
M2
:= Ỹ PH⊥0 A
B
− A Ỹ A
L(αβ)
k
1
(αβ)
(αβ)
(αβ)
(αβ)
− A Ỹ A
Ỹ PH⊥0 B
+ B (αβ) Ỹ A(αβ) + A(αβ) − B
k
H0
(k;αβ)
are finite (i.e., 0 ≤ M1
(k;αβ)
, M2
< ∞).
Lemma 6. Suppose Assumptions 4, 5, and 6 hold. Then for any k ∈ Z+ , any α, β ∈ Cm ,
any u ∈ H0 , and any t ≥ 0, it holds that
1
(k;αβ)
(αβ)
(k;α,β)
(k;α,β)
u ≤
Tt
− Tt
kuk.
(26)
2M1
+ tM2
k
(αβ)
(k;αβ)
(αβ)
Moreover, if Tt
and Tt
are also norm continuous for each α, β, with k(I −Tt )uk ≤
(αβ)
(k;αβ)
(k;αβ)
N1 (t)kuk and k(I − Tt
)uk ≤ N2
(t)kuk for some continuous nonnegative func(αβ)
(k;αβ)
tions N1
and N2
, then
1 (k;α,β) (αβ)
(k;αβ)
(k;α,β)
(k;αβ)
(αβ)
M1
(N1 (t) + N2
(t)) + tM2
kuk.
(27)
u ≤
Tt
− Tt
k
Proof. First note, from the definition of a strongly continuous semigroup, that [18]
(αβ)
1. T0
(k;αβ)
= T0
2.
d (αβ)
T
u
dt t
3.
d (k;αβ)
T
u
dt t
= I for all k ∈ Z+ ,
= L(αβ) u for all u ∈ H0 (since H0 is finite-dimensional),
= L(k;αβ) u for all u ∈ Dom(L(k;αβ) ).
From the above properties and Assumption 5, we can write for all u ∈ H0 and all t ≥ 0
that
d (k;αβ)
(k;αβ)
(αβ)
(αβ)
u
u = L(k;αβ) Tt
− L(αβ) Tt
Tt
− Tt
dt
(αβ)
(k;αβ)
(αβ)
u + L(k;αβ) − L(αβ) H0 Tt u (28)
− Tt
= L(k;αβ) Tt
(αβ)
(k;αβ)
u = 0. Since L(k;αβ) is a generator of a semigroup on a Hilbert space,
with T0 − T0
(k;αβ)
(αβ)
(αβ)
T0
− T0
u ∈ Dom(L(k;αβ) ) (due to Assumption 5), and L(k;αβ) − L(αβ) H0 Tt u ∈
C 1 ([0, t]; H) (the class of continuously differentiable functions from [0, t] to H), a unique
solution of (28) exists and is given by [18, Thm 3.1.3]
Z t
(k;αβ)
(k;αβ)
(αβ)
(29)
L(k;αβ) − L(αβ) Tτ(αβ) udτ
u=
Tt−τ
Tt
− Tt
0
23
for all t ≥ 0 and all u ∈ H0 .
From Assumption 4, we now note that
L(k;αβ) u = k 2 Y + kA(αβ) + kB (αβ) u
for any u ∈ D and any α, β ∈ Cm . Using Assumptions 4 and 6, it has been shown
that [16, p. 3146]
L(αβ) u = PH0 B (αβ) − A(αβ) Ỹ A(αβ) u
for any u ∈ D0 and any α, β ∈ Cm .
From the above identities and Assumption 4, for any v ∈ H0 , we have that [16]
L(k;αβ) − L(αβ) v
1
1
= L(k;αβ) − L(αβ) − L(k;αβ) Ỹ A(αβ) + L(k;αβ) Ỹ A(αβ)
k
k
1
− 2 L(k;αβ) Ỹ PH⊥0 B (αβ) − A(αβ) Ỹ A(αβ)
k
1 (k;αβ)
(αβ)
(αβ)
(αβ)
v
− A Ỹ A
Ỹ PH⊥0 B
+ 2L
k
1 (k;αβ)
1 (αβ)
=
B
Ỹ A(αβ) + A(αβ) Ỹ PH⊥0 B (αβ) − A(αβ) Ỹ A(αβ)
L
Ỹ A(αβ) −
k
k
1
+ 2 L(k;αβ) Ỹ PH⊥0 B (αβ) − A(αβ) Ỹ A(αβ)
k
1 (αβ)
(αβ)
(αβ)
(αβ)
− 2B
v.
− A Ỹ A
Ỹ PH⊥0 B
k
We also note, using integration by parts (in a similar manner to [19, p. 898] and [20, Eq.
(2.2)]), that
Z t
(k;αβ)
(k;αβ)
(αβ)
u
Tt−τ L(k;αβ) Ỹ A(αβ) Tτ(αβ) udτ = Tt
Ỹ A(αβ) − Ỹ A(αβ) Tt
0
Z t
(k;αβ)
+
Tt−τ Ỹ A(αβ) L(αβ) Tτ(αβ) udτ
0
(k;αβ)
(k;αβ)
(αβ)
(αβ)
where we have used that − dτd Tt−τ u = Tt−τ L(k;αβ) u and dτd Ỹ A(αβ) Tτ u = Ỹ A(αβ) L(αβ) Tτ
[18]. Similarly, we have that
Z t
(k;αβ)
Tt−τ L(k;αβ) Ỹ PH⊥0 B (αβ) − A(αβ) Ỹ A(αβ) Tτ(αβ) udτ
0
(k;αβ)
(αβ)
u
= Tt
Ỹ PH⊥0 B (αβ) − A(αβ) Ỹ A(αβ) − Ỹ PH⊥0 B (αβ) − A(αβ) Ỹ A(αβ) Tt
Z t
(k;αβ)
(αβ)
(αβ)
(αβ)
+
Tt−τ Ỹ PH⊥0 B
L(αβ) Tτ(αβ) udτ.
− A Ỹ A
0
24
u
(αβ)
Now, because Tt u ∈ H0 for all t ≥ 0, by substituting the above three identities into
(29), we have that
(k;αβ)
(αβ)
u
Tt
− Tt
1
1 (αβ)
(k;αβ)
(αβ)
(αβ)
(αβ)
=
u
−
T
B
− A Ỹ A
Ỹ PH⊥0 A
k t
k
1 (αβ)
(αβ)
(αβ)
(αβ)
(αβ)
B
− A Ỹ A
Tt u
−
− Ỹ PH⊥0 A
k
Z t
1 αβ
(k;αβ)
(αβ)
(αβ)
(αβ)
+
Tt−τ
−
Ỹ PH⊥0 A
B − A Ỹ A
L(αβ) Tτ(αβ) udτ
k
0
Z t
1 (αβ)
(k;αβ)
(αβ)
(αβ)
(αβ)
(αβ)
(αβ)
(αβ)
− A Ỹ A
Ỹ PH⊥0 B
+
B
Ỹ A
+ A
− B
Tt−τ
k
0
×Tτ(αβ) udτ .
Here, we have used Assumption 5 that PH0 APH0 = 0. We then have that
1 h (k;αβ) (k;αβ)
(αβ)
(k;αβ)
(αβ)
M1
Tt
+ Tt
Tt
− Tt
≤
k
Z t
(k;αβ)
(k;αβ)
(αβ)
+M2
Tt
Tt
dτ kuk.
0
(k;αβ)
(k;αβ)
The result (26) then follows from the fact that Tt
and Tt
are contraction semi(αβ)
(k;αβ)
groups. Moreover, when Tt
and Tt
are also norm continuous and satisfy k(I −
(αβ)
(αβ)
(k;αβ)
(k;αβ)
Tt )uk ≤ N1 (t)kuk and k(I − Tt
)uk ≤ N2
(t)kuk as stipulated in the lemma,
we have
(k;αβ)
(αβ)
u
Tt
− Tt
1
1 (αβ)
(k;αβ)
(αβ)
(αβ)
(αβ)
(αβ)
=
T
Ỹ PH⊥0 A
−
B
− A Ỹ A
(I − Tt )u
k t
k
1 (αβ)
(k;αβ)
(αβ)
(αβ)
(αβ)
(αβ)
−
− (I − Tt
)Ỹ PH⊥0 A
Tt u
B
− A Ỹ A
k
Z t
1 αβ
(k;αβ)
(αβ)
(αβ)
(αβ)
L(αβ) Tτ(αβ) udτ
B − A Ỹ A
−
Ỹ PH⊥0 A
+
Tt−τ
k
0
Z t
1 (αβ)
(k;αβ)
(αβ)
(αβ)
(αβ)
(αβ)
(αβ)
(αβ)
− A Ỹ A
Ỹ PH⊥0 B
B
Ỹ A
+ A
− B
+
Tt−τ
k
0
×Tτ(αβ) udτ .
(αβ)
(k;αβ)
From this and the contractivity of Tt
and Tt
, it follows that
i
1 h (k;αβ) (αβ)
(k;αβ)
(k;αβ)
(k;αβ)
(αβ)
N1 (t) + N2
(t) + M2
t kuk.
Tt
M1
− Tt
≤
k
This establishes the lemma statement.
25
Recall that S′ ⊂ L2 ([0, T ]; Cm) is the set of all simple functions in L2 ([0, T ]; Cm), which
is dense in L2 ([0, T ]; Cm ). Similar to the previous section, let U0 = {u ⊗ e(f ) | u ∈ H0 , f ∈
S′ } and U (k) = {u ⊗ e(f ) | u ∈ H(k) , f ∈ S′ } for k > 0.
Lemma 7. Suppose Assumptions 4, 5, 6, and 7 hold. Then for any k ∈ Z+ , any ψ1 , ψ2 ∈
U0 , and any t ∈ [0, T ] with 0 ≤ T < ∞, we have that
ℓ
D
∗
E
1 X
(k;α1 (i)α2 (i))
(k;α1 (i)α2 (i))
(k)
kψ1 kkψ2 k
2M1
+ (ti+1 − ti )M2
Ut − Ut ψ1 , ψ2 ≤
k i=0
(30)
P
(αβ)
and
where t0 = 0, tℓ+1 = t, and fj = ℓi=0 αj (i)1[ti ,ti+1 ) for j = 1, 2. Moreover, if Tt
(k;αβ)
(αβ)
(αβ)
Tt
are also norm continuous for each α, β, with k(I − Tt )uk ≤ N1 (t)kuk and
(k;αβ)
(k;αβ)
(αβ)
k(I − Tt
)uk ≤ N2
(t)kuk for some continuous nonnegative functions N1
and
(k;αβ)
N2
, then
D
(k)
Ut
− Ut
∗
ψ1 , ψ2
E
ℓ
1 X (k;α1 (i)α2 (i)) (αβ)
(k;αβ)
≤
M1
N1 (ti+1 − ti ) + N2
(ti+1 − ti )
k i=0
(k;α1 (i)α2 (i))
+(ti+1 − ti )M2
kψ1 kkψ2 k
(31)
Proof. This proof follows similar arguments to the proof of Lemma 4 using the result (26)
established in Lemma 6.
Corollary 2. Suppose Assumptions 4, 5, 6, and 7 hold. For any t ∈ [0, T ] with 0 < T < ∞,
any ψ1 = u1 ⊗ e(f1 ), ψ2 = u2 ⊗ e(f2 ) ∈ H0 ⊗ F , we have that
D
∗
E
(k)
′
′
Ut − Ut ψ1 , ψ2 ≤ 2 ku1 kke(f1 ) − e(f1 )kkψ2 k + ku2 kke(f2 ) − e(f2 )kkψ1 k
ℓ
1 X
(k;α (i)α (i))
(k;α (i)α (i))
kψ1′ kkψ2′ k.
2M1 1 2 + (ti+1 − ti )M2 1 2
+
k i=0
(32)
for any ψj′ = uj ⊗ e(fj′ ) ∈ U (k) with for some ℓ ∈ Z+ and a sequence t0 = 0 < t1 < . . . <
P
P
tℓ < tℓ+1 = t such that f1′ = ℓi=0 α1 (i)1[ti ,ti+1 ) and f2′ = ℓi=0 α2 (i)1[ti ,ti+1 ) . If in addition,
(αβ)
(k;αβ)
(αβ)
(αβ)
Tt
and Tt
are also norm continuous for each α, β, with k(I −Tt )uk ≤ N1 (t)kuk
(k;αβ)
(k;αβ)
(αβ)
and k(I − Tt
)uk ≤ N2
(t)kuk for some continuous nonnegative functions N1
and
(k;αβ)
N2
, then
D
∗
E
(k)
Ut − Ut ψ1 , ψ2 ≤ 2 ku1kke(f1 ) − e(f1′ )kkψ2 k + ku2 kke(f2 ) − e(f2′ )kkψ1 k
ℓ
1 X (k;α1 (i)α2 (i)) (α(i)β(i))
M1
N1
(ti+1 − ti )
k i=0
(k;α(i)β(i))
(k;α (i)α (i))
+N2
(ti+1 − ti ) +(ti+1 − ti )M2 1 2
kψ1′ kkψ2′ k.
+
(33)
26
Moreover, it holds that
D
∗
E
(k)
Ut − Ut ψ1 , ψ2
lim
k→∞
= 0.
(34)
Proof. This proof follows similar arguments to the proof of Corollary 1 using (30) and (31)
established in Lemma 7.
Theorem 2. Suppose Assumptions 4, 5, 6, and 7 hold. Let 0 < T < ∞. For any t ∈ [0, T ],
PL′t ′
′
′
consider any L′t ∈ Z+ , any ψt′ = j=1
ψj,t , with ψj,t
= u′j,t ⊗ e(gj,t
) ∈ U (k) and u′j,t 6= 0.
Also, consider any f ′ ∈ S′ . P
Let ℓ be a positive integer and
Pℓ t0 < t1 < . . . < tℓ < tℓ+1 =(k)t
ℓ
′
′
be a sequence such that f = i=0 α(i)1[ti ,ti+1 ) and gj,t = i=0 βj,t (i)1[ti ,ti+1 ) . Let u ∈ H
with kuk = 1, and |f i = e(f )/ke(f )k ∈ F (i.e., |f i is a coherent state with amplitude f ),
and ψ = u ⊗ |f i. Then,
(k)
Ut
− Ut
∗
2
ψ
≤ 4 k|f i − |f ′ik + kUt ∗ ψ − ψt′ k
L′
ℓ
t X
2X
(k;α(i)βj,t (i))
(k;α(i)βj,t (i))
′
2M1
+ (ti+1 − ti )M2
kψj,t
k, (35)
+
k j=1 i=1
(αβ)
(k;αβ)
If in addition, Tt
and Tt
are also norm continuous for each α, β, with k(I −
(αβ)
(αβ)
(k;αβ)
(k;αβ)
Tt )uk ≤ N1 (t)kuk and k(I − Tt
)uk ≤ N2
(t)kuk for some continuous nonneg(k;αβ)
(αβ)
ative functions N1
and N2
, then
(k)
Ut
− Ut
∗
2
ψ
Moreover, it holds that
≤ 4 k|f i − |f ′ik + kUt ∗ ψ − ψt′ k
L′
ℓ
t X
2X
(k;α(i)βj,t (i))
(α(i)β(i))
M1
N1
(ti+1 − ti )
+
k j=1 i=1
(k;α(i)βj,t (i))
(k;α(i)β(i))
′
kψj,t
k.
+N2
(ti+1 − ti ) + (ti+1 − ti )M2
lim
k→∞
for any t ∈ [0, T ] with 0 < T < ∞.
(k)
Ut
− Ut
∗
ψ = 0.
(36)
(37)
Remark 2. As with Theorem 1, a stronger
of strong convergence uniformly over
result
∗
(k)
compact time intervals limk→∞ sup0≤t≤T Ut − Ut ψ = 0 has been established in [16,
Theorem 11] for adiabatic elimination based on a Trotter-Kato theorem, but without error
bounds for finite values of k.
Proof. This proof follows similar arguments to the proof of Theorem 1 using (32) and (33)
established in Corollary 2.
27
4.1
Adiabatic elimination examples
4.1.1
Elimination of a harmonic oscillator:
Consider a class of open quantum systems that comprises a finite-dimensional atomic
system coupled to a harmonic oscillator which is driven by m external coherent fields
(originally presented in [16]). Let H = H′ ⊗ ℓ2 , where H′ is a finite-dimensional
Hilbert
P∞
2
2
space and ℓ is the space of infinite complex-valued sequences with n=1 |xn | < ∞. Similar
to Example 3.3.1, let {|ni}n≥0 be an orthonormal Fock state basis of ℓ2 . On this basis, the
annihilation, creation, and number operators can be defined (see, e.g., [16]) satisfying
√
√
a∗ |ni = n + 1 |n + 1i ,
a∗ a |ni = n |ni ,
a |ni = n |n − 1i ,
respectively. Following [16], we choose the dense domain D = H′ ⊗span{|ni | n ∈ Z+ }. Let
P
(k) ∗ (k)
us define K (k) = ıH (k) − 12 m
Li ). Consider the system operators (S (k) , L(k) , H (k) )
i=1 (Li
defined such that
K (k) = k 2 E11 ⊗ a∗ a + k(E10 ⊗ a∗ + E01 ⊗ a) + E00 ⊗ I,
(k) ∗
Lj
(k) ∗
Sji
= kFj ⊗ a∗ + Gj ⊗ I,
= Wij ⊗ I
where E11 , E10 , E01 , E00 , Fj , Gj , Wij are bounded operators on the finite-dimensional space
H′ .
Now consider H0 = D0 = H′ ⊗ C |0i. That is, the harmonic oscillator is eliminated
from the model as it is forced into its ground state (i.e., |0i) in the limit as k → ∞. In
quantum optics, this process is the adiabatic elimination of an optical cavity in the strong
damping limit. Now consider an approximation system with the operators (S, L, H) which
are defined such that
∗
Sji
=
m
X
ℓ=1
L∗j
Wiℓ Fℓ∗ (E11 )−1 Fj + δℓj ⊗ I.
= Gj − E01 (E11 )−1 Fj ⊗ I,
H = ℑ E00 − E01 (E11 )−1 E10 ⊗ I.
Here, we stress that S is unitary and H is self-adjoint [16, Proposition 14].
It has been shown in [16] that Conditions 1 and 2 hold for the above systems. The
original system satisfies Assumption 4 with Y = E11 ⊗ a∗ a, A = E10 ⊗ a∗ + E01 ⊗ a and
B = E00 ⊗ I. Suppose E11 has a bounded inverse, then Assumption 5 is satisfied with
Ỹ which is defined such that Ỹ ψ ⊗ |ni = n1 (E11 )−1 ψ ⊗ |ni for n ≥ 1 and ψ ∈ H′ . The
operators (S, L, H) also satisfy Assumption 6. It now remains to show that Assumption 7
holds.
P
(αβ)
Note that PH⊥0 B (αβ) PH0 = 0. Now let Q(β) = E10 + m
=
j=1 Fj βj and let P
P
P
2
2
m
m
|α| +|β|
∗
(β)
(αβ)
∗
+ E00 + j=1 Gj βj + i,j=1 αi Wij βj − Gj . Note that Q
and P
are
− 2
28
bounded operators on the finite-dimensional Hilbert space H′ for any α, β ∈ Cm since E10 ,
E00 , Fj , Gj and Wij are bounded operator on H′ . For any ψ ∈ H′ , we have that
(Ỹ A(αβ) )ψ ⊗ |0i = (E11 )−1 Q(β) ψ ⊗ |1i ,
1
(Ỹ PH⊥0 A(αβ) Ỹ A(αβ) )ψ ⊗ |0i = √ (E11 )−1 Q(β) ψ ⊗ |2i ,
2
(αβ)
(αβ)
(αβ)
(B
Ỹ A )ψ ⊗ |0i = P
(E11 )−1 Q(β) ψ ⊗ |1i ,
r
3 (β)
(A(αβ) Ỹ PH⊥0 A(αβ) Ỹ A(αβ) )ψ ⊗ |0i =
Q (E11 )−1 Q(β) ψ ⊗ |3i
2
!
m
X
αi∗ Wij Fj∗ (E11 )−1 Q(β) ψ ⊗ |1i ,
+ E01 −
i,j=1
1
(B (αβ) Ỹ PH⊥0 A(αβ) Ỹ A(αβ) )ψ ⊗ |0i = √ P (αβ) (E11 )−1 Q(β) ψ ⊗ |2i .
2
From these identities, we see that Assumption 7 holds because E11 has a bounded inverse, E01 , Fj , Wij Q(β) , P (αβ) are bounded operators, and L(αβ) is defined on the finitedimensional subspace H0 (i.e., it is also a bounded operator). Thus, the conditions of
Lemma 6, Lemma 7, Corollary 2, and Theorem 2 have been verified.
4.1.2
Atom-cavity model [16, Example 15]:
Consider a system consisting of a three-level atom coupled to an optical cavity. The
cavity and the uncoupled leg of the atom is driven by an external coherent field (m = 1).
Let H = C3 ⊗ ℓ2 . As in the previous example, we consider the orthonormal Fock state
basis {|ni}n≥0 of ℓ2 . We will use |ei = (1, 0, 0)⊤, |+i = (0, 1, 0)⊤ , and |−i = (0, 0, 1)⊤
to denote the canonical basis vectors in C3 . In the basis {|ei , |+i , |−i}, let us define
(+)
(−)
(±)
(±) ∗
σ+ = |ei h+| and σ+ = |ei h−|. We also define σ− = σ+ and P− = |−i h−|. Here,
D = C3 ⊗ span{|ni | n ∈ Z+ }. Under the rotating wave approximation and in the rotating
frame of reference, the system is described by the following operators: [16]
S (k) = I,
√
L(k) = I ⊗ k γa,
(+)
(−)
(+)
(−) ∗
(k)
2
∗
H = ıgk σ+ ⊗ a − σ− ⊗ a + ık σ+ α − σ− α ⊗ I
where γ, g > 0. Here, α ∈ C is the amplitude of the external coherent field driving the
cavity and the uncoupled leg of the atom.
Now consider H0 = D0 = span{|+i ⊗ |0i , |−i ⊗ |0i}. That is, the cavity oscillator and
the excited state of the atom (i.e., |ei) is eliminated from the model in the limit as k → ∞.
Consider an approximating system described the operators (S, L, H) which are defined as
√
α γ (+) (−)
σ σ ⊗ I,
H = 0.
S = (I − 2P− ) ⊗ I,
L=−
g − +
29
It can be easily verified that S is unitary and H is self-adjoint.
Again, it has been shown in [16] the above
systems satisfy Conditions
1 and 2. We then
(+)
(−)
(−)
γ
+
∗
∗
see that Assumption 4 with Y = − 2 ⊗a a+g σ− ⊗ a − σ+ ⊗ a , A = σ− α∗ − σ+ α ⊗
√
I, B = 0, F = γ ⊗ a∗ , G = 0, and W = I. Let us define
Hj = span{|+i ⊗ |ji , |−i ⊗ |ji , |ei ⊗ |j − 1i},
for j ∈ Z+ .
Assumption 5 holds with Ỹ which is defined, with respect to the basis {|+i ⊗ |ji , |−i ⊗
|ji , |ei ⊗ |j − 1i}, as [16]
√
γ
(j − 1) 0 g j
2
1
j(j − 1)γ 2
2dj
,
0
0
Ỹ |Hj = −
d
=
+ jg 2 .
j
jγ
√
dj
4
jγ
−g j
0
2
It can also be seen that Assumption 6 holds for the defined (S, L, H). Thus, it remains to
show that Assumption 7 holds. Note that B (αβ) = − 12 |α − β|2 and thus, PH⊥0 B (αβ) PH0 = 0.
Then note that
Ỹ A(αβ) PH0 ⊂ H1 ,
Ỹ PH⊥0 A(αβ) Ỹ A(αβ) PH0 ⊂ H2 ,
B (αβ) Ỹ A(αβ) PH0 ⊂ H1 ,
A(αβ) Ỹ PH⊥0 A(αβ) Ỹ A(αβ) PH0 ⊂ H3 ⊕ H1 ,
B (αβ) Ỹ PH⊥0 A(αβ) Ỹ A(αβ) PH0 ⊂ H2 .
From the above relations and the fact L(αβ) is defined on the finite-dimensional subspace
H0 (i.e., it is a bounded operator), we have that Assumption 7 holds.
Numerical example of the atom-cavity model: Consider γ = 25, g = 5, and t ∈
[0, T ] with T = 1. Let
∗⊗ |0i) ⊗ |α1[0,T ]i with α = 0.1. We will now compute
ψ = (|−i
(k)
the error bound on
Ut − Ut
ψ for different values of k. From (35) (established in
Theorem 2) and the fact that α1[0,T ] ∈ S′ is a simple function, we have that
∗
(k)
Ut − Ut
ψ
2
≤ 4 (kUt ∗ ψ − ψt′ k)
L′
ℓ
t X
2X
(k;α(i)βj,t (i))
(k;α(i)βj,t (i))
′
2M1
+ (ti+1 − ti )M2
kψj,t
k.
+
k j=1 i=1
PL′t ′
′
′
′
where ψt′ = j=1
ψj,t , and ψj,t
= u′j,t ⊗ e(gj,t
) with gj,t
∈ S′ . Similar to Example 3.3.1,
kUt ∗ ψ − ψt′ k is bounded by (24). Again,
find an appropriate ψt′ , let us define the cost
PLto
t
′
′
′
) ∈ U (k) . We then find ψt′ that is a
function J(ψt ) as in (25) for any ψt = j=1 u′j,t ⊗ e(gj,t
local minimizer of J by numerical optimization.
30
Table 2: Numerical computation of error bounds on
elimination approximation in the atom-cavity example
k
Error bound
4
10
0.9347
5
10
0.2957
6
10
0.0309
107
0.0131
8
10
0.0096
Ut −
(k)
Ut
∗
ψ
for the adiabatic
For computational simplicity, we fix Lt = 5 and set ti+1 − ti = 10−3 for all i =
0, 1, 2, . . . , ℓ. With t = T , we then have that ℓ = 999. Note that simultaneously optimizing over 1000 time intervals is computationally intensive. Thus, we simplify the
computation further by optimizing sequentially over blocks of 10 time intervals at a time.
Thus optimization is done over 100 blocks. Optimization of the first block is initialized
′
with ψj,t
= (|−i ⊗ |0i) ⊗ e(α1[0,t10 ] ) for all j = 1, 2, . . . , Lt . The optimization result of
each block is then used to initialize the optimization of the next block in the sequence.
′
′
A local minimizer ψj,t
= u′j,t ⊗ e(gj,t
), for j = 1, 2, . . . , Lt , was found using Matlab as
′
before, given by u1,t = (0.1008 + 0.1549ı)(|+i ⊗ |0i) + (0.2311 + 0.1012ı)(|−i ⊗ |0i),
u′2,t = (0.0949 − 0.0031ı)(|+i ⊗ |0i) + (0.1500 + 0.0270ı)(|−i ⊗ |0i), u′3,t = (−0.0245 +
0020ı)(|+i⊗|0i)+(0.2012+0.0311ı)(|−i⊗|0i), u′4,t = (0.3266−0.1431ı)(|+i⊗|0i)+(0.2928−
0.0995ı)(|−i ⊗ |0i), u′5,t = −(0.4956 + 0.0101ı)(|+i ⊗ |0i) + (0.1232 − 0.0591ı)(|−i ⊗ |0i).
′
′
The
overall resulting optimized cost is J(ψt ) = 0.0046. Using ψt , the error bounds on
(k)
Ut − Ut
5
∗
ψ
using (32) for various values of k are shown in Table 2.
Conclusion
This work has developed a framework for developing error bounds for finite dimensional approximations of input-output quantum stochastic models defined on infinite-dimensional
underlying Hilbert spaces, with possibly unbounded coefficients in their QSDEs. The
framework exploits a contractive semigroup that can be associated with the QDESs. This
gives for the first time error bound expressions for two types of approximations that are often employed in the literature, subspace truncation and adiabatic elimination. The bounds
are in principle computable and vanish for each t in the limit as the parameter k, representing the dimension of the approximating subspace in the case of subspace truncation
approximation or a large scaling parameter in the case of adiabatic elimination, goes to ∞.
The theory developed was applied to some physical examples taken from the literature.
There are several directions for further investigation along the theme initiated in this
(k) ∗
paper.
Devising
a
more
efficient
method
for
computing
bounds
for
the
term
kU
ψ−
t
P ′
P ′
∗
j ψj,t k for subspace truncation and kUt ψ −
j ψj,t k for adiabatic elimination, beyond
the computationally intensive optimization based approach that was considered herein, will
be important. Tensor network methods that have recently met a lot of success for efficient
31
simulation of one dimensional many-body systems could potentially be important for this
purpose. There also remains the question of the conservatism in the error bounds and if
there could be tighter bounds that can be achieved by using a different set of assumptions.
In the numerical example of adiabatic elimination, the bound (35) was employed rather
than the potentially less conservative (36). This is because the latter requires determining
(k;αβ)
(k;αβ)
whether Tt
is a norm continuous semigroup and finding the bounding function N2
,
a non-trivial task in general that deserves further investigation. Moreover, it would be
interesting to see if there are exactly solvable QSDE models of a physical system with an
infinite-dimensional system Hilbert space for initial states that lie in a finite-dimensional
subspace of the original, against which the conservatism of error bounds can be assessed.
The authors are currently unaware of any such exactly solvable models.
Acknowledgements
The authors are grateful for the support of the Australian Research Council under Discovery Project DP130104191.
References
References
[1] R. L. Hudson and K. R. Parthasarathy, “Quantum Ito’s formula and stochastic evolution,”
Commun. Math. Phys., vol. 93, pp. 301–323, 1984.
[2] C. Gardiner and M. Collett, “Input and output in damped quantum systems: Quantum
stochastic differential equations and the master equation,” Phys. Rev. A, vol. 31, pp. 3761–
3774, 1985.
[3] H. M. Wiseman and G. J. Milburn, Quantum Measurement and Control.
versity Press, 2010.
Cambridge Uni-
[4] V. P. Belavkin and S. C. Edwards, “Quantum filtering and optimal control,” in Quantum
Stochastics and Information: Statistics, Filtering and Control (University of Nottingham,
UK, 15 - 22 July 2006), V. P. Belavkin and M. Guta, Eds. Singapore: World Scientific,
2008, pp. 143–205.
[5] H. I. Nurdin, M. R. James, and A. C. Doherty, “Network synthesis of linear dynamical
quantum stochastic systems,” SIAM J. Control Optim., vol. 48, no. 4, pp. 2686–2718, 2009.
[6] L. Bouten, R. van Handel, and M. R. James, “An introduction to quantum filtering,” SIAM
J. Control Optim., vol. 46, pp. 2199–2241, 2007.
[7] L. Bouten and R. van Handel, “On the separation principle of quantum control,” in Quantum
Stochastics and Information: Statistics, Filtering and Control (University of Nottingham,
32
UK, 15 - 22 July 2006), V. P. Belavkin and M. Guta, Eds.
2008, pp. 206–238.
Singapore: World Scientific,
[8] M. R. James, H. I. Nurdin, and I. R. Petersen, “H ∞ control of linear quantum stochastic
systems,” IEEE Trans. Autom. Control, vol. 53, no. 8, pp. 1787–1803, 2008.
[9] H. I. Nurdin, M. R. James, and I. R. Petersen, “Coherent quantum LQG control,” Automatica, vol. 45, pp. 1837–1846, 2009.
[10] J. Kerckhoff, H. I. Nurdin, D. Pavlichin, and H. Mabuchi, “Designing quantum memories
with embedded control: photonic circuits for autonomous quantum error correction,” Phys.
Rev. Lett., vol. 105, pp. 040 502–1–040 502–4, 2010.
[11] L. Duan and H. J. Kimble, “Scalable photonic quantum computation through cavity-assisted
interaction,” Phys. Rev. Lett., vol. 92, pp. 127 902–1–127 902–4, 2004.
[12] H. Mabuchi, “Nonlinear interferometry approach to photonic sequential logic,” Appl. Phys.
Lett., vol. 99, pp. 153 103–1–153 103–3, 2011.
[13] C. W. Gardiner and P. Zoller, Quantum Noise: A Handbook of Markovian and NonMarkovian Quantum Stochastic Methods with Applications to Quantum Optics, 3rd ed.
Berlin and New York: Springer-Verlag, 2004.
[14] O. Techakesari and H. I. Nurdin, “Error bounds on finite-dimensional approximations of
input-output open quantum systems,” in Proceedings of the 2015 IEEE Conference on Decision and Control (Osaka, 15-18 Dec. 2015). IEEE, 2015, pp. 5772–5777.
[15] P.-A. Meyer, Quantum Probability for Probabilists, 2nd ed.
Verlag, 1995.
Berlin-Heidelberg: Springer-
[16] L. Bouten, R. van Handel, and A. Silberfarb, “Approximation and limit theorems for quantum stochastic models with unbounded coefficients,” J. Funct. Anal., vol. 254, pp. 3123–3147,
2008.
[17] F. Fagnola, “On quantum stochastic differential equations with unbounded coefficients,”
Probab. Th. Rel. Fields, vol. 86, pp. 501–516, 1990.
[18] R. F. Curtain and H. J. Zwart, An Introduction to Infinite-Dimensional Linear Systems
Theory, ser. Text in Applied Mathematics. New York: Springer-Verlag, 1995, no. 21.
[19] I. Lasiecka and A. Manitius, “Differentiability and convergence rates of approximating semigroups for retarded function differential equations,” SIAM J. Numer. Anal., vol. 25, no. 4,
pp. 883–907, 1988.
[20] K. Ito and F. Kappel, “The Trotter-Kato theorem and approximation of PDEs,” Mathematics
of Computation, vol. 67, no. 221, pp. 21–44, 1998.
33
| 3cs.SY
|
Multipair Massive MIMO Two-Way Full-Duplex
Relay Systems with Hardware Impairments
arXiv:1708.00742v1 [cs.IT] 2 Aug 2017
Ying Liu, Xipeng Xue, Jiayi Zhang, Xu Li, Linglong Dai, and Shi Jin
Abstract—Hardware impairments, such as phase noise, quantization errors, non-linearities, and noise amplification, have
baneful effects on wireless communications. In this paper, we
investigate the effect of hardware impairments on multipair
massive multiple-input multiple-output (MIMO) two-way fullduplex relay systems with amplify-and-forward scheme. More
specifically, novel closed-form approximate expressions for the
spectral efficiency are derived to obtain some important insights
into the practical design of the considered system. When the
number of relay antennas N increases without bound, we propose
a hardware scaling law, which reveals that the level of hardware
impairments that can be tolerated is roughly proportional to
√
N . This new result inspires us to design low-cost and practical
multipair massive MIMO two-way full-duplex relay systems.
Moreover, the optimal number of relay antennas is derived to
maximize the energy efficiency. Finally, Motor-Carlo simulation
results are provided to validate our analytical results.
I. I NTRODUCTION
The two-way full-duplex (FD) relay system can ideally
achieve almost twice of the spectral efficiency (SE) achieved
by the traditional two-way half-duplex (HD) scheme, since
the relay can transmit and receive signals simultaneously.
However, the practical implementation of the two-way FD
relay is challenging due to the severe self-interference (SI)
caused by FD [1]–[3].
Recently, massive multiple-input multiple-output (MIMO)
has been proposed as an efficient approach to suppress the
SI of two-way FD relay systems in the spatial domain [4].
Different from most of existing works, which consider systems deploying high-cost ideal hardware components, in this
paper we consider a multipair massive MIMO two-way FD
relay system with low-cost non-ideal hardware that suffers
from hardware impairments. In practical systems, the cost
and power consumption increase with the number of radio
frequency (RF) chains. In order to achieve higher energy
efficiency (EE) and/or lower hardware cost, each RF chain
can use some cheap hardware components [5], [6]. However,
low-cost hardware is particularly prone to the impairments
in transceivers, such as quantization errors of low-resolution
This work was supported in part by the National Natural Science Foundation of China (Grant No. 61601020) and the Fundamental Research Funds
for the Central Universities (Grant Nos. 2016RC013, 2017JBM319, and
2016JBZ003). (Corresponding author: [email protected])
Y. Liu, X. Xue, J. Zhang and X. Li are with the School of Electronic and
Information Engineering, Beijing Jiaotong University, Beijing 100044, P. R.
China.
L. Dai is with the Department of Electronic Engineering, Tsinghua University, Beijing 100084, P. R. China.
S. Jin is with the National Mobile Communications Research Laboratory,
Southeast University, Nanjing 210096, P. R. China.
analog to digital converters (ADCs), I/Q-imbalance, phase
noise, and non-linearities [7]–[9].
Although the influence of hardware impairments can be
mitigated by some compensation algorithms, residual impairments still exist due to time-varying and random hardware
characteristics. The effect of hardware impairments on the
massive MIMO two-way FD relay system has only recently
been studied in [10], which focused on the decode-and-forward
(DF) scheme at the relay. However, the signal processing
complexity of the DF scheme is much higher than that of the
amplify-and-forward (AF) scheme for the implementation of
massive MIMO relay systems [11]. Therefore, the AF scheme
is more attractive for practical system design. To the best of
authors’ knowledge, the performance of AF based multipair
massive MIMO two-way FD relay systems with hardware
impairments has not been investigated in the literature, partially due to the difficulty of manipulating products of SI and
hardware impairments vectors.
Motivated by the aforementioned consideration, a natural
question is that, whether the low-cost non-iedeal hardware
can be deployed at the AF based multipair massive MIMO
two-way FD relay system without sacrificing the expected
performance gains? In this paper, we try to answer this
question with the following contributions:
• An analytical SE approximation of multipair massive
MIMO two-way FD relay systems with hardware impairments is derived in closed-form. The effect of both
the number of relay antennas and the level of transceiver
hardware impairments on the SE has been investigated.
• A hardware scaling law has been presented to show that
one can tolerate larger level of hardware impairments as
the number of antennas increases. This is an analytic
proof that the considered system can be deployed with
low-cost hardware components.
• The sum SEs of FD and HD systems have been compared with different levels of hardware impairments. It
is interesting to find that the FD system with hardware
impairments can achieve the same SE of the HD system
with larger loop interferences. Finally, we derive the
optimal number of relay antennas to maximize the EE.
II. S YSTEM M ODEL
We consider a massive MIMO two-way FD relay system
where K pairs of devices on two sides communicate with
each other through a single relay TR . The devices are denoted
as TAi and TBi , for i = 1, . . . , K, respectively. The devices
could be sensors that exchange a small amount of information
or small cell base stations which need high throughput links.
The relay is equipped with 2N antennas, where N antennas
are used for transmission, and the other N antennas are used
for reception. Each device is equipped with one receive and
one transmit antenna. In addition, the relay and devices are
assumed to work in FD mode, i.e., they can transmit and
receive signals at the same time. We further assume that there
is no direct communication link between each pair of devices
due to heavy shadowing and/or large path loss. The device is
interfered by other devices on the same side.
A. Channel Model
Block fading is considered in this paper. This means that
it is an ergodic process with a static channel realization
in a coherence block and the realizations in blocks are
∆
independent. Then, we define Gu = [gu1 , . . . , guK ] and
∆
Hu = [hu1 , . . . , huK ], where gui ∈ CN ×1 and hui ∈ CN ×1
(i = 1, . . . , K), which denote the uplink channels between
TAi and TR , TBi and TR , respectively. In addition, the
downlink channels between TAi and TR , TBi and TR are given
∆
∆
by Gd = [gd1 , . . . , gdK ] and Hd = [hd1 , . . . , hdK ], where
N ×1
N ×1
gdi ∈ C
and hdi ∈ C
(i = 1, . . . , K), respectively.
Furthermore, Gu , Hu , Hd and Hd are assumed to follow
the independent identically distributed (i.i.d.) Rayleigh fading,
i.e., the elements of guK , huK , gdK , and hdK are i.i.d.
CN (0, σg2ui ), CN (0, σh2 ui ), CN (0, σg2di ), and CN (0, σh2 di )
random variables [6]. Furthermore, Gu , Hu , Gd , and Hd
1/2
1/2
can be expressed as Gu = Sgu Dgu , Hu = Shu Dhu ,
1/2
1/2
Gd = Sgd Dgd , and Hd = Shd Dhd , respectively, where
Sgu , Shu , Sgd , and Shd stand for the small-scale fading and
their elements are all i.i.d. CN (0, 1) random variables. On the
other hand, Dgu , Dhu , Dgd , and Dhd are diagonal matrices
representing the large-scale fading, and the kth diagonal elements are denoted as σg2uk , σh2 uk , σg2dk , and σh2 dk , respectively.
Furthermore, let GRR ∈ CN ×N denote the SI matrix between the transmit and receive arrays of the relay due to the FD
mode. Each row of GRR such as GRRi denotes the channel
between ith receive antenna and all transmit antennas of the
relay. Ωk,i is the inter-device interference channel coefficient
from ith device to kth device. Note that Ωk,k denotes the SI
at the kth device. The elements of GRR and Ωk,i are random
variables following the i.i.d. complex Gaussian distribution,
2
2
), respectively [2].
e.g., CN (0, σLIr
) and CN (0, σk,i
B. Hardware Impairments
As shown in [12], the residual hardware impairments at
the transmitter and receiver can be modeled as additive
distortion noises that are proportional to the signal power.
Thus, the additive distortion term ηr describes the residual
impairments of receiver at the relay and is proportional to the
instantaneous power of received signals at the
relay antenna
as ηr ∼ CN 0, κ2r diag (W11 , . . . , WN N ) , where Wii is
the
matrix W =
Pcovariance
PK ith diagonalH elementH of Pthe
N
H
R
j=1 GRRj GRRj with PU
j=1 PU (huj huj +guj guj )+ N
being the power constraint of the device and PR being the
transmit power of relay [12]. Furthermore, the proportionality
coefficient κr describes the level of hardware impairments and
is related to the received error vector magnitude (EVM) [8].
Note that the EVM is a common quality indicator of the signal
distortion magnitude, and it can be defined as the ratio of the
signal distortion to the signal magnitude. For example, the
EVM at relay can be defined as [8, Eq. (5)]
v n
o s
u
u E kηr k2 |ℑ
tr (κ2r W)
u
o =
= κr ,
(1)
EV Mr = t n
2
tr (W)
E kxk |ℑ
where ℑ denotes the set of channel realizations (i.e., gu , hu ∈
ℑ). Furthermore, 3GPP LTE suggests that the EVM should be
smaller than 0.175 [8].
C. Signal Transmission
At the time instant n, all devices TAi and TBi
(i = 1, . . . , K) transmit their signals xAi (n) and xBi (n) to
the relay TR , respectively, and TR broadcasts its processed
previously received signal yt (n) to all devices.
First, we assume that xAi (n) and xBi (n) are Gaussian
distributed signals. Due to the FD mode, TR also receives the
signal, i.e., yt (n) which is broadcasted to all devices. Thus,
at the time instant n, the received signal at TR is given by
yr (n) = Ax (n) + GRR yt (n) + ηr + nR (n) ,
(2)
T
∆
∆
where A = [Gu , Hu ], x (n) =
xTA (n) , xTB (n)
∆
∆
with xA (n) = [xA1 (n), . . . , xAK (n)] and xB (n) =
2
IN ) denotes
[xB1 (n), . . . , xBK (n)], and nR (n) ∼ CN (0, σR
an additive white Gaussian noise (AWGN) vector at TR .
Then, we analyze the received signal at devices. At the time
instant n (n > 1), the relay using the simple AF protocol amplifies the previously received signal yr (n − 1) and broadcasts
it to the devices. Therefore, the transmit signal vector at the
relay is given by
′
yt (n) = ρFyr (n − 1) ,
(3)
N ×N
where F ∈ C
is the precoding matrix and ρ is the
′
amplification factor. Then TR broadcasts yt (n) to all devices.
However, due to the hardware impairments of RF chains at
the transmitter, TR actually broadcasts yt (n) to all devices as
′
yt (n) = yt (n) + ηt = ρFyr (n − 1) + ηt ,
(4)
where ηt ∼ CN 0, κ2t PNR IN with the proportionality parameters κt characterizing the level of hardware impairment at the
transmitter. Here we assume that each antenna has the same
power and TR can obtain perfect channel state information
(CSI) according to uplink pilots from the devices, and the
devices can then obtain CSI through channel reciprocity [13].
Due to the power constraint of the relay PR , ρ is normalized
by the instantaneous received signal power
s
PR
ρ=
.
2
2
2
2 kFk2
PU kFAk + PNR kFGRR k + kFηr k + σR
At the relay, we adopt the low-complexity maximum-ratio
(MR) scheme suitable for low-cost massive MIMO deployment [13]. Therefore, the precoding matrix F can be written
∆
∆
as F = B∗ AH , where B = [Hd , Gd ], Gd = [gd1 , . . . , gdK ]
∆
and Hd = [hd1 , . . . , hdK ]. To our best knowledge, it is very
challenging to analyze the residual loop interference power if
substituting (4) into (2) iteratively. However, the residual loop
interference can be modeled as additional Gaussian noise. This
is due to the fact that the loop interference can be significantly
degraded and the residual loop interference is too weak by
applying loop interference mitigation schemes [4].
Following similar steps in [4], yr (n) in (2) can be
approximated
by a Gaussian noise source ỹr (n) with
E ỹr (n) ỹrH (n) = PNR IN . Furthermore, TAi and TBi receive the combined signal as
X
T
Ωi,k xAk (n) + nAi (n) , (5)
yt (n) +
ZAi (n) = gdi
i,k∈UA
ZBi (n) = hTdi yt (n) +
X
Ωi,k xBk (n) + nBi (n) , (6)
i,k∈UB
where the noise nAi (n) and nBi (n) are AWGN with
2
2
nAi (n) ∼ CN (0, σA
) and nBi (n) ∼ CN (0, σB
), respeci
i
tively. In the following, we only discuss the analytical result
for TAi . The corresponding result of TBi can be obtained by
replacing TAi with TBi . Note that the relay can only receive
signal and the transmission part keeps silent at the first time
slot (n = 1), during which the received signals at the relay
and devices are respectively given by
yr (1) = Ax (1) + ηr + nR (1)
ZAi (1) =
T
gdi
yt
(7)
(1) + nAi (1) , i = 1, . . . , K.
(8)
For simplicity, the time label n is omitted in the following [6].
Substituting (2) and (4) into (5), the combined received signal
ZAi can be expressed as
K
X
T
T
T
Fhui xBi +ρ
ZAi = ρgdi
Fhuj xBj
gdi
Fguj xAj +gdi
{z
}
|
j=1,j6=i
desired signal
|
{z
}
inter-pair interference
T
T
+ ρgdi
Fgui xAi + ρgdi
FGRR ỹr +
{z
} |
{z
}
|
self-interference
Ωi,k xAk
i,k∈UA
loop interference
|
{z
}
inter-device interference by FD mode
T
T
T
+ ρgdi
Fηr + gdi
ηt + ρgdi
FnR + nAi ,
|
{z
} |
{z
}
hardware impairments
X
(9)
compound noise
where we use the set notation of UA = {1, 3, . . . , 2K − 1}
or UB = {2, 4, . . . , 2K} to represent the devices on bothsides
of relay. Note that one set of devices (UA ) can not exchange
information with the other set (UB ) directly. From (9), we
can find that ZAi is composed of seven terms: the signal that
TAi desires to receive, the inter-pair interference due to other
devices’ signal, the SI from the device, the loop interference
from the relay, the inter-device interference caused by other
devices due to FD mode, the distortion noise induced by
hardware impairments at the relay, and the compound noise.
With the power constraint of the relay and perfect CSI,
the FD relay can take advantage of massive antennas and
simple SI cancellation (SIC) schemes to eliminate the SI [4].
Furthermore, the interference and noise power can be obtained
by taking expectation with respect to interference and noise
within one coherence block of channel fading. As a result, the
SE of TAi is given by
RAi = E {log2 (1 + SINRAi )} ,
for i = 1, . . . , K,
(10)
where SINRAi denotes the signal-to-interference plus noise
ratio (SINR) of Ai and can be expressed as
SINRAi =
T
PU gdi
Fhui
2
1
T
T Fη
A′ +B ′ +C ′ +D′ +E ′ + gdi
r + ρ2 gdi ηt
∆
where A′ = PU
2
giT F
σR
P
PU
ρ2
i,k∈UA
2
2
∆
K
P
j=1,j6=i
σ2
giT Fgj
2
2
+ giT Fhj
2
∆
2,
∆
, B′ =
∆
′
, C ′ = ρAi
= giT FGRR ỹr , and E ′ =
2 , D
2
σi,k
, respectively.
III. P ERFORMANCE A NALYSIS
To the best of authors’ knowledge, the exact derivation of
(10) is really difficult [14]. Herein we consider the asymptotic
scenario when N → ∞, which is the large system limit. Utilizing the convexity of log2 (1 + 1/x) and Jensen’s inequality,
the lower bound of RAi in (10) can be written as
1
o .
(11)
RAi ≥ R̃Ai = log2 1 + n
−1
E [SINRAi ]
Based on (11) and considering devices at both sides, we can
obtain the sum SE of the multipair massive MIMO two-way
FD relay system as
Rsum =
K
X
R̃Ai + R̃Bi .
(12)
i=1
Note that, in the remainder of the paper, we only show
the analytical results for RAi since the formula of RBi is
symmetric with that of RAi . In the following, we present the
SE of Ai in Lemma 1.
Lemma 1. With hardware impairments and MR processing at
the relay, R̃Ai can be approximated as
N
R̃Ai −log2 1+
−−−−→ 0,
Ai +Bi +Ci +Di +Ei +Fi +Gi N →∞
(13)
4
2
4
2
2
K
σh σg
σg σh
σg2
σh
P
∆
uj
uj
uj
uj
dj
dj
,
+
+
+
where Ai =
σ2
σ4 σ2
σ2
σ4 σ2
hui
j=1,j6=i
2
∆
σR
=
Bi
=
, Ci
2
PU σh
ui
!
K
P
2
2
κ2r PU
+PR σLIr
σh
+σg2
hui
j=1
uj
ui
hui
di
uj
2
PU σh
gdi
,
Ei
∆
=
gdi
hui
2
σA
J
i
4
PR PU σg4 σh
∆
,
∆
=
Di
ui
κ2t J
4
PU σg2 σh
di
ui
,
2
∆ P σLIr
Fi = PR
,
2
U σh
Gi =
iu
J
∆
∆
=
P
2
σi,k
i,k∈UA
4
PR σg4 σh
di
ui
J
PU
have the identical scaling, we can finish the proof by fulfilling
1 − max(z, 2z − 1) ≥ 0 as 0 < z ≤ 1.
, and
K
P
σg4ui σh2 di +σg2di σh4 ui
+
Corollary 1 reveals that large level of hardware impair! ments can be compensated by increasing number of antennas
K
K
P
κ2r P
2
.at the relay in multipair massive MIMO two-way relaying sysσg2uj +σh2 uj +PR σLIr
PU
σg2ui σh2 di +σg2di σh2 ui
N
j=1
i=1
tems. Furthermore, the EVM at relay is defined as EVM = κ
[12]. Considering the condition of κ2 = κ20 N z in Corollary
Proof. Please refer to Appendix.
1 and z = 1, it is easy to have EVM2 = κ20 N , which
From Lemma 1, it is clear to see that the SE RAi increases means the EVM can be increased proportionally to N 1/2 .
with the number of antennas N . Further insights can be Thus, for the negligible SE loss, we can replace 8 high-quality
gained by investigating the terms Ai , Bi , Ci , Di , Ei , Fi , and antennas with EVM = 0.05 with 128 low-quality antennas
Gi in (13), respectively. First, we focus on the inter-device with EVM = 0.2. This encouraging result enable reducing the
interference term Ai caused by the broadcasting signal from power consumption and cost of the multipair massive MIMO
the relay. The SE RAi increases when we enlarge the values two-way FD relay system.
of σg2di and σh2 ui , which indicates that reducing the channel
In the following, we evaluate the EE of the multipair
fading of the ith device pair. However, RAi will decrease if we massive MIMO two-way FD relay system when the number of
enlarge σg2uj and σh2 uj , for j 6= i, which means that reducing relay antennas becomes large. The EE is defined as the ratio of
the channel fading of other device pairs except the ith device the sum SE to the total power consumption of the system [13].
pair. This finding is consistent with the result in [14].
Considering the classical architecture where each antenna is
Furthermore, Lemma 1 reveals that Bi consists of the connected to one RF chain. The total power consumption of
transmit power of TBi and the channel fading σh2 ui from TBi the system can be modeled as [4]
to TR . Therefore, we can increase the transmit power of TBi
Ptotal = (N + 2K) (Pt + Pr ) + P0 + (2KPU + PR ) /ϕ,
and/or decrease σh2 ui to increase RAi . Then, from Ci , we can
(15)
find that RAi increases when the transmit power for TR and
the transmit power of devices increase, but decreases when ρ where Pt and Pr are the power of RF chains at the transmitter
becomes large. Moreover, it is clear to see from (13) that the and receiver, respectively. Moreover, P0 denotes the power of
detrimental effect of hardware impairments in Di , Ei and Gi the static circuits, the term 2KPU + PR is the total power of
on the SE RAi . Finally, the loop interference due to the FD the power amplifiers at devices and the relay, and ϕ denotes
mode in Fi and Gi can also reduce the SE.
the efficiency of the power amplifier in each RF chain. Thus,
In order to show how fast the hardware impairments can the EE of the considered system is given by EE = Rsum /Ptotal .
increase with N while maintaining the constant rate, we
establish an important hardware scaling law in the following
IV. N UMERICAL R ESULTS
corollary.
In this section, the derived results of the multipair massive
Corollary 1. Suppose the hardware impairment parameters MIMO two-way FD relay system with hardware impairments
are replaced by κ2r = κ20r N z and κ2t = κ20t N z for an initial and AF schemes are validated through Monte-Carlo simulavalue κ0r ≥ 0, κ0t ≥ 0 and a given scaling exponent 0 < z ≤ tions by averaging over 104 independent channel samples.
1, the SE R̃Ai , under MR processing and N → ∞, converges Similar to previous works [4], [14], we set Pu = 10 W,
2
2
2
PR = 40 W and normalize σR
= σA
= σB
= 1 for i =
to a non-zero limit
i
i
1,
.
.
.
,
K.
Furthermore,
without
loss
of
generality,
we simply
2
4
1−z
σ
σ
N
R̃Ai − log2 1 + κ2 σ2gdiσ2huiξ+2Kκ2 µ̃ −−−−→ 0, 0 < z < 1 set the same values for both loop and inter-device interferences
0r gdi hui
0t
N →∞
2
2
as σ 2 = σLIr
= σk,i
= 1 (i ∈ UA ∪ UB , k = 1, . . . , 2K) and
4
σg2 σh
ui
di
R̃
−
log
1
+
κ0 = κ0r = κ0t , respectively [2], [6].
2
Ai
2
2
2
2
2
κ0r 2Kκ0t µ̄+σg σh
ξ+2Kκ0t µ̃
di
ui
The simulated and analytical asymptotic sum SE (13) are
−−−−→ 0, z = 1
plotted as a function of the half number of antennas N at the
N →∞
(14) relay in Fig. 1. The simulation results validate the tightness
of the derived large-scale approximations. Moreover, Fig. 1
∆
2
where
ξ
=
2Kµ
+
PR σLIr
/PU , validates the hardware scaling law established by Corollary 1.
P
∆
∆
K
2
2
µ
=
µ̃
= The SE grows with low levels of hardware impairments (z =
j=1 σhuj + σguj / (2K),
PK
∆
2
4
2
4
and
µ̄
= 0.5, 1). However, the SE curve asymptotically bend toward
i=1 σgui σhdi + σgdi σhui / (2K)
PK
zero when the scaling law is not satisfied (z = 1.5).
2
2
2
2
i=1 σgui σhdi + σgdi σhui / (2K).
Note that the analytical curves plotted in Fig. 1 are not
Proof. Substituting κ2r = κ20r N z and κ2t = κ20t N z into (13), always below the simulated curves. This is due to the reason
with N → ∞ and 0 < z ≤ 1, Ai , Bi , Ci , Fi , and Gi tend that we utilize the large number law to derive the SE. When
to zero. Moreover, Di behaves as O(N z ), while Ei behaves N is relatively small (e.g. N < 350), the low order term
as O(N z + N 2z−1 ). To make the numerator and denominator of N cannot be omitted. Thus, the analytical result is a little
i=1
70
0.04
0.038
60
50
0.034
EE (bps/J/Hz)
Sum SE (bps/Hz)
0.036
40
30
Large-scale Approximation (z=0.5)
Large-scale Approximation (z=1)
Large-scale Approximation (z=1.5)
Monte-Carlo Simulation
200
300
400
500
600
700
800
900
1000
1/2 Number of Antennas (N)
100
Full-Duplex Approximation(κ0=0.1)
Half-Duplex Approximation(κ0=0.1)
Full-Duplex Approximation(κ0=0)
Half-Duplex Approximation(κ0=0)
Asymptotic Limits
90
Sum SE (bps/Hz)
80
70
60
50
40
30
20
10
10 0
0.026
Large-scale Approximation(z=0)
Large-scale Approximation(z=0.75)
Large-scale Approximation(z=1)
Large-scale Approximation(z=1.25)
0.024
0.022
100
200
300
400
500
600
700
800
900
1000
1/2 Number of Antennas (N)
Fig. 1. Hardware scaling law of multipair massive MIMO two-way FD relay
systems against different number of antennas N at the relay (K = 10, κ0 =
0.0156).
0
10 -1
0.03
0.028
20
10
100
0.032
10 1
10 2
2
Level of Loop and Inter-device Interference (σ )
Fig. 2. Sum SE of multipair massive MIMO two-way FD relay systems
with hardware impairments against different levels of loop and inter-device
interference (N = 1000, z = 1, K = 10).
larger than the corresponding simulation result. However, even
if N is smaller, the curves of large-scale approximation and
Monte-Carlo simulations are close [14]. Compared with the
DF scheme in [10], the signal processing can achieve a smaller
sum SE. However, the complexity of AF based system at the
relay is much lower than the DF based system.
Fig. 2 shows the large-scale approximation (13) and the
asymptotic SE limit (14) against the levels of the loop and
inter-device interferences σ 2 . The SE of such system in HD
model is also plotted as a baseline for comparison. Since the
HD system utilizes two phases to transmit and receive signal,
the inherent loop and inter-device interference do not exist.
Therefore, the SE of HD systems is constant in Fig. 2. The
Fig. 3. EE of multipair massive MIMO two-way FD relay systems with
hardware impairments against different number of antennas N at the relay
(K = 10, κ0 = 0.0156).
first observation from Fig. 2 is that when N = 1000, the
asymptotic SE limit of FD systems outperforms the one of
HD systems for small and moderate levels of interference, e.g.,
σ 2 < 101.18 for ideal hardware (κ0 = 0) and σ 2 < 100.9 for
non-ideal hardware (κ0 = 0.1). This can be explained that only
the half time required in the FD mode compared with the HD
mode. Interestingly, the SE of the multipair massive MIMO
two-way FD relay system with hardware impairments is larger
than the one with ideal hardware for small and moderate levels
of loop and inter-device interference. However, large value of
loop and inter-device interference decreases the sum SE of FD
systems. Moreover, the gap of SE curves between FD and HD
systems increases with the level hardware impairments κ0 .
The large-scale approximation of EE as a function of the
number of antennas N at the relay is plotted in Fig. 3. Similar
to [15], we set Pt = 1 W, Pr = 0.3 W, P0 = 2 W and
ϕ = 0.35. It is clear to see that the EE decreases with z
due to the distortion noise caused by hardware impairments.
Moreover, there exists an optimal number of antennas Nopt
to reach the corresponding maximum EE. When N ≤ Nopt ,
the EE can be improved by increasing N . However, when
N > Nopt , increasing N will reduce the EE since the addition
power consumption of RF chains and static circuits dominate
the performance.
V. C ONCLUSIONS
In this paper, we investigate the SE and EE of AF-based
multipair massive MIMO two-way FD relay systems with
hardware impairments. The effect of N and κ on the SE
has been investigated by deriving a closed-form large-scale
approximate expression. In addition, the optimal number of
relay antennas has been derived to maximize the EE. We also
find that the SE of the massive MIMO two-way FD system
with hardware impairments outperforms that of the HD system
when the level of loop and inter-device interference is small
and moderate. Finally, an useful hardware scaling law has been
established to prove that low-cost hardware can be deployed
at the relay due to the huge degrees-of-freedom brought by
massive antennas.
A PPENDIX
o
n
−1
as
From (11), we can rewrite E [SINRAi ]
)
(
2
T
gdi
FGRR
PR
1
=
E
E
2
T Fh
SIN RAi
N PU
gdi
ui
(
(
)
)
2
2
T
T
2
gdi
F
gdi
ηt
σR
1
+
E
+ 2 E
2
2
T Fh
T Fh
PU
ρ PU
gdi
gdi
ui
ui
P
2
(
(
)
)
σi,k
2
σA
1
1
i,k∈UA
i
+
E
+ 2 E
2
2
T Fh
T Fh
ρ2
ρ PU
gdi
gdi
ui
ui
)
(
)!
(
2
2
K
T
T
X
gdi
Fhuj
gdi
Fguj
+E
+
E
2
2
T Fh
T Fh
gdi
gdi
ui
ui
j=1,j6=i
(
)
2
T
gdi
Fηr
1
E
.
(16)
+
2
PU
gT Fhui
Moreover, we have the following approximations
K
o
n
X
2
σg4ui σh2 di + σg2di σh4 ui −−−−→ 0,
E kFAk − N 3
N →∞
i=1
o
n
2
2
E kFGRR k − N 3 σLIr
K
X
i=1
σg2ui σh2 di + σg2di σh2 ui −−−−→ 0,
N →∞
K
n
o
X
2
E kFηr k −κ2r N 2 ξ
σg2ui σh2 di +σg2di σh2 ui /PU −−−−→ 0,
n
o
2
2
E kFk − σR
N2
i=1
K
X
i=1
N →∞
σg2ui σh2 di + σg2di σh2 ui −−−−→ 0,
N →∞
PR
E ρ2 − 3 −−−−→ 0.
(19)
N J N →∞
By substituting (18)-(19) into (16), we can complete the proof
after some simplifications.
R EFERENCES
[1] V. W. Wong, R. Schober, D. W. K. Ng, and L.-C. Wang, Key Technologies for 5G Wireless Systems. Cambridge university press, 2017.
[2] H. Q. Ngo, H. A. Suraweera, M. Matthaiou, and E. G. Larsson, “Multipair full-duplex relaying with massive arrays and linear processing,”
IEEE J. Sel. Areas Commun., vol. 32, no. 9, pp. 1721–1737, Sep. 2014.
[3] X. Xie, M. Peng, Y. Li, W. Wang, and H. V. Poor, “Channel estimation
for two-way relay networks in the presence of synchronization errors,”
di
IEEE Trans. Signal Process., vol. 62, no. 23, pp. 6235–6248, Dec. 2014.
According to the law of large numbers, we have
[4] Z. Zhang, Z. Chen, M. Shen, and B. Xia, “Spectral and energy efficiency
of multi-pair two-way full-duplex relay systems with massive MIMO,”
1 ∗ 2
1 T
2
IEEE J. Sel. Areas Commun., vol. 34, no. 4, pp. 848–863, May 2016.
gdi Fhui − kgdi
k khui k −−−−→ 0,
N →∞
[5] J. Zhang, L. Dai, Z. He, S. Jin and X. Li, “Performance analysis of
N
N
mixed-ADC massive MIMO systems over rician fading channels,” IEEE
1 T
1 ∗ 2 H
T ∗
kgdi k hui huj +khuj k2 gdi
gdj −−−−→ 0,
gdi Fhuj −
J. Sel. Areas Commun., vol. 35, no. 6, pp. 1327–1338, Jun. 2017.
N →∞
N
N
[6] J. Zhang, L. Dai, S. Sun, and Z. Wang, “On the spectral efficiency of
1 T
1 ∗ 2 H
2 T ∗
massive MIMO systems with low-resolution ADCs,” IEEE Commun.
kgdi k hui guj +kguj k gdi hdj −−−−→ 0,
gdi Fguj −
Lett., vol. 20, no. 5, pp. 842–845, Feb. 2016.
N →∞
N
N
[7] J. Zhang, L. Dai, X. Zhang, E. Björnson, and Z. Wang, “Achievable
1 T
1
2
2
∗ 4
rate of Rician large-scale MIMO channels with transceiver hardware
k khdi k −−−−→ 0.
g F − kgui
N →∞
N di
N
impairments,” IEEE Trans. Veh. Technol., vol. 65, no. 10, pp. 8800–
8806, Oct. 2016.
When N → ∞, we further have
[8] E. Björnson, J. Hoydis, M. Kountouris, and M. Debbah, “Massive
)
!
(
2 T ∗
2
4
2
MIMO systems with non-ideal hardware: Energy efficiency, estimation,
H
1 σhuj σhuj σgdj
hui huj khuj k gdi gdj
and capacity limits,” IEEE Trans. Inf. Theory, vol. 60, no. 11, pp. 7112–
−
+
−
−
−
−
→
0,
+
E
2
2
∗ k2
7139, Nov. 2014.
N σh2 ui σh4 ui σg2di N →∞
khui k
khui k kgdi
[9] J. Zhang, L. Dai, M. Matthaiou, C. Masouros, and S. Jin, “On the
)
(
!
2 T ∗
2
4
2
spectral efficiency of space-constrained massive MIMO with linear
σ
σ
σ
kg
k
g
h
1
hH
g
uj
g
guj
di dj
uj h
ui uj
E
+ 4 2dj −−−−→ 0, receivers,” in Proc. IEEE ICC, 2016, pp. 1–6.
2+
2
2 −N
2
∗
N →∞ [10] X. Xia, D. Zhang, K. Xu, W. Ma, and Y. Xu, “Hardware impairments
σhui σhui σgdi
khui k
kg k khui k
(
) di
aware transceiver for full-duplex massive MIMO relaying,” IEEE Trans.
1
1
Signal Process., vol. 63, no. 24, pp. 6565–6580, Dec. 2015.
−−−−→ 0,
E
−
[11] X. Chen, L. Lei, H. Zhang, and C. Yuen, “Large-scale MIMO relaying
2
N σh2 ui N →∞
khui k
techniques for physical layer security: AF or DF?” IEEE Trans. Wireless
(
)
2
Commun., vol. 14, no. 9, pp. 5135–5146, Sep. 2015.
T
2
gdi Fηr
κr ξ
[12]
E.
Björnson, M. Matthaiou, and M. Debbah, “Massive MIMO with
E
−−−−→ 0.
(17)
2 − N P σ2
arbitrary non-ideal arrays: Hardware scaling laws and circuit-aware
T Fh
U hui N →∞
gdi
ui
design,” IEEE Trans. Wireless Commun., vol. 14, no. 8, pp. 4353–4368,
Aug. 2015.
)
(
2
[13] H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, “Energy and spectral effiT
2
gdi ηt
κ PR
ciency of very large multiuser MIMO systems,” IEEE Trans. Commun.,
− 4 t2 4 −−−−→ 0,
E
2
vol. 61, no. 4, pp. 1436–1449, Apr. 2013.
T
N
σgdi σhui N →∞
gdi Fhui
[14] S. Jin, X. Liang, K.-K. Wong, X. Gao, and Q. Zhu, “Ergodic rate analysis
(
)
2
T
2
for multipair massive MIMO two-way relay networks,” IEEE Trans.
gdi
FGRR
σLIr
Wireless Commun., vol. 14, no. 3, pp. 1480–1491, Mar. 2015.
E
−−−−→ 0,
−
2
2
T Fh
σhiu N →∞
[15] C. Li, J. Zhang, and K. B. Letaief, “Throughput and energy efficiency
gdi
ui
)
(
analysis of small cell networks with multi-antenna base stations,” IEEE
Trans. Wireless Commun., vol. 13, no. 5, pp. 2505–2517, May 2013.
1
1
E
T Fh
gdi
ui
2
−
N 4 σg4di σh4 ui
−−−−→ 0.
N →∞
(18)
| 7cs.IT
|
A New Functional-Logic Compiler for Curry: Sprite ⋆
Sergio Antoy and Andy Jost
arXiv:1608.04016v1 [cs.PL] 13 Aug 2016
Computer Science Dept., Portland State University, Oregon, U.S.A.
[email protected]
[email protected]
Abstract. We introduce a new native code compiler for Curry codenamed
Sprite. Sprite is based on the Fair Scheme, a compilation strategy that provides
instructions for transforming declarative, non-deterministic programs of a certain
class into imperative, deterministic code. We outline salient features of Sprite,
discuss its implementation of Curry programs, and present benchmarking results. Sprite is the first-to-date operationally complete implementation of Curry.
Preliminary results show that ensuring this property does not incur a significant
penalty.
Keywords: Functional logic programming, Compiler implementation, Operational completeness
1 Introduction
The functional-logic language Curry [16,18] is a syntactically small extension of the
popular functional language Haskell. Its seamless combination of functional and logic
programming concepts gives rise to hybrid features that encourage expressive, abstract,
and declarative programs [5,18].
One example of such a feature is a functional pattern [3], in which functions are
invoked in the left-hand sides of rules. This is an intuitive way to construct patterns
with syntactically-sugared high-level features that puts patterns on a more even footing
with expressions. In Curry, patterns can be composed and refactored like other code,
and encapsulation can be used to hide details. We illustrate this with function get,
defined below, which finds the values associated with a key in a list of key-value pairs.
with x = _ ++ [x] ++ _
get key (with (key, value)) = value
(1)
Operation with generates all lists containing x. The anonymous variables, indicated
by “_ ”, are place holders for expressions that are not used. Function “++” is the listappending operator. When used in a left-hand side, as in the rule for get, operation
with produces a pattern that matches any list containing x. Thus, the second argument
to get is a list — any list — containing the pair (key, value). The repeated variable,
⋆
This material is based upon work partially supported by the National Science Foundation under
Grant No. CCF-1317249.
key, implies a constraint that, in this case, ensures that only values associated with the
given key are selected.
By similar means, we may identify keys:
key_of (with (key, _ )) = key
(2)
This non-deterministically returns a key of the given list; for example:
> key_of [(’a’,0), (’b’,1), (’c’,2)]
’a’
’b’
’c’
(3)
This is just one of many features [5,18] that make Curry an appealing choice, particularly when the desired properties of a program result are easy to describe, but a set of
step-by-step instructions to obtain the result is more difficult to come by.
This paper describes work towards a new Curry compiler we call Sprite. Sprite
aims to be the first operationally complete Curry compiler, meaning it should produce
all values of a source program (within time and space constraints). Our compiler is
based on a compilation strategy named the Fair Scheme [7] that sets out rules for compiling a functional-logic program (in the form of a graph rewriting system) into abstract
deterministic procedures that easily map to the instructions of a low-level programming
language. Section 2 introduces Sprite at a high level, and describes the transformations
it performs. Section 3 describes the implementation of Curry programs as imperative
code. Section 4 contains benchmark results. Section 5 describes other Curry compilers.
Section 6 addresses future work, and Section 7 contains our concluding remarks.
2 The Sprite Curry Compiler
Sprite is a native code compiler for Curry. Like all compilers, Sprite subjects source
programs to a series of transformations. To begin, an external program is used to convert Curry source code into a desugared representation called FlatCurry [17], which
Sprite further transforms into a custom intermediate representation we call ICurry.
Then, following the steps laid out in the Fair Scheme, Sprite converts ICurry into a
graph rewriting system that implements the program. This system is realized in a lowlevel, machine-independent language provided by the open-source compiler infrastructure library LLVM [22]. That code is then optimized and lowered to native assembly,
ultimately producing an executable program. Sprite provides a convenience program,
scc, to coordinate the whole procedure.
2.1 ICurry
ICurry, where the “I” stands for “imperative,” is a form of Curry programs suitable
for translation into imperative code. ICurry is inspired by FlatCurry [17], a popular
representation of Curry programs that has been very successful for a variety of tasks including implementations in Prolog [19]. FlatCurry provides expressions that resemble
those of a functional program — e.g., they may include local declarations in the form of
let blocks and conditionals in the form of case constructs, all possibly nested. Although
the pattern-matching strategy is made explicit through case expressions, FlatCurry is
declarative. ICurry’s purpose is to represent the program in a more convenient imperative form — more convenient since Sprite will ultimately implement it in an imperative
language. In imperative languages, local declarations and conditionals take the form
of statements while expressions are limited to constants and/or calls to subroutines,
possibly nested. ICurry provides statements for local declarations and conditionals. It
provides expressions that avoid constructs that cannot be directly translated into the
expressions of an imperative language.
In ICurry all non-determinism — including the implicit non-determinism in highlevel features, such as functional patterns — is expressed through choices. A choice is
the archetypal non-deterministic function, indicated by the symbol “?” and defined by
the following rules:
x ? _ = x
_ ? y = y
(4)
The use of only choices is made possible, in part, by a duality between choices and free
variables [4,23]: any language feature expressed with choices can be implemented with
free variables and vice versa. Algorithms exists to convert one to the other, meaning we
are free to choose the most convenient representation in Sprite.
Finally, as in FlatCurry, the pattern-matching strategy in ICurry is made explicit and
guided by a definitional tree [1], a structure made up of stepwise case distinctions that
combines all rules of a function. We illustrate this for the zip function, defined as:
zip [] _ = []
zip ( _ : _ ) [] = []
zip (x:xs) (y:ys) = (x,y) : zip xs ys
(5)
The corresponding definitional tree is shown below as it might appear in ICurry.
zip = \a b -> case a of
[]
-> []
(x:xs) -> case b of
[]
-> []
(y:ys) -> (x,y) : zip xs ys
(6)
2.2 Evaluating ICurry
It is understood how to evaluate the right-hand side of (6) efficiently; the Spineless
Tagless G-machine (STG) [28], for instance, is up to the task. But the non-deterministic
properties of functional-logic programs complicate matters. To evaluate zip, its first
argument must be reduced to head-normal form. In a purely functional language, the
root node of a head-normal form is always a data constructor symbol (assuming partial
application is implemented by a data-like object), or else the computation fails. But for
functional-logic programs, two additional possibilities must be considered, leading to
an extended case distinction:
zip = \a b -> case a of
x ? y -> (pull-tab)
- - implied
⊥
-> ⊥
- - implied
[]
-> []
(x:xs) -> case b of ...
(7)
The infrastructure for executing this kind of pattern matching very efficiently by means
of dispatch tables will be described shortly, but for now we note two things. First, there
is no need for ICurry to spell out these extra cases, as they can be generated by the
compiler. Second, their presence calls for an expanded notion of the computation that
allows for additional node states. Because of this, Sprite hosts computations in a graph
whose nodes are taken from four classes: constructors, functions, choices, and failures.
Constructors and functions are provided by the source program; choices are built-in;
and failures, denoted “⊥”, arise from incompletely defined operations such as head,
the function that returns the head of a list. For example, head [] rewrites to “⊥”. A
simple replacement therefore propagates failure from needed arguments to roots.
Choices execute a special step called a pull-tab [2,9]. Pull-tab steps lift non-determinism out of needed positions, where they prevent completion of pattern matches.
The result is a choice between two more-definite expressions. A pull-tab step is shown
below:
zip (a ? b) c → zip a x ? zip b x where x = c
(8)
A pattern match cannot proceed while (a ? b) is the first argument to zip because
there is no matching rule in the function definition (one cannot exist because the choice
symbol is disallowed on left-hand sides). We do not want to choose between a and b
because such a choice would have to be reconsidered to avoid losing potential results.
The pull-tab transformation “pulls” the choice to an outermore position, producing two
new subexpressions, zip a c and zip b c, that can be evaluated further. The fact
that c is shared in the result illustrates a desirable property: that node duplication is
minimal and localized. Pull-tabbing involves some technicalities that we address later.
The complete details are in [2].
Due to the extra cases, additional node types, and, especially, the unusual mechanics of pull-tabbing steps, we chose to develop in Sprite a new evaluation machine from
scratch rather than augment an existing one such as STG. The property of pull-tabbing
that it “breaks-out” of recursively-descending evaluation into nested expressions fundamentally changes the computation so that existing functional strategies are difficult to
apply. In Sprite, we have implemented de novo an evaluation mechanism and runtime
system based on the Fair Scheme. These are the topic of the next section.
3 Implementation
In this section, we describe the implementation of Curry programs in imperative code.
Sprite generates LLVM code, but we assume most readers are not familiar with that.
So, rather than presenting the generated code, we describe the implemented programs
in terms of familiar concepts that appear directly in LLVM. In this way, the reader
can think in terms of an unspecified target language — one similar to assembly —
that implements those concepts. To facilitate the following description, we indicate in
parentheses where a similar feature exists in the C programming language.
In the target language, values are strongly typed, and the types include integers,
pointers, arrays, structures and functions. Programs are arranged into compilation units
called modules that contain symbols. Symbols are visible to other modules, and to control access to them each one is marked internal (static) or external (extern). Control
flow within functions is carried out by branch instructions. These include unconditional
branches (goto), conditional branches (if, for, while) and indirect branches (goto*).
The target of every branch instruction is a function-local address (label). A call stack is
provided, and it is manipulated by call and return instructions that enter and exit functions, respectively. Calls are normally executed in a fresh stack frame, but the target
language also supports explicit tail recursion, and Sprite puts it to good use.
3.1 Expression Representation
The expressions evaluated by a program are graphs consisting of labeled nodes having
zero or more successors. Each node belongs to one of four classes, as discussed in the
previous section. For constructors and functions, node labels are equivalent to symbols
defined in the source program. Failures and choices are labeled with reserved symbols.
Successors are references to other nodes. The number of successors, which equals the
arity of the corresponding symbol, is fixed at compile time. Partial applications are
written in eval/apply form [26].
Sprite implements graph nodes as heap objects. The layout of a heap object is
shown in Fig. 1. The label is implemented as a pointer to a static info table that will be
described later. Sprite emits exactly one table for each symbol in the Curry program.
Successors are implemented as pointers to other heap objects.
3.2 Evaluation
Evaluation in Sprite is the repeated execution of rewriting and pull-tabbing steps. Both
are implemented by two interleaved activities: replacement and pattern-matching. A
replacement produces a new graph from a previous one by replacing a subexpression
matching the left-hand side of a rule with the corresponding right-hand side. For instance, 1 + 1 might be replaced with 2. A replacement is implemented by overwriting
the heap object at the root of the subexpression being replaced. The key advantage of
this destructive update is that no pointer redirection [12, Def. 8][15] is required during a
rewrite step. Reusing a heap object also has the advantage of saving one memory allocation and deallocation per replacement, but requires that every heap object be capable of
storing any node, whatever its arity. Sprite meets this requirement by providing in heap
Heap Object
Info Pointer
Payload
Info Table
Step Function
.
.
.
Fig. 1: The heap object layout.
objects a fixed amount of space capable of holding a small number of successors. For
nodes with more successors than would fit in this space, the payload instead contains
a pointer to a larger array. This approach simplifies memory management for heap objects: since they are all the same size, a single memory pool suffices. Because arities are
known at compile time, no runtime checks are needed to determine whether successor
pointers reside in the heap object.
Pattern-matching consists of cascading case distinctions over the root symbol of the
expression being matched that culminate either in a replacement or in the patter match
of a subexpression. The Fair Scheme implements this according to a strategy guided by
the definitional trees encoded in ICurry. Case distinction as exemplified in (7) assumes
that an expression being matched is not rooted by a function symbol. Thus, when a node
needed to complete a match is labeled by a function symbol, the expression rooted by
that node is evaluated until it is labeled by a non-function symbol. A function-labeled
node, n, is evaluated by a target function called the step function that performs a pattern
match and replacement at n. Each Curry function gives rise to one target function, a
pointer to which is stored in the associated info table (see Fig. 1).
Operationally, pattern-matching amounts to evaluating nested case expressions similar to the one shown in (7). Sprite implements this through a mechanism we call tagged
dispatch. With this approach, the compiler assigns each symbol a tag at compile time.
Tags are sequential integers indicating which of the four classes discussed earlier the
node belongs to. The three lowest tags are reserved for functions, choices, and failures (all functions have the same tag). For constructors, the tag additionally indicates
which constructor of its type the symbol represents. To see how this works, consider the
following type definition:
data ABC = A | B | C
(9)
ABC comprises three constructors in a well-defined order (any fixed order would do).
To distinguish between them, Sprite tags these with sequential numbers starting at the
integer that follows the reserved tags. So, the tag of A is one less than the tag of B,
which is one less than the tag of C. These values are unique within the type, but not
throughout the program: the first constructor of each type, for instance, always has the
same tag. Following these rules, it is easy to see that every case discriminator is a node
tagged with one of 3 + N consecutive integers, where N is the number of constructors in
its type. To compile a case expression, Sprite emits a jump table that transfers control
to a code block appropriate for handling the discriminator tag. For example, the block
that handles failure rewrites to failure, and the block that handles choices executes a
pull-tab. This is shown schematically in Fig. 2. It is in general impossible to know at
compile time which constructors may be encountered when the program runs, so the
jump table must be complete. If a functional logic program does not define a branch
for some constructor — i.e., a function is not completely defined — the branch for that
constructor is a rewrite to failure.
To implement tagged dispatch, Sprite creates function-local code blocks as labels,
constructs a static jump table containing their addresses, and executes indirect branch
instructions — based on the discriminator tag — through the table. Figure 3 shows
a fragment of C code that approximates this. Case distinction occurs over a variable
of List type with two constructors, nil and cons. Five labeled code blocks handle
the five tags that may appear at the case discriminator. A static array of label address
implements the jump table. This example assumes the function, choice, failure, nil, and
cons tags take the values zero through four, respectively. The jump table contains one
extra case not depicted in (7). When the discriminator is a function, the step function of
the discriminator root label is applied as many times as necessary until the discriminator
class is no longer function.
discriminator
range 0 .. 4
0
function
1
choice
2
failure
3
nil
cons
4
Fig. 2: Schematic representation of the Sprite tagged dispatching mechanism for a distinction of a List type.
3.3 Completeness and Consistency
Sprite aims to be the first complete Curry compiler. Informally, complete means the
program produces all the intended results of the source program. More precisely, and
especially for infinite computations, an arbitrary value will eventually be produced,
given enough resources. This is a difficult problem because a non-terminating computation for obtaining one result could block progress of some other computation that
would obtain another result. For example, the following program has a result, 1, that
can be obtained in only a couple of steps, but existing Curry compilers fail to produce
it:
loop = loop
main = loop ? (1 ? loop)
(10)
The Fair Scheme defines a complete evaluation strategy. It creates a work queue containing all of the expressions that might produce a result. At all times, the expression at
the head of the queue is active, meaning it is being evaluated. Initially, the work queue
contains only the goal expression. Whenever pull-tabbing places a choice at the root
of an expression, that expression forks. It is removed from the queue, and its two alternatives are added. Whenever an expression produces a value, it is removed from the
queue. To avoid endlessly working on an infinite computation, the program rotates the
active computation to the end of the work queue every so often. In so doing, Sprite
guarantees that no expression is ignored forever, hence no potential result is lost.
A proof of correctness of compiled programs is provided in [7] for the abstract formulation of the compiler, the Fair Scheme. In this domain, correctness is the property
that an executable program produces all and only the values intended by the corresponding source program. A delicate point is raised by pull-tabbing. A pull-tab step may duplicate or clone a choice, as the following example shows. Cloned choices should be
static void* jump_table[5] = {
&function_tag, &choice_tag, &failure_tag, &nil_tag, &cons_tag
};
entry:
function_tag:
choice_tag:
failure_tag:
nil_tag:
cons_tag:
goto* jump_table[discriminator.tag];
call_step_function(discriminator);
goto* jump_table[discriminator.tag];
/*execute a pull tab*/
/*rewrite to failure*/
/*rewrite to []*/
/*process the nested case expression*/
Fig. 3: An illustrative implementation in C of the case expression shown in (7).
This code fragment would appear in the body of the step function for zip. Variable
discriminator refers to the case discriminator. Label entry indicates the entry point
into this case expression.
seen as a single choice. Thus when a computation reduces a choice to its right alternative, it should also reduce any other clone of the same choice to the right alternative,
and likewise for the left alternative. Computations obeying this condition are called
consistent.
xor x x where x = T ? F
→ pull−tab (xor T x) ? (xor F x) where x = T ? F
(11)
In the example above, a pull-tab step applied to the choice in x leads to its duplication.
Now, when evaluating either alternative of the topmost choice, a consistent strategy
must recognize that the remaining choice (in x) is already made. For instance, when
evaluating xor T x, the value of x can only be T, the left alternative, because the left
alternative of x has already been selected to obtain xor T x. To keep track of clones,
the Fair Scheme annotates choices with identifiers. Two choice nodes with identical
identifiers represent the same choice. Fresh identifiers are assigned when new choices
arise from a replacement; pull-tab steps copy existing identifiers. Every expression in
the work queue owns a fingerprint, which is a mapping from choice identifiers to values
in the set {left,right,either}. The fingerprint is used to detect and remove inconsistent
computations from the work queue.
It is possible to syntactically pre-compute pull-tab steps: that is, a case statement
such as the one in (7) could implement pull-tabbing by defining an appropriate righthand side rule for the choice branch. In fact, a major competing implementation of
Curry does exactly that [8]. A disadvantage of that approach is that choice identifers
must appear as first-class citizens of the program and be propagated through pull-tab
steps using additional rules not encoded in the source program. We believe it is more efficient to embed choice identifiers in choice nodes as an implementation detail and process pull-tab steps dynamically. Section 4.2 compares these two approaches in greater
detail.
4 Performance
In this section we present a set of benchmark results. These programs were previous
used to compare three implementations of Curry [8]: Mcc, Pakcs, and KiCS2. We shall
use KiCS2 to perform direct comparisons with Sprite1 , since it compares favorably to
the others, and mention the relative performance of the others. KiCS2 compiles Curry
to Haskell and then uses the Glasgow Haskell Compiler (GHC) [13] to produce executables. GHC has been shown to produce very efficient code [21,20,27]. Like Sprite,
KiCS2 uses a pull-tabbing evaluation strategy, but unlike Sprite, it does not form a work
queue; hence, is incomplete when faced with programs such as (10). Instead, it builds
a tree containing all values of the program and executes (lazily and with interleaved
steps) a user-selected search algorithm.
A major highlight of KiCS2 is that purely functional programs compile to “straight”
Haskell, thus incurring no overhead due to the presence of unused logic capabilities.
1
Available at https://github.com/andyjost/Sprite-3
Program
PaliFunPats
LastFunPats
Last
PermSortPeano
PermSort
ExpVarFunPats
Half
Reverse
ReverseUser
ReverseBuiltin
ReverseHO
Primes
ShareNonDet
PrimesBuiltin
PrimesPeano
QueensUser
Queens
TakPeano
Tak
Type
FL
FL
FL
FL
FL
FL
FL
F
F
F
F
F
FL
F
F
F
F
F
F
KiCS2
0.64
1.85
1.90
44.04
42.72
5.92
42.31
0.36
0.34
0.40
0.36
0.29
0.28
0.73
0.41
0.87
0.80
0.84
0.32
Sprite
0.09
0.30
0.31
8.14
8.15
1.29
9.55
0.21
0.21
0.39
0.39
0.32
0.33
1.10
0.66
1.83
1.81
2.08
0.92
∆
-7.1
-6.2
-6.1
-5.4
-5.3
-4.6
-4.4
-1.7
-1.6
-1.0
1.1
1.1
1.2
1.5
1.6
2.1
2.3
2.5
2.9
Fig. 4: Execution times for a set of functional (F) and functional-logic (FL) programs
taken from the KiCS2 benchmark suite. Times are in seconds. The final column (∆) reports the speed-up (negative) or slow-down (positive) factor of Sprite relative to KiCS2.
System configuration: Intel i5-3470 CPU at 3.20GHz, Ubuntu Linux 14.04.
Sprite, too, enjoys this zero-overhead property, but there is little room to improve upon
GHC for functional programs, as it is the beneficiary of exponentially more effort. Our
goal for functional programs, therefore, is simply to measure and minimize the penalty
of running Sprite. For programs that utilize logic features KiCS2 emits Haskell code
that simulates non-determinism. In these cases, there is more room for improvement
since, for example, Sprite can avoid simulation overhead by more directly implementing logic features.
4.1 Functional Programs
The execution times for a set of programs taken from the KiCS2 benchmark suite2 are
shown in Fig. 4. The results are arranged in order from greatest improvement to greatest
degradation in execution time. The most striking feature is the clear division between
the functional (deterministic) and functional-logic (non-deterministic) subsets, which is
consistent with our above-stated expectations. On average, Sprite produces relatively
slower code for functional programs and relatively faster code for functional-logic ones.
We calculate averages as the geometric mean, since that method is not strongly influenced by extreme results in either direction. The functional subset runs, on average,
1.4x slower in Sprite as compared to KiCS2. Figures published by Braßel et al. [8,
2
Downloaded from https://www-ps.informatik.uni-kiel.de/kics2/benchmarks.
Fig.2, Fig.3] indicate that Pakcs and Mcc run 148x and 9x slower than KiCS2, respectively, for these programs. We take these results as an indication that the functional parts
of Sprite — i.e., those parts responsible for pattern-matching, rewriting, memory management, and optimization — although not as finely-tuned as their GHC counterparts,
still compare favorably to most mainstream Curry compilers.
We note that Sprite currently does not perform optimizations such as deforestation
[14] or unboxing [21]. These, and other optimizations of ICurry, e.g., [6], could potentially impact the benchmark results. Inspecting the output of GHC reveals that the
tak program (incidentally, the worse-case for Sprite) is optimized by GHC to a fullyunboxed computation. To see how LLVM stacks up, we rewrote the program in C and
converted it to LLVM using Clang [11], a C language front-end for LLVM. When we
compiled this to native code and measured the execution time, we found that it was
identical3 to the KiCS2 (and GHC) time. We therefore see no fundamental barrier to reducing the Sprite “penalty” to zero for this program, and perhaps others, too. We have
reason to be optimistic that implementing more optimizations at the source and ICurry
levels, without fundamentally changing the core of Sprite, will yield substantive improvements to Sprite.
4.2 Functional-Logic Programs
For the functional-logic subset, Fig. 4 shows that Sprite produces relatively faster code:
4.4x faster, on average. Published comparisons [8, Fig.4] indicate that, compared to
KiCS2, Pakcs is 5.5x slower and Mcc is 3.5x faster for these programs. Our first thought
after seeing this result was that Sprite might enjoy a better algorithmic complexity. We
had just completed work to reduce Sprite’s complexity when processing choices, so
perhaps, we thought, in doing that work we had surpassed KiCS2. We set out to test
this by selecting a program dominated by choice generation and running it for different input sizes, with and without the recent modifications to Sprite. The results are
shown in Fig. 5. Contrary to our expectation, Sprite and KiCS2 exhibit strikingly similar complexity: both fit an exponential curve with r2 in excess of 0.999, and their slope
coefficients differ by less than 2%. A better explanation, then, for the difference is that
some constant factor c exists, such that choice-involved steps in Sprite are c-times faster
than in KiCS2. What could account for this factor? We believe the best explanation is
the overhead of simulating non-determinism in Haskell, which we alluded to at the end
of Sect. 3.3. To see why, we need to look at KiCS2 in more detail.
KiCS2 uses a few helper functions [8, Sect. 3.1] to generate choice identifiers:
thisID
:: IDSupply -> ID
leftSupply :: IDSupply -> IDSupply
rightSupply :: IDSupply -> IDSupply
(12)
The purpose of these functions is to ensure that choice identifiers are never reused.
Here, ID is the type of a choice identifier and IDSupply is opaque (for our purposes).
Any function that might produce a choice is implicitly extended by KiCS2 to accept a
supply function. As an example, this program
3
Using the Linux time command, whose resolution is 0.01 seconds.
Fig. 5: Complexity analysis of PermSort. Execution times are shown for a range of
problem sizes. The horizontal axis indicates the number of integers to sort by the
permute-and-test method.
f :: Bool
main = xor f (False ? True)
(13)
is compiled to
main s = let s1 = leftSupply s
s2 = rightSupply s
s3 = leftSupply s2
s4 = rightSupply s2
in xor (f s3) (Choice (thisID s4) False True) s1
(14)
Clearly, the conversion to Haskell introduces overhead. The point here is simply to see
that the compiled code involves five calls (to helper functions) that were not present in
the source program. These reflect the cost of simulating non-determinism in a purelyfunctional language.
In Sprite, fresh choice identifiers are created by reading and incrementing a static
integer. Compared to the above approach, fewer parameters are passed and fewer functions are called. A similar approach could be used in a Haskell implementation of Curry,
but it would rely on impure features, adding another layer of complexity and perhaps
interfering with optimizations. By contrast, the Sprite approach is extreme in its simplicity, as it executes only a few machine instructions. There is a remote possibility that
a computation could exhaust the supply of identifiers since the type integer is finite.
KiCS2 uses a list structure for choice identifiers and so does not suffer from this potential shortcoming. Certainly, the choice identifiers could be made arbitrarily large, but
doing so increases memory usage and overhead. A better approach, we believe, would
be to compact the set of identifiers during garbage collection. The idea is that whenever
a full collection occurs, Sprite would renumber the n choice identifiers in service at that
time so that they fall into the contiguous range 0, . . . , n − 1. This potential optimization
illustrates the benefits of having total control over the implementation, since in this case
it makes modifying the garbage collector a viable option.
5 Related Work
Several Curry compilers are easily accessible, most notably Pakcs [19], KiCS2 [8] and
Mcc [25]. All these compilers implement a lazy evaluation strategy, based on definitional trees, that executes only needed steps, but differ in the control strategy that selects
the order in which the alternatives of a choice are executed.
Both Pakcs and Mcc use backtracking. They attempt to evaluate all the values of the
left alternative of a choice before turning to the right alternative. Backtracking is simple
and relatively efficient, but incomplete. Hence, a benchmark against these compilers
may be interesting to understand the differences between backtracking and pull-tabbing,
but not to assess the efficiency of Sprite.
By contrast, KiCS2’s control strategy uses pull-tabbing, hence the computations executed by KiCS2 are much closer to those of Sprite. KiCS2’s compiler translates Curry
source code into Haskell source code which is then processed by GHC [13], a mainstream Haskell compiler. The compiled code benefits from a variety of optimizations
available in GHC. Section 4 contains a more detailed comparison between Sprite and
KiCS2.
There exist other functional logic languages, e.g., T OY [10,24], whose operational
semantics can be abstracted by needed narrowing steps of a constructor-based graph
rewriting system. Some of our ideas could be applied with almost no changes to the
implementation of these languages.
A comparison with graph machines for functional languages is problematic at best.
Despite the remarkable syntactic similarities, Curry’s syntax extends Haskell’s with
a single construct, a free variable declaration, the semantic differences are profound.
There are purely functional programs whose execution produces a result as Curry, but
does not terminate as Haskell [5, Sect. 3]. Furthermore, functional logic computations
must be prepared to encounter non-determinism and free variables. Hence, situations
and goals significantly differ.
6 Future Work
Compilers are among the most complex software artifacts. They are often bundled with
extensions and additions such as optimizers, profilers, tracers, debuggers, external libraries for application domains such as databases or graphical user interfaces. Given
this reality, there are countless opportunities for future work. We have no plans at this
time to choose any one of the extensions and additions listed above before any other.
Some optimizations mentioned earlier, e.g., unboxing integers, are appealing only because they would improve some benchmark, and thus the overall perceived performance
of the compiler, but they may contribute very marginally to the efficiency of more realistic programs. Usability-related extensions and additions, such as aids for tracing and
debugging an execution, and external libraries may better contribute to the acceptance
of our work.
7 Conclusion
We have presented Sprite, a new native code compiler for Curry. Sprite combines the
best features of existing Curry compilers. Similar to KiCS2, Sprite’s strategy is based
on pull-tabbing, hence there is no an inherent loss of completeness of compilers based
on backtracking such as Pakcs and Mcc. Similar to Mcc, Sprite compiles to an imperative target language, hence is amenable to low-level machine optimization. Differently
from all existing compilers, Sprite is designed to ensure operational completeness—
all the values of an expression are eventually produced given enough computational
resources.
Sprite’s main intermediate language, ICurry, represents programs as graph rewriting systems. We described the implementation of Curry programs in imperative code
using concepts of a low-level target language. Graph nodes are represented in memory
as heap objects, and an efficient mechanism called tagged dispatch is used to perform
pattern matches. Finally, we discussed the mechanisms used by Sprite to ensure completeness and consistency, and presented empirical data for a set of benchmarking programs. The benchmarks reveal that Sprite is competitive with a leading implementation
of Curry.
References
1. S. Antoy. Definitional trees. In H. Kirchner and G. Levi, editors, Proceedings of the Third
International Conference on Algebraic and Logic Programming, pages 143–157, Volterra,
Italy, September 1992. Springer LNCS 632.
2. S. Antoy. On the correctness of pull-tabbing. TPLP, 11(4-5):713–730, 2011.
3. S. Antoy and M. Hanus. Declarative programming with function patterns. In 15th Int’nl
Symp. on Logic-based Program Synthesis and Transformation (LOPSTR 2005), pages 6–22,
London, UK, September 2005. Springer LNCS 3901.
4. S. Antoy and M. Hanus. Overlapping rules and logic variables in functional logic programs.
In Twenty Second International Conference on Logic Programming, pages 87–101, Seattle,
WA, August 2006. Springer LNCS 4079.
5. S. Antoy and M. Hanus. Functional logic programming. Comm. of the ACM, 53(4):74–85,
April 2010.
6. S. Antoy, J. Johannsen, and S. Libby. Needed computations shortcutting needed steps. In
A. Middeldorp and F. van Raamsdonk, editors, Proceedings 8th International Workshop on
Computing with Terms and Graphs, Vienna, Austria, July 13, 2014, volume 183 of Electronic
Proceedings in Theoretical Computer Science, pages 18–32. Open Publishing Association,
2015.
7. S. Antoy and A. Jost. Compiling a functional logic language: The fair scheme. In 23rd Int’nl
Symp. on Logic-based Program Synthesis and Transformation (LOPSTR 2013), pages 129–
143, Madrid, Spain, Sept. 2013. Dpto. de Systems Informaticos y Computation, Universidad
Complutense de Madrid, TR-11-13.
8. B. Braßel, M. Hanus, B. Peemöller, and F. Reck. KiCS2: A new compiler from Curry to
Haskell. In Proc. of the 20th International Workshop on Functional and (Constraint) Logic
Programming (WFLP 2011), pages 1–18. Springer LNCS 6816, 2011.
9. B. Brassel and F. Huch. On a tighter integration of functional and logic programming. In
APLAS’07: Proceedings of the 5th Asian conference on Programming languages and systems, pages 122–138, Berlin, Heidelberg, 2007. Springer-Verlag.
10. R. Caballero and J. Sánchez, editors. TOY: A Multiparadigm Declarative Language (version
2.3.1), 2007. Available at http://toy.sourceforge.net.
11. clang: a C language family frontend for LLVM, 2016.
Available at
http://www.clang.llvm.org/.
12. R. Echahed and J. C. Janodet.
On constructor-based graph rewriting systems.
Technical Report 985-I, IMAG, 1997.
Available at
ftp://ftp.imag.fr/pub/labo-LEIBNIZ/OLD-archives/PMP/c-graph-rewriting.ps.gz.
13. The Glasgow Haskell Compiler, 2013. Available at http://www.haskell.org/ghc/.
14. A. Gill, J. Launchbury, and S. L Peyton Jones. A short cut to deforestation. In Proceedings
of the conference on Functional programming languages and computer architecture, pages
223–232. ACM, 1993.
15. J. R. W. Glauert, R. Kennaway, G. A. Papadopoulos, and M. R. Sleep. Dactl: an experimental
graph rewriting language. J. Prog. Lang., 5(1):85–108, 1997.
16. M. Hanus, editor. Curry: An Integrated Functional Logic Language (Vers. 0.8.2), 2006.
Available at http://www-ps.informatik.uni-kiel.de/currywiki/.
17. M. Hanus. Flatcurry: An intermediate representation for Curry programs, 2008. Available
at http://www.informatik.uni-kiel.de/~curry/flat/.
18. M. Hanus. Functional logic programming: From theory to Curry. In Programming Logics Essays in Memory of Harald Ganzinger, pages 123–168. Springer LNCS 7797, 2013.
19. M. Hanus, editor. PAKCS 1.11.4: The Portland Aachen Kiel Curry System, 2014. Available
at http://www.informatik.uni-kiel.de/~pakcs.
20. S. L. Peyton Jones. Compiling haskell by program transformation: A report from the
trenches. In Programming Languages and SystemsâĂŤESOP’96, pages 18–44. Springer,
1996.
21. S. Peyton Jones and A. Santos. Compilation by transformation in the glasgow haskell compiler. In Functional Programming, Glasgow 1994, pages 184–204. Springer, 1995.
22. C. Lattner and V. Adve. LLVM: A compilation framework for lifelong program analysis
and transformation. In Proceedings of the international symposium on Code generation and
optimization: feedback-directed and runtime optimization (CGO 04), pages 75–88, San Jose,
CA, USA, Mar 2004.
23. F. J. López-Fraguas and J. de Dios-Castro. Extra variables can be eliminated from functional
logic programs. Electron. Notes Theor. Comput. Sci., 188:3–19, 2007.
24. F. J. López-Fraguas and J. Sánchez-Hernández. TOY: A multiparadigm declarative system.
In Proceedings of the Tenth International Conference on Rewriting Techniques and Applications (RTA’99), pages 244–247. Springer LNCS 1631, 1999.
25. W. Lux, editor.
The Muenster Curry Compiler, 2012.
Available at
http://danae.uni-muenster.de/~lux/curry/.
26. S. Marlow and S. Peyton Jones. Making a fast curry: Push/enter vs. eval/apply for higherorder languages. In Proceedings of the Ninth ACM SIGPLAN International Conference on
Functional Programming, ICFP ’04, pages 4–15, New York, NY, USA, 2004. ACM.
27. W. Partain. The nofib benchmark suite of haskell programs. In Functional Programming,
Glasgow 1992, pages 195–202. Springer, 1993.
28. S. L Peyton Jones and J. Salkild. The spineless tagless g-machine. In Proceedings of the
fourth international conference on Functional programming languages and computer architecture, pages 184–201. ACM, 1989.
| 6cs.PL
|
arXiv:1711.10238v2 [math.GR] 15 Feb 2018
Stability, cohomology vanishing, and
non-approximable groups
Marcus De Chiffre, Lev Glebsky, Alexander Lubotzky, and Andreas Thom
Abstract. Several well-known open questions (such as: are all
groups sofic/hyperlinear?) have a common form: can all groups be
approximated by asymptotic homomorphisms into the symmetric
groups Sym(n) (in the sofic case) or the finite dimensional unitary groups U(n) (in the hyperlinear case)? In the case of U(n),
the question can be asked with respect to different metrics and
norms. This paper answers, for the first time, one of these versions, showing that there exist fintely presented groups which are
not approximated
by U(n) with respect to the Frobenius norm
√ n
∥T ∥Frob = ∑i,j=1 ∣Tij ∣2 , T = [Tij ]ni,j=1 ∈ Mn (C). Our strategy is
to show that some higher dimensional cohomology vanishing phenomena implies stability, that is, every Frobenius-approximate homomorphism into finite-dimensional unitary groups is close to an
actual homomorphism. This is combined with existence results of
certain non-residually finite central extensions of lattices in some
simple p-adic Lie groups. These groups act on high rank BruhatTits buildings and satisfy the needed vanishing cohomology phenomenon and are thus stable and not Frobenius-approximated.
1. Introduction
Since the very beginning of the study of groups, groups were studied
by looking at their orthogonal and unitary representations. It is very
natural to relax the notion of a representation and require the group
multiplication to be preserved only up to little mistakes in a suitable
metric. First variations of this topic appeared already in the work of
Turing [49] and later Ulam [50, Chapter VI]. This theme knows many
variations, ranging from sofic approximations as introduced by Gromov
[26] and operator-norm approximations that appeared in the theory of
operator algebras [9, 14] to questions related to Connes’ Embedding
Problem, see [15,36] for details. In each case, approximation properties
of groups are studied relative to a particular class of metric groups.
More specifically, let Γ be a countable group and let (Gn , dn )∞
n=1 be a
sequence of metric groups with bi-invariant metrics dn . We say that
Γ is (Gn , dn )∞
n=1 -approximated, if there exists a separating sequence of
1
2
M. DE CHIFFRE, L. GLEBSKY, A. LUBOTZKY, AND A. THOM
asymptotic homomorphisms ϕn ∶ Γ → Gn , i.e. a sequence of maps ϕn
that becomes multiplicative in the sense that
lim dn (ϕn (gh), ϕn (g)ϕn (h)) = 0,
n→∞
for all g, h ∈ Γ,
which is also separating, that is, dn (ϕn (g), 1Gn ) is bounded away from
zero for all g ≠ 1Γ , see Section 1.4 for precise definitions. Several examples of this situation have been studied in the literature (see [2] for
a survey):
(i) Gn = Sym(n), the symmetric group on an n-point set, with dn
the normalized Hamming distance. In this case, (Gn , dn )∞
n=1 approximated groups are called sofic, see [26, 36].
(ii) Gn an arbitrary finite group equipped with any bi-invariant
metric. In this case, approximated groups are called weakly
sofic, or C-approximated depending on a particular restricted
family C of finite groups. An interesting connection to profinite group theory and recent advances can be found in [25,
32].
(iii) Gn = U(n), the unitary group on an n-dimensional Hilbert
space, where the metric √
dn is induced by the normalized HilbertSchmidt norm ∥T ∥HS = n−1 ∑ni,j=1 ∣Tij ∣2 . In this case, approximated groups are sometimes called hyperlinear [36].
(iv) Gn = U(n), where the metric dn is induced by the operator
norm ∥T ∥op = sup∥v∥=1 ∥T v∥. In this case, groups which are
(Gn , dn )∞
n=1 -approximated groups are called MF, see [14].
(v) Gn = U(n), where the metric dn is induced
√ n by the unnormalized Hilbert-Schmidt norm ∥T ∥Frob = ∑i,j=1 ∣Tij ∣2 , also called
Frobenius norm. We will speak about Frobenius-approximated
groups in this context.
Note that the approximation properties are local in the sense that
only finitely many group elements and their relations have to be considered for fixed ϕn . This is in stark contrast to the uniform situation,
which – starting with the work of of Grove-Karcher-Ruh and Kazhdan
[27, 29] – is much better understood, see [13, 16].
Well-known and longstanding problems, albeit in different fields of
mathematics, ask if any group exists which is not approximated in
either of the above settings. In setting (i), this is Gromov’s question
whether all groups are sofic [26,36]. The similar question in the context
of (iii) is closely related to Connes’ Embedding Problem [15, 36]. Indeed, the existence of a non-hyperlinear group, whould answer Connes’
Embedding Problem in the negative. In [9], Kirchberg asked whether
any stably finite C ∗ -algebra is embeddable into an norm-ultraproduct
of matrix algebras, implying a positive answer to the approximation
ASYMPTOTIC REPRESENTATIONS
3
problem in the sense of (iv) for any group. Recent breakthrough results imply that any amenable group is MF, i.e. approximated in the
sense of (iv), see [45].
In this paper, we want to introduce a conceptually new technique
that allows us to provide groups that are not approximated in the
sense of (v) above, i.e. we show that there are finitely presented groups
which are not approximated by unitary groups {U(n) ∣ n ∈ N} with
their Frobenius norm. Our techniques do not apply directly to the
context of (iii), so we cannot say anything conclusive about Connes’
Embedding Problem, but since the norms in (iii) and (v) are related
by a normalization constant, we believe that we provide a promising
new angle of attack.
Before we start out explaining our strategy and some notation let
us state the main results of this article.
Theorem 1.1. There exist finitely presented groups which are not
Frobenius-approximated.
The groups we construct are central extensions of cocompact lattices in simple p-adic Lie groups. Specifically, we can take certain
central extensions of U(2n) ∩ Sp(2n, Z[i, 1/p]) for n ≥ 3 and p a large
enough prime.
To prove Theorem 1.1, we use the notion of stability: A group is
called (Gn , dn )-stable if every asymptotic homomorphism (not necessarily a separating one) is “close” to a true homomorphism (see Definition 1.9). Now, if Gn = U(n) and Γ is (Gn , dn )-approximated and
(Gn , dn )-stable, one easily deduces that Γ must be residually finite.
This basic observation suggests a way to find non-approximated groups:
find a group Γ which is stable but not residually finite. This method
has failed so far for two reasons: (1) it is very difficult to prove stability
directly and (2) even in the case where stability was proven, (see e.g.
[3] and the references therein as well as [7]) it was proven in a way that
completely classifies asymptotic homomorphism and it is shown that
all are close to a genuine homomorphisms. Thus, only groups which
are already approximated have been shown to be stable so far. The
main technical novelty of our paper is the following theorem which provides a sufficient condition for a group to be Frobenius-approximated
without assuming a priori that the group is approximated.
Theorem 1.2. Let Γ be a finitely presented group such that
H 2 (Γ, Hπ ) = {0}
for every unitary representation π∶ Γ → U(Hπ ). Then, any asymptotic
homomorphism ϕn ∶ Γ → U(n) w.r.t. the Frobenius norm is asymptotically close to a sequence of homomorphisms, i.e. Γ is Frobenius-stable.
The appearance of vanishing second cohomology groups may look
surprising at first sight, but, inf fact, one can translate the question of
4
M. DE CHIFFRE, L. GLEBSKY, A. LUBOTZKY, AND A. THOM
approximating an asymptotic homomorphism by a true homomorphism
to a question about splitting an exact sequence. When the norm is
submultiplicative (as is the case of the Frobenius norm but not of the
normalized Hilbert-Schmidt norm) the kernel of this splitting problem
is abelian (see Section 3.4). It is well-known that vanishing of the
second cohomology with abelian coefficients means splitting of suitable
exact sequences and hence is relevant the question of stability. It is
also interesting to observe that the second cohomology has already
appeared in the work of Kazhdan [29] in the context of uniform εrepresentations (of compact or amenable groups), a concept related to
asymptotic representations, abeit essentially different.
Recall that the classical Kazhdan’s Property (T) is equivalent to
the statement that H 1 (Γ, Hπ ) = 0 for all unitary representations π∶ Γ →
U(Hπ ). We say that a group is n-Kazhdan if H n (Γ, Hπ ) = {0} for
every unitary representation π∶ Γ → U(Hπ ). Theorem 1.2 simply says
that every 2-Kazhdan group is Frobenius stable. Thus to prove Theorem 1.1 it suffices to find 2-Kazhdan groups which are not residually
finite. Now, the seminal work of Garland [23] (as was extended by
Ballmann-Świątkowski [5] and others – see Section 4 for details) shows
that for every 2 ≤ r ∈ N and p large enough, cocompact (arithmetic)
lattices in simple p-adic Lie groups of rank r are n-Kazhdan for every
1 ≤ n < r. In fact, a variant of this has been used to give examples of
groups with Property (T), i.e. 1-Kazhdan groups, which are not linear
(and potentially also not residually finite) by using “exotic” buildings
of rank 2 (see [33]). We want to prove the existence of non-residually
finite 2-Kazhdan groups, but there is a catch: as n = 2, r should be
at least 3, but a well-known result of Tits asserts that for r ≥ 3, there
are no “exotic” buildings of dimension r and the standard ones coming
from p-adic Lie groups provide lattices which are all residually finite.
To work around this point, we imitate a result (and method of proof)
of Deligne [17]. Deligne showed that some non-uniform lattices in simple Lie groups (e.g. Sp(2n, Z)) have finite central extensions which are
not residually finite. Raghunathan [41] extended it also to some cocompact lattices in Spin(2, n). These examples became famous when
Toledo [47] used them to provide examples of fundamental groups of
algebraic varieties which are not residually finite. In the last section,
we will explain how Deligne’s method can be applied also to cocompact
lattices in certain p-adic Lie groups. Along the way we use the solution
to the congruence subgroup problem for these lattices which was provided by Rapinchuk [43] and Tomanov [48]. This way we will get finite
central extensions of certain cocompact p-adic lattices which are themselves not residually finite anymore. Finally, an easy spectral sequence
argument shows that a finite (central) extension of an n-Kazhdan group
is also n-Kazhdan. Thus, the non-residually finite central extensions of
ASYMPTOTIC REPRESENTATIONS
5
the abovementioned lattices provide the non-Frobenius-approximated
group promised in Theorem 1.1.
Along the way in Section 2, we also provide examples of residually
finite groups which are not Frobenius-stable and of finitely generated
non-residually finite groups which are Frobenius-approximated. It is
currently unclear if maybe all amenable (or even all solvable) groups
are Frobenius-approximated. Moreover, it is an open problem to decide
if the class of Frobenius-approximated groups is closed under central
quotients or under crossed products by Z, compare with [34, 46].
The results of this article are part of the PhD project of the first
named author.
1.1. Notation. Given any set S we let FS denote the free group on
S. For any R ⊆ FS we let ⟪R⟫ denote the normal subgroup generated
by R and we let ⟨S ∣ R⟩ ∶= FS /⟪R⟫ be the group with generators S
and relations R. We use the convention N = {1, 2, . . .}. For n ∈ N we
let Mn (C) denote the complex n × n-matrices and U(n) ⊆ Mn (C) the
group of unitary matrices. The identity matrix is denoted by 1n .
Recall, an ultrafilter U on N is a non-trivial collection of subsets
of N, such that (i) A ∈ U , A ⊂ B implies B ∈ U , (ii) A, B ∈ U implies
A ∩ B ∈ U , and (iii) A ∈/ U if and only if N ∖ A ∈ U holds. We say that U
is non-principal if {n} ∈/ U for all n ∈ N. The existence of non-principal
ultrafilters on N is ensured by the Axiom of Choice. We can view a nonprincipal ultrafilter as a finitely additive probability measure defined
on all subsets of N, taking only the values {0, 1} and giving the value
0 to all finite subsets of N.
Throughout the whole paper, we fix a non-principal ultrafilter U on
N. Given some statement P (n) for n ∈ N, we use the wording P (n)
holds for most n ∈ N as {n ∈ N ∣ P (n)} ∈ U . Given a bounded sequence
(xn )n∈N of real numbers we denote the limit along the ultrafilter by
limn→U xn ∈ (−∞, ∞). Formally, the limit is the unique real number x
such for all ε > 0 we have {n ∈ N ∣ ∣xn − x∣ < ε} ∈ U . For unbounded
sequences, the limit takes a well-defined value in the extended real line
[−∞, ∞].
We adopt the Landau notation; given two sequences (xn )n∈N and
(yn )n∈N of non-negative real numbers, we write xn = OU (yn ) if there
exists C > 0 such that xn ≤ Cyn for most n ∈ N and xn = oU (yn ) if there
exists a third sequence (εn )n∈N of non-negative real numbers such that
limn→U εn = 0 and xn = εn yn .
1.2. Unitarily invariant norms. Recall that a norm ∥⋅∥ on Md (C)
is called unitarily invariant if
∥UAV ∥ = ∥A∥,
for all A ∈ Md (C) and U, V ∈ U(d).
6
M. DE CHIFFRE, L. GLEBSKY, A. LUBOTZKY, AND A. THOM
Important examples of such norms are the operator norm
∥op =
√ ∥T
n
∗
1/2
sup∥v∥=1 ∥T v∥, the Frobenius norm ∥T ∥Frob = Tr(T T ) = ∑i,j ∣Tij ∣2
(also known as the unnormalized Hilbert-Schmidt norm) and the normalized Hilbert-Schmidt norm (or 2-norm) given by ∥T ∥HS = √1n ∥T ∥Frob
for T ∈ Mn (C). Here, T ∗ denotes the adjoint matrix and T is called selfadjoint if T = T ∗ . The matrix T is called unitary if T T ∗ = T ∗ T = 1n .
We recall some basic and well-known facts about unitarily invariant
norms. For T ∈ Mn (C), we set ∣T ∣ = (T ∗ T )1/2 . For self-adjoint matrices
A, B, we write A ≤ B if B − A is positive semi-definite, i.e. if B − A has
only non-negative eigenvalues.
Proposition 1.3. Let A, B, C ∈ Md (C). Then, for any unitarily
invariant norm, it holds that
(1) ∥ABC∥ ≤ ∥A∥op ∥B∥∥C∥op ,
(2) ∥A∥ = ∥A∗ ∥ = ∥∣A∣∥,
(3) If A and B are positive semi-definite matrices and A ≤ B, then
∥A∥ ≤ ∥B∥.
Proposition 1.4. Let A ∈ U(d). Then there is a unitary B ∈ U(d)
such that B 2 = 1 and
∥B − A∥≤ ∥1d − A2 ∥,
for all unitarily invariant norms.
Proof. By unitary invariance, we may assume that A is a diagonal
matrix, which we denote A = diag(a1 , . . . , ad ). Let
1,
if Re(aj ) ≥ 0,
bj ∶= {
−1, if Re(aj ) < 0.
One readily sees that ∣bj − aj ∣ ≤ ∣1 − aj ∣∣ − 1 − aj ∣ = ∣1 − a2j ∣. Thus B =
diag(b1 , . . . , bd ) is a self-adjoint unitary and by Proposition 1.3 (3)
∥B − A∥ = ∥∣B − A∣∥ ≤ ∥∣1d − A2 ∣∥ = ∥1d − A2 ∥.
A second property that is important to us is submultiplicativity,
that is, ∥AB∥ ≤ ∥A∥∥B∥ for all A, B ∈ Md (C). This property turns
(Md (C), ∥⋅∥) into a Banach algebra. The operator norm and the Frobenius norm enjoy this property, but the normalized Hilbert-Schmidt
norm does not.
1.3. Ultraproducts. We will need the definition of the ultraproduct of Banach spaces and metric groups, respectively. First, let
(Vn )n∈N be a sequence of Banach spaces. Consider the ℓ∞ -direct product ∏n∈N Vn (i.e. the Banach space of bounded sequences (vn )n∈N with
vn ∈ Vn ) and the closed subspace of nullsequences
I ∶= {(vn )n∈N ∈ ∏ Vn ∣ lim ∥vn ∥Vn = 0} .
n∈N
n→U
ASYMPTOTIC REPRESENTATIONS
7
We define the ultraproduct Banach space by
∏ (Vn , ∥⋅∥Vn ) ∶= ∏ Vn /I.
n∈N
n→U
As the name suggests, the ultraproduct Banach space is itself a Banach
space with the norm induced by ∥(xn )n∈N ∥ = limn→U ∥xn ∥Vn for (xn )n∈N ∈
∏n∈N Vn . Moreover, if the Vn are all Banach algebras, C ∗ -algebras or
Hilbert spaces, so is the ultraproduct.
Let (Gn )n∈N be a family of groups, all equipped with bi-invariant
metrics dn . In this case, the subgroup
N = {(gn )n∈N ∈ ∏ Gn ∣ lim dn (gn , 1Gn ) = 0}
n→U
n∈N
of the direct product ∏n∈N Gn is normal, so we can define the metric
ultraproduct
∏ (Gn , dn ) ∶= ∏ Gn /N.
n→U
n∈N
Note that, in contrast to the Banach space definition we do not require
the sequences to be bounded. It is worth noting (albeit not relevant for
our purposes) that the bi-invariant metric
d((gn )n∈N , (hn )n∈N ) = lim min{dn (gn , hn ), 1},
n→U
gn , hn ∈ Gn
on ∏n∈N Gn induces a bi-invariant metric on ∏n→U (Gn , dn ).
The above definitions will be relevant to us in the following setting.
Let (kn )n∈N be a sequence of natural numbers and consider the family of
matrix algebras Vn ∶= Mkn (C) equipped with some unitarily invariant,
submultiplicative norms ∥⋅∥n . We usually omit the index and denote
all the norms by ∥⋅∥. Let Gn ∶= U(kn ), equipped with the metrics
dist∥⋅∥n (g, h) = ∥g − h∥n , g, h ∈ Gn induced from the norms. We consider
the ultraproduct Banach space
MU ∶= ∏ (Mkn (C), ∥⋅∥n ),
∥⋅∥
n→U
and the metric ultraproduct
UU ∶= ∏ (U(kn ), dist∥⋅∥n ).
∥⋅∥
n→U
By submultiplicativity of the norms, we see that if un ∈ U(kn ) with
limn→U dist∥⋅∥n (un , 1kn ) = 0 then
lim ∥un Tn − Tn ∥n ≤ lim ∥un − 1kn ∥n ⋅ ∥Tn ∥n = 0,
n→U
n→U
for all bounded sequences Tn ∈ Mkn (C). Thus left multiplication by
∥⋅∥
∥⋅∥
un induces a left action of UU on MU . By unitary invariance of the
norms, we see that this action is isometric. Similarly, we have a right
action by right multiplication and another left action by conjugation –
both of them isometric.
8
M. DE CHIFFRE, L. GLEBSKY, A. LUBOTZKY, AND A. THOM
1.4. Asymptotic homomorphisms. In this section, we let Γ =
⟨S ∣ R⟩ be a fixed finitely presented group (i.e. S and R are finite) and
we let C be a class of groups, all equipped with bi-invariant metrics.
Any map ϕ∶ S → G, for some G ∈ C, uniquely determines a homomorphism FS → G which we will also denote by ϕ.
Definition 1.5. Let G ∈ C and let ϕ, ψ∶ S → G be maps. The defect
of ϕ is defined by
def(ϕ) ∶= max dG (ϕ(r), 1G ).
r∈R
The distance between ϕ and ψ is defined by
dist(ϕ, ψ) = max dG (ϕ(s), ψ(s)).
s∈S
The homomorphism distance of ϕ is defined by
HomDist(ϕ) ∶=
inf
π∈Hom(Γ,G)
dist(ϕ, π∣S ).
Definition 1.6. A sequence of maps ϕn ∶ S → Gn , for Gn ∈ C, is
called an asymptotic homomorphism if limn→U def(ϕn ) = 0.
We will mainly be concerned with finite dimensional asympotic
representations, that is, asymptotic homomorphisms with respect to
the class of unitary groups U(n) on finite dimensional Hilbert spaces,
equipped with the metrics
d(T, S) = ∥T − S∥,
T, S ∈ U(n),
coming from some family of unitarily invariant norms ∥⋅∥. The class of
finite-dimensional unitary groups with metrics coming from∥⋅∥op , ∥⋅∥Frob
and ∥⋅∥HS are denoted Uop , UFrob , and UHS .
We might also find the need to quantify the above definition.
Definition 1.7. Let ε > 0 and G ∈ C. An ε-almost homomorphism
is a map ϕ∶ S → G such that def(ϕ) ≤ ε.
In the literature, there are many different (inequivalent) notions of
“almost”, “asymptotic” and “quasi-” homomorphisms. If one would be
precise, the above notion of asymptotic homomorphism could be called
a local, discrete asymptotic homomorphism. Local, since we are only
interested in the behaviour of ϕn on the set of relations R (compare
with the uniform situation [13]) and discrete, because the family of
homomorphisms are indexed by the natural numbers.
Definition 1.8. Let Gn ∈ C, n ∈ N. Two sequences ϕn , ψn ∶ S → Gn
are called (asymptotically) equivalent if limn→U dist(ϕn , ψn ) = 0.
If an asymptotic homomorphism (ϕn )n∈N is equivalent to a sequence
of genuine representations, we call (ϕn )n∈N trivial or liftable.
We will now come to two central notions that we study in this
paper, the notion of stability and approximability by a class of metric
groups.
ASYMPTOTIC REPRESENTATIONS
9
Definition 1.9. The group Γ is called C-stable if all asymptotic
homomorphisms are equivalent to a sequence of homomorphisms, that
is,
lim HomDist(ϕn ) = 0,
n→U
for all ϕn ∶ S → Gn , Gn ∈ C, n ∈ N with limn→U def(ϕn ) = 0.
Definition 1.10. A finitely presented group Γ = ⟨S ∣ R⟩ is called Capproximated, if there exists an asymptotic homomorphism ϕn ∶ S → Gn ,
Gn ∈ C, n ∈ N such that
lim dn (ϕn (x), 1Gn ) > 0,
n→U
for all x ∈ FS /⟪R⟫.
We will be mainly concerned with UFrob -approximation and UFrob stability in this paper and, for convenience, we will often just speak
about Frobenius-approximation and Frobenius-stability in this context.
Definition 1.11. A group Γ is called residually C if for all x ∈
Γ/{1Γ} there is a homomorphism π∶ Γ → G for some G ∈ C such that
π(x) ≠ 1G .
The following proposition (see [25] or [3]) is evident from the definitions, nevertheless a central observation in our work.
Proposition 1.12. Let Γ be a finitely presented. If Γ is C-stable
and C-approximated group, then it must be residually C. In particular,
if the class C consists of finite-dimensional unitary groups, any finitely
presented, C-stable and C-approximated group is residually finite.
We finish this section with a basic lemma. The important part in
the statement of the lemma is that Kr does not depend on ϕ.
Lemma 1.13. For all r ∈ ⟪R⟫ there is a constant Kr such that for
all groups G with a bi-invariant metric and all maps ϕ∶ S → G it holds
that
dG (ϕ(r), 1G ) ≤ Kr def(ϕ).
Proof. If r ∈ ⟪R⟫ we can determine r1 , . . . , rk ∈ R ∪ R−1 and
x1 , . . . , xk ∈ FS such that
−1
−1
r = x1 r1 x−1
1 x2 r2 x2 ⋯xk rk xk .
Note that by bi-invariance
dG (ϕ(rj ), 1G ) = dG (ϕ(rj−1 ), 1G ) ≤ def(ϕ)
10
M. DE CHIFFRE, L. GLEBSKY, A. LUBOTZKY, AND A. THOM
for all j. Thus, using bi-invariance again, we get
−1
dG (ϕ(r), 1kn ) = dG (ϕ(x1 r1 x−1
1 )⋯ϕ(xk rk xk ), 1G )
≤ ∑ dG (ϕ(xj )ϕ(rj )ϕ(xj )−1 , 1G )
k
j=1
= ∑ dG (ϕ(rj ), 1G )
k
j=1
≤ k ⋅ def(ϕ),
So letting Kr = k, we are done.
1.5. Group cohomology. For convenience, we recall one construction of group cohomology. We primarily need the second cohomology of a group with coefficients in a unitary representation, but for
completeness, we give a more general definition. Let Γ be any group
and let V be a Γ-module, i.e. an abelian group together with a (left)
action π of Γ on V . We consider the chain complex C n (Γ, V ), n ≥ 1,
which is the set of functions from Γn to V together with the coboundary
operator,
d = dn ∶ C n (Γ, V ) → C n+1 (Γ, V ),
defined by
dn (f )(g1 , . . . , gn+1 ) = π(g1 )f (g2 , . . . , gn+1 )
+ ∑(−1)j f (g1 , . . . , gj gj+1, . . . , gn+1 )
n
j=1
+ (−1)n+1 f (g1 , . . . , gn ).
We also let C 0 (Γ, V ) = V and d0 (v)(g) = π(g)v−v for v ∈ V, g ∈ Γ. Thus,
for n ≥ 0 we define the n-coboundaries to be B n (Γ, V ) = Im(dn−1 ) (with
B 0 (Γ, V ) = {0}) and the n-cocycles to be Z n (Γ, V ) = ker(dn ). One
checks that B n (Γ, V ) ⊆ Z n (Γ, V ), so we can define the n-th cohomology
to be
H n (Γ, V ) = Z n (Γ, V )/B n (Γ, V ).
Recall that given an extension of groups
i
q
1 → V → Γ̂ → Γ → 1,
where V is abelian, there is an action of Γ on V induced by the conjugation action of Γ̂ on i(V ). Fixing any section σ∶ Γ → Γ̂ (with σ(1Γ ) = 1Γ̂ )
of the quotient q we can define a map map f ∶ Γ × Γ → V as the solution
to
i(f (g, h)) = σ(g)σ(h)σ(gh)−1 ,
for g, h ∈ Γ. It is straightforward to check that f ∈ Z 2 (Γ, V, π) and
f ∈ B 2 (Γ, V, π) exactly when the extension splits, i.e. there is a homomorphism p∶ Γ → Γ̂ such that q ○ p = idΓ .
ASYMPTOTIC REPRESENTATIONS
11
Assume now that Γ is countable and V is a Banach space with norm
∥⋅∥, then we can define a separating family of semi-norms on C n (Γ, V )
by
∥f ∥F = max ∥f (g)∥,
(1.1)
g∈F
for f ∈ C n (Γ, V ) and finite F ⊆ Γn . It is easy to see that with respect to
this family, C n (Γ, V ) is a Fréchet space (one can even take ∥⋅∥{x} , x ∈ Γn
as separating family) and if Γ acts on V by isometries, the map dn is
bounded.
2. Some examples of non Frobenius-stable groups
Part of our aim is to provide a large class of Frobenius-stable groups,
but let us start out by giving examples of well-known groups that are
not stable. Specifically, we show that Z2 and the Baumslag-Solitar
group BS(2, 3) are not Frobenius-stable by giving concrete examples
of asymptotic representations that are not equivalent to genuine representations. We also exploit the latter example to provide an example
of an Frobenius-approximated, non-residually finite group, see Section
2.3.
2.1. Z2 is not Frobenius-stable. In [51], Voiculescu proved that
the matrices
0 1⎞
⎛1
⎞
⎛0
0⎟
⎜ ωn
⎟
⎜1 0
⎜
⎟
⎜
⎟
ωn2
⎟,
⎟ ∈ U(n),
An = ⎜
Bn = ⎜ 1
⎜
⎟
⎜
⎟
⎜
⎟
⎜
⎟
⋱
⋱
n−1
⎝
⎝
ω ⎠
1 0⎠
n
where ωn ∶= exp( 2πi
n ), n ∈ N, define a non-trivial ∥⋅∥op -asymptotic representation of Z2 = ⟨a, b, ∣ aba−1 b−1 ⟩ by ϕn (a) = An and ϕn (b) = Bn . More
precisely,
but
def ∥⋅∥op (ϕn ) = ∥An Bn A∗n Bn∗ − 1n ∥op = ∣ωn − 1∣ = OU ( n1 ),
HomDist∥⋅∥op (ϕn ) ≥
√
2 − ∣1 − ωn ∣ − 1
(see also [21, 51]). By the inequalities ∥T ∥op ≤ ∥T ∥Frob ≤ n1/2 ∥T ∥op for
T ∈ U(n), we conclude that
and
def ∥⋅∥Frob (ϕn ) = OU (n−1/2 ),
HomDist∥⋅∥Frob (ϕn ) ≥
√
2 − ∣1 − ωn ∣ − 1,
so ϕn is also a non-trivial ∥⋅∥Frob -asymptotic representation. In particular Z2 is neither Uop - nor Frobenius-stable. It is worth noting that Z2
actually is UHS -stable, see e.g. [24] for a quantitative proof.
12
M. DE CHIFFRE, L. GLEBSKY, A. LUBOTZKY, AND A. THOM
2.2. BS(2, 3) is not Frobenius-stable. We now turn our attention to the Baumslag-Solitar group BS(2, 3) = ⟨a, b ∣ b−1 a2 ba−3 ⟩, see
[6] for the original reference. By definition, the generators satisfy the
equation
(2.1)
b−1 a2 b = a3 .
It is also well known and not hard to check that the generators do not
satisfy
ab−1 ab = b−1 aba.
(2.2)
Indeed, this follows easily from the description of BS(2, 3) as an HNNextension of Z. On the other hand, we recall the following.
Proposition 2.1 (Baumslag-Solitar [6]). Let Γ be a residually finite group. If a, b ∈ Γ satisfy (2.1), then they also satisfy (2.2).
Proof. Indeed, if a has finite order and a2 is conjugate to a3 , then
the order of a cannot be even. Thus, b−1 ab is a power of b−1 a2 b = a3 .
We conclude that a and b−1 ab commute.
By Mal’cev’s Theorem we immediately obtain the following consequence.
Corollary 2.2. Let a, b be unitary matrices. If a, b ∈ Γ satisfy
(2.1), then they also satisfy (2.2).
This last Corollary can also be proven directly by linear algebra
methods, see [22] where some quantitative aspects of operator-norm
aproximability of BS(2, 3) were studied. By Corollary 2.2, in order to
show that BS(2, 3) is non-stable it suffices to find a sequence of pairs
of unitary matrices that ∥⋅∥Frob -asymptotically satisfy Equation (2.1)
but are far from satisfying Equation (2.2). The study of approximation
properties of BS(2, 3) goes back to Rădulescu [40], where the focus was
more on approximation in the (normalized) Hilbert-Schmidt norm. We
are now going to prove the following result.
Theorem 2.3. The group BS(2, 3) is not Frobenius-stable.
The theorem is a direct consequence of the following lemma.
Lemma 2.4. There exist An , Bn ∈ U(6n) such that
● ∥Bn−1 A2n Bn − A3n ∥Frob = OU ( n1 )
√
● ∥An Bn−1 An Bn − Bn−1 An Bn An ∥Frob = 6n − OU (1).
Proof. We will omit the index and write A = An and B = Bn .
Let ω = exp( 2π
6n ) and consider a 6n-dimensional Hilbert space H with
orthonormal basis v[0], v[1], . . . v[6n − 1]. Define A ∈ U(6n) as Av[j] =
ω j v[j] (that is, A is A6n from the previous example). We plan to den−1
compose H as a direct sum in two ways H = ⊕n−1
j=0 S[j] and H = ⊕j=0 C[j]
such that each S[j] and each C[j] is 6-dimensional and the restriction
of A2 to S[j] as well as restriction of A3 to C[j] act approximately as
ASYMPTOTIC REPRESENTATIONS
13
multiplication by ω 6j . (The letter S stands for square and C stands for
cube.) Then we construct B = ⊕n−1
j=0 Bj with Bj ∶ C[j] → S[j]. Let us
start the detailed construction. Define
S[j] = span{v[3j], v[3j + 1], v[3j + 2],
v[3j + 3n], v[3j + 3n + 1], v[3j + 3n + 2]}
and
C[j] = span{v[2j], v[2j + 2n], v[2j + 4n],
v[2j + 1], v[2j + 2n + 1], v[2j + 4n + 1]}.
We will use the ordered base of S[j] (resp. C[j]) as it appears in their
definitions. Let Sj (resp. Cj ) be a restriction of A to S[j] (resp. C[j]).
Observe that
Sj = ω 3j diag(1, ω, ω 2 , −1, −ω, −ω 2 )
and
4πi
2πi
4πi
Cj = ω 2j diag(1, exp( 2πi
3 ), exp( 3 ), ω, ω exp( 3 ), ω exp( 3 )).
Now, let B ∈ U(6n) be any unitary of the form B = ⊕n−1
j=0 Bj with
unitary Bj ∶ C[j] → S[j]. We claim that
∥B −1 A2 B − A3 ∥Frob = OU ( n1 )
Indeed,
∥B −1 A2 B − A3 ∥2Frob = ∑ ∥Bj−1 Sj2 Bj − Cj3 ∥2Frob ,
n−1
j=0
and we obtain
∥Bj−1 Sj2 Bj − Cj3 ∥2Frob = ∥Bj−1 (Sj2 − ω 6j )Bj − (Cj3 − ω 6j )∥2Frob
≤ ∥Sj2 − ω 6j ∥2Frob + ∥Cj3 − ω 6j ∥2Frob
= 2(∣1 − ω 2∣2 + ∣1 − ω 4∣2 ) + 3∣1 − ω 3 ∣2 = OU ( n12 ),
which entails the claim. Now, consider the unitary given by the matrix
and let
⎛1 1 0 0 0 0 ⎞
⎜1 −1 0 0 0 0 ⎟
⎟
1 ⎜
⎜0 0 1 1 0 0 ⎟
⎟,
Bj = √ ⎜
⎟
2⎜
⎜0 0 1 −1 0 0 ⎟
⎜0 0 0 0 1 1 ⎟
⎝0 0 0 0 1 −1⎠
S̃ = diag(1, 1, 1, −1, −1, −1)
and
4πi
2πi
4πi
C̃ = diag(1, exp( 2πi
3 ), exp( 3 ), 1, exp( 3 ), exp( 3 )).
It is not hard to check that
∥Sj − ω 3j S̃∥2Frob = OU ( n12 )
14
M. DE CHIFFRE, L. GLEBSKY, A. LUBOTZKY, AND A. THOM
and
∥Cj − ω 2j C̃∥2Frob = OU ( n12 ).
Direct calculations show that ∥C̃Bj−1 S̃Bj − Bj−1 S̃Bj C̃∥2Frob = 6, so since
∥AB −1 AB − B −1 ABA∥2Frob = ∑ ∥Cj Bj−1 Sj Bj − Bj−1 Sj Bj Cj ∥2Frob ,
n−1
j=0
the lemma follows.
2.3. An example of a finitely generated, non-residually finite, and Frobenius-approximated group. Note that the example
above provides a homomorphism into the ultraproduct ϕ∶ BS(2, 3) →
∥⋅∥
UU Frob . The image Γ = ϕ(BS(2, 3)) is clearly Frobenius-approximated,
but it is clearly not residually finite, since, by construction, the elements ϕ(a), ϕ(b) ∈ Γ satisfy (2.1) but not (2.2). In some sense it is an
artefact of the definitions that every non-Frobenius-stable group has
a non-trivial Frobenius-approximated group quotient. It seems quite
likely that the construction above is enough to show that BS(2, 3) is
itself Frobenius-approximated. Indeed, even though the proof of this
assertion is not spelled out in full detail in [40], it appears that Rădulescu’s construction shows this. Note that it follows from work of
Kropholler [30] that BS(2, 3) is residually solvable and hence MF, see
[14].
3. Diminishing the defect of asymptotic representations
This section contains the key technical novelty of this article. We
associate an element [α] ∈ H 2 (Γ, ∏n→U (Mkn (C), ∥⋅∥)) to an asymptotic
representation ϕn ∶ Γ → U(kn ). We prove that if [α] = 0, then the defect can be diminished in the sense that there is an equivalent asymptotic representation ϕ′n with effectively better defect, more precisely
def(ϕ′n ) = oU (def(ϕn )).
3.1. Assumptions for this section. For this section, we fix the
following.
● A finitely presented group Γ = ⟨S ∣ R⟩,
● a sequence of natural numbers (kn )n∈N ,
● a family of submultiplicative, unitarily invariant norms on
U(k), k ∈ N, all denoted by ∥⋅∥, and
● an asymptotic representation ϕn ∶ S → U(kn ) with respect to
the metrics associated to ∥⋅∥.
Recall the ultraproduct notation introduced in Section 1.3, that is,
∥⋅∥
∥⋅∥
UU = ∏n→U (U(kn ), dist∥⋅∥ ) and MU = ∏n→U (Mkn (C), ∥ ⋅ ∥) and recall
∥⋅∥
∥⋅∥
that since ∥⋅∥ is submultiplicative, UU acts on MU by multiplication.
An asymptotic representation as above induces a homomorphism ϕU ∶
ASYMPTOTIC REPRESENTATIONS
∥⋅∥
15
∥⋅∥
Γ → UU on the level of the group Γ. Thus Γ acts on MU through ϕU .
With this in mind, we also want to fix the following:
● a section σ∶ Γ → FS of the natural surjection FS → Γ, in particular, we have σ(g)σ(h)σ(gh)−1 ∈ ⟪R⟫ for all g, h ∈ Γ,
● a sequence ϕ̃n ∶ Γ → U(kn ) such that ϕ̃(1Γ ) = 1kn , ϕ̃n (g −1 ) =
ϕ̃n (g)∗ , and for every g ∈ Γ
∥ϕn (σ(g)) − ϕ̃n (g)∥ = OU (def(ϕn )).
(3.1)
In particular, the sequence ϕ̃n is a lift of ϕU .
For this, note that given any section σ∶ Γ → FS , the sequence ϕn ○ σ is a
lift of ϕU . There exists a section σ with σ(1Γ ) = 1FS and σ(g −1 ) = σ(g)−1
for all g such that g 2 ≠ 1Γ . We define ϕ̃n (g) ∶= ϕn (σ(g)) for all g with
g 2 ≠ 1Γ . In the case g 2 = 1Γ , by Lemma 1.13 it holds that
∥ϕn (σ(g))2 − 1kn ∥ = OU (def(ϕn )),
so by Proposition 1.4 there are self-adjoint unitaries Bn ∈ U(kn ) such
that
∥Bn − ϕn (σ(g))∥ = OU (def(ϕn )).
By letting ϕ̃n (g) ∶= Bn , we get the desired map.
3.2. The cohomology class of an asymptotic representa∥⋅∥
tion. We want to define an element in H 2 (Γ, MU ) associated to ϕn .
To this end we define cn ∶= cn (ϕn ) ∶ Γ × Γ → Mkn (C) by
cn (g, h) =
ϕ̃n (g)ϕ̃n (h) − ϕ̃n (gh)
,
def(ϕn )
for all n ∈ N such that def(ϕn ) > 0 and cn (g, h) = 0 otherwise, for all
g, h ∈ Γ. The next proposition is a collection of basic properties of the
maps cn .
Proposition 3.1. Let g, h, k ∈ Γ. The maps cn satisfy the following
equations
ϕ̃n (g)cn (h, k) − cn (gh, k) + cn (g, hk) − cn (g, h)ϕ̃n (k) = 0,
cn (g, g ) = cn (1Γ , g) = cn (g, 1Γ ) = 0
−1
and
cn (g, h)∗ = cn (h−1 , g −1 ),
Furthermore, we have for every g, h ∈ Γ
∥cn (g, h)∥ = OU (1).
(3.2)
16
M. DE CHIFFRE, L. GLEBSKY, A. LUBOTZKY, AND A. THOM
Proof. For all g, h, k ∈ Γ and n ∈ N we have
def(ϕn ) ⋅ (ϕ̃n (g)cn (h, k) − cn (gh, k) + cn (g, hk) − cn (g, h)ϕ̃n (k))
= ϕ̃n (g)(ϕ̃n (h)ϕ̃n (k) − ϕ̃n (hk)) − (ϕ̃n (gh)ϕ̃n (k) − ϕ̃n (ghk))
+ (ϕ̃n (g)ϕ̃n (hk) − ϕ̃n (ghk)) − (ϕ̃n (g)ϕ̃n (h) − ϕ̃n (gh))ϕ̃n (k)
= ϕ̃n (g)ϕ̃n (h)ϕ̃n (k) − ϕ̃n (g)ϕ̃n (hk) − ϕ̃n (gh)ϕ̃n (k) + ϕ̃n (ghk)
+ ϕ̃n (g)ϕ̃n (hk) − ϕ̃n (ghk) − ϕ̃n (g)ϕ̃n (h)ϕ̃n (k) + ϕ̃n (gh)ϕ̃n (k)
= 0,
which proves the first equation. The second line of equations is immediate from the definition of cn and the fact that ϕ̃n (g −1 ) = ϕ̃n (g)∗ .
For the last assertion, note that since σ(g)σ(h)σ(gh)−1 ∈ ⟪R⟫, it
follows from Lemma 1.13 that
∥ϕn (σ(g)σ(h)σ(gh)−1 ) − 1kn ∥ = OU (def(ϕn )).
and thus it follows (by using Equation (3.1)) that
def(ϕn )∥cn (g, h)∥ = OU (def(ϕn )).
By (3.2) it follows that for every g, h ∈ Γ, cn (g, h) is a bounded
sequence, so the sequence defines a map
c = (cn )n∈N ∶ Γ × Γ → MU .
∥⋅∥
This map is not a cocycle in the sense explained in Section 1.5, but, as
the next corollary states, the map α(g, h) ∶= c(g, h)ϕU (gh)∗ is. (The
map c is a cocycle in the equivalent picture of Hochschild cohomology
and it turns out that some calculations are more natural with c, so
we will also work with this map.) Even though we suppress it in the
notation, keep in mind that c and α depend on the lift ϕ̃n and on
def(ϕn ).
∥⋅∥
Corollary 3.2. The map α∶ Γ×Γ → MU is a 2-cocycle with respect
∥⋅∥
to the isometric action π(g)T = ϕU (g)T ϕU (g)∗ , g ∈ Γ, T ∈ MU .
Proof. Given g, h, k ∈ Γ we have that
ϕU (g)α(h, k)ϕU (g)∗ − α(gh, k) + α(g, hk) − α(g, h)
= ϕU (g)c(h, k)ϕU (hk)∗ ϕU (g)∗ − c(gh, k)ϕU (ghk)∗
+ c(g, hk)ϕU (ghk)∗ − c(g, h)ϕU (gh)∗
= (ϕU (g)c(h, k) − c(gh, k) + c(g, hk) − c(g, h)ϕU (k))ϕU (ghk)∗
= 0,
where we used that ϕU is a homomorphism and Proposition 3.1.
We call α the cocycle associated to the sequence (ϕn )n∈N .
ASYMPTOTIC REPRESENTATIONS
17
Proposition 3.3. Assume that α represents the trivial cohomology
∥⋅∥
∥⋅∥
class in H 2(Γ, MU ), i.e. there exists a map β∶ Γ → MU satisfying
Then
α(g, h) = ϕU (g)β(h)ϕU (g)∗ − β(gh) + β(g),
β(1Γ) = 0,
g, h ∈ Γ.
(3.3)
β(g) = −ϕU (g)β(g )ϕU (g)
−1
∗
c(g, h) = ϕU (g)β(h)ϕU (h) − β(gh)ϕU (gh) + β(g)ϕU (gh).
(3.4)
(3.5)
Furthermore, we can choose β(g) to be skew-symmetric for all g ∈ Γ.
Proof. Equation (3.5) is immediate from c(g, h) = α(g, h)ϕU (gh)
for g, h ∈ G. Equation (3.3) follows from (3.5) and Proposition 3.1 with
g = h = 1Γ and (3.4) follows from (3.3), (3.5) and Proposition 3.1 with
h = g −1 . For the last claim, we possibly need to alter β a little. Note
that β ′ (g) ∶= −β(g)∗ = ϕU (g)β(g −1 )∗ ϕU (g)∗ also satisfies (3.3)-(3.5).
Indeed,
c(g, h) = c(h−1 , g −1 )∗
= (ϕU (h−1 )β(g −1 )ϕU (g −1 ) − β(h−1 g −1)ϕU (h−1 g −1 ) + β(h−1 )ϕU (h−1 g −1 ))∗
= ϕU (g)β(g −1 )∗ ϕU (h) − ϕU (gh)β((gh)−1 )∗ + ϕU (gh)β(h−1 )∗
= β ′ (g)ϕU (gh) − β ′ (gh)ϕU (gh) + ϕU (g)β ′ (h)ϕU (h)
for g, h ∈ Γ, which proves (3.5) whence the other two follow. Thus,
replacing β with
β ♯ (g) ∶=
β(g) − β(g)∗
,
g ∈ Γ, n ∈ N,
2
we see that β ♯ (g) is skew-symmetric and that Equations (3.3)-(3.5) are
still satisfied.
3.3. Correction of the asymptotic representation. Now let
β be as above and let βn ∶ Γ → Mkn (C) be any skew-symmetric lift of
β. Then exp(− def(ϕn )βn (g)) is a unitary for every g ∈ Γ, so we can
define a sequence of maps ψn ∶ Γ → U(kn ) by
ψn (g) = exp(− def(ϕn )βn (g))ϕ̃n (g).
Note that since ϕ̃n (1Γ ) = 1kn and βn (1Γ ) = 0, we have ψn (1Γ ) = 1kn .
In the proofs of Proposition 3.4 and Lemma 3.5, we will make use
of two basic inequalities that hold for any k ∈ N and A ∈ Mk (C):
∥1k − exp(A)∥ ≤ ∥A∥ exp(∥A∥)
∥1k − A − exp(A)∥ ≤ ∥A∥2 exp(∥A∥),
(3.6)
(3.7)
k
∞
∑k=0 Ak!
They are simple consequences of the definition exp(A) =
the triangle inequality and submultiplicativity of the norm.
and
18
M. DE CHIFFRE, L. GLEBSKY, A. LUBOTZKY, AND A. THOM
Proposition 3.4. With the notation from above, for every g ∈ Γ,
we have
∥ϕ̃n (g) − ψn (g)∥ = OU (def(ϕn )).
More precisely,
for most n ∈ N.
∥ϕ̃n (g) − ψn (g)∥ ≤ 2∥βn (g)∥ def(ϕn )
Proof. Let g ∈ Γ. By unitary invariance and submultiplicativity,
we get that
∥ϕ̃n (g) − ψn (g)∥ = ∥1kn − exp(− def(ϕn )βn (g))∥
≤ def(ϕn )∥βn (g)∥ exp(def(ϕn )∥βn (g)∥)
(3.6)
and since ∥βn (g)∥ is a bounded sequence and limn→U def(ϕn ) = 0, we
have exp(def(ϕn )∥βn (g)∥) ≤ 2 for most n and the result follows.
It follows that ψn ∣S is an asymptotic representation with def(ψn ∣S ) =
OU (def(ϕn )), but we prove that the defect is actually oU (def(ϕn )).
Lemma 3.5. For any g, h ∈ Γ, we have that
∥ψn (gh) − ψn (g)ψn (h)∥ = oU (def(ϕn )).
Proof. Let ξn (x) ∶= (1kn − def(ϕn )βn (x))ϕ̃n (x), for x ∈ Γ, and let
g, h ∈ Γ be fixed. Let C = 2 maxx∈{g,h,gh} ∥β(x)∥. Whence it follows that
for most n ∈ N,
∥ψn (x) − ξn (x)∥ ≤ C ⋅ def(ϕn )2 ,
(3.7)
for x ∈ {g, h, gh}. By the above (and by submultiplicativity) it follows
that
∥ψn (gh) − ψn (g)ψn (h)∥ = ∥ξn (gh) − ξn (g)ξn (h)∥ + oU (def(ϕn ))
so it suffices to show that
∥ξn (gh) − ξn (g)ξn (h)∥ = oU (def(ϕn ))
which amounts to the following calculations
ξn (gh) − ξn (g)ξn (h)
= ϕ̃n (gh) − ϕ̃n (g)ϕ̃n (h)
+ def(ϕn )(−βn (gh)ϕ̃n (gh) + ϕ̃n (g)βn (h)ϕ̃n (h) + βn (g)ϕ̃n (g)ϕ̃n (h))
− def(ϕn )2 βn (g)ϕ̃n (g)βn (h)ϕ̃(h)
= def(ϕn )(−cn (g, h)
+ ϕ̃n (g)βn (h)ϕ̃n (h) − βn (gh)ϕ̃n (gh) + βn (g)ϕ̃n (g)ϕ̃n (h))
− def(ϕn )2 βn (g)ϕ̃n (g)βn (h)ϕ̃n (h).
ASYMPTOTIC REPRESENTATIONS
19
By Equation (3.5) and the fact that submultiplicativity of the norm implies that ∥βn (g)ϕ̃n (g)βn (h)ϕ̃n (h)∥ is bounded, this finishes the proof.
At last we define the asymptotic representation ϕ′n ∶ S → U(kn ) by
ϕ′n = ψn ∣S and reach the desired conclusion def(ϕ′n ) = oU (def(ϕn )). Let
us, for reference’s sake, formulate the result properly.
Theorem 3.6. Let Γ = ⟨S ∣ R⟩ be a finitely presented group and
let ϕn ∶ S → U(kn ) be an asymptotic representation with respect to a
family of submultiplicative, unitarily invariant norms. Assume that
∥⋅∥
the associated 2-cocycle α = α(ϕn ) is trivial in H 2 (Γ, MU ). Then there
exists an asymptotic representation ϕ′n ∶ S → U(kn ) such that
(i) dist(ϕn , ϕ′n ) = OU (def(ϕn )) and
(ii) def(ϕ′n ) = oU (def(ϕn )).
Proof. We adopt the above notation. Assertion (i) follows from
Proposition 3.4; let r = x1 x2 ⋯xm ∈ R be written as a reduced word,
where xj ∈ S ∪ S −1 , j = 1, . . . , m. By iteration of Lemma 3.5 (using that
ψn takes unitary values and that ∥⋅∥ is unitarily invariant), we see that
∥ϕ′n (r) − 1kn ∥ = ∥ψn (x1 )ψn (x2 )⋯ψn (xm ) − 1kn ∥
= ∥ψn (x1 x2 )ψn (x3 )⋯ψn (xm ) − 1kn ∥ + oU (def(ϕn ))
⋮
= ∥ψ(1Γ ) − 1kn ∥ + oU (def(ϕn )).
Since ψ(1Γ ) = 1kn , we are done.
The converse of Theorem 3.6 is also valid in the following sense.
Proposition 3.7. Let Γ = ⟨S ∣ R⟩ be a finitely presented group, let
ϕn , ψn ∶ S → U(kn ) be asymptotic representations with respect to some
family of submultiplicative, unitarily invariant norms and suppose
● dist(ϕn , ψn ) = OU (def(ϕn )) and
● def(ψn ) = oU (def(ϕn )).
Then, the 2-cocycle α associated to (ϕn )n∈N is trivial in H 2 (Γ, MU ). In
particular, if ϕn is sufficiently close to a homomorphism, α is trivial.
∥⋅∥
Proof. If def(ϕn ) = 0 for most n ∈ N there is nothing to prove, so
let us assume this is not the case. Let ϕ̃n , ψ̃n ∶ Γ → U(kn ) be the induced
maps we get by fixing a section Γ → FS as explained in the beginning
of this section. We note that the sequences ϕ̃n and ψ̃n induce the same
map ϕU in the limit. Define
γn (g) =
ϕ̃n (g) − ψ̃n (g)
def(ϕn )
for n with def(ϕn ) > 0 and γn (g) = 0 otherwise. By the first bullet
in our assumptions, γn is essentially bounded, so it defines an element
20
M. DE CHIFFRE, L. GLEBSKY, A. LUBOTZKY, AND A. THOM
∥⋅∥
γ(g) ∈ MU . If we prove that
c(g, h) = ϕU (g)γ(h) − γ(gh) + γ(g)ϕU (h),
it will follow easily that β(g) ∶= γ(g)ϕU (g)∗ will satisfy dβ = α. First
note that it follows from the second bullet in our assumptions that for
every g, h ∈ Γ
thus
∥ψ̃n (gh) − ψ̃n (g)ψ̃n (h)∥ = oU (def(ϕn )),
def(ϕn ) ⋅ (ϕ̃n (g)γn (h) − γn (gh) + γn (g)ψ̃n (h))
= ϕ̃n (g)ϕ̃n (h) − ϕ̃n (g)ψ̃n (h) − ϕ̃n (gh) + ψ̃n (gh)
+ ϕ̃n (g)ψ̃n (h) − ψ̃n (g)ψ̃n (h)
= ϕ̃n (g)ϕ̃n (h) − ϕ̃n (gh) + ψ̃n (gh) − ψ̃n (g)ψ̃n (h)
= def(ϕn ) ⋅ cn (g, h) + oU (def(ϕn )).
Now the result follows by dividing by def(ϕn ) (which is possible for
most n) and taking the limit.
It is now clear that we are in need of large classes of groups for
which general vanishing results for the second cohomology with Banach
or Hilbert space coefficients can be proven. This will be the subject of
the next section. But first let us mention an alternative approach that
can be used to prove Theorem 3.6.
3.4. Asymptotic representations and extensions. As mentioned in Section 1.5, the second cohomology characterizes extensions
of Γ with abelian kernel and that in this picture coboundaries correspond to splitting extensions. Thus Theorem 3.6 and Corollary 3.7
show that finding the improved ϕ′n is equivalent to finding a splitting
for a certain extension. The connection between asymptotic representations and extensions can be seen directly without going through the
above computations, and this idea can actually be used to prove Theorem 3.6. Since this approach is very illustrative (it shows, for instance,
very clearly what rôle submultiplicativity plays), we sketch the proof.
We retain the assumptions from Section 3.1 and introduce some
more notation. Letting εn ∶= def(ϕn ), for n ∈ N, we define
N(OU (εn )) = {(un )n∈N ∈ ∏ U(kn ) ∣ ∥un − 1kn ∥ = OU (εn )}
n∈N
and
U(OU (εn )) = ∏ U(kn )/N(OU (εn )).
n∈N
Similarly, we define N(oU (εn )) and U(oU (εn )). We saw that the asymp∥⋅∥
totic representation (ϕn )n∈N induces a homomorphism ϕU ∶ Γ → UU ,
ASYMPTOTIC REPRESENTATIONS
21
but Lemma 1.13 actually implies the existence of an induced homomorphism
ϕ̂U ∶ Γ → U(OU (εn )).
Now we observe that the existence of ϕ′n ∶ S → U(kn ) with dist(ϕn , ϕ′n ) =
OU (def(ϕn )) and def(ϕ′n ) = oU (def(ϕn )) as in Theorem 3.6 is equivalent to the existence of a lift ϕ′U of ϕ̂U :
Γ
U(oU (εn ))
9
tt
tt
t
t
tt
tt
❏❏
❏❏
❏❏ϕ̂U
❏❏
❏❏
%
ϕ′U
U(OU (εn ))
We also see that the map ϕ̂U fits into the following commutative diagram
1
/
N
/
U(oU (εn ))
O
ψ
/
U(OU (εn ))
/
O
1
ϕ̂U
1
/
N
/
Γ̂
/
Γ
/
1
where Γ̂ is the pullback through ϕ̂ and ψ and
N ∶= N(OU (εn ))/N(oU (εn )).
Combining these two observations, it easily follows that ϕn can be improved to ϕ′n if and only if the bottom row in the latter diagram splits.
Now, since ∥⋅∥ is submultiplicative the group N is actually abelian.
Indeed, for all T, S ∈ U(k), we have that
∥T ST ∗ S ∗ − 1k ∥ = ∥T S − ST ∥
= ∥(T − 1k )(S − 1k ) − (S − 1k )(T − 1k )∥
≤ 2∥T − 1k ∥∥S − 1k ∥,
so if (Tn )n∈N , (Sn )n∈N ∈ N(O(εn )) then
(Tn Sn Tn∗ Sn∗ )n∈N ∈ N(O(ε2n )) ⊆ N(o(εn )),
whence the claim follows. Hence, as explained in Section 1.5, the extension 1 → N → Γ̂ → Γ → 1 corresponds to an element [α̂] ∈ H 2 (Γ, N),
and we conclude that ϕn can be improved if and only if [α̂] = [0]. Now,
∥⋅∥
the coefficients N are not exactly the same as MU in Theorem 3.6, but
with a little effort, one can prove that N is a real Banach space (or a
real Hilbert space in the case ∥⋅∥ = ∥⋅∥Frob ) with an isometric Γ-action
∥⋅∥
and the existence of an equivariant homomorphism θ∶ N → MU such
that [θ ○ α̂] = [α].
22
M. DE CHIFFRE, L. GLEBSKY, A. LUBOTZKY, AND A. THOM
Remark 3.8. We note that this approach also works for the most
part if ∥⋅∥ is not submultiplicative. In this case, however, the group N
is not abelian and the second cohomology with non-abelian coefficients
is much less tractable in general.
This alternative approach to the problem at hand is rather conceptual and elegant, but also the proof that we chose to present in detail
has its merits. The cocycle α can be computed directly from (ϕn )n∈N ,
and in cases where the associated 1-cochain β can be computed explicitly from α, this gives us an explicit expression for ϕ′n .
4. Cohomology vanishing and examples of n-Kazhdan groups
Recall that if Γ is a finitely (or, more generally, compactly) generated group, then Γ has Kazhdan’s Property (T) if and only if the
first cohomology H 1 (Γ, Hπ ) = 0 for every unitary representation π∶ Γ →
U(Hπ ) on a Hilbert space Hπ , see [8] for a proof and more background
information. We will consider groups for which the higher cohomology
groups vanish. Higher dimensional vanishing phenomena have been
studied in various articles, see for example [4, 5, 11, 19, 20, 33, 35].
We propose the following terminology.
Definition 4.1. Let n ∈ N. A group Γ is called n-Kazhdan if
vanishes for all unitary representations (π, Hπ ) of Γ. We
call Γ strongly n-Kazhdan, if Γ is k-Kazhdan for k = 1, . . . , n.
H n (Γ, Hπ )
So 1-Kazhdan is the Kazhdan’s classical Property (T). See [4, 33]
for discussions of other related higher dimensional analogues of Property (T). It will be central in our proof that by an application of the
open mapping theorem, vanishing of cohomology with Hilbert space
coefficients implies that cocycles are coboundaries with control on the
norms. This is explained in the following proposition and its corollary,
where we use the terminology introduced in Equation (1.1).
Proposition 4.2. Let n ∈ N, let Γ be a countable group, let π∶ Γ →
U(Hπ ) be a unitary representation, and assume that H n (Γ, Hπ ) = {0}.
Then for every finite set F ⊆ Γn−1 there exist a finite set Fπ ⊆ Γn and a
constant Cπ,F ≥ 0 such that for every cocycle z ∈ Z n (Γ, Hπ ) there is an
element b ∈ C n−1 (Γ, Hπ ) such that z = dn−1 b and ∥b∥F < Cπ,F ∥z∥Fπ .
Proof. By definition of the topology on C n (Γ, Hπ ), the basic open
sets are given by
Uδ,F ′ = {f ∈ C n (Γ, Hπ ) ∣ ∥f ∥F ′ < δ},
for a finite F ′ ⊆ Γn and δ > 0. Since the map dn−1 ∶ C n−1 (Γ, Hπ ) →
Z n (Γ, Hπ ) is linear, bounded and surjective, the open mapping theorem
applies (see [44]), so there are Cπ,F > 0 and Fπ ⊆ Γn such that
n
n−1
−1 ,F ∩ Z (Γ, Hπ ) ⊆ d
(U1,F ).
UCπ,F
π
ASYMPTOTIC REPRESENTATIONS
23
−1
−1 ,F , so
z ∈ UCπ,F
In other words, if z ∈ Z n (Γ, Hπ ), ∥z∥Fπ = 1, then Cπ,F
π
there is b ∈ C n−1 (Γ, Hπ ) such that dn−1 b = z and ∥b∥F < Cπ,F = Cπ,F ∥z∥.
This proves the claim.
We need the fact that if H 2 (Γ, Hπ ) vanishes universally, the set Fπ
and the bound Cπ,F can be chosen universally for all unitary representations π. This is the consequence of an easy diagonalisation argument.
Corollary 4.3. Let n ∈ N and Γ be a countable n-Kazhdan group.
Then for every finite set F ⊆ Γn there are a finite set F0 ⊆ Γn−1 and a
constant CF ≥ 0 such that for all unitary representations π of Γ and all
cocycles z ∈ Z n (Γ, Hπ ) there is an element b ∈ C n−1 (Γ, Hπ ) such that
z = dn−1 b and ∥b∥F < CF ∥z∥F0 .
We also observe the following extension proposition.
Proposition 4.4. Consider a short exact sequence of groups.
1 → Λ → Γ̃ → Γ → 1.
If Λ is strongly n-Kazhdan and Γ is n-Kazhdan, then Γ̃ is also nKazhdan. In particular, this applies if Λ or Γ is finite.
Proof. By the Hochschild-Serre spectral sequence [12], it is enough
to show that H k (Γ, H l (Λ, Hπ∣Λ )) vanishes for all k, l ∈ N with k + l = n.
If l > 0, then H l (Λ, Hπ∣Λ ) vanishes. For l = 0 and k = n, we have
H 0 (Λ, Hπ∣Λ ) = Fix(π∣Λ ) (the set of fixed vectors in Hπ∣Λ ), which is a
Hilbert space, and the induced action of Γ is a unitary representation,
so we conclude that H n (Γ, H 0 (Λ, Hπ∣Λ )) vanishes.
In view of the previous section, it is natural to ask if there exists
a non-residually finite group, such that H 2 (Γ, A) vanishes for all C ∗ algebras A equipped with an action of Γ by automorphisms. We are not
able to answer this questions, however, one can show that H 1 (Γ, ℓ∞ (Γ))
does not vanish for any infinite group, which makes a positive answer
somewhat unlikely. Here, we view ℓ∞ (G) as a G-module with respect
to the right translation action. Indeed, let d∶ Γ × Γ → N be a proper
left-invariant metric. Then, c(g) ∶= (h ↦ d(1Γ , h)−d(1Γ , hg))h∈Γ defines
a cocycle c∶ Γ → ℓ∞ (Γ) which cannot be the boundary of an element in
ℓ∞ (Γ) if Γ is infinite.
4.1. Higher rank p-adic lattices are 2-Kazhdan. Finally, this
section provides examples, or every n ≥ 2, of groups which are nKazhdan. The results are essentially known and we recall them in
detail for convenience.
Let K be a non-archimedean local field of residue class q, i.e. if O ⊂
K is the ring of integers and m ⊂ O is its unique maximal ideal, then q =
∣O/m∣. Let G be a simple K-algebraic group of K-rank r and assume
that r ≥ 1. The group G ∶= G(K) acts on the associated BruhatTits building B. For more information on the theory of buildings, see
24
M. DE CHIFFRE, L. GLEBSKY, A. LUBOTZKY, AND A. THOM
[1]. The latter is an infinite, contractible, pure simplicial complex of
dimension r, on which G acts transitively on the chambers, i.e. the topdimensional simplices. Let Γ be a uniform lattice in G, i.e. a discrete
cocompact subgroup of G. When Γ is also torsion free (which can
always be achieved by replacing Γ by a finite index subgroup), then
the quotient X ∶= Γ/B is a finite r-dimensional simplicial complex and
Γ = π1 (X). In particular, the group Γ is finitely presented. We will use
the following theorem which essentially appears in work of Ballmann
and Świątkowski [5] building on previous work of Garland [23].
Theorem 4.5. For every natural number r ≥ 2, there exists q0 (r) ∈
N such that the following holds. If q ≥ q0 (r) and G and Γ are as above,
then Γ is strongly (r − 1)-Kazhdan. In particular, if r ≥ 3, then Γ is
2-Kazhdan.
Recall, that being 1-Kazhdan is equivalent to Kazhdan’s property
(T). As it is well known, G and Γ as above have property (T) for every
r ≥ 2 and for all q. It is quite plausible that this is also true for in the
context of the preceding theorem.
Note that such Γ contains a finite-index torsion free group Λ. Proposition 4.4 implies that it suffices to prove that Λ is (r − 1)-Kazhdan. So
one can assume that Γ is torsion free.
Theorem 4.5 for finite dimensional Hilbert spaces is Theorem 8.3
in the seminal paper of Garland [23]. The general case is stated in the
last paragraph of Section 3.1 on page 631 in the work of BallmannŚwiątkowski [5]. It is deduced from Theorem 2.5 there: that Theorem
asserts á la Garland [23] that the desired cohomology vanishing follows
from sharp estimates of the spectral gap of the local Laplacians, i.e. the
Laplacians of the proper links of the complex. These estimates (called
also p-adic curvature) are given in Lemma 6.3 and Lemma 8.2 in [23].
So altogether Theorem 4.5 is proven. The method and estimates of
Garland are used also in [35, 53] and more recently [28, 33].
Let us give the reader just a notational warning: when we say rank
(following the common practice nowadays) we mean the K-rank of G
as a p-adic group (and we denoted it by r) and then it follows that the
dimension of the associated Bruhat-Tits building is equal to r. Garland
refers to the rank of the Tits system which in his notation he denotes
l + 1. Hence, our r is equal to his l.
It is very natural to wonder what happens in the analogous real
case. It is worth noting that already H 5(SLn (Z), R) is non-trivial for
n large enough [10]; thus SLn (Z) fails to be 5-Kazhdan for n large
enough. Similarly, note that H 2 (Sp(2n, Z), R) = R for all n ≥ 2 [10], so
that the natural generalization to higher rank lattices in real Lie groups
has to be formulated carefully; maybe just by excluding an explicit list
of finite-dimensional unitary representations.
Question 4.6. Is SLn (Z) 2-Kazhdan (at least for large n)?
ASYMPTOTIC REPRESENTATIONS
25
5. Proofs of the main results
In order to finish the proofs of Theorem 1.1 and Theorem 1.2, we
need to show that finitely presented 2-Kazhdan groups are Frobeniusstable and that some of them are not residually finite. The main result
follows then from Corollary 5.4 and the constructions in Section 5.2.
5.1. The Frobenius-stability of 2-Kazhdan groups. We now
consider 2-Kazhdan groups and asymptotic representations with respect to the Frobenius norm. As ∏n→U (Mkn (C), ∥⋅∥Frob ) is a Hilbert
space, the techniques of the Section 3 can be applied and the defect
of every asymptotic representation can be diminished. We start by
completing the proof of Theorem 1.2.
Theorem 5.1. Let Γ be a finitely presented group. If Γ is 2Kazhdan, then it is Frobenius-stable.
Proof. Let Γ = ⟨S ∣ R⟩. As mentioned, the ultraproduct
∥⋅∥Frob
MU
∶= ∏ (Mkn (C), ∥⋅∥Frob )
n→U
is a Hilbert space and Γ acts on this space by invertible isometries,
∥⋅∥
i.e. by unitaries, so H 2 (Γ, MU Frob ) vanishes. By Corollary 4.3 together
with the bounds from Equation (3.2) there is a constant C such that
for all asymptotic representations ϕn ∶ Γ → U(kn ) with respect to ∥⋅∥Frob ,
we can choose the associated 1-cochain β so that it satisfies
2 max∥β(s)∥Frob ≤ C.
s∈S
Define the quantity
θ(ϕ) ∶= HomDist(ϕ) − 2C def(ϕ)
for any map ϕ∶ S → U(k) (for any k ∈ N). We note that if ϕn ∶ S →
U(kn ) is any asymptotic representation, then limn→U θ(ϕn ) ≥ 0 and
equality holds if and only if ϕn is equivalent to a sequence of homomorphisms.
Now fix a sequence (εn )n∈N of strictly positive real numbers such
that limn→U εn = 0 and let (kn )n∈N a sequence of natural numbers. By
the above, we need to prove that for all sequences of εn -almost representations ψn ∶ S → U(kn ) the quantity θ(ψn ) tends to 0. For each n ∈ N,
the set of εn -almost homomorphisms ϕ∶ S → U(kn ) is compact and since
θ is continuous, there is ϕn ∶ S → U(kn ) such that def(ϕn ) ≤ εn and ϕn
maximizes θ for all n ∈ N. Evidently ϕn is an asymptotic representation. Thus, by Proposition 3.4 and Theorem 3.6 there is an asymptotic
representation ϕ′n ∶ S → U(kn ) such that dist(ϕn , ϕ′n ) ≤ C def(ϕn ) and
def(ϕ′n ) ≤
1
def(ϕn )
4
(5.1)
26
M. DE CHIFFRE, L. GLEBSKY, A. LUBOTZKY, AND A. THOM
for most n ∈ N. In particular, ϕ′n is also an εn -almost representation,
and it follows that for most n, we have
HomDist(ϕn ) ≤ HomDist(ϕ′n ) + C def(ϕn ).
Furthermore, by maximality we have that
HomDist(ϕ′n )−2C def(ϕ′n ) = θ(ϕ′n ) ≤ θ(ϕn ) = HomDist(ϕn )−2C def(ϕn ),
and putting these estimates together, we get
or
HomDist(ϕ′n ) − 2C def(ϕ′n ) ≤ HomDist(ϕ′n ) − C def(ϕn ),
(5.2)
1
def(ϕn ),
2
which can only be the case if def(ϕn ) = 0 for most n. But then ϕn
is really a representation for most n ∈ N, so HomDist(ϕn ) = 0 and
we conclude limn→U θ(ϕn ) = 0. Since θ(ϕn ) was chosen maximal, we
conclude that limn→U θ(ψn ) = 0 for all εn -almost representations ψn .
def(ϕn ) ≤ 2 def(ϕ′n ) ≤
(5.2)
(5.1)
Remark 5.2. Note that the same proof is still valid if one replaces
∥⋅∥Frob with any submultiplicative norm ∥⋅∥ and the 2-Kazhdan assumption with a suitable cohomology vanishing assumption. This, for instance, gives a sufficient condition for stability with respect to the
operator norm, where one could assume vanishing of second cohomology with coefficients in a C ∗ -algebra, but it seems difficult to prove the
existence of a group Γ with such properties – a task that will already
occupy the remaining sections in the Hilbert space case.
Remark 5.3. Note that Theorem 5.1 together with Proposition
4.4 imply that virtually free groups are Frobenius-stable – a fact that
seems cumbersome to establish directly.
For the sake of reference, we formulate following dichotomy, which
is an immediate corollary to Theorem 5.1, explicitly.
Corollary 5.4. Let Γ be a finitely presented 2-Kazhdan group.
Then either
● Γ is residually finite, or
● Γ is not Frobenius-approximated.
The techniques in Section 3 rely on submultiplicativity of the norm
and thus cannot be directly applied to the normalized Hilbert-Schmidt
norm ∥⋅∥HS . It is worth noting, though, that since √1k ∥A∥Frob = ∥A∥HS ≤
∥A∥op ≤ ∥A∥Frob for A ∈ Mk (C), we get the following immediate corollary to Theorem 5.1.
Corollary 5.5. Let Γ = ⟨S ∣ R⟩ be a finitely presented 2-Kazhdan
group and let ϕn ∶ S → U(kn ) be a sequence of maps such that
def(ϕn ) = oU (kn
−1/2
),
ASYMPTOTIC REPRESENTATIONS
27
where the defect is measured with respect to either ∥⋅∥HS or ∥⋅∥op . Then
ϕn is equivalent to a sequence of homomorphisms.
Proof. Let ∥⋅∥ be the norm in question. Then
√
def ∥⋅∥Frob (ϕn ) ≤ kn def ∥⋅∥ (ϕn ) = oU (1),
in other words, ϕn is an asymptotic representation with respect to
∥⋅∥Frob so by Theorem 5.1 there are representations πn ∶ Γ → U(kn ) with
for s ∈ S.
∥ϕn (s) − πn (s)∥ ≤ ∥ϕn (s) − πn (s)∥Frob = oU (1)
The preceding corollary provides some quantitative information on
the Connes Embedding Problem. Indeed, if a finitely presented, nonresidually finite, 2-Kazhdan group is UHS -approximated, then there is
some upper bound on the quality of the approximation in terms of
the dimension of the unitary group. Needless to say it would be very
interesting to decide if groups as above are UHS -approximated.
5.2. Non-residually finite 2-Kazhdan groups. In this section,
we present examples of finitely presented, non-residually finite groups
which are 2-Kazhdan and hence finish the proof of Theorem 1.1. Note
first that all the examples Γ presented in Section 4.1 are residually
finite. In this section we will show that some of these Γ’s have finite
central extensions
1 → C → Γ̃ → Γ → 1,
where C is a finite cyclic group and Γ̃ is not residually finite. Now, C
being finite is strongly n-Kazhdan for every n and so, if Γ is 2-Kazhdan,
then the same holds for Γ̃ by Proposition 4.4. Hence, we may combine
our results of this section with the results from the previous section to
obtain examples of 2-Kazhdan groups which are not residually finite.
Our construction will imitate the construction of Deligne [17] of
non-residually finite central extensions of some non-uniform arithmetic
lattices in real Lie groups. See also the work of Raghunathan [41,
42], where such central extensions were constructed for some uniform
lattices in Spin(2, n). These examples were later used by Toledo [47]
in his famous work showing the existence of algebraic varieties with
non-residually finite fundamental groups. A short and very readable
exposition of Deligne’s argument was given by Witte-Morris [52].
Our examples are p-adic analogues of Deligne’s examples and his
original proof actually works for them. He assumed that the algebraic
group G to be isotropic and hence got only non-uniform lattices, as
at the time the congruence subgroup property was known only in such
cases. Nowadays, we can argue for more general lattices along the same
lines.
28
M. DE CHIFFRE, L. GLEBSKY, A. LUBOTZKY, AND A. THOM
Let D be the standard quaternion algebra over Z, defined as
D = Z⟨i, j, k⟩/(i2 = j 2 = k 2 = −1, ij = k)
and set DR ∶= R ⊗Z D for an arbitrary unital commutative ring R. It
is well-known that DR is the Hamiltonian division algebra H, whereas
DQp ≅ M2 (Qp ) for p ≥ 3, where the second isomorphism is basically a
consequence of the fact that the congruence x2 + y 2 = −1 can be solved
modulo p. Consider also the standard involution τ ∶ DR → DR and let
n
n
n
h∶ DR
× DR
→ DR be the canonical sesqui-linear hermitian form on DR
,
i.e.
h((x1 , . . . , xn ), (y1 , . . . , yn )) = x1 τ (y1 ) + ⋯ + xn τ (yn ).
Consider now G(R) ∶= SU(n, DR , h). Note that G(R) is simply the
group formed by those n × n-matrices with entries in DR , such that
the associated DR -linear map preserves the form h. The functor G
is an absolutely almost simple, simply connected Q-algebraic group
which is Q̄-isomorphic to Sp(2n) and hence of type Cn , see §2.3 in
[37]. Embedding DR ⊂ M2 (C), one can show that G(R) is isomorphic to a simply connected compact Lie group of type Cn , namely the
quaternionic unitary group Sp(n) = U(2n) ∩ Sp(2n, C).
Let now p ≥ 3 be a rational prime. Since D(Qp ) ≅ M2 (Qp ), the
group G becomes split over Qp and G(Qp ) is a non-compact group
isomorphic to Sp(2n, Qp ). The group Γ ∶= G(Z[1/p]) sits diagonally
as a lattice in G(R) × G(Qp ). However, since G(R) is compact, this
yields that
Γ = G(Z[1/p]) ⊂ G(Qp )
is also a lattice. It is a standard fact that lattices in Sp(2n, Qp ) are
cocompact, basically since Sp(2n, Qp ) admits a basis of neighborhoods
of the identity that consists of torsion free subgroups. In this concrete
case, we can identify Γ with the group
U(2n) ∩ Sp(2n, Z[i, 1/p]).
It was proved by Rapinchuk [43] and Tomanov [48] that the group
Γ = G(Z[1/p]) has the congruence subgroup property. Let us explain
what this means in the adelic language: The group Γ is a subgroup
of G(Q) and we can define two topologies on G(Q) as follows. The
first is the arithmetic topology, for which the arithmetic subgroups, i.e.
the subgroups commensurable to Γ serve as a fundamental system of
neighborhoods of the identity. The second is the congruence topology
for which we take as a basis of neighborhoods of the identity only
those arithmetic groups which contain, for some natural number m
with (m, p) = 1, one of the principal congruence subgroups
Γ(m) ∶= ker (G(Z[1/p])) → G(Z/mZ)) .
̂ the completion with respect to the arithmetic
We denote by G(Q)
topology and by G(Q) the completion with respect to the congruence
ASYMPTOTIC REPRESENTATIONS
29
topology. There is a canonical surjective homomorphism
̂ → G(Q).
π∶ G(Q)
The result of Rapinchuk and Tomanov [43,48] combined with the work
of Prasad-Rapinchuk [39] says that in our case, π is an isomorphism
of topological groups.
Now, by the strong approximation theorem, G(Q) is isomorphic to
G (Af ∖{p} ) = ∏∗ G(Ql ),
l≠p
where ∏∗ denotes the restricted product as usual and Af ∖{p} is a subring of the Q-adeles A, the restricted product of Ql for all primes l ≠ p.
In particular, we get
G(A) = G(R) × G(Qp ) × G(Q).
Now a result of Prasad [38] (see also Deodhar [18] and Deligne
[17]) says that for every p, G(Qp ) has a universal central extension
̃
1 → C(p) → G(Q
p ) → G(Qp ) → 1,
where C(p) denotes the group of roots of unity in Qp , i.e. a cyclic group
̃ the inverse images of Γ
̃ and by G(Q)
of order p − 1. We denote by Γ
and G(Q) under the quotient map in the above extension.
̃ is not residually finite.
We claim that if p ≥ 5, then the group Γ
̃ contains the
Proposition 5.6. Every finite index subgroup of Γ
̃ is not
unique subgroup of index 2 in C(p). In particular, if p ≥ 5, Γ
residually finite.
Proof. To prove this, we will lift the arithmetic topology from
̃ as follows. We define the arithG(Q) to its central extension G(Q)
̃ as the topology for which all subgroups commetic topology on G(Q)
̃ serve as a fundamental system of neighborhoods of
mensurable to Γ
̂
̃ its Hausdorff completion. It is clear
the identity. We denote by G(Q)
from the definition that there exists a central extension of topological
groups
̂
̃ → G(Q)
̂ → 1,
1 → Z → G(Q)
where Z is a quotient of C(p), say by the quotient homomorphism
µ∶ C(p) → Z, where ker(µ) is exactly the intersection of all the finitẽ The ultimate goal is to show that if p ≥ 5, then
index subgroups of Γ.
ker(µ) is non-trivial which would show that ̃
Γ is not residually finite.
Define now
̂
̃
̃
̃ ∶= G(R) × G(Q
E
p ) × G(Q)
30
M. DE CHIFFRE, L. GLEBSKY, A. LUBOTZKY, AND A. THOM
̂ = G(A) with
and observe that it maps onto G(R) × G(Qp ) × G(Q)
kernel 1 × C(p) × Z. Finally, we set
̃
E
E=
.
{(1, a, b) ∈ 1 × C(p) × Z ∣ b = µ(a)}
Now, the group E is a central extension of G(A) with kernel isomorphic
to Z. Moreover, we also see from the definitions that the natural
̃ →E
̃ to (1, a, µ(a))
̃ → E sends a ∈ C(p) ⊂ G(Q)
diagonal map G(Q)
and hence factors through a homomorphism G(Q) → E. This shows
that the central extension
1 → Z → E → G(A) → 1
splits over the subgroup G(Q) of G(A). Note that since G(Q) is
perfect, the same applies to G(A). Then a result on G(A) going
back to Moore [31] for split groups and Prasad-Rapinchuk [39] for
the general case, asserts that the universal central extension of G(A)
that splits over G(Q) has, in the case of our G, a kernel of order 2 –
basically since the groups of roots of unity in Q is {±1}. Hence, we
can conclude that ∣Z∣ ≤ 2. This proves the first part. More specifically,
this shows that the kernel of the map from the profinite completion
̂
̂
̃ to
̃ of Γ,
̃ which is realised as a compact-open subgroup of G(Q),
Γ
the profinite completion ̂
Γ of Γ, which is realised as a compact-open
̂
subgroup of G(Q) = G(Q) is of order at most 2. Hence, every finite
̃ contains the index 2 subgroup of C(p) in the center
index subgroup of Γ
̃
of Γ.
̃ is not residually
Now, if p ≥ 5, then 2 < p − 1 and this proves that Γ
finite.
̃ is 2-Kazhdan, by Theorem 4.5 and ProposiIn conclusion, since Γ
tion 4.4, it can not be Frobenius-approximated by Corollary 5.4. This
finishes the proof of Theorem 1.1.
Acknowledgments
The first and the last named authors were supported by ERC Consolidator Grant No. 681207. The second named author was supported
by the ERC when visiting the Hebrew University at Jerusalem. The
third author was supported by the ERC, NSF and BSF.
The last author wants to thank David Fisher for fruitful discussions back in March 2011 – the idea of a cohomological obstruction to
stability of asymptotic representations was first found there and later
independently by the second and third author. We are grateful to
Pierre Pansu and especially to Andrei Rapinchuk for useful remarks
and references. We thank the Isaac Newton Institute in Cambridge
for its hospitality during the workshop Approximation, deformation,
and quasification (supported by EPSRC Grant No. EP/K032208/1)
ASYMPTOTIC REPRESENTATIONS
31
as part of the program on Non-positive curvature: group actions and
cohomology.
References
[1] Peter Abramenko and Kenneth S. Brown, Buildings, Graduate Texts in Mathematics, vol. 248, Springer, New York, 2008. Theory and applications. ↑24
[2] Goulnara Arzhantseva, Asymptotic approximations of finitely generated groups,
Extended abstracts Fall 2012—automorphisms of free groups, Trends Math.
Res. Perspect. CRM Barc., vol. 1, Springer, Cham, 2014, pp. 7–15. ↑2
[3] Goulnara Arzhantseva and Liviu Păunescu, Almost commuting permutations
are near commuting permutations, J. Funct. Anal. 269 (2015), no. 3, 745–757.
↑3, 9
[4] Uri Bader and Piotr W. Nowak, Cohomology of deformations, J. Topol. Anal.
7 (2015), no. 1, 81–104. ↑22
[5] Werner Ballmann and Jacek Świątkowski, On L2 -cohomology and property (T)
for automorphism groups of polyhedral cell complexes, Geom. Funct. Anal. 7
(1997), no. 4, 615–645. ↑4, 22, 24
[6] Gilbert Baumslag and Donald Solitar, Some two-generator one-relator nonHopfian groups, Bull. Amer. Math. Soc. 68 (1962), 199–201. ↑12
[7] Oren Becker, Alexander Lubotzky, and Andreas Thom, Stability and invariant
random subgroups, available at arXiv:1801.08381. ↑3
[8] Bachir Bekka, Pierre de la Harpe, and Alain Valette, Kazhdan’s property (T),
New Mathematical Monographs, vol. 11, Cambridge University Press, Cambridge, 2008. ↑22
[9] Bruce Blackadar and Eberhard Kirchberg, Generalized inductive limits of
finite-dimensional C ∗ -algebras, Math. Ann. 307 (1997), no. 3, 343–380. ↑1,
2
[10] Armand Borel, Stable real cohomology of arithmetic groups, Ann. Sci. École
Norm. Sup. (4) 7 (1974), 235–272 (1975). ↑24
[11] Armand Borel and Nolan Wallach, Continuous cohomology, discrete subgroups,
and representations of reductive groups, 2nd ed., Mathematical Surveys and
Monographs, vol. 67, American Mathematical Society, Providence, RI, 2000.
↑22
[12] Kenneth S. Brown, Cohomology of groups, Graduate Texts in Mathematics,
vol. 87, Springer-Verlag, New York, 1994. Corrected reprint of the 1982 original.
↑23
[13] Marc Burger, Narutaka Ozawa, and Andreas Thom, On Ulam stability, Israel
J. Math. 193 (2013), no. 1, 109–129. ↑2, 8
[14] John Carrion, Marius Dadarlat, and Caleb Eckhardt, On groups with quasidiagonal C ∗ -algebras, J. Funct. Anal. 265 (2013), no. 1, 135–152. ↑1, 2, 14
[15] Alain Connes, Classification of injective factors. Cases II1 , II∞ , IIIλ , λ =/ 1,
Ann. of Math. (2) 104 (1976), no. 1, 73–115. ↑1, 2
[16] Marcus De Chiffre, Narutaka Ozawa, and Andreas Thom, Operator algebraic
approach to inverse and stability theorems for amenable groups, available at
https://arxiv.org/abs/1706.04544. ↑2
[17] Pierre Deligne, Extensions centrales non résiduellement finies de groupes arithmétiques, C. R. Acad. Sci. Paris Sér. A-B 287 (1978), no. 4, A203–A208
(French, with English summary). ↑4, 27, 29
[18] Vinay V. Deodhar, On central extensions of rational points of algebraic groups,
Bull. Amer. Math. Soc. 81 (1975), 573–575. ↑29
[19] Jan Dymara and Tadeusz Januszkiewicz, New Kazhdan groups, Geom. Dedicata 80 (2000), no. 1-3, 311–317. ↑22
32
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
M. DE CHIFFRE, L. GLEBSKY, A. LUBOTZKY, AND A. THOM
, Cohomology of buildings and their automorphism groups, Invent.
Math. 150 (2002), no. 3, 579–627. ↑22
Ruy Exel and Terry Loring, Almost commuting unitary matrices, Proc. Amer.
Math. Soc. 106 (1989), no. 4, 913–915. ↑11
Tobias Fritz, On infinite-dimensional state spaces, J. Math. Phys. 54 (2013),
no. 5, 052107, 8. ↑12
Howard Garland, p-adic curvature and the cohomology of discrete subgroups of
p-adic groups, Ann. of Math. (2) 97 (1973), 375–423. ↑4, 24
Lev Glebsky, Almost commuting matrices with respect to normalized HilbertSchmidt norm, available at https://arxiv.org/abs/1002.3082. ↑11
Lev Glebsky and Luis Manuel Rivera, Sofic groups and profinite topology on
free groups, Journal of Algebra 320 (2008), no. 9, 3512–3518. ↑2, 9
Mikhael Gromov, Endomorphisms of symbolic algebraic varieties, Journal of
the European Mathematical Society 1 (1999), no. 2, 109–197. ↑1, 2
Karsten Grove, Hermann Karcher, and Ernst A. Ruh, Jacobi fields and Finsler
metrics on compact Lie groups with an application to differentiable pinching
problems, Math. Ann. 211 (1974), 7–21. ↑2
Anna Gundert and Uli Wagner, On eigenvalues of random complexes, Israel J.
Math. 216 (2016), no. 2, 545–582. ↑24
David Kazhdan, On ε-representations, Israel J. Math. 43 (1982), no. 4, 315–
323. ↑2, 4
Peter H. Kropholler, Baumslag-Solitar groups and some other groups of cohomological dimension two, Comment. Math. Helv. 65 (1990), no. 4, 547–558.
↑14
Calvin C. Moore, Group extensions of p-adic and adelic linear groups, Inst.
Hautes Études Sci. Publ. Math. 35 (1968), 157–222. ↑30
Nikolay
Nikolov,
Jakob
Schneider,
and
Andreas
Thom,
Some remarks on finitarily approximated groups, available at
https://arxiv.org/abs/1703.06092. ↑2
Izhar Oppenheim, Vanishing of cohomology and property (T) for groups acting
on weighted simplicial complexes, Groups Geom. Dyn. 9 (2015), no. 1, 67–101.
↑4, 22, 24
Narutaka Ozawa, Mikael Rørdam, and Yasuhiko Sato, Elementary amenable
groups are quasidiagonal, Geom. Funct. Anal. 25 (2015), no. 1, 307–316. ↑5
Pierre Pansu, Formules de Matsushima, de Garland et propriété (T) pour des
groupes agissant sur des espaces symétriques ou des immeubles, Bull. Soc.
Math. France 126 (1998), no. 1, 107–139 (French, with English and French
summaries). ↑22, 24
Vladimir G. Pestov, Hyperlinear and sofic groups: a brief guide, Bull. Symbolic
Logic 14 (2008), no. 4, 449–480. ↑1, 2
Vladimir Platonov and Andrei S. Rapinchuk, Algebraic groups and number
theory, Pure and Applied Mathematics, vol. 139, Academic Press, Inc., Boston,
MA, 1994. ↑28
Gopal Prasad, Deligne’s topological central extension is universal, Adv. Math.
181 (2004), no. 1, 160–164. ↑29
Gopal Prasad and Andrei S. Rapinchuk, Computation of the metaplectic kernel,
Inst. Hautes Études Sci. Publ. Math. 84 (1996), 91–187 (1997). ↑29, 30
Florin Rădulescu, The von Neumann algebra of the non-residually finite Baumslag group ⟨a, b∣ab3 a−1 = b2 ⟩ embeds into Rω , Hot topics in operator theory,
Theta Ser. Adv. Math., vol. 9, Theta, Bucharest, 2008, pp. 173–185. ↑12, 14
Madabusi S. Raghunathan, Torsion in cocompact lattices in coverings of
Spin(2, n), Math. Ann. 266 (1984), no. 4, 403–419. ↑4, 27
ASYMPTOTIC REPRESENTATIONS
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
[52]
[53]
33
, Corrigendum: “Torsion in cocompact lattices in coverings of
Spin(2, n)”, Math. Ann. 303 (1995), no. 3, 575–578. ↑27
Andrei S. Rapinchuk, On the congruence subgroup problem for algebraic groups,
Dokl. Akad. Nauk SSSR 306 (1989), no. 6, 1304–1307 (Russian); English
transl., Soviet Math. Dokl. 39 (1989), no. 3, 618–621. ↑4, 28, 29
Walter Rudin, Functional analysis, 2nd ed., International Series in Pure and
Applied Mathematics, McGraw-Hill, Inc., New York, 1991. ↑22
Aaron Tikuisis, Stuart White, and Wilhelm Winter, Quasidiagonality of nuclear C ∗ -algebras, Ann. of Math. (2) 185 (2017), no. 1, 229–284. ↑3
Andreas Thom, Examples of hyperlinear groups without factorization property,
Groups Geom. Dyn. 4 (2010), no. 1, 195–208. ↑5
Domingo Toledo, Projective varieties with non-residually finite fundamental
group, Inst. Hautes Études Sci. Publ. Math. 77 (1993), 103–119. ↑4, 27
George Tomanov, On the congruence-subgroup problem for some anisotropic
algebraic groups over number fields, J. Reine Angew. Math. 402 (1989), 138–
152. ↑4, 28, 29
Alan M. Turing, Finite approximations to Lie groups, Annals of Mathematics
(1938), 105–111. ↑1
Stanisław Ulam, A collection of mathematical problems (1960), Interscience
Tracts in Pure and Applied Mathematics, no. 8, Interscience Publishers, New
York-London. ↑1
Dan Voiculescu, Asymptotically commuting finite rank unitary operators without commuting approximants, Acta Sci. Math. (Szeged) 45 (1983), no. 1-4,
429–431. ↑11
Dave Witte Morris, A lattice with no torsion free subgroup of finite index (after
P. Deligne), June 2009 informal discussion at the University of Chicago. ↑27
Andrzej Żuk, Property (T) and Kazhdan constants for discrete groups, Geom.
Funct. Anal. 13 (2003), no. 3, 643–670. ↑24
M.D.C., TU Dresden, Germany
E-mail address: [email protected]
L.G., Universidad Autónoma de San Luis Potosí, México.
E-mail address: [email protected]
A.L., Hebrew University, Israel
E-mail address: [email protected]
A.T., TU Dresden, Germany
E-mail address: [email protected]
| 4math.GR
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.